
    Brian DAWE, individually and d/b/a Flat Iron Mountain Association, formerly known as Flat Iron Mountain Associates, a Partnership, Plaintiffs, v. CORRECTIONS USA, a California Corporation; California Correctional Peace Officers Association, a California Corporation; James Baiardi, an individual; Donald Joseph Baumann, an individual, Defendants. and Related Counterclaims.
    No. CIY-S-07-1790 LKK EFB.
    United States District Court, E.D. California.
    Oct. 1, 2009.
    
      Daniel Lawrence Baxter, Wilke Fleury Hoffelt Gould and Birney LLP, Sacramento, CA, Jack D. Edwards, PHV, Luthi and Boyles LLC, Thane, WY, for Plaintiffs/Defendants.
    David P. Mastagni, James B. Carr, Phillip Richard Atillio Mastagni, Mastagni Holstedt Amick Miller & Johnsen, Sacramento, CA, for Defendants.
   ORDER

EDMUND F. BRENNAN, United States Magistrate Judge.

On July 29, 2009, this court heard the respective discovery motions of plaintiffs and defendants. Attorney Daniel Baxter appeared on behalf of plaintiffs; Phillip Mastagni appeared on behalf of defendants. For the reasons set forth herein and on the record, the court enters the following order.

I. Plaintiffs’ Motion to Compel Further Responses to Production Requests, and for Further Document Production

Plaintiffs seek, in pertinent part, further responses and production of documents in response to their Document Requests Nos. 31 and 52, propounded by plaintiff Brian Dawe on November 7, 2007 (Requests for Production of Documents, Set No. One), upon defendant Correction USA (“CUSA”). These requests sought the following:

• No. 31: All documents reflecting communications by any CUSA representative to any other person or entity regarding Brian Dawe, Richard Loud, or Gary Harkins in relation to the claims at issue in this lawsuit.
• No. 52: All documents evidencing any investigation of Brian Dawe, Richard Loud, or Gary Harkins by or at the behest of CUSA or CCPOA.

Defendants served their initial responses on December 20, 2007. On April 23, 2008, pursuant to plaintiffs’ motion to compel, the court issued an order which found these requests relevant to claims and defenses in this action, and directed defendants to respond to them fully. Dckt. No. 106, at 20. On April 28, 2009, pursuant to a subsequent motion filed by plaintiffs, the court directed defendants’ counsel to serve upon plaintiffs’ counsel written certification that defendants had conducted a diligent search and produced all responsive documents within their custody and control. The order further provided that, “[t]his certification shall include, when pertinent, reference to each responsive document, including Bates-stamped page numbers.” Dckt. No. 173, at 2-4.

On May 21, 2009, defendants served an “Amended Certification of Responses to Request for Production of Documents, Set One.” In response to Request Nos. 31 and 52, defendants’ certification broadly referenced every document produced by CUSA, as follows:

The responding party certifies, that after a diligent search, the responding party has produced all documents in the responding party’s possession, control, and/or custody. CUSA000001-CUSA 031456.

Dckt. No. 211 at 5.

Plaintiffs seek an order of this court compelling defendants to particularize this certification. Plaintiffs assert that defendants’ current certification violates this court’s April 28, 2009 order, and “affirmatively stymies Plaintiffs’ efforts to ensure that its discovery efforts have been satisfied.” Dckt. No. 211, at 6. Defendants respond that their certification complies with the court’s order, given the “extreme breadth” of the requests and the fact that all documents produced by CUSA are indeed responsive to the requests as framed. Id. at 16-17.

The court’s April 28, 2009 order was intended to ensure, and to provide assurances to plaintiffs, that defendants had produced all documents responsive to plaintiffs’ requests and, if necessary, to provide a basis for challenging the later introduction of evidence not previously disclosed through the discovery process. The same principles govern plaintiffs’ production of documents to defendants. The court’s additional requirement — that defendants cite to Bates-stamped page numbers “when pertinent” — was intended to reflect the court’s statement at the April 1, 2009 hearing that a clear record would advance the interests of all parties should production later be challenged. See, e.g., Transcript of April 1, 2009 Hearing, Dckt. No. 170, at 8-10.

The court has given due consideration to the parties’ respective positions, as addressed at the hearing on this matter, and finds that defendants’ certification in response to Request Nos. 31 and 52 is adequate. While the certification is broad, so are the requests. The court agrees with defendants that to require greater particularity at this time would reveal defendants’ assessment of the relative importance of the various documents and thus defendants’ litigation strategy, impinging on work product.

Accordingly, plaintiffs’ motion to compel defendants’ further responses and production of documents in response to Plaintiffs’ Requests for Production of Documents, Nos. 31 and 52, is denied.

II. Plaintiffs’ Motion for Court Order to Prevent Spoliation of Evidence

Plaintiffs seek an order of this court requiring defendants to preserve and maintain all recordings and other memorializations of meetings convened by CUSA and CCPOA; requiring defendants to verify that no such items have been or will be destroyed, discarded, or altered during the pendency of this litigation; authorizing plaintiffs’ inspection of audio and other recordings moved on April 21, 2009; and providing a mechanism for seeking sanctions in the event such order is violated. For the following reasons, this motion will be denied.

This motion was precipitated by the following. On April 18, 2009, CCPOA held a State Board meeting at the Red Lion Inn in Bakersfield, California. At that meeting, Donald Baumann, CCPOA Chapter President and State Board Member, made a motion (“resolution”), which passed (but was later amended), that endorsed the destruction of audio recordings of CCPOA meetings after approval of the written minutes. Thereafter, on April 21, 2009, CCPOA Chief Operating Officer (and General Counsel) David Sanders and CCPOA State Secretary Perry Speth moved CCPOA recordings from one warehouse, not controlled by CCPOA, to another warehouse that is controlled by CCPOA. The move was witnessed and assisted by Steve Fournier, a CCPOA member who was present at the April 18 meeting, and who managed storage at the first warehouse. Fournier states that he thereafter attended a meeting on April 25, 2009, of retired correctional officers in Sacramento, where he was told by a third party that Sanders and Speth had stated they were directed to destroy the recordings. See Fournier Decl, ¶¶ 4-9. This hearsay led to plaintiffs’ concern that defendants had destroyed, or intended to destroy, evidence relevant to this litigation.

Defendants have responded, with several supporting declarations, stating that the primary purpose of the April 21, 2009 motion was to protect union members from disclosure of private grievances, and was prospective only. Sanders Deck, ¶¶ 10-11; Baumann Deck, ¶ 15. Moreover, in response to the instant motion, CCPOA passed an amended resolution on July 13, 2009, at CCPOA’s next regularly scheduled meeting, that expressly requires CCPOA to secure and maintain the recordings of all its Board meetings, and to release no recordings unless directed to do so by court order or a 3/4 majority vote of the Board. Sanders Deck, ¶ 39 and Ex. “E” thereto. In addition, defendants state that the recordings were moved for the purpose of bringing all recordings within CCPOA’s control in order to conduct required discovery. Pursuant to the declarations of Sanders and CCPOA employee Steven Barefoot, defendants state that they spent over 90 hours listening to every recording, which date from the 1980s, in order to respond fully and accurately to all of plaintiffs’ discovery requests, thus providing all references to CUSA, Dawe, Harkins, and Loud. Defendants represent that no recordings have been destroyed, and all will remain secure pending resolution of this litigation.

At the hearing on this motion, the parties addressed the impact of CCPOA’s new resolution requiring a court order for further disclosure of responsive material. While plaintiffs contend, appropriately, that they should not be required to obtain a court order to obtain responsive, relevant discovery, defendants maintain that all nonprivileged responsive information has already been disclosed. Defendants seek to avoid again going through every recording since the 1980s, most of which are “totally irrelevant, [] involve privacy of third parties, [] union grievances, [and][ ] privileges of litigation, and they have nothing to do with this case.” Transcript of July 29, 2009 Hearing (hereafter, “Transcript”), Dckt. No. 224, at 26. As this matter is not squarely presented to the court as a discovery dispute, the court does not reach it. As the court stated at the hearing on this matter:

I’m simply going to direct you-both of you to comply with the Federal Rules of Civil Procedure as to preservation of evidence as well as discovery. If there’s an appropriate discovery request that’s submitted or has been submitted for the recordings, then you’ll need to respond to that request.
And if there is a proper basis for a privilege, you’ll have to prepare a privilege log and be prepared to defend the assertion of the privilege.

Transcript, at 25.

Rather, as the court found at the hearing on this matter, passage of CCPOA’s amended resolution, coupled with defendants’ representation that no information has been destroyed, or will be destroyed during the pendency of this litigation, renders moot plaintiffs spoliation concerns. Accordingly, plaintiffs’ motion for a court order to prevent spoliation of evidence is denied.

III. Defendants’ Motion to Compel Further Responses to Production Requests and for Further Document Production

A. Brian Dawe

Defendants challenge plaintiff Dawe’s responses to CUSA’s Requests for Production, Sets One and Two. Dawe provided responses to Set One on July 28, 2008, and to Set Two on February 25, 2009; Dawe then provided supplemental responses and production on June 12, 2009, including tax filings and other financial documents previously withheld on privacy grounds. Defendants challenge Dawe’s objections based on irrelevance and privilege, without providing a privilege log; and Dawe’s failure to disclose responsive information from other organizations with which Dawe is affiliated' — specifically, American Correctional Officer (“ACO”), which is a d/b/a of Dawe’s, and American Correctional Officer Intelligence Network (“ACOIN”), for which, plaintiffs’ counsel surmises, Dawe may be the executive director pursuant to an independent contract. Defendants assert that these organizations have responsive information, as demonstrated by CUSA’s own production, in response to Dawe’s discovery requests, of Dawe’s e-mails to ACO and ACOIN.

Plaintiffs contest each of these challenges, relying on the parties’ agreement that no privilege log would be required for documents withheld on the basis of attorney-client privilege or work product doctrine; and asserting that none of the disputed discovery requests seek information relative to ACO or ACOIN.

For the reasons stated on the record, the court granted defendants’ motion in part, and directed the parties as follows:

1. Notwithstanding the parties’ agreement to the contrary, from the date of the hearing forward, any document withheld from discovery based on a claim of privilege, including attorney-client privilege or work product doctrine, shall be specifically identified in a privilege log that clearly sets forth the asserted basis for withholding the document.

2. Defendants shall propound additional interrogatories and requests for production that are precisely drafted to obtain all relevant information concerning ACO and ACOIN (e.g., including but not limited to their origin, purpose, structure and membership), as well as their relationships and operating agreements with one another, Dawe, and/or Flat Iron Mountain Associates LLC.

3. Dawe shall, within 20 days after service of these further discovery requests, respond fully to the requests, and certify that he has produced, pursuant to a reasonable and diligent search, all responsive documents within his possession, custody or control.

B. GARYHARKINS

I. Requests for Production, Including Laptop Inspection

Defendants seek further responses and production from Gary Harkin, including inspection of the laptop computer currently in his possession. Harkin is a defendant (former “officer, director and/or agent” of CUSA) and third-party plaintiff, alleging counterclaims against CUSA and Baiardi. See Dckt. No. 204-3, at 76-81.

While the ownership of the computer is not presently at issue before this court, plaintiffs explain that “Mr. Harkins initially purchased the computer in December of 2005 on his own dime, and Defendant CUSA subsequently reimbursed him (in April 2006) for the acquisition since Mr. Harkins occasionally used the computer in connection with his work on behalf of CUSA (specifically, Mr. Harkins used the computer in part for CUSA business from April 2006 to September 11, 2006). After Mr. Harkins discontinued performing work for CUSA, he reimbursed CUSA for the full initial payment amount. [ ]” Jt. Stmt., Dckt. No. 203, at 23.

Defendants seek to inspect the computer and its contents pursuant their Request for Production, Set Three, served upon Gary Harkins. At issue are Request Nos. 130-136, to which Harkins objected. Defendants maintain that the computer contains information relevant to this litigation, despite Harkins’ declaration that he has produced all responsive, nonprivileged, information. However, it is defendants’ (CUSA’s) position that information remains on the computer relative to Harkins’ alleged surreptitious trademarking of the CUSA name and logo, and relative to an alleged conspiracy, dominated by plaintiff Dawe, his wife, and Flat Iron, to take over CUSA and convert it from a nonprofit, to a for-profit, entity. See, e.g., Carr Deck, Dckt. No. 204, and attached exhibits.

Plaintiffs respond asserting that “[t]he vast majority of any data on the computer has no relation to Defendants or this litigation, and production of the computer would result in a significant disclosure of personal information of Mr. Harkins and his family.” Moreover, plaintiffs assert that Mr. Harkins has produced all responsive documents except “(a) the documents listed in Mr. Harkins’ privilege log [addressed infra]; (b) the documents containing attorney-client communications and attorney work product [addressed supra regarding necessity of providing a privilege log for documents withheld after the July 29, 2009 hearing]; and (c) documents responsive to the categories for which Mr. Harkins specifically responded that he would not produce responsive documents [addressed presently].” Jt. Stmt., Dckt. No. 203, at 23-24; Harkins Deck, at 2.

For the reasons stated at the hearing, and set forth more fully herein, the court grants defendants’ motion to compel inspection of the computer and its electronically stored information (“ESI”), including metadata, subject to defendants bearing the initial costs associated with retaining a forensic computer expert, and subject to plaintiffs’ threshold review of the information and data in order to identify privileged information and prepare a privilege log. However, if the inspection demonstrates that relevant, non-privileged information has been improperly withheld, defendants may move the court for an order shifting some or all of the costs of inspection to plaintiffs.

The court is persuaded that relevant information, not previously disclosed, may be obtained pursuant to inspection of the computer, including but not limited to documents and communications contained therein. See Fed.R.Civ.P. 26(b)(1) (“[p]arties may obtain discovery regarding any nonprivileged matter that is relevant to any party’s claim or defense”), Fed.R.Civ.P. 34(a)(1)(A), (b)(2)(E) (discoverable information includes electronically stored information). Most persuasive is the level of contention and distrust that permeates this litigation, and Harkins’ adamant refusal to permit even a limited inspection of the computer. Also persuasive is defendants’ representation that plaintiff Loud’s computer had been “forensically cleaned” prior to defendants’ inspection. Transcript, at 59. Inspection intended to reveal the computer’s metadata is particularly important here, as it will likely include information that may demonstrate whether there has been any transfer or deletion of information, or other efforts to minimize, hinder or prevent access to information; and should provide a record of all sites that have been accessed.

As with other forms of discovery, the inspection and production of electronically stored information remains subject to considerations of burden, expense, and intrusiveness. See Fed.R.Civ.P. 26(b)(2), 26(c). Balancing these factors, the court concludes that defendants should initially bear the costs of inspection and retaining the forensic computer expert. However, this allocation should be subject to a motion by defendants to shift some or all of these expenses in the event the inspection demonstrates that relevant, non-privileged, information has been unreasonably withheld. The balancing of the parties’ respective interests also requires that plaintiffs be accorded, in the first instance, the opportunity to review the expert’s data in order to identify any privileged information and to prepare a privilege log specifying what information plaintiffs seek to withhold, and on what basis. The expert shall verify by separate affidavit that plaintiffs’ privilege log accurately identifies the information sought to be withheld. The expert shall then disclose to defendants all remaining information.

The parties shall agree upon the date, time, and place of inspection, and are free to prepare, and stipulate to, a protective order pursuant to which the expert’s search will be conducted and the resulting information shared among the parties, including deadlines. Following inspection of the subject computer, Mr. Harkin shall, contemporaneously with serving his privilege log relative to the inspection, serve upon defendants his further supplemental responses and any related production responsive to defendants’ Request for Production, Set Three, Request Nos. 130-136.

2. Harkins’ Privilege Log

Defendants challenge the following privilege log provided by Mr. Harkins which, as amended, provides in full:

DATE DESCRIPTION_AUTHOR PRIVILEGES

8/21/06 Email exchange between Gary Harkins and Gary Harkins/ Attorney-client attorney Barry Peek, with prior email exchange Richard Loud Privilege between Mr. Harkins and Richard Loud (cc to Mr. Peek) re issues to address with corporate and employment attorneys and advice provided by California corporate attorney re. removal and _replacement of Board of Directors’ members._

9/26/06 Email to Richard Loud and Brian Dawe re infor- Gary Harkins Attorney-client mation provided by attorney related to potential Privilege claims by and against CUSA and representatives _thereof_

See Carr Deck, Ex. D, Dckt. No. 204-4, at 3; and August 19, 2009 letter to the court from plaintiffs’ counsel.

Defendants contend that attorney-client privilege does not protect communications between parties, even if an attorney is “copied,” and even if the communications include legal advice; they argue that the disclosure constitutes a waiver of any privilege that may originally have existed between attorney and client. Plaintiffs respond that these documents are privileged because they transmit information provided by attorneys who have been jointly consulted regarding possible litigation by and against CUSA.

The court has reviewed each of these documents in camera. California privilege law guides the court’s analysis in this diversity litigation. See, e.g., First Pacific Networks, Inc. v. Atlantic Mutual Ins. Co., 163 F.R.D. 576, 576 (N.D.Cal.1995). Privileges under California law are narrowly construed because they prevent the admission of relevant and otherwise admissible evidence. People v. Sinohui, 28 Cal.4th 205, 212, 120 Cal.Rptr.2d 783, 47 P.3d 629 (2002). Communications between a lawyer and client which are intended to be confidential are protected from disclosure pursuant to the attorney-client privilege.

The first privilege log entry is a four-message e-mail string that is fairly described by the privilege log. The initial (earliest in time/last in string) message, from Loud to Harkins, sets forth several questions to be asked, respectively, of a “corporate attorney” and an “employment attorney.” The message is a communication between parties, does not contain legal advice, and is not subject to attorney-client privilege.

The second message, from Harkins to Loud, with a “cc” to Barry Peek (described to the court as “another lawyer in this case,”) Transcript, at 62, recounts Harkins’ discussion “with Mr. May, a ca corporate attorney,” and the legal advice conveyed therein. This, again, is a communication among parties. While the subject information was clearly protected when conveyed by “Mr. May” to Harkins, Harkin’s communication (in which he transmits that information) to third parties Dawe and Loud, notwithstanding that the information was simultaneously “cc’d” to attorney Peek, has not been shown to be a privileged communication. See, e.g., United States v. ChevronTexaco Corp., 241 F.Supp.2d 1065, 1075 (N.D.Cal.2002) (“[t]he mere fact that outside counsel was copied with the e-mail will not shield communications not made for the purpose of securing legal advice”).

The court need not, however, reach these issues since the initial messages in the e-mail string were, essentially, “attachments” to the final message between client and attorney. The third message is a single question posed by Peek to Harkins, concerning the advice given by Mr. May, while the fourth and last (most recent in time/first in string) e-mail message is Harkins’ response to Peek, responding to the question. These last two messages are clearly protected by attorney-client privilege, and while the application of privileges to email communications remains an evolving area of the law, it appears that the current weight of authority favors examination of the most recent communication as the means for characterizing the entire e-mail string.

As the court found in United States v. ChevronTexaco Corp., 241 F.Supp.2d at 1075, n. 6: “Each e-mail /communication consists of the text of the sender’s message as well as all of the prior e-mails that are attached to it. Therefore, [ ] assertion that each separate email stands as an independent communication is inaccurate. What is communicated with each e-mail is the text of the e-mail and all the e-mails forwarded along with it. [However,] [i]f an e-mail with otherwise privileged attachments is sent to a third party, ... the privilege [is lost] with respect to that e-mail and all of the attached e-mails.” See also Muro v. Target Corp., 250 F.R.D. 350, 363 (N.D.Ill.2007) (citing ChevronTexaco, and finding that Fed.R.Civ.P. Rule 26(b)(5)(A) does not require separate itemization of emails in a privilege log. The court reasoned: “As Upjohn Co. v. United States makes clear, the fact that non-privileged information was communicated to an attorney may be privileged, even if the underlying information remains unprotected. 449 U.S. 383, 395-96, 101 S.Ct. 677, 66 L.Ed.2d 584[ ](1981)). As applied in the e-mail discovery context, the court understands Upjohn to mean that even though one e-mail is not privileged, a second e-mail which forwards that prior e-mail to counsel might be privileged in its entirety. In this respect, the forwarded material is similar to prior conversations or documents that are quoted verbatim in a letter to a party’s attorney.” Id. (fn. omitted).

Pursuant to these authorities, the court concludes that the first entry in Harkin’s privilege log is indeed privileged and should remain confidential.

The second entry, also fairly described by the privilege log, is a single e-mail message from Gary Harkins, to Brian Dawe and Richard Loud, repeating legal advice Harkins received from his attorney. The legal information is specific to Harkins, even to the possible detriment of Dawe and Loud. While the information contained therein was clearly protected by the attorney-client privilege when transmitted from Harkins’ attorney to Harkins, the essential question is whether Harkins waived the privilege by transmitting it to third parties Dawe and Loud.

Plaintiffs argue that a “joint defense” privilege should apply, but fail to cite any authority, do not identify the lawyer(s) consulted, nor demonstrate the absence of adverse interests among these parties sharing the information in this complex litigation. However, “[t]here is no statute providing for a common interest privilege in California. To the extent there exists a common interest doctrine in this state, it is based generally upon waiver analysis or specifically upon interpretation of the provisions of sections 952 [defining confidential communication between client and lawyer] and 912, subdivision (d) [privilege not waived if disclosure is reasonably necessary to accomplish the purpose for which the lawyer was consulted]. California Evidence Code section 962 recognizes that a “joint client” privilege may apply to “two or more clients have retained or consulted a lawyer upon a matter of common interest,” but the statute is intended to emphasize that no such client “nor the successor in interest of any of them, may claim a privilege under this article as to a communication made in the course of that relationship when such communication is offered in a civil proceeding between one of such clients (or his successor in interest) and another of such clients (or his successor in interest).” Cal. Evid.Code § 962. Thus, parties may share privileged information when it furthers the attorney-client relationship. But sharing the information destroys the privilege where the parties simply have “overlapping interests.” Roush v. Seagate Technology, LLC, 150 Cal.App.4th 210, 223-224, 58 Cal.Rptr.3d 275 (6th Dist.2007) (citations omitted). “An expectation of confidentiality ... is not enough to avoid waiver.” OXY Resources California LLC v. Superior Court, 115 Cal.App.4th 874, 889, 891, 9 Cal.Rptr.3d 621 (1st Dist.2004) (emphasis added).

The “common interest privilege” was addressed by Magistrate Judge Hollows in De-Fazio v. Hollister, Inc., 2008 WL 4952481, *1-2 (E.D.Cal.2008), which is instructive here.

Plaintiff has provided citations to a number of cases to support his argument for protection of communications between co-plaintiffs in this case. Most of the cited cases involve situations where the attorneys were present during the allegedly protected communications. See United States v. Bergonzi, 216 F.R.D. 487, 496 (N.D.Cal.2003) (acknowledging that attorneys and clients working together can exchange information among themselves without waiving the privilege); Imperial Corporation of America v. Shields, 179 F.R.D. 286, 288 (S.D.Cal.1998) (noting communications at issue were between attorneys and creditors’ committee); Avocent Redmond Corp. v. Rose Electronics, Inc., 516 F.Supp.2d 1199, 1202 (W.D.Wash. 2007) (involving protection of communications between attorneys and another party); In re Mortgage & Realty Trust, 212 B.R. 649, 651 (Bankr.C.D.Cal.1997) (communication at issue was between individual and attorneys); Berger v. Seyfarth Shaw, 2008 WL 4681834, *1 (N.D.Cal.2008) (meeting at issue between third party, defendants and attorneys). But see Hewlett-Packard Co. v. Bausch & Lomb Inc., 115 F.R.D. 308 (N.D.Cal.1987) (finding common interest protection without discussing whether attorney present at communications); Nidec v. Victor Company of Japan, 249 F.R.D. 575 (N.D.Cal.2007) (not clear if attorney present but failing to find common interest protection, and noting other courts’ disagreement with HewletWPackard to extent that it protected commercial interest rather than legal advantage).
Based on these aforementioned cases, the court finds that the common interest privilege does not extend to communications between co-plaintiffs where counsel is not present, or at the very least, where the specific conversations of the co-parties at issue was not expressly directed by counsel.

DeFazio v. Hollister, Inc., *1-2 (emphasis added).

For these same reasons, Harkins waived the confidentiality of the information he obtained from his attorney when he then conveyed that information to Dawe and Loud. The court concludes, therefore, that the second entry in Harkins’ privilege log is not privileged. Plaintiffs shall provide a copy of this e-mail to defendants within five days after this order is filed.

C. Richard Loud

For the reasons stated on the record, plaintiffs were directed to produce, within two weeks from the date of the hearing (or by August 12, 2009) all nonprivileged documents responsive to defendants’ discovery requests served upon Mr. Loud. As to the documents withheld, plaintiffs are required to provide a privilege log consistent with the instructions provided in this order.

IV. Parties’ Respective Motions for Sanctions

The parties’ respective requests for monetary sanctions are denied. As the undersigned stated at the hearing:

[N]ow as to sanctions, it brings me back to where I started this hearing this morning. It’s — the level of animosity in this ease is truly dismaying. If I were to start imposing sanctions on these motions, everybody would end up being sanctioned.... I think the appropriate sanction here is for each of you to have to go explain to your clients why they’re being billed for all of this time in a discovery war rather than litigating this case. So all requests for sanctions are denied.

Transcript, at 65.

CONCLUSION

For the foregoing reasons, and pursuant to the terms set forth above, the parties’ respective motions for discovery and sanctions, consolidated in the amended motion at Docket No. 200, are granted in part and denied in part.

SO ORDERED. 
      
      . See Original Notices of Motions, Dckt. Nos. 172 and 181, consolidated and rescheduled several times, ultimately by a single amended motion, Dckt. No. 200; see also Jt. Stmts., Dckt. Nos. 203, 211.
     
      
      . For present purposes, the court does not further designate the parties based on their cross- and counterpleadings.
     
      
      . For example, the court stated: "[L]aw firms have different ways of doing this. I[had] assumed that you took all of the documents that you’ve gone through and that you have organized them in some way and Bates stamped them so that you have records of what it is that you've made available.... I’ll leave it to you to figure out how you’ll preserve your records and organize your records in a way where you can show later that you’ve produced what you say you produced.” Transcript (Apr. 1, 2009), Dckt. No. 170, at 8, 10.
     
      
      . Plaintiffs’ counsel explained at the hearing:
      Flat Iron used to be a partnership. It is now a Wyoming LLC. The principal of it is essentially Brian Dawe. ACOIN is a d/b/a/ of Flat Iron. So essentially ACOIN and Flat Iron can be viewed as one in the same. We-I do represent Flat Iron and therefore I do represent ACOIN. ACO is a separate entity. ACO, I believe, is a New York nonprofit organization. It is not something that is run by Mr. Dawe. I believe he holds a position with ACO, but it is not his organization in the same vein as ACOIN. And again, I don’t represent ACO.... [D]on't quote me on this, but I think he's executive director in some capacity of ACO.... [H]e is not the keeper of the documents. It’s not his organization. He — I believe he has an independent contractor relationship so his position, which again I think is executive director, is pursuant to an independent contract.
      Transcript, at 41-42.
     
      
      . The court will duly consider the reasonable request of any party for leave to serve additional interrogatories beyond the 25 authorized by Fed. R.Civ.P. 33(a)(1).
     
      
      . Defendants’Request No. 130 provides: "Please produce for forensic inspection and examination the Laptop Computer described above, referenced and identified in your letter of September II, 2006, which is attached thereto as Attachment A.”
      Defendants’ Request No. 131 seeks "in a reasonably usable electronic format ... all electronically stored information with metadata intact contained on the laptop computer
      Defendants’ Request No. 132 seeks "any and all documents that evidence, reflect, reference and/or relate to said laptop computer...."
      Defendants’ Request No. 133 seeks "any and all documents that evidence, reflect, reference and/or relate to your personal ownership of said laptop computer, which is described, referenced and identified in your letter of September 11, 2006...."
      Defendants’ Request No. 134 seeks "any and all documents that evidence, reflect, reference and/or relate and/or identify to the purchase of said laptop computer....”
      Defendants' Request No. 135 seeks "any and all documents that evidence, reflect, reference and/or relate and/or identify [] the purchase of any and all upgrades for said laptop computer. ..."
      Defendants’ Request No. 136 seeks "any and all documents that evidence, reflect, reference and/or relate and/or identify [] the reimbursements that you claim you received from CUSA related to said laptop computer....”
     
      
      . Harkins’ responses to the disputed requests include his statement that he would not produce the computer because the request is overbroad, unduly burdensome, oppressive, harassing, irrelevant, etc. (Response to Request No. 130), and based on his own privacy rights and the privacy rights of third parties (Response to Request No. 131); that Harkins would not disclose any related documents because they are in the possession of CUSA (Response to Request Nos. 131-136), and because "subject to privilege ... including but not limited to attorney-client privilege and work product doctrine” (Response to Request Nos. 133-136), but that Harkin would nonetheless "comply with the unobjectionable portion of this request to the extent that responding party is in possession, custody, and control of non-privileged responsive documents” (Response to Request Nos. 133-136).
     
      
      . Fed.R.Civ.P. 26(b)(1) provides in full: “Unless otherwise limited by court order, the scope of discovery is as follows: Parties may obtain discovery regarding any nonprivileged matter that is relevant to any party's claim or defense— including the existence, description, nature, custody, condition, and location of any documents or other tangible things and the identity and location of persons who know of any discoverable matter. For good cause, the court may order discovery of any matter relevant to the subject matter involved in the action. Relevant information need not be admissible at the trial if the discovery appears reasonably calculated to lead to the discovery of admissible evidence. All discovery is subject to the limitations imposed by Rule 26(b)(2)(C)."
     
      
      . “Rule 34(a)(1) is expansive and includes any type of information that is stored electronically.” Advisory Notes to 2006 Amendments, Rule 34. "Rule 34 applies to information that is fixed in a tangible form and to information that is stored in a medium from which it can be retrieved and examined.” Id.
      
     
      
      . The description of the first matter reflects the amended version submitted to the court by plaintiffs’ counsel on August 19, 2009; the letter accompanying the amendment states that a copy of the revised privilege log was served on opposing counsel. As previously worded, the description provided:
      Email exchange between Gary Hawkins and Richard Loud (cc to attorney Barry Peck) re issues to address with corporate and employment attorneys and advice provided by California corporate attorney re removal and replacement of Board of Directors’ members.
     
      
      . Federal courts sitting in diversity look to the law of the forum state in making a choice of law determination, Klaxon Co. v. Stentor Electric Manufacturing Co., 313 U.S. 487, 496, 61 S.Ct. 1020, 85 L.Ed. 1477 (1941); Theme Promotions, Inc. v. News America Marketing FSI, 546 F.3d 991, 1007 (9th Cir.2008), including privileges for which state law supplies an element of a claim or defense, Fed.R.Evid. 501; In re Geothermal Resources Intern., Inc., 93 F.3d 648, 653, n. 4 (9th Cir.1996).
     
      
      . Cal. Evid.Code § 954 provides in pertinent part: "Subject to Section 912 (waiver of privilege) ... the client, whether or not a party, has a privilege to refuse to disclose, and to prevent another from disclosing, a confidential communication between client and lawyer....”
      Cal. Evid.Code § 952 defines "confidential communication between client and lawyer” as "information transmitted between a client and his or her lawyer in the course of that relationship and in confidence by a means which, so far as the client is aware, discloses the information to no third persons other than those who are present to further the interest of the client in the consultation or those to whom disclosure is reasonably necessary for the transmission of the information or the accomplishment of the purpose for which the lawyer is consulted, and in-eludes a legal opinion formed and the advice given by the lawyer in the course of that relationship.”
      Cal. Evid.Code § 912 provides that the right to claim a privilege is waived "with respect to a communication protected by the privilege if any holder of the privilege, without coercion, has disclosed a significant part of the communication or has consented to disclosure made by anyone.”
     