• Technologies
    • Review Platforms
    • ILS Social Media Data Analysis Suite
  • Consulting & Services
    • Consulting
    • Forensics & Collections
    • Review Platform Hosting & Management
    • Managed Review
    • Our Experts
  • AI Resources
  • ILS Articles
  • Company
    • About Us
    • Careers
    • Support
    • Contact Us
  • ILS
  • Sales
  • Support
  • Technologies
    • Review Platforms
    • ILS Social Media Data Analysis Suite
  • Consulting & Services
    • Consulting
    • Forensics & Collections
    • Review Platform Hosting & Management
    • Managed Review
    • Our Experts
  • AI Resources
  • ILS Articles
  • Company
    • About Us
    • Careers
    • Support
    • Contact Us

October 1, 2014

Should Parties Tender Back-Up Tapes Without a Privilege Review?

by Alan Brooks

In the consolidated case Dynamo v. Commissioner of Internal Review and Beekman v. Commissioner of Internal Review, Docket Nos. 2685-11, 8393-12 (US Tax Ct. Sept. 17, 2014), the Commissioner (Respondent) requested production of the electronically stored information (ESI) on two specific backup storage tapes – or the tapes themselves – to review the ESI’s metadata, verify the dates when certain documents were created, and to ascertain all information relevant to the proceeding.

Petitioners acknowledged the two tapes contained relevant electronic data, but they also deemed the request a “fishing expedition” to look for additional issues in the case. Petitioners asserted that the tapes contained “personal identification information, health insurance information, HIPAA protected information and other confidential information” that they had a duty to protect. They alleged the full production sought by the Respondent would result in the disclosure of privileged information.

Petitioners calculated that traditional review of the back-up tapes would take many months and estimated the cost of review to be $450,000. Petitioners offered to tender the ESI if they were authorized to use computer-assisted issue coding, also called predictive coding, to cull the production and lessen the costs.

Responded objected to the use of predictive coding and claimed that if they just turned the tapes over, Petitioners would not have to review the data at their own expense. Respondent offered a clawback provision, whereby Petitioners could claim any privileged information on the tapes would not be subject to the discovery.

What Procedures Did Petitioners Offer to First Review the Tapes?

As Petitioners did not wish to turn over the back-up tapes without first review as Respondent suggested, they offered to use predictive coding as a cost-effective means of review. The procedure offered would include:

  1. Restoring the electronic data from the back-up tapes
  2. Qualifying some of the restored data, such as removing NIST files, system files, etc. (The footnote indicated this would remove some duplicative data)
  3. Index and load the data for review
  4. Apply criterial to the data to further remove duplicative data and non-relevant information
  5. Using agreed-upon search terms to find relevant documents
  6. Review the relevant documents for privilege and produce the non-privileged data and a privilege log

Should Petitioners just turn over the back-up tapes with a clawback order to save money? Should the court allow predictive coding despite Respondent’s objection? What do you think? Leave us a message or a comment on Facebook! Our discussion of this case and the court’s review will continue in our next post.

ILS – Plaintiff eDiscovery Experts

Categories: eDiscovery, eDiscovery Case Law, ESI, Metadata, Predictive Coding

ILS
17744 Sky Park Circle, Suite 270
Irvine, CA 92614
(888) 313-4457
sales@ilsteam.com
  • About ILS
  • Consulting
  • Forensics & Collections
  • Review Platform Hosting & Management
  • Managed Review
  • Sales
  • Support
  • LinkedIn
  • X

© 2025 ILS.

  • Privacy Statement
  • Cookie Statement
  • Terms of Use/Legal
ILS
Manage Cookie Consent
We use cookies to optimize our website and our service.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}