Allied Debt Collection of Virginia, L.L.C. v. Nautica Entertainment, L.L.C.

[Cite as Allied Debt Collection of Virginia, L.L.C. v. Nautica Entertainment, L.L.C., 2019-Ohio-4055.]

                               COURT OF APPEALS OF OHIO

                              EIGHTH APPELLATE DISTRICT
                                 COUNTY OF CUYAHOGA

ALLIED DEBT COLLECTION OF                                 :
VIRGINIA, L.L.C.,
                                                          :
        Plaintiff-Appellee,
                                                          :                   No. 107678
        v.
                                                          :
NAUTICA ENTERTAINMENT, L.L.C.,
ET AL.,                                                   :

        Defendants-Appellants.                            :


                                JOURNAL ENTRY AND OPINION

                 JUDGMENT: AFFIRMED IN PART, REVERSED IN PART,
                            AND REMANDED
                 RELEASED AND JOURNALIZED: October 3, 2019


             Civil Appeal from the Cuyahoga County Court of Common Pleas
                                 Case No. CV-17-880787


                                             Appearances:

                 Patrick J. Milligan Co., L.P.A., and Patrick J. Milligan, for
                 appellees.

                 Hahn Loeser & Parks, L.L.P., Eric B. Levasseur, Anna
                 Leigh Gecht, and Dennis R. Rose, for appellants.


MICHELLE J. SHEEHAN, J.:

                   Defendants-appellants             Nautica       Entertainment,          L.L.C.,       Jacobs

Entertainment, Inc., Jacobs Investments, Inc., and Mary Horoszko (collectively
“Nautica” or “Nautica Defendants”) appeal from the trial court’s order compelling

the production of the electronically stored information (“ESI”), or “mirror image,”

of “all Nautica’s computers used by Mary Horoszko.” Because we find the trial

court’s order was warranted under the circumstances, yet failed to establish

adequate protections to safeguard the confidentiality of the information contained

on the computer systems to be imaged, we affirm in part, reverse in part, and

remand.

                        Procedural History and Substantive Facts

              On May 23, 2017, plaintiff-appellee Allied Debt Collection of Virginia,

L.L.C. (“Allied”) filed a complaint against the Nautica Defendants, Jeffrey

Livingston, and Chad Barth for actions stemming from a Kid Rock concert held at

the Jacobs Pavilion in the Nautica Entertainment Complex during the 2016

Republican National Convention. Allied states that it is a Virginia limited liability

company and assignee of any tort claims belonging to Blue Star Productions, L.L.C.

(“Blue Star”). The complaint alleged tortious interference with a contract between

Concerts for a Cause, Inc. (“CFAC”) and Blue Star, Virginia statutory business

conspiracy, fraud, theft in violation of R.C. 2307.61, and civil conspiracy. Barth is

President and a director of CFAC. Livingston is allegedly the fundraiser who handled

all negotiations on behalf of CFAC and Barth.

             According to Allied, Blue Star had contracted Kid Rock, among other

acts, to perform concerts during the convention, and Blue Star searched for a venue

in Cleveland for its concerts. Blue Star ultimately rented Jacobs Pavilion, which is
owned and operated by Nautica Entertainment, through CFAC, under a shared-use

arrangement whereby Blue Star agreed to promote and produce its music concerts

at Jacobs Pavilion in exchange for providing CFAC with 1,200 Blue Star issued

tickets to the Kid Rock concert. CFAC could in turn allocate the tickets to sponsors

and guests. Allied claims that Nautica Defendants tortiously interfered with Blue

Star’s arrangement with CFAC and conspired with CFAC to circumvent Blue Star’s

ticketing process by issuing unauthorized wristbands to third parties for entry to the

concert. Allied maintains that this scheme resulted in thousands of people accessing

the Kid Rock concert without a Blue Star ticket, in contravention of the Blue

Star/CFAC arrangement.

                                         Discovery

              On September 6, 2017, the court held a case management conference

during which the court scheduled a paper discovery cutoff of November 6, 2017.

During the conference, the parties agreed to forego electronic discovery and would

exchange paper discovery only.

              The parties exchanged written discovery. Discovery disputes ensued,

with both sides claiming discovery abuses. On April 5, 2018, Allied filed a motion to

compel Nautica Defendants and Jeffrey Livingston to respond to Allied’s request for

interrogatories and requests for production of documents. Regarding Nautica

Defendants, Allied claimed that Nautica failed to fully answer several interrogatories

and failed to produce numerous requested documents. Both Nautica Defendants

and Livingston opposed the motion. Thereafter, the parties entered into a stipulated
protective order. On June 11, 2018, the trial court granted Allied’s motion to compel,

ordering Nautica and Livingston to respond to discovery within five days from the

date of the order or face sanctions. Nautica Defendants served amended and

supplemental discovery responses, which included 2,495 additional pages of

documents.

              Claiming Nautica’s amended and supplemental discovery responses

were still deficient, Allied filed a motion to show cause on July 25, 2018. Within this

motion, Allied requested ESI for the first time. In its motion to show cause

concerning Nautica Defendants’ paper discovery, Allied claimed that Nautica

Defendants “habitually engaged in dilatory tactics, failed to meet their discovery

obligations, and engaged in a rolling document production.” In referencing the

documents it had received in response to its requests, Allied noted that it had

received a purportedly “altered email chain” between Horoszko and Chad Barth of

CFAC. In a footnote to this reference, Allied explained that Barth’s email production

included an email that contained the word “wristbands” in two locations, while

Horoszko’s production of that same email exchange did not:

      Barth’s email production: Wire I’m working on as we speak…will let
      you know amount and confirmation # shortly. Wristbands we’re
      working on a plan and executing it within the next hour. * * * How
      many of those 4,450 do you have? How many are committed to
      sponsors? I need the wristbands and info about today’s wire. Please
      and thank you.

(Emphasis added.)

      Horoszko’s email production: Wire I’m working on as we speak…will
      let you know amount and confirmation # shortly. * * * How many of
      those 4,450 do you have? How many are committed to sponsors? I
      need info about today’s wire. Please and thank you.

             Allied had therefore surmised that Horoszko had altered her email to

delete all references to “wristbands.” Consequently, within this footnote, Allied

“request[ed] the court order Nautica to produce the doctored email in native

format.” Nautica Defendants opposed Allied’s motion, along with this new request.

On August 14, 2018, Nautica Defendants also filed a motion to compel responses to

its written discovery requests propounded upon Allied, which the court ultimately

held in abeyance.

                                     August Hearing

             The court held a hearing on August 15, 2018, during which the parties

were scheduled to address Allied’s motion to show cause on the alleged discovery

issues. At the hearing, however, the court informed the parties that the hearing

would instead address “some emails that were exchanged that caused concern to

[Allied], who is now asking for further information from [Nautica Defendants].”

And the parties proceeded to address the purportedly altered email.

             During the hearing, Allied expanded its initial footnote request for “the

doctored email in native format” to include all email communications, requesting

“e-discovery with respect to Nautica’s emails” and “an order * * * requiring Nautica

to produce the electronic email communications in their native e-discovery format.”

(Emphasis added.) Allied argued that ESI discovery is inherent in its document

request and that one altered email suggests there may be more, thus justifying the
need for ESI. Nautica opposed Allied’s new request, arguing that the parties agreed

at the case management conference that the parties would exchange paper discovery

due to the timing and cost concerns associated with electronic discovery, the parties

had not been previously subjected to produce any ESI, there had been no discussions

concerning the proper ESI protocols, Allied had the opportunity to depose Horoszko

on the altered email, and ordering ESI now would result in an undue burden and

unfair cost to Nautica Defendants. Without offering any explanation concerning the

conflicting emails, Nautica’s counsel stated only that Nautica Defendants “dispute

that there was something inappropriate done with that email.”

              Acknowledging that this hearing pertained only to the allegedly

altered email, the court inquired of Nautica whether there were any other reasons

the court should not order ESI discovery in this matter, to which Nautica Defendants

replied that they have abided by the previously agreed upon discovery procedure,

discovery in the case has become extremely costly, and they believe ESI discovery

would be unduly burdensome and inappropriate. The court then ordered ESI

discovery “with respect to [Allied’s] request motion,” noting that it had not heard

“any specific reasons why it’s too burdensome despite the normal, you know, costs

of litigation that this is, according to Plaintiff seeking a $4.5 million verdict, that

would require me to not order this.” After ordering the ESI discovery of “all the

emails,” the court instructed the parties’ two IT experts to confer on the issue.

Thereafter, the court advised the parties that its order would be journalized. A

review of the record, however, reveals that no journal entry was entered.
                                    September Hearing

              On September 5, 2018, the court held a hearing on Allied’s motion to

show cause regarding Nautica’s responses to Interrogatory Nos. 7 and 12-14 and

Document Request Nos. 4, 30, and 36. During the hearing, the court found Nautica

Defendants in contempt for their failure to sufficiently respond to Allied’s discovery

requests, stating “It’s been admitted by both parties that they didn’t provide

documents. They refer to someone else’s production of documents and that they

didn’t understand what the word ‘communication’ meant and that — this has been

going on long enough, and it needs to stop.” The court then instructed Allied to

produce information pertinent to sanctions against Nautica, such as attorney fees.

The court also discussed scheduling a hearing on Nautica Defendants’ motion to

compel.

              Additionally, at the September hearing, the court addressed “the

altered email issue.” In its opening statement, Allied’s counsel argued that there are

two main issues the court should consider in granting its motion to show cause —

the financial issues or records concerning Livingston that had not been fully

produced and the communications between the parties that revealed a discrepancy

in emails between Barth and Horoszko that referenced wristbands. Livingston’s

counsel asserted that Allied indeed obtained all the requested records. Counsel for

Nautica Defendants asserted that Nautica had fully responded to all discovery

requests, including “thousands of emails.”
              In addressing Allied’s second issue, the altered email issue, Nautica’s

counsel represented that the parties had numerous “productive discussions,”

presumably off the record, regarding how to go about conducting the search,

electronically, but the parties disagreed on the scope of the search. Counsel also

informed the court that Allied apparently expanded its request for ESI once again,

now seeking more than the emails associated with Horoszko:

      Your Honor, as I believe the court will hear, what the plaintiffs have
      proposed is effectively to have a third-party outside vendor come in
      and do a complete image of Ms. Horoszko’s computer. And it’s
      unclear to me whether they’ve suggested that the servers should also
      somehow be included. But they’ve at least I believe said Ms.
      Horoszko’s computer.

              Counsel then noted his concerns regarding potential attorney-client

privilege and other confidential or proprietary information and the risk of placing

this information in the hands of a third-party vendor with no restrictions. Counsel

further argued that “anything beyond the email-related data would be wholly

irrelevant, [] overbroad, and beyond what this court had ordered at the last hearing.”

In response, the court stated:

      Okay. So I see a very simple and easy solution to solve these things.
      That is a confidentiality protective agreement with the third-party
      vendor which is done pretty routinely whenever there’s a third-party
      vendor who images a computer and also an opportunity for your IT
      person to identify as — in conjunction with the mirror image exactly
      what communications came from your firm. It’s not that hard to do.
      * * * Write up an agreement, and you’re done.

              Nautica’s counsel indicated that he would be willing to propose an

order that would provide “strict limitations on what [the] third-party vendor could
do with this information,” because the parties had yet to agree on the parameters for

the ESI search. In response, Allied’s counsel once again linked the ESI issue with

its original motion to compel interrogatories, noting that the altered email was

revealed during the initial discovery exchange, and counsel agreed that there should

be an order in place concerning the ESI.

              After the majority of the September hearing was spent discussing

specific interrogatories and document requests and the court found Allied’s motion

well taken and found Nautica in contempt concerning “document dumps” and

“misunderstanding communications,” Allied’s counsel raised the ESI issue. The

court asked Nautica Defendants if there was any reason they could not create a

confidentiality agreement concerning the ESI. Nautica objected on the grounds that

the request for ESI was overbroad and not consistent with what had been discussed

at the August hearing; however, counsel indicated that he would work with opposing

counsel to craft an order that would ensure the necessary confidentiality safeguards.

At this point, the court stated, “You had this opportunity for all this time, and now

we’re down to this where I have to order a mirror image of a computer to get this

information to Plaintiffs. I’m not going to take it anymore. Write an order,

protective order. I’ll sign it, and we’ll just get it done.” The court then noted that

“[w]e’ll sort out attorney-client privileges, in camera inspections. Just bring them

to me.”

              According to Nautica Defendants, they attempted in good faith to

reach an agreement with Allied on a joint stipulated ESI order but were ultimately
unable to agree on the terms, including the time in which Nautica could conduct a

privilege review and the search methodology utilized to protect against the

disclosure of proprietary and confidential information. Thereafter, the parties each

filed a proposed ESI order. Nautica objected to Allied’s proposed order.

                            The Trial Court’s Discovery Order

             On September 12, 2018, the court issued the following order:

      Hearing held for plaintiff’s motion to show cause why defendants
      should not be held in contempt for violating this court’s order
      compelling discovery. Defendants found in contempt of court for
      their failure to respond with particularity to interrogatories and
      requests for documents. Plaintiff to propose any adverse inference of
      fact relative to documents/information not produced to be considered
      by the jury and provide defense counsel with affidavit detailing
      attorney fees and expenses related to the efforts to compel discovery,
      preparation of the motion, and prosecuting the show cause hearing.
      Attorney fees hearing to be set. Defendant’s duty to comply with all
      discovery continues and is ongoing.

      Defendants ordered to provide mirror image of all Nautica’s
      computers used by Mary Horoszko through third-party vendor. See
      ESI order adopted and incorporated herein and entered under
      separate entry.

              Expanding Allied’s request for “e-discovery with respect to Nautica’s

emails,” the trial court ordered Nautica Defendants to produce a “mirror image of

all Nautica’s computers used by Mary Horoszko.” In so doing, the trial court adopted

and incorporated into its order Allied’s entire proposed ESI order verbatim. That

order compelled ESI, utilizing the third-party vendor engaged by Allied, Vestige,

with the following limitations and conditions:

      1. Vestige shall collect the requested ESI from Nautica and Horoszko
      by imaging and inventorying (i) the Nautica computer regularly used
by Horoszko and (ii) any production/non-backup server where
e-mails associated with her e-mail account * * * (or any other e-mail
account she has used to conduct business on behalf of Nautica, if any)
(collectively, the “Horoszko Accounts”) might otherwise be
electronically stored (collectively, the “Imaged ESI”). With respect to
the imaging of any server, such imaging shall be limited to those ESI
files associated with the Horoszko Accounts or where such ESI might
be electronically stored. Vestige shall be responsible for collecting the
ESI within five (5) days of the entry of this Order at a place, date and
time mutually agreeable between Vestige and Nautica’s information
technology (“IT”) personnel. Nautica and/or Nautica and Horoszko’s
counsel’s IT personnel shall have the right to be present and supervise
the imaging and inventorying of any ESI collected by Vestige, and
shall be provided an exact copy of any ESI forensically imaged by
Vestige prior to departing the collection locale.

2. Nautica and Horoszko’s counsel shall have the right to review the
Imaged ESI for any information protected by the attorney-client
privilege (The “Protected Information”) and shall create and produce
a log of any such Protected Information for delivery to Vestige and
Allied’s counsel within three (3) day thereof. Upon receipt of the log
identifying Protected Information, Vestige shall separate the
Protected Information from the Imaged ESI for purpose of production
and promptly produce to Allied all other ESI for the period October 1,
2014 through the present date. Allied’s counsel may request any
information withheld from production by Nautica and Horoszko to be
submitted by Vestige to the Court for determination of whether the
Protected Information is attorney-client privileged.

3. All ESI (i) collected by Vestige, and (ii) provided to Allied as part of
the Production Image, shall be deemed and treated as “confidential
Information” under the Court’s previously entered Stipulated
Protective Order (“SPO”). At all times while in possession of the ESI,
Vestige and Allied shall be bound by the SPO, a copy of which shall be
provided by Allied’s counsel to Vestige before it collects any ESI.
Vestige shall review and execute Exhibit A to the SPO and provide an
original executed copy of the same to Nautica and Horoszko’s counsel
and/or IT personnel prior to the collection of any ESI.

4. Within five (5) days of the final disposition of this action, whether
by entry of judgment or settlement, Vestige shall destroy (and attest
by affidavit to the destruction) or return to Nautica and Horoszko’s
counsel any ESI.
       5. Although all ESI produced to Allied by Vestige shall be deemed and
       treated as Confidential Information under the SPO, Allied may
       petition the Court to deem some of the ESI collected by Vestige and
       produced to Allied non-confidential, if necessary, pursuant to Section
       15 of the SPO.

               On September 13, 2018, Nautica Defendants appealed the trial court’s

order pertaining to the ESI.1

                                     Assignments of Error

               On appeal, Nautica Defendants assign three errors for our review,

which we will address together:

       I. The trial court abused its discretion in ordering the Nautica
       Defendants to produce forensic mirror images of their computers and
       servers to Allied without satisfying the first step of the Bennett test.

       II. The trial court abused its discretion in ordering the Nautica
       Defendants to produce forensic mirror images of their computers and
       servers to Allied without instituting adequate procedural safeguards
       to protect their privileged, proprietary, personal, and confidential
       electronically stored information (“ESI”).

       III. The trial court abused its discretion in ordering the Nautica
       Defendants to produce forensic mirror images of their computers and
       servers to Allied without limiting the scope of the production to only




       1  On September 20, 2018, this court sua sponte dismissed Nautica’s appeal for lack
of final appealable order, finding that “the mere adjudication of contempt of court is not
a final appealable order until a sanction or penalty is imposed.” Nautica Defendants filed
a motion for reconsideration of the dismissal. The motion clarified that Nautica’s appeal
concerns only the second part of the trial court’s order that compelled the production of
a “mirror image of all Nautica’s computers * * *,” which is a final appealable order because
the order compels the production of forensic imaging of a computer hard drive and the
disclosure of privileged and/or confidential material. In support, Nautica cited Fasteners
for Retail, Inc. v. Dejohn, 8th Dist. Cuyahoga No. 100333, 2014-Ohio-1729, and Bennett
v. Martin, 186 Ohio App.3d 412, 2009-Ohio-6195, 928 N.E.2d 763 (10th Dist.). Nautica’s
motion was unopposed. Upon reconsideration, we reinstated Nautica’s appeal.
      the ESI reasonably calculated to lead to the discovery of admissible
      evidence.

                                Law and Analysis

              Nautica Defendants contend that the trial court abused its discretion

in compelling the forensic mirror imaging of “all Nautica’s computers used by Mary

Horoszko.”   They argue that the trial court failed to conduct the appropriate

balancing test, which includes weighing the parties’ interest in discovery against

Nautica Defendants’ competing interests in privacy and confidentiality; the court

failed to institute adequate procedural safeguards for the protection of Nautica’s

privileged, proprietary, and confidential information; and the court’s order was

overbroad and unduly burdensome.

                                        Civ.R. 26

              The Ohio Rules of Civil Procedure provide a right to the “liberal

discovery of information.” Ward v. Summa Health Sys., 128 Ohio St.3d 212, 2010-

Ohio-6275, 943 N.E.2d 514, ¶ 9, citing Moskovitz v. Mt. Sinai Med. Ctr., 69 Ohio

St.3d 638, 661-662, 635 N.E.2d 331 (1994). This discovery may be obtained through

“deposition upon oral examination or written questions; written interrogatories;

production of documents, electronically stored information, or things or permission

to enter upon land or other property, for inspection and other purposes; physical

and mental examinations; and requests for admission.” Civ.R. 26(A).

              Civ.R. 26(B) governs the scope of the information that a party may

obtain through discovery:
      [A]ny matter, not privileged, which is relevant to the subject matter
      involved in the pending action, whether it relates to the claim or
      defense of the party seeking discovery or to the claim or defense of any
      other party, including the existence, description, nature, custody,
      condition and location of any books, documents, electronically stored
      information, or other tangible things and the identity and location of
      persons having knowledge of any discoverable matter.

Civ.R. 26(B)(1). Additionally, the information sought must “appear[] reasonably

calculated to lead to the discovery of admissible evidence.” Id.

              Specifically    regarding     electronically   stored    information,

Civ.R. 26(B)(4) provides as follows:

      A party need not provide discovery of electronically stored
      information when the production imposes undue burden or expense.
      On motion to compel discovery or for a protective order, the party
      from whom electronically stored information is sought must show
      that the information is not reasonably accessible because of undue
      burden or expense. If a showing of undue burden or expense is made,
      the court may nonetheless order production of electronically stored
      information if the requesting party shows good cause. The court shall
      consider the following factors when determining if good cause exists:

             (a) whether the discovery sought is unreasonably cumulative or
             duplicative;

             (b) whether the information sought can be obtained from some
             other source that is less burdensome, or less expensive;

             (c) whether the party seeking discovery has had ample
             opportunity by discovery in the action to obtain the information
             sought; and

             (d) whether the burden or expense of the proposed discovery
             outweighs the likely benefit, taking into account the relative
             importance in the case of the issues on which electronic
             discovery is sought, the amount in controversy, the parties’
             resources, and the importance of the proposed discovery in
             resolving the issues.
      In ordering production of electronically stored information, the court
      may specify the format, extent, timing, allocation of expenses and
      other conditions for the discovery of the electronically stored
      information.

Civ.R. 26(B)(4); Townsend v. Ohio DOT, 10th Dist. Franklin No. 11AP-672, 2012-

Ohio-2945, ¶ 15; Loc.R. 21.3(F)(2)(c) of the Court of Common Pleas of Cuyahoga

County, General Division (detailing similar factors for the court to consider when

determining if good cause exists for the production of ESI).

              An appellate court generally reviews a discovery dispute for an abuse

of discretion. Ward, 128 Ohio St.3d 212, 2010-Ohio-6275, 943 N.E.2d 514, at ¶ 13;

Fasteners for Retail, Inc., 8th Dist. Cuyahoga No. 100333, 2014-Ohio-1729, at ¶ 19

(reviewing the trial court’s order of forensic imaging of a computer’s hard drive

under the abuse of discretion standard). An “abuse of discretion ‘connotes more

than an error of law or judgment; it implies that the court’s attitude is unreasonable,

arbitrary, or unconscionable.’” Blakemore v. Blakemore, 5 Ohio St.3d 217, 219, 450

N.E.2d 1140 (1983), quoting State v. Adams, 62 Ohio St.2d 151, 157, 404 N.E.2d 144

(1980).   And absent an abuse of discretion, we must affirm the trial court’s

disposition on discovery matters. Lightbody v. Rust, 137 Ohio App.3d 658, 663, 739

N.E.2d 840 (8th Dist.2000).

                                     Forensic Imaging

              The trial court ordered Nautica Defendants to produce “all Nautica’s

computers used by Mary Horoszko” for a forensic examination. A forensic image,

also known as a “mirror image,” will “‘replicate bit for bit, sector for sector’” all
allocated and unallocated space on a computer’s hard drive, including any

embedded, residual, and deleted data. Bennett, 186 Ohio App.3d 412, 2009-Ohio-

6195, 928 N.E.2d 763, at ¶ 40, quoting Balboa Threadworks, Inc. v. Stucky, D.Kan.

No. 05-1157-JTM-DWB, 2006 U.S. Dist. LEXIS 29265, 7 (Mar. 24, 2006); Ferron v.

Search Cactus, L.L.C., S.D.Ohio No. 2:06-CV-327, 2008 U.S. Dist. LEXIS 34599, 10,

fn. 5 (Apr. 28, 2008) (“A mirror image copy represents a snapshot of the computer’s

records. * * * It contains all the information in the computer, including embedded,

residual, and deleted data.”).

              Courts are generally reluctant to compel forensic imaging “largely due

to the risk that the imaging will improperly expose privileged and confidential

material contained on the hard drive.” Bennett at ¶ 40. To determine whether

forensic imaging is warranted, as opposed to standard discovery procedures, the

trial court must (1) weigh the parties’ interest in obtaining discovery against privacy

concerns; and (2) institute a protective protocol to ensure that forensic imaging is

not unduly intrusive. Bennett at ¶ 41, 47. This court has adopted the Bennett two-

part test utilized by the Tenth District Court of Appeals in Fasteners for Retail, Inc.

at ¶ 21.

                                   Weighing of Interests

              Before compelling forensic imaging, a trial court must first weigh the

necessity of obtaining the electronic discovery against any privacy concerns:

       “[A] court must weigh ‘the significant privacy and confidentiality
       concerns’ inherent in imaging against the utility or necessity of the
       imaging. * * * In determining whether the particular circumstances
      justify forensic imaging, a court must consider whether the
      responding party has withheld requested information, whether the
      responding party is unable or unwilling to search for the requested
      information, and the extent to which the responding party has
      complied with discovery requests. * * * When a requesting party
      demonstrates either discrepancies in a response to a discovery request
      or the responding party’s failure to produce requested information,
      the scales tip in favor of compelling forensic imaging.”

(Citations omitted.) Fasteners for Retail, 8th Dist. Cuyahoga No. 100333, 2014-

Ohio-1729, at ¶ 24, quoting Bennett at ¶ 41; see also Scott Process Sys. v. Mitchell,

5th Dist. Stark No. 2012CA00021, 2012-Ohio-5971, ¶ 37-38 (finding the order for

forensic imaging in error where the requesting party failed to demonstrate that

paper production of records was insufficient or that the requesting party’s need for

forensic imaging outweighed the party’s privacy interests); Nithiananthan v.

Toirac, 12th Dist. Warren No. CA2011-09-098, 2012-Ohio-431, ¶ 9 (the party

requesting forensic imaging must demonstrate a “background of noncompliance”

with discovery under part one of the Bennett framework); Scotts Co., L.L.C. v.

Liberty Mut. Ins. Co., S.D.Ohio No. 3:06-CV-899, 2007 U.S. Dist. LEXIS 43005, 4-

5 (June 12, 2007), quoting Diepenhorst v. Battle Creek, W.D. Mich. No. 1:05-CV-

734, 2006 U.S. Dist. LEXIS 48551, 10-11 (June 30, 2006) (expressing reluctance to

permit intrusive forensic imaging as a matter of course on a requesting party’s “mere

suspicion” the opponent is withholding information or to “address the bare

possibility of discovery misconduct”).

             Step One: Necessity of the Imaging vs. Privacy Concerns
               In Bennett, the court found that the defendants repeatedly

represented that they had disclosed all responsive documents when they had not.

Bennett, 186 Ohio App.3d 412, 2009-Ohio-6195, 928 N.E.2d 763, at ¶ 42.

Additionally, the court noted that the defendants had a “lackadaisical and dilatory

approach to providing discovery” when they engaged in last-minute discovery

practice. Id. Thus, after applying the balancing factors, the court determined that

the defendants demonstrated a “willful disregard of the discovery rules,” and given

their “background of noncompliance,” the trial court properly ordered forensic

imaging. Id.

               In Fasteners, we determined that the record concerning discovery did

not demonstrate the requisite showing of the defendants’ noncompliance with

discovery under the first prong of the Bennett test. Specifically, we noted that the

record did not demonstrate that the documents sought by the plaintiff “were being

unlawfully withheld and not available from [Plaintiff’s] own information or other

sources.” Fasteners for Retail at ¶ 29.

               Nautica Defendants contend that the trial court failed to satisfy the

first step of the Bennett analysis.       In support, they claim that their conduct

concerning Allied’s request for ESI was not improper and therefore forensic imaging

was not warranted and the court “ignored” their privacy concerns. We find Nautica

Defendants’ argument unpersuasive.

               Here, the record shows that in the course of Nautica Defendants’

document production, Allied discovered two conflicting emails between Horoszko
and Barth. Barth’s copy of the email included references to wristbands, while

Horoszko’s copy contained no references to wristbands. This discovery, Allied

contends, led to its belief that the email chain had been altered, and Allied became

concerned that there were other “altered” emails of which Allied was unaware. In

response to this discovery, Allied made a new motion (within its motion for

sanctions regarding the paper discovery, albeit in a footnote) requesting the court

compel forensic imaging of Nautica computers used by Horoszko. In addition, the

record shows that following a hearing on Allied’s motion to show cause regarding

certain paper discovery, the trial court found Nautica Defendants in contempt for

failing to fully and properly answer several interrogatories and failing to produce

numerous requested documents, namely Interrogatory Nos. 7 and 12-14 and

Document Request Nos. 4, 30, and 36.

              Nautica Defendants argue that the court’s sanctions applied only to

Nautica’s paper discovery and their conduct relating to this new request for ESI was

not improper. We agree that the court’s sanctions appear to pertain to Nautica’s

conduct in responding to Allied’s paper discovery requests. The trial court’s order

at issue here, rather, is an ESI order in response to the alleged “altered email chain.”

              The newly discovered “altered email chain,” however, demonstrates a

discrepancy in discovery that weighs in favor of compelling forensic imaging.

Bennett, 186 Ohio App.3d 412, 2009-Ohio-6195, 928 N.E.2d 763, at ¶ 41 (finding

“the scales tip in favor of compelling forensic imaging” when a requesting party

demonstrates discrepancies in a response to a discovery request); see also Simon
Property Group L.P. v. MySimon, Inc., 194 F.R.D. 639, 641 (S.D.Ind.2000)

(permitting the plaintiff to inspect the defendant’s deleted computer files where the

plaintiff demonstrated “troubling discrepancies” concerning the defendant’s

document production); Playboy Ents., Inc. v. Welles, 60 F.Supp.2d 1050, 1054-55

(S.D. Cal. 1999) (permitting forensic imaging of a defendant’s computer where the

parties, pursuant to a document request, discovered an email chain produced by one

defendant that was not produced by a codefendant and where the parties later

learned that the defendant customarily deleted emails after litigation had

commenced). Nautica Defendants do not dispute the existence of the discrepancy,

yet they offer no explanation for the apparent conflict. And forensic imaging may

reveal other deleted emails or altered emails on the Nautica computers used by

Horoszko. When the court considered the Barth/Horoszko email discrepancy along

with the history of Nautica Defendants’ discovery violations concerning paper

discovery, where in fact the court found that Nautica Defendants repeatedly failed

to produce documents, an order compelling forensic imaging was not unreasonable.

              Regarding Nautica Defendants’ privacy concerns, as discussed below,

the record reflects the court considered Nautica Defendants’ privacy and

confidentiality concerns and instituted certain protective protocols. But the unique

discrepancy in discovery and the history of discovery violations weighed in favor of

forensic imaging.

              In light of the foregoing, we cannot find the trial court abused its

discretion in ordering forensic imaging under the circumstances. Viewing the
record in its entirety, the showing required under the first prong of the Bennett

analysis has been satisfied.

                               Step Two: Protective Protocol

               “Even when a defendant’s misconduct in discovery makes forensic

imaging appropriate, a court must protect the defendant’s confidential information

as well as preserve any private and privileged information.” Bennett, 186 Ohio

App.3d 412, 2009-Ohio-6195, 928 N.E.2d 763, at ¶ 47. A party’s purported failure

to produce discovery as requested or ordered “will rarely warrant unfettered access

to a party’s computer system.” Id. A trial court abuses its discretion when “its

judgment entry permits unfettered forensic imaging of a party’s electronic devices

and contains none of the Bennett protections required to conduct such forensic

analysis. Fasteners for Retail, 8th Dist. Cuyahoga No. 100333, 2014-Ohio-1729, at

¶ 33, citing Scott Process Sys., 5th Dist. Stark No. 2012CA00021, 2012-Ohio-5971,

at ¶ 36.

               The Bennett court suggested, and this court followed, a protocol for

forensic imaging:

       “[A]n independent computer expert, subject to a confidentiality order,
       creates a forensic image of the computer system. The expert then
       retrieves any responsive files (including deleted files) from the
       forensic image, normally using search terms submitted by the
       plaintiff. The defendant’s counsel reviews the responsive files for
       privilege, creates a privilege log, and turns over the nonprivileged files
       and privilege log to the plaintiff.”

Fasteners for Retail at ¶ 32, quoting Bennett at ¶ 47; Nithiananthan, 12th Dist.

Warren No. CA2011-09-098, 2012-Ohio-431, at ¶ 19 (adopting the protocol
suggested in Bennett and holding that “at minimum, several protective measures

must be enforced when ordering forensic imaging”); Scott Process Sys., supra

(adopting the Bennett protocol and reversing the trial court’s order for forensic

imaging where the order contained “none of the Bennett protections”).

              In Bennett, the appellate court found that the trial court did not abuse

its discretion in ordering forensic imaging as a sanction for the defendants’

noncompliance with the trial court’s orders. Bennett at ¶ 49. The appellate court

determined, however, that the trial court erred “in not providing adequate

protections to safeguard the confidentiality of the information contained on the

computer systems to be imaged.” Id. Finding insufficient the trial court’s safeguards

for privileged and confidential information, which included permitting the party to

redact privileged information and designating certain confidential and personal

information “for attorneys’ eyes only,” the appellate court stressed the importance

of a proper protocol where forensic imaging is ordered, even where a party engages

in misconduct:

      [W]e believe that more comprehensive protection is necessary,
      particularly given the sensitivity of the information at issue here.
      Bennett deserves a remedy for the prejudice caused by defendants’
      misconduct, but that remedy should not require defendants to
      sacrifice highly-sensitive, confidential information that has no
      bearing on Bennett’s claims. Additionally, private information of the
      computers’ users — such as personal financial information and
      communications with friends and family — should not be subject to
      disclosure. Therefore, we conclude that the trial court abused its
      discretion in devising the procedure for the forensic imaging. We urge
      the trial court to adopt a protocol similar to the one described above.
      We believe that such a protocol would allow Bennett sufficient access
      to the computer systems to recover useful information, while also
       providing defendants with an opportunity to identify and protect
       privileged and confidential matter.

Id. at ¶ 48.

               Mindful of the “potential intrusiveness” of a forensic examination,

federal courts likewise utilize a “collection and review protocol” when compelling a

forensic examination, such as the following:

       1. An independent computer expert shall be appointed by the Court
       and shall mirror image [the party’s] computer system.

       2. The parties have [a designated time in which to] meet and confer
       regarding their designation of an independent computer expert. If the
       parties cannot agree, on or before [a set date], each party shall submit
       its recommendation to the Court, and the Court will select the expert.

       3. The appointed expert shall serve as an Officer of the Court. Thus, to
       the extent that this computer expert has direct or indirect access to
       information protected by attorney-client privilege, such disclosure
       will not result in any waiver of the [party’s] privilege.

       4. The independent expert shall sign a confidentiality order.
       Additionally, the expert shall be allowed to hire other outside support
       if necessary in order to mirror image the [party’s] computer system.
       Any outside support shall be required to sign the same confidentiality
       order.

       5. The expert shall mirror image the [party’s] computer system.

       6. The [requesting party] shall provide a list of search terms to the
       Court to identify responsive documents to its document requests on
       or before [a set date]. After [the requesting party] has submitted the
       search terms to the Court, [the party] shall have 5 days to submit their
       objections to the Court regarding any of the search terms, which the
       court will rule upon. The Court will provide the search terms to the
       independent expert.

       7. Once the expert has mirror imaged the [party’s] computer system,
       the expert shall search the mirror image results using the search
       terms. The results of the search terms and an electronic copy of all
      responsive documents shall be provided to the [party] and to the
      Court.

      8. The [party] shall review the search term results provided by the
      independent expert and identify all responsive documents. The
      [party] shall either produce all responsive documents to the
      [requesting party] or identify those responsive documents not
      produced on a privilege log to the [requesting party] within 20 days of
      the date that the [party] receives the search term results from the
      independent expert. Any privilege log produced shall comply strictly
      with the [the rules of court].

      9. [The requesting party] shall pay for all fees and costs of hiring the
      independent expert at this time. However, if at a later time there is
      evidence of the [party’s] improper deletion of electronic documents or
      any other associated improper conduct, the Court will revisit this issue
      and consider charging [that party] for the fees and costs of the
      independent expert or imposing the fees and costs on the parties in a
      duly appropriate apportioned manner.

      10. The independent expert shall provide a signed affidavit detailing
      the steps he or she took in mirror imaging the [party’s] computer
      system and searching the mirror image for the search terms within 5
      days of providing the [party] and the Court with the results of the
      search for search terms in the mirror image.

Wynmoor Community Council, Inc. v. QBE Ins. Corp., 280 F.R.D. 681, 687-688

(S.D.Fla.2012); Bank of Mongolia v. M&P Global Fin. Servs., 258 F.R.D. 514

(S.D.Fla.2009).

              Nautica Defendants contend that the trial court’s discovery order

lacks adequate protective protocols to safeguard its privileged and confidential ESI.

In support, Nautica argues that the court’s order contains no search methodology or

search terms; the order does not exclude from the search information that is not

privileged but is otherwise confidential, such as personal or proprietary information

irrelevant to the underlying action; and the order’s provision of three days in which
to conduct a privilege review of potentially hundreds of gigabytes of data is

insufficient and unreasonable. Nautica Defendants also contend that the trial

court’s order is overbroad and permits the production of irrelevant and confidential

information that is not reasonably calculated to the discovery of admissible

evidence. Thus, according to Nautica, the order exceeds the scope of discoverable

information.

               Upon review, we find the trial court included some safeguards for

Nautica Defendants’ privileged and confidential matter. The record shows that the

court addressed Nautica Defendants’ privacy concerns, at least to some degree.

During the September hearing, the court engaged in a colloquy with counsel for

Nautica, during which counsel advised the court of his concern regarding protecting

confidential information, attorney-client privilege, and other personal and private

information arguably contained on Nautica’s computers. The court then instructed

the parties to fashion a protective order and the court would sign it. The court

further stated that the parties could address any issues concerning attorney-client

privileges through in camera inspections, instructing, “Just bring them to me.” The

court also executed an ESI order deeming all ESI produced to Allied as “Confidential

Information” under the court’s previously entered Stipulated Protective Order.

               However, the trial court’s ESI order lacks sufficient protective

protocols intended by Bennett and numerous other courts to safeguard Nautica

Defendants’ confidential information. For example, the trial court’s order in this

case failed to include a list of search terms in its order to narrow the production of
documents. The court’s order also failed to outline a process by which the parties

could submit search terms to identify responsive documents, provide objections to

proposed search terms, and provide the search terms to an independent third-party

computer expert. Allied suggests that a search term protocol using the term

“wristbands” would not have exposed the “altered email chain” or any others from

which Nautica deleted the term “wristbands” and therefore would not have been

fruitful. We find no reason the parties are limited to one relevant search term. Given

the opportunity, the parties could agree upon other equally availing search terms

that would likely produce responsive documents. And having a procedure in place

by which the parties can object to proposed search terms ensures that the parties’

interests are protected.

              Moreover, we find the lack of search terms and search protocol has

resulted in an overbroad order that risks including information irrelevant to the

underlying claims and information that may be personal, private, proprietary, or

otherwise confidential. “Courts have been cautious in requiring the mirror imaging

of computers where the request is extremely broad in nature and the connection

between the computers and the claims in the lawsuit are unduly vague or

unsubstantiated in nature.” Balboa Threadworks, Inc., D.Kan.No. 05-1157-JTM-

DWB, 2006 U.S. Dist. LEXIS 29265, at 3. Likewise, where courts do compel forensic

imaging, courts must utilize a protective protocol “to ensure that the forensic

imaging is not unduly intrusive,” which protocol serves to protect the defendant’s
confidential, private, and privileged information. Nithiananthan, 12th Dist. Warren

No. CA2011-09-098, 2012-Ohio-431, at ¶ 19, 20.

               Here, the record shows that Allied’s initial request for “the doctored

email in native format” (noted within a footnote in Allied’s motion for sanctions

regarding paper discovery) developed into a request for “e-discovery with respect to

Nautica’s emails” (at the August hearing) and ultimately resulted in the court’s order

of “a mirror image of all Nautica’s computers used by Mary Horoszko.” Although

the court’s ESI order provided a protocol in which the parties could arguably prevent

the disclosure of attorney-client privilege (i.e. the creation of a privilege log), there

is nothing in the order — through search terms or other instructions — that expressly

required the third-party vendor or expert to limit its search to information relevant

to Allied/Blue Star’s claims against Nautica Defendants or to exclude personal or

confidential information, such as Horoszko’s personal or financial information or

Nautica’s proprietary information. Rather, the order broadly states that the expert

shall collect “ESI files associated with the Horoszko accounts or where such ESI

might be electronically stored.” Without relevant search terms, or other limiting

instructions, the court is essentially permitting unfettered access to irrelevant and

confidential information contained in the Nautica computers used by Horoszko.

               Additionally, we find the trial court’s order failed to provide Nautica

Defendants sufficient time in which to review responsive documents for privileged

information. The court’s order provides that “counsel shall have the right to review

the Imaged ESI for any information protected by the attorney-client privilege (The
‘Protected Information’) and shall create and produce a log of any such Protected

Information for delivery to Vestige and Allied’s counsel within three (3) days

thereof.” The record shows that thousands of documents have been produced in the

course of paper discovery, and Nautica Defendants assert that forensic imaging

could access hundreds of gigabytes of data. Given this large amount of data, the

court’s allowance of only three days to review the records for privilege and

responsiveness, appropriately supplement Nautica’s responses to discovery

requests, and create a privilege log that expressly describes the nature of the

documents or communications that are protected is unreasonable. See Ameriwood

Industries v. Liberman, E.D.Mo. No. 4:06CV524-DJS, 2006 U.S. Dist. LEXIS

93380 (Dec. 27, 2006) (outlining a three-step procedure for forensic imaging and

including in its “disclosure step” a period of 20 days for review and creation of

privilege log); see also Wynmoor, 280 F.R.D. 681 (S.D.Fla.2012) (20 days for review

and creation of privilege log); Bank of Mongolia, 258 F.R.D. 514 (20 days for review

and creation of privilege log).

                                       Conclusion

              Based upon the discovery of a purportedly altered email chain and

Nautica Defendants’ history of noncompliance with the trial court’s previous

discovery orders, we find the trial court did not abuse its discretion in compelling

forensic imaging of Nautica computers. We find, however, that the trial court

abused its discretion in failing to establish the proper protective protocols that

would allow Allied sufficient access to recover useful, relevant information, while
also providing Nautica Defendants an opportunity to identify and protect privileged

and/or confidential matter.

              We therefore affirm in part and reverse in part, and we remand to the

trial court for further proceedings consistent with this opinion. In remanding, we

urge the trial court to adopt a protocol similar to the protocols utilized by the cases

referenced in this opinion.

      It is ordered that appellants and appellee share the costs herein taxed.

      The court finds there were reasonable grounds for this appeal.

      It is ordered that a special mandate issue out of this court directing the

common pleas court to carry this judgment into execution.

      A certified copy of this entry shall constitute the mandate pursuant to Rule

27 of the Rules of Appellate Procedure.



___________________________
MICHELLE J. SHEEHAN, JUDGE

EILEEN T. GALLAGHER, P.J., and
RAYMOND C. HEADEN, J., CONCUR