Crosmun v. Trustees Of Fayetteville Technical Cmty. Coll. ( 2019 )


Menu:
  •                 IN THE COURT OF APPEALS OF NORTH CAROLINA
    No. COA18-1054
    Filed: 6 August 2019
    Cumberland County, No. 16 CVS 8374
    DR. SANDRA T. CROSMUN, DR. MICHAEL HESS, LESLIE KEENAN, DR. JOHN
    R. PARKER, III, JAMIE E. STEVENS and CHERYL J. THOMAS, Plaintiffs,
    v.
    THE TRUSTEES OF FAYETTEVILLE TECHNICAL COMMUNITY COLLEGE, DR.
    LARRY J. KEEN, DR. DAVID L. BRAND and CARL MITCHELL, Defendants.
    Appeal by Defendants from an order entered 15 June 2018 by Judge Mary Ann
    Tally in Cumberland County Superior Court. Heard in the Court of Appeals 9 May
    2019.
    Tin, Fulton, Walker & Owen, PLLC, by S. Luke Largess, and Rabon Law Firm,
    PLLC, by Charles H. Rabon, Jr., Gregory D. Whitaker, and David G. Guidry,
    for Plaintiffs-Appellees.
    Yates, McLamb & Weyher, LLP, by Sean T. Partrick and David M. Fothergill,
    for Defendants-Appellants.
    INMAN, Judge.
    Seeking justice often involves enduring tedium. Many attorneys and judges
    unsurprisingly consider the discovery stage of civil litigation among the most prosaic
    and pedestrian aspects of practice.1           A single page among millions of records,
    1 Appellate courts are generally inoculated from directly engaging in discovery by virtue of
    their distance from pre-trial proceedings. Cf. Barnette v. Woody, 
    242 N.C. 424
    , 430, 
    88 S.E.2d 223
    ,
    CROSMUN V. TRUSTEES OF FAYETTEVILLE TECHNICAL COMMUNITY COLLEGE
    Opinion of the Court
    however—even one dismissed as irrelevant by the withholding party—may be
    considered a “smoking gun” to the party seeking its disclosure.
    Our discovery rules “facilitate the disclosure prior to trial of any unprivileged
    information that is relevant and material to the lawsuit so as to permit the narrowing
    and sharpening of the basic issues and facts that will require trial,” Am. Tel. & Tel.
    Co. v. Griffin, 
    39 N.C. App. 721
    , 726, 
    251 S.E.2d 885
    , 888 (1979), and are designed to
    encourage the “expeditious handling of factual information before trial so that critical
    issues may be presented at trial unencumbered by unnecessary or specious issues
    and so that evidence at trial may flow smoothly and objections and other
    interruptions be minimized.” Willis v. Duke Power Co., 
    291 N.C. 19
    , 34, 
    229 S.E.2d 191
    , 200 (1976). These vital purposes are no less present when electronic discovery
    (“eDiscovery”) is concerned; in many instances, their importance is heightened.2
    Electronically stored information, or ESI, “has become so pervasive that the
    volume of ESI involved in most cases dwarfs the volume of any paper records. This
    makes ESI the driving force behind the scope of preservation and discovery
    227 (1955) (“[I]t would require a tedious and time-consuming voyage of discovery for us to ascertain
    upon what the appellant is relying to show error, and our Rules and decisions do not require us to
    make any such voyage.”).
    2 Also no less present in eDiscovery is the monotony of document review. See, e.g., Lola v.
    Skadden, Arps, Slate, Meagher & Flom LLP, 620 Fed. App’x 37, 45 (2d Cir. 2015) (interpreting North
    Carolina law and holding that a California attorney, unlicensed in North Carolina, was not engaged
    in the practice of law in this State when he served as a contract attorney sorting electronic documents
    into categories devised by trial counsel, as he “exercised no legal judgment whatsoever” and “provided
    services that a machine could have provided”).
    -2-
    CROSMUN V. TRUSTEES OF FAYETTEVILLE TECHNICAL COMMUNITY COLLEGE
    Opinion of the Court
    requirements in many cases[.]” The Sedona Principles, Third Edition: Best Practices,
    Recommendations & Principles for Addressing Electronic Document Production, 19
    Sedona Conf. J. 1, 56 (2018) (hereinafter the “Sedona Principles”);3 see also Analog
    Devices, Inc. v. Michalski, 2006 NCBC 14, 
    2006 WL 3287382
    , at *5 (N.C. Super. Ct.
    Nov. 1, 2006) (“It is an inescapable fact that ninety-nine percent of all information
    being generated today is created and stored electronically. That fact may be shocking
    to judges who still find themselves buried in paper, but even our court systems are
    moving, albeit reluctantly, into the age of technology.” (citation omitted)).4
    3  The Sedona Principles, first published in 2004, seek to “serve as best practice
    recommendations and principles for addressing ESI issues in disputes—whether in federal or state
    court, and whether during or before the commencement of litigation.” Sedona Principles at 29. They
    were drafted and published by The Sedona Conference, “a 501(c)(3) research and educational institute
    that exists to allow leading jurists, lawyers, experts, academics, and others at the cutting edge of issues
    in the areas of antitrust law, complex litigation, and intellectual property rights, to come together in
    conferences and mini-think tanks . . . to engage in true dialogue—not debate—in an effort to move the
    law forward in a reasoned and just way.” 
    Id. at 8.
    The Sedona Principles and other publications of
    The Sedona Conference have been relied upon by federal and state courts nationwide, including North
    Carolina’s trial courts. See, e.g., Country Vintner of North Carolina, LLC v. E. & J. Gallo Winery, Inc.,
    
    718 F.3d 249
    (4th Cir. 2013) (relying on a glossary of eDiscovery terms published by The Sedona
    Conference); Race Tires America, Inc. v. Hoosier Racing Tire Corp., 
    674 F.3d 158
    (3d Cir. 2012) (citing
    various publications of The Sedona Conference concerning eDiscovery); John B. v. Goetz, 
    531 F.3d 448
    ,
    460 (6th Cir. 2008) (relying in part on the Sedona Principles in setting aside a trial court’s orders
    compelling forensic imaging of the defendants’ computer hard drives where the orders “fail[ed] to
    account properly for the significant privacy and confidentiality concerns present”); In re Queen’s
    University at Kingston, 
    820 F.3d 1287
    (Fed. Cir. 2016) (citing a publication of The Sedona Conference
    on ESI retention); In re State Farm Lloyds, 
    520 S.W.3d 595
    , 
    60 Tex. Sup. Ct. J. 1114
    (2017) (utilizing
    the Sedona Principles to resolve an eDiscovery issue governed by Texas law); Tumlin v. Tuggle
    Duggins, P.A., 2018 NCBC 49, 
    2018 WL 2327022
    , at *10 (N.C. Super. Ct. May 22, 2018) (relying on
    the Sedona Principles to determine whether sanctions for spoliation in eDiscovery were proper).
    4 Our Supreme Court, recognizing the continuous stream of cases involving ESI in the North
    Carolina Business Court, has promulgated a series of Business Court rules expressly requiring counsel
    to discuss ESI with their clients and conduct a conference with the opposing party to fashion an ESI
    production protocol. N.C. R. Bus. Ct. 10.2-.8 (2019).
    -3-
    CROSMUN V. TRUSTEES OF FAYETTEVILLE TECHNICAL COMMUNITY COLLEGE
    Opinion of the Court
    Despite the general disdain of courts for discovery disputes, in the words of
    Dorothea Dix, “[a]ttention to any subject will in a short time render it attractive, be
    it ever so disagreeable and tedious at first.” Dorothea L. Dix, Conversations on
    Common Things; Or, Guide to Knowledge. With Questions. For the Use of Schools and
    Families. 270 (4th ed. 1832).            This appeal presents this Court with our first
    opportunity to address the contours of eDiscovery within the context of North
    Carolina common and statutory law regarding the attorney-client privilege and work-
    product doctrine.
    Defendants appeal from an order compelling discovery that allows Plaintiffs’
    discovery expert access to Fayetteville Technical Community College’s (“FTCC”)
    entire computer system prior to any opportunity for Defendants to review and
    withhold documents that contain privileged information or are otherwise immune
    from discovery. Defendants argue that the order compelling discovery constitutes an
    impermissible involuntary waiver of those privileges.5 Plaintiffs argue that the trial
    court’s order, in conjunction with a stipulated protective order consented to by the
    parties, adequately protects Defendants’ privileges such that no waiver will occur.
    After careful review, we hold that the trial court abused its discretion by compelling
    5  We recognize that the work-product doctrine is “not a privilege, but a ‘qualified immunity.’ ”
    Evans v. United Serv. Auto. Ass’n, 
    142 N.C. App. 18
    , 28, 
    541 S.E.2d 782
    , 788 (2001) (quoting Willis v.
    Power Co., 291 N.C 19, 35, 
    229 S.E.2d 191
    , 201 (1976)). Because the issues raised in this appeal
    require no analysis differentiating attorney-client privilege and work-product immunity, to avoid
    confusion and for ease of reading, we use the word “privilege” broadly to encompass both traditional
    privileges, such as attorney-client privilege, and the qualified work-product immunity.
    -4-
    CROSMUN V. TRUSTEES OF FAYETTEVILLE TECHNICAL COMMUNITY COLLEGE
    Opinion of the Court
    production through a protocol that provides Plaintiffs’ agent with direct access to
    potentially privileged information and precludes reasonable efforts by Defendants to
    avoid waiving any privilege. We therefore vacate the order and remand for further
    proceedings not inconsistent with this opinion.
    I. FACTUAL AND PROCEDURAL HISTORY
    Plaintiffs, who are former employees of FTCC, filed suit against Defendants on
    7 December 2016, alleging retaliatory dismissals from FTCC in violation of the North
    Carolina Whistleblower Protection Act. See N.C. Gen. Stat. § 126-84 (2017). One
    week later, Plaintiffs’ counsel mailed a letter to each Defendant concerning the
    complaint and informing them of their obligation to preserve ESI in light of the
    litigation.   As the action advanced to discovery, Plaintiffs served two sets of
    interrogatories and requests for production of documents on Defendants in April and
    October of 2017. Defendants responded to both sets of discovery requests but objected
    to certain requests based on attorney-client, attorney work-product, and state and
    federal statutory privileges.
    In January 2018, Plaintiffs served Defendants with a third set of
    interrogatories and requests for production; Plaintiffs also mailed Defendants’
    counsel a letter asserting their discovery responses were incomplete and expressing
    concern that Defendants had destroyed responsive ESI.           In February 2018,
    Defendants’ counsel responded by letter denying any spoliation, rejecting Plaintiffs’
    -5-
    CROSMUN V. TRUSTEES OF FAYETTEVILLE TECHNICAL COMMUNITY COLLEGE
    Opinion of the Court
    claim that certain responses were incomplete, and agreeing to produce newly
    discovered additional responsive documents. Dissatisfied with Defendants’ response,
    Plaintiffs’ counsel sent additional letters reiterating their discovery demands.
    Plaintiffs followed their letters with a motion to compel requesting the trial court
    “[o]rder that the parties identify a computer forensics entity or individual who, at
    Defendants’ cost, will search the computer servers at FTCC to determine if
    Defendants have deleted emails and files pertaining to these discovery requests.”
    Plaintiffs’ motion came on for hearing on 26 February 2018 before Superior
    Court Judge Douglas B. Sasser. At that hearing, Judge Sasser issued an oral ruling
    requiring a forensic computer examination of FTCC’s servers and tasked the parties
    with submitting a proposed order.
    Judge Sasser’s oral ruling did little to quell the parties’ disagreement, and
    instead shifted their focus from what should be produced to what should appear in
    the proposed order. Defendants objected to Plaintiffs’ first proposed order on the
    ground that general language permitting Plaintiffs to search FTCC’s “computer files”
    for “deleted material” was over-broad, as it required a search of all of FTCC’s systems
    for any and all documents without limitation.            Plaintiffs refused to revise the
    proposed order and reiterated their belief that a search of FTCC’s entire system was
    both necessary and allowed by Judge Sasser’s ruling. Defendants then drafted their
    own proposed order.     Plaintiffs then revised their proposed order slightly and
    -6-
    CROSMUN V. TRUSTEES OF FAYETTEVILLE TECHNICAL COMMUNITY COLLEGE
    Opinion of the Court
    suggested Defendants draft a consent protective order to address concerns relating to
    the production of student information. Defendants objected that Plaintiffs’ revised
    order did not adequately protect privileged information or appropriately limit the
    scope of discoverable materials. But Defendants agreed to draft a protective order
    for consideration by the trial court and Plaintiffs.
    While the above discussions were ongoing, and roughly two weeks after the
    hearing before Judge Sasser, Defendants provided Plaintiffs with a supplemental
    document production.     Defendants also informed Plaintiffs that they had yet to
    complete a draft protective order, as the model protective orders they were working
    from “only covered inadvertent disclosure of confidential material[,]” and “[i]t has
    been much more difficult to address privilege issues under a forensic search
    situation.”   Plaintiffs replied that they would draft a proposed protective order
    prohibiting the disclosure of information protected by the Family Educational Rights
    and Privacy Act of 1974 (“FERPA”). Counsel for Defendants rejected that offer,
    expressing concern about how to prevent disclosure of materials within the attorney-
    client privilege or work-product immunity. As discussions surrounding the protective
    order continued, Plaintiffs submitted the parties’ competing proposed orders on the
    motion to compel to Judge Sasser.
    Judge Sasser entered Plaintiffs’ proposed order on the motion to compel on 16
    April 2018 (the “Forensic Examination Order”). In it, Judge Sasser provided for “a
    -7-
    CROSMUN V. TRUSTEES OF FAYETTEVILLE TECHNICAL COMMUNITY COLLEGE
    Opinion of the Court
    forensic examination of [FTCC’s] computer files” by a “forensic examiner.” The order
    also provided that “the parties shall work with the examiner to agree on key words
    and other search parameters to use in conducting this forensic review, which will
    cover the period from . . . July 2014 to the present[,]” and that “Plaintiff’s shall bear
    the initial costs of the forensic review.” However, the Forensic Examination Order
    did not address how a forensic examiner would be selected, whether the examiner
    would be an independent third party, or how the forensic examination itself would be
    conducted, and it left resolution of any confidentiality concerns to a future protective
    order to be submitted by the parties at a later date.
    Plaintiffs retained Clark Walton (“Mr. Walton”), an expert in computer
    forensics and a licensed North Carolina attorney, to draft a proposed forensic
    examination protocol to effectuate the Forensic Examination Order. As part of that
    process, Defendants permitted Mr. Walton to question members of FTCC’s
    Information Technology department about the nature of the college’s computer
    systems.     Plaintiffs then submitted a proposed forensic examination protocol to
    Defendants for their consideration on 21 May 2018.6 The proposed protocol, in
    pertinent part, provided for the following:
    6  The protocol provided to and adopted by the trial court was not drafted solely by Mr. Walton;
    rather, it appears from the hearing transcript that Mr. Walton provided certain model protocols for
    use by Plaintiffs’ counsel, who then crafted the protocol with input from Mr. Walton.
    -8-
    CROSMUN V. TRUSTEES OF FAYETTEVILLE TECHNICAL COMMUNITY COLLEGE
    Opinion of the Court
    (1) Mr. Walton would physically access, either at his offices or at FTCC, all
    FTCC devices on which responsive material might be found or from which
    responsive material may have been deleted;
    (2) From those devices, Mr. Walton would create searchable mirror images7
    and keep those images in his custody (the “Search Images”);
    (3) Mr. Walton would run search terms “and other search parameters” desired
    by Plaintiffs through the Search Images to identify responsive data (the
    “Keyword Search Hits”);
    (4) Mr. Walton would then remove non-user and other non-responsive system
    files from the Keyword Search Hits consistent with standard computer
    forensics practice;
    (5) Using six search terms identified by Plaintiffs in their proposed protocol,
    Mr. Walton would then screen out any potentially privileged documents from
    the Keyword Search Hits (the “Privilege Search Hits”);
    (6) Mr. Walton would immediately deliver those documents not flagged in the
    Privilege Search Hits to Plaintiffs for their review, while Defendants would
    review the Privilege Search Hits and create a privilege log for all items in the
    Privilege Search Hits that they believed to be privileged;
    (7) Finally, Defendants would provide Plaintiffs with the privilege log and any
    documents from the Privilege Search Hits that Defendants determined were
    not actually subject to a privilege.
    Plaintiffs also submitted a proposed stipulated protective order to Defendants on 24
    May 2018.
    By 4 June 2018, Defendants had not responded to the protocol or followed up
    with Plaintiffs about the joint protective order. Plaintiffs filed a combined motion to
    7  In eDiscovery parlance, a “mirror image” is “[a] bit by bit copy of any storage media. Often
    used to copy the configuration of one computer to anther [sic] computer or when creating a preservation
    copy.” The Sedona Conference Glossary: E-Discovery & Digital Information Management (Fourth
    Edition), 15 Sedona Conf. J. 340 (2014) (citation omitted).
    -9-
    CROSMUN V. TRUSTEES OF FAYETTEVILLE TECHNICAL COMMUNITY COLLEGE
    Opinion of the Court
    compel and motion for sanctions requesting that the trial court: (1) adopt the
    proposed protocol; (2) enter the proposed protective order; (3) shift the costs of
    discovery to Defendants; and (4) as a sanction for Defendants’ alleged violation of
    prior court orders, award Plaintiffs their attorneys’ fees incurred in obtaining the
    discovery.
    On the same day Plaintiffs filed the combined motion, Defendants faxed a
    letter objecting to the protocol, noting that their “main concern still lies with the
    improper protection of files that could be potentially privileged. . . . It is FTCC’s
    position that none of the documents . . . may be viewed by anyone who is not part of
    the FTCC privilege [group] prior to the files being reviewed and approved by FTCC.”
    Defendants also attached a red-lined version of the protocol identifying various
    provisions that they believed endangered their privileges.
    The parties appeared before the trial court for a hearing on Plaintiffs’ combined
    motion on 11 June 2018. They presented a stipulated protective order (the “Protective
    Order”) for entry by the trial court. The Protective Order covers personnel and any
    other information “generally treated as confidential[,]” and, if designated confidential
    upon production or within 21 days of discussion in deposition testimony, precludes
    dissemination of that information to outside parties except as necessary to the
    litigation.   It also addresses, in limited respects, the production of privileged
    information as follows:
    - 10 -
    CROSMUN V. TRUSTEES OF FAYETTEVILLE TECHNICAL COMMUNITY COLLEGE
    Opinion of the Court
    15. Review of the Confidential Information by those so
    authorized by this Order shall not waive the confidentiality
    of the documents or objections to production. Nothing
    contained in this Order and no action taken pursuant to it
    shall waive or prejudice the right of any party to contest
    the alleged relevancy, admissibility, or discoverability of
    the Confidential Information sought or provided in
    discovery.
    16. Nothing in the foregoing provisions of this Order shall
    be deemed to waive any privilege, or to preclude any party
    from seeking and obtaining, on an appropriate showing,
    such additional protection with respect to Confidential
    Information as that party may consider appropriate.
    ....
    17. In order to facilitate discovery, the inadvertent
    disclosure of documents or other information subject to
    confidentiality, a privilege, or other immunity from
    production shall be handled as follows:
    a. From time to time during the course of discovery, one or
    more of the parties may inadvertently disclose documents
    or other information subject to confidentiality, a privilege,
    or other immunity from production. Any such disclosure
    shall not be deemed a waiver of the confidential, privileged,
    or immune nature of that document or information, or of
    any related subject matter.
    b. To that end, if a producing party, through inadvertence,
    error or oversight, produces any document(s) or
    information that it believes is immune from discovery
    pursuant to any attorney-client privilege, attorney work
    product immunity or any other privilege or immunity, such
    production shall not be deemed a waiver, and the
    producing party may give written notice to the receiving
    party that the document(s) or information so produced is
    deemed privileged and that the return of the document(s)
    or information is requested. Upon receipt of such written
    - 11 -
    CROSMUN V. TRUSTEES OF FAYETTEVILLE TECHNICAL COMMUNITY COLLEGE
    Opinion of the Court
    notice, the receiving party shall immediately undertake to
    gather the original and all such copies to the producing
    party, and shall promptly destroy any newly created
    derivative document such as a summary of or comment on
    the inadvertently produced information.
    Four days after the hearing and entry of the Protective Order, the trial court
    entered its order on Plaintiffs’ combined motion (the “Protocol Order”). That order
    adopted the protocol proposed by Plaintiffs without alteration, and provided for Mr.
    Walton, as “Plaintiffs’ expert[,]” to conduct a three-week-long forensic examination of
    the Search Images at his offices.             The trial court denied Plaintiffs’ motion for
    sanctions.
    Defendants filed their notice of appeal from the Protocol Order and a motion
    to stay on 21 June 2018. On 3 July 2018, the trial court entered a consent order on
    Defendants’ motion to stay, requiring the immediate imaging of certain discrete
    computer systems but otherwise staying operation of the Protocol Order.8
    II. ANALYSIS
    A. Appellate Jurisdiction
    8 On appeal, Plaintiffs argue that the specific systems listed in the order granting the stay are
    the only systems subject to forensic examination under the Protocol Order. This does not appear to be
    the case, however, as neither the Forensic Examination Order nor the Protocol Order contains any
    such limit, and the stay does not modify the prior orders. The record reflects that Plaintiffs rejected
    Defendants’ request to include such a limit in their proposed order submitted to Judge Sasser, which
    was later entered as the Forensic Examination Order. Applying their plain language, we interpret
    both the Forensic Examination and Protocol Orders as requiring a complete imaging of all of
    Defendants’ systems.
    - 12 -
    CROSMUN V. TRUSTEES OF FAYETTEVILLE TECHNICAL COMMUNITY COLLEGE
    Opinion of the Court
    Interlocutory orders, or those orders entered in the course of litigation that do
    not resolve the case and leave open additional issues for resolution by the trial court,
    are ordinarily not subject to immediate appeal. Sessions v. Sloane, 
    248 N.C. App. 370
    , 380, 
    789 S.E.2d 844
    , 853 (2016). Such orders are appealable, however, “when
    the challenged order affects a substantial right of the appellant that would be lost
    without immediate review.” Campbell v. Campbell, 
    237 N.C. App. 1
    , 3, 
    764 S.E.2d 630
    , 632 (2014) (citations and quotations omitted). That said, “[a]n order compelling
    discovery is interlocutory in nature and is usually not immediately appealable
    because such orders generally do not affect a substantial right.” Sessions, 248 N.C.
    App. at 
    380, 789 S.E.2d at 853
    (citing Sharpe v. Worland, 
    351 N.C. 159
    , 163, 
    522 S.E.2d 577
    , 579 (1999)).
    An interlocutory order compelling discovery affects a substantial right when “a
    party asserts a statutory privilege which directly relates to the matter to be disclosed
    under an interlocutory discovery order, and the assertion of such privilege is not
    otherwise frivolous or insubstantial[.]” 
    Sharpe, 351 N.C. at 166
    , 522 S.E.2d at 581.
    This rule applies to attorney work-product immunity and common law attorney-client
    privilege. See, e.g., K2 Asia Ventures v. Trota, 
    215 N.C. App. 443
    , 446, 
    717 S.E.2d 1
    ,
    4 (2011) (holding an interlocutory order requiring production over the producing
    party’s objections on attorney-client privilege and work-product immunity grounds
    affected a substantial right subject to immediate appeal).
    - 13 -
    CROSMUN V. TRUSTEES OF FAYETTEVILLE TECHNICAL COMMUNITY COLLEGE
    Opinion of the Court
    Blanket assertions that production is not required due to a privilege or
    immunity are insufficient to demonstrate the existence of a substantial right.
    
    Sessions, 248 N.C. App. at 381
    , 789 S.E.2d at 853. But specific objection to a discrete
    enumerated request for production or a document-by-document identification of
    alleged privileged information may suffice. See, e.g., K2 Asia 
    Ventures, 215 N.C. App. at 446-48
    , 717 S.E.2d at 4-5 (holding that some appealing defendants demonstrated
    a substantial right by asserting work-product immunity and attorney-client privilege
    as to a specific request for production of documents in their discovery responses while
    other appealing defendants failed to show a substantial right by simply prefacing
    their discovery responses with a general objection on those grounds not particularized
    to any specific request).
    Plaintiffs argue that Defendants have failed to demonstrate that enforcement
    of the Protocol Order will affect a substantial right because Defendants have yet to
    identify specific privileged documents that would be captured and produced under
    the protocol. A document-by-document assertion of privilege, however, is not strictly
    required. Although “objections made and established on a document-by-document
    basis are sufficient to assert a privilege[,]” 
    Sessions, 248 N.C. App. at 381
    , 789 S.E.2d
    at 853 (citation and quotation marks omitted) (emphasis added), they are not the
    exclusive means of demonstrating the loss of a substantial right and the appealable
    nature of a discovery order. K2 Asia 
    Ventures, 215 N.C. App. at 446
    , 717 S.E.2d at 4;
    - 14 -
    CROSMUN V. TRUSTEES OF FAYETTEVILLE TECHNICAL COMMUNITY COLLEGE
    Opinion of the Court
    see also Friday Investments, LLC v. Bally Total Fitness of the Mid-Atlantic, Inc., 
    247 N.C. App. 641
    , 
    788 S.E.2d 170
    (2016) (holding that a discovery order affected a
    substantial right and was immediately appealable under the circumstances even
    though the appellants failed to assert particularized claims of attorney-client
    privilege in their initial discovery responses), aff’d as modified on separate grounds,
    
    370 N.C. 235
    , 
    805 S.E.2d 664
    (2017).         We base our determination on whether
    Defendants have legitimately asserted the loss of a privilege or immunity absent
    immediate appeal. See, e.g., Evans v. United States Auto. Ass’n, 
    142 N.C. App. 18
    , 24,
    
    541 S.E.2d 782
    , 786 (holding an interlocutory discovery order was immediately
    appealable after determining the appellants’ assertion of privilege was neither
    frivolous nor insubstantial and that the privilege would be lost absent immediate
    review).
    Defendants made their specific objections on privilege and immunity grounds
    early and often. In their responses to Plaintiffs’ requests for production of documents,
    Defendants particularized these objections to specific requests. When Plaintiffs first
    identified deficiencies in Defendants’ document production, Defendants responded
    that they would be “re-running all . . . discovery key word searches” but would require
    “some time to review [any newly discovered documents] for potential privilege issues
    before some documents will be produced.” Although we do not have a transcript of
    the hearing before Judge Sasser, Defendants communicated to Plaintiffs during the
    - 15 -
    CROSMUN V. TRUSTEES OF FAYETTEVILLE TECHNICAL COMMUNITY COLLEGE
    Opinion of the Court
    proposed order drafting process that any forensic examination protocol and protective
    order would need to protect privileged information, as they did not “think [Judge
    Sasser] ordered disclosure of attorney/client or work product material.”
    After Plaintiffs filed their combined motion to compel and motion for sanctions,
    Defendants filed a response objecting to the protocol because it “would require
    wholesale production of all of FTCC’s attorney/client privileged information to the
    Plaintiffs’ forensic agent.” (emphasis in original). Defendants likewise lodged that
    objection in a letter to Plaintiffs requesting certain changes to the protocol as
    proposed. Defendants also raised their privilege concerns directly with the trial court
    at the hearing on Plaintiffs’ combined motion to compel and for sanctions. Plaintiffs
    have never disputed that the forensic search and creation of the Search Images would
    capture potentially privileged information; to the contrary, they have simply argued
    that the protocol protects those privileged documents from production. Defendants’
    particularized, continuous, and timely objections do not appear frivolous from this
    record, especially when Plaintiffs do not deny the possibility that the forensic search
    will capture privileged information.
    It also appears that Defendants’ privileges will be lost absent immediate
    appeal. The Protocol Order requires the indiscriminate production of Defendants’
    entire computer system via the Search Images to Plaintiffs’ expert, a process which,
    as explained infra, immediately violates Defendants’ privilege interests. As a result,
    - 16 -
    CROSMUN V. TRUSTEES OF FAYETTEVILLE TECHNICAL COMMUNITY COLLEGE
    Opinion of the Court
    Defendants’ meritorious and substantial objections will be lost absent immediate
    review, and the Protocol Order constitutes an interlocutory order affecting a
    substantial right subject to immediate appeal. See 
    Sharpe, 351 N.C. at 166
    , 522
    S.E.2d at 581; K2 Asia 
    Ventures, 215 N.C. App. at 446
    , 717 S.E.2d at 4; 
    Sessions, 248 N.C. App. at 381
    , 789 S.E.2d at 853.
    B. Standard of Review
    Discovery orders compelling production and applying the attorney-client
    privilege and work-product immunity are subject to an abuse of discretion analysis.
    
    Sessions, 248 N.C. App. at 381
    , 789 S.E.2d at 853-54. “Under an abuse of discretion
    standard, this Court may only disturb a trial court’s ruling if it was manifestly
    unsupported by reason or so arbitrary that it could not have been the result of a
    reasoned decision.” 
    Id. at 381,
    789 S.E.2d at 854 (citation and internal quotation
    marks omitted). “When discretionary rulings are made under a misapprehension of
    the law, this may constitute an abuse of discretion.” Gailey v. Triangle Billiards &
    Blues Club, Inc., 
    179 N.C. App. 848
    , 851, 
    635 S.E.2d 482
    , 484 (2006) (citations
    omitted).
    C. eDiscovery Orders and the Protection of Privilege
    We write on a relatively blank slate regarding privileges in the forensic
    imaging and eDiscovery context.        As our Business Court has observed, “North
    Carolina case law addressing problems inherent in electronic discovery, including
    - 17 -
    CROSMUN V. TRUSTEES OF FAYETTEVILLE TECHNICAL COMMUNITY COLLEGE
    Opinion of the Court
    waiver arising from inadvertent disclosure of privileged information, is not yet well
    developed.” Blythe v. Bell, 2012 NCBC 42, 
    2012 WL 3061862
    , at *8 (N.C. Super. Ct.
    July 26, 2012).
    North Carolina authority regarding eDiscovery is bare bones, generally
    providing that “discovery of [ESI] stands on equal footing with discovery of paper
    documents.” N.C. R. Civ. P. 34, Comment to the 2011 Amendment (2017); see also
    N.C. R. Civ. P. 26(b) (defining ESI and including it within the scope of discovery
    subject to the same privileges as paper documents).
    No statute, procedural rule, or decision by this Court or the North Carolina
    Supreme Court has delineated the parameters of eDiscovery protocols with respect
    to the protection of documents and information privileged or otherwise immune from
    discovery.
    Just as a producing party is responsible for collecting, reviewing, and
    producing responsive paper documents, it is generally understood that “[r]esponding
    parties are best situated to evaluate the procedures, methodologies, and technologies
    appropriate for preserving and producing their own electronically stored
    information.” Principle 6, Sedona Principles at 118. It behooves a responsive party’s
    attorneys, then, to engage with opposing counsel and jointly develop a mutually
    agreeable means of conducting eDiscovery when it is clear that litigation will involve
    ESI. See, e.g., Comment 3.b., Sedona Principles at 76-78 (noting that cooperation and
    - 18 -
    CROSMUN V. TRUSTEES OF FAYETTEVILLE TECHNICAL COMMUNITY COLLEGE
    Opinion of the Court
    agreement on eDiscovery may reduce costs and expedite discovery for both parties
    while avoiding “expensive motion practice, which may lead to undesirable court
    orders”); N.C. R. Civ. P. 26(f) (providing a mechanism for discovery conferences to
    address production of ESI); N.C. R. Bus. Ct. 10.2-.3 (requiring a discovery conference
    that includes discussion of eDiscovery and detailing issues that should be addressed
    via an ESI production protocol).
    Absent controlling authority directly on point, we consider decisions by courts
    in other jurisdictions as well as the universally persuasive authority, common sense.
    Forensic imaging of a recalcitrant responding party’s computers is one method
    of resolving a dispute over ESI. See, e.g., Feeassco, LLC v. Steel Network, Inc., ___
    N.C. App. ___, ___, 
    826 S.E.2d 202
    , 209 (2019) (holding a trial court did not abuse its
    discretion in ordering an onsite audit of the producing party’s electronic sales and
    accounting systems for potentially responsive ESI by an independent auditor when
    the producing party conceded it had failed to comply with discovery requests).
    However, as has been recognized by various state and federal courts, “[a] Court must
    be mindful of the potential intrusiveness of ordering forensic imaging.” Wynmoor
    Community Council, Inc. v. QBE Ins. Co., 
    280 F.R.D. 681
    , 687 (S.D. Fla. 2012) (citing
    Bennett v. Martin, 
    186 Ohio App. 3d 412
    , 425, 
    928 N.E.2d 763
    (10th District 2009));
    see also In re Ford Motor Co., 
    345 F.3d 1315
    , 1317 (11th Cir. 2003) (vacating the
    district court’s order to provide the requesting party unlimited, direct access to the
    - 19 -
    CROSMUN V. TRUSTEES OF FAYETTEVILLE TECHNICAL COMMUNITY COLLEGE
    Opinion of the Court
    responding party’s databases without any protocol for the search, including no search
    terms, and finding that direct access is not permissible without a factual finding of
    non-compliance with discovery rules); Exec. Air Taxi Corp. v. City of Bismarck, 
    518 F.3d 562
    , 569 (8th Cir. 2008) (holding that the district court did not abuse its
    discretion in declining to order a forensic analysis of a computer because the
    responding party had provided all relevant documents in hard copy and forensic
    discovery could disclose privileged documents).9
    Forensic examinations of ESI may be warranted when there exists some
    factual basis to conclude that the responding party has not met its duties in the
    production of discoverable information. Feeassco, ___ N.C. App. at ___, 826 S.E.2d at
    209; see also N.C. R. Civ. P. 34, Comment to the 2011 Amendment (“If a party that
    receives produced information claims that it needs . . . access to the full database or
    system that generated the information, the question of . . . direct access will turn on
    whether the requesting party can show that there is some specific reason, beyond
    general suspicion, to doubt the information and that the burden of providing direct
    access is reasonable in light of the importance of the information and the
    circumstances of the case.”); Wynmoor Community Council, 280 F.R.D at 687
    (allowing forensic imaging to recover potentially responsive deleted documents when
    9 The Sedona Principles likewise caution that “[i]nspection of an opposing party’s computer
    system under Rule 34 [of the Federal Rules of Civil Procedure] and state equivalents is the exception
    and not the rule for discovery of ESI.” Comment 6.d., Sedona Principles at 128.
    - 20 -
    CROSMUN V. TRUSTEES OF FAYETTEVILLE TECHNICAL COMMUNITY COLLEGE
    Opinion of the Court
    the producing party was “either unwilling or unable to conduct a search of their
    computer systems for documents responsive to . . . discovery requests”).
    Even when a forensic examination is proper and necessary, any protocol
    ordered must take into account privileges from production that have not been waived
    or otherwise lost. Broadly speaking, courts ordering forensic examinations should be
    mindful of:
    a) revealing trade secrets;
    b) revealing other highly confidential or private
    information, such as personnel evaluations and payroll
    information, properly private to individual employees;
    c) revealing confidential attorney-client or work-product
    communications;
    d) unreasonably disrupting the ongoing business;
    e) endangering the stability of operating systems, software
    applications, and electronic files if certain procedures or
    software are used inappropriately; and
    f) placing a responding party’s computing systems at risk
    of a data security breach.
    Comment 6.d., Sedona Principles at 128-29.10 As the Sixth Circuit has observed,
    “even if acceptable as a means to preserve electronic evidence, compelled forensic
    imaging is not appropriate in all cases, and courts must consider the significant
    10 These interests are certainly present in this case, as FTCC maintains significant amounts
    of personal data concerning its students that are subject to FERPA requirements.
    - 21 -
    CROSMUN V. TRUSTEES OF FAYETTEVILLE TECHNICAL COMMUNITY COLLEGE
    Opinion of the Court
    interests implicated by forensic imaging before ordering such procedures.” John 
    B., 531 F.3d at 460
    (citation omitted).
    To resolve these concerns, it is recommended that a trial court’s chosen forensic
    examination protocol: “(1) be documented in an agreed-upon (and/or court-ordered)
    protocol; (2) recognize the rights of non-parties, such as employees, patients, and
    other entities; and (3) be narrowly restricted to protect confidential and personally
    identifiable information and system integrity as well as to avoid giving . . . access to
    information unrelated to the litigation.” Comment 6.d., Sedona Principles at 129. In
    every decision cited favorably by Plaintiffs for ordering a forensic examination or
    other eDiscovery protocol, the trial court also took pains to address at least some of
    the above concerns. See Bank of Mongolia v. M & P Global Fin. Servs., Inc., 
    258 F.R.D. 514
    , 520-21 (S.D. Fla. 2009) (adopting a protocol that contained provisions
    designed to protect the producing parties’ privileges, including an express holding
    that production to a court-appointed third-party expert would not constitute waiver
    and allowing the producing parties to conduct a prior privilege review of all
    documents to be produced); Wynmoor Community 
    Council, 280 F.R.D. at 687-88
    (adopting the Bank of Mongolia protocol while acknowledging the “potential
    intrusiveness of . . . compelling a forensic examination”); Adair v. EQT Prod. Co., Nos.
    1:10CV00037, 1:10CV00041, 
    2012 WL 2526982
    , *4 (W.D. Va. June 29, 2012) (ordering
    an eDiscovery protocol that did not include an opportunity for prior privilege review
    - 22 -
    CROSMUN V. TRUSTEES OF FAYETTEVILLE TECHNICAL COMMUNITY COLLEGE
    Opinion of the Court
    of produced documents solely because other protective and clawback orders entered
    in the case “protect any inadvertently produced privileged documents from waiver
    and any nonrelevant documents from use or disclosure outside this litigation”).11
    A court-ordered eDiscovery protocol, no matter how protective of a party’s
    confidences, may result in the production of privileged information. See, e.g., Adair
    
    2012 WL 2526982
    at *4 (“To be sure, there is the potential for privileged or
    nonrelevant documents to slip through the cracks and be turned over to the other
    side.”). Federal district courts may turn to Rule 502(d) of the Federal Rules of
    Evidence to resolve the issue, which expressly permits “[a] federal court [to] order
    that the privilege or protection is not waived by disclosure connected with the
    litigation pending before the court—in which event the disclosure is also not a waiver
    in any other federal or state proceeding.”              Fed. R. Evid. 502(d) (2019).          North
    Carolina’s Rules of Evidence and Rules of Civil Procedure contain no direct analog,
    however; thus, litigants in our courts may wish to agree to protective orders to
    address additional privilege concerns when a forensic examination has been ordered.
    See N.C. R. P. C. 1.6(c) (2017) (“A lawyer shall make reasonable efforts to prevent the
    11  Adair did not allow the requesting party direct access to the responding party’s systems
    through a forensic examination, and instead established a protocol by which the responding party
    would conduct a review of its own ESI. If the district court in Adair had ordered a forensic review by
    the requesting party without offering the producing party an opportunity to review any eventual
    production for privilege, it would have been outside the norm, as “courts that have allowed [forensic
    access] generally have required that . . . no information obtained through the inspection be produced
    until the responding party has had a fair opportunity to review that information.” Comment 6.d.,
    Sedona Principles at 129.
    - 23 -
    CROSMUN V. TRUSTEES OF FAYETTEVILLE TECHNICAL COMMUNITY COLLEGE
    Opinion of the Court
    inadvertent or unauthorized disclosure of, or unauthorized access to, information
    relating to the representation of a client.”). A court ordering a forensic examination
    should encourage parties to enter into a protective order before requiring a forensic
    examination “to guard against any release of proprietary, confidential, or personally
    identifiable ESI accessible to the adversary or its expert [in the course of the forensic
    examination].” Comment 10.e., Sedona Principles at 152.
    D. North Carolina Law on Privileges from Production
    Although the advent of eDiscovery has undeniably altered how discovery is
    conducted by parties and overseen by courts, it has not thus far influenced North
    Carolina law regarding privileges.12 Fundamentally, the attorney-client privilege
    and work-product immunity doctrine attach to ESI in the same manner and to the
    same extent they apply to paper documents or verbal communications. See, e.g., N.C.
    R. Civ. P. 26(b)(5) (providing a mechanism for asserting privilege or work-product
    immunity as to “information otherwise discoverable[,]” which includes ESI under the
    Rule).
    Determining whether the common law attorney-client privilege attaches to
    discoverable information—including ESI—depends on the following five criteria:
    12We acknowledge that this may change if and when cases concerning the involuntary
    disclosure of privileged ESI make their way to our appellate courts. See, e.g., Blythe, 
    2012 WL 3061862
    , at *8-14 (discussing in detail inadvertent waiver of privilege in the eDiscovery context).
    Because no inadvertent disclosure has yet occurred in this case, this particular question of inadvertent
    waiver under North Carolina common law is not squarely before this Court, and we do not resolve it
    here.
    - 24 -
    CROSMUN V. TRUSTEES OF FAYETTEVILLE TECHNICAL COMMUNITY COLLEGE
    Opinion of the Court
    (1) the relation of attorney and client existed at the time
    the communication was made, (2) the communication was
    made in confidence, (3) the communication relates to a
    matter about which the attorney is being professionally
    consulted, (4) the communication was made in the course
    of giving or seeking legal advice for a proper purpose
    although litigation need not be contemplated and (5) the
    client has not waived the privilege.
    In re Miller, 
    357 N.C. 316
    , 335, 
    584 S.E.2d 772
    , 786 (2003). “[T]he [attorney-client]
    privilege belongs solely to the client.” 
    Id. at 338-39,
    584 S.E.2d at 788. Critically, it
    is the client’s alone to waive, for “[i]t is not the privilege of the court or any third party.”
    
    Id. at 338,
    584 S.E.2d at 788 (citations and quotation marks omitted) (emphasis in
    original). Compulsory, involuntary disclosure may be ordered only “[w]hen certain
    extraordinary circumstances are present” and some applicable exception, such as the
    crime-fraud exception, apply. 
    Id. at 335,
    584 S.E.2d at 786.
    Work-product immunity, which “protects materials prepared in anticipation of
    litigation from discovery,” 
    Sessions, 248 N.C. App. at 383
    , 789 S.E.2d at 855, is also
    subject to a particularized test that asks:
    Whether, in light of the nature of the document and the
    factual situation in the particular case, the document can
    fairly be said to have been prepared or obtained because of
    the prospect of litigation. But the converse of this is that
    even though litigation is already in prospect, there is no
    work product immunity for documents prepared in the
    regular course of business rather than for purposes of the
    litigation.
    - 25 -
    CROSMUN V. TRUSTEES OF FAYETTEVILLE TECHNICAL COMMUNITY COLLEGE
    Opinion of the Court
    Cook v. Wake Cnty. Hosp. Sys., Inc., 
    125 N.C. App. 618
    , 624, 
    482 S.E.2d 546
    , 551
    (1997) (emphasis omitted). This immunity, too, is waivable. See, e.g., State v. Hardy,
    
    293 N.C. 105
    , 126, 
    235 S.E.2d 828
    , 841 (1977) (holding work-product immunity is
    waived when a party seeks to introduce its counsel’s work-product into evidence).
    Information covered by the doctrine may nonetheless be discovered if the requesting
    party demonstrates a “substantial need of the materials” and “is unable without
    undue hardship to obtain the substantial equivalent of the materials by other means.”
    N.C. R. Civ. P. 26(b)(3).
    Both the work-product immunity and attorney-client privilege are subject to
    statutory modification.     See, e.g., N.C. Gen. Stat. §§ 132-1.1 and 132-1.9 (2017)
    (altering the application and availability of attorney-client privilege and work-
    product immunity in the public records context). But neither statute nor caselaw has
    provided any parameters for eDiscovery protocols in these respects.
    E. The Protocol Order
    This appeal does not, at its core, turn on the appropriateness of the Forensic
    Examination Order. Defendants have not appealed that order, nor do they present
    any argument that a forensic examination was inappropriate. As is the case with
    many discovery disputes, we have little doubt that information pertinent to
    Defendants’ conduct in discovery did not make its way into the printed record before
    us; Judge Sasser, as a judge of the trial division tasked with overseeing the discovery,
    - 26 -
    CROSMUN V. TRUSTEES OF FAYETTEVILLE TECHNICAL COMMUNITY COLLEGE
    Opinion of the Court
    was well positioned to review the conduct of the parties before him—whether dilatory
    or otherwise—and determine in his discretion that the purposes of discovery were
    best served by entry of the Forensic Examination Order. Similarly, Judge Tally was
    in the best position to determine that, although sanctions were not appropriate, a
    court ordered protocol that weighed Plaintiffs’ discovery needs more heavily than
    Defendants’ was warranted. Although we ultimately vacate the Protocol Order for
    the reasons stated infra, this opinion should not be read on remand as questioning
    the necessity of either the Forensic Examination Order or entry of a protocol order
    favorable to Plaintiffs’ interests. See, e.g., Capital Resources, LLC v. Chelda, Inc., 
    223 N.C. App. 227
    , 234, 
    735 S.E.2d 203
    , 209 (2012) (“It is well-established that, because
    the primary duty of a trial judge is to control the course of the trial so as to prevent
    injustice to any party, the judge has broad discretion to control discovery.” (citations
    and quotation marks omitted)).
    We identify error in two interrelated provisions of the Protocol Order. First, it
    allows Plaintiffs’ expert, rather than an independent third party, the authority to
    directly access and image the entirety of Defendants’ computer systems absent regard
    for Defendants’ privilege. Second, it orders the delivery of responsive documents to
    Plaintiffs without allowing Defendants an opportunity to review them for privilege.
    In both instances, the protocol compels an involuntary waiver, i.e., a violation of
    Defendants’ privileges. Because North Carolina law is clear, albeit only in the analog
    - 27 -
    CROSMUN V. TRUSTEES OF FAYETTEVILLE TECHNICAL COMMUNITY COLLEGE
    Opinion of the Court
    discovery context until now, that a court cannot compel a party to waive or violate its
    own attorney-client privilege absent some prior acts constituting waiver or an
    applicable exception, In re 
    Miller, 357 N.C. at 333-35
    , 584 S.E.2d at 786-87, those two
    provisions of the Protocol Order were entered under a misapprehension of the law
    constituting an abuse of discretion. Because production of information subject to the
    work-product immunity can only be compelled upon a showing of substantial need
    and undue hardship, N.C. R. Civ. P. 26(b)(3), requiring the production of any work-
    product documents to Mr. Walton and Plaintiffs without any such showing is
    similarly improper.
    The Protocol Order, as 
    recounted supra
    , describes Mr. Walton as “Plaintiffs’
    expert[.]” Plaintiffs have acknowledged that Mr. Walton is their agent and not
    Defendants’, and conceded at oral argument that appointment of a special master
    would be “more neutral” than the present arrangement. Further, although Plaintiffs
    were unsure whether an attorney-client relationship exists between themselves and
    Mr. Walton, retaining an attorney as an eDiscovery expert provides the opportunity
    for creation of an attorney-client relationship.         See, e.g., Jay E. Grenig et al.,
    Electronic Discovery & Records & Information Management Guide: Rules, Checklists,
    and Forms § 8:3 (2018-2019 ed.) (“Perhaps one of the key and often overlooked
    benefits of e-discovery counsel is the protection of the attorney-client and work-
    product privileges, as well as the e-discovery counsel’s ability to offer legal advice.
    - 28 -
    CROSMUN V. TRUSTEES OF FAYETTEVILLE TECHNICAL COMMUNITY COLLEGE
    Opinion of the Court
    Vendors who sell e-discovery products often offer consulting services with the
    products, but are prohibited from offering legal advice. While the advice of
    consultants may not be protected, legal advice from e-discovery counsel will have the
    protection of privilege.”).13
    The Protocol Order tasks Mr. Walton with creating the Search Images, which
    contain all of FTCC’s data, by mirror imaging FTCC’s systems. The order provides
    for him to take those Search Images to his own office and conduct a forensic
    examination of those images pursuant to the protocol over the course of three weeks.
    A comparable protocol for a paper production would allow Plaintiffs’ expert to
    photocopy all of Defendants’ documents (including those in their in-house counsel’s
    file cabinets), take those copies off-site, and then review those files for responsive
    documents, both privileged and non-privileged, without Defendants having had an
    opportunity to conduct their own review of those copies first. Such a process would
    violate Defendants’ attorney-client privilege as a disclosure to the opposing party.
    See, e.g., Industrotech Constructors, Inc. v. Duke University, 
    67 N.C. App. 741
    , 743,
    
    314 S.E.2d 272
    , 274 (1984) (“It is well established in this state that even absolutely
    13 eDiscovery Attorneys are subject to fiduciary and ethical professional standards provided by
    our common law and the North Carolina Rules of Professional Conduct, including those that require
    the eDiscovery attorney to place his clients’ interests over his own and those of the opposing party.
    - 29 -
    CROSMUN V. TRUSTEES OF FAYETTEVILLE TECHNICAL COMMUNITY COLLEGE
    Opinion of the Court
    privileged matter may be inquired into where the privilege has been waived by
    disclosure”). The digital equivalent does so as well.14
    Plaintiffs contend that the Protocol Order’s provision for a privilege screen
    prior to any production from Mr. Walton to Plaintiffs adequately protects Defendants’
    privilege. We disagree.
    The Protocol Order requires Mr. Walton to use search terms to scan the Search
    Images for any potentially responsive files—the Keyword Search Hits—and then
    tasks him with searching the Keyword Search Hits with different search terms to
    identify and segregate potentially privileged files—the Privilege Search Hits. The
    Protocol Order allows Defendants to review the Privilege Search Hits for privileged
    documents to withhold under a privilege log, while Mr. Walton would turn over any
    Keyword Search Hits not identified as Privilege Search Hits directly to Plaintiffs.
    Plaintiffs argue that because Mr. Walton is prohibited from sharing the Privilege
    Search Hits with Plaintiffs and Defendants will have an opportunity to review the
    Privilege Search Hits prior to production, Defendants’ privilege will not be violated.
    We are unconvinced. While the use of search terms assists in preventing
    disclosure of privileged materials, it is far from a panacea. “[A]ll keyword searches
    are not created equal; and there is a growing body of literature that highlights the
    14 Nothing in this opinion should be read to call into question the competency or integrity of
    Mr. Walton. Our holding would not change no matter who the Plaintiffs had selected to serve as their
    expert, as the error present in the Protocol Order is a legal one, independent of the individuals tasked
    with carrying the order out.
    - 30 -
    CROSMUN V. TRUSTEES OF FAYETTEVILLE TECHNICAL COMMUNITY COLLEGE
    Opinion of the Court
    risks associated with conducting an unreliable or inadequate keyword search or
    relying exclusively on such searches for privilege review.” Victor Stanley, Inc. v.
    Creative Pipe, Inc., 
    250 F.R.D. 251
    , 256-57 (D. Md. May 29, 2008). Selecting the
    appropriate keywords and search parameters requires special care, as “there are well-
    known limitations and risks associated with [keyword searches], and proper selection
    and implementation obviously involves technical, if not scientific knowledge.” 
    Id. at 260
    (citations omitted). To determine whether or not selected search terms are
    adequate to screen for privilege, parties should “test and re-test samples to verify that
    the search terms used . . . ha[ve] a reasonably acceptable degree of probability of
    identifying privileged or protected information[,]” Comment 10.g., Sedona Principles
    at 157, and should “perform some appropriate sampling of the documents determined
    to be privileged and those determined not to be in order to arrive at a comfort level
    that the categories are neither over-inclusive nor under-inclusive.” Victor Stanley,
    
    Inc., 250 F.R.D. at 257
    .
    With one exception, the decisions cited by Plaintiffs in support of the Protocol
    Order allowed for the producing party to engage in this kind of quality control before
    any responsive documents identified in the forensic examinations were produced. See
    Bank of 
    Mongolia, 258 F.R.D. at 521
    (allowing the producing party to review the
    responsive documents identified by keyword search for privilege prior to production
    - 31 -
    CROSMUN V. TRUSTEES OF FAYETTEVILLE TECHNICAL COMMUNITY COLLEGE
    Opinion of the Court
    to the requesting party); Wynmoor Community Council, 280 F.R.D at 688 (providing
    for the same).
    The singular case identified by Plaintiffs in which no prior review was allowed,
    Adair, is immediately distinguishable because it did not involve a compulsory forensic
    examination by the requesting party or its agent. Adair instead involved an order
    compelling the responding party to produce certain documents through a protocol
    imposed on it by the trial court. Adair, 
    2012 WL 2526982
    at *2-3. Also, the parties
    in Adair had entered into both a clawback order and a protective order to avoid
    waiver.   The clawback order provided that “[t]he producing party is specifically
    authorized to produce Protected Documents without a prior privilege review, and the
    producing party shall not be deemed to have waived any privilege or production in
    not undertaking such a review.” 
    Id. at *1.
    The protective order prohibited use of the
    documents in any other action and designated all documents produced under the
    court’s order as confidential. 
    Id. at *4,
    n.6. In ordering a production without prior
    privilege review, the district court wrote that “this approach would not be appropriate
    without the existence of the Protective Order and Clawback Order.” 
    Id. at *4.
    Although the parties in this case did enter into the Protective Order, unlike
    the protective order in Adair, it does not apply to all documents produced pursuant
    to the Protocol Order. Instead, it contemplates the parties having an opportunity to
    designate a document as “confidential” at the time of production—an opportunity that
    - 32 -
    CROSMUN V. TRUSTEES OF FAYETTEVILLE TECHNICAL COMMUNITY COLLEGE
    Opinion of the Court
    is denied to Defendants under the automatic production of the Keyword Search Hits
    by Mr. Walton to Plaintiffs pursuant to the Protocol Order.                     And, although the
    Protective Order allows for a clawback of privileged documents, it does not contain
    the language, relied on by the court in Adair, providing that production of documents
    without prior privilege review would not constitute a waiver. Instead, the clawback
    here applies only to privileged documents produced “through inadvertence, error or
    oversight,” and it is not immediately clear whether production of any privileged
    information not captured in the Privilege Search Hits and delivered to Plaintiffs as
    part of the Keyword Search Hits would fall within that language.15                         Assuming
    arguendo that such a production would be inadvertent and subject to the clawback
    provision’s language, the Protocol Order nevertheless compels Defendants to violate
    their privilege as to any documents given to Mr. Walton and Plaintiffs that are not
    15 The parties disagree on this question, though neither cites any caselaw as to whether a court
    compelled disclosure constitutes an inadvertent disclosure, either for purposes of the Protective Order
    or similar clawback language found in N.C. R. Civ. P. 26(b)(5)b. Various federal courts had, prior to
    enactment of Rule 502 of the Federal Rules of Evidence, held that a court compelled disclosure is an
    inadvertent production subject to clawback by interpreting and applying Rule 501 of the Federal Rules
    of Evidence and a proposed rule of evidence that Congress ultimately declined to adopt. See, e.g.,
    Hopson v. Mayor and City Council of Baltimore, 
    232 F.R.D. 228
    , 246 (D. Md. 2005) (holding that the
    federal common law rule of privilege applicable through Rule 501 permitted consideration of the
    proposed, but never enacted, federal rule concerning court compelled production and concluding such
    a production would not waive privilege). With the advent of Rule 502, federal courts need not grapple
    directly with the question any longer, and can simply state in their orders that any disclosure pursuant
    thereto does not constitute a waiver. Fed. R. Evid. 502(d). North Carolina, however, expressly declined
    to adopt either Rule 501 as adopted by Congress or the proposed rules Congress rejected, see Official
    Commentary, N.C. R. Evid. 501 (2017), and our legislature has not yet enacted an equivalent to
    Federal Rule 502(d). Thus, federal caselaw is of questionable assistance. In any event, the question
    has not been squarely presented here, as no inadvertent disclosure has yet occurred and it is unclear
    whether the issue will arise between the parties. We therefore decline to reach that question on the
    merits.
    - 33 -
    CROSMUN V. TRUSTEES OF FAYETTEVILLE TECHNICAL COMMUNITY COLLEGE
    Opinion of the Court
    contained within the Privilege Search Hits, leaving Defendants with, at best, an
    imperfect clawback remedy to rectify the compulsory violation. See, e.g., Blythe, 
    2012 WL 3061862
    , at *10 (“Protections to guard against privilege cannot be deferred by
    first addressing the risk of waiver only after a production has been made.”); Parkway
    Gallery Furniture, Inc. v. Kittinger/Pennsylvania House Group, 
    116 F.R.D. 46
    , 52
    (M.D. N.C. 1987) (“[W]hen disclosure is complete, a court order cannot restore
    confidentiality and, at best, can only attempt to restrain further erosion.”). Under
    the circumstances presented here, the Protective Order is inadequate to protect
    Defendants’ privilege, and it does not avoid the compulsory violation of that privilege
    under the Protocol Order. Cf. In re Dow Corning Co., 
    261 F.3d 280
    , 284 (2d Cir. 2001)
    (“[C]ompelled disclosure of privileged attorney-client communications, absent waiver
    or an applicable exception, is contrary to well established precedent. . . . [W]e have
    found no authority . . . that holds that imposition of a protective order . . . permits a
    court to order disclosure of privileged attorney-client communications. The absence
    of authority no doubt stems from the common sense observation that such a protective
    order is an inadequate surrogate for the privilege.”).
    In short, the Protocol Order provides Plaintiffs’ agent direct access to
    privileged information, which disclosure immediately violates Defendants’ privileges.
    It furthers that violation by directing that agent, having attempted to screen some
    privileged documents out through the use of search terms, to produce potentially
    - 34 -
    CROSMUN V. TRUSTEES OF FAYETTEVILLE TECHNICAL COMMUNITY COLLEGE
    Opinion of the Court
    responsive documents without providing Defendants an opportunity to examine them
    for privilege.    If, following that continued violation, Plaintiffs—their agent
    notwithstanding—receive privileged documents, Defendants must attempt to
    clawback that information, reducing their privilege to a post-disclosure attempt at
    unringing the eDiscovery bell. Such compelled disclosure of privileged information is
    contrary to our law concerning both attorney-client privilege and work-product
    immunity. Cf. In re 
    Miller, 357 N.C. at 333-35
    , 584 S.E.2d at 786-87; N.C. R. Civ. P.
    26(b)(3). As a result, we hold the trial court misapprehended the law concerning
    attorney-client privilege and the work-product immunity (however understandably
    given its undeveloped state within the eDiscovery arena), vacate the Protocol Order,
    and remand for further proceedings.
    F. Disposition on Remand
    Because we recognize the complexity of privilege in the eDiscovery context, and
    given the extensive investment of time and resources by the parties and the trial
    court to date, we identify several nonexclusive ways in which the trial court could
    resolve the discovery dispute in light of this decision.
    First, the trial court may wish to employ a special master or court-appointed
    independent expert—such as Mr. Walton, provided his agency relationship to
    - 35 -
    CROSMUN V. TRUSTEES OF FAYETTEVILLE TECHNICAL COMMUNITY COLLEGE
    Opinion of the Court
    Plaintiffs is severed—to perform the forensic examination as an officer of the court 16
    consistent with the cases cited by Plaintiffs on appeal. Bank of 
    Mongolia, 258 F.R.D. at 521
    ; Wynmoor Community Council, 280 F.R.D at 688. Such an appointment
    appears to be the commonly accepted approach in other jurisdictions and is consistent
    with the recommendations of the leading treatises on eDiscovery. See, e.g., Comment
    10.e., Sedona Principles at 152-53 (noting that forensic examination orders “usually
    should provide that either a special master or a neutral forensic examiner undertake
    the inspection”).        And, by restricting the expert’s relationship to that of an
    independent agent of the trial court, Defendants can safely disclose any and all
    privileged information to him without endangering confidentiality. Cf. In re 
    Miller, 357 N.C. at 337
    , 584 S.E.2d at 787 (noting that privileged information disclosed to
    the trial court for in camera review “retains its confidential nature”).
    Second, the trial court may wish to provide Defendants with some opportunity,
    however expedited given the position of the case, to review the Keyword Search Hits
    prior to production to Plaintiffs. Such an approach is, again, consistent with both the
    cases dealing with forensic examinations cited by Plaintiffs on appeal and pertinent
    commentaries on eDiscovery.              Bank of 
    Mongolia, 258 F.R.D. at 521
    ; Wynmoor
    Community Council, 280 F.R.D at 688. See, e.g., Comment 6.d., Sedona Principles at
    16  Mr. Walton, as a licensed attorney, is already an officer of the court. That status, however,
    does not inherently deprive him of his agency relationship with Plaintiffs or resolve the privilege issue.
    Plaintiffs’ attorneys, too, are officers of the court, but disclosure of Defendants’ privileged information
    to them may nonetheless serve as a waiver of attorney-client privilege and work-product immunity.
    - 36 -
    CROSMUN V. TRUSTEES OF FAYETTEVILLE TECHNICAL COMMUNITY COLLEGE
    Opinion of the Court
    129 (“[C]ourts that have allowed access [for forensic examinations] generally have
    required . . . that no information obtained through the inspection be produced until
    the responding party has had a fair opportunity to review that information.”). In
    addition, the trial court may wish to order that any documents produced under the
    protocol adopted are confidential within the meaning of the Protective Order and that
    any disclosure of privileged information under the protocol is subject to clawback
    without waiver of any privilege or work-product immunity.17
    Provisions such as those outlined here have been recognized by courts in other
    jurisdictions as sufficient to prevent any compulsory violation of Defendants’
    privilege. See, e.g., Playboy Enterprises, Inc. v. Welles, 
    60 F. Supp. 2d 1050
    , 1054
    (S.D. Cal. 1999) (holding that because the forensic examination would be performed
    by an independent third party and the producing party would have the opportunity
    17  It may be that this modification alone could, in certain circumstances, be sufficient to protect
    the producing party’s privilege. We do not resolve the question here, but note that North Carolina’s
    legislature has not seen fit to adopt analogs to Rules 501 and 502 of the Federal Rules of Evidence that
    have assisted in addressing the court compelled disclosure of privileged information in the federal
    courts. Furthermore, we observe that such agreements appear to be generally disfavored as the
    exclusive means of protecting privilege in most contexts. See Comment 10.e., Sedona Principles at
    153-56 (reviewing the drawbacks of clawback or “quick peek” agreements and concluding “[i]t is
    inadvisable for a fully-informed party to enter a ‘quick peek’ agreement unless either the risks of
    disclosure of privileged and work-product protected information, as well as commercial and personally
    sensitive information, are non-existent or minimal, or the discovery deadline cannot otherwise be
    met . . . and alternative methods to protect against disclosure are not available”). Such agreements,
    then, are best considered as an additional protective measure rather than the primary prophylactic.
    Compare N.C. R. Bus. Ct. 10.3(c)(3) (requiring counsel to discuss as part of an ESI protocol methods
    for designating documents as confidential) and N.C. R. Bus. Ct. 10.5(b) (encouraging parties to agree
    on implementation of privilege logs to protect privileged information), with N.C. R. Bus. Ct. 10.6 (“The
    Court encourages the parties to agree on an order that provides for the non-waiver of the attorney-
    client privilege or work-product protection in the event that privileged or work-product material is
    inadvertently produced.”).
    - 37 -
    CROSMUN V. TRUSTEES OF FAYETTEVILLE TECHNICAL COMMUNITY COLLEGE
    Opinion of the Court
    to review for privilege prior to any production, their “privacy and attorney-client
    communications will be sufficiently protected”); Genworth Financial Wealth Mgmt.,
    Inc. v. McMullan, 
    267 F.R.D. 443
    , 449 (D. Conn. 2010) (ordering a forensic
    examination by a neutral, court-appointed expert and allowing the producing party
    an opportunity to review for privilege prior to production). We cite these cases as
    examples rather than offering them as the as the exclusive means of resolving the
    parties’ dispute.     The trial court is in the best position to fashion any other or
    additional provisions not inconsistent with this opinion. All that is required on
    remand is that the protocol adopted not deprive the Defendants of an opportunity to
    review responsive documents and assert any applicable privilege, whether that be
    through the use of the inexhaustive suggestions enumerated above or some other
    scheme of the trial court’s own devise.18 Cf. Playboy 
    Enterprises, 60 F. Supp. 2d at 1053-54
    (noting that discovery of ESI through a forensic examination is permissible
    but that “[t]he only restriction in this discovery is that the producing party be
    protected against undue burden and expense and/or invasion of privileged matter”).
    III. CONCLUSION
    18  Of course, the trial court may also, in its discretion, wish to address other aspects of the
    protocol not discussed herein, such as the shifting of costs, the manner in which search terms are
    selected, additional protections for information covered by FERPA, the timeline of production, or the
    limitation of the search to certain computers, servers, or hard drives. We stress, however, that the
    trial court need not reinvent the wheel, and the only issue that must be addressed on remand is the
    avoidance of compulsory waiver and the violation of Defendants’ privilege as described herein.
    - 38 -
    CROSMUN V. TRUSTEES OF FAYETTEVILLE TECHNICAL COMMUNITY COLLEGE
    Opinion of the Court
    For the foregoing reasons, we vacate the Protocol Order for an abuse of
    discretion and remand for further proceedings not inconsistent with this opinion.
    VACATED AND REMANDED.
    Judges STROUD and ZACHARY concur.
    - 39 -