Courts have recently taken notice of the potential for spoliation of electronically stored information (ESI) in what computer experts call “unallocated space” (or “free space”) on computer hard drives.
The question is whether modifying, formatting, or wiping unallocated space is a sufficiently routine operation to trigger the limitation on discovery sanctions under Rule 37(e) of the Federal Rules of Civil Procedure.
Preservation Obligations.
A potential party to litigation that it reasonably anticipates is legally obliged to preserve information that may be relevant to the dispute. To satisfy this duty and not risk sanctions, the party must take reasonable steps to prevent inadvertent (or worse yet, intentional) destruction of potentially relevant information by those who may possess it. This requires identifying the sources and repositories of possibly relevant ESI and assessing how accessible those sources are for retrieval of data.
The consequences of failure to preserve potentially relevant information can be quite severe, including monetary sanctions on parties and their attorneys, unfavorable discovery orders, and instructions that permit a jury to reach negative factual inferences based on the destruction of evidence—in addition to the negative publicity associated with mere accusations of spoliation.
The Federal Rules of Civil Procedure, however, do not require preservation of absolutely anything and everything that may be relevant regardless of the circumstances. And the federal rules recognize that some relevant ESI may elude preservation despite a party’s reasonable efforts.
For example, Rule 37(e) limits sanctions against a party that loses relevant ESI as a result of the “routine, good-faith operation” of its electronic information system. Rule 37(e) does not define what constitutes “routine” or “good-faith” operation and, therefore, application of this limitation on sanctions for purported evidence destruction requires fact-intensive, case-by-case analysis.
Courts consider several factors, including the accessibility of the source in question, the efforts required to alter system operations, and whether the party should have known that discoverable data would be lost and unavailable from any other source.
Application to Unallocated Space.
Where does unallocated space fit in this preservation schema? Unallocated space is the logical space on a hard drive where new data or files can be added—it is technically unoccupied space where new data would be written by the computer’s operating system (Microsoft Windows, Linux or other system). Except for space allocated to system files, all space on new or newly formatted hard drives is unallocated. Generally on most standard computers, files or documents can only be saved or written to unallocated space on the hard drive.
Allocated space, on the other hand, is space that is already occupied by previously written files.
Analogous to Parking Garage.
Perhaps a fitting analogy is a parking structure, where an occupied parking space is “allocated” and physically no other car can occupy that same space.
Similarly, when a file is written to a certain space on the hard drive, that specific location or section of the drive becomes “allocated” and no other files can be written to that space until the space becomes “unallocated” again.
Space can become “unallocated” when users “delete” (or, more accurately, think they are deleting) a file. While deleting a file does not permanently remove the data that file contained, deleting the file frees up the space it previously occupied, converting it to “unallocated” space and allowing new or other files to be over-written on that location.
‘Delete’ Does Not Mean ‘Expunge.’
Preserving parties thus must understand that, when computer users click the “delete” button to erase a file from their computers, the operating system re-designates the previously allocated space as unallocated, but the data from the deleted file itself remains on the hard drive. The data changes its status or form, but is not expunged with standard file deletion.
Although it may become more difficult to retrieve, access, or reassemble the data after the file is deleted, the data is still there, somewhere, and it is often recoverable.
What’s In Unallocated Space?
Consequently, unallocated space potentially contains intact files, remnants or fragments of files and subdirectories, and temporary files.
See, e.g., Philips Elecs. N. Am. Corp. v. BC Technical,
Data from unallocated space can also be a source of critical evidence in criminal cases, as law enforcement and prosecutors may search it for hidden pieces of the factual puzzle that may reside there.
Cleaning and Wiping.
There are ways to permanently destroy all data in unallocated space, and numerous software applications can assist the average computer user in “cleaning” or “wiping” unallocated space. With normal computer usage not involving such cleaning applications, data from deleted files will remain recoverable until new files are written to the same exact space on the hard drive previously allocated to the deleted file. Data from the deleted file is only permanently lost when a new file overwrites that same space.
Expertise Required.
Data in unallocated space presents unique challenges to parties contending with preservation and discovery obligations. Accessing unallocated space and restoring deleted ESI that has not been wiped clean typically requires special tools and computer forensic specialists.
http://ro.ecu.edu.au/adf/1/, (discussing different tools capable of wiping unallocated space).
Since the average computer user likely will not have the technical know-how and sophistication to ensure that new files are not saved over space that was previously allocated to deleted files, there is a potential for permanent destruction of data anytime a user saves a file on his or her computer or opens an email attachment.
While one solution might be to collect all custodians’ hard drives and preserve them in their present condition or scan a full hard drive image, this can be a substantial undertaking that can result in interruption to operations and potentially considerable expense, much like preserving haystacks out of suspicion there may or may not be some potentially relevant “needles.” In this scenario, the issue of “routine operation” of the computer system may balance the preservation obligation against the circumstances.
Decisional Guidance.
Preservation and discovery of data in unallocated space has been challenged in a number of cases, three of which are noteworthy.
First, Delaware’s highest court addressed this issue in Genger v. TR Investors LLC.
The key fact the court focused on is that when Genger wiped his computer hard drive’s unallocated space, he clearly was subject to a court order that obligated him to preserve anything that may be relevant. Genger claimed that wiping unallocated space did not violate the court’s order because the order did not “expressly require the unallocated free space on his computer’s hard drive to be preserved.”
The Supreme Court of Delaware rejected this technical reading of the preservation order and found that the trial court rested its spoliation and contempt findings on more specific grounds—that Genger, “despite knowing he had a duty to preserve documents, intentionally took affirmative actions to destroy several relevant documents on his work computer,” and that Genger acted “furtively” when he asked an employee to wipe out the data at 1:00 a.m. using a program called “SecureClean.”
These actions also resulted in prejudice to the other party, which was impeded from recovering relevant documents for use in the litigation, including unique and probative versions of documents and email chains that could have been recovered from the unallocated space had it not been wiped.
Interestingly, the court found it “noteworthy” that the program used to wipe the information was not within Genger’s company’s “ordinary and routine data retention and deletion procedures.”
To avoid future disputes over data in “unallocated space,” the court encouraged the parties to raise the issue with the trial court before it issues a document preservation order.
The court noted that instances may arise where a party will have legitimate reasons to preserve unallocated space. The court seemed to suggest that if wiping of unallocated space were indeed part of the company’s routine operation of its computer system, the court should be informed of such fact for consideration in the court’s preservation order.
Second, in I-Med Pharma Inc. v. Biomatrix, Inc.,
Defendants argued that the magistrate judge abused his discretion in modifying the parties’ stipulation without a showing of “manifest injustice.”
Apparently, when plaintiff initially stipulated to production of all search results, including any data in unallocated space, it overlooked the possibility that broad search terms might hit on massive amounts of data from previously deleted files in unallocated space. This was no small oversight, however. A search of unallocated space on plaintiff’s hard drives returned roughly 65 million documents totaling 95 million pages.
Citing the expense of reviewing all of this data for responsiveness and privilege, plaintiff persuaded the magistrate judge that “good cause” existed to modify his prior order as the burden on plaintiff would “outweigh any potential benefit that may result.”
While plaintiff won this discovery battle, Judge Debevoise pointed out that plaintiff “should have exercised more diligence before stipulating to such broad search terms,” particularly since the search included unallocated space.
Third, in Tener v. Cremer,
After an unknown person posted a defamatory statement about plaintiff on the internet, plaintiff managed almost a year later to trace the Internet Protocol (IP) address of the exact computer from which the statement was posted to a computer at the New York University Langone Medical Center (the “Center”).
Along with the subpoena, Plaintiff also served a preservation demand letter, requesting that the Center stop any normal practices that might destroy information that could shed light on the culprit’s identity.
The trial court denied plaintiff’s motion, but the appellate court reversed, holding that good cause existed to necessitate a cost/benefit inquiry into whether plaintiff’s need for the information outweighed the potential cost and burden on the Center.
In response, plaintiff presented an expert’s report explaining that the data may still be recovered from unallocated space unless it was forensically wiped.
On appeal, the court noted that the Center neither confirmed that unallocated space was wiped nor presented evidence of any effort it made to recover the data. Thus, the Center’s claim that it “did not have the ability” to access or retrieve the data was not credible.
As the court explained, having the Center at least attempt to retrieve the data or confirm that the requested information is nowhere on the Center’s system may have been “plaintiff’s only chance to confirm the identity of the person who allegedly defamed her.”
Ignorance Is Not Bliss.
A common theme can be seen across these and other cases that delve into the issue of unallocated space: That parties (or their counsel) often do not comprehend what unallocated space is and its potential implications for preservation and discovery. As a result, parties who are knowledgeable about this source should consider, based on the facts at issue in each matter, whether there is likely to be relevant and probative information in unallocated space, and if so, how to most effectively preserve it or to seek it from the opposing party in discovery.
On the other hand, parties can place themselves in a more defensible position by instituting procedures, before any obligation to preserve attaches, to routinely clean unallocated space on hard drives.
If a party has no present legal obligation to retain data in its computers’ unallocated space, waiting until such obligation arises may expose that party to uncertain risks, including the risk of inadvertent spoliation and making data discoverable that otherwise would not have been had it been properly and timely dispositioned.
On the flip side, this may make unavailable information that could have been useful evidence to a future litigation.
Whether defending a request for unallocated space data or seeking to access it in discovery, parties must appreciate whether they are defensibly accounting for unallocated space in their preservation plans, in their communications and agreements about discovery with the opposing party and the court, and how their routine business operations may affect this potential source of evidence.
Learn more about Bloomberg Law or Log In to keep reading:
Learn About Bloomberg Law
AI-powered legal analytics, workflow tools and premium legal & business news.
Already a subscriber?
Log in to keep reading or access research tools.