Federal Court Decisions Involving Electronic Discovery, December 1 ...
Federal Court Decisions Involving Electronic Discovery, December 1 ...
Federal Court Decisions Involving Electronic Discovery, December 1 ...
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
<strong>Federal</strong> E-<strong>Discovery</strong> <strong>Decisions</strong>, <strong>December</strong> 1, 2006 – July 31, 2009<br />
extensive ESI from a nonparty, necessitating the identification and segregation of<br />
relevant emails from the nonparty’s other confidential business records, the nonparty<br />
complained that plaintiff's proposed keyword search was too narrow and that defendant's<br />
proposed keyword search was too broad. The court opined that it was left in an<br />
uncomfortable position of crafting a search methodology based on certain key words for<br />
the parties. Strongly endorsing The Sedona Conference® Cooperation Proclamation, the<br />
court held that parties' attorneys should cooperate and carefully make the appropriate<br />
keyword searches for the nonparty to implement and to produce relevant emails. The<br />
court also noted that the proposed methodology must be tested to ensure accuracy.<br />
Wingnut Films, Ltd. v. Katja Motion Pictures Corp., 2007 WL 2758571 (C.D. Cal.<br />
Sept. 18, 2007). In a highly contentious contract dispute, the plaintiff alleged that the<br />
defendant repeatedly certified that they had fully complied with court-ordered discovery<br />
without producing any correspondence, memoranda, e-mail, notes, work papers or<br />
litigation settlement documents. The court, relying on Tulip Computers Int’l B.V. v. Dell<br />
Computer Corp., 2002 WL 818061 (D. Del. Apr.30 2002), ordered the defendant to<br />
retain an outside vendor to access servers and hard drives of specified employees and<br />
conduct keyword searches for responsive documents and e-mails. The court also imposed<br />
monetary sanctions on the defendant under Fed. R. Civ. P. 37(b)(2) and 26(g)(3) in the<br />
amount of $125,000.<br />
World Courier v. Barcone, 2007 WL 1119196 (N.D. Cal. Apr. 16, 2007). The plaintiff<br />
sought sanctions and an adverse inference instruction for the intentional destruction of<br />
electronic evidence by the defendant’s husband. Relying on Silvestri v. General Motors<br />
Corp., 271 F.3d 583 (4th Cir. 2001), the court held that parties have a duty to preserve<br />
evidence if they have access to or indirect control over it. Applying the 2d Circuit’s test<br />
from Residential Funding Corp. v. DeGeorge Fin. Corp., 306 F. 3d 99, (2d Cir. 2002),<br />
the court found that monetary sanctions and an adverse inference instruction would<br />
appropriate after a full development of the record to determine the extent of bad faith.<br />
In re World Trade Center Disaster Site Litig., 2008 WL 793578 (S.D.N.Y. Mar. 24,<br />
2008). In this ongoing multi-district insurance litigation, the plaintiffs objected to the<br />
court-appointed special master’s recommendation that a third party be hired to build,<br />
maintain, and operate a database of “Core <strong>Discovery</strong>.” The plaintiffs’ objection focused<br />
on the expense and lack of necessity to create such a large database. In approving the<br />
creation of the database, the court held that with 10,000 cases before it, the potential<br />
benefits of centrally managing vast quantities of information outweigh the cost.<br />
Xpel Tech. Corp. v. Am. Filter Film Distrib., 2008 WL 744837 (W.D.Tex. Mar. 17,<br />
2008). In this copyright infringement claim, the plaintiff filed a motion for expedited<br />
computer forensic imaging of various electronic media, alleging that immediate action to<br />
preserve volatile system data, log files, and metadata was needed. Finding the plaintiff<br />
had demonstrated good cause under Rule 26(d), the court ordered the defendant to<br />
produce computers, servers and other electronic storage devices for bit-for-bit imaging<br />
and MD5 hash value authentication by a specified forensic examiner, with costs to be<br />
borne by the plaintiff.<br />
Copyright © 2009, The Sedona Conference ® 94<br />
www.thesedonaconference.org