BAILII is celebrating 24 years of free online access to the law! Would you consider making a contribution?

No donation is too small. If every visitor before 31 December gives just £5, it will have a significant impact on BAILII's ability to continue providing free access to the law.
Thank you very much for your support!



BAILII [Home] [Databases] [World Law] [Multidatabase Search] [Help] [Feedback]

England and Wales High Court (Chancery Division) Decisions


You are here: BAILII >> Databases >> England and Wales High Court (Chancery Division) Decisions >> Digicel (St. Lucia) Ltd & Ors v Cable & Wireless Plc & Ors [2008] EWHC 2522 (Ch) (23 October 2008)
URL: http://www.bailii.org/ew/cases/EWHC/Ch/2008/2522.html
Cite as: [2009] 2 All ER 1094, [2008] EWHC 2522 (Ch)

[New search] [Help]


Neutral Citation Number: [2008] EWHC 2522 (Ch)
Case No: HC07C01917

IN THE HIGH COURT OF JUSTICE
CHANCERY DIVISION

Royal Courts of Justice
Strand. London. WC2A 2LL
23/10/2008

B e f o r e :

MR JUSTICE MORGAN
____________________

Between:
1) DIGICEL (ST. LUCIA) LIMITED (A company registered under the laws of St Lucia)
2) DIGICEL (SVG) LIMITED (A company registered under the laws of St Vincent & the Grenadines)
3) DIGICEL GRENADA LIMITED (A company registered under the laws of Grenada)
4) DIGICEL (BARBADOS) LIMITED (A company registered under the law of Barbados)
5) DIGICEL CAYMAN LIMITED (A company registered under the law of the Cayman Islands)
6) DIGICEL (TRINIDAD & TOBAGO) LIMITED (A company registered under the laws of Trinidad & Tobago)
7) DIGICEL (TURKS & CAICOS) (A company registered under the laws of Turks & Caicos)
8) DIGICEL LIMITED (A company registered under the laws of Bermuda)













Claimants
- and -

1) CABLE & WIRELESS PLC
2) CABLE & WIRELESS (WEST INDIES) LIMITED
3) CABLE & WIRELESS GRENADA LIMITED (A company registered under the laws of Grenada)
4) CABLE & WIRELESS (BARBADOS) LIMITED (A company registered under the law of Barbados)
5) CABLE & WIRELESS (CAYMAN ISLANDS) LIMITED (A company registered under the law of the Cayman Islands)
6) TELECOMMUNICATIONS SERVICE OF TRINIDAD & TOBAGO LIMITED (A company registered under the laws of Trinidad & Tobago)








Defendants

____________________

Huw Davies QC & Stephen Houseman (instructed by Jones Day) for the Claimants
Edmund Nourse & Conall Patton (instructed by Slaughter & May) for the Defendants

Hearing dates: 16th, 17th and 18th September 2008

____________________

HTML VERSION OF JUDGMENT
____________________

Crown Copyright ©

    Mr Justice Morgan:

    [HEADING] Paragraph
    INTRODUCTION 1
    THE CLAIM 3
    THE HISTORY OF THE DISCLOSURE GIVEN 17
    THE RELEVANT RULES AND THE PRACTICE DIRECTION 28
    THE CRESSWELL REPORT 37
    DISCUSSION 44
    BACK-UP TAPES 54
    ORDER IN RELATION TO BACK-UP TAPES 70
    KEY WORD SEARCHES 72
    ORDER IN RELATION TO KEY WORD SEARCHES 92
    SPLIT TRIAL 97
    DISCLOSURE IN RELATION TO QUANTUM 107

    INTRODUCTION

  1. This judgment concerns an application by the Claimants pursuant to CPR Rule 31.12 for an order that the Defendants give specific disclosure of certain classes of documents. There are three parts to the Claimants' application as originally drafted. The first two parts of the application concern electronic documents. In the first part of their application, the Claimants seek an order that the Defendants restore relevant back-up tapes for the purpose of searching for the e-mail accounts of certain former employees; this has been described as "the application for restoration of the back-up tapes". The second part of the Claimants' application relates to all of the electronic documents already identified by the Defendants together with the further electronic documents that may be identified in accordance with the first part of the Claimants' application. In relation to all such electronic documents, the Claimants seek an order that the Defendants carry out a further search across those documents by reference to a set of additional key words/phrases as identified by the Claimants. This has been described as "the application for additional search terms". The third part of the Claimants' application concerns documents containing financial and operational data falling within specified categories. This application has been referred to as "the application relating to quantum".
  2. At the hearing of this application, I raised the question with the parties whether it was appropriate to order that there be a split trial in this action with a view to issues as to quantum being tried only after issues as to liability and causation had been tried. When the point was raised, the Claimants supported the suggestion of a split trial and the Defendants opposed that suggestion. In the event, in the course of the hearing, I announced my decision that I would order a split trial. The parties agreed that in that event, the third part of the application which related to documents dealing with matters of quantum no longer needed to be considered. Accordingly, the issues arising in relation to the third part of the application were not the subject of argument and are not further discussed in this judgment. I will, however, give my reasons for the decision I announced in the course of the hearing that it is appropriate in this case to order a split trial.
  3. THE CLAIM

  4. It is necessary to attempt a brief summary of the nature of the claim the subject of this action. A brief summary will necessarily not do justice to the many issues of fact and of law which may arise at the trial of this action. The pleadings are voluminous. The Amended Particulars of Claim run to more than 320 pages. The Claimants' Responses to Requests for Information run to more than 490 pages. The Amended Defence extends to more than 830 pages and that is supplemented by more than 50 pages which comprise the Defendants' Response to a Request for Further Information.
  5. The Claimants are mobile phone companies operating in 7 jurisdictions in the Caribbean, as follows:
  6. ) St Lucia,
  7. ) St Vincent and the Grenadines ("SVG"),
  8. ) Grenada,
  9. ) Barbados,
  10. ) The Cayman Islands,
  11. ) Trinidad and Tobago ("T & T"), and
  12. ) The Turks and Caicos Islands ("TCI").
  13. The relevant Defendant was, in each of the above jurisdictions, the incumbent telephone operator, operating telecommunication services, including both fixed line (or land line) and mobile networks, under exclusive licences. Apart from the Sixth Defendant, Telecommunication Services of Trinidad & Tobago Limited ("TSTT"), all of the Defendants are part of the Cable and Wireless Group headed by the First Defendant, Cable & Wireless Pic. Cable & Wireless Plc did not operate in any of the relevant jurisdictions and is based in London.
  14. The relevant period for the purposes of the action is the period from 2001/2002 to 2006. In that period, the telecommunications markets in each of the jurisdictions were liberalised. The relevant Defendant companies, by agreement with the relevant Governments, surrendered their exclusive licences to operate both fixed and mobile telecommunications networks in order to permit competition for the provision of such services. In each of the jurisdictions, the relevant Claimant sought to set up a mobile phone business and applied for a licence from the relevant Government and, in due course, the relevant Claimant obtained a licence.
  15. In order to enable the relevant Claimant to provide a mobile phone service, the relevant Claimant needed to "interconnect" with the network of the relevant Defendant in each jurisdiction. "Interconnection" is the process by which one telecommunications network is connected to another, enabling customers of each network to call customers of the other network. Interconnection has two relevant aspects. The first is contractual interconnection and the second is physical interconnection. Contractual interconnection is the process of negotiating the terms and conditions of interconnection, including the terms as to charges. Physical interconnection is the engineering process of joining two networks and is carried out on the basis of the terms agreed in an interconnection agreement. The Claimants say that physical interconnection can occur before the formal agreement is entered into.
  16. Speaking broadly, the legislation in each of the jurisdictions required the relevant Defendant as operator to grant interconnection to the relevant Claimant or, at any rate, to grant interconnection once the relevant Claimant had obtained a telecommunications licence. For example, in St Lucia, Section 46 of the relevant Telecommunications Act provided that:
  17. "A telecommunications provider who operates a public telecommunications network shall not refuse, obstruct, or in anyway impede another telecommunications provider from making an interconnection with his or her telecommunications network".

    The phrase "telecommunications provider" is defined in Section 4 of the same Act as referring to a person who is licensed under the Act to operate a telecommunications network or to provide telecommunication services. The legislation varies somewhat in the different jurisdictions although it is almost identical in St Lucia, SVG, Grenada and the Cayman Islands.

  18. The basic allegation which the Claimants make against the Defendants is that in each jurisdiction, the relevant Defendant deliberately delayed interconnection with its network by the relevant Claimant. The Claimants say that such delay was a breach of statutory duty and that the Claimants are entitled to claim damages for breach of such statutory duty. The Claimants build on this basic allegation by alleging that the various breaches of statutory duty were pursuant to an overall conspiracy directed by Cable & Wireless Plc and Cable & Wireless (West Indies) Limited ("CWWI"), the Second Defendant, in London. The Claimants allege a conspiracy to injure by unlawful means and the unlawful means are said to be the breaches of statutory duty. Further, the Claimants allege that Cable & Wireless Plc and CWWI are joint tortfeasors with the relevant Defendant in each jurisdiction.
  19. The Claimants have pleaded that the matters they complain of have caused them considerable loss and damage. The Amended Particulars of Claim refer to lost revenue, lost profits and lost market share in each of the relevant territories as a result of the delayed launch of the relevant Claimant's mobile network in that territory. The Claimants claim damages under various heads. First, they seek damages by way of compensation for the losses they have identified. Secondly, the Claimants seek damages on what they call "a restitutionary basis" which they explain as a basis which represents the financial gains made and/or the benefits obtained directly or indirectly by the Defendants as a result of the Defendant's unlawful conduct. This basis of claim is pursued insofar as the relevant gain or benefit on the part of the relevant Defendant exceeds the relevant Claimant's own loss recoverable under compensatory principles or insofar as the relevant Claimant is unable to establish the precise measure of its recoverable loss under compensatory principles. The claim is that the relevant Defendant should pay over the entirety of the relevant gain or benefit, rather than simply a proportion of it. In relation to this second claim for damages on a restitutionary basis, the Claimants seek an order for accounts and inquiries of all relevant gains and benefits and the Amended Particulars of Claim indicate that the Claimants will seek directions for such accounts and inquiries at the trial. In addition to a claim to damages on a compensatory basis, alternatively a restitutionary basis, the Claimants also seek exemplary damages on the basis that the Defendants deliberately and cynically calculated that they would probably stand to gain from their unlawful activities to a greater extent than the Claimants would suffer loss or be able to recover loss under compensatory principles, by reason of such wrongdoing.
  20. The Defendants have pleaded at considerable length a range of defences to these claims. Liability is denied on the facts and as a matter of law. It is also denied that any wrongdoing on the part of the Defendants (which is denied) caused the Claimants any loss and it is denied that the Claimants are entitled to recover anything in this action.
  21. The Defendants applied for an order that there be a trial of identified preliminary issues. Amongst the suggested preliminary issues was a question as to whether the alleged breaches of statutory duty were actionable by way of a private law claim for damages. Another suggested issue was whether the alleged breaches of statutory duty and certain other alleged breaches constituted unlawful means for the purpose of the conspiracy claim. The Defendants' application for an order that there be preliminary issues came before Mr Justice Lindsay who gave judgment on the 6th February 2008, dismissing the application. The Defendants' application provoked a cross-application from the Claimants seeking an order for a split trial. Mr Justice Lindsay did not make an order for a split trial and later in this judgment, I will return to the circumstances in which the Court did not make that order on 6th February 2008.
  22. At the hearing of these applications for specific disclosure, the Defendants submitted to me that I should approach the application on the basis that the Claimants' allegations were without any substantial or proper foundation. The Defendants submitted that the Amended Particulars of Claim were "manifestly inadequate" as a matter of pleading and, in particular, the allegations of conspiracy were "seriously deficient" as a matter of pleading. The Defendants sought to persuade me that, not only were the pleadings inadequate, the Claimants' prospects of success were poor. The Defendants submitted that this should influence me in disposing of these applications for disclosure. In particular, it was submitted that I should regard the applications for disclosure as "mere fishing", that is, an attempt by the Claimants with no proper basis for their allegations and no ability to particularise their allegations to search for documents in case "something might turn up".
  23. The Claimants responded to these submissions by exhibiting a number of documents which they had so far obtained from the Defendants by way of disclosure and pointing to statements and comments in those documents as supporting the Claimants' case that there was not only deliberate unlawful delay in the interconnection process but also that such delay was pursuant to a conspiracy between all or at least some of the Defendants. The Claimants also stressed that where there is a conspiracy, the conspirators generally go to some lengths to conceal their conspiracy and cover their tracks. In an action where a Claimant alleges conspiracy, it may very well be, in the early stages of the action, that the Claimant is not able to give detailed particulars of all the steps in the conspiracy but this produces the result that the process of disclosure is more important rather than less important in such an action.
  24. Although the Defendants pressed their submissions as to the alleged weakness of the claim and the alleged lack of particulars, I did not, in the end, find the Defendants' approach on these matters to be of much assistance in determining what I should do on these applications. Given the considerable length of the pleadings, there are obvious difficulties in a Judge hearing an interlocutory application of the present kind in forming a fair assessment of the degree of particularity of the pleaded case. Further, even if a claim of conspiracy might lack particulars of the individual steps and the individual participants in the conspiracy, the fact of a conspiracy is often proved at a trial by inference from overt acts and, so far as I can tell in this case, the Claimants have pleaded overt acts of delay and obstruction and can ask the Court to infer that the similarity in the Defendants' behaviour across several jurisdictions was not a matter of coincidence, but was a matter of conspiracy. Further, I accept the Claimants' general submission that because the tendency of conspirators is to conceal rather than to reveal, proper disclosure is all the more important in a conspiracy claim.
  25. Insofar as the Defendants submit that I should form a view that the Claimants' claim is weak and, further, that that point of view should influence my attitude to these applications, I have two comments to make. The first is that I would have to become much better acquainted with the voluminous pleadings and the documents already made available on disclosure to form even a preliminary view as to the strength of the claim. Secondly, even if, on a preliminary view, I thought that the Claimants' claim looked, at present, a weak claim I am far from clear that that should influence my attitude to these applications. There has been no application by the Defendants to strike out all or part of the claim and, consequently, this claim, weak or strong, will have to go to trial. There will have to be standard disclosure before that trial. For the purposes of these applications for specific disclosure, it seems to me that I should apply the established rules as to disclosure to the specific circumstances of this case.
  26. THE HISTORY OF THE DISCLOSURE GIVEN

  27. On 6th February 2008, Mr Justice Lindsay ordered each party by 27th June 2008 to give standard disclosure by list. I am told that there was no discussion at the hearing on 6th February 2008 as to any particular points relating to such disclosure.
  28. There does not appear to have been any relevant communication between the solicitors for the parties shortly after the 6th February 2008 as to what might be involved in this case by way of disclosure of electronic documents. However, on 23rd May 2008, the Defendants' solicitors wrote to the Claimants' solicitors on the subject of disclosure and, in particular, electronic disclosure. The Defendants' solicitors stated that they had carried out targeted searches for potentially relevant documents held by relevant individuals in relation to servers which contained e-mail accounts, to the extent that they remained currently in use in each jurisdiction. The Defendants' solicitors had not sought to restore back-up tapes. The Defendants' solicitors had also carried out targeted searches of electronic documents including e-mails and stand alone documents located on London based servers and computers. On 5th June 2008, the Claimants' solicitors replied that they were surprised that the Defendants' solicitors were not reviewing all documents in the core periods. They asked for details of the searches that had been carried out. They also noted the decision not to restore back-up tapes and reserved the Claimants' position. On 20th June 2008, the Defendants' solicitor wrote again but simply noted the Claimants' solicitors' observations in stating that the adequacy of their disclosure could be assessed once exchange of lists of documents had taken place.
  29. The Defendants' solicitor served a draft list of documents on 30th June 2008 and a final and signed list of documents on 17th July 2008. The second list referred to more documents but otherwise the two lists are the same. The Defendants' solicitors stated in the lists that, as regards electronic documents, there was no central electronic archive or repository for the Defendants' electronic documents and there was no single approach between the Defendants as to the management and storage of electronic documents. The Defendants had carried out electronic searches in the Caribbean jurisdictions by using ten key words namely: Digicel, interconnect, interconnection, licence, liberalise, liberalisation, strategy, competing, competitor, competition. The electronic searches in London included all documents containing one or more key words which included the key words used in the Caribbean together with further key words, namely: Caribbean, CWWI, Jamaica and West Indies. The Defendants' list stated that no search had been made for documents stored on back-up tapes before the current proceedings began. The list stated that back-up tape restoration would have been disproportionate due to the significant time and costs involved.
  30. Following receipt of the Defendants' draft list, the Claimants' solicitors wrote on 3rd July 2008 making a large number of points. They criticised the small number of key words used to search the electronic documents and also criticised the failure to search back-up tapes. On 11th July 2008 the Defendants' solicitors described in detail the disclosure exercise they had carried out. They sought to explain and justify what had been done in relation to key word searches and, in relation to the restoration of backup tapes, they contended that such work was disproportionate. The Claimants' solicitors replied on 23rd July 2008 continuing to express concern about the key word searches and the failure to restore back-up tapes and on 31st July 2008, the present application was launched.
  31. In the draft order attached to the application, the Claimants sought an order that the Defendants restore back-up tapes for the e-mail accounts of 17 named individuals, described as former employees. The Claimants also sought an order that new electronic searches be carried out across all electronic documents collated by the Defendant including those obtained as a result of the restoration of the back-up tapes and those electronic searches should include 34 key words or phrases in addition to the key words or phrases already used by the Defendants.
  32. As a result of the exchange of evidence in this application, the Claimants had narrowed somewhat the scope of the orders they sought prior to the hearing of these applications. The scope of the orders sought was narrowed further during the course of the hearing. The number of former employees has now been reduced from 17 to 7. The additional key words or phrases have been reduced also. I will refer to the detail of what the Claimants are now seeking in due course in this judgment.
  33. I was given a detailed account of the search carried out by the Defendants in relation to electronic documents. In total some 1,140,000 documents were provided to the Defendants' solicitors. These documents were on individual DVDs or CDs and hard drives. The figure of 1,140,000 documents included, but was not confined to, documents from three sources in particular. The first source was electronic documents including e-mails (from current servers, PCs and laptops as applicable but not from back-up tapes) of some persons described as Relevant Individuals for the relevant period which had been subjected to positive key word searches by the relevant Defendant in situ. The resulting documents, after applying the positive key word searches, were then provided to the Defendants' solicitors. The second source comprised electronic documents including e-mails (from current servers, PCs and laptops as applicable, but not from back-up tapes) of some Relevant Individuals for the relevant period which had been subjected to the same positive key word searches as described above, together with additional searches for unspecified "competitors' names" by the relevant Defendant in situ. The documents which resulted from these searches were then provided to the Defendants' solicitors. The third source comprised the entire e-mail accounts (from current servers, PCs and laptops as applicable, but not from back-up tapes) of some Relevant Individuals. In relation to the third source, the distinction being made is that the entire e-mail accounts were supplied to the solicitors and positive key word searches were not carried out to reduce what was supplied to the solicitors in relation to this third source. The Relevant Individuals referred to above were some 85 named individuals as listed in Appendix 1 to the Defendants' Disclosure statement. These 85 individuals were identified by the Defendants as having some, but not necessarily extensive, involvement in the pleaded issues.
  34. In relation to the electronic documents provided to the Defendants' solicitors, where those documents were not split into sub-folders, they were provided to LDM Global ("LDM") and placed on a database. LDM is an information management and litigation support solutions provider specialising in large scale electronic and paper based disclosure services and data recovery. Where the electronic documents provided to the Defendants' solicitors were split into sub-folders, the titles of any electronic sub-folders were manually reviewed in native format (i.e. the hard drive or disk on which it had been provided) and irrelevant sub-folders were not provided to LDM. Documents not removed by this review of sub-folders were then passed to LDM. These processes reduced the number of potentially relevant electronic documents to about 625,000. All of these 625,000 documents were provided to LDM who placed them on a database. Creating this database involved more than simply transferring individual files to a database. The processes of creating the database were described to me in detail. It is sufficient to state that metadata was extracted to permit electronic de-duplication. The documents were then "de-duplicated", that is, duplicates were removed. The documents were then converted into an image format so that they could be reviewed and redacted on screen. In parallel, an optical character reading file was created in relation to each document which meant one had an image that was readable.
  35. These 625,000 documents on the database were then subject to the Defendants' positive search terms which reduced the number of potentially relevant electronic documents to about 370,000. Documents containing positive key words were then subjected to an automatic de-duplication process to remove copies of identical documents and this reduced the number of potentially relevant electronic documents to about 197,000. This group of documents was returned to the Defendants' solicitors and placed on their database for manual review. Thus, 197,000 electronic documents were manually reviewed for relevance and this produced 5,212 documents which were disclosed. I understand these documents comprise some 28,983 pages and fill some 83 lever arch files. The exercise described above cost the Defendants some £2 million in fees together with disbursements of some £175,000. The process took some 6,700 man hours of lawyers' time.
  36. The focus in the present applications is on the steps taken by the Defendants to give disclosure of electronic documents. The focus is therefore not on the steps taken by the Claimants. As appears below, the Claimants adopted a quite different approach to disclosure of electronic documents or "e-disclosure". The Claimants asked me to compare what they did with the steps taken by the Defendants in order to assess whether the Defendants had carried out a reasonable search for electronic documents and whether the Court should now require the Defendants to take further steps. I will refer briefly in a moment to the steps taken by the Claimants but before doing so I should comment that the steps taken by the Claimants cannot of themselves identify the relevant yardstick with which to measure the Defendants' performance. The commercial activities of the Claimants in the relevant areas at the relevant time were not the same as the commercial activities of the Defendants. The documents which the Claimants have in relation to the relevant territories at the relevant time will deal with different subject matters from the documents which the Defendants have for those territories at the relevant time. Further, I have to judge what the Defendants did rather than assess what the Claimants did in relation to e-disclosure. The Claimants may, or may not, have gone further than was strictly required by way of a reasonable search in order to spread the net as wide as possible to advance their case. If the Claimants had done very much less than the Defendants had done in relation to e-disclosure, that might cause me to question an application by the Claimants that the Defendants should do more. However, the mere fact that the Claimants have done more than the Defendants does not of itself lead to the conclusion that the Defendants' efforts were inadequate.
  37. Nonetheless, I will briefly refer to the steps taken by the Claimants and the results produced. The first step taken by the Claimants was to place on an electronic database, for the purpose of searching, all electronic documents (from current servers or existing back-up tapes) of the relevant persons on the Claimants' side for the period from 1st April 2001 to 31st July 2006. The electronic documents on the database were subjected to automatic de-duplication to remove copies of identical documents. The remaining electronic documents were subjected to negative key word searches for irrelevance. Documents not containing any negative key words were manually reviewed by reference to their contents for relevance. Documents containing any negative key words were manually reviewed by reference to their title. Any document clearly irrelevant by reference to its title was coded as irrelevant. Where the position on relevance was not clear, the contents of the document were manually reviewed for relevance. All documents coded as irrelevant were nevertheless subject to positive key word searches. Documents containing any positive key words were manually reviewed as to their contents for relevance. The above process was applied in relation to identified Key Periods. Documents outside the Key Periods were also subject to positive key word searches. Documents containing any positive key words were manually reviewed as to their contents for relevance. All relevant and non-privileged documents were again subjected to an automatic de-duplication process to remove copies of identical documents. All remaining documents were then disclosed by the Claimants. The Claimants' disclosure comprised some 29,000 documents in 860 lever arch files. The Defendants' solicitors have analysed the 29,000 documents and submit that if one removes duplicates, documents relating to quantum (as to which the Defendants have not given disclosure), documents as to the Claimants' retail infrastructure and launch preparations and documents which are wholly irrelevant, one arrives at a figure of some 18,400 documents which are potentially relevant to the pleaded issues.
  38. THE RELEVANT RULES AND PRACTICE DIRECTION

  39. The CPR provide for disclosure and inspection in Part 31 and the Part 31 Practice Direction. Rule 31.4 defines "documents" to mean anything in which information of any description is recorded. By Rule 31.5(1) an order of the court to give disclosure is an order to give standard disclosure, unless the court directs otherwise. The order made in the present case was an order to give standard disclosure. Rule 31.6 identifies what documents are to be disclosed by way of standard disclosure. A party is required to disclose only: (a) the documents on which he relies; (b) documents which adversely affect his own case or adversely affect another party's case or support another party's case; and (c) documents required to be disclosed by a relevant Practice Direction.
  40. Rule 31.7 identifies the duty of search by a party required to give disclosure. Such a party is required to make "a reasonable search" for the documents required to be disclosed by way of standard disclosure (apart from the documents on which the party itself relies). Rule 31.7 states:
  41. Rule 31.7 - DUTY OF SEARCH
    (1) When giving standard disclosure, a party is required to make a reasonable search for documents falling within rule 31.6(b) or (c).
    (2) The factors relevant in deciding the reasonableness of a search include the following -
    (a) the number of documents involved;
    (b) the nature and complexity of the proceedings;
    (c) the ease and expense of retrieval of any particular document;
    and
    (d) the significance of any document which is likely to be located during the search.
    (3) Where a party has not searched for a category or class of document on the grounds that to do so would be unreasonable, he must state this in his disclosure statement and identify the category or class of document.
    By Rule 31.7(3), where a party has not searched for a category or class of document on the grounds that to do so would be unreasonable, he must state this in his disclosure statement and identify the category or class of document.

  42. By Rule 31.8, a party's duty to disclose documents is limited to documents which are or have been in his control. By Rule 31.10(5) a list of documents must include a disclosure statement and by Rule 31.10(6) a disclosure statement is defined as a statement setting out the extent of the search that has been made to locate documents required to be disclosed and certifying that the maker of the statement understands the duty to disclose documents and that to the best of his knowledge he has carried out that duty. By Rule 31.11, a duty of disclosure continues until the proceedings are concluded so that if documents to which that duty extends come to a party's notice at any time during the proceedings, he must immediately notify every other party.
  43. Rule 31.12 deals with specific disclosure or inspection. By Rule 31.12(1) the court is given a power to make an order for specific disclosure or specific inspection. By Rule 31.12(2) an order for specific disclosure is an order that a party must do one or more of the following things: (a) disclose documents or classes of documents specified in the order; (b) carry out a search to the extent stated in the order; (c) disclose any documents located as a result of that search.
  44. Paragraph 2 of Part 31 Practice Direction deals with the extent of the search which is required. The extent of the search depends on the circumstances. The Practice Direction adds the comment that the parties should bear in mind the overriding principle of proportionality referred to in CPR Rule l.l(2)(c).
  45. Paragraph 2A of the Practice Direction deals with electronic disclosure and is in these terms:
  46. ELECTRONIC DISCLOSURE
    2A.1 Rule 31.4 contains a broad definition of a document. This extends to electronic documents, including e-mail and other electronic communications, word processed documents and databases. In addition to documents that are readily accessible from computer systems and other electronic devices and media, the definition covers those documents that are stored on servers and back-up systems and electronic documents that have been 'deleted'. It also extends to additional information stored and associated with electronic documents known as metadata.
    2A.2 The parties should, prior to the first Case Management Conference, discuss any issues that may arise regarding searches for and the preservation of electronic documents. This may involve the parties providing information about the categories of electronic documents within their control, the computer systems, electronic devices and media on which any relevant documents may be held, the storage systems maintained by the parties and their document retention policies. In the case of difficulty or disagreement, the matter should be referred to a judge for directions at the earliest practical date, if possible at the first Case Management Conference.
    2A. 3 The parties should co-operate at an early stage as to the format in which electronic copy documents are to be provided on inspection. In the case of difficulty or disagreement, the matter should be referred to a Judge for directions at the earliest practical date, if possible at the first Case Management Conference.
    2A.4 The existence of electronic documents impacts upon the extent of the reasonable search required by Rule 31.7 for the purposes of standard disclosure. The factors that may be relevant in deciding the reasonableness of a search for electronic documents include (but are not limited to) the following:-
    (a) The number of documents involved.
    (b) The nature and complexity of the proceedings.
    (c) The ease and expense of retrieval of any particular document. This includes:
    (i) The accessibility of electronic documents or data including e-mail communications on computer systems, servers, back-up systems and other electronic devices or media that may contain such documents taking into account alterations or developments in hardware or software systems used by the disclosing party and/or available to enable access to such documents.
    (ii) The location of relevant electronic documents, data, computer systems, servers, back-up systems and other electronic devices or media that may contain such documents.
    (iii) The likelihood of locating relevant data.
    (iv) The cost of recovering any electronic documents.
    (v) The cost of disclosing and providing inspection of any relevant electronic documents.
    (vi) The likelihood that electronic documents will be materially altered in the course of recovery, disclosure or inspection.
    (d) The significance of any document which is likely to be located during the search.
    2A.5 It may be reasonable to search some or all of the parties' electronic storage systems. In some circumstances, it may be reasonable to search for electronic documents by means of keyword searches (agreed as far as possible between the parties) even where a full review of each and every document would be unreasonable. There may be other forms of electronic search that may be appropriate in particular circumstances.

  47. It will be noted that paragraph 2A. 1 of the Practice Direction refers to the range of electronic documents including e-mail communications within the definition of "documents". The same paragraph also refers to back-up systems. Paragraph 2A.2 states that the parties should at an early stage discuss any issues that might arise regarding searches for electronic documents. Paragraph 2A.3 again refers to the need for the parties to cooperate as to the format in which electronic copy documents are to be provided for inspection. Paragraph 2A.4 supplements the factors listed in CPR Rule 31.7(2) by identifying 6 specific matters in paragraph 2A.4(c). Paragraph 2A.5 of the PD refers to the possibility of searching electronic documents by means of key word searches and adds that these searches are to be agreed as far as possible between the parties.
  48. Paragraph 5.1 of the Practice Direction deals with specific disclosure. Paragraph 5.4 states:
  49. 5.4 In deciding whether or not to make an order for specific disclosure the court will take into account all the circumstances of the case and, in particular, the overriding objective described in Part 1. But if the court concludes that the party from whom specific disclosure is sought has failed adequately to comply with the obligations imposed by an order for disclosure (whether by failing to make a sufficient search for documents or otherwise) the court will usually make such order as is necessary to ensure that those obligations are properly complied with.

  50. Paragraph 5.4 of the Practice Direction makes it clear that the procedure of applying to the court for an order for specific disclosure is available where the applicant alleges that the respondent is in breach of its obligation to give standard disclosure, whether by failing to make a sufficient search for documents or otherwise. Where there is a failure to make a sufficient search, the court will "usually" make such order as is necessary to ensure that the obligations on the respondent are properly complied with. However, an order for specific disclosure under CPR Rule 31.12 is not confined to a case where the respondent is in breach of an obligation to give standard disclosure. The court can make an order for specific disclosure even where the respondent has properly complied with its obligations to give standard disclosure but the applicant satisfies the court that such disclosure is "inadequate" or that the case is one where something more than standard disclosure is called for, for example, disclosure of documents which may lead to a train of inquiry with the consequence of producing documents which advance the applicant's case or damage the respondent's case: see paragraph 5.5 of the Practice Direction.
  51. THE CRESSWELL REPORT

  52. Paragraph 2A of Part 31 Practice Direction was introduced following the recommendations of a working party chaired by Mr Justice Cress well on the subject of electronic disclosure. The report was not cited to me but nonetheless it provides very useful background reading when considering an application of the kind which is before me.
  53. The Cresswell Report makes a number of points which it is useful to record. At paragraph 3.3, the report explains why the issues which arise in relation to disclosure of electronic documents are different from the issues which arise in relation to disclosure of paper documents. These reasons include the huge volume of documents which are created and stored electronically, the ease of duplication of electronic documents, the lack of order in the storage of electronic documents, the differing retention policies of the parties, the existence of metadata and the fact that electronic documents are more difficult to dispose of than paper documents.
  54. At paragraph 2.15, the Cresswell Report discusses the duty to search for documents. It states that Part 31 gives a party "a certain degree of latitude" as to the extent of the search because what may be reasonable in one case may be inadequate in another. The test of "a reasonable search" in Rule 31.7 has the virtue of flexibility and takes account of the overriding objective: see paragraph 2.18. At paragraph 2.18(4), the report refers to back-up data and describes this as commonly having the disadvantage that the data is compressed and it can be difficult and costly to retrieve. At paragraph 2.20 the report refers to the possibility of a search being carried out electronically using specified words or strings of words, rather than manually.
  55. The Cresswell Report refers to the experience and approach in the United States of America. It concludes that the case law in the USA illustrated some of the difficulties in practice but did not build up a coherent pattern of decisions. Later in the report (paragraph 2.29) there is a discussion of the Sedona Principles first laid down at the Sedona Conference in 2004. The report considered that these principles were not suitable for wholesale adoption in England and Wales. Nonetheless, it can be seen by comparing the Sedona Principles with the recommendations of the working party that the working party picked those parts of the Sedona Principles which were appropriate for adoption in this jurisdiction.
  56. It is worth quoting from two decisions of the US courts. In Byers v Illinois State Police 53 Fed. R Serve. 3d 740(N.D.III. May 31, 2002) the court stated :
  57. "Computer files, including e-mails, are discoverable...However, the Court is not persuaded by the plaintiffs' attempt to equate traditional paper-based discovery with the discovery of e-mail files ....... Chief among these differences is the sheer volume of electronic information. E-mails have replaced other forms of communication besides just paper-based communication. Many informal messages that were previously relayed by telephone or at the water cooler are now sent by e-mail. Additionally, computers have the ability to capture several copies (or drafts) of the same e-mail, thus multiplying the volume of documents. All of these e-mails must be scanned for both relevance and privilege. Also, unlike most paper-based discovery, archived e-mails typically lack a coherent filing system. Moreover, data archival systems commonly store information on magnetic tapes which have become obsolete. Thus, parties incur additional costs in translating the data from the tapes into useable form."

  58. The question of the cost of e-disclosure and in particular the cost of restoring back-up disks was discussed in Zubulake v UBS Warburg LLC (2003) 217 F.R.D. 309. The court said:
  59. "The application of these various discovery rules is particularly complicated where electronic data is sought because otherwise discoverable evidence is often only available from expensive-to-restore back-up media. That being so, courts have devised creative solutions for balancing the broad scope of discovery prescribed in [the rules] with the cost-consciousness of [the relevant rule]. By and large, the solution has been to consider cost-shifting: forcing the requesting party, rather than the answering party, to bear the cost of discovery."

  60. The Cresswell Report refers to the potential for dispute in relation to back-up data (see paragraphs 3.13 to 3.14). At paragraph 3.20, the report refers to the use of key word searches and suggests that an early exchange of information between the parties would assist in reducing the scope for dispute. At paragraph 3.24, the report refers to the question whether there should be cost shifting, as described above in the American decision.
  61. DISCUSSION

  62. It may worth emphasising the character of the application made by the Claimants and what that application does not involve. The application is for specific disclosure not specific inspection. The Claimants do not say that those back-up tapes which still exist and which are in the control of the Defendants are themselves documents which should be available for inspection by the Claimants. Instead, the Claimants say that the back-up tapes are a source of possible documents, namely, the e-mail accounts of certain individuals so that the back-up tapes should be the subject of a reasonable search to produce the documents, namely, the relevant parts of the e-mail accounts.
  63. Further, it is to be noted that the application is for an order that the Defendants restore back-up tapes to a specified extent and that the Defendants search all electronic documents in their control by the use of positive key word searches. As will be seen, the Defendants say, amongst other things, that it will be extremely difficult to restore back-up tapes and that the cost of the various steps required by the Claimants is disproportionate having regard to the high cost of the steps required and the likelihood that very few relevant documents will be found. In the course of the Claimants' submissions, I enquired whether the Claimants wished to put any alternative case, for example, that instead of the Court making an order that the Defendants restore backup tapes the Court might make an order that the back-up tapes be delivered to the Claimants to enable the Claimants to carry out the necessary work. I suggested a further alternative which was that the tapes be delivered to an independent expert who would carry out or oversee the necessary work of restoration. I pointed out that either of these possibilities, if ordered, would have to be carefully controlled by undertakings as to confidentiality and perhaps other matters. Mr Davies QC, who appeared for the Claimants, did not adopt these alternatives. He referred to the possibility that the Defendants would object to those methods of proceeding. Mr Nourse who appeared for the Defendant did not address these alternatives in his submissions. Accordingly, I proceed on the basis that the only application before me is an application by the Claimants that the Defendants restore the back-up tapes and carry out further key word searches to electronic documents generally. Nonetheless, as the material discussed in the Cresswell Report shows, the possibility of the Court giving the task to the applying party rather than the producing party is a possibility, together with associated cost shifting. Furthermore, in Australia, the courts appear to be creative in these respects: see the judgments given in Sony Music Entertainment (Australia) Limited v University of Tasmania [2003] FCA 532, 724, 805 and 929 (there are four judgments reported at these pages). Consequently, although I will not explore these questions further in this judgment, they may be worthy of attention in another case.
  64. It is also right to recall that the Claimants' allegations in the present case include allegations of conspiracy. It is no doubt true that where there is a conspiracy the conspirators are careful not to leave written records of their conspiracy behind them. However, it is also well known that people say things in e-mails which they would not dream of putting into a letter or a minute or a formal note. Further, in litigation involving allegations of conspiracy or similar allegations, it may only take one revealing statement in a document, perhaps in an e-mail, to show clearly what people really thought or what people really were intending to achieve, a matter that might not have been revealed in many tens of thousands of other documents in the trial bundles. As against that, it must be remembered that what is generally required by an order for standard disclosure is "a reasonable search" for relevant documents. Thus, the rules do not require that no stone should be left unturned. This may mean that a relevant document, even "a smoking gun" is not found. This attitude is justified by considerations of proportionality. This point is well made by Jacob LJ in Nichia Corporation v Argos Limited [2007] EWCA Civ 741 at [50] to [52].
  65. This case provides an opportunity for the Court to emphasise something mentioned in Part 31 Practice Direction which the parties in the present case disregarded. Paragraph 2A.2 of the Practice Direction states that the parties should at an early stage in the litigation discuss issues that may arise regarding searches for electronic documents. Paragraph 2A.5 of the PD states that where key word searches are used they should be agreed as far as possible between the parties. Neither side paid attention to this advice. In this application the focus is upon the steps taken by the Defendants. They did not discuss the issues that might arise regarding searches for electronic documents and they used key word searches which they had not agreed in advance or attempted to agree in advance with the Claimants. The result is that the unilateral decisions made by the Defendants' solicitors are now under challenge and need to be scrutinised by the Court. If the Court takes the view that the Defendants' solicitors' key word searches were inadequate when they were first carried out and that a wider search should have been carried out, the Defendants' solicitors' unilateral action has exposed the Defendants to the risk that the Court may require the exercise of searching to be done a second time, with the overall cost of two searches being significantly higher than the cost of a wider search carried out on the first occasion.
  66. There emerged at the hearing a difference in the legal approach which was urged upon me as to the scope of the Court's review in this case. Mr Nourse on behalf of the Defendants said that the question of what was "a reasonable search" had to be decided in the first instance by the solicitor in charge of the disclosure process. Rule 31.7 and paragraphs 2 and 2A of the Practice Direction refer to someone "deciding" what is a reasonable search. That decision inevitably had to be made in the first instance by the solicitor. Mr Nourse referred to paragraph 6.33 in Matthews and Malek on Disclosure (2007) where the authors state:
  67. "What constitutes a reasonable search may be regarded as being to a certain extent subjective and thus the disclosing party is given a degree of latitude in making standard disclosure."

    Mr Nourse also referred to Nichia Corporation v Argos Limited [2007] EWCA Civ 741 at [77] where Rix LJ said:

    "Once attention is focused on the rationale of standard disclosure in the context of any relevant issue, it is possible to appreciate that it is those parties and their advisors who are in the best position to adopt the procedures which are both commensurate and proportionate."

  68. Mr Nourse then submitted that when a court is asked to review the decision made by the relevant solicitor, it should adopt a standard of review which reflects the degree of latitude given to the solicitor and the subjective character of the decision and this should lead the court to reach a conclusion different from the solicitor's conclusion only in a case where the solicitor's decision was outside the band of permissible reasonable decisions, alternatively, the court should adopt the approach of an appellate court reviewing an exercise of discretion. Mr Nourse referred to the classic statement of the approach in such a case in G v G [1985] 1 WLR 647 at 652 per Lord Fraser of Tullybelton, where he said:
  69. ".....the appellate court should only interfere when they consider that the judge of first instance has not merely preferred an imperfect solution which is different from an alternative imperfect solution which the Court of Appeal might or would have adopted, but has exceeded the generous ambit within which a reasonable disagreement is possible."

  70. Mr Davies QC on behalf of the Claimant submitted that there was no warrant for Mr Nourse's approach in the wording of the Rules or the Practice Direction. He submitted that the Court should have regard to all the circumstances which included the factors identified in Rule 31.7 and in paragraph 2A. 4 of the Practice Direction and the Court should make up its own mind as to what was required by way of a reasonable search.
  71. It is right that the decision as to what is a reasonable search rests in the first instance with the solicitor in charge of the disclosure exercise. However, the Practice Direction makes clear that some parts at least of the process ought to be discussed with the opposing solicitor with a view to achieving agreement so as to eliminate, or at any rate reduce, the risk of later dispute. If a solicitor, whose decision as to what is a reasonable search is later challenged on a specific disclosure application, the Court may well be influenced, in the solicitor's favour, if it sees that the solicitor was very fully informed as to the issues arising in the case, and had made a fully considered decision applying all the factors in Rule 31.7 and paragraph 2A.4 of the Practice Direction. However, even if the Court can, in a proper case, be favourably influenced by the diligence and conscientiousness of an individual solicitor, in my judgment, the task of deciding what is required by a reasonable search is a task given to the Court by the wording of the Rules. This task can be carried out by the Court either in advance of the search being done or with hindsight, where a search has been carried out and its extent is challenged by the other party. I do not find any warrant in the language of the Rules or Practice Direction for Mr Nourse's suggestion that the standard of review should be a judicial review standard of irrationality or the standard adopted by an appellate court reviewing the exercise of a discretion. The passage in Matthews and Malek on disclosure is an echo of paragraph 2.15 of the Cresswell report. It is clear that these comments only amount to a statement that what is reasonable depends upon a number of circumstances and factors which differ from case to case. Similarly, the comment of Rix LJ in Nichia reflects the fact that the solicitor in the first instance has the job of deciding what the extent of the search should be. That comment does not limit the scope of review by the Court in a case where the decision is challenged.
  72. Further, I do not think that it would be helpful for the Court to decline to form, and act on, its own view but instead to indulge in a review of the decision making process on the part of the solicitor. Such a review would deflect the Court from determining what is a reasonable search, taking account of all the factors and with the benefit of hindsight, into an examination of the solicitor's mental processes at an earlier time. It should also be remembered that the duty to give disclosure is a continuing duty. A solicitor might reasonably think at an early stage in the process that a certain search will suffice. However, later events may require the solicitor to think the matter through again and form a different view and conduct a wider search. Accordingly, if the Court's task was limited to a judicial review of a decision making process, the Court may have to consider several decisions taken at different stages, or even a suggested omission on the part of the solicitor to think again, in the light of new material becoming available.
  73. There is one other general matter to which I should refer at this stage. In making his application for an order that the Defendant should carry out further key words searches, Mr Davies QC on behalf of the Claimants emphasised that the question was whether it was reasonable to carry out such an extended search in the first place rather than the question being whether it was reasonable for the Court to order the Defendants to carry out a second search, the Defendants having already searched with fewer key words. In my judgment, Mr Davies is correct that the first question for the Court is what should have been done in the first place by way of a reasonable search. If the Court reaches the conclusion that more should have been done in the first place then the Court will conclude that a party has failed to carry out a reasonable search. That does not necessarily mean that the Court will then order the defaulting party to carry out the search which it initially should have carried out. The Court's approach is governed by Rule 31.12 which provides that the Court "may" make an order for specific disclosure in such a case. Thus, the Rule contemplates the possibility that the Court may not make such an order. The position is described in paragraph 5.4 of Part 31 Practice Direction which says that the Court will "usually" make an order for specific disclosure to ensure that the obligation to give disclosure is properly complied with. However, it must be possible for a Court to reach a conclusion in a particular case that the required search which should have been carried out in the first instance would, if carried out at a second stage, be disproportionate as regards cost and the likelihood of revealing anything worthwhile.
  74. BACK-UP TAPES

  75. The order sought in relation to back-up tapes is to the effect that the Defendants should restore their back-up tapes located in St Lucia, SVG and Jamaica, so far as necessary in order to identify and conduct an appropriate electronic search (to which I refer later) of the e-mail accounts of 7 individuals for a period which is specified in the case of each individual. The 7 individuals are former employees of a Defendant company. The e-mail accounts of those former employees were deleted from the relevant server following the ending of their employment. However, it may be the case that some or all of the individual's e-mail accounts exist on the back-up tapes. The 7 individuals are Clive Batchelor, Pinkley Francis, Rudy Gurley, John Thompson, Fred Walcott, Errald Miller and Winston Butler. In these cases (with the exception of Rudy Gurley), the period of time begins in June 2002 and continues in each case until the date the employee ceased to be employed or, in the case of Mr Walcott, to March 2003. In the case of Rudy Gurley, the period begins in April 2001, seemingly on the basis that Mr Gurley was involved in the OECS liberalisation agreement of April 2001.
  76. As a result of the evidence disclosed in these proceedings, it has emerged that back-up tapes exist in relation to St Lucia and SVG and there are also back-up tapes in relation to Jamaica which may contain the e-mail accounts of Mr Miller and Mr Butler. I am told that there are some 700 back-up tapes in relation to St Lucia and some 100 backup tapes in relation to Jamaica, but I have not been told the figure for SVG.
  77. In the disclosure statement of the Defendants, the Defendants stated that back-up tape restoration would have been disproportionate due to the significant time and costs involved. The Claimants originally understood that back-up tapes generally were available and the back-up tapes which had survived were not restricted to the numbers I have referred to above. The Defendants only made it clear that the number of backup tapes which have survived are as described above in the course of these proceedings. In a witness statement prepared for this hearing, Mr Cotton stated that at the outset of the disclosure exercise it was decided that back-up tapes would not be restored, to the extent that they existed. This statement does not suggest that the Defendants' solicitors knew how many tapes did exist. Mr Cotton goes on to explain that at the outset it was expected that the voluminous data which did exist would catch large numbers of former employees' e-mails. He suggests that this has turned out to be the case and that the matter would have been reconsidered if the initial searches of the data which did exist yielded only limited amounts of disclosable documents.
  78. The Claimants submit that an appropriate electronic search should be made of e-mails of employees whether current or former at a relevant time providing the employees are identified as sufficiently relevant individuals. The Claimants submit that back-up tapes can be restored and therefore should be restored. The Claimants also explain the role of the 7 named individuals in the matters relevant to this action and say that they are potentially sufficiently relevant to justify a search of their e-mail accounts in restored back-up tapes.
  79. The Defendants say that they should not be ordered to do anything in relation to these back-up tapes. They stress that the Defendants have already spent a considerable amount of time at great cost in giving the disclosure that they have given. They say that the work of restoring the back-up tapes which exist would be very elaborate, beset with difficulty and with no certainty as to what could be recovered. They say the cost of that exercise would be prohibitive. They say that it is unlikely that anything very much would be found in addition to that which has already been found. They say that the practice which was prevalent at all times and in all territories was for e-mails to be sent to several recipients and not a single recipient. Accordingly, that e-mail communication can be found by searching the e-mail account of one recipient and it is not necessary to search for the same e-mail again and again and so it is not necessary to restore the e-mail account of a former employee to find an e-mail that has already been found. The Defendants also discuss the significance or lack of significance of some of the individuals and have analysed the detailed allegations made in the pleadings for the purpose of submitting that further searches are unlikely to yield much if anything of any real relevance.
  80. It is obviously important to know, to the extent that it can be known at this stage, how difficult and how costly it will be to restore the back-up tapes. The evidence which I have on that question is very far from being conclusive. On the one side I have the witness statement of Mr Cotter from the Claimants' solicitors which gives hearsay evidence as to what he was told by a Mr Riordan who is described as Digicel's head of IT and who was involved in the restoration of back-up tapes on behalf of Digicel. Mr Riordan is reported as saying what he expects the position to be in relation to the Defendant's back-up tapes and the overall tenor of the evidence is that Mr Riordan does not regard the restoration of back-up tapes and the location of an individual's e-mail account as being unduly difficult.
  81. Mr Riordan's reported remarks are the subject of comment by Mr Cotton of the Defendants' solicitors. He suggests that Mr Riordan's speculation as to what the situation might be is not well founded as a matter of fact. Mr Cotton points out that this is not a case of a single party, as there were separate entities operating in the territories the subject of this dispute. Mr Cotton says there was no unified system of electronic storage within the Defendant companies. He cross refers to a witness statement of Mr Carte (to which I will later refer) to support the conclusion that any extraction of data from the back-up tapes would be a complex, time-consuming and costly process which might not even result in relevant e-mails being restored. He refers to back-up tapes in SVG where the IT personnel in SVG tried and failed to restore some back-up tapes in 2003.
  82. The Defendants rely on a witness statement of Mr Carte of LDM who has been engaged by the Defendants' solicitors in relation to these proceedings. Mr Carte describes some of the difficulties which might exist in relation to restoration of the back-up tape and the identification of partial or complete e-mail accounts for individuals. There is much in Mr Carte's witness statement that one would have wished to explore further before one could form a fully informed prediction of what might be involved. Mr Carte gives some general evidence about what is typically found with back-up tapes. He refers to back-up tapes normally comprising a set of tapes so that restoration requires one to have the complete set rather than a broken set. Mr Carte says that LDM was provided with a sample of 96 back-up tapes from the 700 back-up tapes for St Lucia. Based on this sample, he found that the back-up tapes were not organised or catalogued and would need to be further investigated. It is not even clear that complete sets exist. The Defendants' IT personnel in St Lucia are unable to restore the back-up tapes themselves. He points out that the purpose of back-up tapes is to assist with disaster recovery so that restoration of a set of back-up tapes restores the system to the state it was in at the time when the back-up was made. He identifies a two stage process which is involved in restoration. The first stage is grouping and cataloguing tapes and the second stage is their restoration. To group and catalogue 700 tapes would cost £100 per tape and would take 6 to 7 days per 100 tapes or 6 to 8 weeks for 700 tapes. The stage two restoration process will cost approximately £225 for each tape that is selected for restoration. The overall time and expense will depend on how many tapes are so selected.
  83. From LDM's review of the sample of 96 tapes, the tapes cover periods and not people. If a tape includes an e-mail account it will include the e-mail account up to a certain period but not the entire e-mail account from its inception, but only from some earlier date. Although Mr Carte has not catalogued the back-up tapes, he was told by the Defendants' IT personnel in St Lucia that there are e-mail back-up tapes which relate to a single e-mail server. Mr Carte does not regard this as a guarantee but equally offers no evidence to undermine what he was told. If there is only one e-mail server, selection of the e-mails of a specific individual will be possible. It may be the case that a tape is corrupted.
  84. Mr Carte then demonstrates or seeks to demonstrate that the volume of documents on the back-up tapes is extremely large. However, he does not explain the relevance of this if one were to use electronic search terms to isolate the e-mail account of a specific individual. He also points to the fact that there will be significant duplication but does not explain why that is likely to cause any particular difficulty or expense.
  85. My own reaction to this somewhat inconclusive technical evidence about the difficulty and cost of restoring back-up tapes is that the evidence does not persuade me that one should give up any attempt to recover e-mail accounts from those tapes. Mr Carte's evidence amounts in some ways to the accumulation of a whole series of worst case scenarios. As to the fact that there are hundreds of back-up tapes and to restore every one of them would be a substantial exercise, it must be remembered that the order sought is that the Defendants restore back-up tapes to the extent that they need to restore them to get e-mail accounts of 7 individuals for defined periods. I will return to the question of what steps should be taken with a view to restoration of the back-up tapes after I have considered the other matters raised by the parties.
  86. The Defendants have a valid point that if an e-mail is sent to, say, 5 people and one searches the e-mail account of one of those 5, that search will turn up the relevant e-mail and it is not necessary to search for the same e-mail in the other 4 e-mail accounts. For this reason, if an e-mail account of one of the 7 named individuals is restored, one will find in it e-mails which went to several persons some of which may already have been obtained earlier in the disclosure exercise. The converse is that if one restores a back-up tape and searches the e-mail account of a specified individual, one may find relevant e-mails which went to persons other than those whose e-mail accounts have survived and been searched. One will also find e-mails from the specified individual to third parties outside the Defendant companies. The Defendants submit that there will be very few additional documents which turn up as a result of restoring the back-up tapes to search the e-mail accounts of the 7 individuals. The Defendants accept, as they must, that they cannot rule out the possibility that there will be additional material. In that case, they cannot rule out the possibility that the additional material might be of great significance. In my judgment, it is very difficult to predict the scale of the additional material which will be found on a search of 7 further e-mail accounts. However, I am not able to rule out the need for a further search just because some part, perhaps even a large part, of what will emerge has already been disclosed.
  87. Apart from their submissions based on the chain of e-mails point, the Defendants also submit that some of the 7 individuals were remote from the matters complained of and I was specifically taken to the pleadings as regards the involvement, limited or otherwise, of certain individuals. The Defendants appear to accept that they cannot make this point in relation to every one of the 7 individuals so that if what I have discussed so far would lead to an order that back-up tapes should be restored to search for the e-mail accounts of some of the 7 individuals, it is not clear what if any further work would be needed to extend the search from, say, 3 or 4 of the 7 individuals to all of the 7 individuals. In any case, having carefully considered the witness statements and the parties' submissions and the pleadings in relation to the 7 individuals, I conclude that the Claimants have done enough to justify a search of the back-up tapes and in particular of the e-mail accounts of the 7 individuals.
  88. Having considered the points made by the Defendant, I return to the question of reasonable search and the factors which are identified in Rule 31.7 and expanded in paragraph 2A.4 of the Practice Direction. In my judgment, the Defendants have not carried out a reasonable search in all the circumstances of this case insofar as they omitted to search for, and in, the e-mail accounts of the 7 specified individuals, to the extent that those e-mail accounts may exist in the back-up tapes which have survived.
  89. I therefore now turn to consider whether it is appropriate to make an order under Rule 31.12(2)(b) requiring the Defendants to carry out a search to the extent stated in the order. I conclude that more remains to be done. I will now attempt to identify the regime which should be followed in this respect.
  90. It seems to me to be inappropriate to make a simple order that the Defendants restore the identified back-up tapes so far as necessary to identify and search certain e-mail accounts. An order in those terms does not address the possibility that restoration might not be possible or that it might emerge that restoration is only possible at an utterly prohibitive level of cost. The order does not address the possibility that it might be possible to recover, say, 90% of an e-mail account with comparative ease but the remaining 10% would involve difficulty and cost of a different order and magnitude. I remind myself that the Practice Direction stresses that the parties should discuss perceived problems and cooperate in resolving them. That seems to me to provide a key to the proper way forward.
  91. ORDER IN RELATION TO BACK-UP TAPES

  92. Accordingly, in relation to the restoration of back-up tapes for the purpose of identifying and enabling a search of the e-mail accounts of the 7 individuals, I will direct, first, that the parties' solicitors meet more or less straight away to discuss how this can best be done. This meeting can be attended by LDM on behalf of the Defendants and any expert available to the Claimants. The discussions at that meeting should be minuted. Following such a meeting, the Defendants should embark so far as reasonably practicable upon restoration of the back-up tapes for the purpose of identifying and enabling a search of relevant e-mail accounts. I will not, at this stage, order that the Defendants should permit the Claimants to have an observer present at the attempts which are made but I will require that the Defendants' solicitors report to the Claimants' solicitors at relatively short intervals, say every 10 days or 2 weeks, on the rate of progress. The parties' solicitors will be expected by the Court to cooperate fully with each other, to maintain a dialogue and for there to be questions and answers passing between them as to whether anything further can be done or should be done. I will give the Defendants express liberty to apply so that if the Claimants continue to require that further steps are taken which the Defendants say ought not to be taken then the Defendants can seek appropriate direction from the Court.
  93. As a matter of detail, I will change the commencement date of the relevant period for Rudy Gurley from April 2001 to June 2002 so that it is in line with all the other commencements of the period of search.
  94. KEY WORD SEARCHES

  95. As described earlier in this judgment, the Defendants used positive key word searches at various stages in the process to reduce the numbers of electronic documents which were ultimately the subject of a manual review as to their contents. When describing the three sources which contributed to the total of 1,140,000 documents, I referred to one of the sources as being the entire e-mail accounts of some Relevant Individuals. In the course of the hearing, the Claimants provided a list of 16 employees of the Defendant and enquired which of those 16 fell into the category where the entire e-mail accounts were provided to the Defendants' solicitors. It transpired that the entire e-mail accounts of 3 of those 16 individuals were provided to the Defendants' solicitors. In the case of a fourth individual the entirety of the TCI and Cayman Island sub-folders of that individual's e-mail account were provided to the Defendants' solicitors.
  96. The use of positive key word searches by the Defendant is likely to have led to the elimination of very many electronic documents. Before the compilation of the 1,140,000 documents, positive key word searches were used and no figure has been given as to the number of electronic documents eliminated by those searches. At the later stage when positive key word searches were used some 370,000 documents were selected from the earlier bulk of 625,000 documents. I have set out earlier in this judgment the key words used by the Defendants in the Caribbean territories and in the case of the London documents. For convenience, I will re-list the 10 key words used in relation to the Caribbean territories. They were: Digicel, interconnect, interconnection, licence, liberalise, liberalisation, strategy, competing, competitor and competition. The Claimants point out that some of these 10 words shared a common stem; this applies to interconnect and interconnection, to liberalise and liberalisation and to competing, competitor and competition. Thus the 10 words comprise some 6 stem words.
  97. Although the steps taken on the Claimants' side are not necessarily a pointer to what was a reasonable search on the part of the Defendants, the Claimants stress that their forms of electronic searching did not rely to the same extent on a small number of positive key words and that the manual review of the contents of documents was much more extensive on their part.
  98. In the draft order attached to the Claimants' Application, the Claimants identified an additional 34 key words. The draft order sought an order that the Defendants carry out key word searches across all electronic documents in the control of the Defendants, including any restored back-up tapes for identified employees. In the course of the hearing, the Claimants' Application in relation to key word searches was refined. At the end of the hearing, the Claimants supplied a draft order which identified 19 key words (in addition to the Defendants' original 10). Those 19 key words are subject to qualification in that if a particular key word is ordered by the Court then other key words need not be ordered and, further, the use of a key word is sometimes limited to certain jurisdictions, rather than all jurisdictions. Further, the draft order for key word searches does not now extend to all electronic documents in the control of the Defendants. The key word searches which are sought relate to the e-mail accounts of 16 individuals identified in a schedule to the draft order together with the further e-mail accounts, if any, of the 7 former employees which might become available following restoration of back-up tapes. Although the Claimants were critical of the excessive reliance by the Defendants on positive key word searches, the Claimants are now content that the Defendants follow the same process as before, using positive key word searches, provided that the number of key words is increased in the way in which I have described.
  99. There is no doubt that it will often be appropriate for a party to search electronic documents using positive key words. In any event, the Claimants agree, on this present application, that the Defendants should be permitted to search their electronic documents using positive key words. The principal issue between the parties relates therefore to the selection of those key words.
  100. The Defendants stress that 2 or 3 words, without more, will go a very long way towards finding documents which then need to be examined manually for relevance. The 2 or 3 key words are Digicel, interconnect and interconnection. I agree that those key words are vital and will identify a very large part of the totality of the documents which need to be identified. However, the Defendants do not say that those 2 or 3 key words between them will suffice. The Defendants say that in the documents they have disclosed the word Digicel appears in 75% of the cases. They also say that only 9.5% of the documents disclosed by the Defendants do not contain Digicel, interconnection or interconnect. It will be remembered that these statistics are produced by positive key word searches using only some 6 stem words. Further, the statistics themselves prove that one cannot confine oneself to Digicel and interconnect and interconnection although those words are the obvious, all-important starting point. Furthermore, as regards the use of Digicel to identify the Claimants, the Claimants point out that other means of identifying the Claimant were probably used in e-mails. The Claimants were, or might have been, called "Digi". The Claimants were or might have been called "our Irish friends". Further, references to the Claimants might have involved the use of the name of the individual employee of the Claimants and no search has been carried out in respect of the names of individual employees.
  101. Nonetheless, it remains a fact that the use of any key word in addition to Digicel, interconnect or interconnection is liable to reveal only a comparatively limited number of relevant documents.
  102. There is also a problem if one uses an ordinary English word as a key word. Such a word will throw up many documents which have got nothing to do with the issues in this case. An example is the word delay which I discuss in more detail below. Another difficulty arises with the use of Nortel as a key word. Nortel were involved in the interconnection process of the Claimants to the Defendants. But Nortel were also in communication with the Defendants in relation to many installations which did not concern Digicel and are not relevant to the issues in this action. I discuss this word further below.
  103. If one were to adopt the "leave no stone unturned" approach to disclosure then one would be more ready to add key words to those originally used by the Defendants. However, it will usually be wrong in principle to adopt that approach and, in my judgment, it would be wrong to adopt that approach in the circumstances of this case. One therefore has to consider the proportionality of adding an additional key word. For that purpose one has to form some sort of view as to the possible benefit to the Claimants of adding the key word and the possible burden to the Defendants of doing so. The burden to the Defendants will principally consist of the burden of manually reviewing a large number of irrelevant documents.
  104. It is unfortunate that this dispute about the extent of the key word search comes to Court after the Defendants acted unilaterally in choosing key words and conducting a search. In acting unilaterally, and in disregarding the clear advice in Part 31 Practice Direction, the Defendants have exposed themselves to the risk that the Court will conclude that their search was inadequate and that the Court should order the Defendants to carry out a further search. The Defendants submit that because they have already carried out a search, taking a considerable time and involving a very large cost, the Court should be most reluctant to order them to carry out a further search. It seems to me that I should approach the issues in relation to key words in two stages. At the first stage, I will attempt to identify where to draw the line between inclusion and exclusion of the suggested additional key words. If as a result of that process I conclude that the Defendants should have, first time round, used additional key words I will then have to consider whether to make an order for a further search under Rule 31.12. It is also possible for me to distinguish between the e-mail accounts of the 16 individuals who have already been the subject of key word searches and any further e-mail accounts found following the restoration of back-up tapes, where there have not previously been any key word searches.
  105. I will now deal with the individual key words put forward by the Claimants. The debate in relation to individual key words varies from word to word. Further, the parties made thorough and detailed submissions as to the possible benefit and the possible disadvantage of including an additional key word together with detailed references to the witness statements served for the purposes of this Application and to the lengthy pleadings. I do not intend in this judgment to rehearse the detail of those arguments. I will apply the approach which I have attempted to identify earlier in this judgment and will weigh the rival arguments and express my conclusions which involve an assessment of the proportionality of including an additional key word. On a subject such as proportionality, there is no precise and correct answer. Arguments as to proportionality involve choosing a cut-off point in a range of possibilities and there is no single right answer as to where the cut-off point should be.
  106. I start with the word Nortel. If one searches using this word, one will find many, many documents which have already been revealed by using the words Digicel and interconnect or interconnection and, perhaps, some further documents relevant to the action which have not already been revealed. However, the use of the word Nortel will bring to light, requiring manual review, a large number of documents that have got nothing to do with the issues in this action. My conclusion is that, on grounds of proportionality, the burden of a manual review of documents which include the word Nortel is far in excess of the possible benefit of finding in those documents a relevant document which has not already come to light. I hold that the word Nortel was not required to be included in a reasonable search by the Defendants.
  107. I next deal with the words: legacy, NGN, ODF and optical distribution frame. The Claimants say that any search for these words can be confined to documents relating to Trinidad and Tobago which were created between June 2005 and April 2006. My assessment is that the specific allegations in relation to these matters together with the key words which have already been used by the Defendants and the likelihood that there will be many documents using one or some of these words which have nothing to do with the issues in this action make it disproportionate for this words to be included in a key word search. I hold that these words were not required to be included in a reasonable search by the Defendants.
  108. I next turn to the words: MUX, multiplexor, equipment, W/l lists. The Claimants ask that these words be used in searches relating to all territories. They say that these words will not be necessary if the Court orders the use of the words delay, obstruct, impede and stall. However, before dealing with delay etc., I find it convenient to deal with the words now being considered. In my judgment, on the basis of proportionality, and substantially for the reasons given above in relation to legacy and NGN etc., these words were not required to be included in a reasonable search by the Defendants.
  109. I next consider the terms: interim agreement and interim rate. The Defendants say that the use of the phrase "interim interconnection agreement" would have been more normal than interim agreement. In my judgment, there is a real chance that the Defendants would have used the shorter phrase interim agreement and this phrase would not be picked up by the use of the key word interconnection. The Defendants also say that the probability is that references to interim agreements and interim rates would only be relevant in a document which had either the word Digicel or interconnect or interconnection to provide the relevant context. In my judgment, on balance, the proportionate thing to do would have been to include the phrases interim agreement and interim rate in the kind of positive key word search carried out by the Defendants.
  110. I next turn to the word: concession. In the relevant territories apart from Trinidad and Tobago, the relevant document was referred to as a licence. The Defendants used the word licence in their key word searches. In Trinidad and Tobago, the equivalent document was referred to as a concession. The Claimants accordingly say that a reasonable search would have used the word concession in relation to documents concerned with Trinidad and Tobago which documents were created between June 2005 and April 2006. Prima facie, this is a strong argument. In response, the Defendants say that they used the word licence as a key word out of an abundance of caution and its use was probably unnecessary given the context provided by the key words Digicel and interconnection. I would have been inclined to give this argument limited weight but the argument is considerably strengthened by the fact that of the 5,212 documents disclosed by the Defendants, only 17 of the documents use the word licence without any other search term. The Defendants also say that a search using the word concession would bring to light every document in which the term was used with its ordinary English meaning and such documents are unlikely to be relevant. So far as any e-mail accounts of the 7 former employees which have come available as a result of restoration of back-up tapes, in view of the territories in which those employees were involved, I will not require the word concession to be added as a key word. In the case of the e-mail accounts of the 16 employees where the Claimants are asking for a further search to be carried out using further key words, I have reached the conclusion that to carry out a search using the word concession is not required as it involves the possibility of only marginal benefit to the Claimants. Accordingly, I do not make an order for this to be done under Rule 31.12.
  111. The Claimants also asked for the words liberalize and liberalization to be used in further searches. Both these words have a "z" rather than an "s". The Defendants did search their documents using the words liberalsze and liberalisation. They now say that was out of an abundance of caution. In my judgment, in view of the fact that the relevant territories used the American spelling (at least some of the time) with a "z" rather than a "s", a reasonable search in the first instance should have included these two words spelt with a "z" as well as these two words spelt with a "s".
  112. I will next deal with the group of words which comprise: delay, frustra*, impede, obstruct, stall. It seems entirely possible that the word delay appears in e-mails relating to interconnection between Digicel and the Defendants. Of course, if the word Digicel or interconnect is used in the same e-mail then that e-mail will have already been revealed by the earlier search. The problem comes when the use of delay as a key word reveals a large number of documents which have nothing to do with the issues in this case. The position is made worse if one starts to add synonyms for the word delay. The Claimants asked for the words frustra*, impede, obstruct and stall to be used as key words. As before, it is very likely that these somewhat general words will reveal some documents which are relevant, and which have not already been found, but the use of these words is likely to bring to light, requiring manual review, many documents that have nothing to do with the issues in this case. On the question of synonyms there are, no doubt, many more words which might be added to delay which have a somewhat similar meaning.
  113. The points made in the last paragraph would, in the absence of countervailing arguments, lead to the conclusion that the words delay etc should not be used as key words. However, the Claimants' allegation that the Defendants deliberately delayed interconnection with Digicel is at the very heart of this claim. The argument based on context is not a complete answer to the Claimants' requirement that the word delay is used as a key word. I am, of course, most concerned that if delay is used as a key word, the search will throw up many documents which will have to be manually reviewed and which will turn out to be dealing with irrelevant matters. The position will be made worse if I add to the word delay synonyms such as frustra * impede, obstruct or stall. In my judgment, on balance, a reasonable search in the first instance would have included the word delay. It is right that there are many synonyms for delay which might have been used in place of that word. After considerable hesitation, I conclude that a reasonable search in the first instance would have included the words: delay, frustra*, impede, obstruct. I would omit the word stall. I am not sufficiently satisfied that this word is all that likely a synonym for delay.
  114. The last word I need to refer to is launch. The Claimants only seek to include the word launch if the Court declined to order delay, frustra*, obstruct, impede and stall. As I conclude that the first four but not the fifth of these words would have been included in a reasonable search I also conclude that it would not be necessary in addition to include the word launch.
  115. ORDER IN RELATION TO KEY WORD SEARCHES

  116. Having concluded that the words: interim agreement, interim rate, liberalize, liberalization, and delay, frustra *, impede and obstruct ought to have been included in a reasonable search, it follows that I will order, in relation to any e-mail accounts which are recovered as a result of the restoration of back-up tapes, those e-mail accounts are to be searched adopting the procedures already adopted by the Defendant but using these additional words as well as the 10 words originally selected by the Defendants.
  117. I need separately to consider whether to make the further order sought by the Claimants in relation to the e-mail accounts of the 16 individuals in Schedule 1 to the draft order. My earlier conclusions mean that I have determined that the Defendants did not carry out an adequate search first time round. Further, the Defendants acted unilaterally in this respect and did not follow the advice given in Part 31 Practice Direction as to co-operation with the other party to the litigation, in advance of the search being done.
  118. The Defendants say it would be wholly disproportionate for the Court now to require them to carry out a further search. They refer to the fact that the Defendants, unlike the Claimants, did not bring all the electronic documents together on one database. The result will be that if a further search is required the search will have to be done in situ in the various territories. It is also said that further searches are likely to throw up many further documents which (the Defendants submit) will be largely irrelevant and it will be a burdensome task to review manually so many documents. I have attempted, so far as I think appropriate, to balance the prospect of benefit from the exercise against the burden of the exercise so that where the burden on my assessment outweighs the benefit I have not included the key words asked for by the Claimants.
  119. My overall conclusion is that is appropriate to order the Defendants to carry out electronic searches of the e-mail accounts of the 16 identified individuals, using the additional key words which I have identified. As I understand it, it ought to be possible for the Defendants to run a negative key word search using as negative key words the 10 words they previously used so as to eliminate documents which have already been processed in the earlier round of searches.
  120. When judgment is handed down, I will hear Counsel as to the time which should be allowed for the Defendants to give the further disclosure which may be appropriate following further searches. I will also hear Counsel as to any consequential adjustments which may be appropriate to the directions previously given. At the hearing, the Defendants submitted that I should not order further disclosure because such an order would jeopardise the trial date. I will hear Counsel as to whether the trial will need to be re-fixed. It is not obvious to me at present that that will be necessary. If it is necessary to re-fix the trial date as a result of my further order for disclosure, then the Claimants do not complain because, of course, they seek an order for disclosure. As to the Defendants, unfortunately it was their failure to carry out a reasonable search in the first instance which has lead to the making of this further order.
  121. SPLIT TRIAL

  122. Earlier in this judgment I referred to the nature of the claims made by the Claimants against the Defendants. The Claimants claim damages in three separate ways. They first claim compensatory damages as a result of delays inflicted upon the Claimants by the Defendants. They secondly claim what they call restitutionary damages as a result of the gains or benefits obtained or retained by the Defendants as a result of the Defendants delaying the Claimants. Finally, the Claimants claim exemplary damages. To date, there has not been an order splitting the trial of quantum issues from other issues. However, the parties have proceeded to date on the basis that the quantification of any compensatory damages will be investigated and if necessary determined at the trial but, as regards the claim to restitutionary damages, the trial will be limited to determining whether this could be or should be a case in which restitutionary damages are in principle recoverable. If the Court were to hold that restitutionary damages ought in principle to be recoverable, there would then be a second stage at which there would be an account taken of the gains and benefits to the Defendants.
  123. I understand that the Claimants have given disclosure in relation to their claim to compensatory damages. The Defendants have not given any disclosure in relation to damages. In the present application, the Claimants seek an order that the Defendants give disclosure in relation to the claim to compensatory damages but the Claimants accept that the Defendants need not give disclosure in relation to the claim to restitutionary damages. If in due course a court were to hold that the Claimants were in principle entitled to restitutionary damages then there would have to be an order for disclosure against the Defendants at that point followed by an account of the gains and benefits on the part of the Defendants. Accordingly, even without an order for a split trial of the kind I discuss below, the parties appear to have produced a situation whereby there is a split of some kind between the issues decided at the first trial and the issues which might be decided at a possible second trial.
  124. The Claimants' claim to compensatory damages is far from straightforward. It will be the subject of extensive argument and, one imagines, considerable evidence. Even if the Claimants were to win on liability, there is bound to be a major dispute on causation as to what delay was inflicted upon the Claimants by the Defendants, for which the Defendants are liable to compensate the Claimants. It is entirely possible that the Claimants' claim to damages will be based on certain periods of delay but the judge after a trial might conclude that the Claimants have established an entitlement to damages for some delay, but a different or shorter period of delay from that advanced by the Claimants. The judge may end up concluding that there has to be a further investigation into quantum based upon his findings as to the extent of the delay for which the Defendants are liable. Further, the fact that the first trial is to deal with the quantum of any compensatory damages has led to this present dispute as to what disclosure is due from the Defendants on such points.
  125. On pre-reading the papers, it seemed to me that it was in the interests of the parties and of the Court to split the trial so that the quantification of damages, both compensatory and restitutionary damages, should take place at stage 2 rather than at stagel. I decided that it was important to raise this point with the parties at the outset, as an order for a split trial would remove the need to decide the dispute about disclosure of documents relating to quantum. I identified the line of demarcation between the first trial and the second trial as one producing the result that the first trial would decide issues of liability, issues of causation, issues of principle as regards the Claimants' entitlement to recover compensatory damages and/or restitutionary damages and/or exemplary damages but any quantification of compensatory damages and/or any restitutionary damages would follow at a second trial. At the second trial, both compensatory damages and any restitutionary damages would be dealt with and disclosure relating to both those questions (if both remained alive) would follow the first trial, in readiness for the second trial. If at the first trial the judge held that an award of exemplary damages was appropriate it would be a matter for the judge to decide whether any quantification of exemplary damages could be dealt with in a broad brush way at the first trial or whether it should take place at the second trial.
  126. Having identified at the beginning of the hearing my preliminary view as to the desirability of splitting the trial, the Claimants indicated they supported such a split and the Defendants opposed such a split. Mr Nourse on behalf of the Defendants made detailed submissions as to why a split trial was not appropriate.
  127. Mr Nourse's first point was that the existence of this litigation, even though the Defendants say that the claim has no prospects of success, was having an adverse effect on the Defendants' reputation and share price. The Defendants therefore wished the trial to take place as soon as possible. Splitting the trial would not, of course, delay the trial on liability and if the Defendants succeeded on liability, that would be the end of the matter. Of course if the Defendants failed on liability, it would seem that any adverse effect from this litigation on the Defendants' reputation would be justified. However, Mr Nourse identified the possibility of some possible halfway position whereby the Claimants succeeded on liability to a modest extent in relation to one territory only and the delay in having modest compensatory damages assessed in respect of that liability would prolong the period when the Defendants' reputation was adversely affected.
  128. I am not persuaded that Mr Nourse has identified a problem of any great seriousness or, at any rate, a problem which should persuade the Court not to achieve the many benefits which would be achieved from splitting the trial.
  129. Mr Nourse's second point was that if the Court split the trial of liability from the quantification of compensatory damages, one could end up with three trials. The suggested three trials were, first, a trial of liability, second a trial as to compensatory damages and third a trial as to restitutionary damages. In my judgment, the split I envisage will not produce that result. As part of this second point, discussing the mechanics of a split trial, Mr Nourse suggested there would be difficulties in separating the trial on causation from the quantification of compensatory damages. In my judgment, that ought not to be a serious difficulty and, at any rate, not one which persuades me to order a single trial of liability and quantum.
  130. Mr Nourse's third point was that it was now unfair for the Court to order a split trial. He referred to the fact that earlier in this litigation, the Defendants had applied for the trial of preliminary issues and the Claimants had cross applied for an order for a split trial. Lindsay J having heard detailed argument refused to order preliminary issues and gave a judgment setting out his reasons for his conclusion. In the course of the hearing before Lindsay J, the Claimants did not press their application for a split trial and the Defendants did not seek an order for a split trial in the alternative to the trial of preliminary issues. Lindsay J was therefore faced with both parties apparently concurring in the view that, in the absence of preliminary issues, there should be no split trial. Lindsay J referred briefly in his judgment to the application for a split trial. He did not order a split trial. He felt that "at this stage of these pleadings" a trial that was not split was likely to represent the cheapest and earliest resolution of all the issues which fall to be decided at first instance. Mr Nourse did not go so far as to say that I was only free to order a split trial at this stage if I was satisfied that the present was a proper case in which to revoke an earlier interlocutory order under CPR Rule 3.1.7. He submitted that I should hesitate long before ordering a split trial at this stage when the Claimants have not pressed their application for a split trial at an earlier stage and neither party had come to Court on this hearing positively seeking a split trial. I agree that I should hesitate before ordering a split trial in view of the previous view of the parties and in view of the fact that Lindsay J did not see the necessity for a split trial when he reviewed the matter at an earlier stage.
  131. Notwithstanding the hesitation to which I have referred, the matter has now been thoroughly argued before me and I am wholly persuaded that an order for a split trial is the right order to make. Insofar as Mr Nourse says that an order for a split trial would be unfair to his clients because the Claimants succeeded in seeing off the Defendants' application for preliminary issues by not pressing the earlier application for a split trial, I find it difficult to judge how much, if any, influence the Claimants' earlier behaviour had on the Defendants' failure to persuade Lindsay J to order preliminary issues. In any event, it seems to me that an order for a split trial is clearly the right thing to do in the interests of the parties as well as the Court. I will therefore make what seems to me to be the right order at the present time.
  132. DISCLOSURE IN RELATION TO QUANTUM

  133. Having decided that there should be a split trial of the kind discussed above, the parties are agreed that the Claimants' application for disclosure of documents in relation to quantum ought not to be pursued at this stage.


BAILII: Copyright Policy | Disclaimers | Privacy Policy | Feedback | Donate to BAILII
URL: http://www.bailii.org/ew/cases/EWHC/Ch/2008/2522.html