17.01.2013 Views

Electronic Discovery and Computer Forensics Case List - Kroll Ontrack

Electronic Discovery and Computer Forensics Case List - Kroll Ontrack

Electronic Discovery and Computer Forensics Case List - Kroll Ontrack

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

<strong>Electronic</strong> <strong>Discovery</strong> <strong>and</strong> <strong>Computer</strong> <strong>Forensics</strong><br />

<strong>Case</strong> <strong>List</strong><br />

(Organized by Jurisdiction)<br />

TABLE OF CONTENTS<br />

Supreme Court ............................................................................................................................... 3<br />

Federal Circuit ................................................................................................................................ 4<br />

District of Columbia ....................................................................................................................... 5<br />

District of Puerto Rico ..................................................................................................................17<br />

First Circuit – State <strong>and</strong> Federal <strong>Case</strong>s .......................................................................................18<br />

Maine ..........................................................................................................................................19<br />

New Hampshire ...........................................................................................................................20<br />

Massachusetts ............................................................................................................................20<br />

Rhode Isl<strong>and</strong> ...............................................................................................................................25<br />

Second Circuit – State <strong>and</strong> Federal <strong>Case</strong>s ..................................................................................26<br />

Connecticut .................................................................................................................................27<br />

New York ....................................................................................................................................31<br />

Vermont ......................................................................................................................................76<br />

Third Circuit – State <strong>and</strong> Federal <strong>Case</strong>s......................................................................................77<br />

Delaware .....................................................................................................................................78<br />

New Jersey .................................................................................................................................85<br />

Pennsylvania ...............................................................................................................................93<br />

Fourth Circuit – State <strong>and</strong> Federal <strong>Case</strong>s .................................................................................105<br />

North Carolina ...........................................................................................................................105<br />

South Carolina ..........................................................................................................................110<br />

West Virginia .............................................................................................................................112<br />

Maryl<strong>and</strong> ...................................................................................................................................113<br />

Virginia ......................................................................................................................................120<br />

Fifth Circuit – State <strong>and</strong> Federal <strong>Case</strong>s .....................................................................................126<br />

Louisiana ...................................................................................................................................127<br />

Mississippi .................................................................................................................................133<br />

Texas ........................................................................................................................................135<br />

Sixth Circuit – State <strong>and</strong> Federal <strong>Case</strong>s ....................................................................................147<br />

1


Kentucky ...................................................................................................................................147<br />

Michigan ....................................................................................................................................149<br />

Ohio ..........................................................................................................................................158<br />

Tennessee ................................................................................................................................167<br />

Seventh Circuit – State <strong>and</strong> Federal <strong>Case</strong>s ...............................................................................170<br />

Illinois ........................................................................................................................................172<br />

Indiana ......................................................................................................................................189<br />

Wisconsin ..................................................................................................................................194<br />

Eighth Circuit – State <strong>and</strong> Federal <strong>Case</strong>s .................................................................................198<br />

Arkansas ...................................................................................................................................199<br />

Iowa ..........................................................................................................................................200<br />

Minnesota .................................................................................................................................201<br />

Missouri .....................................................................................................................................208<br />

Nebraska ...................................................................................................................................211<br />

North Dakota .............................................................................................................................213<br />

South Dakota ............................................................................................................................214<br />

Ninth Circuit – State <strong>and</strong> Federal <strong>Case</strong>s ...................................................................................216<br />

Alaska .......................................................................................................................................219<br />

Arizona ......................................................................................................................................219<br />

California ...................................................................................................................................221<br />

Hawaii .......................................................................................................................................251<br />

Idaho .........................................................................................................................................252<br />

Montana ....................................................................................................................................252<br />

Oregon ......................................................................................................................................253<br />

Nevada ......................................................................................................................................253<br />

Washington ...............................................................................................................................256<br />

Tenth Circuit – State <strong>and</strong> Federal <strong>Case</strong>s ...................................................................................262<br />

Colorado ...................................................................................................................................264<br />

Kansas ......................................................................................................................................269<br />

New Mexico ..............................................................................................................................280<br />

Oklahoma ..................................................................................................................................281<br />

Utah ..........................................................................................................................................283<br />

Eleventh Circuit – State <strong>and</strong> Federal <strong>Case</strong>s ..............................................................................288<br />

Alabama ....................................................................................................................................289<br />

2


Florida .......................................................................................................................................290<br />

Georgia .....................................................................................................................................304<br />

Other Jurisdictions .....................................................................................................................309<br />

Court of International Trade ......................................................................................................309<br />

Federal Claims Court ................................................................................................................309<br />

United States Air Force Court of Criminal Appeals ...................................................................311<br />

United States Tax Court ............................................................................................................311<br />

Virgin Isl<strong>and</strong>s.............................................................................................................................312<br />

Other Countries ...........................................................................................................................312<br />

Engl<strong>and</strong> .....................................................................................................................................312<br />

Supreme Court<br />

� City of Ontario v. Quon, 2010 WL 2400087 (U.S. June 17, 2010). In this appeal addressing an<br />

employer’s search of an employee’s text messages, the United States Supreme Court found the<br />

search to be reasonable, but declined to issue a “broad holding concerning employees’ privacy<br />

expectations vis-à-vis employer provided technological equipment.” Addressing the reasoning for<br />

the search (i.e., review of the text message transcripts), the court found the City possessed a<br />

“legitimate interest” in ensuring employees were not forced to pay for overages out-of-pocket <strong>and</strong><br />

that the City was not paying for personal communications. In regard to the search itself, the court<br />

found the City’s method of reviewing the text message transcripts to be reasonable as it was an<br />

“efficient <strong>and</strong> expedient way” to determine the nature of the overages. In support of this decision,<br />

the court noted the steps taken to reduce the search intrusiveness, such as the restriction of the<br />

search date range <strong>and</strong> limitation of transcript review to messages sent by the employee while onduty.<br />

The court also discussed that the employee should have understood or anticipated that it<br />

might be necessary for the City to audit the pager messages to determine whether the pagers were<br />

being appropriately used, or to assess the SWAT team’s performance in emergency situations (the<br />

primary purpose for the pager issuance). Finally, the court determined the Ninth Circuit erred in<br />

suggesting the City could have used “less intrusive means” to make the overage determinations<br />

<strong>and</strong> also held that the search was not rendered unreasonable by the assumption that Arch<br />

Wireless violated the Stored Communications Act by turning over the transcripts.<br />

� Arthur Andersen LLP v. United States, 125 S.Ct. 2129 (U.S. 2005). After becoming of aware of<br />

Enron’s financial difficulties, Arthur Andersen told partners working on the Enron team to ensure<br />

compliance with Andersen’s document retention policy. Following that meeting, substantial paper<br />

<strong>and</strong> electronic documents were destroyed. At trial, the jury found Arthur Andersen guilty of<br />

knowingly, intentionally <strong>and</strong> corruptly persuading employees to withhold documents from a<br />

regulatory proceeding. The Fifth Circuit affirmed the decision. On appeal, the Supreme Court<br />

reversed <strong>and</strong> held that the jury instructions were flawed. The court declared that, under normal<br />

circumstances, a manager could instruct employees to comply with a valid document retention<br />

policy, even though the policy was partly designed to prevent others (including the government)<br />

from accessing certain information. The court found that the jury instructions erroneously implied<br />

3


the jury did not have “to find any nexus between the "persua[sion]" to destroy documents <strong>and</strong> any<br />

particular proceeding.” The court further stated that a "‘knowingly . . . corrup[t] persaude[r]’ cannot<br />

be someone who persuades others to shred documents under a document retention policy when<br />

he does not have in contemplation any particular official proceeding in which those documents<br />

might be material.”<br />

� Oppenheimer Fund, Inc. v. S<strong>and</strong>ers, 437 U.S. 340 (1982). “[W]e do not think a defendant should<br />

be penalized for not maintaining his records in the form most convenient to some potential future<br />

litigants whose identity <strong>and</strong> perceived needs could not have been anticipated.” Where the expense<br />

of creating computer programs that would locate the desired data was the same for both parties,<br />

the court ordered that the party seeking the information must bear the cost of production.<br />

Federal Circuit<br />

� In re Ricoh Co. Ltd. Patent Litig., 661 F.3d 1361 (Fed. Cir. 2011). Following a court of appeals<br />

affirmation of a district court’s order granting the defendant summary judgment in a patent<br />

infringement suit, the plaintiff sought review of several items in a $938,957 taxation award. Namely,<br />

the plaintiff disputed costs awarded for using a third-party document database service to produce<br />

e-mail <strong>and</strong> fees for generically itemized exemplification <strong>and</strong> copying. With regard to the document<br />

database, the court found that the review database was used as the exclusive form of document<br />

production—rather than for the convenience of the parties—<strong>and</strong> was properly taxable. However,<br />

the court reversed the original award of $234,702 based on a finding that the parties contractually<br />

agreed to divide costs before leveraging the service. Reviewing the defendant’s costs, the court<br />

found that vague phrases such as "document production" that were frequently itemized did not<br />

represent a reasonably accurate calculation of documents copied for, or tendered by, the opposing<br />

party. Accordingly, the court vacated the $322,702 award for copying fees, which was rem<strong>and</strong>ed to<br />

district court.<br />

� Jicarilla Apache Nation v. United States, 60 Fed. Cl. 413 (Fed. Cir. 2004). Alleging that the<br />

government mismanaged trust funds, the plaintiff moved for a confidentiality agreement <strong>and</strong><br />

protective order. Determining that good cause existed for approval <strong>and</strong> entry of the order, the court<br />

issued specific procedures for the production of electronic records. In defining records that needed<br />

to be produced, the court included computer or network activity logs, voice-mail, data, databases,<br />

images, e-mails, spreadsheets, <strong>and</strong> metadata. The court also determined that if the parties<br />

provided access to electronic data rather than making actual copies of it, the parties should<br />

designate which electronic records are available for production by categorizing them in writing by<br />

record, category, search parameters, or other reasonable methods. In addressing production<br />

format, the court directed the parties to produce records “in the format in which that party routinely<br />

uses or stores them, provided that electronic records shall be produced along with available<br />

technical information necessary for access or use.” If the requesting party is unable to access or<br />

use an electronic record, the court indicated it may request that the responding party provide a<br />

paper version of or underlying source data for the electronic record.<br />

� First USA Bank v. PayPal, Inc., 76 Fed.Appx. 935 (Fed. Cir. 2003). In a patent infringement<br />

action, the plaintiff subpoenaed the defendant’s former chief executive officer, specifically<br />

requesting the court to compel his deposition <strong>and</strong> to require him to produce his laptop computer for<br />

forensic inspection. The former-CEO had used the computer while employed by the defendant <strong>and</strong><br />

subsequently purchased it from the defendant when he left its employ. Despite objection, the<br />

magistrate judge ordered the former-CEO to be available for deposition <strong>and</strong> approved a search<br />

4


protocol. The search protocol allowed electronic evidence consultants to create a forensic copy of<br />

the computer’s hard drive, identify any potentially relevant documents, <strong>and</strong>, if such documents<br />

were found <strong>and</strong> identified, allow the former-CEO to create a privilege log. The district court affirmed<br />

the magistrate’s order <strong>and</strong> former-CEO appealed. The appellate court dismissed the former-CEO’s<br />

appeal of the lower court’s non-final interlocutory discovery order.<br />

District of Columbia<br />

� Williams v. Dist. of Columbia, 2011 WL 3659308 (D.D.C. Aug. 17, 2011). In this wrongful<br />

termination litigation, the defendant requested the return of an allegedly privileged e-mail<br />

containing a 104-page document related to the plaintiff’s termination. Although the defendant<br />

initially requested the immediate return of the privileged documents, the plaintiff never responded<br />

<strong>and</strong> the defendant took no further action for more than two years until the plaintiff identified the email<br />

as an exhibit for trial. Reviewing the defendant’s discovery conduct, the court determined it did<br />

not meet the burden required to demonstrate that reasonable steps were taken to prevent or<br />

remedy inadvertent disclosure. Specifically, the court took issue with the defendant’s unsworn<br />

statements from counsel — who had not been involved with the case at the time of disclosure —<br />

<strong>and</strong> determined that the generic statements failed to sufficiently detail the reasonableness of its<br />

review procedures including its methodology, the total number of documents reviewed or any time<br />

pressure imposed by the plaintiff’s discovery requests. Further, the court found that the defendant’s<br />

two year stagnancy did not constitute reasonable attempts to rectify its error. Citing each failure as<br />

independent ground for denial, the court denied the motion to exclude <strong>and</strong> waived privilege.<br />

� DL v. District of Columbia, No. 05-1437 (RCL) (D.D.C. May 9, 2011). In this class action dispute<br />

concerning free public education under the Individuals with Disabilities <strong>and</strong> Education Act, the<br />

defendant filed a motion to reconsider the grant of the plaintiff’s motion to compel production <strong>and</strong><br />

the court’s determination that privilege was waived for all e-mails yet to be produced. On the day<br />

the court was scheduled to issue its opinion, the plaintiffs’ counsel informed the court that the<br />

defendants had produced thous<strong>and</strong>s of e-mails days before trial <strong>and</strong> were continuing to "document<br />

dump" after trial concluded. The defense counsel claimed the District was understaffed, committed<br />

supplemental searches that yielded tens of thous<strong>and</strong>s of additional e-mails, discovery was<br />

voluminous <strong>and</strong> there were not "enough bodies" to complete the process before trial. Denying the<br />

defendants’ motion, the court cited the "repeated, flagrant, <strong>and</strong> unrepentant failures to comply with<br />

Court orders" <strong>and</strong> "discovery abuse so extreme as to be literally unheard of in this Court." The<br />

court also repeatedly noted the defendants’ failure to adhere to the discovery framework provided<br />

by the Federal Rules of Civil Procedure <strong>and</strong> advised the defendants to invest time spent "anklebiting<br />

the plaintiffs" into shaping up its own discovery conduct.<br />

� United States v. Halliburton Co., 2011 WL 208301 (D.D.C. Jan. 24, 2011). In this qui tam action<br />

alleging fraud perpetrated against the United States, the plaintiff requested an order from the court<br />

requiring the defendants to search the electronic data of all employees who were copied on e-mails<br />

that were previously produced. The defendants argued that this search would encompass an<br />

additional 35 custodians that possess an average of 15 to 20 GB of data <strong>and</strong> that it would take two<br />

to ten days per custodian for the collection process before review could occur. Denying the<br />

plaintiff’s request for additional searches, the court noted that the defendants had already spent “a<br />

king’s ransom” of $650,000 on discovery <strong>and</strong> had produced more than 2 million paper documents,<br />

thous<strong>and</strong>s of spreadsheets <strong>and</strong> more than half a million e-mails. Further, the court determined the<br />

plaintiff failed to demonstrate that any e-mails not produced were crucial to her claims.<br />

5


� Covad Commc’ns Co. v. Revonet, Inc., 2010 WL 1233501 (D.D.C. Mar. 31, 2010). In this<br />

ongoing secrets misappropriation litigation, the court considered six of nine discovery motions both<br />

parties had filed. In particular, the court addressed the plaintiff’s motion to compel production of<br />

35,000 e-mails in native file format including metadata, following the defendant’s production of<br />

those e-mails as hard-copy printouts. Addressing this motion, the court noted that it was bound by<br />

Fed.R.Civ.P. 26(b)(2)(C)(iii), which requires a limit of discovery if “the burden or expense of the<br />

proposed discovery outweighs its likely benefit” <strong>and</strong> explained that the parties had “bigger fish to<br />

fry” in the interest of judicial expediency. Based on this <strong>and</strong> the plaintiff’s failure to demonstrate a<br />

specific need for the e-mail metadata, the court held that the production of the hard copies in native<br />

format in this stage of the dispute was not necessary <strong>and</strong> denied the plaintiff’s motion.<br />

� Trustees of Elec. Workers Local No. 26 Pension Trust Fund v. Trust Fund Advisors, Inc.,<br />

2010 WL 558719 (D.D.C. Feb. 12, 2010). In this litigation, the defendants filed a renewed motion to<br />

compel documents withheld by the plaintiffs under the claim of privilege. First, the court addressed<br />

whether privilege existed in the first place by examining the parties involved <strong>and</strong> determined<br />

privilege existed despite the presence of two consultants at the meetings, since they became<br />

integral members of the team assigned to deal with litigation <strong>and</strong> legal strategies. Next, the court<br />

determined whether privilege was waived or “forfeited,” noting that Fed.R.Evid. 502 abolished the<br />

“dreaded subject-matter waiver.” Thus, the defendants’ argument that the disclosure of nonprivileged<br />

information should constitute a waiver of privileged information of the same subject<br />

matter was “flat out wrong,” since the question is whether the information, both disclosed <strong>and</strong><br />

undisclosed, shares the same subject matter <strong>and</strong> ought in fairness to be considered together.<br />

Based on this analysis, the court denied the defendants’ arguments that privilege was waived <strong>and</strong><br />

ordered the plaintiffs to provide documents marked as privilege for an in camera review.<br />

� Amobi v. District of Columbia Dep’t of Corr., 2009 WL 4609593 (D.D.C. Dec. 8, 2009). In this<br />

litigation, the court addressed the parties’ motions related to the production of a memor<strong>and</strong>um<br />

created by an attorney for the defendants. The defendants argued the disclosure was inadvertent<br />

<strong>and</strong> steps were taken to rectify the error immediately, whereas the plaintiffs argued the<br />

memor<strong>and</strong>um was either not privilege-protected or privilege had been waived. After determining<br />

that the document was protected by the work product doctrine, the court used the three-part test<br />

set forth in Fed.R.Evid. 502(b) <strong>and</strong> found privilege was waived. In support of this finding, the court<br />

cited the defendants’ failure to explain the methods used to prevent disclosure in order to establish<br />

the magnitude of the error. The court reasoned that "defendants’ failure to take reasonable efforts<br />

to prevent the disclosure in the first place doom[ed] their reliance on the rule." However, the court<br />

refused to endorse the plaintiffs’ argument that lawyers could never make inadvertent mistakes,<br />

claiming that would "gut [Rule 502] like a fish."<br />

� Covad Commc’ns. Co. v. Revonet, Inc., 2009 WL 2595257 (D.D.C. Aug. 25, 2009). In this<br />

ongoing trade secrets misappropriation litigation, the plaintiff sought compliance with the court’s<br />

December 2008 order granting a motion to compel discovery. See Covad Comm. Co. v. Revonet,<br />

Inc., 2008 WL 5377698 (D.D.C. Dec. 24, 2008). The plaintiff argued production was incomplete,<br />

the production format was noncompliant <strong>and</strong> that a discrepancy existed between certain e-mails<br />

produced in both native format <strong>and</strong> hard copy. The court first deferred addressing the production<br />

issue until the results of a forensic search of relevant electronically stored information were<br />

discussed at a later hearing. Turning to the e-mail discrepancy, the court ordered the defendant to<br />

produce all missing e-mails in native format. Regarding the remaining production disputes, the<br />

court noted the parties were working to resolve the issues <strong>and</strong> ordered the defendant to answer<br />

whether the documents were either produced in native format or if they would be produced at all.<br />

6


Finally, the court expressed displeasure with data downgrading stating, "taking an electronic<br />

document . . . printing it, cutting it up, <strong>and</strong> telling one’s opponent to paste it back together again,<br />

when the electronic document can be produced with a keystroke, is madness." Ultimately, the court<br />

stayed action on the motion pending the defendant’s responses to the questions posed.<br />

� In re Rail Freight Fuel Surcharge Antitrust Litig., 2009 WL 1904333 (D.D.C. July 2, 2009). In<br />

this antitrust action, the defendants moved for bifurcated discovery between class certification <strong>and</strong><br />

merits discovery. The defendants contended that bifurcated discovery was possible through the<br />

use of search terms to effectively isolate electronically stored information (ESI) relevant to<br />

"certification" but not "merits" discovery. The defendants argued that bifurcated discovery would<br />

facilitate early resolution of the certification issue <strong>and</strong> reduce the burden of subsequent merits<br />

discovery. In opposition, the plaintiffs argued that certification <strong>and</strong> merits discovery are<br />

indistinguishable as evidence regarding the merits was also crucial to certification. The plaintiffs<br />

also argued that bifurcated discovery would forced the defendants to conduct document review to<br />

classify ESI as either class certification or merits discovery as no search engine could effectively<br />

distinguish between the two, <strong>and</strong> thus simultaneous discovery would be more efficient <strong>and</strong> cost<br />

effective. Magistrate Judge Facciola agreed with the plaintiffs’ contention that the issues involved in<br />

certification <strong>and</strong> merits discovery were closely intertwined. The court expressed doubt that the<br />

defendants’ could effectively distinguish between the two categories of documents, noting that the<br />

defendants did not propose exactly how the lawyers will "create a search engine so refined <strong>and</strong><br />

exquisite." The court also held that bifurcation would delay the proceedings <strong>and</strong> hinder judicial<br />

economy, citing the delays <strong>and</strong> costs associated with continued need for judicial supervision <strong>and</strong><br />

the increased number of disputes over discovery in a bifurcated case. Accordingly, the court<br />

denied the motion for bifurcated discovery.<br />

� Covad Commc’ns. Co. v. Revonet Inc., 2009 WL 1472345 (D.D.C. May 27, 2009). In this<br />

ongoing trade secrets misappropriation litigation, the plaintiff sought forensic images of the<br />

defendant’s drives <strong>and</strong> computers as well as forensic searches of its database <strong>and</strong> e-mail servers.<br />

The defendant argued that its servers were too fragile for forensic images <strong>and</strong> that imaging<br />

constituted an undue burden. The defendant also objected to the forensic search of its servers,<br />

claiming it may reveal information that the defendant is obliged by contract to keep confidential.<br />

Disregarding the defendant’s arguments, the court granted the plaintiff’s request for forensic<br />

imaging, finding the imaging would not stress the servers any more than day-to-day use. The court<br />

also ordered the forensic search of the defendant’s servers, stating that no alternative way existed<br />

<strong>and</strong> that any confidential material could be safeguarded by a protective order. Regarding the e-mail<br />

servers, the court determined insufficient authority existed to conclude ESI deficiency allegations<br />

automatically warranted forensic searches. The court reserved decision on whether forensic<br />

examination was appropriate until the plaintiff’s expert’s report was submitted. The court also<br />

ordered a comparison between servers to determine what data existed on non-operational servers<br />

that did not exist on the remaining operational one.<br />

� Asarco, Inc. v. United States Envtl. Prot. Agency, 2009 WL 1138830 (D.D.C. Apr. 28, 2009). In<br />

this environmental litigation, the plaintiff filed a motion to take discovery. The plaintiff contended<br />

that the defendant’s keyword search was conducted in bad faith, as evidenced by the fact it used<br />

only one search term. Finding the plaintiff’s argument persuasive, the court ordered an additional<br />

keyword search utilizing four additional key terms. Notably, the court stated that "keyword searches<br />

are no longer the favored methodology." The court concluded by recommending summary<br />

judgment on the merits in favor of the defendant after the second search is completed, determining<br />

that there is no genuine issue of material fact whether additional defendant data exist.<br />

7


� Newman v. Borders, Inc., 2009 WL 931545 (D.D.C. Apr. 6, 2009). In this racial discrimination<br />

litigation, the plaintiff requested an additional Fed.R.Civ.P. 30(b)(6) deposition seeking information<br />

about the defendant’s e-mail retention policy. Frustrated with the high costs <strong>and</strong> time spent on<br />

discovery that the court determined "will dwarf the potential recovery," the court denied the<br />

plaintiff’s request <strong>and</strong> ordered the submission of an affidavit after determining a party’s document<br />

retention policy was discoverable. The affidavit was to address the defendant’s e-mail systems,<br />

deletion policies <strong>and</strong> search efforts.<br />

� D’Onofrio v. SFX Sports Group, Inc., 2009 WL 859293 (D.D.C. Apr. 1, 2009). In this ongoing<br />

wrongful termination litigation, the defendants agreed to provide the plaintiff’s counsel with attorney<br />

notes taken by the defendants under certain conditions. Taking exception to these conditions, the<br />

plaintiff’s counsel argued the plaintiff should be granted access to the attorney notes for relevancy<br />

determinations. Magistrate Judge John M. Facciola granted the motion in part, finding the<br />

defendants were allowing access to these documents for efficiency’s sake not because the plaintiff<br />

was entitled to the documents. The court also noted that it is "difficult to unlearn something once it<br />

is learned," <strong>and</strong> therefore the plaintiff should not be allowed access to the privileged documents.<br />

Finally, the court agreed with the plaintiff that there is no need for the plaintiff’s expert to confer with<br />

the defendants’ expert regarding methodology prior to conducting sampling of the documents.<br />

� In re Fannie Mae Sec. Litig., 2009 WL 21528 (C.A.D.C. Jan. 6, 2009). In this litigation, the Office<br />

of Federal Housing Enterprise Oversight (OFHEO), a non-party, appealed the district court’s order<br />

finding it in contempt for failing to comply with a discovery d+eadline in a stipulated scheduling<br />

order. OFHEO argued that the defendant’s decision to supply four hundred keyword terms was<br />

outside the scope of “appropriate search terms,” thereby extending the time needed to comply with<br />

its production requirements. However, aware of the deadlines, OFHEO sought several discovery<br />

extensions, hired 50 contract attorneys <strong>and</strong> spent over $6 million – 9% of the agency’s entire<br />

annual budget – to comply with the defendants’ discovery requests. Finding OFHEO’s efforts<br />

legally insufficient, the court compared its treatment of the discovery deadlines as “movable goal<br />

posts” <strong>and</strong> directed OFHEO to supply documents withheld for privilege that were not logged by the<br />

deadline as a sanction for their discovery misconduct. However, the court ruled that any privileged<br />

documents that are produced <strong>and</strong> identified as such will be promptly returned to OFHEO.<br />

� Covad Comm. Co. v. Revonet, Inc., 2008 WL 5377698 (D.D.C. Dec. 24, 2008). In this trade<br />

secrets misappropriation litigation, the plaintiff moved to compel the defendant to reproduce emails<br />

in native format that were previously produced in hard copy. Having been written prior to the<br />

effective date of the amendments to the Federal Rules, the plaintiff’s document production request<br />

did not explicitly include electronically stored information <strong>and</strong> failed to request a particular format<br />

for production. Magistrate Judge Facciola held that both parties played with fire by producing <strong>and</strong><br />

accepting documents in hard-copy form, as they were not reasonably kept in hard copy form in the<br />

ordinary course of business. Therefore, Judge Facciola ordered the defendant to produce the<br />

requested information in native format on a CD <strong>and</strong> split the costs of privilege review (capped at<br />

$4,000) between the parties. Judge Facciola concluded by stating that, “Two thous<strong>and</strong> dollars is<br />

not a bad price for the lesson that the courts have reached the limits of their patience with having to<br />

resolve electronic discovery controversies that are expensive, time-consuming, <strong>and</strong> so easily<br />

avoided by the lawyers’ conferring with each other on such a fundamental question as the format of<br />

their productions of electronically stored information.”<br />

� D’Onofrio v. Sfx Sports Group, Inc., 2008 WL 4737202 (D.D.C. Oct. 29, 2008). In this<br />

employment discrimination litigation, the defendants filed several motions, including a motion for<br />

leave to designate an expert to design a search protocol. Previously, the court stated the lawyers<br />

8


should rely on IT professionals to create a protocol that was easily understood. After the<br />

defendants proposed a highly technical search protocol, the court decided to create one of its own<br />

that included: search parameters <strong>and</strong> locations, time limits <strong>and</strong> a requirement that the defendants<br />

must restore newly discovered ESI.<br />

� United States v. O’Keefe, 2008 WL 3850658 (D.D.C. Aug. 19, 2008). In this criminal prosecution,<br />

the co-defendant sought further discovery, including Department of State e-mails, communications<br />

memor<strong>and</strong>a <strong>and</strong> post indictment analyses. The government refused to provide this information<br />

arguing the requested documents would necessarily result in work product disclosure <strong>and</strong> not be<br />

discoverable. Finding defendant’s response equivocal, Magistrate Judge John M. Facciola ordered<br />

the government to search for documents that fall within the discovery request <strong>and</strong> to produce them.<br />

Citing Rule 26(b)(5) of the Fed.R.Civ.P., Judge Facciola required the government to create a<br />

privilege log of documents withheld from production, explicitly describing documents so as to<br />

prevent the necessity of in camera review. See also United States v. O’Keefe, 2008 WL 449729<br />

(D.D.C. Feb. 18, 2008).<br />

� Citizens for Responsibility <strong>and</strong> Ethics in Wash. v. Executive Office of the President, 2008 WL<br />

2932173 (D.D.C. July 29, 2008). In this ongoing litigation alleging improper deletion of White<br />

House e-mails, the plaintiffs sought an order requiring the defendants to recover <strong>and</strong> restore<br />

certain electronic communications created <strong>and</strong>/or received within the White House. Previously,<br />

Magistrate Judge John M. Facciola recommended the Court order the defendants to search the<br />

workstations of employees during the time period at issue <strong>and</strong> issue a preservation notice directing<br />

them to surrender media that may contain relevant e-mails. In the dispute at h<strong>and</strong>, the defendants<br />

sought reconsideration, arguing all relevant e-mail was preserved on backup tapes. Finding the<br />

defendants’ argument to be “fundamentally flawed,” the Magistrate Judge denied the motion for<br />

reconsideration, pointing out that e-mail present in a personal folder on an employee’s work station<br />

is not necessarily on the backup tape. However, as the defendants failed to keep track of which<br />

hard drives were used by which individuals, the Magistrate determined that the burdens imposed<br />

on the defendants to preserve all 545 workstations was too great, <strong>and</strong> therefore recommended no<br />

further relief beyond his previous recommendation.<br />

� Peskoff v. Faber, 2008 WL 2649506 (D.D.C. July 7, 2008). In this ongoing contract dispute, the<br />

court followed up on its previous holding that it was appropriate to ascertain the cost of a forensic<br />

examination to determine if the cost was justified. After the previous ruling, both parties submitted a<br />

joint bid resulting in a vendor proposal of $33,000. Determining the forensic examination to be<br />

justified, the court considered whether the burden or expense justified a shift of cost to the<br />

requesting party. Finding the defendant’s inadequate search efforts, failure to preserve<br />

electronically stored information <strong>and</strong> overall unwillingness to take “discovery obligations seriously”<br />

caused the need for a forensic examination, the court refused to shift costs since the problem was<br />

one of the defendant’s “own making.”<br />

� Pederson v. Preston, 2008 WL 2358589 (D.D.C. June 11, 2008). In this employment<br />

discrimination litigation, the plaintiff filed a motion to compel discovery arguing that the defendant’s<br />

responses to a number of interrogatories were insufficient <strong>and</strong> the defendant improperly asserted<br />

attorney-client privilege. The defendant objected arguing that the plaintiff’s production requests<br />

were vague, overly broad, unduly burdensome <strong>and</strong> not reasonably calculated to lead to the<br />

discovery of admissible evidence. The defendant also defended its assertion of attorney-client <strong>and</strong><br />

work-product privilege by noting that the plaintiff had not specifically objected to any claim of<br />

privilege provided in the defendant’s privilege log. After analyzing each disputed interrogatory for<br />

relevancy <strong>and</strong> undue burden, the court granted the motion in part <strong>and</strong> denied in part. The court<br />

9


also agreed with the defendant’s privilege argument, holding that the defendant’s attorney-client<br />

privilege assertion would be sustained absent evidence that it was made in bad faith.<br />

� Alex<strong>and</strong>er v. F.B.I., 2008 WL 903115 (D.D.C. April 3, 2008). In this Privacy Act litigation, former<br />

employees <strong>and</strong> political appointees from the Reagan <strong>and</strong> Bush administrations brought suit against<br />

the FBI alleging violation of privacy interests after their FBI files were improperly h<strong>and</strong>ed to the<br />

Clinton White House – a sc<strong>and</strong>al known as “Filegate.” The plaintiffs filed an emergency motion to<br />

supplement their motion to compel <strong>and</strong> request for evidentiary hearing, claiming the Executive<br />

Office of the President (“EOP”) filed a false declaration in an attempt to obstruct the narrowed<br />

request for e-mail. Finding the plaintiffs did not demonstrate the EOP obstructed the e-mail<br />

request, or acted in bad faith, the court concluded no credible evidence existed to grant the<br />

emergency motion. In making this determination, the court found the essential errors committed by<br />

the White House’s counsel were a result of the lawyers’ lack of familiarity with computer<br />

terminology, all of which occurred long before the “current sophisticated ways that lawyers have<br />

had to learn to deal with computer experts.”<br />

� Equity Analytics, LLC v. Lundin, 2008 WL 615528 (D.D.C. Mar. 7, 2008). In this suit, the plaintiff<br />

claimed the defendant, a former employee, illegally accessed electronically stored information after<br />

being terminated. The parties agreed a computer forensics examination was necessary to analyze<br />

the defendant’s computer, but could not reach agreement on how the examination should<br />

progress. To protect his privacy, the defendant sought to restrict the search by keywords <strong>and</strong> file<br />

type, but the plaintiff argued such would be under inclusive. Recognizing that the effectiveness of a<br />

particular search methodology requires expert testimony, Magistrate Judge Facciola required the<br />

plaintiff to submit an affidavit from its examiner explaining, inter alia, the limitation of the proposed<br />

search, how the search is to be conducted, whether a mirror image would be a perfect copy <strong>and</strong><br />

whether there would be some reason to preserve the drive once imaged.<br />

� Tequila Centinela, S.A. de C.V. v. Bacardi & Co. Limited, 2008 WL 565100 (D.D.C. March 4,<br />

2008). In this trademark registration dispute, the defendant sought attorney’s fees <strong>and</strong> costs<br />

associated with the plaintiff’s failure to comply with an earlier discovery order. The defendant<br />

sought monetary reimbursement for the filing of the second motion to compel as well as the<br />

pending motion for fees <strong>and</strong> costs. The plaintiff argued the time spent on unrelated issues <strong>and</strong><br />

those the defendant did not ultimately prevail on should not be awarded. Additionally, the plaintiff<br />

claimed that the defendant’s time estimation was grossly unreasonable <strong>and</strong> excessive. Agreeing<br />

with the plaintiff, the court denied reimbursement for ordinary litigation activities, including time<br />

spent on document review <strong>and</strong> related activities <strong>and</strong> internal discussions concerning the plaintiff’s<br />

discovery failures.<br />

� United States v. O’Keefe, 2008 WL 449729 (D.D.C. Feb. 18, 2008). In this suit, the government<br />

alleged the defendant received gifts from the co-defendant in exchange for expedited visa<br />

requests. The defendants filed a motion to compel claiming the government did not fulfill the<br />

responsibilities set forth in a previous discovery Order. Included within the electronic search were<br />

electronic documents <strong>and</strong> e-mails that the defendants claimed were produced in a manner<br />

rendering them unidentifiable. Applying Fed.R.Civ.Pro. 34, the court ordered the parties to<br />

participate in a good faith attempt to reach an agreement on production in a readily usable format.<br />

� D’Onofrio v. SFX Sports Group, Inc., 2008 WL 189842 (D.D.C. Jan. 23, 2008). In this<br />

employment discrimination case, the plaintiff brought suit against her former employer alleging<br />

disparate treatment based on gender, a hostile work environment <strong>and</strong> termination in retaliation for<br />

protected activities. After several discovery conferences <strong>and</strong> motions, the case was referred to<br />

Magistrate Judge John M. Facciola for management of the discovery process. In the current motion<br />

10


to compel, the plaintiff sought production of a document known as the “Business Plan” in its original<br />

electronic format with accompanying metadata <strong>and</strong> claimed the defendant caused deliberate<br />

spoliation of electronic records <strong>and</strong> failed to produce relevant documents. The defendant argued<br />

production of the Business Plan in its original format was not required by FRCP 34 absent a<br />

specific request <strong>and</strong> it never received any correspondence alleging deficiencies in its production.<br />

The judge determined that because the plaintiff failed to request the Business Plan in a specific<br />

format, she was precluded from seeking reproduction in a different format because the “if<br />

necessary” clause of FRCP 34 establishes the permissible scope of a discovery request but does<br />

not establish constraints on the manner of production. Additionally, the judge ordered an<br />

evidentiary hearing to assess the merits of the spoliation claim, finding the record simply too thin.<br />

� Hubbard v. Potter, 2008 WL 43867 (D.D.C. Jan. 3, 2008). In this suit, the plaintiffs claimed they<br />

were denied an interpreter at safety meetings, preventing them from safely <strong>and</strong> properly performing<br />

their duties. The defendant filed a motion to end pre-certification discovery, arguing the plaintiff had<br />

adequate time to complete discovery. The plaintiffs argued that the defendant’s production was<br />

insufficient <strong>and</strong> incomplete. The court granted the defendant’s motion <strong>and</strong> found that the plaintiffs<br />

failed to show that documents produced by the defendant permitted a reasonable deduction that<br />

other documents existed <strong>and</strong> refused to rely on the plaintiffs’ mere “hunch” or “speculation”. The<br />

plaintiffs also claimed additional discovery was warranted due to the defendant’s labeling of<br />

responsive documents as non-responsive <strong>and</strong> failing to initially produce them. Based on this<br />

argument, the court ordered an evidentiary hearing to determine whether additional production may<br />

be warranted.<br />

� Smith v. Café Asia, 2007 WL 2849579 (D.D.C. Oct. 2, 2007). In this suit alleging sexual<br />

discrimination, assault <strong>and</strong> battery, the defendant, a former employer of the plaintiff, sought images<br />

stored on the plaintiff’s cell phone to prove the plaintiff invited the treatment that incited the suit.<br />

The case was referred to United States Magistrate Judge Facciola for resolution. Judge Facciola<br />

stated that Fed. R. Civ. P. 26 is not an “all-or-nothing proposition” <strong>and</strong> the probative value of the<br />

sought-after materials must outweigh their prejudice. After conducting a Rule 26 <strong>and</strong> Federal Rule<br />

of Evidence 412 analysis, Judge Facciola ordered the plaintiff to preserve the stored images.<br />

Additionally, Judge Facciola allowed the defendant to designate one attorney to inspect the stored<br />

images in order to provide the trial judge with a fully informed debate regarding the images’<br />

admissibility.<br />

� United States v. Ferguson, 508 F.Supp.2d 7 (D.D.C. Sept. 10, 2007). In this drug trafficking<br />

prosecution, the defendant moved to suppress Yahoo! <strong>and</strong> MSN Hotmail e-mail evidence obtained<br />

by the government, which was seized pursuant to the magistrate judge’s order under the Stored<br />

Communications Act (SCA). The defendant challenged the SCA’s constitutionality, <strong>and</strong> in turn, the<br />

government argued that the constitutionality of the SCA had no bearing on whether the evidence<br />

warranted suppression. Denying the defendant’s motion to suppress, the court found that the SCA<br />

does not provide a suppression remedy <strong>and</strong> concluded that the government’s reliance on the SCA<br />

was objectively reasonable.<br />

� Peskoff v. Faber, 2007 WL 2416119 (D.D.C. August 27, 2007). In this ongoing discovery battle,<br />

unsatisfied with the defendant’s compliance with discovery obligations, the court ordered the<br />

defendant to search all depositories of electronic information in which one could reasonably expect<br />

to find emails where plaintiff’s name appeared. The plaintiff claimed there was no email from mid-<br />

2001 to mid-2003 in the defendant’s original production with the plaintiff as recipient or sender or<br />

any with his name in the text. However the plaintiff maintained the same email account from June<br />

of 2000 to April 2004. The court ordered an evidentiary hearing at which the defendant failed to<br />

11


appear, so the court construed his failure to comply with the order against him <strong>and</strong> proceed to<br />

other evidence. The defendant’s counsel merely insisted any information not already produced was<br />

no longer in existence, so the court ordered the parties to seek estimates from experts for a search<br />

<strong>and</strong> production in tiff or pdf format to determine the importance of the discovery to the issue in the<br />

litigation.<br />

� Disability Rights Council of Greater Wash. v. Wash. Metro. Transit Auth., 2007 WL 1585452<br />

(D.D.C. June 1, 2007). In a suit alleging violations of the Americans with Disabilities Act, inter alia,<br />

the plaintiff motioned the court to order the defendant to restore <strong>and</strong> search backup tapes for<br />

discoverable information. The plaintiff claimed discovery of the backup tapes was necessary<br />

because the defendant’s e-mail system was programmed to automatically delete all e-mails after<br />

60 days, <strong>and</strong> the defendant did nothing to stop the obliteration since the filing of the law suit, over<br />

three years earlier. The defendant argued that such an order would create undue burden <strong>and</strong><br />

expense, <strong>and</strong> that there was little reason to suppose that the backup tapes would produce relevant<br />

information. The court granted the plaintiff’s motion noting that while, “[T]he newly amended<br />

Federal Rules of Civil Procedure initially relieve a party from producing electronically stored<br />

information that is not reasonably accessible because of undue burden <strong>and</strong> cost, I am anything but<br />

certain that I should permit a party who has failed to preserve accessible information without cause<br />

to then complain about the inaccessibility of the only electronically stored information that remains.”<br />

The court also ordered the parties to meet <strong>and</strong> confer to reach an agreement as to how the backup<br />

tape restoration, search, review, <strong>and</strong> production would be conducted. The court suggested concept<br />

searching as opposed to keyword searching as a more efficient search method, likely to produce<br />

more comprehensive results.<br />

� Peskoff v. Faber, 240 F.R.D. 26 (D.D.C. Feb. 21, 2007). In a suit alleging fraud, breach of<br />

fiduciary duty, breach of contract, <strong>and</strong> conversion inter alia, the plaintiff moved the court to compel<br />

the discovery of e-mails relating to the suit. In a previous electronic document production, there<br />

were unexplained time gaps which, the plaintiff argued, suggested a complete <strong>and</strong> accurate search<br />

was not completed by the defendant. The defendant argued that he would be willing to submit his<br />

hard drive for imaging by the plaintiff, but that he would not endure the costs of production. After<br />

supplemental submissions by the parties regarding the extent of the search, the court determined<br />

the defendant only searched two of the five places where e-mail evidence may be found <strong>and</strong> that<br />

this was not a sufficient search for relevant ESI. The court also ruled that the defendant must<br />

endure the costs of producing relevant ESI contained his hard drive, citing the new Federal Rules<br />

of Civil Procedure. The court stated that accessible data must be produced at the cost of the<br />

producing party <strong>and</strong> that “cost-shifting does not even become a possibility unless there is first a<br />

showing of inaccessibility.” It cannot be argued, stated the court, that “a party should ever be<br />

relieved of its obligation to produce accessible data merely because it may take time <strong>and</strong> effort to<br />

find what is necessary.”<br />

� Peskoff v. Faber, 2006 WL 1933483 (D.D.C. July 11, 2006). The court considered the plaintiff’s<br />

motion to compel the defendant to produce additional e-mails written by or addressed to the<br />

plaintiff while employed by the defendant. During discovery, the defendant presented the plaintiff<br />

with computer disks that the defendant asserted contained “all [plaintiff’s] electronic files, including<br />

documents stored on his computer hard drive, e-mail, <strong>and</strong> any other [plaintiff] electronic<br />

documents.” However, the discovery production did not include two years worth of e-mails received<br />

or authored by the plaintiff from 2001 through 2003. The plaintiff argued the defendant failed to<br />

adequately explain the missing e-mails or detail the steps taken to search for the e-mails in the<br />

defendant’s computer system or archives. Countering, the defendant maintained no documents<br />

12


had been withheld, <strong>and</strong> if e-mails were missing, they no longer existed. The defendant informed<br />

the court that it subleases space from a law firm <strong>and</strong> its electronic files were stored on the law<br />

firm’s server. The court observed there were several possible locations where the missing e-mails<br />

could be located, including the plaintiff’s e-mail account at work, other employee accounts, on hard<br />

drives of company computers <strong>and</strong> on backup tapes of the law firm’s server. The court ordered the<br />

defendant to provide a detailed affidavit specifying the nature of the search the defendant<br />

conducted in locating the responsive e-mails. It further ruled the plaintiff would then have ten days<br />

to respond to the adequacy of the search described in the affidavit <strong>and</strong> at that point the court would<br />

consider whether additional searches were necessary.<br />

� J.C. Associates v. Fidelity & Guar. Ins. Co., 2006 WL 1445173 (D.D.C. May 25, 2006). In an<br />

insurance coverage dispute, the plaintiff challenged the defendant’s interpretation of a policy<br />

exclusion clause <strong>and</strong> sought discovery of related claim <strong>and</strong> litigation files in the defendant’s<br />

possession. The defendant resisted the discovery request, but conducted a preliminary electronic<br />

search of its 1.4 million claim <strong>and</strong> litigation files <strong>and</strong> identified 454 related claims. The judge<br />

articulated that the issue of whether or not to order discovery of the defendant’s files was not a<br />

matter of “relevance, but rather burdensomeness.” The judge ordered file-sampling, instructing the<br />

defendant to r<strong>and</strong>omly select <strong>and</strong> scan 25 of the 454 identified claims into an electronically<br />

searchable document. The court identified four specific search terms that the defendant should use<br />

in conducting <strong>and</strong> electronic search of the claims for responsiveness. The judge instructed the<br />

defendants to review documents containing those keywords <strong>and</strong> to produce any non-privileged,<br />

responsive information to the plaintiff. The court retained the authority to dem<strong>and</strong> further discovery<br />

<strong>and</strong> allocate costs after reviewing the information produced from the 25 files.<br />

� Breezevale Ltd. v. Dickinson, 879 A.2d 957 (D.C. Cir. 2005). A tire distributing company brought<br />

an action against its attorneys for legal malpractice. The company alleged the attorneys should<br />

have delayed the deposition of one of the company’s employees until the company could further<br />

investigate the employee’s conduct. The employee being deposed claimed she forged documents<br />

relating to a lawsuit against a tire manufacturing company at the direction of <strong>and</strong> in collaboration<br />

with company executives. At trial, the court dismissed the legal malpractice lawsuit <strong>and</strong> imposed<br />

fees upon the company for knowingly bringing a suit based on forged documents. A computer<br />

evidence expert testified two documents were created on the employee’s computer with a last<br />

access date that corroborated the employee’s testimony. In addition, the expert determined one of<br />

the documents was computer-generated, even though the defendant did not own a computer at<br />

that time. Other evidence of forgery included two documents that were typed on a letterhead that<br />

did not exist at the time of the alleged document create dates. Based on this evidence, the trial<br />

court came to the “inescapable conclusion” the documents at issue were forged. The appellate<br />

court affirmed the lawsuit dismissal <strong>and</strong> award of $4 million in fees based on its finding that<br />

sufficient evidence demonstrated the company’s executives knew <strong>and</strong> participated in the forgeries.<br />

However, the court vacated the $1 million punitive sanctions, noting, “[t]he other sanctions imposed<br />

by the trial court themselves bore ‘punitive’ elements.”<br />

� Wild v. Alster, 377 F.Supp.2d 186 (D.D.C. 2005). In a medical malpractice lawsuit, the plaintiff<br />

moved for a new trial after the jury found in favor of the defendant. The plaintiff alleged the court<br />

erroneously denied a request for an expert examination of the defendant’s computer. In particular,<br />

the plaintiff sought to discover if certain dates, specifically the date photographs of her face were<br />

taken, could be retrieved from the defendant’s hard drive. The original photographs were lost<br />

during a computer system conversion; however, the defendant was able to recover some of the<br />

photos with the assistance of a data recovery service. The recovered photos only displayed the<br />

13


dates on which the photos were imported into the new system <strong>and</strong> not the dates on which they<br />

were originally taken. Despite this, the plaintiff asserted the defendant’s computer consultant<br />

testified in a deposition that the original dates were retrievable. In reviewing the deposition<br />

testimony, the court determined the expert actually stated it would be impossible to print any of the<br />

photographs with dates indicating when they were originally taken. In denying the motion for a new<br />

trial, the court concluded the plaintiff was not prejudiced by being prohibited from presenting the<br />

import date information to the jury <strong>and</strong> further stated that the court was well within its bounds to<br />

prevent further discovery of the computer system given the plaintiff’s request was made a year <strong>and</strong><br />

a half after the discovery period closed.<br />

� Jinks-Umstead v. Engl<strong>and</strong>, 227 F.R.D. 143 (D.D.C. 2005). In a case involving discrimination<br />

allegations against the U.S. Navy, the court granted a new trial to allow the plaintiff to present its<br />

case using new evidence which the defendant initially claimed it no longer had <strong>and</strong> did not produce<br />

during discovery. At trial, after the defendant produced this information – 1,400 pages of reports<br />

generated from a database – for the first time, the court granted the plaintiff’s motion for a new trial<br />

<strong>and</strong> for additional limited discovery. After the court granted the motion, the plaintiff filed a series of<br />

related post-trial discovery motions. The plaintiff requested, inter alia, compliance with an earlier<br />

order to provide access to the defendant’s database for review by either the plaintiff’s counsel or a<br />

computer technology consultant, to determine if information could be retrieved from the database.<br />

The defendant argued it had given the plaintiff access to the database during a specified time, but<br />

the plaintiff failed to accept the offer. The court declined to analyze whether the plaintiff forfeited its<br />

database inspection opportunity because new deposition testimony of one of the defendant’s<br />

employee’s indicated the information could be retrieved by specific data queries. Based on this<br />

testimony, the court ordered the defendant to query the database, retrieve the relevant information,<br />

<strong>and</strong> produce it to the plaintiff within 60 days of the order. See also Jinks-Umstead v. Engl<strong>and</strong>, 2005<br />

WL 3312947 (D.D.C. Dec. 07, 2005)(Distinguishing Morgan Stanley decision in concluding adverse<br />

inference instruction not appropriate where defendant did not act with “evil intent, bad faith, or<br />

willfulness.”).<br />

� Judicial Watch, Inc. v. United States Dep’t. of Justice, 337 F.Supp.2d 183 (D.D.C. 2004), rev’d,<br />

432 F.3d 366 (D.C. Cir. 2005). The defendants filed a motion for reconsideration of the court’s<br />

earlier ruling relating to the production of nine e-mail messages for which they had asserted the<br />

attorney work-product privilege. Pursuant to the Freedom of Information Act (FOIA), the court had<br />

previously required the defendants to provide the plaintiff with redacted copies of the privileged emails.<br />

In its motion for reconsideration, the defendants argued that the FOIA segregability<br />

requirement – m<strong>and</strong>ating production of “any reasonably segregable portion of a record” – did not<br />

apply <strong>and</strong>, as a result, the e-mails did not need to be produced. The court rejected this argument,<br />

holding that the FOIA segregability requirement applies to all documents, including e-mails.<br />

Emphasizing that the defendants made no effort to separate factual <strong>and</strong> privileged material, the<br />

court denied the defendants’ motion <strong>and</strong> ordered production of the redacted copies. On appeal, the<br />

court determined the entire contents of the e-mails were prepared in anticipation of litigation,<br />

protected by the attorney work-product doctrine, <strong>and</strong> exempt from disclosure.<br />

� United States v. Philip Morris USA Inc., 327 F.Supp.2d 21 (D.D.C. 2004). In a case brought by<br />

the government involving smoking <strong>and</strong> health related issues, the government filed a motion for<br />

evidentiary <strong>and</strong> monetary sanctions against the defendants for spoliation of evidence. Although the<br />

court had ordered preservation of all potentially relevant documents, the defendants continued to<br />

delete e-mail when it became sixty days old, on a monthly systemwide basis for a period of two<br />

years after the court order. Even after learning about their inadequate document retention policy,<br />

14


the defendants continued to destroy documents for several months, including relevant e-mails from<br />

at least eleven company supervisors <strong>and</strong> officers. In addition, the defendants failed to notify the<br />

court about the situation until four months after they found out about it. Finding that a significant<br />

number of e-mails had been permanently destroyed, the court declared that “it is astounding that<br />

employees at the highest corporate level in Philip Morris, with significant responsibilities pertaining<br />

to issues in this lawsuit, failed to follow [the] Order…which, if followed, would have ensured the<br />

preservation of those e-mails which have been irretrievably lost.” Granting the government’s motion<br />

for sanctions, the court stated that it will preclude the defendants from calling a key employee, who<br />

failed to follow the retention policy, as a fact or expert witness at trial. The court also ordered the<br />

defendants to pay costs relating to the spoliation as well as $2,750,000 in monetary sanctions. See<br />

also United States v. Philip Morris USA Inc., 223 F.R.D. 1 (D.D.C. 2004).<br />

� Arista Records, Inc. v. Sakfield Holding Co. S.L., 314 F.Supp.2d 27 (D.D.C. 2004). In a<br />

copyright infringement suit, the court issued an order compelling the defendant to produce<br />

computer servers, which hosted the defendant’s web site <strong>and</strong> contained records of its users. When<br />

the plaintiffs’ computer expert inspected the servers, he discovered that the vast majority of that<br />

information had been intentionally destroyed after the defendant learned that litigation was<br />

imminent. The expert found that the defendant ran a program, designed to erase electronically<br />

stored information, more than 50 times from a remote location in an attempt to delete all electronic<br />

data from the servers. In spite of the defendant’s attempts, the expert recovered a small amount of<br />

data to support the plaintiffs’ claims. Although the defendant attempted to attack the plaintiffs’<br />

methodologies for extrapolating the number of users <strong>and</strong> downloads, the court indicated that the<br />

defendant was “in a poor position to attack plaintiffs’ evidence,” noting that “[d]estruction of<br />

evidence raises the presumption that disclosure of the materials would be damaging.” The court<br />

decided not to issue sanctions but instead encouraged the plaintiffs to move for appropriate<br />

sanctions as the case progressed.<br />

� In re Lorazepam <strong>and</strong> Clorazepate Antitrust Litig. v. Mylan Lab., Inc., 300 F. Supp. 2d 43<br />

(D.D.C. 2004). In a class action antitrust lawsuit, the plaintiff sought to compel discovery of<br />

electronic documents. The defendant objected to the request arguing that the documents had<br />

already been produced. The plaintiff responded, claiming that the unindexed document “dump”<br />

produced on CD-ROM did not meet the defendant’s obligation to match documents with discovery<br />

requests as closely as possible. The court required the plaintiff to take the CD-ROM’s to a<br />

computer forensic or electronic discovery expert before the court would require the defendant to<br />

index the information. The e-evidence expert was to ascertain whether the electronic information<br />

could be read <strong>and</strong> searched by commercially available software or converted to a format in which it<br />

could be done.<br />

� Bethea v. Comcast, 218 F.R.D. 328 (D.D.C. 2003). Former employee sought to compel the<br />

defendant to allow her to inspect their computer systems to determine whether the defendant<br />

possessed any additional documents that had not yet been produced in discovery. The defendant<br />

argued that the plaintiff should not be allowed to inspect its computers because the defendant had<br />

already produced all unprivileged documents in response to the plaintiff’s discovery requests.<br />

Additionally, the defendant claimed that the plaintiff did not show that relevant material existed on<br />

the computer systems or that the defendant was unlawfully withholding documents. Ruling in favor<br />

of the defendant, the court noted that the plaintiff did not show that the documents she sought<br />

actually existed or that the defendant unlawfully failed to produce them. The court further declared<br />

that mere suspicion that another party failed to respond to document requests was not enough to<br />

justify court-ordered inspection of the defendant’s computer systems.<br />

15


� L<strong>and</strong>mark Legal Foundation v. Environmental Protection Agency, 272 F. Supp. 2d 70 (D.D.C.<br />

2003). Concerned that documents responsive to its Freedom of Information Act request would not<br />

survive the transition between governmental administrations, the plaintiff requested the court to<br />

enter a preliminary injunction prohibiting the EPA from destroying, removing, or tampering with<br />

potentially responsive documents. The court granted the motion <strong>and</strong> issued an injunction. Despite<br />

the court’s order, the hard drives of several EPA officials were reformatted, e-mail backup tapes<br />

were erased <strong>and</strong> reused, <strong>and</strong> individuals deleted received e-mails. The court found the EPA in<br />

contempt <strong>and</strong> concluded that the appropriate sanction was to impose sanctions in the form of the<br />

plaintiff’s attorney’s fees <strong>and</strong> costs incurred as a result of the EPA’s conduct.<br />

� McPeek v. Ashcroft, 212 F.R.D. 33 (D.D.C. 2003). In its August 1, 2001 Order, the court ordered<br />

the defendant to search certain backup tapes to assist in ascertaining whether additional searches<br />

were justified. After completing this backup tape sample, the parties could not agree whether the<br />

search results produced relevant information such that a second search was justified. The<br />

magistrate stated, “[t]he frustration of electronic discovery as it relates to backup tapes is that<br />

backup tapes collect information indiscriminately, regardless of topic. One, therefore, cannot<br />

reasonably predict that information is likely to be on a particular tape. This is unlike the more<br />

traditional type of discovery in which one can predict that certain information would be in a<br />

particular folder because the folders in a particular file drawer are arranged alphabetically by<br />

subject matter or by author.” After examining the likelihood of relevant data being contained on<br />

each of the backup tapes, the magistrate ordered additional searches of selected backup tapes<br />

likely to contain relevant evidence.<br />

� United States v. First Data, 287 F. Supp.2d 69 (D.D.C. Oct. 31, 2003). In directing a Scheduling<br />

<strong>and</strong> <strong>Case</strong> Management Order, the court ordered limits on paper <strong>and</strong> electronic document<br />

discovery. Specifically, the court instructed the parties to “produce documents in either hard copy<br />

form, or, in the case of electronic documents, in the native electronic format (or a mutually<br />

agreeable format).”<br />

� New York v. Microsoft Corp., 2002 WL 649951 (D.D.C. Apr. 12, 2002). Microsoft challenged<br />

several e-mails appended to the written testimony of one of the plaintiff’s witnesses, claiming that<br />

the statement contained therein were inadmissible hearsay. The court excluded multiple e-mail<br />

messages using the following reasoning: (1) they were offered for the truth of the matters they<br />

asserted, (2) had not been shown to be business records as required under Rule 803(6), <strong>and</strong> (3)<br />

contained multiple levels of hearsay for which no exception had been established.<br />

� Cobell v. Norton, 206 F.R.D. 324 (D.D.C. 2002). The court issued sanctions, including attorneys<br />

fees <strong>and</strong> expenses, under Rule 37 based upon the defendants’ request for a protective order<br />

clarifying that it “may produce e-mail in response to discovery requests by producing from paper<br />

records of e-mail messages rather than from backup tapes <strong>and</strong> may overwrite backup tapes.” The<br />

defendants had previously been ordered to produce the e-mail messages from the back-up tapes.<br />

The court held that the defendants’ motion for protective order clarifying their duty to produce the email<br />

was not appropriate.<br />

� United States v. Sungard Data Systems, 173 F. Supp. 2d 20 (D.D.C. 2001). In an antitrust<br />

action, the court set forth specific confidentiality requirements, including a precise method for<br />

designating confidential electronic documents.<br />

� McPeek v. Ashcroft, 202 F.R.D. 31 (D.D.C. 2001). In a sexual harassment action against the<br />

plaintiff’s employer, the plaintiff sought to force the defendant to search its backup systems for data<br />

that was deleted by the user but was stored on backup tape. The defendant rebutted that the<br />

remote possibility of yielding relevant evidence could not justify the costs involved. Instead of<br />

16


ordering recovery <strong>and</strong> production of relevant documents from all of the existing backup tapes, the<br />

Magistrate ordered the defendant to restore <strong>and</strong> produce responsive e-mails from one person’s<br />

computer over a one year period. After this sample data was produced <strong>and</strong> accessed, the<br />

Magistrate would then determine if a broader recovery <strong>and</strong> search was warranted given the burden<br />

<strong>and</strong> expense.<br />

� Alex<strong>and</strong>er v. FBI, 186 F.R.D. 78 (D.D.C. 1998). The court concluded that it was appropriate to<br />

order an examination of employee’s computer hard drive <strong>and</strong> server to determine whether<br />

responsive documents that had not been already produced actually existed. See also Alex<strong>and</strong>er v.<br />

FBI, 188 F.R.D. 111 (D.C. Cir. 1998). The court refused to require the defendants to completely<br />

restore all deleted files <strong>and</strong> e-mail where the plaintiff did not propose “targeted <strong>and</strong> appropriately<br />

worded searched of backed-up <strong>and</strong> archived e-mail <strong>and</strong> deleted hard drives for a limited number of<br />

individuals.”<br />

� Armstrong v. Executive Office of the President, 1 F.3d 1274 (D.C. Cir. 1993), rev’d in part on<br />

other grounds, 90 F.3d 553 (D.C. Cir. 1996). The district court held that government agencies who<br />

merely instructed employees to print out a paper version of any electronic communication had not<br />

reasonably discharged their preservation obligations under the Federal Records Act. The appellate<br />

court affirmed stating, “[w]ithout the missing information, the paper print-outs--akin to traditional<br />

memor<strong>and</strong>a with the "to" <strong>and</strong> "from" cut off <strong>and</strong> even the "received" stamp pruned away--are<br />

dismembered documents indeed.”<br />

� Armstrong v. Bush, 807 F. Supp. 816 (D.C. 1992). The plaintiffs filed a motion for a Temporary<br />

Restraining Order (TRO) in order to prevent the destruction of presidential materials stored on an<br />

electronic communication system, including any systems that were altered during the course of<br />

litigation. The defendants objected, contending that discovery had been closed for over six months.<br />

The court rejected the defendants’ argument <strong>and</strong> issued the TRO, stating that the preservation of<br />

records on the tapes would not present an undue burden on the defendant.<br />

� PHE, Inc. v. Department of Justice, 139 F.R.D. 249 (D.D.C. 1991). The court ordered the<br />

plaintiffs to produce computerized tax records even though the plaintiffs possessed no computer<br />

program to retrieve or display the records. “Although no program may presently exist to obtain the<br />

information requested, the court is satisfied that with little effort the plaintiffs can retrieve the<br />

necessary <strong>and</strong> appropriate information…It would not be unreasonable to require the plaintiffs to<br />

incur modest additional expenditures so as to provide the defendants with the discovery necessary<br />

to establish that they are not acting in bad faith <strong>and</strong> vindictively.”<br />

� Indiana Coal Council v. Nat’l Trust for Historic Preservation, 118 F.R.D. 264 (D.D.C. 1988).<br />

The court held that the work product doctrine prevented the plaintiff from gaining access to the<br />

defendant’s legal research resources <strong>and</strong> findings conducted through a computer assisted legal<br />

research system.<br />

District of Puerto Rico<br />

� Baez-Eliza v. Instituto Psicoterapeutico de Puerto Rico, 2011 WL 2413051 (D. Puerto Rico<br />

June 16, 2011). In this suit under the Americans with Disabilities Act, the parties requested the<br />

court determine if attorney-client privilege applied to ten e-mails sent between employees in the<br />

defendant corporation. The court had previously sanctioned both parties $500 for extensive abuses<br />

that turned the discovery process "into an all-out war," which included the filing of over 25 motions<br />

<strong>and</strong> repeated orders by the court to cooperate. Despite the previous sanctions <strong>and</strong> court’s<br />

insistence to resolve disputes amicably, the defendant continued to claim that all ten e-mails were<br />

17


protected because they disclosed the fact that the defendant was consulting with its attorney. The<br />

court found the defendant’s position showed "an ill-advised stubbornness" <strong>and</strong> "a poor<br />

underst<strong>and</strong>ing of the privilege’s reach." Though the court did determine that some of the<br />

defendant’s documents were privileged, others simply mentioned legal matters or representation<br />

but were devoid of legal content. In line with its threat to sanction further discovery misdeeds, the<br />

court sanctioned the defendant $1,000 for failing its duty of c<strong>and</strong>or to the court. In an extended<br />

conclusion, the court admonished both parties for showing "reprehensible gamesmanship" instead<br />

of civility, urging responsible practitioners to adopt the latter.<br />

� Amira-Jabbar v. Travel Servs. Inc., 726 F.Supp.2d 77 (D. Puerto Rico July 28, 2010). In this<br />

racial discrimination litigation, the plaintiff argued the defendant was liable for an allegedly racist<br />

comment that an employee posted on Facebook as the defendant allowed its employees to post<br />

photos <strong>and</strong> comments on the website during company time for company purposes, <strong>and</strong> did not<br />

have a firewall or software in place to prevent employees from using the site. The defendant<br />

moved for summary judgment, asserting it was not responsible for the incident because it had no<br />

ownership or control over the Facebook account, <strong>and</strong> did not authorize the plaintiff’s co-worker to<br />

post comments. Finding the defendant responded promptly <strong>and</strong> appropriately by blocking site<br />

access for all office computers after receiving a complaint from the plaintiff, the court held the<br />

plaintiff’s allegations were insufficient to establish a hostile work environment claim <strong>and</strong> granted<br />

summary judgment for the defendant.<br />

� Rodriguez-Torres v. Gov’t Dev. Bank of Puerto Rico, 2010 WL 174156 (D.Puerto Rico Jan. 20,<br />

2010). In this discrimination litigation, the plaintiffs sought sanctions <strong>and</strong> production of electronically<br />

stored information. The plaintiffs argued that the requested ESI, unlike hard copy documents,<br />

contained relevant information pertaining to authenticity, reliability <strong>and</strong> chain of custody in the form<br />

of native format files <strong>and</strong> metadata. In opposing these motions, the defendants claimed the ESI<br />

request was overbroad <strong>and</strong> would produce thous<strong>and</strong>s of nonresponsive, confidential <strong>and</strong> privileged<br />

documents. Following submission of an independent report approximating the ESI production cost<br />

to be $35,000, the court held that under Fed.R.Civ.P. 26(b)(2), “$35,000 [was] too high of a cost for<br />

the production of the requested ESI in this type of action” <strong>and</strong> determined the ESI was “not<br />

reasonably accessible.” Furthermore, the court found the plaintiffs’ argument that e-mails are more<br />

likely to lead to inappropriate comments was not sufficient to demonstrate good cause. Rather, the<br />

court determined the plaintiffs’ “request [was] merely a fishing expedition,” which is contrary to the<br />

point of discovery.<br />

First Circuit – State <strong>and</strong> Federal <strong>Case</strong>s<br />

� Koken v. Black & Veatch Constr., Inc., 426 F.3d 39 (1st Cir. 2005). The defendants appealed a<br />

denial of monetary sanctions for alleged discovery violations relating to a product liability <strong>and</strong><br />

breach of warranty lawsuit. In particular, the defendants claimed its document review costs were<br />

increased by the plaintiff’s delay <strong>and</strong>/or failure to provide electronic versions of damage calculation<br />

documents. Although noting the defendants were entitled to the discovery <strong>and</strong> the plaintiff made<br />

the process “more difficult than it need be,” the district court declined to impose sanctions. The<br />

district court determined that expert discovery had been delayed at that time <strong>and</strong> it was “unclear<br />

whether [the plaintiff] was deliberately obfuscating or merely stopped its discovery related expert<br />

activities because of the stay…". On appeal, the defendants argued the district court was incorrect<br />

as it never actually received the documents from the plaintiff. The appellate court noted the only<br />

18


evidence supporting this contention was an affidavit from the defendants’ damages expert. Absent<br />

further evidentiary support, the court found no clear error in the district court’s denial of sanctions.<br />

� Sheppard v. River Valley Fitness One, 203 F.R.D. 56 (D.N.H. 2001), rev’d on other grounds,<br />

2005 WL 2178821 (1st Cir. Sept. 9, 2005) aff’d in part <strong>and</strong> vacated in part by, 428 F.3d 1 (1st Cir.<br />

2005). The plaintiffs served several requests for discovery upon the defendant which defined the<br />

term “documents” broadly, encompassing both paper documents <strong>and</strong> electronic communications.<br />

However, the defendant’s attorney (Whittington) failed to turn over the requested documents in a<br />

timely fashion <strong>and</strong> some of the documents were lost or destroyed. The court held, “Notwithst<strong>and</strong>ing<br />

Whittington’s habit of trying to obstruct discovery in this case, I find that in this instance<br />

Whittington’s failure to produce computer records <strong>and</strong> to retain all drafts or other documents<br />

relating to the Aubin settlement reflects a lack of diligence rather than an intentional effort to abuse<br />

the discovery process. Nevertheless, Whittington’s failure to fully comply with this court’s March 22<br />

order has unfairly prejudiced the plaintiffs by depriving them of the opportunity to question Aubin<br />

about the contents of the documents.” The court ordered the defendant’s attorney to pay $500 to<br />

the plaintiff.<br />

� Perez v. Volvo Car Corp., 247 F.3d 303 (1st Cir. 2001). In a suit under the Racketeer Influenced<br />

<strong>and</strong> Corrupt Organizations Act, internal Volvo e-mails, which could have made a dispositive<br />

difference on the issue of Volvo’s knowledge of the fraud involved in the suit, were not called to the<br />

district court’s attention until after the court had issued summary judgment. Volvo claimed these emails<br />

offered too little, too late. However, the First Circuit disagreed, “After all, Volvo did not<br />

produce the e-mails to the plaintiffs until January 2000 (the same month that Volvo filed its<br />

summary judgment motion)--<strong>and</strong> then only in Swedish. Given the timing, the sheer volume of<br />

documents involved in the case, <strong>and</strong> the need for translation, fundamental fairness counsels in<br />

favor of treating the e-mails as newly-discovered evidence within the purview of Federal Rule of<br />

Civil Procedure 59(e).”<br />

� Fennell v. First Step Designs, Ltd., 83 F.3d 526 (1st Cir. 1996). The court denied the plaintiff’s<br />

broad request for discovery of the defendant’s entire hard drive. The court explained that the costs,<br />

burdens, delays, <strong>and</strong> likelihood of discovering the evidence must be weighed against the<br />

importance of the requested evidence. The court held requesting party must show a “particularized<br />

likelihood of discovering appropriate material.”<br />

Maine<br />

� Long v. Fairbank Farms, Inc., 2011 WL 722767 (D. Me. Feb. 17, 2011). In this discovery dispute,<br />

the defendants sought to compel production, impose sanctions <strong>and</strong> require a third party defendant<br />

to show cause why it should not be held in contempt of court for accessing documents designated<br />

as for "Attorneys’ Eyes Only." Despite finding discovery violations relating to two of five categories<br />

of documents allegedly withheld or destroyed, the court declined to impose sanctions or compel<br />

production as extraordinary relief had already been granted in a previous order permitting mirrorimaging.<br />

Regarding the next issue, attorneys for the third party defendant claimed they erroneously<br />

disseminated materials to their client marked "Attorneys’ Eyes Only," pulled the documents back<br />

<strong>and</strong> confirmed the client had not since accessed them. However, the defendants produced<br />

evidence that a separate copy of the disclosure file was created <strong>and</strong> accessed using a USB<br />

storage drive on at least two occasions, <strong>and</strong> the file had been transferred to an iPod or iPhone. In<br />

light of this evidence, the court ordered the third party defendant to show cause as to why it should<br />

not be held in contempt on account of the alleged misrepresentations.<br />

19


� Burrell v. Anderson, 353 F.Supp.2d 55 (D.Me. 2005). In a case involving a domestic abuse<br />

investigation, the plaintiff claimed employees of the district attorney’s office, police department, <strong>and</strong><br />

the county violated his civil rights. The plaintiff filed a motion for spoliation sanctions, declaring<br />

several of the defendants failed to preserve voice-mails left by the plaintiff. The plaintiff argued the<br />

defendants should have known the voice-mails would be helpful in proving his case. In response,<br />

the defendants filed a motion for summary judgment. The court declared the plaintiff’s argument<br />

“merit[ed] little discussion” <strong>and</strong> rejected the plaintiff’s contention that “any of the defendants had a<br />

duty to keep recordings of his voice-mail messages in order to preserve evidence favorable to [the<br />

plaintiff] in this civil litigation.” The court denied the motion for sanctions <strong>and</strong> granted summary<br />

judgment in favor of the defendants, finding no genuine dispute of material fact.<br />

New Hampshire<br />

� State v. Lott, 879 A.2d 1167 (N.H. 2005). The defendant - convicted for using computer services<br />

in a manner prohibited by the law – appealed an order denying his motion to suppress the instant<br />

message evidence that led to his conviction. Specifically, the defendant claimed an undercover<br />

detective violated a statute prohibiting interception of telecommunications when he recorded the<br />

instant message conversation. While posing as a fictitious child, the detective had engaged in <strong>and</strong><br />

recorded an instant message conversation with the defendant. The detective had also enabled a<br />

Yahoo! message archiving feature that automatically creates a record of the instant message<br />

conversation, which he later saved as an electronic document. On appeal, the court found the<br />

detective intercepted the defendant’s communications but declared the evidence was still<br />

admissible. The court determined the defendant, as a matter of law, consented to the recording of<br />

the messages because the defendant impliedly knew they were being recorded. The court noted,<br />

“[l]ike an e-mail message <strong>and</strong> a message left on an answering machine, the recording of the<br />

instant message is necessary for the intended recipient of that message to read the message.” The<br />

court declined to address whether the detective illegally intercepted the instant message<br />

communication by enabling the Yahoo! message archiving feature, as the evidence was already<br />

properly admitted through the detective’s first recording method.<br />

� Thompson v. Thompson, 2002 WL 1072342 (D.N.H. May 30, 2002). The copying of e-mail<br />

messages from the hard drive of a personal computer does not constitute interception of electronic<br />

communications for the purposes of the <strong>Electronic</strong> Communications Privacy Act of 1986. The court<br />

reasoned that an interception can only occur “during transmission” of electronic communication<br />

transfers; thus, the acquisition of stored e-mail does not qualify as an interception under the ECPA.<br />

Massachusetts<br />

� Limone v. United States, 2011 WL 2489965 (D. Mass. June 20, 2011). In this claim under the<br />

Federal Tort Claims Act, the plaintiffs sought attorney fees for the government’s alleged bad faith<br />

discovery conduct after winning a substantial jury award at trial for their wrongful murder<br />

convictions – resulting in thirty years of undeserved prison time. Reviewing the government’s<br />

discovery conduct, the court found that over 7,000 documents were redacted to an<br />

"incomprehensible" extent due to the government’s claim that they contained information which<br />

could reveal the identities of confidential informants. The court found that during the government’s<br />

two-year-long discovery stonewalling effort, the FBI had not allowed the government lawyers<br />

h<strong>and</strong>ling the case to see the unredacted versions of the documents in question. Citing this<br />

20


ehavior as a direct contradiction of the reasonable inquiry requirement under Fed.R.Civ P. 26(g),<br />

the court found the government’s actions constituted bad faith. Finding the government’s behavior<br />

warranted sanctions, the court scheduled a hearing to determine which costs were reasonably<br />

related to the bad faith conduct.<br />

� Bower v. Bower, 2011 WL 1326643 (D. Mass. Apr. 5, 2011). In this tort litigation relating to the<br />

alleged abductions of the plaintiff’s minor children, the plaintiff sought to compel Yahoo! <strong>and</strong><br />

Google to comply with a third party document subpoena <strong>and</strong> to compel the defendant to consent to<br />

the production of e-mails. Agreeing with Yahoo! <strong>and</strong> Google that the Stored Communications Act<br />

(SCA) barred the requested production absent the defendant’s consent <strong>and</strong> finding no exception<br />

requiring compliance with a civil subpoena, the court denied the motion to compel. The court cited<br />

case law that supported ordering consent as a sanction for failure to comply with a Fed.R.Civ.P. 34<br />

document request, however, it found no support to order consent for failure to respond to a motion<br />

to compel consent. Further, the court disregarded the plaintiff’s argument that the defendant’s<br />

fugitive status should be sufficient to order consent <strong>and</strong> distinguished this case from those where<br />

an implied agreement has been found in light of affirmative participation in the judicial process.<br />

Based on this analysis, the court declined to find anything in the defendant’s actions (or fugitive<br />

status) from which to imply consent to disclose her information.<br />

� Charm v. Kohn, 2010 WL 3816716 (Mass. Super. Sept. 30, 2010). In this discovery dispute, the<br />

defendant moved to strike an inadvertently produced e-mail to preclude its further use in the<br />

litigation. The e-mail was disclosed when the defendant – a BCC recipient – accidentally<br />

responded to all recipients of an e-mail sent by his attorney to co-counsel <strong>and</strong> opposing counsel.<br />

Distinguishing this case from those in which counsel inadvertently discloses attorney-client<br />

privileged communications while producing voluminous documents, the court nevertheless<br />

considered whether counsel took reasonable steps to preserve the communication’s confidentiality.<br />

The court found the counsel’s use of BCC gave rise to a foreseeable risk, but agreed that the<br />

transmission was obviously unintended <strong>and</strong> was an easy mistake to make. Noting it was a close<br />

decision, the court stated that “[a]n excessive readiness … to find waiver would tend to erode the<br />

privilege” that is “tremendously important in our legal system.” Giving consideration to the fact that<br />

counsel quickly dem<strong>and</strong>ed deletion of the inadvertently produced document, the court granted to<br />

motion to strike <strong>and</strong> cautioned against “the temptation to seize opportunities arising from<br />

inadvertent disclosures.”<br />

� Dahl v. Bain Capital Partners, LLC, 2009 WL 1748526 (D. Mass. June 22, 2009). In this antitrust<br />

litigation, the plaintiffs moved for entry of an order governing discovery regarding costs, metadata<br />

<strong>and</strong> production format. After making clear that electronic discovery must proceed in an organized<br />

<strong>and</strong> managed fashion, the court first ordered the defendants to pay their own costs in producing<br />

electronic documents to the plaintiffs, as they did not demonstrate the data’s inaccessibility.<br />

Second, the court held the defendants did not have to incur costs to change the production format<br />

of already produced documents, because the plaintiffs did not show that translating the documents<br />

to another production format was necessary to make the documents “reasonably usable” under<br />

Fed.R.Civ.P. 34. Third, the court refused to compel the defendant to produce “all metadata,” citing<br />

wariness that metadata may not lead to admissible evidence <strong>and</strong> that requests for metadata should<br />

be tailored to specific documents. Finally, the court ordered the defendants to produce their<br />

spreadsheets <strong>and</strong> privilege logs in native format pursuant to Fed.R.Civ.P. 34’s requirement that<br />

documents be produced as they are kept in the “usual course of business.”<br />

� Capitol Records, Inc. v. Alaujan, 2009 WL 1292977 (D.Mass. May 6, 2009). In this copyright<br />

infringement case, the defendant moved for a protective order to prevent the mirror imaging of two<br />

21


computers. The defendant argued the discovery was overbroad, an invasion of privacy <strong>and</strong><br />

violated attorney-client privilege. The plaintiffs sought inspection of the computers to determine<br />

whether they were used for file sharing. The court granted the protective order <strong>and</strong> denied imaging<br />

with regard to one of the computers that was barely addressed by the plaintiffs in their response to<br />

the defendant’s motion. The court allowed imaging of the second computer subject to a protective<br />

order whereby the plaintiffs would select a computer forensic expert to examine relevant, nonprivileged<br />

data on the computer, citing the centrality of the second computer to the litigation<br />

alongside the defendant’s substantial privacy concerns. The court ordered the expert would<br />

provide a report describing any relevant files to the defendant’s counsel, who would have five days<br />

to lodge any objection before disclosing the report to the plaintiffs.<br />

� Plasse v. Tyco Elec. Corp., WL 2623441 (D. Mass. Sept. 7, 2006). In a wrongful termination suit,<br />

the defendant claimed that the plaintiff had misrepresented his credentials when applying for the<br />

position. When the defendant indicated that it would be requesting to inspect the laptop used to<br />

create the resume, the plaintiff accessed his resumes <strong>and</strong> cover letters <strong>and</strong> modified the<br />

documents’ electronic properties. However, after a computer forensics expert recovered the<br />

deleted metadata <strong>and</strong> discovered the plaintiff’s alterations, the court ruled that “Plaintiff has<br />

destroyed or concealed evidence, engaging in an egregious pattern of misconduct that has<br />

hampered the proceedings in this case.” It also noted that “Plaintiff’s explanation for this behavior is<br />

more than unconvincing; it verges on the absurd.” The court granted defendant’s motion to dismiss<br />

<strong>and</strong> for sanctions.<br />

� Natl. Econ. Res. Assoc. v. Evans, 2006 WL 2440008 (Mass. Super. Aug. 3, 2006). Plaintiff<br />

employer filed a motion to compel an employee’s e-mail communications with his attorney that<br />

were created <strong>and</strong> received on a company-issued laptop while defendant was still employed with<br />

plaintiff. The e-mails were deleted from the laptop shortly before defendant returned the laptop to<br />

plaintiff, but were later recovered from the hard drive by a computer forensics expert. The court<br />

denied plaintiff’s request because such documents were protected under the attorney-client<br />

privilege. Plaintiff argued that defendant employee waived his right to an attorney-client privilege<br />

because company policy stated that all e-mail from business <strong>and</strong> personal accounts would be<br />

monitored. Plaintiff further argued that although the privileged documents were deleted before<br />

recovery, defendant should have reasonably known that they were recoverable from his hard drive.<br />

The court ruled that defendant could not “reasonably have understood that these attorney-client<br />

communications could be ‘overheard’“. The court denied the motion because the privileged<br />

communications were viewed through a private e-mail address by employee – not on the<br />

company’s intranet, were not saved onto the laptop’s hard drive <strong>and</strong> the defendant took adequate<br />

measures to ensure that his confidential information was not easily disclosed.<br />

� Galvin v. Gillette Co., 19 Mass.L.Rptr. 380 (Mass. Super. 2005). The Secretary of the<br />

Commonwealth of Massachusetts sought compliance with a subpoena duces tecum served upon<br />

the defendant in connection with a proposed merger agreement. The defendant contended that<br />

nothing remained to be litigated <strong>and</strong> that it complied properly with all outst<strong>and</strong>ing requests from the<br />

Secretary. Inter alia, the Secretary sought an order requiring the defendant, at its own expense, to<br />

permit a vendor the opportunity to "search all e-mail, servers, archives, discs, back-up tapes, hard<br />

drives (of all computers of Gillette <strong>and</strong> Gillette personnel), <strong>and</strong> all back-up systems thereof, <strong>and</strong> all<br />

other data bases of Gillette necessary to investigate <strong>and</strong> accomplish retrieval, preservation <strong>and</strong><br />

copying of the documents." In denying the Secretary’s proposed order, the court noted several<br />

factors making the effort impossible to comply with, including the size of the defendant’s<br />

organization, the volume of computerized information, the defendant’s e-mail retention policy, <strong>and</strong><br />

22


the effort required to conduct a privilege review. Therefore, defendant did not waive his attorneyclient<br />

privilege by purposely disclosing the information to plaintiff.<br />

� Williams v. Mass. Mut. Life Ins. Co., 226 F.R.D. 144 (D.Mass. 2005). In a case arising from<br />

employment discrimination allegations, the plaintiff filed a motion to appoint a neutral computer<br />

forensic expert. The plaintiff indicated he needed the expert to inspect the defendants’ computer<br />

hard drives <strong>and</strong> search for an allegedly incriminating e-mail, which the plaintiff had once possessed<br />

but could no longer find. In the event the expert recovered the e-mail, the plaintiff asked the court<br />

to order a more detailed investigation of the defendants’ computers. The plaintiff also requested an<br />

order compelling the defendants to preserve all electronic <strong>and</strong> paper documents <strong>and</strong> to suspend<br />

backup tape recycling, automated e-mail deletions, <strong>and</strong> hard drive reformatting. In response, the<br />

defendants argued the e-mail was “most likely” in a memor<strong>and</strong>um which was already produced.<br />

The defendants also claimed they already conducted a forensic investigation, which failed to<br />

identify the e-mail. The court declined to appoint the forensic expert, finding the plaintiff’s request<br />

“at best [a] highly speculative conjecture.” The court further reasoned, “[b]efore permitting such an<br />

intrusion into an opposing party’s information system – particularly where, as here, that party has<br />

undertaken its own search <strong>and</strong> forensic analysis <strong>and</strong> has sworn to its accuracy – the inquiring party<br />

must present at least some reliable information that the opposing party’s representations are<br />

misleading or substantively inaccurate.” Although declining to appoint the expert, the court ordered<br />

the defendants to preserve documents, hard drives <strong>and</strong> e-mail boxes that their forensic expert had<br />

previously searched.<br />

� Swack v. Credit Suisse First Boston, 383 F.Supp.2d 223 (D.Mass. 2004). In a class action suit<br />

involving investment fraud accusations, the plaintiffs argued that the defendants committed fraud<br />

by disseminating research reports they knew to be overly optimistic. The defendants filed a motion<br />

to dismiss for failure to state a claim, arguing the plaintiffs did not allege a “specific false or<br />

misleading statement or omission” by the company analyst or the company manager. In support of<br />

their claims, the plaintiffs produced e-mail messages from the company analyst to the company<br />

manager relating to the fraudulent reports. In reference to the stock, one of the e-mails stated, “I<br />

think there is a risk of bankruptcy … best case is dead money.” Based on this e-mail evidence, the<br />

court determined that the plaintiffs’ complaint properly raised an issue in reference to false<br />

statements made by the company analyst. However, the court determined no such showing existed<br />

concerning the company’s manager, whose name was not on the misleading research reports <strong>and</strong><br />

who had only received the e-mails.<br />

� Campbell v. General Dynamics Gov’t Sys. Corp., 321 F.Supp.2d 142 (D.Mass 2004). In an<br />

employment discrimination suit brought by a former employee, the employer moved to compel<br />

arbitration based upon a m<strong>and</strong>atory company arbitration policy. The employer sent the policy to the<br />

employee via a mass e-mail containing two links to the policy <strong>and</strong> did not require any further action<br />

from its employees regarding the policy. In response to the employer’s motion, the employee<br />

claimed that he received a large volume of mass company e-mails daily <strong>and</strong> that he could not<br />

specifically remember the e-mail discussing the arbitration policy. Although the employer submitted<br />

an e-mail “tracking log” indicating the time <strong>and</strong> date that the employee opened the e-mail, the<br />

employer could not prove that the employee had actually read the e-mail or clicked on the links. In<br />

denying the employer’s motion, the court determined that the mass e-mail did not constitute<br />

sufficient notification about the arbitration policy. The court further admonished the employer for not<br />

taking "the incredibly simple <strong>and</strong> inexpensive step of configuring their system to log when <strong>and</strong> if<br />

employees clicked on the links to the flyer or the h<strong>and</strong>book."<br />

23


� In re Lernout & Hauspie Sec. Litig., 2004 WL 1196189 (D. Mass. May 27, 2004). In a securities<br />

fraud action, an accounting firm responded to the plaintiff’s document production request by<br />

producing eleven boxes of documents related to issues in the suit. The boxes contained several emails<br />

sent to the firm’s attorney, including one e-mail that disclosed an anonymous phone call<br />

implicating misconduct by the accounting firm. The accounting firm’s counsel insisted that the email<br />

had been disclosed accidentally <strong>and</strong> that it should be protected under both the attorney-client<br />

privilege <strong>and</strong> the work-product privilege. Rejecting this argument, the court determined that the<br />

accounting firm waived any attorney-client privilege <strong>and</strong> declared that the work product doctrine did<br />

not protect disclosure because the e-mail was prepared during the “ordinary course of business”<br />

rather than in “anticipation of litigation.” The court ordered production of 15 e-mails withheld by the<br />

accounting firm based on privilege.<br />

� Munshani v. Signal Lake Venture Fund II, 805 N.E.2d 998 (Mass. App. 2004). In a breach of<br />

contract action, the plaintiff appealed a superior court judgment that dismissed his complaint on the<br />

grounds that he had intentionally fabricated an e-mail message <strong>and</strong> then attempted to hide that<br />

fabrication. In the original action, the plaintiff presented an e-mail as evidence that precluded that<br />

trial court from dismissing his claim. The defendant, however, alleged that the plaintiff had<br />

fabricated the e-mail <strong>and</strong> moved for a preservation <strong>and</strong> production order. The court issued the<br />

order <strong>and</strong> appointed a neutral computer forensics expert to investigate the allegations. The expert<br />

prepared a 147-page report in which he determined that the plaintiff had fabricated the e-mail. The<br />

judge adopted the expert’s report as his findings on the issue <strong>and</strong> dismissed the plaintiff’s suit,<br />

ordering him to pay the expert’s costs <strong>and</strong> the defendant’s attorney fees. See Munshani v. Signal<br />

Lake Venture Fund II, 13 Mass.L.Rptr. 732 (Mass.Super. 2001). On appeal, the plaintiff admitted<br />

that he fabricated the e-mail <strong>and</strong> submitted a false affidavit. The plaintiff argued that the judge<br />

erred in finding that the e-mail was material to the case <strong>and</strong> that dismissal sanctions were too<br />

severe under the circumstances. The appellate court rejected the plaintiff’s argument <strong>and</strong> declared<br />

that the judge was justified in “imposing the ultimate sanction of dismissal.”<br />

� Cognex Corp. v. Electro Scientific Indus., Inc., 2002 WL 32309413 (D.Mass. July 2, 2002). The<br />

plaintiff moved to compel the defendant to search its electronic backup tapes for documents<br />

responsive to the plaintiff’s requests for production. Arguing that it had already conducted a lengthy<br />

<strong>and</strong> reasonable search of paper <strong>and</strong> electronic based documents, the defendant contended that<br />

the cost <strong>and</strong> burden of searching the backup tapes would be unreasonable. The plaintiff proposed<br />

that the court split the costs associated with the request, or in the alternative, offered to assume all<br />

costs associated with the request. In spite of the plaintiff’s willingness to bear costs, the court<br />

denied the motion to compel production, noting that no record of conscious destruction of<br />

documents or serious discovery discrepancy existed. The court further stated “[t]here is something<br />

inconsistent with our notions of fairness to allow one party to obtain a heightened level of discovery<br />

because it is willing to pay for it.”<br />

� Premier Homes <strong>and</strong> L<strong>and</strong> Corp. v. Cheswell, Inc., 240 F. Supp. 2d 97 (D.Mass. 2002). In a<br />

property dispute, the plaintiff used an e-mail purportedly sent from one of the defendant’s<br />

stockholders to the plaintiff’s president to form the core of its claim that the defendant was not<br />

complying with the terms of a lease. The defendant filed an ex parte motion to preserve certain<br />

electronic evidence <strong>and</strong> expedite the production of electronic records. The court, stating that it was<br />

necessary to determine the origin of the disputed e-mail, ordered the defendant’s experts to create<br />

mirror images of the plaintiff’s computer hard drives, backup tapes, <strong>and</strong> other data storage devices.<br />

Soon thereafter, the plaintiff confessed to his attorney that he had fabricated the e-mail by pasting<br />

most of a heading from an earlier, legitimate message <strong>and</strong> altering the subject matter line. The<br />

24


defendant’s motion to dismiss was granted <strong>and</strong> the court ordered the plaintiff to pay the<br />

defendant’s attorney <strong>and</strong> expert fees <strong>and</strong> court costs for committing a fraud on the court.<br />

� In re Pharmatrak, Inc. Privacy Litigation, 220 F. Supp. 2d 4 (D. Mass. 2002), rev’d on other<br />

grounds, In re Pharmatrak, Inc., 329 F.3d 9 (1st Cir. 2003). In a class action Privacy matter, the<br />

plaintiffs alleged that defendants had secretly intercepted <strong>and</strong> accessed the plaintiffs’ personal<br />

information <strong>and</strong> Web browsing habits through the use of “cookies” <strong>and</strong> other devices, in violation of<br />

state <strong>and</strong> federal law. The plaintiffs raised claims under The Wiretap Act, The Stored<br />

Communications Act, <strong>and</strong> The <strong>Computer</strong> Fraud <strong>and</strong> Abuse Act. Using computer forensic tools, the<br />

plaintiffs’ expert was able to analyze the defendant’s Website tracking logs <strong>and</strong> determine that the<br />

defendant had captured <strong>and</strong> possessed detailed private information about the plaintiffs, including<br />

their: names, addresses, telephone numbers, dates of birth, sex, insurance status, medical<br />

conditions, education levels, occupations, <strong>and</strong> e-mail content. Finding that the plaintiffs failed to<br />

establish necessary elements of each of the above listed statutes, the court issued Summary<br />

Judgment in favor of the defendant.<br />

� Commonwealth v. Ellis, 1999 WL 815818 (Mass. Aug. 27, 1999). The defendants filed a motion<br />

to suppress electronic evidence, claiming that the evidence was improperly seized <strong>and</strong> searched<br />

by a computer expert. Among other things, the defendants alleged that the computer expert should<br />

have used a keyword search instead of a file-by-file search in order to avoid unnecessarily<br />

intruding upon the defendants’ privacy. The court noted that the expert began the computer<br />

investigation with a keyword search but could not properly execute the searches because of the file<br />

system <strong>and</strong> structure. The court stated “in computer searches, keyword searches are likely the<br />

most efficient types of searches, but unless the computer analyst knows how the data was<br />

organized <strong>and</strong> stored, there will necessarily be trial <strong>and</strong> error to determine key phrases, words, <strong>and</strong><br />

places.” The court determined that the file-by-file method was “reasonable under the<br />

circumstances” because a keyword search would have been both under <strong>and</strong> over inclusive. Based<br />

on the expert’s representation, the court denied the defendant’s motion, with a few exceptions,<br />

determining that the computer search was constitutional <strong>and</strong> reasonable.<br />

� Linnen v. A.H. Robins Co., 1999 WL 462015 (Mass. Super. June 16, 1999). The defendant<br />

Wyeth failed to preserve e-mails <strong>and</strong> neglected turning over database information ordered by the<br />

court. The court sanctioned Wyeth for such “inexcusable conduct” <strong>and</strong> allowed spoliation inference<br />

to be given to jury. “A discovery request aimed at the production of records retained in some<br />

electronic form is no different in principle, from a request for documents contained in any office file<br />

cabinet.” The court continued, “To permit a corporation such as Wyeth to reap the business<br />

benefits of such [computer] technology <strong>and</strong> simultaneously use that technology as a shield in<br />

litigation would lead to incongruous <strong>and</strong> unfair results.”<br />

Rhode Isl<strong>and</strong><br />

� Dziadkiewicz v. Blue Cross & Blue Shield of Rhode Isl<strong>and</strong>, 2004 WL 2418308 (D.R.I. Oct. 21,<br />

2004). In a class action lawsuit, the plaintiffs brought a motion to compel document production <strong>and</strong><br />

further alleged the defendant’s “obfuscation, deliberate frustration of discovery, <strong>and</strong> ‘hide the ball’<br />

tactics” warranted sanctions. The plaintiffs contended that the defendant waited until the “eleventhhour”<br />

to produce documents, including a CD containing information that would have affected the<br />

plaintiffs’ expert witness’ analysis. The plaintiffs also argued the defendant failed to disclose 400 to<br />

500 e-mails that the defense expert witness had relied upon in making his own findings. In<br />

response, the defendant claimed its expert did not rely on the e-mails <strong>and</strong> the plaintiffs failed to<br />

25


properly request the e-mails during discovery. The court declared the plaintiffs should have<br />

received the database material contained on the CD much earlier – when the plaintiffs originally<br />

requested the data. Although the court found both parties partly responsible for the discovery<br />

dispute, it declared the defendant “must pay the greater price as its tactics have led directly to this<br />

situation.” The court ordered the defendant to produce all of the requested e-mails <strong>and</strong> permitted<br />

the plaintiffs to review the e-mails <strong>and</strong> re-depose the defense expert witness. The court also<br />

allowed the plaintiffs’ expert to review the e-mails <strong>and</strong> the documents on the CD <strong>and</strong> modify his<br />

report if necessary.<br />

Second Circuit – State <strong>and</strong> Federal <strong>Case</strong>s<br />

� Thyroff v. Nationwide Mutual Ins. Co., 460 F.3d 400 (2d Cir. 2006). A former insurance agent<br />

appealed the dismissal of his claims for conversion of electronic data contained in personal<br />

software <strong>and</strong> computer files retained by his former insurance company. The defendant supplied the<br />

plaintiff with computer equipment including hardware <strong>and</strong> software for operating an insurance<br />

business but confiscated the equipment when the defendant terminated the business agreement.<br />

The computer hard drives contained several software programs – bought <strong>and</strong> installed by the<br />

plaintiff – including the plaintiff’s personal information for his client <strong>and</strong> business contacts. The<br />

plaintiff <strong>and</strong> his employees gathered the information <strong>and</strong> entered it into the system without input<br />

from the insurance company. The defendant refused to return the electronic data claiming client<br />

lists <strong>and</strong> any personal information on the computer hardware was now property of the defendant<br />

since it was stored on company equipment. The plaintiff sued, claiming the electronic data<br />

contained on the computer was personal property <strong>and</strong> the defendant was liable under a theory of<br />

conversion. The defendant argued electronic data cannot be converted since it is an intangible<br />

asset <strong>and</strong> therefore dismissal was proper. In its holding, the court examined whether electronic<br />

data is tangible property capable of conversion. It compared such information to stocks <strong>and</strong> bonds<br />

which are not tangible unless a value is assigned to them by the holder. The court also noted, in<br />

dicta, computers are much like file cabinets <strong>and</strong> an employer or principal could not expect to keep<br />

an employee’s personal files contained in the file cabinet when the employee leaves the company.<br />

In the end however, the court refused to rule on the matter <strong>and</strong> rem<strong>and</strong>ed the question of whether<br />

electronic data is property <strong>and</strong> capable of conversion back to the state court for clarification.<br />

� Residential Funding Corp. v. DeGeorge Fin. Corp., 306 F.3d 99 (2d Cir. 2002). The defendants<br />

appeal the trial court’s denial of the defendants’ motion for sanctions, specifically in the form of an<br />

adverse jury instruction, for the plaintiff’s failure to produce e-mail in time for trial. The Second<br />

Circuit held that where a party breaches a discovery obligation by failing to produce evidence, the<br />

trial court has broad discretion in fashioning an appropriate sanction, including the discretion to<br />

delay the start of a trial, to declare a mistrial, or to issue an adverse inference instruction.<br />

Sanctions may be imposed where a party has not only acted in bad faith or grossly negligent, but<br />

also through ordinary negligence. Vacating the trial court’s sanctions order, the circuit court<br />

reversed <strong>and</strong> rem<strong>and</strong>ed with instructions for a renewed hearing on discovery sanctions.<br />

� V Cable Inc. v. Budnick, 23 Fed.Appx. 64 (2d Cir. 2001). In an investigation of illegal sales <strong>and</strong><br />

distribution of cable equipment, the police seized computers believed to contain relevant evidence<br />

of the crime. After holding the computers in question, the police sent them to an independent<br />

software company for analysis. Appellant’s argument implies that, once they left police custody, the<br />

computers <strong>and</strong> any records obtained therefrom became corrupted <strong>and</strong>, therefore, inadmissible<br />

26


under Rule 803(6) of the Federal Rules of Evidence. The court found the documents to be<br />

sufficiently trustworthy to be admitted under Rule 803(6).<br />

Connecticut<br />

� Tucker v. American Intern. Group, Inc., 2012 WL 902930 (D. Conn. Mar. 15, 2012). In this<br />

unlawful discharge claim against a former employer’s insurer, the plaintiff sought to compel<br />

inspection of allegedly relevant electronic records in the possession of her non-party former<br />

employer. Noting that it had already turned over several hundred responsive documents, the<br />

former employer argued that allowing the plaintiff further investigation for missing e-mails would be<br />

unduly burdensome under 26(b)(2)(C). In order to show that additional discovery would be<br />

unnecessarily duplicative, the former employer described that the plaintiff had already had some<br />

prior success in discovering the sought-after e-mails through alternative methods of discovery <strong>and</strong><br />

that the plaintiff could only speculate that the employer actually possesses the information. Carving<br />

out its undue burden argument, the former employer pointed to the affidavit of an IT director who<br />

contended that the plaintiff’s computer had been repurposed pursuant to company policy since her<br />

termination. While the plaintiff’s hard drive had been mirror-imaged, the image was<br />

indistinguishable from the images of eighty-two other employers terminated at the time of a force<br />

reduction. In order to allow for further investigation, “all eighty-three images would have to be<br />

restored[,] analyzed” <strong>and</strong> hosted on a new server. Noting that courts should protect non-parties<br />

from significant “expense <strong>and</strong> burden of compelled inspections,” the court agreed with the former<br />

employer <strong>and</strong> cited Zubalake to stay the further investigation.<br />

� Barrera v. Boughton, 2010 WL 3926070 (D. Conn. Sept. 20, 2010). In this racial profiling <strong>and</strong><br />

harassment litigation, the plaintiffs sought to compel production of electronically stored information<br />

from 40 custodians with 80 keywords over a period of six years. Estimating the cost (absent<br />

attorney document review) to be $60,000 <strong>and</strong> noting that they had already produced 948 e-mails,<br />

none of which supported the plaintiffs’ claims, the defendants objected that the ESI was not<br />

reasonably accessible <strong>and</strong> that such a request was unduly burdensome <strong>and</strong> overbroad. Agreeing<br />

with the defendants’ accessibility argument, the court found the plaintiffs failed to show good cause<br />

<strong>and</strong> ordered a phased approach to discovery. Using the plaintiffs’ search terms, the defendants<br />

were ordered to conduct a search of three of the 40 originally requested custodians for a three-year<br />

period. The court held that, as modified, the request did not constitute an undue burden or<br />

expense, <strong>and</strong> it therefore rejected the defendants’ cost-shifting request.<br />

� Trusz v. UBS Realty Investors LLC, 2010 WL 3583064 (D. Conn. Sept. 7, 2010). In this<br />

employment litigation, both parties sought sanctions, <strong>and</strong> the plaintiff sought to compel production<br />

of electronic documents arguing the defendants engaged in a “massive document dump” by<br />

producing 1.8 million documents without reviewing for<br />

relevancy (producing over 4 million documents in total). The defendants contended the production<br />

was inevitably massive despite a diligent review because the plaintiff served 208 document<br />

requests <strong>and</strong> would have been smaller if the plaintiff had identified a narrower set of search terms.<br />

Citing the Sedona Conference’s <strong>Case</strong> for Cooperation, the court found that the issues could have<br />

been eliminated or resolved if counsel had conferred about refining search terms <strong>and</strong> ordered the<br />

parties to meet <strong>and</strong> confer or face the appointment <strong>and</strong> expense of a special master. The court<br />

also denied both requests for sanctions noting several months still existed for the completion of fact<br />

discovery in this litigation.<br />

27


� Aliki Foods, LLC v. Otter Valley Foods, Inc., 2010 WL 2982989 (D. Conn. July 7, 2010). In this<br />

breach of contract <strong>and</strong> implied warranty litigation, the defendant sought dismissal, <strong>and</strong> the plaintiff<br />

moved to vacate prior orders to preserve <strong>and</strong> produce discovery-related electronic materials.<br />

Responding to allegations of stonewalling <strong>and</strong> spoliation of ESI, the plaintiff claimed that its<br />

principal’s hard drive “failed” (suspiciously coinciding with the court’s order to produce it).<br />

Moreover, months after the court ordered the drive to be forensically imaged, the plaintiff signed it<br />

over to a non-party – its principal’s new employer – without ever attempting to comply with the<br />

order. Having “lost patience,” the court found that the plaintiff’s “flagrant defiance” of numerous<br />

court orders <strong>and</strong> warnings, intentional destruction of computers <strong>and</strong> hard drives, <strong>and</strong> blatant<br />

disregard of discovery obligations, failed every factor of the Second Circuit’s test This bad faith<br />

conduct resulted in a “tremendous waste of resources” <strong>and</strong> left dismissal as the only viable<br />

sanction.<br />

� Genworth Fin. Wealth Mgmt., Inc. v. McMullan, 2010 WL 2195274 (D.Conn. June 1, 2010). In<br />

this business litigation, the plaintiff requested forensic imaging of the defendants’ computers <strong>and</strong><br />

electronic media, sought preservation <strong>and</strong> production of evidence, <strong>and</strong> solicited sanctions. The<br />

plaintiff presented evidence demonstrating that the defendants’ disposal of a computer occurred<br />

after the duty to preserve arose. Citing Ameriwood Industries, Inc. v. Liberman, the court found a<br />

"sufficient nexus" existed between the plaintiff’s claims <strong>and</strong> the need for forensic imaging. The<br />

court disregarded the defendants’ argument a neutral expert was unnecessary, determining the<br />

defendants’ hiring of an expert suggested an "end run" in the defendants’ efforts to deny discovery<br />

requested by the plaintiff. In assigning costs for the imaging work, the court noted that the<br />

defendants’ "apparent deceit, obstreperousness <strong>and</strong> destruction of relevant information"<br />

necessitated the retention of the forensic expert <strong>and</strong> ordered the defendants to bear 80 percent of<br />

the associated costs. Finally, the court awarded the plaintiff attorneys’ fees <strong>and</strong> costs, finding the<br />

defendants "wasted the Plaintiff <strong>and</strong> the Court’s resources."<br />

� Innis Arden Golf Club v. Pitney Bowes, Inc., 2009 WL 1416169 (D.Conn. May 21, 2009). In this<br />

environmental law litigation, the defendant sought sanctions alleging the plaintiff failed to preserve<br />

electronic data packages associated with soil sample testing. Noting the data at issue was<br />

undisputedly destroyed, the court analyzed whether a preservation obligation existed <strong>and</strong> whether<br />

sanctions were warranted. The court found a duty to preserve arose by mid-2005 at the latest,<br />

when the plaintiff’s documents evinced an underst<strong>and</strong>ing that the evidence would be critical to the<br />

upcoming litigation. Citing the plaintiff’s own recognition of the importance of the evidence, the<br />

court rejected the plaintiff’s argument that destruction should be excused since the defendant did<br />

not demonstrate an intent to rely on the evidence during litigation. Noting an adverse inference<br />

would be an insufficient remedy, the court found the appropriate sanction to be preclusion of the<br />

evidence.<br />

� S. New Eng. Tel. Co. v. Global NAPs, Inc., 251 F.R.D. 82 (D.Conn. 2008). In this ongoing<br />

discovery battle, the plaintiff sought default judgment sanctions alleging the defendants failed to<br />

comply with discovery orders. Detailing the lawsuit’s long history of discovery issues, the court<br />

cited several factors that justified the imposition of default judgment, noting the defendants’<br />

behavior exemplified the type of “willful disregard for the process of discovery” that warrants<br />

dismissal. The factors cited included: willful violation of court order to produce general ledgers; use<br />

of wiping software to intentionally destroy evidence, as determined by the plaintiff’s computer<br />

forensic expert; lying to the court about the ability to obtain documents from third parties;<br />

misleading answers to discovery requests; <strong>and</strong> the defendants’ long history of violating discovery<br />

orders. Determining the defendants committed a fraud upon the court, the court ordered them to<br />

28


pay judgment in favor of the plaintiff in the amount of $5,247,781.45, in addition to costs <strong>and</strong> fees<br />

of $645,760.41.<br />

� Sterle v. Elizabeth Arden, Inc., 2008 WL 961216 (D.Conn. April 9, 2008). In this unlawful<br />

termination litigation, the defendant sought a protective order to prevent further inspection of the<br />

defendant’s computer systems <strong>and</strong> attorneys’ fees. In response, the plaintiff filed a motion for<br />

contempt claiming the defendant violated the previously issued inspection order <strong>and</strong> a motion for<br />

attorneys’ fees. Addressing the defendant’s motions, the court found no good cause to justify a<br />

protective order or attorneys’ fees. Turning to the plaintiff’s motions, the court determined the<br />

defendant failed to comply with the Inspection Order <strong>and</strong> failed to demonstrate that special<br />

circumstances justified the non-compliance. Subsequently, the court ordered the defense attorneys<br />

to pay reasonable fees <strong>and</strong> expenses to the plaintiff attorney, in addition to paying consultant<br />

expenses incurred for prior inspection work hampered by the defendant’s non-compliance.<br />

Additionally, the court ordered the defendant’s electronic records be inspected. Finally, the court<br />

denied the plaintiff’s request for default judgment, but warned one will be entered if the defendant<br />

does not comply with this court order.<br />

� Doe v. Norwalk Cmty. Coll., 2007 WL 2066497 (D.Conn. July 16, 2007). In this suit brought under<br />

Title IX of the Education Amendments of 1972, the plaintiff, claiming sexual assault by her college<br />

professor, motioned the court to sanction the defendants for discovery misconduct <strong>and</strong> spoliation of<br />

evidence. The plaintiff claimed that the defendants scrubbed or wiped the hard drives of relevant<br />

individuals <strong>and</strong> altered, destroyed, or filtered relevant data. For example, one witness’s email PST<br />

file contained no deleted items <strong>and</strong> only one sent item. The defendants argued that their production<br />

was sufficient <strong>and</strong> further argued that scrubbing hard drives was their normal business practice <strong>and</strong><br />

therefore they should be protected by the safe harbor of Federal Rule of Civil Procedure 37(f). The<br />

court held that in order to take advantage of the good faith exception in the new FRCP, a party<br />

needs to act affirmatively to prevent the system from destroying or altering information, even if<br />

such destruction would occur in the regular course of business. As the defendants failed to<br />

suspend their destruction process at any time <strong>and</strong> such destruction was not due to the routine<br />

operation of the information system, the court found the plaintiff was entitled to an adverse jury<br />

instruction with respect to the destroyed evidence as well as reimbursement for costs associated<br />

with filing the motion.<br />

� CP Solutions PTE, Ltd. v. General Elec. Co., 2006 WL 1272615 (D. Conn. Feb. 6, 2006). After<br />

receiving 301,539 pages of documents in response to 131 discovery requests, the plaintiff accused<br />

the defendant of engaging in “dump truck” discovery tactics. The plaintiff asserted that the<br />

documents were not produced in the “ordinary course of business,” citing emails that were<br />

separated from their attachments <strong>and</strong> pages containing lines of “gibberish.” The plaintiff sought to<br />

prohibit the defendant from using any documents not produced in their initial document disclosure;<br />

or, alternatively, to compel defendants to supplement its initial production by (1) identifying every<br />

document responsive to each of the plaintiff’s requests; (2) organizing <strong>and</strong> labeling each<br />

responsive document to correspond to the categories of the plaintiff’s requests; <strong>and</strong> (3) producing<br />

the “native” or “original” electronic documents identified as personal folder files (“PST files”). The<br />

court denied the plaintiff’s motion for preclusion <strong>and</strong> refused to require the defendants to organize<br />

<strong>and</strong> label the documents produced as requested by the plaintiffs. Additionally, the court declined to<br />

order the defendants to produce emails in their native format, as the defendants would be unable<br />

to sort out privileged files. However, in partially granting the plaintiff’s motion to compel, the court<br />

required the defendants to “re-produce” the documents containing gibberish in a “readable usable<br />

format.” The court also required the defendants to provide the plaintiff with the information, data, or<br />

29


software necessary to match the emails with their attachments; remarking, “the fact that the<br />

attachments were created with different software programs… does not provide [d]efendants with<br />

an excuse to produce the e-mails <strong>and</strong> attachments in a jumbled, disorganized fashion.”<br />

� In re Priceline.com Inc. Sec. Litig., 233 F.R.D. 88 (D.Conn. 2005). In a securities class action<br />

lawsuit, the parties failed to reach an agreement relating to the production of electronic files<br />

archived on servers <strong>and</strong> backup tapes. In offering the parties guidance on the issue, the court set<br />

forth nine e-discovery “directives.” The directives required backup tape restoration to be performed<br />

on “a measured basis, with cost-shifting determinations made at each step of the process.” The<br />

court also specified a production format, stating the defendants “shall produce responsive<br />

information…in TIFF or PDF form with Bates numbering <strong>and</strong> appropriate confidentiality<br />

designations, shall produce searchable metadata databases, <strong>and</strong> shall maintain the original data<br />

itself in native format for the duration of the litigation.” The court noted, however, that exceptions<br />

may apply if native file production would be necessary to view the information contained in the file.<br />

In addressing cost shifting, the court declared it would apply the proposed analysis outlined in the<br />

proposed amendments to Fed.R.Civ.P. 26(b)(2).<br />

� Tadros v. Tripodi, 866 A.2d 610 (Conn. App. Ct. 2005). The trial court determined the defendant,<br />

a physician, <strong>and</strong> his wife had secretly stolen over $875,000 from a medical corporation in which the<br />

defendant practiced <strong>and</strong> his wife managed the billing <strong>and</strong> other administrative matters. While the<br />

corporation was in the midst of breaking up, corporate counsel seized the corporation’s computer,<br />

made a copy of the hard drive, <strong>and</strong> then returned the computer to the office. When counsel seized<br />

the computer a second time, he discovered that the physician’s wife had deleted over 200 prior<br />

computer entries, some of which involved patient balances. The physican’s wife was unaware that<br />

counsel had made a duplicate of the computer’s hard drive during the initial computer seizure. A<br />

comparison of that copy with a copy made after the second seizure proved the deletions were<br />

made. In admitting evidence of the deletions, the trial court noted that “[a]lthough the exact<br />

economic effect of all of the deletions is not clear, they nonetheless reveal unauthorized tampering<br />

with the computer records at a particularly suspect time.” On appeal, the court held that the trial<br />

court properly admitted evidence of the deletions for the limited purpose of showing that the<br />

changes had been made after the computer was initially seized.<br />

� News Am. Mktg. In-Store, Inc. v. Marquis, 862 A.2d 837 (Conn. App. Ct. 2004). An employer<br />

sued a former employee for accessing <strong>and</strong> misusing the employer’s computer system with the<br />

intent of distributing the information to a competitor. The employee, who downloaded computer<br />

data <strong>and</strong> e-mails without authorization, never actually shared the stolen information with a<br />

competitor. The employer argued it was entitled to reimbursement for attorney’s fees <strong>and</strong> the cost<br />

of investigating the employee’s computer. The trial court refused to award costs, finding no actual<br />

injury occurred because the evidence showed the employee had not looked at the documents after<br />

taking them <strong>and</strong> the employee ultimately destroyed the documents. On appeal, the appellate court<br />

confirmed the trial court’s decision <strong>and</strong> declined to award costs, finding the employer did not prove<br />

actual injuries.<br />

� Ranta v. Ranta, 2004 WL 504588 (Conn. Super. Feb. 25, 2004). In a divorce proceeding, a<br />

superior court judge ordered the plaintiff “to stop using, accessing, turning on, powering, copying,<br />

deleting, removing or uninstalling any programs, files <strong>and</strong> or folders, or booting up her lap top<br />

computer…” The order also directed the plaintiff to h<strong>and</strong> over all floppy disks, CDs, zip files or<br />

other similar types of computer storage devices. The judge further required the plaintiff to turn in<br />

her laptop to the court clerk’s office. Both the plaintiff <strong>and</strong> the defendant were instructed to share<br />

30


equally all costs associated with hiring a computer forensics expert to inspect the laptop.<br />

Additionally, the defendant was required to buy a new laptop for the plaintiff.<br />

� United States v. Triumph Capital Group, 211 F.R.D. 31 (D.Conn. 2002). In order to prevent<br />

spoliation of evidence in a public corporation case, the government sought <strong>and</strong> obtained a search<br />

warrant to search <strong>and</strong> seize a laptop computer at issue. The warrant did not limit the search to any<br />

particular area of the hard drive. However, it did limit the government to search for <strong>and</strong> seize only<br />

certain evidence relating specifically to the charges <strong>and</strong> to follow detailed protocols to avoid<br />

revealing any privileged information. So that the data would not be altered, the government made<br />

mirror images of the hard drive <strong>and</strong> then proceeded with the computer forensic investigation. The<br />

defendants argued that this mirroring amounted to a search <strong>and</strong> seizure of the entire hard drive<br />

<strong>and</strong> moved to suppress all evidence from the laptop. The court determined that although the<br />

search warrant limited the scope of the information that investigators could search for, technical<br />

realities required the government to make complete mirror images of the hard drive. Furthermore,<br />

the court ruled that copying a file does not necessarily constitute seizure of that file <strong>and</strong> that<br />

examining a file more than once does not constitute multiple searches under the Fourth<br />

Amendment.<br />

� Hayes v. Compass Group USA, Inc., 202 F.R.D. 363 (D. Conn 2001). The plaintiff in an age<br />

discrimination action requested information on similar claims filed against the defendant. The<br />

defendant advised the court of the burden <strong>and</strong> expense involved with such a request given that<br />

some of the data was stored in a non-searchable computer format. The court ordered the<br />

defendant to manually search the unsearchable computer data <strong>and</strong> to produce all information for<br />

which it had computer search capabilities.<br />

� SKW Real Estate Ltd. v. Gallicchio, 716 A.2d 903 (Conn. App. Ct. 1998). A computer-generated<br />

document is admissible in a foreclosure action, pursuant to the business records exception to the<br />

hearsay rule.<br />

� Scovish v. Upjohn Co., 1995 WL 731755 (Conn. Super. Ct. Nov. 22, 1995). The court found that<br />

database was within attorney work-product, but that the plaintiff had substantial need of the<br />

information in the database <strong>and</strong> undue hardship would result if it was not produced. The court<br />

ordered the defendant to produce the database after removing any portions that contain subjective<br />

thoughts <strong>and</strong> opinions.<br />

New York<br />

� People v. Harris, 2011NY080152 (NY Crim. Ct. New York Co. June 30, 2012). In this criminal<br />

matter arising out of the Occupy Wall Street protests, the court reviewed Twitter’s motion to quash<br />

a subpoena, which ordered the production of tweets <strong>and</strong> pertinent metadata from a user’s account.<br />

The threshold determination required an assessment of whether the criminal defendant or the third<br />

party respondent (Twitter) had st<strong>and</strong>ing to quash the subpoena. In line with the court’s previous<br />

ruling on this matter, the court pointed to Twitter’s terms <strong>and</strong> policy, holding that Twitter—not the<br />

criminal defendant—had st<strong>and</strong>ing to challenge the subpoena. Addressing Twitter’s contention that<br />

responding to numerous subpoenas would result in an undue burden (<strong>and</strong> thus barred by the<br />

SCA), the court held that because all third party respondents bear this burden, the argument<br />

“cannot be used to create st<strong>and</strong>ing for a defendant where none exists.” Further, the court noted<br />

that “it does not take much to search <strong>and</strong> provide the data to the court.” The court found that<br />

Twitter’s services fall within the statutory definition of both an <strong>Electronic</strong> Communication Service<br />

(ECS) (generally, a communication service) <strong>and</strong> a Remote Communication Service (RCS)<br />

31


(generally, a storage service for substantive posts <strong>and</strong> metadata produced by the chat service).<br />

Equating public tweets to yelling on the street, the court further determined that the posts were not<br />

“private” <strong>and</strong> thus not outside of the scope of the SCA. Ultimately, the court largely denied Twitter’s<br />

motion to quash the subpoena, holding that the prosecutor must obtain a search warrant for tweets<br />

within 180 days of the decision date to comply with the SCA.<br />

� Prestige Global Co. Ltd. v. L.A. Printex Indus., Inc., 2012 WL 1569792 (S.D.N.Y. May 3, 2012).<br />

In this copyright infringement case, the defendants raised several issues with the plaintiffs’<br />

discovery production, alleging that they negligently failed to search for <strong>and</strong> produce several<br />

categories of documents <strong>and</strong> deleted relevant e-mail. Accordingly, the defendants sought an order<br />

to permit forensic examination of the plaintiffs’ computer files. To support their allegations, the<br />

defendants relied on testimony from a witness who said she was not shown the defendants’<br />

discovery requests or asked to search for the documents identified in the requests. The court<br />

rejected this argument, finding that the plaintiffs identified documents produced for each category<br />

via bates number <strong>and</strong> further found “no requirement that a particular witness, even one designated<br />

under Rule 30(b)(6), conduct her own search for documents.” Finally, the court found no evidence<br />

of spoliation, noting that any e-mails related to garments implementing the allegedly copyrighted<br />

design were likely deleted by the end of 2009—well before the plaintiffs’ preservation obligation<br />

arose with the filing of the suit in March 2011. As such, the defendants’ motion for forensic<br />

examination of the plaintiffs’ computer was denied.<br />

� Ceglia v. Zuckerberg, 2012 WL 1392965 (W.D.N.Y. April 19, 2012). In this breach of contract<br />

action concerning ownership of Facebook, the plaintiff asserted that an at-issue e-mail was<br />

inadvertently produced by a technology expert who mistakenly copied a privileged e-mail attached<br />

to a document he was hired to recover. Following the inadvertent production, the recipient<br />

consulting firm disseminated the e-mail in its native format to all parties in the action. More than<br />

two months later, the plaintiff claimed that the e-mail was inadvertently produced <strong>and</strong> motioned for<br />

its return or destruction. Applying Fed. R. Evid. 502, the court considered whether the plaintiff took<br />

reasonable steps to prevent disclosure <strong>and</strong> whether the privilege holder took reasonable steps to<br />

remedy the error. In its analysis, the court found that the plaintiff failed to take the requisite steps to<br />

prevent disclosure when his counsel failed to personally supervise the expert’s recovery <strong>and</strong><br />

production efforts. Furthermore, the court found that the substantial lapse in time between the<br />

dissemination of the e-mail <strong>and</strong> the motion for its destruction did not suggest that the plaintiff took<br />

reasonable steps to rectify the disclosure. Therefore, the court found that the plaintiff effectively<br />

waived any privilege attached to the e-mail-in-question <strong>and</strong> denied the plaintiff’s motion<br />

� People v. Harris, 2012 WL 1381238 (N.Y. Crim. Ct. April 20, 2012). In this case, the defendant<br />

sought to quash a subpoena seeking information from his Twitter account following his arrest for<br />

disorderly conduct during an October 2011 Occupy Wall Street Protest. As part of its prosecution,<br />

the District Attorney’s office sent a subpoena duces tecum to Twitter, seeking tweets posted during<br />

a specified timeline from the defendant’s alleged Twitter account. The defendant sought to quash<br />

the subpoena in his own right or, alternatively, intervene in the proceedings to quash as an affected<br />

party. Reviewing the record, the court analogized the Twitter account information to the bank<br />

records of a customer’s account, to which the customer lacks ownership, possession, <strong>and</strong> st<strong>and</strong>ing<br />

to challenge a subpoena. Analyzing the nature of a Twitter account—in which a user must agree<br />

to terms of service that grant Twitter the unfettered right to publicly post that user’s information<br />

immediately—the court held that the defendant had no proprietary or privacy interest in its tweets<br />

<strong>and</strong> ultimately lacked st<strong>and</strong>ing. The court further denied the motion to intervene, holding the<br />

32


subpoena would not “prejudice the substantial rights” of the intervening party because the<br />

subpoena was sought to address defenses the DA anticipated from the defendant. Finally, the<br />

court analyzed the subpoena under the Stored Communications Act (SCA), <strong>and</strong> found the<br />

subpoena adhered to all of the SCA’s provisions for disclosure from a service provider of electronic<br />

communications.<br />

� Da Silva Moore v. Publicis Groupe, No. 11 Civ.1279 (ALC) (AJP) (S.D.N.Y. April 26, 2012).<br />

Following U.S. Magistrate Judge Andrew Peck’s February 24 opinion <strong>and</strong> order finding predictive<br />

coding appropriate for this ongoing employment discrimination litigation, the plaintiffs objected,<br />

arguing the order was contrary to law <strong>and</strong> asked the District Court to overturn it. Specifically, the<br />

plaintiffs argued that Peck adopted the defendants’ version of the ESI protocol based on an<br />

insufficient record, improperly relied on outside documentary evidence, <strong>and</strong> failed to hold an<br />

evidentiary hearing to obtain expert testimony regarding the reliability <strong>and</strong> accuracy of predictive<br />

coding. Ruling on these objections, U.S. District Court Judge Andrew L. Carter, Jr. fully upheld<br />

Peck’s order <strong>and</strong> opinion, finding Peck’s ruling was “well reasoned” in consideration of the potential<br />

advantages <strong>and</strong> weaknesses of predictive coding. The court found the lack of an evidentiary<br />

hearing was insignificant, reasoning that Peck was in the best position to determine if a later<br />

hearing was necessary should the parties continue to dispute the effectiveness of the technology.<br />

Finally, the court found the plaintiffs’ arguments regarding the efficacy of the predictive coding “too<br />

speculative” <strong>and</strong> echoed Judge Peck’s earlier sentiments, noting that “there simply is no review<br />

tool that guarantees perfection.”<br />

� Glazer v. Fireman’s Fund Ins. Co., 2012 WL 1197167 (S.D.N.Y. Apr. 4, 2012). In this<br />

employment discrimination case, a third party website that offered online consulting sessions with<br />

psychics to the plaintiff moved to quash a subpoena sought by the defendant. While the plaintiff<br />

had closed her account with the website <strong>and</strong> deleted several arguably relevant chat excerpts, the<br />

third party contested that if the plaintiff simply opened a new account, she would be able to access<br />

any past chat logs—including the ones she deleted. Addressing the plaintiff’s argument, the court<br />

recognized that forcing the third party to divulge the communications might implicate the Stored<br />

Communications Act (SCA). However, the court sidestepped any potential SCA issues by<br />

analogizing the online consulting communications to social media. The court cited a line of cases<br />

that ordered named parties to consent to disclosure or otherwise produce relevant social media<br />

information instead of burdening third parties. The court then ordered the plaintiff to create a new<br />

account on the website, retrieve the pertinent transcripts <strong>and</strong> produce non-privileged copies to the<br />

defendant.<br />

� U.S. Bank Nat. Ass’n v. GreenPoint Mortgage Funding, Inc., 939 N.Y.S.2d 395 (N.Y. App. Div.<br />

Feb. 28, 2012). In this cost shifting dispute, one plaintiff appealed the lower court’s order requiring<br />

the requesting party to bear the cost of production, arguing the court should instead adopt the wellknown<br />

federal Zubalake st<strong>and</strong>ard. The defendant countered that requiring requesting parties to pay<br />

“encourage[s] parties to self-regulate the scope of their discovery dem<strong>and</strong>s,” deterring them from<br />

leveling opposing parties with massive production costs. Resolving inconsistency among lower<br />

courts, the court sided with the plaintiff <strong>and</strong> endorsed Zubalake (requiring the producing party to<br />

pay for searching, retrieval <strong>and</strong> production, but permitting shifting of costs between parties based<br />

on seven factors) as “the most practical framework” for cost allocation. The Appellate Division<br />

went on to attack the requestor pays rule, noting that such a rule could deter parties from filing<br />

meritorious claims altogether if e-discovery costs would be prohibitive, especially if the plaintiff is<br />

33


an individual. This opinion surfaced within weeks of the Appellate Division’s endorsement of the<br />

Zubalake preservation st<strong>and</strong>ard in Voom Holdings LLC v. EchoStar Satellite L.L.C.<br />

� Da Silva Moore, et. al., v. Publicis Groupe & MSL Group, 2012 WL 607412 (S.D.N.Y. Feb. 24,<br />

2012). In this employment discrimination case, the court took initial steps to explore the<br />

defensibility of predictive coding—a computer-assisted review process by which a system of ESI is<br />

“trained” through multiple search term iterations to code documents with various levels of<br />

relevance. As an illustration of progress in litigation technology, the issue in this ongoing case is<br />

not whether predictive coding should be used, but rather how it should be used. At a status<br />

conference in early February 2012, the parties disagreed about various aspects of the<br />

methodology by which they would conduct the predictive coding of a large amount of ESI. For<br />

example, in an effort to retain relevant ESI, one of the plaintiffs’ main concerns was about how the<br />

system would determine that a document is irrelevant. In response to the various concerns of the<br />

parties, <strong>and</strong> as discussed in the order, the court reminded them that computer-assisted review<br />

"works better than most of the alternatives, if not all of the [present] alternatives. So the idea is not<br />

to make this perfect, it’s not going to be perfect. The idea is to make it significantly better than the<br />

alternatives without nearly as much cost." Notably, the court found predictive coding appropriate for<br />

this matter, but concluded that the opinion was not a blanket endorsement any particular<br />

technology. The court further commented, “What the Bar should take away from this Opinion is that<br />

computer-assisted review is an available tool <strong>and</strong> should be seriously considered for use in largedata-volume<br />

cases where it may save the producing party (or both parties) significant amounts of<br />

legal fees in document review. Counsel no longer have to worry about being the ‘first’ or ‘guinea<br />

pig’ for judicial acceptance of computer-assisted review.”<br />

� Pippins v. KPMG LLP, 2012 WL 37032 (S.D.N.Y. Feb. 3, 2012). In this class action labor<br />

litigation, the defendant filed a motion for a protective order to limit the scope of its ESI<br />

preservation obligations. At issue was whether the defendant was required to preserve all existing<br />

computer hard drives for thous<strong>and</strong>s of former employees, or whether a r<strong>and</strong>om sampling would be<br />

sufficient to fulfill the preservation obligation. The Magistrate Judge denied the motion <strong>and</strong> ordered<br />

the defendant to preserve all hard drives until the parties reached an agreement on obtaining an<br />

appropriate sample or further ordered by the court. Appealing the denial, the defendant mainly<br />

argued that the Magistrate erroneously adopted an “unreasonably broad” definition of key players,<br />

ordered preservation without determining proportionality, <strong>and</strong> improperly imposed an affirmative<br />

obligation on the defendant in response to its motion for a protective order. On appeal, the court<br />

affirmed the Magistrate’s opinion, acknowledging that preserving the hard drives is expensive, but<br />

that it would be “premature to permit the destruction of any hard drives before discovery.” The court<br />

held that relevance is a broad st<strong>and</strong>ard <strong>and</strong>, accordingly, all the hard drives are likely to contain<br />

relevant information. Finally, the court stated that it “smacks of chutzpah” to argue that the<br />

Magistrate failed to determine proportionality when the defendant refused to provide the evidence<br />

necessary to make that determination.<br />

� Voom Holdings LLC v. EchoStar Satellite L.L.C., 2012 WL 265833 (N.Y.A.D. 1st. Dept. Jan. 31,<br />

2012). At issue in this contract dispute was the scope of a party’s duties in discovery. On June 20,<br />

2007, the defendant’s counsel sent the plaintiff a letter containing the defendant’s express notice of<br />

breach of contract. In January 2008, the defendant terminated the contract, <strong>and</strong> the plaintiff sued<br />

the following day. However, the defendant did not implement a litigation hold until after the lawsuit<br />

commenced. Furthermore, the defendant’s purported “hold” did not suspend automatic deletion of<br />

emails, by which any emails sent or deleted by an employee were automatically <strong>and</strong> permanently<br />

purged after seven days. Four months after the commencement of the action, the defendant finally<br />

34


stopped the automatic deletion of emails. Upon this revelation, the plaintiff moved for spoliation<br />

sanctions. Citing Zubulake, the state trial court granted the motion <strong>and</strong> held that the defendant<br />

should have reasonably anticipated litigation <strong>and</strong> preserved potentially relevant ESI no later than<br />

June 20, 2007—the date of its own notice of breach letter—<strong>and</strong> ceased the automatic deletion of<br />

its emails. Giving credence to the lower court’s adoption of the Zubulake st<strong>and</strong>ard, the Appellate<br />

Division upheld sanctions for the defendant’s “grossly negligent” spoliation of ESI. The court noted<br />

that the spoliation was especially negligent given that the defendant was put on notice of its<br />

subst<strong>and</strong>ard ESI retention practices in a recent, similar lawsuit.<br />

� Pippins v. KPMG LLP, 2011 WL 4701849 (S.D.N.Y. Oct. 7, 2011). In this action involving the Fair<br />

Labor St<strong>and</strong>ards Act <strong>and</strong> New York State Labor Law, the defendant sought a protective order<br />

seeking to limit the scope of its preservation obligations, claiming it should not be responsible for<br />

preserving computer hard drives of thous<strong>and</strong>s of former <strong>and</strong> departing employees. Instead, the<br />

defendant requested an order requiring it to only preserve a r<strong>and</strong>om sample of 100 hard drives that<br />

have already been preserved, or alternatively, that the plaintiffs be required to bear the<br />

preservation costs. Noting that relevancy determinations are difficult to make based on the<br />

defendant’s “own efforts to keep that information at bay,” the court determined that each <strong>and</strong> every<br />

former <strong>and</strong> departing employee is a “key player” at this time. The court also cited that courts in its<br />

district have “cautioned against the application of a proportionality test as it relates to preservation”<br />

<strong>and</strong> found that permitting the destruction of hard drives at this early stage of litigation was<br />

inappropriate. Further, the court noted the ongoing burden is largely self-inflicted by the defendant<br />

due to its continued reluctance to work with the plaintiffs to generate a reasonable sample of the<br />

hard drives. Based on this analysis, the court denied the protective order <strong>and</strong> cost-shifting. Until a<br />

further order or agreement is reached, the court ordered the defendant to preserve the existing<br />

hard drives of all former <strong>and</strong> departing employees who are potential class members.<br />

� Abu Dhabi Commercial Bank v. Morgan Stanley & Co. Inc., 2011 WL 3738979 (S.D.N.Y. Aug.<br />

18, 2011). In this discovery dispute, the defendants requested production of non-privileged <strong>and</strong><br />

responsive "missing" e-mail attachments. Objecting, the plaintiffs contended the requested<br />

attachments were unresponsive <strong>and</strong> cited their reasonably diligent effort to produce 1.5 million<br />

documents in a matter of weeks. Weighing both parties positions, the special master determined it<br />

would be unfair to require the defendants to identify all the e-mails that were missing attachments,<br />

<strong>and</strong> recommended the plaintiffs be required to produce attachments to the 126 e-mails already<br />

identified by the defendants. Following that production, the defendants could move for further<br />

production of e-mail attachments. Finally, the special master also recommended the parties meet<br />

<strong>and</strong> confer to address items related to the production.<br />

� Neverson-Young v. Blackrock, Inc., 2011 WL 3585961 (S.D.N.Y. Aug. 11, 2011). In this<br />

employment litigation, the defendants sought sanctions alleging the plaintiff failed to produce<br />

relevant information <strong>and</strong> further spoliated evidence by donating her personal computer to an<br />

overseas school after commencing the action. Finding the plaintiff’s actions constituted negligence,<br />

the court determined the plaintiff did not act in bad faith. Instead, the court determined that unlike<br />

corporate actors, the plaintiff in this case was unsophisticated <strong>and</strong> unaccustomed to preservation<br />

requirements. Further, the court noted the belatedly produced e-mails were withheld under good<br />

faith misconceptions of relevance <strong>and</strong> privilege, <strong>and</strong> held it is not st<strong>and</strong>ard practice for litigants to<br />

preserve their own telephone records in anticipation of litigation. Finding no evidence of prejudice<br />

or bad faith, the court declined to impose sanctions, but awarded reasonable fees <strong>and</strong> costs<br />

incurred by the defendants through searching the plaintiff’s hard drive <strong>and</strong> obtaining her e-mail<br />

records.<br />

35


� Mikhlyn v. Bove, 2011 WL 4529619 (E.D.N.Y. Aug. 3, 2011). In this trademark infringement <strong>and</strong><br />

unfair competition litigation, the defendants responded to the magistrate judge’s sanctions<br />

recommendation claiming their formal counsel alone is responsible for discovery misconduct.<br />

Although the magistrate judge previously found that the defendants’ misconduct was not egregious<br />

enough to warrant the plaintiffs’ original request for default judgment, he recommended reopening<br />

discovery to determine whether plaintiffs allegations of unproduced e-communications were true.<br />

Following this, newly discovered evidence revealed that tens of thous<strong>and</strong>s of e-mails, documents<br />

<strong>and</strong> Skype chats were in the defendants’ possession, known about by counsel, not produced <strong>and</strong><br />

not identified in a privilege log. In light of this new evidence, the magistrate judge reconsidered his<br />

previous recommendation <strong>and</strong> apportioned fault, fees <strong>and</strong> costs between the defendants <strong>and</strong> their<br />

former counsel, finding them both responsible for the discovery misconduct (a separate firm<br />

assisting with the intellectual property issues was not found liable for any discovery missteps). As a<br />

result, the magistrate judge recommended the plaintiffs be awarded $48,700.52 in attorney fees<br />

<strong>and</strong> costs.<br />

� Nat’l Day Laborer Org. Network v. United States Immigration <strong>and</strong> Customs Enforcement<br />

Agency, <strong>Case</strong> 1:10-cv-03488-SAS (S.D.N.Y. June 17, 2011). In this Freedom of Information Act<br />

(FOIA) litigation, U.S. District Judge Scheindlin withdrew her l<strong>and</strong>mark opinion that declared certain<br />

metadata to be "intrinsic" to the electronic record. Noting the parties had resolved their production<br />

format dispute, Judge Scheindlin declared that the earlier opinion "was not based on a full <strong>and</strong><br />

developed record," <strong>and</strong> that it would be prudent to withdraw the decision "[i]n the interests of<br />

justice." Further, Judge Scheindlin declared that the withdrawn opinion "shall have no precedential<br />

value in this lawsuit or in any other lawsuit."<br />

� In re The Reserve Fund Sec. <strong>and</strong> Derivative Litig., 2011 WL 2039758 (S.D.N.Y. May 23, 2011).<br />

In this securities litigation, the Securities <strong>and</strong> Exchange Commission (SEC) requested production<br />

of approximately 60 e-mail communications between the defendant <strong>and</strong> his wife exchanged over<br />

his employer’s e-mail system using his work e-mail address <strong>and</strong> employer-issued computer.<br />

Although the defendant asserted the e-mails were protected by the marital communications<br />

privilege, the SEC argued the employer’s e-mail policy extinguished any reasonable expectation of<br />

privacy – a requisite factor to support marital privilege. Reviewing the employer’s e-mail policy<br />

under the four-factor test from In re Asia Global Crossing, Ltd., the court found privilege did not<br />

extend because the defendant was aware of the policy that expressly banned personal use <strong>and</strong><br />

reserved the rights of routine e-mail monitoring <strong>and</strong> third party access to employee e-mails; in<br />

short, the e-mails were not sent in confidence. Further, the court noted that it was unreasonable for<br />

employees working in “heavily regulated industries…in which companies are required by law to<br />

preserve e-mail communications for later use by regulators or other interested parties” to have an<br />

expectation of privacy. Accordingly, the court granted the SEC’s motion to compel the requested emails.<br />

� Steuben Foods, Inc. v. Country Gourmet Foods, LLC, 2011 WL 1549450 (W.D.N.Y. Apr. 21,<br />

2011). In this business litigation, the defendant sought spoliation sanctions for the plaintiff’s failure<br />

to implement a timely written litigation hold. Arguing that the plaintiff’s oral litigation hold was<br />

insufficient, the defendant cited three e-mails missing from the plaintiff’s production as evidence of<br />

spoliation. However, noting that the record failed to reveal any relevant evidence had been<br />

destroyed or lost, the court distinguished Pension Committee <strong>and</strong> declined to follow the court’s<br />

presumption in that case that a failure to implement a written litigation hold would support an<br />

inference of spoliation. Instead, the court found that the relatively small size of the plaintiff could<br />

support its reliance on direct oral communication <strong>and</strong> that the substantial number of documents so<br />

36


far produced refuted an inference of spoliation. Finding all relevant documents had been produced,<br />

the court further declined to permit a "fishing expedition" of discovery into the plaintiff’s document<br />

preservation actions based on mere speculation.<br />

� Wood v. Capital One Servs., LLC, 2011 WL 2154279 (N.D.N.Y. Apr. 15, 2011). In this debt<br />

collection practices litigation, the plaintiff sought extensive discovery including broad searches <strong>and</strong><br />

production of ESI. Objecting to the requests, the defendants claimed the likely volume to be<br />

generated by the searches would exceed 1,750,000 documents from the respective defendants –<br />

projected to cost over $5 million to process, review <strong>and</strong> produce. Seeking protective orders, the<br />

defendants invoked the rule of proportionality set forth in the Fed.R.Civ.P. 26(b)(2)(C)(ii). While<br />

acknowledging that some of the documents in question were potentially relevant <strong>and</strong> that the<br />

defendants were large corporations with resources available to finance the discovery effort, the<br />

court determined the marginal relevance of the requests was far outweighed by the burden of<br />

responding <strong>and</strong> the exceedingly modest amount at stake (roughly $1,000). With one narrow<br />

exception, the court granted the defendants’ motions for a protective order <strong>and</strong> denied the plaintiff’s<br />

motion absent an agreement the plaintiff would bear costs of the requested discovery.<br />

� Star Direct Telecom, Inc. v. Global Crossing B<strong>and</strong>width, Inc., 2011 WL 1125493 (W.D.N.Y.<br />

Mar. 21, 2011). In this business litigation, the plaintiff sought disclosure of internal e-mails relating<br />

to its breach of contract claim. Opposing the motion, the defendant argued the request was<br />

untimely <strong>and</strong> the information sought was not relevant, responsive or readily accessible. Noting the<br />

duty to supplement production continues even after the discovery period closes, the court found<br />

the requested e-mails were relevant <strong>and</strong> responsive to the plaintiff’s initial document request.<br />

Despite the defendant argument that producing the e-mails would require searching Exchange<br />

databases housed on an external 4 terabyte storage array at a cost of $13,000, the court asserted<br />

that the defendant had a duty to identify sources of information that were not reasonably accessible<br />

in its discovery response <strong>and</strong> rejected its belated arguments regarding burden. Accordingly, the<br />

court determined the defendant’s initial production was incomplete <strong>and</strong> granted the motion to<br />

compel.<br />

� Nat’l Day Laborer Org. Network v. United States Immigrations <strong>and</strong> Customs Enforcement<br />

Agency, 2011 WL 381625 (S.D.N.Y. Feb. 7, 2011). In this Freedom of Information Act (FOIA)<br />

litigation, the plaintiffs sought to obtain records in a usable format from four government agencies<br />

that produced electronic text records, e-mails, spreadsheets <strong>and</strong> paper records in an unsearchable<br />

PDF format, stripped of all metadata <strong>and</strong> indiscriminately merged together in one PDF file.<br />

Determining the defendants’ production did not comply with FOIA or Fed.R.Civ.P. 34, Judge<br />

Scheindlin remarked that “regardless of whether FOIA requests are subject to the same rules<br />

governing discovery requests, Rule 34 surely should inform highly experienced litigators as to what<br />

is expected of them when making a document production in the twenty-first century.” Citing Aguilar<br />

v. Immigration <strong>and</strong> Customs Enforcement Division of the United States Department of Homel<strong>and</strong><br />

Security, in addition to three state court decisions, Judge Scheindlin held that certain metadata is<br />

“intrinsic” to the electronic record. Accordingly, the Judge determined that parties may no longer<br />

produce a significant collection of static images of ESI without accompanying load files. In addition,<br />

“metadata maintained by the agency as a part of an electronic record is presumptively producible<br />

under FOIA, unless the agency demonstrates that such metadata is not ‘readily reproducible.’“<br />

After ordering a detailed protocol for the defendants’ production <strong>and</strong> specifying the minimum<br />

metadata fields that must be included, the court concluded by commenting that the whole<br />

discovery issue could have been avoided “through cooperation <strong>and</strong> communication.”<br />

37


� Orbit One Commc’ns, Inc. v. Numerex Corp., 2010 WL 4615547 (S.D. N.Y. Oct. 26, 2010). In<br />

this corporate litigation, the defendant sought spoliation sanctions. Discussing preservation<br />

obligations, the court criticized the st<strong>and</strong>ard of “reasonableness <strong>and</strong> proportionality” articulated in<br />

Victor Stanley II <strong>and</strong> Rimkus Consulting Group as “too amorphous to provide much comfort to a<br />

party deciding” what to retain. Instead, the court advised parties to adhere to the Zubulake IV<br />

st<strong>and</strong>ard of retaining “all relevant documents…in existence at the time the duty to preserve<br />

attaches.” Noting that ordinary negligence is sufficient in its circuit for a spoliation inference, the<br />

court found the plaintiffs did not adhere to appropriate preservation procedures by implementing an<br />

inadequate litigation hold, failing to involve a key IT employee, entrusting data to the individual with<br />

the greatest incentive to destroy it <strong>and</strong> allowing “cavalier” treatment of that information.<br />

Nevertheless, the court asserted that although a party’s preservation efforts may be insufficient,<br />

sanctions are not warranted unless there is proof that some information has actually been lost <strong>and</strong><br />

was relevant. In so holding, the court also noted it respectfully disagreed with the Pension<br />

Committee ruling that held some level of sanctions are warranted as long as any information was<br />

lost due to inadequate preservation practices. Despite the plaintiffs’ failure to “engage in model<br />

preservation” of ESI, the court denied the sanctions request determining there was insufficient<br />

evidence that any relevant information was destroyed.<br />

� Voom HD Holdings LLC v. EchoStar Satellite LLC, No. 600292/08 (N.Y.Sup. Nov. 3, 2010). In<br />

this breach of contract action, the plaintiff sought spoliation sanctions alleging the defendant<br />

destroyed e-mails. The defendant relied upon its employees to make relevancy <strong>and</strong><br />

responsiveness determinations, <strong>and</strong> argued it was unnecessary to suspend the company’s<br />

automatic document disposal process as it was up to the custodians to preserve. Addressing the<br />

duty to preserve, the court dismissed the defendant’s argument that the parties’ settlement efforts<br />

precluded the preservation duty, noting that argument would allow parties to freely destroy<br />

documents <strong>and</strong> e-mails, simply by “faking a willingness to engage in settlement negotiations.” The<br />

court also noted that the defendant was previously sanctioned for spoliation in a separate matter,<br />

Broccoli v. EchoStar Communications Corp. in 2005. Finding the conduct in the instant action even<br />

more egregious than in Broccoli, the court held the defendant acted in bad faith in destroying<br />

relevant e-mails <strong>and</strong> engaged in the “type of offensive conduct that cannot be tolerated by the<br />

court.” As such, the court imposed an adverse inference instruction <strong>and</strong> awarded attorneys’ fees<br />

<strong>and</strong> costs. In support of its findings, the court noted that the defendant is “a large public corporation<br />

with ample financial resources” to institute <strong>and</strong> enforce a proper litigation hold <strong>and</strong> referenced the<br />

fact that the defendant hired a new in-house lawyer following the Broccoli decision primarily to<br />

address these issues.<br />

� Romano v. Steelcase Inc., 907 N.Y.S.2d 650 (Sept. 21, 2010). In this personal injury action, the<br />

defendants sought access to the plaintiff’s current <strong>and</strong> historical Facebook <strong>and</strong> MySpace accounts,<br />

including all deleted pages <strong>and</strong> related information, which may have contained information<br />

inconsistent with claims made concerning the extent <strong>and</strong> nature of the plaintiff’s injuries. The court<br />

found that the public portions of the plaintiff’s social networking sites contained content that was<br />

material <strong>and</strong> necessary to the litigation, <strong>and</strong> discerned a reasonable likelihood that the same would<br />

hold true as to the private portions. Despite the plaintiff’s objections on privacy grounds, the court<br />

cited privacy disclaimers in the MySpace <strong>and</strong> Facebook policies, <strong>and</strong> held that production of the<br />

plaintiff’s social network account entries would not violate her privacy rights. The court also found<br />

the defendant’s need for the information outweighed any privacy concerns, <strong>and</strong> determined that<br />

preventing access would directly contravene the strong public policy in favor of open disclosure<br />

<strong>and</strong> condone attempts “to hide relevant information behind self-regulated privacy settings.” Noting<br />

38


commentary that “privacy is no longer grounded in reasonable expectations, but rather in some<br />

theoretical protocol better known as wishful thinking,” <strong>and</strong> that sharing personal information with<br />

others “is the very nature <strong>and</strong> purpose” of social networking sites the court ordered the plaintiff to<br />

provide necessary authorization for access.<br />

� Piccone v. Webster, 2010 WL 3516581 (W.D.N.Y. Sept. 3, 2010). In this employment<br />

discrimination litigation, the parties cross-moved for spoliation sanctions, <strong>and</strong> the defendants<br />

sought to compel production of certain electronic communications <strong>and</strong> forensic examination of the<br />

plaintiff’s personal computer <strong>and</strong> other electronic data storage devices. The plaintiff argued<br />

sanctions were warranted because the defendants failed to include in their production<br />

approximately 200 e-mails that were allegedly destroyed when the defendants’ computer was<br />

cleaned. Contending they produced all responsive e-mails in their possession, the defendants<br />

countered that the plaintiff “cherry picked” her production such that forensic examination was<br />

necessary to ensure complete production. Finding that both parties failed to establish the first<br />

element of spoliation by not providing evidence that any relevant e-mails were destroyed after the<br />

duty to preserve arose, the court denied sanctions. However, the court found the defendants were<br />

entitled to explore through depositions an explanation for the discrepancies in the plaintiff’s<br />

production. In regard to the forensic examination, the court ordered the defendants to pay for mirror<br />

imaging of the plaintiff’s hard drive, <strong>and</strong> directed the plaintiff to turn the mirror image <strong>and</strong> certain<br />

external disks over to her attorney for safekeeping.<br />

� In re Payment Card Interchange Fee <strong>and</strong> Merch. Disc. Antitrust Litig., 2010 WL 3420517<br />

(E.D.N.Y. Aug. 27, 2010). In this ongoing antitrust litigation, the defendants appealed an order<br />

compelling the production of recordings <strong>and</strong> reports created pursuant to an investigation by the<br />

European Commission into the defendants’ business practices in Europe. Joining the defendants<br />

as amicus curiae, the Commission argued the information was confidential under European law<br />

<strong>and</strong> that the doctrine of international comity should deny access to the plaintiffs. Analyzing the<br />

foreign <strong>and</strong> domestic interests using the balancing test in the Restatement (Third) of Foreign<br />

Relations Law §442, the court acknowledged the U.S. policy of broad discovery oriented toward<br />

increasing fairness <strong>and</strong> accuracy in litigation <strong>and</strong> noted that foreign laws purporting to restrict<br />

disclosure of information relevant to U.S. litigation are generally ineffective. On the other h<strong>and</strong>, the<br />

court found that the Commission’s interests would be significantly undermined if its confidentiality<br />

rules were disregarded, the documents originated in Europe <strong>and</strong> the information could be obtained<br />

through other avenues. Despite the fact that the requested documents were likely to contain<br />

relevant information, the court denied disclosure finding the interests of international comity<br />

weighed in favor of the Commission.<br />

� Nycomed U.S. Inc., v. Glenmark Generics LTD., 2010 WL 3173785 (E.D.N.Y. Aug. 11, 2010). In<br />

this pharmaceuticals patent litigation, the plaintiff moved to strike portions of the defendants’<br />

pleadings due to its unjustified withholding of relevant evidence <strong>and</strong> willful failure to search two<br />

important <strong>and</strong> obvious repositories for responsive ESI. The defendants argued its withholding was<br />

justified because the documents had already been produced by a third party, <strong>and</strong> claimed the ESI<br />

repositories had been simply "overlooked." Rejecting the defendants’ excuses, the court<br />

determined that the underinclusive nature of the defendants’ discovery efforts <strong>and</strong> searches was<br />

willful – not an inadvertent omission. Based on the defendants’ "willful dereliction of its discovery<br />

duties" <strong>and</strong> its status as a "substantial multinational corporation," the court found that monetary<br />

sanctions in the amount of $100,000 to the plaintiff <strong>and</strong> $25,000 to the court clerk were justifiable.<br />

The court denied more severe sanctions based on the level of prejudice suffered by the plaintiff<br />

<strong>and</strong> declined to award attorneys’ fees noting the "resolution of these matters is long overdue."<br />

39


� Harkabi v. S<strong>and</strong>isk Corp., 2010 WL 3377338 (S.D.N.Y. Aug. 23, 2010). In this breach of contract<br />

litigation, the plaintiffs sought sanctions, alleging the defendant failed to produce data contained on<br />

laptops the plaintiffs used while employed with the defendant company along with some of the<br />

plaintiffs’ corporate e-mail. The defendant argued it lost the laptop data despite reasonable<br />

preservation steps, but agreed to produce the missing e-mails, which were ultimately located.<br />

Following a thorough discussion of culpability st<strong>and</strong>ards, the court found the defendant negligent<br />

based on "a cascade of errors" (including deficiencies in its native production <strong>and</strong> laptop spoliation)<br />

"which aggregated to a significant discovery failure." The court noted that the defendant, "a global<br />

business that champions itself a leader in electronic data storage," must be mortified by its claim of<br />

innocent mistake. Finding terminating sanctions drastic, the court instead awarded $150,000 in<br />

attorneys’ fees to compensate the plaintiffs "for their ‘David-<strong>and</strong>-Goliath-like’ struggle for electronic<br />

discovery," <strong>and</strong> also granted an adverse inference instruction.<br />

� Passlogix, Inc. v. 2FA Tech., LLC, 2010 WL 1702216 (S.D.N.Y. Apr. 27, 2010). In this licensing<br />

agreement litigation, the plaintiff sought sanctions through an adverse inference instruction,<br />

preclusion <strong>and</strong> costs, alleging the defendants failed to implement a litigation hold <strong>and</strong> spoliated<br />

electronic evidence. Despite admitting to the deletion of the e-mails, text messages, Skype<br />

messages, <strong>and</strong> network <strong>and</strong> computer logs, the defendants denied the relevance of the electronic<br />

evidence to the pending case. Addressing the spoliation, the court reiterated that a litigation hold<br />

must be put in place <strong>and</strong> routine document retention/destruction policies must be suspended,<br />

which the defendants failed to accomplish. The court found the failure to preserve e-mails <strong>and</strong> text<br />

<strong>and</strong> Skype messages constituted gross negligence while the failure to preserve computer logs was<br />

intentional. Balancing the defendants’ “litigation conduct with its status as a small corporation,” the<br />

court determined that a $10,000 monetary fine was the appropriate remedy.<br />

� In re A & M Florida Props. II, 2010 WL 1418861 (Bkrtcy.S.D.N.Y. Apr. 7, 2010). In this bankruptcy<br />

litigation, the defendant sought sanctions alleging the plaintiffs <strong>and</strong> their counsel intentionally<br />

obstructed the discovery process by causing misunderst<strong>and</strong>ings <strong>and</strong> by delaying the production of<br />

relevant e-mails, which resulted in “needless costs <strong>and</strong> frustrations.” The plaintiffs eventually<br />

produced more than 9,500 e-mails that were stored in the company archive system following two<br />

forensic searches. Based on the absence of intentional destruction <strong>and</strong> the fact that the soughtafter<br />

e-mails were ultimately produced, the court noted that dismissal or an adverse inference<br />

would be “unjustly harsh.” However, the court found that the plaintiffs’ counsel “did not underst<strong>and</strong><br />

the technical depths to which electronic discovery can sometimes go” <strong>and</strong> noted that counsel has<br />

an obligation to search for sources of information to underst<strong>and</strong> where data is stored. According to<br />

the court, if the plaintiffs’ counsel would have spoken with key figures at the company regarding the<br />

computer <strong>and</strong> archiving systems in place, the forensic search <strong>and</strong> subsequent motions would have<br />

been unnecessary. As such, the court found monetary sanctions to be appropriate.<br />

� In re Air Cargo Shipping Servs., M.D.L. No. 1775 (E.D.N.Y. Mar. 29, 2010). In this antitrust<br />

litigation, the plaintiffs moved to compel production of documents withheld by the defendant on the<br />

grounds that production is prohibited by the French blocking statute. The defendant argued the<br />

plaintiffs should be required to obtain the documents pursuant to the Hague Convention<br />

procedures. Citing to the Restatement (Third) of Foreign Relations Law of United States, the court<br />

ultimately decided the fifth factor – the balance of the national interests at play – weighed in favor<br />

of the plaintiff, since “France’s relatively weak national interest in prohibiting disclosure…[was]<br />

outweighed by the more substantial United States interests.” The court also considered the<br />

hardship of compliance factor, finding there was little proof provided that the defendant would face<br />

prosecution for violating the blocking statute. Finally, the court ordered production of the<br />

40


documents since resorting to the Hague Convention process would cause substantial delay, which<br />

the court deemed “pointless.”<br />

� Gucci Am., Inc. v. Curveal Fashion, 2010 WL 808639 (S.D.N.Y. Mar. 8, 2010). In this trademark<br />

infringement litigation, the plaintiffs served a subpoena on the third party United Overseas Bank of<br />

New York (UOB NY) for the defendants’ bank records held in Malaysia, alleging the defendants<br />

transferred approximately $900,000 received from the sale of counterfeit goods to the Malaysia<br />

account. UOB NY denied disclosure to the plaintiffs arguing that disclosure would violate Malaysian<br />

banking secrecy laws. Pursuant to the Restatement (Third) of Foreign Relations Law of the United<br />

States § 442, the court followed a five-factor test in balancing the United States interest in the<br />

foreign production of documents. After considering the factors, the court concluded that “the United<br />

States interest in fully <strong>and</strong> fairly adjudicating matters before its courts…outweighs Malaysia’s<br />

interest in protecting the confidentiality of its banking customers’ records.” The court also<br />

considered the “hardship of compliance” on the party or witness from whom discovery is sought,<br />

but determined that the prospect of significant hardship <strong>and</strong> likelihood of prosecution for<br />

compliance with discovery in this case was nothing more than “mere speculation.”<br />

� Irwin v. Onondaga County Res. Recovery Agency, A.T., 2010 WL 462948 (N.Y.A.D. 4 Dept.<br />

Feb. 11, 2010). In this litigation, the plaintiff sought disclosure of all electronically stored<br />

photographs <strong>and</strong> associated metadata. The defendant previously provided digital copies of 1,423<br />

already-published photographs, with two photographs of the plaintiff, but denied production of the<br />

remaining photographs, claiming the request was overbroad <strong>and</strong> constituted an invasion of<br />

personal privacy. Pursuant to the Freedom of Information Law statute, the court held that<br />

electronically stored photographs <strong>and</strong> associated metadata must be disclosed by a public agency if<br />

properly requested by members of the public. However, unpublished photographs relating to active<br />

or ongoing law enforcement investigations, or personal photographs depicting the agency’s<br />

employees or staff, may be excluded from disclosure. Based on these determinations, the court<br />

ordered production of the unpublished photographs <strong>and</strong> associated metadata that depict the<br />

individual but do not depict active or ongoing law enforcement investigations. The court also<br />

ordered production of metadata associated with the previously produced photographs.<br />

� Pension Comm. of the Univ. of Montreal Pension Plan v. Banc of Am. Sec., LLC, 2010 WL<br />

184312 (S.D.N.Y. Jan. 15, 2010). In this litigation involving hedge funds, the defendants sought<br />

sanctions, alleging the plaintiffs engaged in evidence spoliation <strong>and</strong> submitted false <strong>and</strong> misleading<br />

statements in regard to document preservation efforts. Originally, the thirteen plaintiffs discussed in<br />

this case failed to issue written litigation holds when the duty to preserve arose in 2003. Seven of<br />

the plaintiffs eventually issued written holds, while six plaintiffs failed to issue a written hold at any<br />

time. After defining negligence, gross negligence <strong>and</strong> willfulness in the discovery context, the court<br />

noted that following the final Zubulake opinion in July 2004, the duty to issue written litigation holds<br />

was clear. The seven plaintiffs who eventually issued written holds were found to have acted<br />

negligently, while the six plaintiffs who failed to issue any written litigation hold were found grossly<br />

negligent <strong>and</strong> subject to a permissive adverse inference sanction. The court found all thirteen<br />

plaintiffs worthy of monetary sanctions since they “conducted discovery in an ignorant <strong>and</strong><br />

indifferent fashion,” <strong>and</strong> awarded the defendants reasonable attorneys’ fees <strong>and</strong> costs associated<br />

with the motion. Finally, the court ordered two of the plaintiffs to search backup tapes for the<br />

relevant time period at their expense.<br />

� Vagenos v. LDG Fin. Servs., LLC., 2009 WL 5219021 (E.D.N.Y. Dec. 31, 2009). In this action<br />

brought under the Fair Debt Collection Practices Act, the defendant moved to prevent the plaintiff<br />

from offering at trial an alleged duplicate of the automated telephone message that served as the<br />

41


asis of the suit. The defendant asserted that the original message was destroyed with malicious<br />

intent <strong>and</strong> therefore was inadmissible. In opposition, the plaintiff maintained that the destruction of<br />

the original message was due to a change in cellular service providers <strong>and</strong> testified that the<br />

recording reflected the original. Despite finding no evidence of bad faith, the court determined that<br />

the plaintiff’s duty to preserve evidence was breached. The court declined to preclude the evidence<br />

since it would be the "death knell" of the case, but it found an adverse inference sanction<br />

appropriate. In making this determination, the court noted that the destruction <strong>and</strong> the plaintiff<br />

attorney’s failure to inform his client of the preservation duty were especially "egregious" <strong>and</strong><br />

"highly troubling."<br />

� Scalera v. Electrograph Sys. Inc., 2009 WL 3126637 (E.D.N.Y. Sept. 29, 2009). In this disability<br />

<strong>and</strong> employment litigation, the plaintiff sought adverse instruction sanctions, citing the defendants’<br />

loss of information contained on two e-mail backup tapes. The plaintiff claimed the defendants<br />

produced only "a h<strong>and</strong>ful of emails" after claiming the e-mails were stored on corrupted backup<br />

tapes that could not be restored. In addition, the plaintiff argued the hard drives of a defendant <strong>and</strong><br />

the plaintiff were "wiped clean," which prevented a search of the computer. Denying the plaintiff’s<br />

motion for sanctions, the court found the defendants’ duty to preserve arose when the plaintiff’s<br />

EEOC charge was received, which was more than 30 days after the plaintiff left her employment.<br />

The court further held that while the defendants acted negligently in failing to preserve ESI until<br />

almost two months after the duty to preserve arose, the plaintiff failed to demonstrate that the<br />

destroyed e-mails would have been favorable to her case.<br />

� Capitol Records, Inc. v. MP3tunes, LLC, 2009 WL 2568431 (S.D.N.Y. Aug. 13, 2009). In this<br />

copyright infringement litigation, the court addressed several discovery disputes it claimed could<br />

have been avoided if the parties had "focused their attention on discussing their differences, rather<br />

than drafting dueling epistles." Addressing the defendant’s issues, the court did not agree with the<br />

defendant that producing <strong>and</strong> searching files would be unduly burdensome. Thus the court ordered<br />

the defendant to conduct thirty searches proposed by the plaintiffs, which included additional<br />

custodians. The court then addressed the plaintiffs’ arguments that the discovery sought by the<br />

defendant was unduly burdensome in part because they were unable to conduct centralized e-mail<br />

searches without relying on an outside service provider. Noting that the day will come when the<br />

burden argument based on a large organization’s lack of internal e-discovery software will not be<br />

well received, the court found that e-discovery case law had not yet developed to this point.<br />

Therefore, the court upheld the plaintiffs’ argument <strong>and</strong> concluded that the e-mail files the<br />

defendant sought to search were not reasonably accessible. Finally, the court considered the<br />

specific document requests from the defendant to the plaintiffs that were at issue, <strong>and</strong> restricted<br />

the search terms <strong>and</strong> production scope as appropriate for each request.<br />

� Green v. McClendon, 2009 WL 2496275 (S.D.N.Y. Aug. 13, 2009). In this breach of contract<br />

dispute, the plaintiff sought sanctions alleging the defendants failed to preserve <strong>and</strong> produce<br />

electronically stored information (ESI). Finding the duty to preserve arose no later than the<br />

lawsuit’s filing, the court determined the defendants’ counsel failed to meet discovery obligations by<br />

neglecting to issue a litigation hold <strong>and</strong> properly search for responsive documents. Despite these<br />

failures, the court declined to issue an adverse inference instruction since there was no proof that<br />

the defendants’ actions created an unfair evidentiary imbalance, noting the absence of evidence<br />

that any relevant information was destroyed. However, the court held other sanctions were<br />

appropriate, including further discovery of ESI <strong>and</strong> an award of attorneys’ fees <strong>and</strong> costs to be<br />

allocated among the defendants <strong>and</strong> counsel once the "respective blame-worthiness" was<br />

determined.<br />

42


� Arista Records LLC v. Usenet.com, Inc., 2009 WL 1873589 (S.D.N.Y. June 30, 2009). In this<br />

copyright infringement litigation, the plaintiffs sought terminating sanctions alleging the defendants<br />

were continuingly unwilling to cooperate in discovery, refused to produce virtually any internal<br />

documents <strong>and</strong> had destroyed evidence. The plaintiffs’ computer forensic expert determined that<br />

four hard drives had been intentionally wiped, the contents of three hard drives had been primarily<br />

deleted <strong>and</strong> that recovered fragments indicated incriminating documents had been stored on the<br />

drives. The defendants offered conflicting explanations for the spoliation, finally claiming that the<br />

drives only appeared wiped because of a recently installed upgrade, but that all files had been<br />

backed up on a server. However, there were significant <strong>and</strong> unexplained gaps in the server <strong>and</strong> in<br />

production of the defendants’ e-mail records. Finding the spoliation of evidence was intentional <strong>and</strong><br />

done in bad faith, <strong>and</strong> that the defendants engaged in evasive discovery tactics, the court issued a<br />

sanction precluding the defendant from asserting its affirmative defense on the merits of a goodfaith<br />

non-infringement policy. The court declined to award terminating sanctions despite the “strong<br />

evidence of extreme wrongdoing,” noting that case-dispositive sanctions should only be imposed in<br />

extreme circumstances after considering less drastic alternative sanctions.<br />

� Am. Friends of Yeshivat Ohr Yerushalayim, Inc. v. United States, 2009 WL 1617773 (E.D.N.Y.<br />

June 9, 2009). In this tax penalties litigation, the U.S. government sought an order to strike the<br />

appellant’s opposition papers, or the exhibits that were not previously produced during discovery<br />

that were filed in response to the government’s motion for judgment on the pleadings. Previously,<br />

the appellant failed to respond to the government’s discovery dem<strong>and</strong>s for four months during<br />

which it received three extensions, until responding that it was not in possession of the requested<br />

financial records <strong>and</strong> that the accountant was to blame for not conducting a thorough search for the<br />

documents. In considering whether sanctions were appropriate, the court found that the appellant’s<br />

attorney’s failure to ask the appellant’s accountant for the financial records was “beyond<br />

comprehension,” as was his filing of the documents without notice to the government. The court<br />

noted that filing the documents without notice prejudiced the government in a way that, absent a<br />

preclusion order, could only be remedied by the court reopening discovery. Concluding the case<br />

had “languished long enough,” the court granted the government’s motion for sanctions, precluding<br />

the financial records from evidence. The court also denied the appellant’s cross-motion for<br />

preclusion sanctions.<br />

� Linde v. Arab Bank, 2009 WL 1456573 (E.D.N.Y. May 22, 2009). In this case arising out of the<br />

Anti-Terrorism Act <strong>and</strong> the Alien Tort Claims Act, the defendant sought production of documents<br />

from three non-parties. The defendant first sought production of documents from Israel Discount<br />

Bank New York (IDBNY) held in Israel by IDBNY’s parent company Israel Discount Bank (IDB).<br />

The defendant also sought production of documents from Bank Hapoalim, which objected to<br />

production citing various Israeli laws including laws against self-incrimination. Citing IDB’s<br />

insignificant relationship to the litigation <strong>and</strong> that IDBNY was not a "mere department" of IDB, the<br />

court refused to allow jurisdictional discovery of documents held by IDB. Turning to the second<br />

request, the court rejected the non-party’s claims of self-incrimination <strong>and</strong> commercial secrets laws<br />

violations but felt the other legal arguments raised constituted "prohibitions on disclosure that raise<br />

a true conflict between United States discovery rules <strong>and</strong> Israeli confidentiality laws." The court<br />

considered five factors contained within the §442 of the Restatement (Third) of the Foreign<br />

Relations Law of the United States: the importance of the investigation of the documents, the<br />

specificity of the request, whether the information originated in the United States, the availability of<br />

alternative means of securing the information, <strong>and</strong> the extent to which noncompliance would<br />

undermine American interests or compliance would undermine the interests of the state in which<br />

43


the information is located. Noting all factors, except for the specificity requirement, weighed in favor<br />

of the non-party, the court denied discovery of the materials protected by Israeli confidentiality laws<br />

but ordered production of the remaining materials.<br />

� In re the Account of Tamer, 2009 WL 1058594 (N.Y.Sur. Apr. 20, 2009). In this contested<br />

accounting of a revocable trust, the objectant sought authorization to produce approximately 6,000<br />

documents electronically on CD-ROMs <strong>and</strong> DVDs, while the trustees filed a cross-motion seeking<br />

paper production. Noting the relevant state statute neither authorizes nor prohibits electronic<br />

production, the court stated, "It is implicit that where a party seeks electronic discovery, the<br />

responding party will produce the information sought by some form of electronic means."<br />

Accordingly, the court held the objectant may produce documents electronically, provided the<br />

production is accompanied by an index identifying each document’s file location <strong>and</strong><br />

responsiveness to a discovery dem<strong>and</strong>. The court concluded that the index would prevent the<br />

imposition of an undue burden on the trustees who would otherwise need to read through 6,000<br />

documents.<br />

� Adele S.R.L. v. Filene’s Basement, Inc., 2009 WL 855955 (S.D.N.Y. Mar. 24, 2009). In this<br />

trademark infringement litigation, the plaintiffs moved for monetary sanctions for discovery<br />

misfeasance citing the defendants’ allegedly inadequate search efforts <strong>and</strong> false representations<br />

that production was complete. The plaintiffs also sought cost-shifting for loading <strong>and</strong> reviewing<br />

backup tapes. Opposing the motion, the defendants argued they acted reasonably under the<br />

circumstances. Finding the defendants made impermissibly false representations <strong>and</strong> did not come<br />

"remotely close to meeting" their production responsibilities, the court granted the motion for<br />

sanctions. However, the court denied the cost-shifting request, noting the plaintiffs did not<br />

meaningfully address the appropriateness of cost-shifting under Fed.R.Civ.P. 26(b)(2) or the<br />

reasonable accessibility of the backup tapes under the guidance of recent case law.<br />

� William A. Gross Constr. Assocs., Inc. v. Am. Mfrs. Mut. Ins. Co., 2009 WL 724954 (S.D.N.Y.<br />

Mar. 19, 2009). In this multi-million dollar construction litigation, a non-party agreed to produce<br />

electronic documents but objected to the search terms both parties proposed. The court issued a<br />

"wake-up call" to attorneys about the need to effectively design search terms used in e-discovery.<br />

Citing this as the "latest example of lawyers designing keyword searches in the dark, by the seat of<br />

the pants," the court referenced a series of recent decisions (Victor Stanley, Inc. v. Creative Pipe,<br />

Inc.; United States v. O’Keefe; Equity Analytics, LLC v. Lundin; <strong>and</strong> In re Seroquel Products<br />

Liabilitiy Litig.) as guidance for searching. The court also endorsed the "Cooperation Proclamation"<br />

from the Sedona Conference® <strong>and</strong> noted that cooperation <strong>and</strong> transparency in all aspects of<br />

preservation <strong>and</strong> production of ESI is a requirement. Finally, the court stated that counsel must<br />

carefully craft appropriate keyword searches with input from pertinent custodians, <strong>and</strong> concluded<br />

by stating, "[I]t is time that the Bar—even those lawyers who did not come of age in the computer<br />

era—underst<strong>and</strong> this."<br />

� T.A. Ahern Contractors Corp. v. Dormitory Auth., 2009 WL 806779 (N.Y.Sup. Mar. 19, 2009). In<br />

this state contract dispute, the plaintiff moved to compel electronic discovery pursuant to CPLR<br />

§3124. The plaintiff sought archived e-mails <strong>and</strong> other electronic documents, which the defendant<br />

claimed amounted to 35 gigabytes of electronic data. Based on this amount of data, the defendant<br />

argued it was necessary to hire an e-discovery vendor at cost to the plaintiff. The court found hiring<br />

a vendor to be a necessary component of the production process. Addressing the plaintiff’s<br />

argument that the Zubulake I cost-shifting factors should be considered, the court noted the<br />

distinction between the CPLR <strong>and</strong> the Federal Rules of Civil Procedure <strong>and</strong> that the plaintiffs did<br />

not allege that the defendants had maintained its electronic data in any way that added to the<br />

44


expense of production. The court held it was not empowered to overturn the New York rule that<br />

requires the cost of production to fall upon the party seeking discovery, which creates a strong<br />

incentive for formulating requests to be as minimally burdensome as possible. Therefore, the court<br />

denied the plaintiff’s motion to compel unless the plaintiff was willing to bear the costs.<br />

� Anthropologie, Inc. v. Forever 21, Inc., 2009 WL 690239 (S.D.N.Y. Mar. 13, 2009). In this<br />

copyright infringement litigation, the plaintiff sought production of electronic documents <strong>and</strong><br />

permission to appoint an expert to copy <strong>and</strong> inspect the defendants’ hard drives. The defendants<br />

claimed the requested documents did not exist, but nonetheless provided summaries of the<br />

information for "settlement purposes only." Finding it "virtually inconceivable" that the defendants<br />

did not retain the data requested, given the scale of the defendants’ business, the court determined<br />

that the defendants’ efforts reflected a "refusal to comply with even the minimal requirements of the<br />

governing discovery rules." The court ordered production of the data that was used to create the<br />

summaries <strong>and</strong> all documents that pertained to the plaintiff’s request, but delayed consideration of<br />

the hard drive copying request until after production.<br />

� Acorn v. County of Nassau, 2009 WL 605859 (E.D.N.Y. Mar. 9, 2009). In this civil rights litigation,<br />

the plaintiffs sought sanctions alleging the defendants failed to issue a timely litigation hold or<br />

conduct a search for responsive electronic documents. The defendants claimed it issued a "verbal"<br />

litigation hold <strong>and</strong> instructed key individuals to search for responsive documents despite lacking the<br />

technical resources to locate <strong>and</strong> access electronic documents. Finding the defendants had a duty<br />

to preserve evidence <strong>and</strong> were grossly negligent in failing to issue a proper litigation hold, the court<br />

granted motion costs <strong>and</strong> attorneys’ fees. However, the court denied an adverse inference<br />

instruction citing the plaintiffs’ failure to demonstrate the favorability of the lost evidence. Regarding<br />

the defendants’ searching efforts, the court ordered the defendants to review its prior responses<br />

<strong>and</strong> supplement them if necessary, noting the plaintiffs had not provided any case law suggesting a<br />

"manual" search of electronic files was insufficient.<br />

� Port Auth. Police Asian Jade Soc’y of N.Y. & N.J. Inc. v. Port Auth. of N.Y. <strong>and</strong> N.J., 2009 WL<br />

577665 (S.D.N.Y. Mar. 5, 2009). In this racial discrimination suit, the plaintiffs sought an adverse<br />

inference instruction sanction for the defendant’s failure to preserve performance evaluations <strong>and</strong><br />

to issue a litigation hold. The defendant argued that its failure to preserve the evidence was, in<br />

part, due to the September 11th 2001 attacks, which destroyed the defendant’s executive offices.<br />

Accepting the defendant’s argument, the court found that the preservation failure was a result of<br />

negligence, but not gross negligence. Despite the preservation failure, the court denied the motion<br />

for sanction as it determined there were other sources of evidence available to the plaintiffs.<br />

� Schanfield v. Sojitz Corp. of Am., 2009 WL 577659 (S.D.N.Y. Mar. 6, 2009). In this employment<br />

discrimination suit, the defendants sought production of thirty-six purportedly privileged e-mails<br />

identified in the plaintiff’s privilege log. The defendants argued that these e-mails between the<br />

plaintiff <strong>and</strong> his friends, former colleagues <strong>and</strong> family members that are attorneys, were not<br />

protected by privilege. Addressing each e-mail category, the court held that the e-mails sent to<br />

friends were not protected since the plaintiff failed to indicate that they were prepared in<br />

anticipation of litigation. The court also found that work product protection was waived with respect<br />

to the e-mails with colleagues since the material was disclosed. Finally, the court determined the emails<br />

sent to family members that are attorneys were not attorney-client privileged because a nonattorney<br />

was copied on the e-mails; however, those e-mails constituted work product because they<br />

were prepared in anticipation of litigation.<br />

� Brookdale Univ. Hosp. & Med. Ctr., Inc. v. Health Ins. Plan of Greater New York, 2009 WL<br />

393644 (E.D.N.Y. Feb. 13, 2009). In this RICO suit, the defendants sought reconsideration of the<br />

45


court’s previous order that directed the defendants to return or destroy the plaintiff’s inadvertently<br />

produced privileged documents. Stating that it was “closing <strong>and</strong> locking the door” on future claims<br />

of privilege protection, the court determined the time for raising inadvertent disclosure arguments<br />

had passed. The defendant also asked the court to order the plaintiff to re-produce e-mails that<br />

were previously produced without string headers. Siding with the defendants, the court was not<br />

satisfied with the plaintiff’s explanation that header information was by default never created <strong>and</strong><br />

thus not maintained. However, the court stayed the defendant’s motion <strong>and</strong> ordered the parties to<br />

attempt to resolve the issue <strong>and</strong> provide a report to the court.<br />

� Ellington Credit Fund, Ltd. v. Select Portfolio Servs., Inc., 2009 WL 274483 (S.D.N.Y. Feb. 3,<br />

2009). In this breach of contract litigation, the plaintiffs moved to lift a pending discovery stay <strong>and</strong><br />

sought a preservation order claiming systematic purges of the defendant’s computer systems<br />

resulted in the destruction of relevant information. The defendant opposed the motion, arguing that<br />

a litigation hold was in place <strong>and</strong> no relevant files had been destroyed. Finding that the defendants<br />

were fully aware of their preservation obligations, the court refused to lift the discovery stay <strong>and</strong><br />

declined to issue a preservation order, noting the plaintiffs failed to propose terms, time frame or<br />

scope for any such order.<br />

� Arista Records LLC v. Usenet.com, Inc., 2009 WL 185992 (S.D.N.Y. Jan. 26, 2009). In this<br />

copyright infringement litigation, the plaintiffs moved for sanctions for spoliation. The plaintiffs<br />

alleged the defendants deliberately destroyed <strong>and</strong> failed to preserve highly relevant materials that<br />

would have provided evidence of the “wide-scale infringement.” The defendants argued that the<br />

evidence sought was not relevant to the plaintiffs’ claim, the data was transient in nature <strong>and</strong> their<br />

systems did not have the capacity to preserve the data. Regarding the duty to preserve, the court<br />

found that the defendants had an obligation to preserve the requested data <strong>and</strong> defendants’ failure<br />

to preserve was in bad faith. Therefore, the court imposed an adverse inference against the<br />

defendants <strong>and</strong> awarded attorneys’ fees <strong>and</strong> costs.<br />

� SEC v. Badian, 2009 WL 222783 (S.D.N.Y. Jan. 26, 2009). In this securities litigation, a non-party<br />

corporation, Rhino, moved to “claw back” approximately 260 privileged documents allegedly<br />

produced inadvertently in 2003. Rhino claimed that language accompanying the production, which<br />

certified that production of any document shall not be construed as waiver of any privilege, required<br />

the SEC to return the documents. To determine whether privilege was waived, the court analyzed<br />

the four factors set forth in Lois Sportswear, U.S.A., Inc. v. Levi Strauss & Co., 104 F.R.D. 103, 105<br />

(S.D.N.Y. 1985): (1) reasonableness of the precautions taken to prevent inadvertent disclosure; (2)<br />

time taken to rectify the error; (3) extent of the disclosure; <strong>and</strong> (4) overarching issues of fairness.<br />

Factor one weighed in favor of privilege waiver as Rhino presented no evidence of privilege review<br />

prior to the production. Factor two weighed in favor of waiver as Rhino waited five years before it<br />

sought to “claw back” some of the production. Factor three also weighed in favor of waiver as the<br />

court found 260 documents to be a significant number of documents. The last factor also weighed<br />

in favor of waiver as the court was unable to find a reason to disregard Rhino’s carelessness. With<br />

all four factors weighing in favor of privilege waiver, the court concluded that Rhino waived any<br />

privilege it may have asserted on the production.<br />

� SEC v. Collins & Aikman Corp., 2009 WL 94311 (S.D.N.Y. Jan. 13, 2009). In this securities fraud<br />

litigation, the defendant objected to the SEC’s production of 1.7 million documents maintained in<br />

thirty-six separate databases. The defendant asserted the SEC produced a “document dump” of<br />

unorganized documents <strong>and</strong> failed to perform adequate searches for e-mails. The SEC argued the<br />

production format was in accordance with how the documents were maintained in the usual course<br />

of business <strong>and</strong> that nearly all responsive e-mails would be privileged, protected or non-<br />

46


substantive. Rejecting the SEC’s arguments, District Judge Shira A. Scheindlin found that<br />

Fed.R.Civ.P. 34’s “usual course of business” requirement for production requires the documents to<br />

be organized <strong>and</strong> therefore ordered re-production with documents responding specifically to<br />

defendant’s requests. Furthermore, as e-mails are inherently searchable, the court found the<br />

SEC’s blanket refusal to produce any of them to be unacceptable. Accordingly, the court ordered<br />

the parties to meet to resolve the scope <strong>and</strong> design of a search with respect to e-mails. The court<br />

noted that a government agency which initiates civil litigation must generally follow the same<br />

discovery rules that govern private parties.<br />

� Kingsway Fin. Serv’s, Inc. v. Pricewaterhouse-Coopers LLP, 2008 WL 5423316 (S.D.N.Y. Dec.<br />

31, 2008). In this fraud action, the plaintiff moved to compel the production of metadata for a<br />

number of produced documents. The court denied the motion, citing plaintiff’s failure to raise any<br />

issue as to the authenticity of the produced documents. Additional factors giving rise to the denial<br />

of the motion was plaintiff’s failure to identify the types of metadata sought or explain why metadata<br />

was relevant to the matter.<br />

� Aguilar v. Immigration & Customs Enforcement Divis. of United States Dept. of Homel<strong>and</strong><br />

Security, 2008 WL 5062700 (S.D.N.Y. Nov. 21, 2008). In this civil rights class action alleging<br />

unlawful searches of homes, the plaintiffs sought production of metadata from various types of ESI<br />

including e-mail, word <strong>and</strong> excel documents <strong>and</strong> databases. Noting that the production of metadata<br />

should have been discussed at the Fed.R.Civ.P. 26(f) conference, the court went on to consider<br />

the various metadata production requests. Regarding e-mails <strong>and</strong> backup tapes, the court found<br />

the plaintiffs’ requests untimely <strong>and</strong> too costly for the little benefit potentially gained. The court then<br />

discussed Word documents <strong>and</strong> PowerPoint presentations <strong>and</strong> ordered the production of metadata<br />

if the plaintiffs were willing to bear all costs associated with its production; despite finding the<br />

metadata sought was marginally relevant, not critical to pretrial presentation <strong>and</strong> was untimely<br />

requested. Additionally, declining to find production unduly burdensome for Excel spreadsheets,<br />

the court granted production of the metadata as requested from Excel files.<br />

� Gutman v. Klein, 2008 WL 4682208 (E.D.N.Y. Oct. 15, 2008). In this fraud litigation, the plaintiffs<br />

sought default judgment <strong>and</strong> monetary sanctions claiming the defendants destroyed crucial<br />

evidence on a laptop belonging to one of the defendants. Previously, the court ordered a courtappointed<br />

forensic expert to analyze the hard drives for evidence of a deletion program. The<br />

examiner forensically copied the hard drive, discovered that a deletion program did exist, <strong>and</strong> that<br />

hundreds of documents were deleted. The forensic expert also discovered that the computer’s<br />

system clock had been altered, calling into question the integrity of the time stamps in the event<br />

logs. Finding that the plaintiffs demonstrated spoliation of evidence on the laptop <strong>and</strong> that the<br />

evidence was relevant, the magistrate judge determined the defendant acted in bad faith <strong>and</strong><br />

recommended a default judgment, holding that the spoliation made it impossible to identify files,<br />

therefore making lesser sanctions inadequate. The magistrate judge also recommended awarding<br />

attorneys’ fees to the plaintiffs relating to all expenses incurred regarding the laptop, but did not<br />

recommend that any punitive monetary sanctions be imposed.<br />

� Pass & Seymour, Inc. v. Hubbell Inc., 2008 WL 4240490 (N.D.N.Y. Sept. 12, 2008). In this<br />

patent infringement litigation, the defendant moved to compel the plaintiff to organize its production<br />

of electronic documents <strong>and</strong> explain which documents corresponded to each document request.<br />

(The plaintiff previously produced 405,367 pages of electronic documents in response to seventytwo<br />

separate document requests.) The plaintiff argued the documents were produced as they were<br />

maintained in the ordinary course of business under Fed.R.Civ.P. 34(b)(2), <strong>and</strong> that further<br />

organization <strong>and</strong> an index of the materials was not required. The court determined that the plaintiff<br />

47


neither demonstrated that the documents were produced as they are ordinarily maintained, nor<br />

provided information regarding how they are ordinarily kept. However, the court nonetheless<br />

determined it would be unfair <strong>and</strong> unduly onerous to require the plaintiff to organize the documents<br />

to correspond to the defendant’s numerous document requests. The court therefore ordered the<br />

plaintiff to produce an index of the produced documents, including a description of the filing system<br />

under which each document was ordinarily maintained, <strong>and</strong> an indication of whether the<br />

documents were hard copy, digital or both.<br />

� Babaev v. Grossman, 2008 WL 4185703 (E.D.N.Y. Sept. 8, 2008). In this litigation alleging<br />

fraudulent inducement of investments, the plaintiffs sought sanctions claiming the defendants<br />

engaged in spoliation of evidence <strong>and</strong> failed to produce other documents. The defendants argued<br />

that some documents were inadvertently corrupted <strong>and</strong> could not be produced, a “lost” computer<br />

was permissibly discarded as unusable prior to the anticipation of litigation <strong>and</strong> that bank records<br />

were not in their control. Dismissing the defendants’ arguments, the court determined the relevant<br />

computer evidence should have been preserved <strong>and</strong> was destroyed with a culpable state of mind.<br />

The court also held that the defendants possessed sufficient control over their bank records to<br />

produce them. For these reasons, the court imposed an adverse inference <strong>and</strong> awarded the<br />

plaintiffs $5,000 in costs <strong>and</strong> fees.<br />

� Metrokane, Inc. v. Built NY, Inc., 2008 WL 4185865 (S.D.N.Y. Sept. 3, 2008). In this litigation<br />

surrounding various intellectual property rights, the defendant sought sanctions claiming the<br />

plaintiff failed to produce e-mails the defendant considered highly damaging to the plaintiff. The<br />

defendant further argued that the belated discovery hampered its ability to pursue otherwise crucial<br />

discovery related to the communications. Opposing the motion, the plaintiff vaguely asserted that<br />

the defendant failed to demonstrate any misconduct or prejudice. Additionally, the defendant<br />

pointed to its lack of an established written document retention policy, leaving the court to infer that<br />

their argument was the e-mails were no longer in its system. Unimpressed with the plaintiff’s<br />

assertions, the court found the plaintiff was, at the minimum, negligent in failing to preserve <strong>and</strong><br />

produce the e-mails. In addition, the court found the plaintiff’s failure to turn over a specific portion<br />

of the e-mails to be intentional concealment. Accordingly, the court ordered an adverse jury<br />

instruction <strong>and</strong> awarded attorneys’ fees incurred in bringing this motion.<br />

� Reino de Espana v. Am. Bureau of Shipping, Inc., 2008 WL 3851957 (S.D.N.Y. Aug. 18, 2008).<br />

In this action arising out of the sinking of an oil tanker off the coast of Spain, the plaintiff (Spain)<br />

objected to a previous ruling that required the production of electronic documents <strong>and</strong> imposed<br />

sanctions in the form of attorneys’ fees <strong>and</strong> costs associated with the defendants’ motion to<br />

compel. The defendants made its first discovery request in January 2004, seeking non-privileged<br />

electronic documents. In 2006, the judge determined the plaintiff’s failure to conduct discovery <strong>and</strong><br />

preserve documents in accordance with the Federal Rules of Civil Procedure was sanctionable as<br />

the Rules govern international discovery in cases falling under American jurisdiction. Upholding the<br />

ruling, the court found the plaintiff had received adequate notice regarding the preservation <strong>and</strong><br />

spoliation issues <strong>and</strong> further upheld the award of attorneys’ fees as a reasonable sanction, citing<br />

the plaintiff’s negligent failure to preserve electronic evidence.<br />

� Viacom Int’l Inc. v. YouTube Inc., 2008 WL 2627388 (S.D.N.Y. July 2, 2008). In this copyright<br />

infringement litigation, the plaintiffs filed a motion to compel production of electronically stored<br />

information, seeking copies of all videos currently stored on the defendants’ hard drives that were<br />

once available for public viewing on YouTube.com. Additionally the plaintiffs sought the<br />

defendants’ “logging” database which is stored on live computer hard drives <strong>and</strong> demonstrates how<br />

often each video is viewed along with the viewer’s login ID <strong>and</strong> IP address. The defendants<br />

48


claimed these requests raised user privacy concerns <strong>and</strong> were burdensome, expensive <strong>and</strong><br />

overbroad, especially since the database contained approximately 12 terabytes of data. Granting<br />

the plaintiffs’ motion to compel with regard to these two requests, the court noted that the<br />

defendants cited no authority barring them from disclosing user information in civil discovery <strong>and</strong><br />

that login IDs are anonymously created. The court ultimately determined that production of the<br />

removed videos was not unduly burdensome <strong>and</strong> the plaintiffs’ need for the data outweighed the<br />

unsubstantiated cost of producing the information, <strong>and</strong> granted the plaintiffs’ motion to compel.<br />

� Margel v. E.G.L. Gem Lab Ltd., 2008 WL 2224288 (S.D.N.Y. May 29, 2008). In this trademark<br />

litigation, several discovery disputes were raised including the defendants’ assertion that the<br />

plaintiffs failed to respond fully to production requests <strong>and</strong> the plaintiffs’ application to compel<br />

additional discovery. Finding that the defendants failed to establish sufficient evidence of the<br />

existence of additional relevant documents, the court denied the defendants’ motion. However, the<br />

court ordered the plaintiffs to pay reasonable attorneys’ fees <strong>and</strong> expenses associated with the<br />

motion, noting the second production by the plaintiffs’ new counsel produced almost four times the<br />

information previously produced. Addressing the plaintiffs’ motion, the court ordered the<br />

defendants to produce the electronic data from which the report in question was generated.<br />

� Attard v. City of New York, 2008 WL 1991107 (E.D.N.Y. May 5, 2008). In this age discrimination<br />

litigation, the plaintiff filed second <strong>and</strong> third motions for sanctions, citing the defendants’ repeated<br />

failure to comply with court-ordered discovery <strong>and</strong> failure to serve a timely opposition to the second<br />

motion. After analyzing the case history, the court found that the defendants “forced [the] plaintiffs<br />

to endure lengthy delays, struggle with defective data production <strong>and</strong> expend valuable resources to<br />

compel [the] defendants to comply with the law.” The court found the statistical data produced was<br />

not in a usable form because it contained flawed data that made accurate analysis impossible.<br />

Subsequently, the court awarded monetary sanctions requiring the defendant to pay reasonable<br />

expenses associated with the plaintiff’s use of expert witnesses, <strong>and</strong> attorneys’ fees <strong>and</strong> costs<br />

accrued by the plaintiff to enforce discovery.<br />

� Whitney v. JetBlue Airways Corp., 2008 WL 2156324 (E.D.N.Y. April 29, 2008). In this<br />

negligence litigation, the plaintiff sought sanctions alleging that the defendant willfully destroyed a<br />

critically relevant h<strong>and</strong>written report. The defendant argued the h<strong>and</strong>written document was<br />

destroyed after it was entered into an electronic database as part of a bulk destruction of<br />

documents. Finding the defendant acted negligently in allowing destruction of the h<strong>and</strong>written<br />

report, the court nevertheless denied the plaintiff’s request for sanctions. The court noted that the<br />

plaintiff did not sufficiently establish the report’s relevance nor prove that the report contained<br />

information beyond what was produced in electronic form. However, the court awarded to the<br />

plaintiff the attorney’s fees <strong>and</strong> costs in connection with the motion due to the defendant’s<br />

destruction of the document.<br />

� Treppel v. Biovail Corp., 2008 WL 866594 (S.D.N.Y. April 2, 2008). In this defamation suit<br />

involving numerous ongoing discovery conflicts, the plaintiff moved the court to compel production<br />

of additional electronic information <strong>and</strong> for sanctions for failure to preserve evidence. The plaintiff<br />

sought restoration <strong>and</strong> search of all backup tapes from two servers <strong>and</strong> one employee’s laptop,<br />

arguing that the defendant’s search was insufficient <strong>and</strong> possibly overlooked relevant data. The<br />

defendant argued its recovery <strong>and</strong> search of the December 2003 <strong>and</strong> March 2005 backups was<br />

sufficient as the events giving rise to the litigation occurred in the spring of 2002 <strong>and</strong> the complaint<br />

was filed in May 2003. For the most part, the court agreed with the defendant that the likelihood of<br />

finding additional relevant documents was exceedingly remote <strong>and</strong> therefore held that the burden<br />

outweighed the likely benefit. However, the court ordered restoration <strong>and</strong> search of one e-mail<br />

49


server for three specific days as well as two separate backups of another file server <strong>and</strong> e-mail<br />

server.<br />

� Barker v. Gerould, 2008 WL 850236 (W.D.N.Y. Mar. 27, 2008). In this employment litigation, the<br />

plaintiff initially filed a motion to compel production of e-mail among <strong>and</strong> between the parties. In<br />

response, the defendants produced some e-mail; however, the plaintiff claimed the production was<br />

inadequate <strong>and</strong> renewed its motion to compel. In an effort to ascertain the adequacy of the<br />

defendants’ search, the court ordered the parties to submit an affidavit describing the procedures<br />

undertaken, but the submitted affidavit merely described the additional work required to restore the<br />

deleted data from backup tapes. Finding the record pertaining to the defendants’ search of the<br />

requested e-mail from accessible sources incomplete, the court declined to compel production <strong>and</strong><br />

instead ordered the defendants to identify individuals with knowledge of the steps taken during<br />

collection <strong>and</strong> allowed time for the plaintiff to depose those individuals.<br />

� In re World Trade Center Disaster Site Litig., 2008 WL 793578 (S.D.N.Y. Mar. 24, 2008). In this<br />

ongoing multi-district litigation, the plaintiffs objected to the court-appointed special master’s<br />

recommendation that a third party be hired to build, maintain <strong>and</strong> operate a database of “Core<br />

<strong>Discovery</strong>.” The plaintiffs’ objection focused on the great expense <strong>and</strong> claimed lack of necessity<br />

associated with creating such a large database. The court, sensitive to the costs of the litigation,<br />

approved the recommendation due to the necessity of a common core of reliable information in this<br />

important litigation.<br />

� Ingoglia v. Barnes & Noble College Booksellers, Inc., 2008 WL 458504 (N.Y. App. Div. Feb. 19,<br />

2008). In this action to recover damages for defamation, the defendant appealed the New York<br />

Supreme Court’s decision to deny its motion to dismiss. The defendant sought dismissal based on<br />

the common law doctrine of spoliation which provides for sanctions for negligent or intentional<br />

destruction of evidence. Previously, the defendant sought inspection of the plaintiff’s home<br />

computer <strong>and</strong> the court granted the request. The defense expert found evidence that numerous<br />

files, images, folders <strong>and</strong> some internet history had been deleted following the request for<br />

inspection but preceding the production, as well as evidence of the installation of software<br />

designed to remove data. This court reversed, finding an abuse of discretion, <strong>and</strong> granted the<br />

dismissal due to the severe prejudice suffered by the defendant as a result of the plaintiff’s<br />

spoliation.<br />

� Toussie v. County of Suffolk, 2007 WL 4565160 (E.D.N.Y. Dec. 21, 2007). In this suit, the<br />

plaintiffs claimed the defendants violated their civil rights by blocking the sale of numerous parcels<br />

of real estate. During discovery, the plaintiffs claimed the defendants failed to conduct a diligent<br />

search for responsive e-mails based on the production of a mere two e-mails. The court agreed<br />

with the plaintiffs <strong>and</strong> refused to allow the defendant to, “throw up their h<strong>and</strong>s <strong>and</strong> walk away,” by<br />

claiming they do not restore e-mails. The court narrowed the scope of the e-mail search by<br />

custodian, time frame <strong>and</strong> keywords <strong>and</strong> ordered the defendant to prepare a search plan<br />

estimating the time <strong>and</strong> cost to perform the search. The defendant sought the help of a third party<br />

vendor, provided the court with an estimate <strong>and</strong> began the restoration process. Thereafter, the<br />

defendant produced over two thous<strong>and</strong> pages of responsive e-mails. The plaintiff again claimed<br />

the production was inadequate <strong>and</strong> sought spoliation sanctions based on the defendant’s<br />

destruction of evidence, arguing that the destruction was caused by the failure to implement a<br />

litigation hold or to alter its document retention procedures after the filing of the lawsuit. While the<br />

court agreed that the defendant was under a duty to maintain e-mails <strong>and</strong> that they acted<br />

negligently when failing to implement a litigation hold, the court was not persuaded that the missing<br />

e-mails contained evidence that would have been favorable to the plaintiff. The court therefore<br />

50


efused to issue adverse jury instructions or issue a default judgment against the defendant, but<br />

instead ordered the defendant to pay the costs associated with the preparation <strong>and</strong> argument of<br />

the motions.<br />

� Scott v. Beth Israel Med. Ctr., Inc., 2007 WL 3053351 (N.Y.Supp. Oct. 17, 2007). In this case, a<br />

former doctor-employee sought contractual damages arising from the defendant’s alleged<br />

termination without cause. On rem<strong>and</strong> following reversal of the district court’s earlier summary<br />

judgment order, the plaintiff sought a protective order requiring the return of e-mail correspondence<br />

between himself <strong>and</strong> his attorney claiming attorney client privilege <strong>and</strong> the work product doctrine.<br />

The defendant argued that their e-mail policy states that company e-mail is to be used solely for<br />

business purposes <strong>and</strong> that employees have no personal privacy rights in any material created or<br />

communicated on the company computer systems. The court agreed <strong>and</strong> denied the plaintiff’s<br />

motion since the defendant notified the plaintiff of the use <strong>and</strong> monitoring policies.<br />

� PSEG Power New York, Inc. v. Alberici Constructors, Inc., 2007 WL 2687670 (N.D.N.Y. Sept.<br />

7, 2007). In this breach of contract case, the defendant sought production of all electronically<br />

stored e-mails along with their corresponding attachments. The plaintiff produced a disc with emails<br />

that, due to a technical glitch, were divorced from their proper attachments. Many efforts to<br />

join the attachments failed <strong>and</strong> the defendant moved to order a second production at the plaintiff’s<br />

expense. The plaintiff claimed such would be overly burdensome <strong>and</strong> costly but agreed to<br />

reproduce at the defendant’s expense. Relying on Fed.R.Civ.P. 34(b), the court found that the<br />

original production was not within the normal course of business or in a form readily usable <strong>and</strong><br />

therefore ordered the plaintiff to reproduce. The court also ordered the plaintiff to pay for the costs<br />

of reproduction as the producing party presumptively bears the expense of production.<br />

� In re Maura, 2007 WL 2231386 (N.Y.Sur.Ct. June 28, 2007). In a suit to determine her entitlement<br />

to her decedent husb<strong>and</strong>’s estate in spite of their prenuptial agreement, the respondent sought<br />

discovery from the non-party attorney <strong>and</strong> his firm who drafted the agreement. She sought access<br />

to the attorney’s computer for records of billing <strong>and</strong> all existing <strong>and</strong> deleted records concerning the<br />

prenuptial agreement. The attorney argued attorney-client privilege with regard to other information<br />

on the computer <strong>and</strong> offered the firm’s backup tapes in the alternative. The court held that the<br />

backup tapes were insufficient as they would lack deleted <strong>and</strong> altered records <strong>and</strong> ordered the<br />

attorney’s hard drive to be imaged. The court ordered the attorney to choose a computer forensics<br />

expert to submit a cost proposal for the imaging. The attorney should then forward a copy of the<br />

proposal to the respondent, at which time she would determine if she was willing to go forward with<br />

or without the information.<br />

� Valdez v. Town of Brookhaven, 2007 WL 1988792 (E.D.N.Y July 5, 2007). In a suit alleging<br />

illegal eviction based on racial discrimination, the plaintiff sought a court imposed litigation hold on<br />

the defendant’s relevant employee records, arguing the defendant had a history of “terrible record<br />

keeping.” While the court noted that the defendant is under a duty to preserve evidence relevant to<br />

the litigation, the court denied the preservation order request, stating preservation orders are<br />

burdensome <strong>and</strong> expensive <strong>and</strong> should not be entered into lightly absent a clear need.<br />

� Kingsway Fin. Serv. Inc. v. Pricewaterhouse-Coopers LLC, 2007 WL 1837133 (S.D.N.Y. June<br />

27, 2007). In a securities suit, the parties entered an agreement whereby inadvertent production of<br />

a purportedly privileged document would not operate as a waiver of privilege. In the issue at h<strong>and</strong>,<br />

the defendant motioned the court for an order to compel the production of an email exchanged<br />

between the plaintiff’s executive <strong>and</strong> attorney. The plaintiff originally produced the targeted email<br />

inadvertently, but later included it as an attachment on a motion <strong>and</strong> served it on all the<br />

defendants. The court held that as the plaintiff’s second production of the email was not<br />

51


inadvertent, it waived the attorney-client privilege <strong>and</strong> therefore the defendant’s motion to compel<br />

was granted.<br />

� In re Sept. 11th Liab. Ins. Coverage <strong>Case</strong>s, 2007 WL 1739666 (S.D.N.Y. June 18, 2007).<br />

Following the terrorist attacks of September 11, 2001, numerous victims filed claims against the<br />

Port Authority of New York <strong>and</strong> New Jersey (“Port Authority”) as the owner <strong>and</strong> operator of the<br />

Twin Towers, <strong>and</strong> its lessee Westfield Corporation, which procured commercial liability insurance<br />

under the general name World Trade Center Properties LLC (“WTCP”) through Zurich American<br />

Insurance Company (“Zurich”). In the pending litigation, these parties sought indemnification <strong>and</strong><br />

declaratory relief from Zurich. Zurich argued that neither the Port Authority nor Westfield were<br />

named insureds under the policy <strong>and</strong> refused to indemnify or pay out claims. Ultimately, Zurich<br />

changed its position, <strong>and</strong> following dismissal of the case, Port Authority <strong>and</strong> Westfield moved for<br />

sanctions, alleging Zurich’s position throughout the pleadings was objectively unreasonable in<br />

violation of Rule 11 of the Federal Rules of Civil Procedure (“FRCP”) <strong>and</strong> the discovery abuses<br />

violated FRCP 37. The court held Zurich <strong>and</strong> its counsel liable for $1,250,000 based on violation of<br />

both Rules. As Zurich deleted the electronic version of an essential document <strong>and</strong> possessed the<br />

paper version for over three years before producing it, the lease holders were successful in<br />

meeting the burden for the court to impose sanctions. The court determined the $1,250,000 was<br />

sufficient to deter repetition of such conduct or comparable conduct by others similarly situated.<br />

� Calyon v. Mizuho Securities USA, Inc., 2007 WL 1468889 (S.D.N.Y. May 19, 2007). In a suit<br />

alleging violation of the <strong>Computer</strong> Fraud <strong>and</strong> Abuse Act, breach of fiduciary duty, unfair<br />

competition, inter alia, the plaintiff motioned the court to compel the defendants to produce mirror<br />

images of the hard drives of their personal computers <strong>and</strong> other computer storage devices to the<br />

plaintiff’s computer forensic expert for inspection. The plaintiff alleged the defendants used e-mail<br />

<strong>and</strong> small computer storage devices to remove vast quantities of the plaintiff’s confidential <strong>and</strong><br />

proprietary data. While the defendants agreed to preserve the hard drives by creating mirror<br />

images, the parties disagreed as to who should inspect the mirror images. The plaintiff argued their<br />

expert should have complete access to the images, <strong>and</strong> the defendants argued that granting the<br />

plaintiff’s expert unfettered access would impermissibly invade the privacy rights of the defendants<br />

<strong>and</strong> their non-party family members who also used the computers. The defendants proposed their<br />

own expert should inspect the mirror images using search terms provided by the plaintiff, or that<br />

the search be performed by an independent third-party expert. The court referred to the committee<br />

notes of Fed. R. Civ.P. 34(a), which states that a party is not entitled to “a routine right of direct<br />

access to a party’s electronic information system, although such access might be justified in some<br />

circumstances.” The court held the plaintiff failed to show how its direct access was justified under<br />

these circumstances. As the defendants’ expert was fully capable of performing the search, as well<br />

as working with the plaintiff’s attorney, the court found no reason to introduce an additional layer of<br />

expertise by requiring an independent expert. The court ordered the defendants to preserve the<br />

mirror images in question <strong>and</strong> to make their expert accessible for consultation with the plaintiffs<br />

counsel <strong>and</strong> expert on an on-going basis.<br />

� De Espana v. American Bureau of Shipping, 2007 WL 1686327 (S.D.N.Y. June 6, 2007). In a<br />

suit regarding the casualty of a vessel off the coast of Spain, the defendant sought sanctions for<br />

the plaintiff’s alleged spoliation of email <strong>and</strong> electronic documents. The court set out a three factor<br />

test to determine if sanctions were warranted, which stated that the party seeking sanctions for<br />

spoliation must demonstrate: (1) that the opposing party had an obligation to preserve the<br />

evidence; (2) it acted culpably in destroying or failing to preserve the evidence; <strong>and</strong> (3) the<br />

evidence would have been relevant to the case, in that a reasonable jury could find that the<br />

52


evidence would have been favorable to the opposing party. The court held that the plaintiff had a<br />

duty to preserve relevant electronic information upon filing suit <strong>and</strong> acted negligently, not willfully,<br />

in failing to timely issue a litigation hold. The court also found that the defendant did not meet its<br />

burden of demonstrating that the missing email would have contained relevant information<br />

unfavorable to the plaintiff or that it was prejudiced without those records. As such, the court<br />

refused to issue an adverse inference instruction but did find that the defendant was entitled to<br />

reimbursement of reasonable expenses incurred in bringing the motion.<br />

� Gragg v. Int’l Mgmt. Group (UK), Inc., 2007 WL 1074894 (N.D.N.Y. Apr. 5, 2007). In an action<br />

initially centering on various breach of contract <strong>and</strong> related claims, the magistrate judge found the<br />

defendant’s disclosure of four privileged e-mails to plaintiff’s counsel was inadvertent <strong>and</strong> did not<br />

provide a basis for waiving attorney-client privilege. The e-mails in question were compiled along<br />

with approximately 200 other e-mails by an assistant in the defendant’s in-house legal department<br />

<strong>and</strong> produced on CD-ROM. Neither outside nor in-house counsel reviewed the CD-ROM for<br />

privileged material before it was sent to the plaintiff. After an appeal by the plaintiff, the magistrate’s<br />

discovery order was reversed <strong>and</strong> rem<strong>and</strong>ed for additional consideration. In the interim, the plaintiff<br />

supplemented his original complaint with several federal RICO related claims. Characterizing the<br />

bulk of the claims as matters of federal question jurisdiction, the magistrate judge held that federal<br />

law governed any privilege determinations in the suit. Weighing factors outlined under federal law,<br />

the magistrate found the defendant had waived privilege as to the inadvertently produced e-mails.<br />

In particular, he cited a lack of reasonable precautions to prevent disclosure <strong>and</strong> the relatively low<br />

volume of e-mails produced in total as reasons for that conclusion. However, the magistrate<br />

declined to find that the scope of the waiver extended to the subject matter of the e-mails, as the<br />

plaintiff urged, <strong>and</strong> held that the waiver only extended to the produced materials.<br />

� In re Veeco Instruments, Inc. Sec. Litig., 2007 WL 983987 (S.D.N.Y. Apr. 2, 2007). In this<br />

securities litigation, the plaintiff sought to compel the defendant to produce several named<br />

individuals’ documents from back-up tapes covering an eight-month period. The defendant<br />

objected, arguing that the plaintiff’s motion was unduly delayed <strong>and</strong> that restoring <strong>and</strong> searching<br />

the back-up tapes would be extraordinarily burdensome <strong>and</strong> costly. The defendant further argued<br />

that if production of the back-up tapes was ordered, the plaintiff should bear the costs. The court<br />

noted that while the defendant had neglected to identify the back-up tapes as an inaccessible<br />

source of potentially responsive information, as required by Fed. R. Civ. Pro. 26(b)(2), both parties<br />

had overlooked their obligation to discuss discovery parameters <strong>and</strong> protocols. Finding that the<br />

plaintiff could not reasonably assume that the defendant would have undertaken discovery of the<br />

back-up tapes as a matter of course, the court determined that the back-up tapes were not<br />

reasonably accessible. The court then considered whether good cause justified discovery of the<br />

back-up tapes despite the associated burdens <strong>and</strong> costs. The court cited the resources of the<br />

parties, the discoverability of the information, the specificity of the request <strong>and</strong> the unavailability of<br />

the information from other more accessible sources as reasons demonstrating good cause.<br />

Accordingly, the court directed the defendant to restore the back-up tapes for the specified time<br />

period <strong>and</strong> to produce responsive, non-privileged information to the plaintiff. Turning to the issue<br />

cost allocation, the court directed the defendant to initially to pay for the cost of production <strong>and</strong><br />

postponed further cost-shifting analysis until it had a chance to review the results of the search <strong>and</strong><br />

consider the actual time <strong>and</strong> effort expended by the defendant.<br />

� Stanziale v. Pepper Hamilton LLP, 2007 WL 473703 (S.D.N.Y. Feb. 9, 2007). In a case involving<br />

claims of malpractice <strong>and</strong> breach of fiduciary duty, inter alia, the defendant moved a federal court<br />

in New York to compel the production of e-mails contained on a third-party’s server. The third-party<br />

53


already produced other e-mails which were relevant to the case; however, they withheld<br />

documents that may have been subject to certain privileges. The third-party argued that to disclose<br />

the e-mails contained on the server would violate a confidentiality agreement made between the<br />

third-party <strong>and</strong> another party to the lawsuit. Furthermore, the defendant argued that there should<br />

be no cost-sharing because the documents are reasonably accessible <strong>and</strong> must be produced at<br />

the third-party’s own cost. The New York judge declined to rule on the defendant’s motion <strong>and</strong><br />

instead transfer the issue to a federal judge in Delaware, stating that “[a] judge who is fully familiar<br />

with the underlying litigation is in a better position to resolve such issues than a judge in a different<br />

district with no knowledge of the case.” The parties did not object to the ruling <strong>and</strong> the motion was<br />

sent forth before the federal court judge in Delaware overseeing the entire litigation.<br />

� In re NTL, Inc. Sec. Litig., 2007 WL 241344 (S.D.N.Y. Jan. 30, 2007). In a class action claim<br />

involving federal securities law violations, the plaintiffs moved for sanctions against the defendant,<br />

alleging that the defendant deliberately destroyed <strong>and</strong> allowed spoliation of e-mails <strong>and</strong> other<br />

electronically stored information. The defendant company fell into bankruptcy before this suit <strong>and</strong><br />

emerged from bankruptcy with two distinct subsidiaries conducting business on behalf of the<br />

defendant. After bankruptcy, many electronically stored documents <strong>and</strong> e-mails were lost or<br />

destroyed when the company emerged split into the two new companies. The plaintiffs argued that<br />

one of the new entities had a duty to preserve <strong>and</strong> produce e-mails created <strong>and</strong> saved during the<br />

previous company’s existence. The defendant argued that it had no duty to preserve the<br />

information because the possibility of litigation could not have been foreseen prior to the<br />

bankruptcy of its parent company. It further argued that it had no responsibility to preserve any of<br />

its electronic documents sent from the parent company prior to the current suit. The court<br />

concluded that defendant’s duty to preserve actually started when litigation was foreseen by former<br />

company even though most of the documents <strong>and</strong> ESI ended up in the physical possession of new<br />

companies. The court found that the defendant’s failure to preserve relevant documents <strong>and</strong> ESI<br />

was grossly negligent <strong>and</strong> that it reasonably should have known to preserve all documents from<br />

the parent company <strong>and</strong> issue a proper litigation hold that spanned across the old company <strong>and</strong><br />

the new companies. The court granted the motion for an adverse inference instruction <strong>and</strong> ordered<br />

the defendant to pay attorneys’ fees <strong>and</strong> costs.<br />

� In re Payment Card Interchange Fee <strong>and</strong> Merchant Discount Antitrust Litig., 2007 WL 121426<br />

(E.D.N.Y. Jan. 12, 2007). In this class action, the defendants brought a motion to compel native<br />

production of documents from the plaintiffs. During discovery, the plaintiffs made at least six<br />

productions where electronic documents were printed to paper <strong>and</strong> then scanned <strong>and</strong> converted<br />

into searchable TIFF images using optical character recognition software. This laborious process<br />

stripped all metadata references from the original files. The defendants filed a motion to compel the<br />

plaintiff to re-produce these documents natively <strong>and</strong> asked the court to order all subsequent<br />

production of electronic documents in a native format. The plaintiffs opposed the motion to compel,<br />

stating that the already produced the requested documents <strong>and</strong> to produce the documents again in<br />

a native format would be burdensome <strong>and</strong> costly. The court determined that the newly amended<br />

Federal Rules would apply to the parties; however, to require the plaintiffs to reproduce discovery<br />

already in possession of the defendants would place a substantial <strong>and</strong> costly burden on the<br />

plaintiffs. Yet, the court also ruled that the plaintiffs are on notice of the defendants’ request for<br />

native files <strong>and</strong> stated that any subsequent discovery should be produced in a native format.<br />

� Malletier v. Dooney & Bourke, Inc., 2006 WL 3851151 (S.D.N.Y. Dec. 22, 2006). In this<br />

trademark infringement case, the plaintiff moved for discovery sanctions against the defendant,<br />

claiming that the defendant failed to conduct complete or timely searches for electronic documents,<br />

54


failed to issue a proper litigation hold, <strong>and</strong> failed to preserve chat room discussions taking place on<br />

the defendant’s website. Denying the plaintiff’s motion, the court found no discovery misconduct.<br />

Instead, the court questioned the plaintiff’s delay in raising these discovery issues <strong>and</strong> stated that<br />

the plaintiff failed to demonstrate that the defendant’s discovery production was materially<br />

incomplete. The court noted an ambiguity as to whether some employees’ e-mail accounts had<br />

been searched <strong>and</strong> ordered the defendant to confirm this in writing. The court also found that the<br />

defendant’s failure to instruct certain employees to preserve documents after the lawsuit was either<br />

imminent or already pending did not result in any relevant documents being destroyed. Lastly, the<br />

court held that chat room discussions on the defendant’s website would not fall under the same<br />

discovery requirements as e-mail, <strong>and</strong> the defendant could not be sanctioned for failure to preserve<br />

the discussions.<br />

� Zurich Am. Ins. Co. v. Ace Am. Reinsurance Co., 2006 WL 3771090 (S.D.N.Y. Dec. 22, 2006).<br />

In an insurance dispute, the plaintiff sought to compel electronically stored information regarding<br />

two lawsuits involving the defendant, a large reinsurance company, with similar circumstances to<br />

the plaintiff’s case. The defendant failed to pay its share of a settlement the plaintiff reached with<br />

one of its insured. The defendant argued the information sought could not be retrieved from its<br />

computer system since it could not segregate claims according to specialized search terms.<br />

However, the court gave the defendant’s argument little merit since, “[a] sophisticated reinsurer<br />

that operates a multimillion dollar business is entitled to little sympathy for utilizing an opaque data<br />

storage system, particularly when, by the nature of its business, it can reasonably anticipate<br />

frequent litigation.” Yet, the court also recognized that a search of its entire database may be<br />

infeasible. Therefore, the court ordered the parties agree upon a discovery protocol to sample<br />

possible claims in the defendant’s database.<br />

� MacNamara v. City of New York, 2006 WL 3298911 (S.D.N.Y. Nov 13, 2006). This case stems<br />

from the arrest of over 1,800 people at the 2004 Republican National Convention. The class of<br />

plaintiffs motioned the court to compel the city to produce certain electronically stored information.<br />

The plaintiffs’ request the electronic version of paper arrest worksheets used when booking a<br />

criminal into jail. The h<strong>and</strong>written worksheets are normally entered into the city’s electronic online<br />

booking system by someone other than the arresting officer. The plaintiffs’ argued they were<br />

entitled to the electronic versions of worksheets because there are often inconsistencies <strong>and</strong><br />

omissions when information is transferred between the paper version <strong>and</strong> the electronic version.<br />

The plaintiffs had evidence of one such instance prior to the motion. The city argued that such<br />

production would merely be duplicative since they already provided the paper worksheets to<br />

plaintiffs. The court held that the plaintiffs’ example of inconsistent data entry would support a<br />

motion to compel the remainder of the electronic documents. However, the court further held that<br />

the production of the electronic worksheets would be subject to an “attorney’s-eyes-only”<br />

description. Furthermore, the court held that an additional request by plaintiffs for “all electronic<br />

data” relating to the 1,800 arrests was vague <strong>and</strong> ambiguous.<br />

� Reino de Espana v. Am. Bureau of Shipping, 2006 WL 3208579 (S.D.N.Y. Nov. 3, 2006). In a<br />

matter concerning the casualty of a ship off the coast of Spain, the defendant requested the court<br />

to compel e-mail from the plaintiff regarding the incident. The plaintiff is a Spanish entity that<br />

investigated the accident scene. The plaintiff claimed that electronic data sought by the defendant<br />

did not exist or was privileged. Furthermore, the plaintiff argued against production of e-mail<br />

because Spain’s privacy laws prohibit discovery of private e-mail. The defendant argued that any<br />

e-mail information pertaining to the issue would be kept on the plaintiff’s individual computers used<br />

by each employee <strong>and</strong> the specific computers should be subject to discovery requests. The court<br />

55


uled that the plaintiff failed to properly preserve any e-mail evidence. The court noted the<br />

defendant was not asking for a ruling based on spoliation <strong>and</strong> failure to preserve evidence, but it<br />

found that it would be “futile to order [the plaintiff] to conduct a diligent computer-by-computer<br />

search.” The court further ruled that Spain’s privacy laws are not applicable in United States<br />

Federal Courts <strong>and</strong> cannot st<strong>and</strong> as a legal basis for failure to produce documents or preserve<br />

documents. The defendant was granted leave to file a motion for sanctions.<br />

� United States v. Tamez, 2006 WL 2854336 (S.D.N.Y. Oct. 5, 2006). A judge’s sentence for a<br />

defendant convicted of embezzlement, inter alia, was increased by two levels for obstruction of<br />

justice -- namely the defendant’s deliberate deletion of e-mail from a workplace-issued laptop. A<br />

computer forensics expert determined the defendant, a high-ranking DEA official, deleted<br />

incriminating e-mails <strong>and</strong> files from his government computer shortly after the DEA informed him<br />

that he was placed on administrative leave for suspicion of embezzlement. The defendant filed a<br />

motion asking the court to set aside the upward departure from the sentencing guidelines because<br />

the e-mails were not deleted deliberately. He argued that he only deleted the files because of<br />

department policy requiring departing employees to return laptops in the same condition in which<br />

they were issued. The defendant further argued his personal AOL log in information was only<br />

deleted to prevent others from obtaining his personal information. The court, however, found<br />

defendant’s arguments “patently absurd”. There was no doubt that defendant was “intentionally<br />

seeking to destroy this evidence to interfere with the investigation. By deleting the files--some of<br />

which have not been recovered in usable form or at all--he impeded the Government’s<br />

investigation.” The upward departure of two levels in sentencing was affirmed by the court.<br />

� Quinby v. WestLB, 2006 WL 2597900 (S.D.N.Y. Sept. 5, 2006). In an employment discrimination<br />

suit, the defendant sought a court order requiring the plaintiff to bear a portion of the costs for<br />

restoring <strong>and</strong> searching backup tapes. The defendant hired <strong>Kroll</strong> <strong>Ontrack</strong> to restore <strong>and</strong> search<br />

data from the following locations: 171 backup tapes; <strong>Kroll</strong> <strong>Ontrack</strong>’s archives from a previous<br />

matter; <strong>and</strong> backup tapes containing e-mail for employees who worked outside the United States.<br />

The plaintiff argued the costs should not be shifted since the defendant had a duty to preserve the<br />

requested e-mail in an accessible format. The defendant argued its only duty was to preserve the<br />

evidence, it had no duty to preserve the data in a particular format, <strong>and</strong> a restoration of so many<br />

documents should fall on the plaintiff. The court agreed in part, holding the producing party does<br />

not have an explicit duty to preserve evidence in an accessible format. However, the producing<br />

party will bear the cost of producing any evidence preserved in an inaccessible format after<br />

litigation is reasonably anticipated. The court stated this would “[P]revent parties from taking unfair<br />

advantage of a self-inflicted burden by shifting part of the costs of undoing the burden to an<br />

adversary.” However, it if was not reasonably foreseeable that the evidence at issue would have to<br />

be produced, the responding party who converts the evidence into an inaccessible format after the<br />

duty to preserve evidence arose, could still seek to shift the costs associated with restoring <strong>and</strong><br />

searching that evidence. For a small portion of the defendant’s inaccessible data that the<br />

defendant could not have reasonably anticipated producing, the court relied on the Zubulake<br />

seven-factor cost-shifting test <strong>and</strong> ruled the plaintiff should share 30 percent of the production<br />

costs. See also Quinby v. WestLB AG, 2007 WL 38230 (S.D.N.Y. Jan. 4, 2007) (amending the<br />

court’s original cost-shirting decision relating to backup tape restoration costs).<br />

� Delta Fin. Corp. v. Morrison, 819 N.Y.S.2d 908 (2006). In a fraudulent transaction case, plaintiffs<br />

requested the court to order the production of e-mails created almost two years prior to the alleged<br />

misconduct. Plaintiffs’ request required defendant to restore several backup tapes at a significant<br />

cost. Defendant argued that there was no obligation to restore any backup tapes because the<br />

56


tapes were meant only for disaster relief recovery <strong>and</strong> not for possible litigation. The court ruled<br />

that the defendant did not have to produce all responsive documents under plaintiffs’ requests as it<br />

was not entirely convinced that relevant <strong>and</strong> responsive documents would be found. However, the<br />

court held that defendant must perform an abbreviated search using a small sample of dates <strong>and</strong><br />

search terms as supplied by the plaintiff. If the small search returns positive results, the plaintiff<br />

would be given leave to move the court for further electronic searches of the backup tapes.<br />

Furthermore, the court held that all costs, including attorney’s fees would be paid by plaintiff after<br />

the defendant supplied proper affidavits <strong>and</strong> the court determined that such cost-shifting was<br />

warranted.<br />

� Eastman Kodak Co. v. Sony Corp., 2006 WL 2039968 (W.D.N.Y. July 20, 2006). The district<br />

court affirmed the Special Master’s Report <strong>and</strong> Recommendation requesting, inter alia, to deny the<br />

defendant’s motion to compel the plaintiff to “more specifically correlate information produced<br />

electronically via a computer server, CD-Rom <strong>and</strong> DVD’s.” Asserting deprivation of due process,<br />

the defendant argued the practical impossibility of finding relevant documents hidden in the<br />

“electronic equivalent of 300 million pages.” After performing searches on the contested server, the<br />

Special Master found the server appeared to be organized in a usable format. Although the court<br />

recognized substantial time, effort <strong>and</strong> expense would be required to sort through the produced<br />

documents, the court found this reasonable in light of the billions of dollars at issue in the case.<br />

Ruling the documents were accessible, had been produced in the form in which it is usually<br />

maintained, <strong>and</strong> that the plaintiff was in no better position to correlate the information to the<br />

defendant’s discovery requests than was the defendant, the court denied the defendant’s motion to<br />

compel.<br />

� In re NYSE Specialists Sec. Litig., 2006 WL 1704447 (S.D.N.Y. June 14, 2006). In an order<br />

addressing several discovery disputes, the court directed the defendants to produce all hard copy<br />

documents as single page tiff images, along with corresponding Opticon <strong>and</strong> Concordance load<br />

files, <strong>and</strong> instructed that all electronic documents be produced in their native format with metadata<br />

intact.<br />

� Phoenix Four, Inc. v. Strategic Res. Corp., 2006 WL 1409413 (S.D.N.Y. May 23, 2006). In a<br />

case involving breach of fiduciary duty, fraud <strong>and</strong> misrepresentation, the plaintiff brought a motion<br />

for sanctions against defendants <strong>and</strong> their counsel for spoliation <strong>and</strong> late production of evidence.<br />

Despite notice of potential litigation, the defendants ab<strong>and</strong>oned ten computer workstations<br />

containing relevant information at a former office location. Defendants also failed to timely identify<br />

<strong>and</strong> produce approximately 25 gigabytes of data stored on a server that was still in their<br />

possession, initially asserting to their own counsel there were no electronic files to search. The<br />

court found the defendants grossly negligent in ab<strong>and</strong>oning the workstations <strong>and</strong> “at least<br />

negligent” in their representations to counsel regarding the absence of any files to be searched.<br />

The court also held that defense counsel had been grossly negligent in their failure to conduct an<br />

independent inquiry to verify the accuracy of those representations. Granting plaintiff’s motion in<br />

part, the court declined to issue an adverse inference instruction or preclude the defendants from<br />

making a summary judgment motion, but awarded monetary sanctions <strong>and</strong> ordered the defendants<br />

<strong>and</strong> their counsel to bear the costs equally.<br />

� Curto v. Medical World Communications, Inc., 2006 WL 1318387 (E.D.N.Y. May 15, 2006). In<br />

an employment action, the defendants objected to a finding that the plaintiff had not waived her<br />

right to assert attorney-client <strong>and</strong> work product protection claims concerning e-mails <strong>and</strong> data<br />

contained on two laptops owned by the plaintiff’s former employer. Specifically, the defendants<br />

claimed a magistrate judge erred in considering whether the employer properly enforced its<br />

57


computer usage policy. Before returning the laptops to her employer, the plaintiff deleted all<br />

personal files, including protected communications. Two years later, the employer’s computer<br />

forensic expert restored some deleted files <strong>and</strong> e-mails. The employer produced the recovered<br />

data to the plaintiff’s counsel, who claimed many of these documents were privileged. Agreeing<br />

with the magistrate that the plaintiff reasonably believed the documents <strong>and</strong> e-mails were<br />

confidential, the court noted, “Plaintiff’s laptops were not connected to [the employer’s] computer<br />

server <strong>and</strong> were not located in [the employer’s] offices; thus, [the employer] was not able to monitor<br />

Plaintiff’s activity on her home-based laptops or intercept her e-mails at any time.”<br />

� Treppel v. Biovail Corp., 233 F.R.D. 363 (S.D.N.Y. 2006). In a defamation action alleging the<br />

defendants engaged in a “smear campaign” <strong>and</strong> destroyed his career, the plaintiff moved to<br />

compel the defendants to: 1) preserve electronic <strong>and</strong> paper data, 2) answer questions about their<br />

electronic data management practices, <strong>and</strong> 3) produce all accessible <strong>and</strong> responsive data. Before<br />

filing the motion, the plaintiff’s counsel sent defense counsel a proposed e-discovery preservation<br />

order that included provisions for exchanging document retention policy information, identifying a<br />

deposition witness with computer system knowledge, <strong>and</strong> preserving all relevant electronic data.<br />

The proposed order also declared accessible data would be produced in its native format <strong>and</strong><br />

inaccessible data would be identified but not immediately produced. Declining to agree to the<br />

order, defense counsel stated they would abide by their preservation obligations under the Federal<br />

Rules of Civil Procedure. They further argued the proposed order was onerous <strong>and</strong> it was<br />

inappropriate to consider production format in the absence of specific production requests.<br />

Although the court found a preservation order would be unduly burdensome <strong>and</strong> premature at that<br />

point in the litigation, the court ordered the defendants to answer the electronic data management<br />

questions as if they were interrogatories. The court also ordered the defendants to search for<br />

relevant data <strong>and</strong> provide the plaintiff with a detailed explanation of the search protocol. The court<br />

found native production was appropriate as the defendant failed to offer a substantive basis for its<br />

objection to native format.<br />

� Gilliam v. Addicts Rehab. Ctr. Fund, Inc., 2006 WL 228874 (S.D.N.Y. Jan. 26, 2006). In a class<br />

action lawsuit, the plaintiffs requested records relating to the defendants’ timekeeping, payroll, <strong>and</strong><br />

policies <strong>and</strong> procedures. The defendants produced some timekeeping records but failed to produce<br />

the other requested information including data contained on 148 compact discs. The defendants<br />

claimed producing the compact discs would reveal private employee data <strong>and</strong> stated they would<br />

produce paper records containing the relevant information. Observing the paper production would<br />

comprise 46 boxes <strong>and</strong> approximately 36,000 pages, the court declared, “there seems little doubt<br />

that the time <strong>and</strong> cost expenditure could be disproportionate to the interests sought to be<br />

protected.” The court contrasted this with an electronic review whereby the “plaintiffs could make<br />

duplicates of the computer discs quickly <strong>and</strong> inexpensively. These discs could then be reviewed in<br />

a more efficient manner <strong>and</strong> the sensitive information skipped by the reviewer(s).” The court further<br />

assured confidentiality concerns would be covered in a confidentiality order.<br />

� Quinby v. WestLB AG, 2005 WL 3453908 (S.D.N.Y. Dec. 15, 2005). Objecting to a request for the<br />

production of e-mails, the defendant claimed the e-mails were stored on backup tapes <strong>and</strong> not<br />

readily available, making them too expensive to retrieve. In response, the court ordered the<br />

defendant to consider the guidelines set forth in Zubulake v. UBS Warburg LLC, to provide an<br />

affidavit addressing technical issues <strong>and</strong> a deposition witness who could discuss these issues, <strong>and</strong><br />

to restore <strong>and</strong> put sample tapes into a searchable format. The defendant produced affidavits from<br />

its chief information officer <strong>and</strong> a <strong>Kroll</strong> <strong>Ontrack</strong> expert explaining that each tape would need to be<br />

“uncompressed” before it could be put into a searchable format. Further, the affidavits set forth the<br />

58


cost <strong>and</strong> time considerations required to complete this work. The plaintiff argued the affidavits were<br />

“incomplete, misleading <strong>and</strong> contain ‘outright false statements’ because they improperly focused<br />

on back-up tapes <strong>and</strong>…[failed to address] the costs of searching <strong>and</strong> contents of the Database <strong>and</strong><br />

archives that <strong>Kroll</strong> [<strong>Ontrack</strong>] maintains containing WestLB e-mails” from past e-discovery projects.<br />

Rejecting this argument, the court declared the defendant correctly focused on the backup tapes<br />

as “they were the most complete source for the e-mails.” In refusing to award sanctions, the court<br />

stated, “the fact that defendant is producing e-mails from the most complete, but most expensive,<br />

source is compelling evidence of defendant’s honesty <strong>and</strong> good faith.” See also Quinby v.<br />

WestLB AG, 2006 WL 59521 (S.D.N.Y. Jan. 11, 2006)(order granting motion to quash two<br />

subpoenas seeking “all e-mails sent to or received by plaintiff’s personal e-mail account during the<br />

period from October 2002 throughout July 2004, other than e-mails between plaintiff <strong>and</strong> her<br />

current <strong>and</strong> former counsel.”)<br />

� In re Natural Gas Commodity Litigation, 2005 WL 3036505 (S.D.N.Y. Nov. 14, 2005) decision<br />

set aside in part by 235 F.R.D. 241 (S.D.N.Y. Apr 18, 2006). In a lawsuit relating to natural gas<br />

price fixing, the plaintiffs sought to compel production of published trade data from two non-parties.<br />

The non-parties objected arguing, inter alia, that producing the information would be unduly<br />

burdensome. The court found the subpoena was not unduly burdensome with respect to one of the<br />

non-parties, <strong>and</strong> noted the non-party had already produced redacted <strong>and</strong> un-redacted electronic<br />

versions of requested spreadsheets to the government in connection with a criminal matter. The<br />

court stated, “While those spreadsheets themselves will not satisfy plaintiffs’ subpoenas here, they<br />

do show the [non-party] can produce this information in electronic format <strong>and</strong> still redact<br />

information about companies other than the target sources. . . .” The court also pointed out that the<br />

non-party had an outside document management firm overseeing the production <strong>and</strong> that the<br />

plaintiff agreed to pay for associated costs. The other non-party claimed some of the historical data<br />

sought was located on “old” <strong>and</strong> “antiquated individual computers.” In addressing this issue, the<br />

court required the parties to use a sampling protocol, “perhaps searching one of the ‘old’<br />

computers, with leave to re-visit the burden vs. utility question based on information from that<br />

process.”<br />

� Tilberg v. Next Mgmt. Co., 2005 WL 2759860 (S.D.N.Y. Oct. 24, 2005). During discovery, the<br />

court ordered the defendants to give the plaintiff’s computer forensic expert access to two e-mail<br />

servers <strong>and</strong> ordered the parties to split costs. However, when the forensic expert began his<br />

examination, he was unable to access the defendants’ second server. The defendants claimed this<br />

was the result of a system crash. After the discovery deadline passed, the plaintiff again sought<br />

access to the second server as well as permission to search the defendants’ central non-e-mail<br />

server <strong>and</strong> two specific employees’ desktop computers. The defendants submitted an affidavit from<br />

its information technology personnel indicating the computer system did not contain relevant<br />

documents. However, the plaintiff’s expert “found 187 occurrences of the word ‘Tilberg’ in ‘active<br />

space,’ which could have been found with st<strong>and</strong>ard search tools, <strong>and</strong> 97 occurrences of ‘Tilberg’ in<br />

deleted files.” The plaintiff declared the defendants should have produced these files without the<br />

need for a forensic search. Additionally, the plaintiff presented documents obtained from third<br />

parties that further proved relevant documents existed despite the defendant’s contrary claims.<br />

Finding the defendants “either inadvertently or deliberately delayed <strong>and</strong> obstructed discovery in this<br />

case,” the court ordered the defendants to provide the expert with access to the second e-mail<br />

server, the central server, <strong>and</strong> the two desktop computers. See also Tilberg v. Next Mgmt Co.,<br />

2005 WL 3543701 (S.D.N.Y. Dec. 28, 2005)(addressing the issue of privileged e-mails uncovered<br />

in the search).<br />

59


� Atronic Int’l, GMBH v. SAI Semispecialists of Am., Inc., 232 F.R.D. 160 (E.D.N.Y. 2005). During<br />

discovery in a breach of contract action, the plaintiff inadvertently produced two e-mails from the<br />

plaintiff’s employee to the plaintiff’s international counsel. The plaintiff again inadvertently<br />

reproduced the e-mails over a year later as deposition exhibits. After discovering the inadvertent<br />

productions, the plaintiff sought an order directing the defendant to return the documents <strong>and</strong> to<br />

refrain from using any information contained in the documents. A magistrate judge determined the<br />

plaintiff had waived its privilege claim as a result of the inadvertent productions. The plaintiff<br />

objected to the magistrate’s determination, claiming New York state law does not recognize<br />

attorney-client privilege waiver for inadvertent document production. Rejecting this argument, the<br />

district court held inadvertent disclosure could waive the attorney-client information depending on<br />

the circumstances in the case.<br />

� Okoumou v. Safe Horizon, 2005 WL 2431674 (S.D.N.Y. Sept. 30, 2005). In an employment<br />

related suit, the plaintiff sought sanctions against the defendants for failing to produce documents<br />

<strong>and</strong> e-mails pursuant to an earlier production order. In response, the defendants verified they had<br />

produced all e-mails that were responsive to the request <strong>and</strong> readily retrievable. The defendants<br />

also informed the court that archival tapes from an obsolete “Lotus ccmail” system may contain<br />

responsive e-mails but such e-mails were not readily accessible. Finding the defendants in<br />

substantial compliance with the initial production order, the court declined to award sanctions. The<br />

court, citing Zubulake, noted, “[i]f plaintiff wants to pursue discovery of the e-mails on the Lotus<br />

ccmail system she is free to do so. However, the extent to which those e-mails are discoverable<br />

<strong>and</strong> the allocation of the cost of restoring those e-mails requires further analysis.”<br />

� Cook v. Deloitte & Touche, LLP, 2005 WL 2429422 (S.D.N.Y. Sept. 30, 2005). The plaintiff filed<br />

an employment discrimination lawsuit alleging violations of the Americans with Disabilities Act <strong>and</strong><br />

other state human rights laws. After the defendant filed a motion for summary judgment, the<br />

plaintiff requested a continuance to permit time for further electronic discovery before the court<br />

ruled on the summary judgment motion. The plaintiff claimed the defendant failed to produce<br />

certain electronic entries made by the defendant’s employees. The court granted the defendant’s<br />

motion for summary judgment <strong>and</strong> declared the plaintiff failed to show the defendant did not<br />

produce critical electronic entries. The defendant had also produced an e-mail – characterized as a<br />

“smoking gun” by the plaintiff – from one of its employees indicating the company wanted to<br />

replace the plaintiff. Although recognizing the existence of the e-mail, the court declared, “Even if<br />

other e-mails exist in [the defendant’s] computer archives, as [the plaintiff] alleges, he has not<br />

made the showing necessary to warrant their retrieval at this late date at [the defendant’s]<br />

expense, nor has he volunteered to foot the bill for doing so.”<br />

� Bazak Int’l Corp. v Tarrant Apparel Group, 378 F.Supp.2d 377 (S.D.N.Y. 2005). The court found<br />

an e-mail exchange between a textile merch<strong>and</strong>iser <strong>and</strong> a seller, regarding a purported agreement<br />

to buy jeans, satisfied the New York statute of frauds signature requirement. In reaching its<br />

conclusion, the court noted the merch<strong>and</strong>iser’s typed signature appeared at the signatory line of<br />

the attached letter, <strong>and</strong> the letter was typed on merch<strong>and</strong>iser’s company letterhead.<br />

� Deutsche Bank Sec., Inc. v. Montana Bd. of Invs., 21 A.D.3d 90 (N.Y. App. Div. 2005). The<br />

plaintiff sued the defendant for an alleged breach of an agreement to sell bonds. The defendant<br />

filed a cross-motion for summary judgment <strong>and</strong> requested the court dismiss the complaint for lack<br />

of personal jurisdiction. In negotiating the agreement, the parties had communicated through the<br />

Bloomberg Messaging System which provides instant messaging between Bloomberg subscribers<br />

for the purpose of negotiating <strong>and</strong> completing trades <strong>and</strong> dispensing other financial information.<br />

During the message exchanges, the plaintiff’s director was located in New York, <strong>and</strong> the<br />

60


defendant’s investment officer was located in Montana. At trial, the court found it lacked personal<br />

jurisdiction over the defendant <strong>and</strong> granted summary judgment. The plaintiff appealed. On appeal,<br />

the court determined it had personal jurisdiction over the defendant because the defendant had<br />

transacted business in New York – even though it was physically located in Montana. The court<br />

stated, “We cannot countenance defendant’s argument that merely because plaintiff initially<br />

approached defendant through modern technology--which enabled defendant to very purposefully<br />

conduct a $15 million deal in Montana with a bank in New York--defendant should be allowed to<br />

evade jurisdiction because that very technology can technically be viewed as only furnishing<br />

services in Montana.”<br />

� Papyrus Tech. Corp. v. New York Stock Exch., Inc., 2005 WL 1606059 (S.D.N.Y. July 7, 2005).<br />

Weeks after completing expert depositions, the plaintiff sought an order directing the defendant to<br />

produce certain computer files. The plaintiff declared that its late request was immaterial given the<br />

defendant’s continuing duty to supplement its discovery responses under Fed. R. Civ. P. 26(e)(2).<br />

The defendant had previously produced computer files it found relevant <strong>and</strong> a list of all of its<br />

computer files, which included the files the plaintiff currently sought. The magistrate refused to<br />

issue the order <strong>and</strong> declared, “Plaintiff sought a broad array of computer data in 2004 <strong>and</strong> the<br />

defendant supplied some, objected to some, <strong>and</strong> identified all of the files in question. Plaintiff chose<br />

not to pursue the matter until now, <strong>and</strong> offers no basis either for excusing this delay or for deeming<br />

the files in question to be so significant as to justify reopening discovery more than five months<br />

after its close.”<br />

� Public Relations Soc’y of Am., Inc. v. Road Runner High Speed Online, 2005 WL 1330514<br />

(N.Y. May 27, 2005). In connection with their intention to commence a defamation action against<br />

the sender of an alleged defamatory e-mail, the petitioners sought production of relevant<br />

documents pursuant to preaction disclosure rules. The sought after e-mail was in the custody <strong>and</strong><br />

control of an internet service provider, the respondent in this case. After finding out about the<br />

motion, the individual who authored the e-mail sought to intervene in the proceeding, vacate the<br />

default judgment, <strong>and</strong> block the disclosure of the identifying documents. The court looked to a fivefactor<br />

disclosure evaluation test. The test weighed: “(1) whether the claimant has shown a prima<br />

facie cause of actionable harm, (2) whether the discovery request was sufficiently specific as to be<br />

reasonable likely to lead to the identifying information, (3) whether there was an alternative means<br />

to obtain the information, (4) if the information sought was central <strong>and</strong> necessary to advance the<br />

claim, <strong>and</strong> (5) if the defendant had any reasonable expectation of privacy in the identifying<br />

information.” Based on the test, the court determined disclosure was warranted <strong>and</strong> ordered the<br />

respondent to produce the identifying documents.<br />

� Lyondell-Citgo Ref., LP v. Petroleos de Venezuela, S.A., 2005 WL 1026461 (S.D.N.Y. May 2,<br />

2005). In a dispute between two oil companies, the defendant moved to set aside an adverse<br />

inference instruction issued by a magistrate based on the defendant’s failure to produce certain<br />

documents. Specifically, the magistrate had ordered the defendant to "make all Board minutes <strong>and</strong><br />

related Board documents available in hard copy, <strong>and</strong> electronic database, for review by plaintiff’s<br />

counsel." The magistrate further stated that sanctions would be entered for noncompliance with the<br />

order. After the defendant stated it would not be able to comply with the order because Venezuelan<br />

law prohibited disclosure of the relevant documents, the magistrate entered an adverse inference<br />

instruction. In appealing the magistrate’s decision, the defendant claimed the documents being<br />

withheld were irrelevant to the litigation <strong>and</strong> that the defendant did not possess the requisite<br />

culpable state of mind for such a severe sanction. The court noted the defendant did not provide<br />

precise reasons for refusing to produce the documents <strong>and</strong> did not attempt to narrow the scope of<br />

61


withheld documents. Upholding the magistrate’s adverse inference instruction, the court declared,<br />

“the detrimental effect of [the] defendant’s failure to produce documents on [the] plaintiff is the<br />

same regardless of [the] defendant’s reasons for refusing to produce them.”<br />

� Board of Managers of the Atrium Condo. v. West 79th St. Corp., 17 A.D.3d 108 (N.Y. App. Div.<br />

2005). In a property ownership dispute, the defendant claimed the plaintiff failed to timely serve a<br />

reply to the defendant’s counterclaims. The plaintiff claimed to believe the matter was being held in<br />

abeyance pending ongoing extensive negotiations. Noting the plaintiff’s late reply did not show a<br />

“demonstrable pattern of willful delay,” the court denied the defendant’s request for electronic<br />

discovery of the plaintiff’s attorney’s computers.<br />

� In re Asia Global Crossing, Ltd., 322 B.R. 247 (S.D.N.Y. 2005). In a bankruptcy proceeding,<br />

company officers used the company e-mail system to communicate with their personal attorney.<br />

During discovery, the officers refused to produce these e-mails, withholding on the grounds of the<br />

attorney-client, work product, <strong>and</strong> joint defense privileges. The employer’s trustee moved to compel<br />

production, claiming the officers waived any privileges with regard to the e-mails by using the<br />

corporate e-mail system to draft them. In analyzing whether the attorney-client privilege applied,<br />

the court weighed the following four factors: “(1) whether his employer maintains policy banning<br />

personal or other objectionable use; (2) whether employer monitors use of employee’s computer or<br />

e-mail; (3) whether third parties have right of access to employee’s computer or e-mail; <strong>and</strong> (4)<br />

whether employer notified employee, or whether employee was aware, of any use <strong>and</strong> monitoring<br />

policies.” Noting that “[s]ending a message over the [company’s] e-mail system was like placing a<br />

copy of that message in the company files,” the court nevertheless found the attorney-client<br />

privilege was not waived as a matter of law, because the company’s e-mail policies regarding use<br />

<strong>and</strong> monitoring were unclear. The court also found the work product privilege was not waived<br />

because the parties did not distinguish between opinion <strong>and</strong> non-opinion work product. The court<br />

further noted that the officers may have reasonably believed the e-mails would remain confidential.<br />

� Zubulake v. UBS Warburg LLC, 382 F.Supp.2d 536 (S.D.N.Y. 2005). In the seventh decision<br />

issued in this employment discrimination lawsuit, which has addressed numerous electronic<br />

discovery topics, the defendants moved to preclude various pieces of information from evidence at<br />

trial, including the court’s first five opinions relating to its deficient discovery. The defendants<br />

argued the earlier decisions – which included the court’s award of electronic discovery spoliation<br />

sanctions against the defendants – were irrelevant <strong>and</strong> unfairly prejudicial. The court agreed,<br />

noting “jurors will be told all they need to know through the evidence admitted at trial <strong>and</strong> my<br />

charge.” The defendants also requested preclusion of discovery correspondence among defense<br />

counsel <strong>and</strong> evidence relating to its failure to preserve monthly backup tapes. The court<br />

determined the plaintiff would be allowed to introduce this evidence only if the defendants opened<br />

the door by offering evidence regarding the reasonableness of their actions. Finally, the plaintiff<br />

indicated that she intended to elicit testimony from defendants’ counsel relating to its client’s e-mail<br />

<strong>and</strong> backup tapes preservation practices. The defendants sought preclusion of defense counsel<br />

testimony <strong>and</strong> argued the testimony would be cumulative since the defendants had already<br />

produced information relating to their document retention policy. The court granted the motion,<br />

stating it did “not see any legitimate need plaintiff may have for calling opposing counsel given the<br />

extensive discovery on the issue of e-mail <strong>and</strong> back-up tape preservation <strong>and</strong> retention.”<br />

� Weiller v. New York Life Ins. Co., 2004 WL 3245345 (N.Y. Sup. Ct. Mar. 16, 2005). In a class<br />

action disability insurance coverage lawsuit in New York state court, the plaintiff sought a<br />

stipulation to a state court preservation order based on e-mail destruction in a related federal class<br />

action lawsuit by one of the defendants. See Keir v. UnumProvident, 2003 WL 21997747 (S.D.N.Y.<br />

62


Aug. 22, 2003). Stating the order would be redundant because of the existing federal preservation<br />

orders, the defendants declined to stipulate to the order in state court but acknowledged their<br />

ongoing preservation duties. The defendants also asserted that preserving the computer<br />

information at issue would cost a considerable amount of money. In addressing the motion, the<br />

court noted it was almost a “word-for-word” duplicate of the orders previously issued in the earlier<br />

lawsuits <strong>and</strong> the defendant’s destruction in the current lawsuit was inadvertent. Despite this, the<br />

court granted the motion, finding the federal preservation orders may not be “sufficient protection<br />

for [the] plaintiff in this state action.” Addressing the defendant’s cost concerns, the court indicated<br />

it would entertain cost-shifting but “not constrain the production of possibly relevant evidence on<br />

account of the later need to allocate cost.”<br />

� Lava Trading, Inc. v. Hartford Fire Ins. Co., 2005 WL 459267 (S.D.N.Y. Feb. 24, 2005). In a<br />

breach of contract action, the defendant sought sanctions against the plaintiff for ignoring its<br />

discovery obligations, violating document production orders, <strong>and</strong> irremediably prejudicing the<br />

defendant’s ability to prepare for its case. The defendant claimed that the plaintiff engaged in<br />

partial <strong>and</strong> delayed document production throughout the discovery period, specifically in one<br />

instance producing more than 600 pages of e-mail one day before a scheduled court conference.<br />

In assessing the defendant’s motion, the magistrate judge found no “coherent justification” for the<br />

plaintiff to have “engaged in an excruciatingly slow <strong>and</strong> disjointed disclosure of documents,<br />

stretching over a period of one year, under the guise of a ‘rolling’ production or a production in<br />

‘waves’.” The magistrate further noted the plaintiff should have sought discovery extensions,<br />

produced substantially all of its documents early on, <strong>and</strong> ensured document searches were careful<br />

<strong>and</strong> thorough. The magistrate declined to dismiss the case <strong>and</strong> instead issued a detailed protocol<br />

that outlined remedial discovery measures, including payment of attorney’s fees <strong>and</strong> costs relating<br />

to the motion, preclusion of some evidence, <strong>and</strong> reopening of specified depositions.<br />

� Etzion v. Etzion, 796 N.Y.S.2d 844 (N.Y.Sup. 2005). Claiming the defendant had a history of “past<br />

fraudulent conduct,” the plaintiff, in a divorce proceeding, sought permission for her computer<br />

forensic experts to “impound, clone <strong>and</strong> inspect the computer servers, hard drives, individual<br />

workstation P.C., laptop <strong>and</strong> other items containing digital data” from the defendant. The plaintiff<br />

also requested the defendant pay attorney fees <strong>and</strong> computer forensic expert costs. In response,<br />

the defendant stated the request was overbroad, intrusive <strong>and</strong> burdensome. He also declared he<br />

had no confidence in the plaintiff’s ability to safeguard his data based on the plaintiff’s history of<br />

reckless <strong>and</strong> careless data h<strong>and</strong>ling. The court ordered both parties’ forensic experts, as well as a<br />

court-appointed referee, to meet at the data collection locations. The court ordered that the<br />

plaintiff’s expert would then copy the hard drives <strong>and</strong> immediately turn them over to the referee.<br />

After all of the drives were copied, the experts <strong>and</strong> referee would examine the hard drives <strong>and</strong> both<br />

parties would receive hard copies of relevant business records. The referee would maintain control<br />

over the hard drive images until the case closed. The court also ordered the plaintiff to bear<br />

production costs <strong>and</strong> each party to bear the costs of their own experts.<br />

� United States v. Br<strong>and</strong>, 2005 WL 77055 (S.D.N.Y. Jan 12, 2005). In prosecuting charges against<br />

the defendant for transporting minors for illegal sexual activity, the government claimed the<br />

defendant used America Online instant messaging software in an attempt to engage in sexual<br />

conduct with “Julie,” an undercover government agent posing as a minor. The government sought<br />

to admit two transcripts of AOL internet communications between the defendant <strong>and</strong> two other<br />

undercover agents, who had sent <strong>and</strong> received instant messages from the defendant. The<br />

defendant argued the transcripts should not be admitted as they were irrelevant, unfairly prejudicial<br />

<strong>and</strong> potentially confusing to the jury. The court determined one of the chat transcripts was<br />

63


admissible since it was sufficiently similar to the charged conduct, permitting a reasonable jury to<br />

infer the defendant was motivated by a sexual intent in his interactions with "Julie." The court found<br />

the other chat was not admissible as it was not sufficiently relevant due to its non-sexual subject<br />

matter.<br />

� Streamline Capital, L.L.C. v. Hartford Cas. Ins. Co., 2005 WL 66898 (S.D.N.Y. Jan. 11, 2005).<br />

The defendant moved to compel the production of e-mails, previously withheld by the plaintiff on<br />

the grounds of attorney-client privilege. Prior to this motion, the defendant had filed a motion for<br />

sanctions, claiming key plaintiff witnesses had systematically deleted relevant e-mails. In response,<br />

the court had directed the plaintiffs to consent <strong>and</strong> allow Yahoo <strong>and</strong> Microsoft to release the emails,<br />

deliver them to the plaintiff’s counsel for privilege review, <strong>and</strong> produce the remaining e-mails<br />

to the defendant. See Streamline Capital LLC v. Hartford Cas. Ins. Co., 2004 WL 2663564<br />

(S.D.N.Y. Nov. 19, 2004). In the current motion, the defendant argued the plaintiff waived privilege<br />

by failing to produce its privilege log within the timeframe specified in the scheduling order. The<br />

court determined a waiver was not justified as the plaintiff was not prejudiced by the production of<br />

the log five days late, especially in light of the “expedited nature of the process.” The court also<br />

specifically addressed some of the disputed e-mails. It ordered the plaintiff to reproduce a nonredacted<br />

copy of an e-mail – that had previously been produced in redacted form – finding an<br />

explanation for the redacted copy did not exist. The court also instructed the plaintiff to produce emails<br />

to or from a non-employee, finding insufficient evidence to support the plaintiff’s argument<br />

that the party was acting as its agent. Finally, the court declined to order production of a legal<br />

assistant’s e-mails but required the plaintiff to supply an affidavit confirming the legal assistant’s<br />

role.<br />

� Laurin v. Pokoik, 2004 WL 2724767 (S.D.N.Y. Nov. 30, 2004). In an employment suit, the<br />

defendants referenced an entry the plaintiff allegedly made in a ledger on the defendants’<br />

computer system shortly before they fired the plaintiff. The plaintiff requested the defendants<br />

produce a document showing the “true date when the entry was actually entered into the computer<br />

system.” The court declined to order the production but stated the plaintiff could, at the plaintiff’s<br />

expense, request the court to order the defendants to permit the plaintiff’s computer forensic expert<br />

to examine the computer.<br />

� Lyondell-Citgo Refining, LP v. Petroleos de Venezuela, S.A, 2004 WL 1924810 (S.D.N.Y. Aug.<br />

30, 2004). In a breach of contract action, the plaintiff sought discovery sanctions against the<br />

defendants for failing to produce electronic documents. During the initial discovery conference, the<br />

defendants claimed it could not produce the documents because the attorney general of Venezuela<br />

issued a directive precluding them from producing any electronic discovery. At the conference, the<br />

court issued an order stating it would enter a default judgment for the plaintiff if the defendants did<br />

not produce all responsive electronic documents. When the defendant still did not produce the<br />

documents, the plaintiff sought a default judgment against the defendant for violating the order. In<br />

response, the defendant argued the motion would be premature <strong>and</strong> unwarranted because it had<br />

disclosed the data after the attorney general had granted permission to do so. Stating the<br />

defendant’s production was incomplete, the plaintiff continued to assert its motion for default<br />

judgment. The court denied the motion, determining that the default judgment remedy was<br />

inappropriate because it was aimed at correcting the attorney general’s discovery directive not at<br />

remedying the nature of the defendant’s electronic document production. See also Lyondell-Citgo<br />

Refining, LP v. Petroleos de Venezuela, S.A, 2004 WL 3019767 (S.D.N.Y. Dec. 29, 2004).<br />

� Metropolitan Opera Ass’n, Inc. v. Local 100, 2004 WL 1943099 (S.D.N.Y. Aug. 27, 2004). In a<br />

case involving a labor dispute, the defendants moved for reconsideration of an earlier decision in<br />

64


which the court issued severe sanctions for mish<strong>and</strong>ling <strong>and</strong> deleting electronic data during<br />

discovery. See Metropolitan Opera Assoc., Inc. v. Local 100, 212 F.R.D. 178 (S.D.N.Y. 2003).<br />

Among other things, the defendants argued sanctions were unwarranted because they had initially<br />

produced all relevant documents despite the plaintiff’s contrary arguments. The defendants also<br />

contended that the court could not impose sanctions unless proof existed that the deleted<br />

documents were actually relevant. In response, the court declared it was unknown whether they<br />

actually produced all relevant documents since the defendants had deleted documents. The court<br />

further stated the decision to impose sanctions was not based upon whether the documents were<br />

relevant but, rather, based upon the “vexatious manner” in which the defendants failed to comply<br />

with discovery. In upholding the sanctions award, the court noted the “defendants <strong>and</strong> their counsel<br />

may not engage in parallel know-nothing, do-nothing, head-in-the-s<strong>and</strong> behavior in an effort<br />

consciously to avoid knowledge of or responsibility for their discovery obligations <strong>and</strong> to obstruct<br />

plaintiff’s wholly appropriate efforts to prepare its case.” See also Metropolitan Opera Ass’n, Inc. v.<br />

Local 100, 332 F.Supp.2d 667 (S.D.N.Y. 2004). (In another decision issued in the case on the<br />

same day, the judge refused to recuse herself for remarks about the case made during a<br />

continuing legal education seminar.)<br />

� Fox Indus. v. Gurovich, 2004 WL 2348365 (E.D.N.Y. Aug. 25, 2004). The defendant appealed<br />

two contempt orders issued against him for discovery misconduct, arguing that the magistrate<br />

judge should not have appointed a computer forensic expert to examine his computer without his<br />

attorney present during the examination to shield the expert from looking at personal or privileged<br />

data. In response, the district court declared the defendant had the right to request a protective<br />

order concerning the privileged information, to have his attorney present at the examination, <strong>and</strong> to<br />

have his attorney identify privileged or personal data. However, the court found the defendant’s<br />

objection under the present circumstances unconvincing <strong>and</strong> adopted the magistrate’s order,<br />

noting the defendant’s or his attorney’s “mere assertions that a document or e-mail is personal or<br />

privileged will not suffice to prevent its discovery.”<br />

� Philip Morris USA, Inc. v. Otamedia Ltd., 331 F.Supp.2d 228 (S.D.N.Y. 2004). In a case<br />

involving allegations of trademark infringement <strong>and</strong> unfair competition, the plaintiff accused the<br />

defendant of illegally using the Internet to sell the plaintiff’s br<strong>and</strong> of cigarettes, which was intended<br />

only for sale abroad, to customers in the United States. Arguing the plaintiff’s cigarettes comprised<br />

“merely a fraction” of the products sold, the defendant presented two batches of sales data. The<br />

plaintiff’s computer forensics expert examined the sales data <strong>and</strong> found inconsistencies in<br />

computer programming formulas, individual sales records, <strong>and</strong> customer e-mail confirmations.<br />

After being confronted with the expert’s analysis, the defendant admitted its sales data was<br />

unreliable, <strong>and</strong> likely fraudulent. Finding the defendant’s “supporting testimony <strong>and</strong> data … so<br />

riddled with fabrication <strong>and</strong> deception as to warrant the inference that the truth is the exact<br />

opposite of what [the defendant] contends,” the court ordered the transfer of the defendant’s<br />

domain names to the plaintiff.<br />

� Convolve, Inc. v. Compaq <strong>Computer</strong> Corp., 223 F.R.D. 162 (S.D.N.Y. 2004). In a patent<br />

infringement <strong>and</strong> trade secret theft suit, the plaintiffs requested direct access to all of the<br />

defendants’ hard drives, servers <strong>and</strong> databases. The defendants argued the discovery request was<br />

overbroad because it included more than the products at issue in the suit. Refusing to grant the<br />

plaintiffs’ request for direct access to all of the defendants’ computer systems, the court stated<br />

such a request “would require an expenditure of time <strong>and</strong> resources far out of proportion to the<br />

marginal value of the materials to this litigation.” Alleging discovery misconduct by the defendants,<br />

the plaintiffs also moved for spoliation sanctions against the defendants for failing to preserve e-<br />

65


mails <strong>and</strong> other electronic data relating to the product in dispute. However, the court declined to<br />

award spoliation sanctions because no evidence of intentional destruction of the e-mails existed,<br />

the plaintiffs did not attempt to establish the circumstances under which the e-mails were deleted,<br />

<strong>and</strong> a preservation order was not in place for the other electronic data.<br />

� Lipco Elec. Corp. v. ASG Consulting Corp., 2004 WL 1949062 (N.Y. Sup. Ct. Aug. 18, 2004).<br />

The plaintiffs sought to compel discovery of relevant electronic files, data <strong>and</strong> backup tapes from<br />

the defendants, despite the fact the defendants had already produced hard copies of the electronic<br />

documents at issue. The plaintiff asserted that the only way it could confirm the accuracy of the<br />

hard copy data was by obtaining the raw data in computerized form. In response, the defendants<br />

argued that extraction of the electronic data would be difficult, costly, <strong>and</strong> time-consuming, even if<br />

the requested data was “material <strong>and</strong> necessary” to the action. The defendants claimed they would<br />

need to hire an expert to retrieve the documents because they could not extract the data from hard<br />

drives or backup tapes without assistance. The court noted that, under New York state law, the<br />

party seeking discovery must bear the costs of production. Concluding that the electronic data was<br />

discoverable, the court noted it “need only determine whether the material is discoverable <strong>and</strong><br />

whether the party seeking discovery is willing to bear the cost of production.” The court declared it<br />

was unable to order production of the electronic data until the plaintiffs established they would bear<br />

production costs. The court ordered the parties to supply a detailed breakdown of the electronic<br />

data’s location, procedures used to extract it, <strong>and</strong> the costs involved. Noting that “[d]iscovery has<br />

been proceeding at a snails pace, if at all,” the court also appointed a special referee to manage,<br />

arrange, <strong>and</strong> monitor the e-discovery progress.<br />

� Securities <strong>and</strong> Exch. Comm’n v. Beacon Hill Asset Management LLC, 231 F.R.D. 134<br />

(S.D.N.Y. 2004). Alleging various violations of the Securities Exchange Act, the SEC moved to<br />

compel production of numerous electronic documents previously withheld on the grounds of<br />

attorney-client <strong>and</strong> work-product privilege. Among the documents requested by the SEC were files<br />

attached to privileged e-mails. The defendant claimed the attachments were drafts of attorney<br />

comments <strong>and</strong> need not be produced. Ordering the defendant to produce the attachments, the<br />

court declared the defendant had not identified which documents fell within the privilege. The<br />

defendant also protested production of a computer-created “Contact <strong>List</strong>” as it had not been<br />

identified as privileged until three weeks after the privilege index deadline. The defendant claimed<br />

the list did not “exist” because it had not been printed to paper until three weeks after the deadline<br />

for producing privileged document indexes. The court rejected this argument as frivolous, asserting<br />

that Fed.R.Civ.P. 34(a) has included electronic data as being part of a Rule 34 request for more<br />

than 30 years. The court declared, “[t]he fact that the data has not been printed out does not mean<br />

that the document does not exist … [otherwise] any party could avoid producing damaging<br />

documents through the simple expedient of storing them on electronic media <strong>and</strong> never printing<br />

them out.”<br />

� Creditriskmonitor.com, Inc. v. Fensterstock, No. 006211/2001 (N.Y. Sup. Ct. Aug. 6, 2004).<br />

Alleging that a former employee stole a customer list <strong>and</strong> other confidential information, the plaintiff<br />

brought charges against the former employee <strong>and</strong> his new company for violating a non-compete<br />

clause. In a court-ordered settlement, the defendants stated that they did not possess the plaintiff’s<br />

customer list or any other confidential information, agreed that the former employee would refrain<br />

from working for the defendant for a period of time, <strong>and</strong> confirmed that they would not solicit any of<br />

the plaintiff’s customers. Several months after the court ordered settlement, the plaintiff filed a<br />

contempt proceeding against the defendant for violating the agreement by possessing the plaintiff’s<br />

customer list, working with the former employee, <strong>and</strong> soliciting the plaintiff’s customers. The court<br />

66


ordered a computer forensics examination of the defendants’ computers, resulting in the discovery<br />

of hundreds of e-mails <strong>and</strong> other relevant documents, including the customer list <strong>and</strong> other various<br />

e-mails from the former employee to many of the defendant’s employees. Finding the defendants<br />

violated the settlement order, the court stated that the defendants “acted willfully <strong>and</strong> in some<br />

cases maliciously in violating the Order…perhaps the best description of [their] acts…would be<br />

‘reckless indifference’ which has been found to be equivalent to willfulness…To put it bluntly they<br />

just didn’t care about the Order." The court awarded $820,000 in compensatory <strong>and</strong> punitive<br />

damages, as well as legal fees <strong>and</strong> costs.<br />

� Zubulake v. UBS Warburg, 229 F.R.D. 422 (S.D.N.Y. 2004). During an ongoing discovery dispute<br />

in an employment discrimination case, the employee moved for sanctions against the employer for<br />

failing to produce backup tapes containing relevant e-mails <strong>and</strong> for failing to produce other relevant<br />

documents in a timely manner. See Zubulake v. UBS Warburg, 220 F.R.D. 212 (S.D.N.Y. 2003). In<br />

this latest motion, the employee contended that the employer, who recovered some of the deleted<br />

relevant e-mails, prejudiced her case by producing recovered e-mails long after the initial<br />

document requests. Furthermore, some of the e-mails were never produced, including an e-mail<br />

that pertained to a relevant conversation about the employee. As such, the employee requested<br />

sanctions in the form of an adverse inference jury instruction. Determining that the employer had<br />

willfully deleted relevant e-mails despite contrary court orders, the court granted the motion for<br />

sanctions <strong>and</strong> also ordered the employer to pay costs. The court further noted that defense<br />

counsel was partly to blame for the document destruction because it had failed in its duty to locate<br />

relevant information, to preserve that information, <strong>and</strong> to timely produce that information. In<br />

addressing the role of counsel in litigation generally, the court stated that "[c]ounsel must take<br />

affirmative steps to monitor compliance so that all sources of discoverable information are<br />

identified <strong>and</strong> searched." Specifically, the court concluded that attorneys are obligated to ensure all<br />

relevant documents are discovered, retained, <strong>and</strong> produced. Additionally, the court declared that<br />

litigators must guarantee that identified relevant documents are preserved by placing a “litigation<br />

hold” on the documents, communicating the need to preserve them, <strong>and</strong> arranging for<br />

safeguarding of relevant archival media. See also Zubulake v. UBS Warburg, LLC, 231 F.R.D. 159<br />

(S.D.N.Y. 2005) (Denying employer’s motion to assert an affirmative defense based on the delay in<br />

asserting the defense <strong>and</strong> the prejudicial effects it would cause the employee in re-opening<br />

discovery.)<br />

� Cellco Partnership v. Nextel Communication, Inc., 2004 WL 1542259 (S.D.N.Y. July 9, 2004).<br />

Responding to a motion to compel the production of documents in a case arising from a trademark<br />

disagreement, the defendant withheld production of eight e-mails. The defendant claimed that<br />

seven of the e-mails were protected by the attorney-client privilege doctrine. Six of these e-mails<br />

contained advice given to the defendant’s employee from the defendant’s in-house counsel, <strong>and</strong><br />

the seventh e-mail contained legal advice from the defendant’s in-house counsel to one of the<br />

defendant’s employees as well as to an advertising agency. Granting the plaintiff’s motion to<br />

compel the 7 e-mails, the court determined that the e-mails were not attorney client privileged<br />

because the “agency failed to demonstrate that it intended for the in-house counsel ‘to act as its<br />

attorney’.” The defendant also disputed production of an e-mail from one of its employees to the<br />

agency, claiming it was protected under the work-product doctrine. The court determined that this<br />

e-mail was protected because the advice contained in the e-mail was given in anticipation of a<br />

previous lawsuit involving the defendant.<br />

� MasterCard Int’l, Inc. v. Moulton, 2004 WL 1393992 (S.D.N.Y. June 22, 2004). Asserting a<br />

copyright infringement claim against the operators of a pornographic website, the plaintiff sought<br />

67


spoliation sanctions against the defendant for failing to produce all e-mails relating to the website.<br />

In response, the defendants admitted that they failed to retain four months worth of e-mails sent<br />

<strong>and</strong> received after the plaintiff filed the lawsuit. The defendants argued that no effort was made to<br />

print or to save the e-mails before they were automatically destroyed by the computer server<br />

because such e-mails were not preserved in its ordinary course of business. Rejecting this<br />

argument, the court sanctioned the defendants by granting an adverse inference jury instruction<br />

stating that “the very fact that the e-mails are missing leaves us in the realm of speculation as to<br />

what they contained <strong>and</strong> in what manner they might have assisted plaintiff in litigating claims.”<br />

� Zakre v. Norddeutsche L<strong>and</strong>esbank Girozentrale, 2004 WL 764895 (S.D.N.Y. Apr. 9, 2004).<br />

The plaintiff moved to compel further discovery of two compact disks. One of the disks included<br />

over 200,000 e-mails, <strong>and</strong> the other disk contained over 4,000 offline e-mails. Although the<br />

defendant had already searched the disks for privileged e-mails, it had not reviewed them for<br />

responsiveness to the plaintiff’s specific document requests. The plaintiff argued that the defendant<br />

did not satisfy its burden of production under Rule 34(b), which requires a responding party to<br />

produce documents “as they are kept in the usual course of business.” The defendant responded<br />

that it had satisfied this burden by providing all of the e-mails in a text searchable format, which<br />

allowed the plaintiff to search for single words or phrases or combinations of words or phrases. The<br />

court accepted the defendant’s argument <strong>and</strong> determined the defendant was not obligated to<br />

provide more than the text searchable compact disks.<br />

� Ermolaou v. Flipside, Inc., 2004 WL 503758 (S.D.N.Y. Mar. 15, 2004). The defendant, an<br />

operator of an internet lottery game, moved for summary judgment on a breach of contract claim<br />

filed by a lottery player. Contending that a genuine issue of material fact existed, the plaintiff<br />

argued that there was a dispute about the creation, transmission, <strong>and</strong> receipt of two notification emails<br />

sent to her by the defendant. In support of her argument, the plaintiff submitted affidavits <strong>and</strong><br />

documents that attempted to show a conflicting record regarding the date <strong>and</strong> time stamping<br />

procedures for the e-mails. The defendant contended that the notification e-mail received by the<br />

plaintiff had no relation to the official winning numbers because the e-mail time stamp showed that<br />

it had been sent several hours before the defendant selected the winning lottery numbers. In<br />

granting summary judgment for the defendant, the court noted that even if it were “correct that all<br />

e-mail received by her bears the date <strong>and</strong> time it is received by her e-mail account…that fact would<br />

undermine her case rather than [support] it.”<br />

� Invision Media Communications, Inc. v. Federal Ins. Co., 2004 WL 396037 (S.D.N.Y. Mar. 2,<br />

2004). In an action for breach of an insurance contract, the defendant moved to compel production<br />

of documents <strong>and</strong> requested monetary sanctions, contending that the plaintiff made false<br />

statements regarding the location <strong>and</strong> existence of its documents <strong>and</strong> destroyed evidence relevant<br />

to the lawsuit. Among the documents requested by the defendant were e-mail communications<br />

sent by the plaintiff. Specifically, the defendant sought “All electronic mail communications sent or<br />

received by the plaintiffs during August 2001, September 2001 <strong>and</strong> October 2001.” The plaintiff<br />

represented to the defendant that the e-mails could not be produced because the plaintiff archived<br />

e-mail on its servers for only a two week period. The court found these statements false because<br />

the plaintiff eventually disclosed the requested e-mails after further investigation. Accordingly, the<br />

court awarded the defendant costs <strong>and</strong> attorneys fees, noting that “[a] reasonable inquiry by the<br />

plaintiff’s counsel…would have alerted counsel that the plaintiff possessed electronic mail that fell<br />

within the scope of Federal’s document request…the plaintiff has disregarded its discovery<br />

obligations, made misleading statements regarding the existence <strong>and</strong> location of relevant<br />

68


evidence, <strong>and</strong>/or failed to make reasonable inquiries into matters pertinent to the pretrial discovery<br />

phase of this litigation.”<br />

� Baptiste v. Cushman & Wakefield, Inc., 2004 WL 330235 (S.D.N.Y. Feb. 20, 2004). In an<br />

employment discrimination lawsuit, the court addressed the issue of whether an e-mail was<br />

protected by the attorney-client privilege. The e-mail contained advice from the defendant’s<br />

counsel regarding legal matters concerning the plaintiff, one of the defendant’s employees at the<br />

time. The plaintiff, who claimed that a printed copy of the e-mail was left anonymously on her desk,<br />

argued that the e-mail was not protected by the attorney-client privilege because it was not labeled<br />

as protected, was not authored or circulated to attorneys, <strong>and</strong> did not refer to or contain legal<br />

advice. The plaintiff further argued that in the event the e-mail was privileged, it was inadvertently<br />

produced, thus waiving any of the defendant’s attorney-client privilege claims. The court<br />

determined that the first four paragraphs of the e-mail were protected by the attorney-client<br />

privilege because “the e-mail was clearly conveying information <strong>and</strong> advice given . . . by . . .<br />

outside counsel.” However, the court concluded that the final paragraph of the e-mail was not<br />

protected because it contained the defendant’s own impressions <strong>and</strong> frustrations about the<br />

plaintiff’s job performance. Finally, the court decided that the defendant did not waive the attorneyclient<br />

privilege with respect to the first four paragraphs of the e-mail. In response to the plaintiff’s<br />

requests, the defendant did not produce the e-mail <strong>and</strong> the defendant further identified the e-mail<br />

as privileged attorney-client information in the privilege log submitted to the plaintiff’s counsel. As<br />

such, the court ordered that the original e-mail should be returned to the defendant <strong>and</strong> reproduced<br />

in a redacted form to the plaintiff.<br />

� In re Merrill Lynch & Co., Inc. Research Reports Sec. Litig., 2004 WL 305601 (S.D.N.Y Feb.<br />

18, 2004). Pursuant to a section of the Securities Exchange Act of 1934, the plaintiff sought an<br />

order lifting the automatic stay of discovery during the pendency of a motion to dismiss. The<br />

plaintiff contended that discovery was necessary to preserve <strong>and</strong> restore e-mails deleted by the<br />

defendant. The court cited U.S. Code provisions permitting discovery when the legal sufficiency of<br />

the complaint has not been decided “only if exceptional circumstances, such as the necessity ‘to<br />

preserve evidence or to prevent undue prejudice to [a] party,’ exist.” The defendant declared that it<br />

was aware of the preservation obligations <strong>and</strong> was taking all necessary steps to preserve all<br />

potentially relevant electronic documents. Therefore, the court denied the plaintiff’s motion because<br />

the plaintiff failed to establish an “imminent risk” of data being deleted <strong>and</strong> rendered irretrievable.<br />

� In re Honeywell Int’l Sec. Litig., 2003 WL 22722961 (S.D.N.Y. Nov. 18, 2003). In response to a<br />

subpoena, the defendant’s financial auditor, a non-party to the securities suit, produced several<br />

thous<strong>and</strong> documents in hardcopy. The plaintiffs complained that they were unable to review the<br />

documents <strong>and</strong> sought an electronic version of these documents, or alternatively a complete<br />

hardcopy set produced in the order they are kept in the ordinary course of business, specifically<br />

claiming that the documents were produced in a way that makes it impossible to determine which<br />

attachment belongs with a particular document. The auditor claimed that it had provided a<br />

complete index for the documents <strong>and</strong> attachments <strong>and</strong> that electronic copies were only accessible<br />

with the aid of its proprietary software. The court found that the auditor’s production was insufficient<br />

because it was not produced as kept in the usual course of business <strong>and</strong> ordered the auditor to<br />

produce its documents in electronic form.<br />

� United States v. Stewart, 287 F. Supp. 2d 461 (S.D.N.Y. 2003). The defendant prepared an email<br />

in response to her attorneys’ requests for factual information in the furtherance of their legal<br />

representation. A day later, the defendant accessed the e-mail <strong>and</strong> forwarded it to her daughter.<br />

69


The court held that the e-mail was protected work product <strong>and</strong> that the defendant did not waive its<br />

immunity by forwarding the document to her daughter.<br />

� Xpedior Credit Trust v. Credit Suisse First Boston, 2003 WL 22283835 (S.D. N.Y. Oct. 2,<br />

2003). The plaintiff moved for an order to compel the defendant to produce certain electronic<br />

documents in connection with the breach of contract action. The defendant countered with a<br />

motion for a protective order requiring the plaintiff to bear half the costs of producing the electronic<br />

documents. The documents at issue reside on optical disks <strong>and</strong> DLT tapes. Applying the Zubulake<br />

seven factor cost shifting test, the court found that cost shifting was not appropriate <strong>and</strong> ordered<br />

the defendant to bear its own costs in producing the electronic data.<br />

� United States v. Rigas, 281 F. Supp. 2d 733 (S.D.N.Y. 2003). The government in a bank fraud,<br />

wire fraud, <strong>and</strong> securities fraud case issued gr<strong>and</strong> jury subpoenas to several executives <strong>and</strong> topemployees<br />

in the company, Adelphia Communications Corporation, being investigated. Adelphia<br />

produced copies of 26 computer hard drives in response to the subpoenas. The Assistant United<br />

States Attorneys assigned to the matter directed their staff to install the hard drives in certain<br />

computer terminals belonging to the United States Attorney’s Office (“USAO”) so that the data<br />

could be reviewed. The staff informed was informed that the hard drives “were evidence” <strong>and</strong><br />

should be installed in such a way as to prevent additions to or deletions from those drives. Shortly<br />

thereafter, the computer consultant hired by defense counsel was permitted to make copies of the<br />

hard drives in question at the main USAO office. In the course of reviewing the images, defense<br />

counsel’s computer expert determined that several USAO confidential files associated with the<br />

case at issue as well as other pending cases were produced during the imaging. The defendants<br />

argued that the Government waived its work product privilege when it voluntarily permitted defense<br />

counsel to copy the hard drives. The Government contended that disclosure of USAO files was<br />

inadvertent <strong>and</strong> therefore did not constitute waiver of the privilege. The court used a four part<br />

balancing test to determine that no waiver of privilege had occurred.<br />

� Keir v. UnumProvident, 2003 WL 21997747 (S.D.N.Y. Aug. 22, 2003). In an ERISA class action<br />

suit, the plaintiffs sought an order from the court directing the defendant to preserve all electronic<br />

evidence relevant to the matter. After noting that the defendant “already had a duty to preserve any<br />

tapes containing e-mails as of the date litigation commenced,” the court ordered the defendant to<br />

preserve all relevant electronic data <strong>and</strong> to specifically preserve six days of e-mail records which<br />

were contained on backup tapes <strong>and</strong> hard drives. Instead of preserving all existing backups, or<br />

conducting a full tape e-mail backup, the defendant’s technical staff decided to implement a special<br />

snapshot backup which would only preserve e-mails on the system as of the day or days the<br />

snapshot was taken. In evaluating the defendant’s conduct with respect to the preservation order,<br />

the court stated that “UnumProvident had ample time in the weeks before the December 27<br />

[preservation] Order was signed to consult with its IT Department <strong>and</strong> with IBM to inform itself<br />

about the technological issues relevant to the preservation of electronic data so that it could bring<br />

accurate information to the negotiations of the preservation order <strong>and</strong> the conferences with the<br />

court in which the December 27 Order was shaped, <strong>and</strong> comply promptly with the Order after it<br />

was issued.” The court found the defendant’s failure to preserve was unintentional <strong>and</strong> criticized<br />

the defendant’s poor compliance with the preservation order. The court recommended that further<br />

action be taken to determine the feasibility of retrieving the lost data <strong>and</strong> the extent of prejudice to<br />

the plaintiffs in order for the court to fashion a remedy for the plaintiffs.<br />

� The Carlton Group v. Tobin, 2003 WL 21782650 (S.D.N.Y. July 31, 2003). The plaintiff, a<br />

financial services company, brought suit against several defendants claiming that the defendants<br />

deleted files from the plaintiff’s computers, conspired to steal confidential <strong>and</strong> proprietary<br />

70


information from its computer network, <strong>and</strong> used that information to compete unlawfully with the<br />

plaintiff. One group of defendants, Mission Capital, is a company that competes directly with the<br />

plaintiff’s company, <strong>and</strong> the individual Mission Capital defendants were formerly employed by the<br />

plaintiff. The other group of defendants, PDP Capital, is an investment advisor <strong>and</strong> fund<br />

management company <strong>and</strong> does not compete with the plaintiff or Mission Capital. All parties in the<br />

suit maintain offices in the same business suite, <strong>and</strong> all tenants of this office suite share a<br />

communication switch <strong>and</strong> data transmission line which connect the tenants’ computers to the<br />

Internet. As such, all the computers in the suite constitute a network, although the tenants do not<br />

have access to each other’s computers. PDP defendants sought Rule 11 sanctions against the<br />

plaintiff <strong>and</strong> plaintiff’s counsel for filing suit against them lacking in evidentiary support. The plaintiff<br />

maintains that its allegations against PDP were objectively reasonable based upon information<br />

from computer forensic experts that PDP had deliberately established a link between computer<br />

systems to move data back <strong>and</strong> forth between the plaintiff’s computer network <strong>and</strong> the PDP<br />

computer. Denying the PDP defendants’ motion for Rule 11 sanctions, the court held that the<br />

plaintiff made a substantial pre-filing inquiry that gave them a reasonable basis for believing that<br />

PDP defendants conspired with the Mission defendants.<br />

� Zubulake v. UBS Warburg, 217 F.R.D. 309 (S.D.N.Y. 2003). In a gender discrimination suit<br />

against her former employer, the plaintiff requested that the defendant produce “[a]ll documents<br />

concerning any communication by or between UBS employees concerning the plaintiff.” The<br />

defendant produced 350 pages of documents, including approximately 100 pages of e-mail. The<br />

plaintiff knew that additional responsive e-mail existed that the defendant had failed to produce<br />

because she, in fact, had produced approximately 450 pages of e-mail correspondence. She<br />

requested that the defendants produce the e-mail from archival media. Claiming undue burden <strong>and</strong><br />

expense, the defendant urged the court to shift the cost of production to the plaintiff, citing the<br />

Rowe decision. Stating that a court should consider cost-shifting only when electronic data is<br />

relatively inaccessible (such as in this case), the court considered the Rowe 8-factor cost shifting<br />

test. The court noted that the application of the Rowe factors may result in disproportionate cost<br />

shifting away from large defendants, <strong>and</strong> the court modified the test to 7 factors: (1) the extent to<br />

which the request is specifically tailored to discover relevant information; (2) the availability of such<br />

information from other sources; (3) the total cost of production compared to the amount in<br />

controversy; (4) the total cost of production compared to the resources available to each party; (5)<br />

the relative ability of each party to control costs <strong>and</strong> its incentive to do so; (6) the importance of the<br />

issue at stake in the litigation <strong>and</strong>; (7) the relative benefits to the parties of obtaining the<br />

information. The court ordered the defendant to produce, at its own expense, all responsive e-mail<br />

existing on its optical disks, active servers, <strong>and</strong> five backup tapes as selected by the plaintiff. The<br />

court determined that only after the contents of the backup tapes are reviewed <strong>and</strong> the defendant’s<br />

costs are quantified, the court will conduct the appropriate cost-shifting analysis. See also<br />

Zubulake v. UBS Warburg, 216 F.R.D. 280 (S.D.N.Y. 2003).<br />

� Zubulake v. UBS Warburg, 220 F.R.D. 212 (S.D.N.Y. 2003). In the restoration effort that occurred<br />

according to previous e-discovery decisions in the matter, the parties discovered that certain<br />

backup tapes were missing <strong>and</strong> that e-mails had been deleted. The plaintiff moved for evidentiary<br />

<strong>and</strong> monetary sanctions against the defendant for its failure to preserve the missing tapes <strong>and</strong> emails.<br />

The court found that the defendant had a duty to preserve the missing evidence, since it<br />

should have known that the e-mails may be relevant to future litigation. Although the plaintiff did not<br />

file her charges until August 2001, by April of that year, "almost everyone associated with Zubulake<br />

recognized the possibility that she might sue," the court wrote. The court also found that the<br />

71


defendant failed to comply with its own retention policy, which would have preserved the missing<br />

evidence. The judge found that although the defendant had a duty to preserve all of the backup<br />

tapes at issue, <strong>and</strong> destroyed them with the requisite culpability, the plaintiff could not demonstrate<br />

that the lost evidence would have supported her claims. Therefore, it was inappropriate to give an<br />

adverse inference instruction to the jury. Even though an adverse inference instruction was not<br />

warranted, the court ordered the defendant to bear the plaintiff’s costs for re-deposing certain<br />

witnesses for the limited purpose of inquiring into the destruction of electronic evidence <strong>and</strong> any<br />

newly discovered e-mails.<br />

� RLS v. United Bank of Kuwait, 2003 WL 1563330 (S.D.N.Y. Mar. 26, 2003). In a contract dispute<br />

arising from the defendant’s alleged failure to pay the plaintiff commissions due under the terms of<br />

written consulting agreements, the court concluded that the defendant did not meet its burden of<br />

demonstrating that two e-mails were subject to privilege protection under the common interest rule.<br />

� Metropolitan Opera Assoc., Inc. v. Local 100, 212 F.R.D. 178 (S.D.N.Y. 2003). In a labor<br />

dispute, the defendants failed to comply with discovery rules, specifically failing to search for,<br />

preserve, or produce electronic documents. The court stated “[C]ounsel (1) never gave adequate<br />

instructions to their clients about the clients’ overall discovery obligations, what constitutes a<br />

‘document’…; (2) knew the Union to have no document retention or filing systems <strong>and</strong> yet never<br />

implemented a systematic procedure for document production or for retention of documents,<br />

including electronic documents; (3) delegated document production to a layperson who (at least<br />

until July 2001) did not even underst<strong>and</strong> himself (<strong>and</strong> was not instructed by counsel) that a<br />

document included a draft or other non-identical copy, a computer file <strong>and</strong> an e-mail; (4) never<br />

went back to the layperson designated to assure that he had ‘establish[ed] a coherent <strong>and</strong> effective<br />

system to faithfully <strong>and</strong> effectively respond to discovery requests,’…<strong>and</strong> (5) in the face of the Met’s<br />

persistent questioning <strong>and</strong> showings that the production was faulty <strong>and</strong> incomplete, ridiculed the<br />

inquiries, failed to take any action to remedy the situation or supplement the demonstrably false<br />

responses, failed to ask important witnesses for documents until the night before their depositions<br />

<strong>and</strong>, instead, made repeated, baseless representations that all documents had been produced.”<br />

The court granted severe sanctions, finding liability on the part of the defendants <strong>and</strong> ordering the<br />

defendants to pay the plaintiff’s attorneys’ fees necessitated by the discovery abuse by the<br />

defendants <strong>and</strong> their counsel. The court found that lesser sanctions, such as an adverse inference<br />

or preclusion, would not be effective in this case “because it is impossible to know what the Met<br />

would have found if the Union <strong>and</strong> its counsel had complied with their discovery obligations from<br />

the commencement of the action.”<br />

� People v. Carratu, 755 N.Y.S.2d 800 (N.Y. Sup. Ct. 2003). The defendant moved to suppress<br />

computer evidence seized from his home <strong>and</strong> subsequently searched by the police department’s<br />

computer forensic examiners. The defendant claimed that the search warrants <strong>and</strong> supporting<br />

affidavits limited the search to documentary evidence relating to his illegal cable box operation <strong>and</strong><br />

thus, the forensic examiner violated the defendant’s Fourth Amendment rights upon inspection of<br />

non-textual files with folder names clearly relating to other illegal activity. Granting the suppression<br />

motion, in part, the court stated, “In view of the Fourth Amendment’s ‘particularity requirement,’ a<br />

warrant authorizing a search of the text files of a computer for documentary evidence pertaining to<br />

a specific crime will not authorize a search of image files containing evidence of other criminal<br />

activity.”<br />

� In re Livent, Inc. Noteholders Sec. Litig., 222 F.R.D. 29 (S.D.N.Y. 2003). In a securities litigation,<br />

the defendant accounting firm produced approximately 25 e-mail pages from the files of a particular<br />

individual at issue, in addition to 14 e-mails from other employees. The plaintiffs suspected this<br />

72


production was incomplete, <strong>and</strong> moved the court for: (1) an order "directing Deloitte to make a<br />

thorough search of all its computer systems, servers <strong>and</strong> other storage devices, back-up tapes,<br />

<strong>and</strong> the individual hard drives of employees who worked on the Livent audits" <strong>and</strong> (2) an order<br />

directing the defendant "to produce all responsive materials found within 30 days, along with a<br />

written explanation of all the steps it has taken to find responsive materials." The court denied the<br />

plaintiffs request <strong>and</strong> directed the defendant to produce a written explanation of all steps taken to<br />

find responsive e-mail. The court directed the parties to consult the Rowe decision <strong>and</strong>, if unable to<br />

reach resolution, to inform the court.<br />

� United States v. Holihan, 236 F. Supp.2d 255 (W.D.N.Y. 2002). The defendant, who was charged<br />

with embezzling bank funds, moved for the production or, alternatively, the suppression of<br />

electronic evidence allegedly withheld by the government. Among other things, the defendant<br />

requested a history of the bank’s computer terminal “sign on” <strong>and</strong> “sign off” times, as well as daily<br />

logs of on-line computer entries. In response to the request, the government contended that it had<br />

fully complied with discovery <strong>and</strong> that the documents requested by the plaintiff were not in the<br />

government’s possession. Although the government stated that it would attempt to locate the<br />

documents by inquiring with the relevant agency or the bank, it failed to demonstrate that it had<br />

done so. As such, the court granted the defendant’s motion to compel the production of documents<br />

that the government could obtain upon a diligent inquiry of the appropriate agency or the bank.<br />

� J.P. Morgan Chase Bank v. Liberty Mutual Ins., 2002 WL 31867731 (S.D.N.Y. Dec. 23, 2002).<br />

In a suit against insurance companies that had guaranteed payment in the event of Enron’s<br />

bankruptcy, the court weighed the admissibility of several e-mails. The court determined that emails<br />

authored by senior bank officials would be allowed into evidence <strong>and</strong> that a reasonable juror<br />

could find these e-mails probative of the defendants’ central proposition that the transactions were<br />

actually uninsurable “off-the-books” loans.<br />

� Gambale v. Deutsche Bank, 2002 WL 31655326 (S.D.N.Y. Nov. 21, 2002). As a step toward<br />

resolving several discovery disputes, the Magistrate Judge ordered the defendants to serve an<br />

affidavit explaining the steps they have taken to search their paper <strong>and</strong> electronic files for<br />

documents responsive to the plaintiff’s discovery requests <strong>and</strong> outlining the feasibility <strong>and</strong> cost of<br />

retrieving such electronic documents. The Magistrate then stated that the plaintiff must choose<br />

between two options for producing the electronic data: (1) follow the protocol set forth in Rowe<br />

Entertainment v. William Morris Agency,H 205 F.R.D. 421 (S.D.N.Y.2002)H, with the slight<br />

modification set forth in Murphy Oil USA, Inc. v. Fluor Daniel, Inc.,H 2002 WL 246439 (E.D.La.<br />

Feb. 19, 2002)H, or (2) confer with the defendant <strong>and</strong> propose a joint protocol.<br />

� Kormendi v. <strong>Computer</strong> Associates Int’l, Inc., 2002 WL 31385832 (S.D.N.Y. Oct. 21, 2002). The<br />

parties in this employment case jointly wrote the Magistrate, requesting reconsideration <strong>and</strong><br />

clarification of a prior order. The court previously had ordered the defendant to produce all e-mail<br />

messages mentioning the plaintiff over a one-year time period, with the plaintiff to pay for the cost<br />

of the search. In the letter to the Magistrate, the defendant stated that it had already produced the<br />

e-mails from persons involved in the suit <strong>and</strong> had no method to locate <strong>and</strong> reconstruct e-mails<br />

mentioning the plaintiff for the listed period because its document retention policy called for<br />

employees to retain e-mails for a period of only thirty days. The Magistrate noted that the plaintiff<br />

should seek other means of attaining the sought after e-mails, such as searching the computers of<br />

other employees who might have saved the e-mails. The plaintiff must still bear the cost of<br />

searching for these e-mails.<br />

� United States v. Al-Marri, 230 F. Supp. 2d 535 (S.D.N.Y. 2002). In the wake of the September<br />

11th attacks, the FBI visited the defendant’s home perusing tips of the defendant’s allegedly<br />

73


suspicious activity. The FBI agents obtained the defendant’s consent to search his home <strong>and</strong>, with<br />

his affirmative consent <strong>and</strong> cooperation, seized his laptop computer, disks, <strong>and</strong> CDs for further<br />

investigation. Investigation of the computer hardware revealed evidence of credit card fraud. The<br />

defendant moved to suppress the computer evidence, arguing that even if he validly consented to<br />

a search of his home, that consent did not encompass the contents of his computer. The court<br />

denied the motion to suppress <strong>and</strong> ruled that the FBI’s lawful search of the defendant’s home<br />

encompassed the right to search the computer as a closed container.<br />

� Jones v. Goord, 2002 WL 1007614 (S.D.N.Y. May 16, 2002). The plaintiffs, prison inmates<br />

bringing suit against the New York State Corrections Commission for prison overcrowding,<br />

requested the production of six different electronic databases maintained by the New York state<br />

prison system. The plaintiffs claimed that the electronic information would be more valuable than<br />

the already produced hard copies because the information would be more manipulable. The court<br />

refused to compel discovery of the databases because the burden of the proposed discovery<br />

outweighed its likely benefit, particularly in light of the plaintiffs failure to seek discovery in a timelier<br />

manner <strong>and</strong> the vast amount of material that had already been produced in hard copy. The court<br />

stated, “As electronic mechanisms for storing <strong>and</strong> retrieving data have become more common, it<br />

has increasingly behooved courts <strong>and</strong> counsel to become familiar with such methods, <strong>and</strong> to<br />

develop expertise <strong>and</strong> procedures for incorporating ‘electronic discovery’ into the familiar rituals of<br />

litigation.”<br />

� eSpeed, Inc. v. Chicago Board of Trade, 2002 WL 827099 (S.D.N.Y. May 1, 2002). Cantor<br />

Fitzgerald, a third party <strong>and</strong> partial owner of the plaintiff, asserted the attorney-client privilege with<br />

respect to a series of e-mails <strong>and</strong> attachments addressing a patent purchase negotiation. These emails<br />

<strong>and</strong> attachments were sent by an outside attorney to an employee of Cantor Fitzgerald. The<br />

court examined the e-mails <strong>and</strong> attachments in camera <strong>and</strong> ordered production finding that the<br />

messages <strong>and</strong> documents did not contain client confidences <strong>and</strong> were not privileged.<br />

� Collette v. St. Luke’s Roosevelt Hospital, 2002 WL 31159103 (S.D.N.Y. Sept. 26, 2002). The<br />

New York court mentioned without further comment that e-mails were made available during<br />

discovery, confirming the general discoverability of e-mail evidence.<br />

� Rowe Entertainment, Inc. v. The William Morris Agency, 205 F.R.D. 421 (S.D.N.Y. 2002).<br />

Denying the defendants’ motion for a protective order insofar as it sought to preclude the discovery<br />

of e-mail altogether, the court set forth a procedure for identifying responsive e-mails while<br />

protecting privileged documents. The court also adopted a balancing approach, consisting of eight<br />

factors, to determine whether discovery costs should be shifted. See also Rowe Entertainment, Inc.<br />

v. The William Morris Agency, 2002 WL 975713 (S.D.N.Y. May 9, 2002). After reanalyzing <strong>and</strong><br />

reaffirming Judge Francis’ eight factor balancing test, the court upheld the January 15, 2002 Order<br />

that granted the defendants motion to shift the costs of production of their e-mail communications<br />

to the plaintiffs.<br />

� United States Fidelity & Guaranty Co. v. Braspetro Oil Servs. Co., 2002 WL 15652 (S.D.N.Y.<br />

Jan. 7, 2002). In a discovery dispute concerning the potential waiver of privilege with respect to<br />

materials provided to the defendants’ expert witnesses, the court ordered the defendants to<br />

produce all materials provided to their experts – privileged or unprivileged, whether in paper or<br />

electronic form.<br />

� In re the Matter of the Application of Lees, 727 N.Y.S.2d 254 (N.Y. Sup. Ct. 2001). A rape<br />

defendant submitted an ex parte motion asking that the victim <strong>and</strong> a third party be ordered to turn<br />

over their computers for inspection. The defendant sought to uncover an e-mail in which the victim<br />

74


falsely claimed to have been raped on a prior occasion. The application of the defendant was<br />

granted to the extent that he could show cause to the court.<br />

� Long Isl<strong>and</strong> Diagnostic Imaging v. Stony Brook Diagnostic Assocs., 286 A.D.2d 320 (N.Y.<br />

App. Div. 2001). Where the defendants purged their computer databases against court order <strong>and</strong><br />

produced compromised <strong>and</strong> unusable backup tapes, the court dismissed the parties’ counterclaims<br />

<strong>and</strong> third-party complaint as spoliation sanctions. The court stated “The striking of a party’s<br />

pleading is a proper sanction for a party who spoliates evidence.”<br />

� People v. Markowitz, 721 N.Y.S.2d 758 (N.Y. Sup. Ct. 2001). In a larceny <strong>and</strong> possession of<br />

stolen property suit, the court admitted computer databases that indicated how much money<br />

should have been collected by the defendant toll-booth worker. The testimony of an employee of<br />

the company that prepared the databases was sufficient foundation for admission of the electronic<br />

records.<br />

� GTFM, Inc., v. Wal-Mart Stores, 2000 WL 1693615 (S.D.N.Y. Nov. 9, 2000). The court allowed<br />

the plaintiff to recover fees for the inspection of Wal-Mart’s computer records <strong>and</strong> facilities by the<br />

plaintiff’s expert <strong>and</strong> also upheld fees <strong>and</strong> expenses caused by Wal-Mart’s failure to provide<br />

accurate discovery information in response to valid discovery requests. The court found the award<br />

of expenses “reasonable in view of the prior repeated misinformation provided by Wal-Mart<br />

concerning the availability of information . . . .”<br />

� Mathias v. Jacobs, 197 F.R.D. 29 (S.D.N.Y. 2000), vacated 2001 WL 1149017 (S.D.N.Y. Sept.<br />

27, 2001). The court found the plaintiff had a duty to preserve information contained on a Palm<br />

Pilot. Since the plaintiff’s conduct did not destroy evidence, but rather just made it more difficult to<br />

discover, the court imposed monetary sanctions as a consequence of the spoliation.<br />

� Telecom Int’l Amer., Ltd. v. AT & T Corp., 189 F.R.D. 76 (S.D.N.Y. 1999). “Even without a<br />

specific discovery order, a district court may impose sanctions for spoliation of evidence, exercising<br />

its inherent power to supervise the litigation before it.”<br />

� United States v. VISA, 1999 WL 476437 (S.D.N.Y. July 7, 1999). In a suit against VISA <strong>and</strong><br />

MasterCard, the parties agreed to narrow the scope of the archived e-mail search, both in terms of<br />

the number of employees whose e-mail is to be produced <strong>and</strong> the number of days per month for<br />

which e-mail is to be produced. The court reserved decision about which party will ultimately bear<br />

the cost of producing e-mail.<br />

� New York State Nat’l Org. for Women v. Cuomo, 1998 WL 395320 (S.D.N.Y. July 14, 1998).<br />

The court refused to impose sanctions on the defendants for destroying computer databases<br />

where there was no showing that the defendants deleted computer databases or destroyed<br />

monthly summary reports in order to impede litigation <strong>and</strong> the plaintiffs failed to demonstrate that<br />

they were prejudiced by the loss of the records.<br />

� In re Cheyenne Software, Inc. v. Securities Litig., 1997 WL 714891 (E.D.N.Y. Aug. 18, 1997). In<br />

a securities proceeding, the court imposed $15,000 in attorney’s fees <strong>and</strong> sanctions for failing to<br />

heed the court’s discovery order. The court also compelled the defendant to bear the cost of<br />

downloading <strong>and</strong> printing up to 10,000 pages of additional documents responsive to appropriate<br />

keyword searches requested by the plaintiff.<br />

� Cerruti 1881 S.A. v. Cerruti Inc., 169 F.R.D. 573 (S.D.N.Y. 1996). The plaintiff argued that the<br />

defendant fabricated computer records in an attempt to demonstrate sales for trademarked clothing<br />

items. The defendant claimed the records were inaccurate as a result of a defect that occurred in<br />

the process of copying the data from his hard drive to the archival media. A computer forensics<br />

expert compared the data on the hard drive to the archived records that the defendant produced<br />

75


<strong>and</strong> found that the records produced matched “perfectly.” Contrary to the defendant’s claim, the<br />

expert explained that it was “highly unlikely” that the data became corrupt as a result of the process<br />

used to copy the data. Rather, the data on the archival media had been manually manipulated.<br />

Based on the expert’s testimony, the court granted judgment in favor of the plaintiff.<br />

� Byrne v. Byrne, 650 N.Y.S.2d 499 (N.Y. Sup. Ct. 1996). In a divorce proceeding, the wife sought<br />

access to her husb<strong>and</strong>’s computer, which husb<strong>and</strong> used for both business <strong>and</strong> personal purposes<br />

even though computer was provided by husb<strong>and</strong>’s employer. The wife was awarded such access<br />

to search the computer for information about the couple’s finances <strong>and</strong> marital assets.<br />

� Anti-Monopoly, Inc. v. Hasbro, Inc., 1995 WL 649934 (S.D.N.Y. Nov. 3, 1995). The court found<br />

that the law is clear that data in computerized form is discoverable even if paper copies of the<br />

information have been produced. The producing party can be required to design a computer<br />

program to extract the data from its computerized business records. But such an order is subject to<br />

the court’s discretion as to the allocation of the costs of designing such a computer program.<br />

� Strauss v. Microsoft Corp., 1995 WL 326492 (S.D.N.Y. June 1, 1995). The court denied<br />

Microsoft’s motion to exclude evidence of offensive e-mails in a hostile work environment lawsuit.<br />

� Santiago v. Miles, 121 F.R.D. 636 (W.D.N.Y. 1988). The court noted that “[a] request for raw<br />

information in computer banks is proper <strong>and</strong> the information is obtainable under the discovery<br />

rules.”<br />

� United States v. IBM, 76 F.R.D. 97 (S.D.N.Y. 1977) Where the defendant was to produce<br />

information to the plaintiff pursuant to prior court orders, but production did not comport with spirit<br />

<strong>and</strong> intent of those orders <strong>and</strong> was highly technical <strong>and</strong> complex in nature, the court determined<br />

that “exceptional conditions” existed, warranting appointment of examiner. The examiner’s duties<br />

included reporting to court as to information that the defendant possessed <strong>and</strong> produced <strong>and</strong><br />

supervising discovery.<br />

Vermont<br />

� In re Boucher, 2007 WL 4246473 (D.Vt. Nov. 29, 2007). In this criminal case, the defendant was<br />

stopped at the customs <strong>and</strong> border station while entering Vermont from Canada. Agents searched<br />

his laptop <strong>and</strong> found what appeared to be images of child pornography. The defendant was<br />

arrested <strong>and</strong> charged with transportation of child pornography. After imagining the defendant’s<br />

hard drive, agents learned they were unable to further access the files on the drive because the<br />

files were encrypted, password protected <strong>and</strong> inaccessible. Thereafter, the government<br />

subpoenaed the defendant <strong>and</strong> directed him to provide all documents that reflected the password.<br />

The defendant moved to quash the subpoena, claiming compliance would violate his Fifth<br />

Amendment right against self-incrimination. The court reiterated the requirements for Fifth<br />

Amendment protection as: a compelled, testimonial communication that is incriminating in nature.<br />

The court determined that a subpoena constitutes compulsion because it requires compliance <strong>and</strong><br />

as the files sought allegedly contained child pornography, entry of the password would therefore be<br />

incriminating. As such, the contentious issue was whether entry of the password constituted a<br />

testimonial communication. The court held that entering a password into a computer communicates<br />

facts that convey the contents of one’s mind, <strong>and</strong> therefore found the act of entering this password<br />

to be testimonial, implicitly demonstrating that the defendant knew the password <strong>and</strong> had access to<br />

the files. The court therefore granted the defendant’s motion to quash the subpoena.<br />

76


� State v. Voorheis, 2004 WL 258178 (Vt. Feb. 13, 2004). The appellate court affirmed the trial<br />

court’s finding that “instant messaging” text was sufficient evidence to support the defendant’s<br />

conviction of incitement <strong>and</strong> attempt of use of a child in a sexual performance. The State<br />

introduced evidence recovered from a computer forensic examination of the computer system <strong>and</strong><br />

floppy disks taken from the child’s home. The computer forensic expert recovered text from “instant<br />

messaging” conversations in which the defendant discussed with the child’s mother a plan to have<br />

a lewd photo shoot. At trial, the expert noted that instant messaging is not usually saved on a<br />

computer <strong>and</strong> that saving it to floppy disks required “concentrated effort.” Based on the instant<br />

messaging evidence, the jury found the defendant guilty. The defendant argued that the instant<br />

messaging text was “meager evidence” of guilt, since the text had allegedly been altered <strong>and</strong><br />

edited. The court rejected this claim finding that the retrieved electronic conversations, together<br />

with witness testimony, offered ample evidence to support the jury’s findings.<br />

Third Circuit – State <strong>and</strong> Federal <strong>Case</strong>s<br />

� Race Tires America, Inc. v. Hoosier Racing Tire Corp., 2012 WL 887593 (3d Cir. Mar. 16,<br />

2012). In this taxation dispute, the plaintiffs sought review of the district court’s opinion granting<br />

taxation of costs for a variety of e-discovery vendor services. The Third Circuit scrutinized a line of<br />

authority granting broad taxation of vendor costs where the services were “highly technical” or<br />

beyond the expertise of an attorney. The court bore down on the plain meaning of 28 U.S.C. §<br />

1920(4) <strong>and</strong> ruled that the crux of a particular taxation issue simply turns on whether the cost falls<br />

within the statute’s coverage of costs incurred for “exemplification” or “making copies”—nothing<br />

more. After rattling through the defendant’s list of e-discovery expenses, the court held that only<br />

scanning documents <strong>and</strong> file format <strong>and</strong> VHS to DVD conversions fell within the scope of taxable<br />

costs. In turn, the court vacated district court’s original award of costs <strong>and</strong> chopped the defendant’s<br />

purse down by $95,210.13 (to around 25% of the district court’s award).<br />

� In the Matter of the Application of the U.S. of Am. for an Order Directing a Provider of Elec.<br />

Commc’n Serv. to Disclose Records to the Gov’t, 620 F.3d 304 (3d Cir. 2010). In this ongoing<br />

criminal investigation, the federal government appealed a twice-denied request to compel<br />

production of a customer’s historical cellular tower data, also known as cell site location information<br />

(CSLI). The government sought the CSLI of unidentified subscribers pursuant to a court order<br />

under § 2703(d) of the Stored Communications Act (SCA). Reviewing the magistrate judge’s<br />

analysis, the court rejected the premise that because CSLI could potentially be used to track<br />

individuals, it required the traditional probable cause necessary for a warrant. Citing legislative<br />

history <strong>and</strong> two U.S. Supreme Court decisions, the court found that CSLI would only encroach<br />

upon reasonable expectations of privacy if used to track individuals out of public view – an<br />

inference not supported by the record. However, the court determined § 2703(c) created a sliding<br />

scale st<strong>and</strong>ard, granting a judge discretion to require the government to obtain a warrant based on<br />

probable cause. Holding that § 2703(d) provided the minimum st<strong>and</strong>ard required, the court vacated<br />

the order <strong>and</strong> rem<strong>and</strong>ed for additional fact finding.<br />

� Institute for Motivational Living v. Doulos Inst. for Strategic Consulting, Inc., 110 Fed. Appx.<br />

283 (3d Cir. 2004). The plaintiff sued the defendant, seeking to retrieve its proprietary materials<br />

<strong>and</strong> to recover damages for copyright <strong>and</strong> trademark infringement <strong>and</strong> misappropriation of trade<br />

secrets. The district court previously ordered the defendant to preserve relevant documents,<br />

software <strong>and</strong> equipment. During settlement negotiations, the defendant agreed to return a laptop –<br />

including the data stored on it – to the plaintiff. Minutes before the parties signed the agreement,<br />

77


the defendant violated the preservation order <strong>and</strong> deleted data from the laptop. At a subsequent<br />

evidentiary hearing, a magistrate judge recommended civil contempt sanctions against the<br />

defendant for “knowingly <strong>and</strong> in bad faith violat[ing] the original discovery preservation order <strong>and</strong> . .<br />

. deliberately deleting data from the laptop.” The district judge found the defendant in civil contempt<br />

<strong>and</strong> awarded $50,000 in costs <strong>and</strong> attorney fees against him. The appellate court, however,<br />

reluctantly found the defendant not liable for violating the settlement agreement since he deleted<br />

the data before signing the agreement. Nonetheless, the court held the defendant liable for<br />

violating the district court’s preservation order <strong>and</strong> ordered the defendant to pay attorney fees<br />

attributed to the file deletion.<br />

� Fraser v. Nationwide Mutual Ins. Co., 352 F.3d 107 (3d Cir. 2003). In an employment termination<br />

suit, the plaintiff alleged that the defendant violated the <strong>Electronic</strong> Communications Privacy Act<br />

(ECPA) by searching, without the plaintiff’s express permission, the plaintiff’s e-mail stored on the<br />

defendant’s central file server. The ECPA prohibits “intentionally access[ing] without authorization a<br />

facility through which an electronic communication service is provided.” The court held that<br />

because the plaintiff’s e-mail was stored on the defendant’s system, the defendant’s search of the<br />

plaintiff’s e-mail fell within the exception to protection of the ECPA, which allows seizures of e-mail<br />

authorized “by the person or entity providing a wire or electronic communication service.”<br />

� United States v. Lloyd, 269 F.3d 228 (3d Cir. 2001). The Third Circuit has ruled that a man<br />

convicted of planting a computer “time bomb” that crippled operations at New Jersey-based<br />

Omega Engineering Corp. is not entitled to a new trial on the basis of a juror prejudice. The ruling<br />

reinstates the verdict in which the defendant was convicted on one count of computer sabotage.<br />

<strong>Computer</strong> experts were essential in recovering the evidence of the "time bomb.”<br />

Delaware<br />

� Cordance Corp. v. Amazon.com, Inc., 2012 WL 1194211 (D. Del. April 11, 2012). The defendant,<br />

who prevailed in this patent infringement suit, submitted a bill of costs that included $447,694.69<br />

for e-discovery costs. The plaintiff objected, alleging it was indigent, that the defendant engaged in<br />

stalling tactics to increase costs <strong>and</strong>, alternatively, that costs should be significantly reduced<br />

because the bill was unsubstantiated. With regard to the plaintiff’s primary objections, the court<br />

found that the plaintiff failed to provide sufficient evidence of its financial health or of the<br />

defendant’s repeated attempts to delay discovery. Analyzing the plaintiff’s alternative objection, the<br />

court cited the Third Circuit’s decision in Race Tires Am., Inc. v. Hooiser Racing Tire Corp —<br />

specifically the finding that 28 U.S.C. § 1920(4) “does not authorize taxation merely because<br />

today’s technology requires technical experience not ordinarily possessed by the typical legal<br />

professional”—as controlling precedent. Under this framework, the court limited recoverable costs<br />

to scanning or conversion of documents. Reviewing the defendant’s invoices, the court found that<br />

expenses for “intelligent culling,” “tech time,” <strong>and</strong> “processing services” were not recoverable <strong>and</strong><br />

reduced the defendant’s request for $447,694.63 in e-discovery costs to $2,721.53. Finally, the<br />

court noted that the bulk of the defendant’s invoices were deficiently itemized, <strong>and</strong> allowed it to<br />

submit more detailed invoices within 30 days to attempt to recover more of its e-discovery costs.<br />

� Genger v. TR Investors, LLC, 2011 WL 2802832 (Del. Supr. July 18, 2011). In this shareholder<br />

litigation, the defendant (an "international man of mystery") sought review of the Court of<br />

Chancery’s judgment including, its award of $3.2 million in attorney fees <strong>and</strong> costs for the<br />

spoliation of ESI in violation of a preservation order. On appeal, the defendant argued the<br />

78


sanctions were disproportionate <strong>and</strong> excessive as he merely erased unallocated free space, which<br />

was not specifically prohibited by the order <strong>and</strong> did not did not result in the spoliation of material<br />

evidence. The defendant further argued that because normal computer use causes similar<br />

overwriting to occur, sanctioning this behavior would require the suspension of all computer<br />

activities every time a court issued a preservation order. Rejecting both arguments, the court<br />

determined the trial court’s finding was based on narrow grounds related to evidence spoliation –<br />

not rewriting in general – <strong>and</strong> that the parties previously compromised, agreeing to the specified<br />

fee amount. In order to avoid future confusion, the court recommended that parties address the<br />

issue of unallocated free space in their preservation orders <strong>and</strong> document retention policies.<br />

� SOC-SMG, Inc. v. Day & Zimmerman, Inc., 2010 WL 3634204 (Del. Ch. Sept. 15, 2010). In this<br />

complex transactional dispute involving the sale of a limited liability company (LLC), the petitioner<br />

sought to disqualify opposing counsel, impose monetary sanctions, suppress use of allegedly<br />

privileged ESI <strong>and</strong> terminate the claims <strong>and</strong> defenses pending in arbitration, arguing public policy<br />

m<strong>and</strong>ated the court – rather than arbitrators – to adjudicate the alleged misuse of ESI because<br />

ethical violations were involved. Emphasizing that the petitioner itself initiated the arbitration<br />

agreement, the court affirmed the power of arbitrators to rule on disqualification <strong>and</strong> privilege<br />

motions <strong>and</strong> declined to become involved. Nevertheless, the court hinted at the likely outcome on<br />

the merits given the reality that the petitioner “sold its ESI, as part of the asset sale, to the LLC . . .<br />

failed to retain control over the servers on which it claims privileged information rests…<strong>and</strong> failed to<br />

screen its ESI or negotiate carve-outs for allegedly privileged ESI before turning it over to the LLC.”<br />

The court further admonished the petitioner for its “self-serving desire” to use allegations of<br />

attorney misconduct as “procedural weapons.” Noting the petitioner is free to forgo arbitration in the<br />

future, the court denied the motion <strong>and</strong> entered summary judgment for the respondent.<br />

� Takeda Pharm. Co. Ltd. v. Teva Pharm. USA, Inc., 2010 WL 2640492 (D.Del. June 21, 2010). In<br />

this patent litigation, the defendants sought production of electronically stored information for an<br />

18-year period, despite the five-year period previously imposed in the case. The plaintiffs<br />

demonstrated that the sought-after ESI was not reasonably accessible <strong>and</strong> would cost between $1<br />

<strong>and</strong> $1.5 million for an outside vendor to retrieve the data, not taking into account the cost of<br />

review. Despite the burden on the plaintiffs, the court found the information was relevant <strong>and</strong><br />

potentially unavailable from other sources. The court also considered the "importance of the<br />

interests at stake in this litigation" <strong>and</strong> the significant financial stakes in ordering production of data<br />

from the additional 13-year period. Finally, the court ordered the defendants to pay 80 percent of<br />

the costs incurred by the plaintiffs if they employed an outside vendor.<br />

� Eur<strong>and</strong>, Inc. v. Mylan Pharm., Inc., 2010 WL 1458442 (D.Del. Apr. 13, 2010). In this patent<br />

litigation, the defendants sought further discovery arguing the plaintiffs failed to disclose pertinent<br />

information <strong>and</strong> requested disclosure of search terms used. Maintaining that a comprehensive<br />

search of all relevant files was performed, the plaintiffs argued that the defendants’ motion was a<br />

“back door” effort to obtain information previously denied by the court. Noting that the defendants’<br />

arguments forced the court into “mysteries of keyword search techniques [<strong>and</strong>] the efficacy of<br />

various methods used to search electronically stored information” the court acknowledged that<br />

“[n]either lawyers nor judges are generally qualified” to evaluate the adequacy of keyword search<br />

terms. Despite this, the court employed a reasonableness test to determine whether the search<br />

performed was adequate, or “could . . . have been expected to produce the information requested.”<br />

While the plaintiff’s search appeared adequate, it may not have included evidence of subjective<br />

intent, <strong>and</strong> thus limited, additional e-mail searching was warranted. The court also declined to order<br />

disclosure of the search terms used.<br />

79


� TR Investors, LLC v. Genger, 2009 WL 4696062 (Del. Ch. Dec. 9, 2009). In this stockholders<br />

litigation, the plaintiffs sought default judgment sanctions, citing the defendant’s destruction of<br />

electronic evidence in violation of a court order. The plaintiffs asserted that, following review <strong>and</strong><br />

encryption of electronic evidence by a third-party firm, the defendant used wiping software to<br />

permanently delete temporary files in the unallocated space not reviewed by the neutral party for<br />

relevance. The defendant, an "international man of mystery" who performed sensitive tasks for the<br />

Israeli government <strong>and</strong> was concerned about the confidentiality of personal documents, claimed<br />

that he believed the wiping software only deleted duplicate copies. Finding the use of wiping<br />

software to be a clear violation of the unambiguous court order, the court determined sanctions<br />

were appropriate. The court declined to impose a default judgment <strong>and</strong> held the defendant in<br />

contempt, ordering him to pay $750,000 in attorneys’ fees <strong>and</strong> costs. The court also ordered<br />

production of documents previously subject to a claim of privilege, elevated the defendant’s<br />

required burden of persuasion on any counterclaims or defenses, <strong>and</strong> prohibited the defendant<br />

from prevailing on any material matter based solely on his uncorroborated testimony.<br />

� In re Global Power Equip. Group, Inc., 2009 WL 3464212 (Bkrtcy.D. Del. Oct. 28, 2009). In this<br />

bankruptcy proceeding, the debtors filed a motion to compel the claimants, a Dutch corporation,<br />

<strong>and</strong> its agent entity, a French corporation, to comply with discovery requests under the Federal<br />

Rules of Civil Procedure (FRCP). The claimants argued the French Blocking Statute prescribes<br />

sanctions for any French corporation that "engages in the discovery process of a foreign judicial<br />

proceeding without using the procedures established under the Hague Evidence Convention."<br />

According to a U.S. Supreme Court case, when a court is asked to use the Hague Evidence<br />

Convention procedures, it must conduct a "comity analysis" to determine whether the FRCP or the<br />

Hague Procedures apply. The "comity analysis" requires consideration of five factors: the<br />

importance of documents, degree of specificity of the request, whether information originated in the<br />

United States, availability of alternative means <strong>and</strong> the effect of noncompliance on interests of the<br />

United States or the state where the information is located. Concluding the chance of prosecution<br />

under the French Blocking Statute to be minimal, the court determined the factors weigh in favor of<br />

using the FRCP to govern discovery in this case.<br />

� Lluerma v. Owens Ill. Inc., 2009 WL 1638629 (Del. Super. June 11, 2009). In this toxic tort action<br />

brought by the plaintiffs (Spanish citizens who worked abroad on U.S. warships), the defendant<br />

filed a motion to dismiss based on forum non conveniens grounds. Among the defendant’s<br />

contentions for Spain as the proper forum was that the alleged injury occurred in Spanish territory,<br />

most of the discovery was located in Spain <strong>and</strong> that Spain had advised the Hague Conference that<br />

it would not grant requests for pretrial discovery of documents. The plaintiffs countered that Spain<br />

was not an adequate forum as many of the defendant’s employees <strong>and</strong> corporate records were in<br />

Delaware or were easily accessible to the defendant’s Delaware counsel. Recognizing there were<br />

burdens to the defendant’s procurement of evidence in Spain, the court nonetheless found that the<br />

defendant did not establish either an overwhelming hardship or the complete inability to procure<br />

discovery in Delaware <strong>and</strong> thus denied the defendant’s motion.<br />

� Beard Research, Inc. v. Kates, 2009 WL 1515625 (Del.Ch. May 29, 2009). In this tortious<br />

interference with business relations litigation, the plaintiffs sought spoliation sanctions claiming a<br />

computer was irretrievably altered after the defendants’ preservation duty arose. Specifically, the<br />

plaintiffs alleged the repeated reformatting of a personal computer <strong>and</strong> the loss of a hard drive<br />

caused the destruction of relevant incriminating e-mails <strong>and</strong> a presentation. The defendants argued<br />

there was no obligation to preserve one of the defendant’s computers since there was no request<br />

for it. Finding this "mistaken view" let the defendants "off the hook too easily," the court determined<br />

80


the defendants were responsible for the evidence destruction. The court also found the defendants<br />

liable for the loss of an original hard drive. Based on these discovery abuses that led the plaintiffs<br />

<strong>and</strong> their IT expert on a "wasteful wild goose chase," the court granted an adverse inference<br />

sanction with regard to the presentation but declined to sanction the loss of e-mails as the plaintiffs<br />

did not adequately prove their existence. The court also awarded attorneys’ fees <strong>and</strong> expenses<br />

associated with the sanctions motion.<br />

� Omnicare, Inc. v. Mariner Health Care Mgmt. Co., 2009 WL 1515609 (Del.Ch. May 29, 2009). In<br />

this breach of contract litigation, the plaintiff moved to compel restoration <strong>and</strong> production of e-mails<br />

contained on backup tapes at the defendant’s expense <strong>and</strong> to comply with the terms of a nonexecuted<br />

e-discovery stipulation regarding search terms. The defendant’s e-mails were stored on<br />

backup tapes pursuant to an internal data retention policy. The court denied the plaintiff’s motion to<br />

compel backup tape restoration <strong>and</strong> to shift costs to the defendant, finding that data stored on<br />

backup tapes are not necessarily non-reasonably accessible <strong>and</strong> that the defendant had not<br />

adequately demonstrated that the e-mails were not reasonably accessible. However, the court was<br />

not convinced that relevant data would be retrieved from restoration of the backup tapes.<br />

Accordingly, the court ordered production from the defendant’s active data stores in order to<br />

assess the likelihood of finding relevant data on the backup tapes, noting that it found no<br />

impropriety in the defendant’s data retention policy. Turning to the search term dispute, the court<br />

declined to resolve the issue as it had not been adequately informed about the dispute <strong>and</strong> lacked<br />

a sufficient basis to resolve the parties’ impasse. The court noted the search term dispute may best<br />

be resolved by "a neutral third party with recognized expertise in searching complex databases.”<br />

� Triton Constr. Co. v. Eastern Shore Elec. Servs., Inc., 2009 WL 1387115 (Del.Ch. May 18,<br />

2009). In this breach of fiduciary duty litigation, the plaintiff sought an adverse inference instruction<br />

claiming the defendant intentionally destroyed ESI on his work computer <strong>and</strong> did not produce his<br />

personal laptop or thumb drive. The plaintiff retained a computer forensic expert who found a<br />

wiping program installed on the computer that made certain files <strong>and</strong> deleted e-mails irretrievable.<br />

The defendant argued he never used wiping software <strong>and</strong> no longer owned the home computer or<br />

thumb drive. Finding the defendant intentionally, or at least recklessly, destroyed relevant evidence<br />

on his work computer <strong>and</strong> intentionally failed to preserve evidence on the other media forms, the<br />

court imposed an adverse inference sanction.<br />

� Micron Tech., Inc. v. Rambus, Inc., 2009 WL 54887 (D. Del. Jan. 9, 2009). In this patent<br />

infringement litigation, the plaintiff sought sanctions claiming the defendant spoliated relevant<br />

documents. In 1998, the defendant implemented a document retention policy whereby relevant<br />

documents were destroyed. Finding the defendant was an “aggressive competitor,” the court<br />

determined that litigation was inevitable <strong>and</strong> reasonably foreseeable since December 1998.<br />

Therefore, the court determined that any document destruction following December 1998 was<br />

intentional <strong>and</strong> in bad faith. As the plaintiff established that the documents that were destroyed<br />

were discoverable <strong>and</strong> relevant to the instant litigation, the court concluded that the plaintiff was<br />

prejudiced by the defendant’s conduct. The court therefore sanctioned the defendant by declaring<br />

the patents in suit unenforceable against the plaintiff.<br />

� In re Intel Corp. Microprocessor Antitrust Litig., 2008 WL 2310288 (D. Del. June 4, 2008). In<br />

this antitrust litigation, the plaintiffs moved to compel production of notes from the defendants’<br />

attorneys who interviewed the defendants’ custodians as part of an investigation regarding<br />

compliance with electronic evidence preservation obligations. The special master found that the<br />

parties did not agree to extend an earlier privilege waiver agreement to these notes. However, the<br />

special master found that the privilege was waived with regard to the substance of the custodian<br />

81


statements that were voluntarily disclosed by the defendants. It was determined that to find<br />

otherwise would allow the defendants to “use its sword to assert facts while at the same time<br />

shield” the plaintiffs from the defendants’ assertion that it had discovered human errors in its<br />

execution of its document preservation plan. The special master ultimately concluded that the<br />

protection of the non-core work product was waived, so the plaintiffs were entitled to the<br />

information. Judge Joseph Farnan, United States District of Delaware, adopted the special<br />

master’s report <strong>and</strong> recommendation regarding privileged <strong>and</strong> work product information.<br />

� Ryan v. Gifford, 2007 WL 4259557 (Del.Ch. Nov. 30, 2007). In this suit involving claims of stock<br />

option backdating, the plaintiffs filed multiple motions to compel the defendants to produce<br />

responsive documents in the native file format with original metadata. The court granted the<br />

plaintiffs’ motion to compel, finding metadata “especially relevant” in cases where the integrity of<br />

dates lies “at the heart of a dispute.” The relevance of the metadata was further illustrated by the<br />

defendants’ review of metadata as part of their investigation of backdating problems. The court<br />

granted the plaintiff’s motion <strong>and</strong> ordered the defendants to produce responsive documents in<br />

native file format.<br />

� RLI Ins. Co. v. Indian River Sch. Dist., 2007 WL 3112417 (D.Del. Oct. 23, 2007). In this case, the<br />

plaintiff filed a motion requesting the court to order the defendant to comply with the district of<br />

Delaware’s default st<strong>and</strong>ard for the discovery of electronic documents. The motion was filed over<br />

one year after fact discovery ended per the scheduling stipulation. The plaintiff argued that the<br />

defendant failed to provide full <strong>and</strong> complete e-discovery based on the lack of computer generated<br />

documents relative to the overall volume of documents produced. Relying on Fed. R. Civ. P.<br />

26(f)(3) which requires parties to discuss the form <strong>and</strong> scope of e-discovery prior to the Rule 16<br />

conference, the court denied the plaintiff’s motion which was filed months after the close of<br />

discovery <strong>and</strong> lacked a compelling reason to reopen.<br />

� In Re Quintas Corp. v. Avaya, 353 B.R. 77 (Bankr. D. Del. 2006). In a bankruptcy petition, the<br />

trustee of the debtor’s estate claimed that the purchaser of the debtor’s assets deliberately deleted<br />

the debtor’s general ledger which would show the debtor’s unpaid liabilities. The evidence showed<br />

that the defendant deleted the electronic records on its computer in order to make more storage<br />

space on its server. By law, the defendant was only allowed to delete the records after 7 years.<br />

The court found that such deliberate deletion of records greatly prejudiced the creditors from<br />

collecting their debt from the estate <strong>and</strong> the only sanction capable of repairing the harm done by<br />

the defendant would be default judgment since the destroyed ledgers went directly to the heart of<br />

the case.<br />

� Wyeth v. Impax Lab. Inc., 2006 WL 3091331 (D. Del. Oct. 26, 2006). In a patent infringement<br />

claim, the defendant filed a motion to compel electronic documents from the plaintiff in their native<br />

file format with complete metadata instead of in the already produced TIFF format. The defendant<br />

argued it was entitled to an entire electronic database of documents in its natural state, but the<br />

plaintiff argued there was no particular need for the native files. Agreeing with the plaintiff, the court<br />

found the parties did not agree to produce native files at the pre-discovery conference. The court<br />

also noted the defendant could not show a need for the native file documents. The court used<br />

Delaware’s Default St<strong>and</strong>ard for <strong>Electronic</strong> <strong>Discovery</strong> as authority <strong>and</strong> stated if parties cannot<br />

agree to a file format before discovery occurs, imaged files shall be the default format. The plaintiff<br />

also argued in favor of shifting half of the discovery costs to the defendant, which included imaging<br />

a large amount of documents for a litigation database. The court denied the cost-shifting claim<br />

because the defendant “is not the only party benefiting [sic] from the organization of these<br />

documents” into the database. It held the plaintiff was “also a beneficiary of its imaged files” <strong>and</strong> it<br />

82


was not equitable to force the defendant to pay for the electronic organization of the opposing<br />

party’s database.<br />

� In re Instinet Group, Inc. Shareholders Litig., 2005 WL 3501708 (Del. Ch. Dec. 14, 2005).<br />

Following the settlement of a class action shareholder lawsuit, the plaintiffs sought $1,450,000 in<br />

fees <strong>and</strong> more than $173,000 in costs. Although recognizing the plaintiffs were entitled to some<br />

fees <strong>and</strong> expenses, the defendants objected to the amount requested based on the plaintiffs’<br />

attorneys’ inefficiency in managing the discovery process. In considering the award, the court<br />

noted that prior to settlement, the plaintiffs obtained several hundred thous<strong>and</strong> pages of discovery<br />

documents <strong>and</strong> devoted a substantial amount of time to document review. The court issued a total<br />

award of $450,000, stating “the obvious inefficiencies involved in this case, highlighted by the<br />

plaintiffs’ decision to pay nearly $125,000 to convert documents produced in a digital format into a<br />

paper format. Rather than simply copying the electronic media to permit the plaintiffs’ lawyers<br />

working on the case to search <strong>and</strong> review the document production on a computer screen, the<br />

plaintiffs spewed the digital production onto paper <strong>and</strong>, then, copied the paper for review. This<br />

approach both added unnecessary expense <strong>and</strong> greatly increased the number of hours required to<br />

search <strong>and</strong> review the document production. In fact, the time records submitted include a large<br />

number of hours, by multiple attorneys, spent reviewing the documents. Thus, the court must<br />

disagree with the plaintiffs’ counsel’s assertion that ‘this case was a paradigm of efficient litigation,’<br />

<strong>and</strong> give less weight than customary to the number of hours expended by plaintiffs’ counsel.”<br />

� Fenster Family Patent Holdings, Inc. v. Siemens Med. Solutions USA, Inc., 2005 WL 2304190<br />

(D.Del. Sept. 20, 2005). In a patent infringement suit, the plaintiffs renewed a motion to compel the<br />

defendants to provide them with access to a corporate Intranet portal. The court had previously<br />

denied the motion relying on the defendant’s representation that it would produce the requested<br />

data in a searchable electronic format. In their renewed motion, the plaintiffs declared the<br />

defendants did not follow through with this representation because they produced some of the<br />

documents in hard copy format, requiring document-by-document review of over one million pages<br />

without the benefit of electronic searching. Additionally, the plaintiffs claimed the defendants<br />

produced other large batches of documents in a non-searchable electronic format. The plaintiffs<br />

further alleged certain documents had not been produced, constituting new evidence in support of<br />

the plaintiffs’ motion. In response, the defendants declared they had fulfilled their obligations under<br />

the Federal Rules of Civil Procedure by producing older documents, available only on microfilm, in<br />

the format in which they were maintained. The defendants also stated they would produce the<br />

specific documents previously identified by the plaintiffs as non-searchable in "searchable form." In<br />

denying the plaintiff’s motion, the court found the plaintiff failed to demonstrate “an intervening<br />

change in controlling law, the availability of new evidence that was not available when the Court<br />

issued its first Order, or the need to correct a clear error of law or fact to prevent a manifest<br />

injustice.”<br />

� TIG Ins. Co. v. Premier Parks, Inc., 2005 WL 468300 (Del. Super. Ct. Mar. 1, 2005). The<br />

defendants sought information about other litigation in which the plaintiff was involved where<br />

exposure was estimated to be worth more than $250,000. The plaintiff objected to the defendants’<br />

request as “extremely burdensome,” arguing it would require the plaintiff to gather 50,000 computer<br />

files scattered around the country. Attempting to form a compromise <strong>and</strong> limit the burden, the court<br />

ordered the plaintiff to produce only discovery relating to class action suits during the last five<br />

years. As it did not have the means to search the files electronically based on class action status,<br />

the plaintiff began a manual review of its litigation database. After engaging in a lengthy review <strong>and</strong><br />

incurring significant expense, the plaintiff requested permission to search only the files containing<br />

83


expenditures of more than $750,000. When the defendants refused to compromise, the plaintiff<br />

offered to search for cases estimated to be worth more than $500,000. The defendants again<br />

refused the offer <strong>and</strong> asked the plaintiff to search its entire database for the information. The<br />

plaintiff denied the request <strong>and</strong> sought reconsideration of the court’s earlier order. In response, the<br />

defendants argued the plaintiff should not be allowed to use “its inadequate computer system as an<br />

excuse to avoid valid discovery obligations.” On rehearing, the court determined a substantial<br />

burden was placed on the plaintiff <strong>and</strong> subsequently modified the original order to require review of<br />

case files totaling more than $500,000 in expenditures.<br />

� Beck v. Atlantic Coast PLC, 868 A.2d 840 (Del. Ch. 2005). The plaintiff brought a breach of<br />

warranty <strong>and</strong> fraud class action against the defendants. In the complaint, the plaintiff accused the<br />

defendants of employing deceptive marketing <strong>and</strong> sales techniques to sell software on the Internet.<br />

Contrary to his representation in the complaint, the plaintiff himself never actually used or paid for<br />

the product, although a consultant evaluated the product <strong>and</strong> determined it did not do what it<br />

purported to do. <strong>Discovery</strong> revealed that the plaintiff, using the guise of an organization interested<br />

in purchasing the software, corresponded with the defendants via e-mail <strong>and</strong> then posted the<br />

information he learned on his personal Internet Web page. During discovery, the plaintiff withheld<br />

much of the Web page’s content from the defendants. Meanwhile, the defendants discovered the<br />

entire content of the page – which the plaintiff did not disclose – upon performing an Internet<br />

search. The defendants moved for dismissal <strong>and</strong> sought attorney fees, stating the plaintiff <strong>and</strong> its<br />

counsel acted frivolously <strong>and</strong> in bad faith. Finding the plaintiff’s behavior “inexcusable,” the court<br />

dismissed the suit <strong>and</strong> ordered the plaintiff <strong>and</strong> his counsel to pay the defendants $25,000. The<br />

court stated, “[w]ithout ensuring that [the plaintiff] <strong>and</strong> his counsel bear appropriate responsibility<br />

for their inappropriate conduct by awarding a substantial, but fair, sanction of fees <strong>and</strong> costs<br />

against them, this court would do a disservice not only to [the defendants] <strong>and</strong> other litigants in this<br />

court, but also to those plaintiffs whose interests are well-served by the availability of class action<br />

suits.”<br />

� Smoot v. Comcast Cablevision, 2004 WL 2914287 (Del. Super. Ct. Nov. 16, 2004). The plaintiff<br />

appealed the Unemployment Insurance Appeal Board’s decision finding she was terminated for<br />

just cause by her employer for violating the company’s h<strong>and</strong>book prohibiting the use of<br />

inappropriate <strong>and</strong> offensive language. The plaintiff had engaged in a four-hour instant message<br />

conversation with two of her co-workers on her company laptop, a conversation that had included<br />

numerous sexual references <strong>and</strong> allusions as well as racially derogatory remarks <strong>and</strong> instances of<br />

profanity. The Board found the instant message transcript evidence sufficient to sustain a finding<br />

the company had just cause for discharging the plaintiff. On appeal, the court affirmed the Board’s<br />

decision noting “[t]he Board’s decision found that the 24-page transcript of the conversation from<br />

the computer’s hard drive as well as evidence that [the plaintiff] signed an acknowledgment that<br />

she had received access to the company’s h<strong>and</strong>book was "competent probative evidence"<br />

sufficient for a finding for [the company].”<br />

� Liafail, Inc. v. Learning 2000, Inc., 2002 WL 31954396 (D.Del. Dec. 23, 2002). The defendant<br />

alleges that upon issuing its document requests, the plaintiff engaged in electronic data spoliation<br />

including intentionally deleting computer files <strong>and</strong> damaging hardware. The court stated that the<br />

plaintiff’s position on the whereabouts of the requested documents indicated questionable<br />

discovery tactics. Nevertheless, because the court record was unclear as to what had been<br />

produced, <strong>and</strong> what must still be produced, the court decided not to immediately sanction the<br />

plaintiff. Rather, the court gave the plaintiff time to correct or clarify the record by producing the<br />

requested documents which it has claimed as available. The court stated that should the plaintiff<br />

84


choose not to heed the court’s order, the court would order sanctions in the form of an adverse<br />

inference jury instruction.<br />

� Tulip <strong>Computer</strong>s Int’l v. Dell <strong>Computer</strong> Corp., 2002 WL 818061 (D.Del. Apr. 30, 2002). On the<br />

plaintiff’s motion to compel in a patent infringement case, the court stated that “[T]he procedure<br />

that Tulip has suggested for the discovery of e-mail documents seems fair, efficient, <strong>and</strong><br />

reasonable.” The court ordered the defendant to produce the hard disks of certain company<br />

executives to the plaintiff’s electronic discovery expert for key word searching. After the expert<br />

completes the key word search, the plaintiff will give the defendant a list of the e-mails that contain<br />

those search terms. The defendant will then produce the e-mails to the plaintiff, subject to its own<br />

review for privilege <strong>and</strong> confidentiality.<br />

� Kaufman v. Kinko’s Inc., 2002 WL 32123851 (Del. Ch. Apr. 16, 2002). The court granted the<br />

plaintiffs’ motion to compel the defendants’ production of certain e-mail messages retrievable from<br />

the defendants backup system. The defendants’ argument that the burdens of the retrieval process<br />

outweighed any evidentiary benefit that the plaintiffs would obtain from the documents was<br />

unpersuasive. Instead, the court stated, “Upon installing a data storage system, it must be<br />

assumed that at some point in the future one may need to retrieve the information previously<br />

stored. That there may be deficiencies in the retrieval system…cannot be sufficient to defeat an<br />

otherwise good faith request to examine the relevant information.”<br />

� Wesley College v. Pitts, 1997 WL 557554 (D. Del. Aug. 11, 1997). The court found that the<br />

defendant waived its work-product privilege when the e-mail was distributed to several third parties.<br />

� IBM v. Comdisco, Inc., 1992 WL 52143 (Del. Super. Ct. Mar. 11, 1992). The court allowed<br />

production of a portion of an e-mail message claimed to be privileged because a portion of the email<br />

message was intended to be disclosed to persons outside the attorney-client privilege.<br />

Because it relayed legal advice from IBM’s counsel, the other portion of the e-mail was found to be<br />

privileged.<br />

New Jersey<br />

� Omogbehin v. Cino, 2012 WL 2335319 (D.N.J. June 20, 2012). In this race <strong>and</strong> national origin<br />

discrimination case, the plaintiff sought spoliation sanctions for the defendants’ alleged failure to<br />

preserve relevant e-mails. The plaintiff argued that numerous e-mails he believed were created<br />

within the seven month preservation timeframe were not produced, further asserting that the<br />

defendants intentionally destroyed or suppressed the production of relevant e-mails. Citing<br />

declarations of the employees responsible for the production, the defendants contested that the<br />

ESI at issue never existed <strong>and</strong> that all e-mails from the Lotus Notes system for the dates sought<br />

were produced. The court noted that a party proving spoliation must show the appearance of actual<br />

suppression or withholding of the evidence. Because the plaintiff failed to show that the alleged emails<br />

“actually existed,” the court denied spoliation sanctions.<br />

� Goldmark v. Mellina, A-5918-10T2 (N.J. Super. App. Div. June 18, 2012). In this contract dispute,<br />

the defendants’ counsel contested a sanction levied against his firm by arguing that his failure to<br />

preserve allegedly privileged e-mails fell short of sanctionable conduct. Specifically, the<br />

defendants’ counsel argued that no case law supported the sanction because their conduct was<br />

not deliberately improper. Citing Rule of Court 4:10-2(e)(1), the court held that after a party<br />

determines that relevant material is privileged or protected from discovery, it must preserve that<br />

information. Furthermore, the court found that the defendants’ duty to preserve was triggered when<br />

85


their attorney logged the e-mails as privileged, if not earlier. Upholding the $5,502 award of<br />

attorneys’ fees <strong>and</strong> costs, the court stated that to allow the defendant or his counsel to destroy or<br />

carelessly lose the e-mails thereafter would make a “mockery” of the state’s discovery rules.<br />

� I-Med Pharma, Inc. v. Biomatrix, Inc., 2011 WL 6140658 (D.N.J. Dec. 9, 2011). In this breach of<br />

contract litigation, the defendants appealed an order allowing the plaintiff to withhold millions of<br />

files obtained in a search of unallocated data, claiming the magistrate judge abused discretion on<br />

the matter. According to the parties’ stipulation, an expert conducted a 50-phrase keyword search<br />

of the plaintiff’s computer networks <strong>and</strong> storage devices that was not limited to particular document<br />

custodians, data sets, or relevant time periods. Accordingly, the search produced over 95 million<br />

hits—64 million of which were in unallocated space. A magistrate judge found inadequate<br />

relevance to justify the burdensome review of the files from the unallocated space <strong>and</strong> modified the<br />

plaintiff’s production order to include only active data. Deferring to the magistrate judge’s<br />

discretion, the district judge found that the parties should have "exercised greater diligence before<br />

stipulating to such broad search terms," but nonetheless found it unreasonable to order the costly<br />

production of 64 million documents bearing little likelihood of relevance or non-duplicative files.<br />

� Katiroll Co., Inc. v. Kati Roll <strong>and</strong> Platters, Inc., 2011 WL 3583408 (D.N.J. Aug. 3, 2011). In this<br />

trademark infringement litigation, the plaintiff sought spoliation sanctions citing the defendants’<br />

alleged series of discovery abuses, including the failure to preserve Facebook pages in their<br />

"original state." Citing the split within the Third Circuit regarding culpability, the court applied the<br />

"best rule" in determining whether sanctions were warranted: "Where there is substantial prejudice<br />

to the opposing party, negligence may be sufficient to warrant a spoliation inference. Where there<br />

is minimal prejudice to the opposing party, intentional conduct is required." Applying this st<strong>and</strong>ard,<br />

the court determined the sanctions would be unjust because the spoliation was in response to the<br />

plaintiff’s request that the image be removed. However, the court determined the loss of the<br />

Facebook data at issue was somewhat prejudicial <strong>and</strong> ordered an individual defendant to re-post<br />

the previous profile picture to allow the plaintiff to print any posts it felt were relevant.<br />

� United States v. Suarez, 2010 WL 4226524 (D.N.J. Oct. 21, 2010). In this federal criminal<br />

prosecution, the defendants sought sanctions citing the Government’s failure to produce text<br />

messages sent between a cooperating witness <strong>and</strong> FBI agents, who had deleted the messages<br />

from their cell phones to free memory. According to its Corporate Policy Directive, the FBI retained<br />

log server data <strong>and</strong> data on backup tapes for only 90 days <strong>and</strong> was unable to produce the text<br />

messages despite keyword <strong>and</strong> manual searches. Before discussing the alleged spoliation, the<br />

court deemed the messages discoverable statements under the Jencks Act. The court then found<br />

no reasonable explanation as to why the Government delayed imposing a litigation hold until three<br />

months after it began searching for the text messages, nor as to why only some messages were<br />

deleted. Thus the court determined the Government violated its duty to preserve relevant data that<br />

was in its control during an ongoing investigation specifically aimed at prosecution. Citing the<br />

relative lack of criminal law in the Third Circuit regarding spoliation sanctions, the court relied on<br />

civil case law – including Pension Committee – <strong>and</strong> held the missing evidence was prejudicial <strong>and</strong><br />

of “paramount importance.” Due to the absence of bad faith, the court issued a permissive adverse<br />

inference instruction.<br />

� Major Tours, Inc. v. Colorel, 2010 WL 2557250 (D.N.J. June 22, 2010). In this racial<br />

discrimination litigation, the plaintiffs appealed the magistrate judge’s discovery ruling. The<br />

magistrate judge granted a protective order for the defendants’ backup tapes based on several<br />

factors, including the $1.5 million cost of tape restoration <strong>and</strong> the lack of evidence regarding the<br />

defendants’ culpability as to why the e-mails were now inaccessible. The plaintiffs argued the<br />

86


magistrate judge improperly minimized the defendants’ failure to implement a litigation hold, which<br />

necessitated an order to restore the data. After considering the Zubulake decisions <strong>and</strong> the Federal<br />

Rules of Civil Procedure, the court found no support for the "prophylactic bright line" rule advocated<br />

by the plaintiffs. Instead, the court adopted the approach by Magistrate Judge Facciola in Disability<br />

Rights Council of Greater Washington v. Washington Metropolitan Transit, which concluded that a<br />

party’s culpability is just one of seven factors that should be weighed. The court also stated it would<br />

not order "over a million dollars worth of discovery" to be performed "on the off chance that it might<br />

add to the five year’s worth of discovery already obtained, just because there is some risk that<br />

relevant e-mails were not preserved." Finding no abuse of discretion, the court affirmed the<br />

protective order.<br />

� Stengart v. Loving Care Agency, Inc., 2010 WL 1189458 (N.J. Mar. 30, 2010). In this<br />

employment discrimination litigation, the defendant appealed the Appellate Division’s ruling that<br />

attorney-client privilege outweighs the defendant’s corporate Internet communications policy. The<br />

plaintiff accessed her personal, password-protected Yahoo! account on her work-issued laptop to<br />

send e-mails to her attorney, which the defendant then accessed, claiming its Internet use <strong>and</strong><br />

communications policy m<strong>and</strong>ated conversion of e-mails into business records. Reviewing the<br />

company policy, the New Jersey Supreme Court determined the plaintiff did not have adequate<br />

notice that e-mails from her personal account were subject to company monitoring since the policy<br />

did not address personal, web-based e-mail accounts. Based on this <strong>and</strong> the strong public policy<br />

considerations behind protecting the attorney-client privilege, the court upheld the Appellate<br />

Division’s ruling. The court further concluded that employers have no need to read the specific<br />

contents of personal, privileged, attorney-client communications in order to enforce a corporate<br />

policy. Finally, the court rem<strong>and</strong>ed to the trial court the decision of whether sanctions should be<br />

imposed on the defendant’s counsel for reading the privileged e-mails without notifying the plaintiff<br />

about them.<br />

� United States v. Sensient Colors, Inc., 2009 WL 2905474 (D.N.J. Sept. 9, 2009). In this cost<br />

recovery action filed under the Comprehensive Environmental Response, Compensation <strong>and</strong><br />

Liability Act (CERCLA) of 1980, the defendant filed a motion to compel production, alleging the<br />

plaintiff waived its privilege <strong>and</strong> work product objections. Subsequent to its production of<br />

approximately 45,000 documents, the plaintiff identified 214 as inadvertently produced. The plaintiff<br />

argued the joint discovery plan in place precluded a privilege waiver. Rejecting that argument, the<br />

court noted that the plan did not excuse the parties from meeting the requirements of Federal Rule<br />

of Evidence 502(b). Separating the documents into three different sets, the court conducted its<br />

Rule 502 analysis. Regarding the first set, the court found the plaintiff’s production was inadvertent<br />

<strong>and</strong> that the plaintiff took reasonable efforts to rectify the error after responding to the defendants’<br />

letter describing the error within eight work days. However, the court found the plaintiff failed to<br />

reasonably rectify the error with respect to the last two document sets, <strong>and</strong> thus held the privilege<br />

was waived.<br />

� Major Tours, Inc. v. Colorel, 2009 WL 2413631 (D.N.J. Aug. 4, 2009). In this discrimination<br />

litigation, the plaintiffs sought production of the defendants’ two litigation hold letters. The plaintiffs<br />

argued the letters were relevant to their examination of the defendants’ document production <strong>and</strong><br />

whether spoliation occurred. In opposition, the defendants claimed the plaintiffs failed to<br />

demonstrate evidence of spoliation <strong>and</strong> thus the letters were protected from discovery. Noting that<br />

litigation hold letters are in general privileged <strong>and</strong> not discoverable unless spoliation occurs, the<br />

court found a preliminary showing of spoliation existed in this case. The court inferred that relevant<br />

evidence was lost given the failure to timely ask a number of pertinent custodians to preserve<br />

87


evidence in addition to the significant time lapse that occurred between the duty to preserve <strong>and</strong><br />

the issuance of the first litigation hold letter. Accordingly, the court granted the plaintiffs’ production<br />

request, limiting it to those portions of the letters pertaining to preservation.<br />

� Stengart v. Loving Care Agency, Inc., 2009 WL 1811064 (N.J. Super. A.D. June 26, 2009). In<br />

this ongoing discrimination litigation, the plaintiff appealed the lower court’s denial of her motion to<br />

require the defendant to return all e-mail copies sent by her to her attorneys on work-issued<br />

laptops through her personal, web-based e-mail account. The defendant alleged its electronic<br />

communications policy m<strong>and</strong>ated the conversion of e-mails <strong>and</strong> other Internet use <strong>and</strong><br />

communication into company business records. The plaintiff maintained that the defendant had<br />

never officially adopted the policy or enforced it. The court noted the lack of certainty about the<br />

exact meaning <strong>and</strong> scope of the policy’s language created by multiple versions of the policy <strong>and</strong><br />

stated that any company policy must reasonably relate to a legitimate business interest. Balancing<br />

the enforceability of the company’s policy with the delicacy of attorney-client privilege, the court<br />

determined the policy must give way. Thus, the court reversed the lower court’s decision <strong>and</strong><br />

concluded the e-mails sent over the plaintiff’s personal Yahoo! account remained privilege<br />

protected. The court also rem<strong>and</strong>ed the case to determine whether the defendant’s counsel should<br />

be disqualified from further representation.<br />

� Ford Motor Co. v. Edgewood Properties, Inc., 2009 WL 1416223 (D.N.J. May 19, 2009). In this<br />

environmental litigation, the defendant moved for re-production in native format of the plaintiffs’<br />

entire ESI production previously produced in TIFF format <strong>and</strong> for a keyword search by a forensic<br />

expert to confirm the adequacy of the plaintiffs’ manual document collection process. The plaintiffs<br />

had dem<strong>and</strong>ed native production in their initial document request <strong>and</strong> argued the keyword search<br />

was appropriate to confirm the adequacy of the defendant’s collection, as certain documents were<br />

noticeably absent from production. The court denied the defendant’s motion for re-production,<br />

finding the defendant waived its objection to production format by failing to make a timely objection;<br />

the defendant waited eight months to first object to the requested production format <strong>and</strong> an<br />

additional two months before bringing the matter to the court’s attention. Turning to the second<br />

motion, the court found that the defendant had not made a colorable showing that documents had<br />

been withheld because of inadequate collection. The court accordingly held that it would not grant<br />

the burdensome discovery requested based on "nefarious speculation" of missing documents this<br />

"late in the game."<br />

� Opperman v. Allstate New Jersey Ins. Co., 2008 WL 5071044 (D.N.J. Nov. 24, 2008). In this<br />

class action lawsuit, the plaintiffs sought production of third-party owned proprietary software<br />

licensed <strong>and</strong> used by the defendants. The plaintiffs claimed they needed unfettered access to the<br />

software to determine how the defendants determine property loss adjustments <strong>and</strong> if the supply<br />

prices were manipulated or altered. The defendant <strong>and</strong> third-party opposed this request, claiming<br />

all relevant evidence was previously produced; less intrusive means were not exhausted; <strong>and</strong><br />

unfettered access was not necessary. Finding the software relevant <strong>and</strong> necessary to the plaintiffs’<br />

claims, the magistrate judge ordered the defendant to produce the software in an accessible form.<br />

Additionally, to circumvent the potential harm of allowing discovery of the third-party trade secret,<br />

the court entered a <strong>Discovery</strong> Confidentiality Order, limiting access <strong>and</strong> use of the software.<br />

� Arteria Prop., Ltd. v. Universal Funding V.T.O., Inc., 2008 WL 4513696 (D.N.J. Oct. 1, 2008). In<br />

this litigation involving a long-term loan, the plaintiff sought an adverse inference based on the<br />

alleged lack of production <strong>and</strong> spoliation of two types of documents: a highly relevant letter <strong>and</strong><br />

information relating to the defendants’ website as it existed at the time this dispute arose.<br />

Determining the defendants were in control of the relevant missing letter, the court found sanctions<br />

88


appropriate. The court refused to make a culpability determination, finding that an adverse<br />

inference was warranted regardless of whether a negligence or bad faith st<strong>and</strong>ard applied.<br />

Regarding the website, the court treated it as any other electronic file, finding the defendants had<br />

the ultimate authority <strong>and</strong> control over it. Based on this willful destruction or withholding of<br />

evidence, the court also imposed an adverse inference regarding the website, granting the<br />

plaintiff’s motion in full.<br />

� Wong v. Thomas, 2008 WL 4224923 (D.N.J. Sept. 10, 2008). In this wrongful termination<br />

litigation, the plaintiff sought sanctions for spoliation of evidence. Previously, the plaintiff sought all<br />

e-mail communications between the plaintiff <strong>and</strong> the defendants <strong>and</strong> claimed such information was<br />

integral to her ability to corroborate <strong>and</strong> establish her claims. The defendants claimed all electronic<br />

documents were destroyed as part of its routine practice of closing e-mail accounts <strong>and</strong> deleting<br />

files from the office computers of departing employees. The defendant then employed outside<br />

vendors to recover the sought after e-mail. After reviewing eighteen boxes of recovered e-mail, the<br />

defendant was unable to find any information relevant to the present litigation. The court found the<br />

defendants acted in good faith in their recovery <strong>and</strong> review efforts, but still considered whether<br />

sanctions were appropriate. Finding plaintiff’s vague request for e-mails as a failure to identify the<br />

possible information contained therein, the court determined that the plaintiff did not demonstrate<br />

the relevancy <strong>and</strong> denied the plaintiff’s motion.<br />

� Wachtel v. Health Net, Inc., 2007 WL 1101436 (D.N.J. Apr. 10, 2007). In this class action suit, the<br />

defendants sought a stay of two orders pending resolution of a m<strong>and</strong>amus petition before the Third<br />

Circuit Court of Appeals. Specifically, the defendants had been ordered multiple times over the last<br />

few years to produce certain electronic documents. The defendants argued that the production of<br />

the electronic data required them to restore <strong>and</strong> search through billions of e-mails by thous<strong>and</strong>s of<br />

employees at great cost. The court disagreed with the defendants <strong>and</strong> ordered production of the<br />

documents. The court found that this was “yet another attempt by [the d]efendants to avoid<br />

discovery obligations that they have been ordered to comply with for years.” The requested<br />

documents were not exceptional, <strong>and</strong> the court found it hard to believe that the documents were<br />

not stored in one central storage area. Furthermore, the defendants never objected to production of<br />

the documents when initially ordered <strong>and</strong> never provided evidence to the court to prove the burden<br />

of the search <strong>and</strong> retrieval effort.<br />

� Amersham Biosciences Corp. v. PerkinElmer, Inc., 2007 WL 329290 (D.N.J. Jan. 31, 2007).<br />

During a discovery dispute in a patent infringement case, the plaintiff alleged that it inadvertently<br />

produced over 500 privileged e-mails <strong>and</strong> moved for their return. During document review, the emails<br />

were identified as privileged, deleted from the Lotus Notes DVD, <strong>and</strong> submitted to the<br />

plaintiff’s outside e-discovery vendor for final production processing. Because of the nature of the<br />

Lotus Notes application, the plaintiff claimed the privileged e-mails unknowingly remained in a<br />

larger subfolder which the vendor processed <strong>and</strong> were ultimately produced to the defendant. In an<br />

earlier decision on this matter, the magistrate judge ordered that the privileged documents be<br />

returned because the plaintiff had not waived any privilege. The magistrate reasoned that the<br />

privileged e-mails were embedded in metadata <strong>and</strong> that the privileged information was “not<br />

apparent on the face of the documents.” Therefore, the magistrate found that the defendant should<br />

have reasonably known that the retrieved e-mails were not intended for disclosure. The defendant<br />

objected to the magistrate’s ruling <strong>and</strong> appealed to the district court judge. The district court judge<br />

reviewed the magistrate’s decision de novo <strong>and</strong> found that the magistrate based his conclusion on<br />

a misunderst<strong>and</strong>ing of fact, because the magistrate ruled that the plaintiff was unable to detect the<br />

error before production. However, in its briefings before the district judge, the plaintiff admitted that<br />

89


the inadvertent production of privileged documents was, in fact, apparent on the face of the<br />

documents because they had been Bates numbered <strong>and</strong> stamped as confidential. Since the<br />

magistrate based his decision upon a critical misunderst<strong>and</strong>ing of this fact, the district court judge<br />

rem<strong>and</strong>ed the case to the magistrate for a reassessment of whether the plaintiff preserved the<br />

privilege <strong>and</strong> was thus entitled to their return. In addition, the district judge evaluated whether the<br />

plaintiff waived its privilege by producing 37 non-Lotus Notes documents that were marked as<br />

“unreadable” during document review. Affirming the magistrate’s ruling that privilege had been<br />

waived, the court stated “[T]urning over unintelligible or unreadable documents to an adversary<br />

evidences a lack of reasonable precaution . . . .”<br />

� Wachtel v. Health Net, Inc., 2006 WL 3538935 (D.N.J. Dec. 6, 2006). In a class action suit, the<br />

plaintiffs sought sanctions, including default judgment, against the defendant for failure to retain,<br />

search <strong>and</strong> produce e-mail <strong>and</strong> other electronic documents. Several discovery orders had been<br />

issued over the last five years compelling the defendant to produce electronic records, with which<br />

the defendant failed to comply. Eventually, approximately 20,000 previously undisclosed<br />

documents were produced by the defendant after several years of discovery orders. The defendant<br />

also failed to search backup tapes for e-mail <strong>and</strong> failed to properly preserve any other e-mail during<br />

litigation. The defendant had an automated e-mail deletion program but failed to alter the program<br />

or search for any deleted e-mail on backup tapes until three years into litigation. The court held that<br />

it would not issue a default judgment as a sanction despite the defendant’s illicit bad faith in<br />

discovery. However, the court allowed monetary penalties, adverse inferences, <strong>and</strong> payment of<br />

plaintiff’s costs as sanctions.<br />

� Durst v. FedEx Express, 2006 WL 1541027 (D.N.J. June 2, 2006). In an employment termination<br />

dispute, the plaintiff filed a motion in limine, seeking an adverse inference jury instruction stating<br />

the defendant had destroyed or failed to maintain relevant evidence that would have been<br />

damaging to the defendant’s case. The plaintiff sought the spoliation inference after the defendant<br />

had failed to produce key accident reports, vehicle inspection records <strong>and</strong> emails as dem<strong>and</strong>ed by<br />

the plaintiff. In response, the defendant denied having agreed to provide the requested documents<br />

<strong>and</strong> asserted the magistrate judge had never ordered production. Refusing to grant the plaintiff’s<br />

motion, the district court observed that the plaintiff had never raised the issue during the discovery<br />

conference, informed the judge, or brought a motion to compel production of the allegedly<br />

destroyed documents. In addition, the district court noted that four essential factors are required for<br />

a spoliation inference, “(1) that the "evidence in question [is] under the adverse party’s control;" (2)<br />

"that there has been an actual suppression of this evidence, i.e., that [the evidence at issue] was<br />

intentionally untimely disclosed;" (3) that "the untimely disclosed evidence was relevant" to the<br />

plaintiff’s case; <strong>and</strong> (4) "that it was reasonably foreseeable that [the spoliated evidence] would later<br />

be discoverable." The district court determined that the plaintiff had failed to demonstrate the<br />

requested documents were relevant, in the defendant’s possession, or even existed.<br />

� Kaufman v. SunGard Inv. Sys., 2006 WL 1307882 (D.N.J. May 10, 2006). In a case involving<br />

breach of contract claims, the court affirmed the magistrate judge’s order declaring that certain email<br />

exchanges between the plaintiffs <strong>and</strong> their counsel were discoverable <strong>and</strong> not protected by<br />

attorney-client privilege. Following plaintiff’s termination of employment, the defendant recovered<br />

deleted e-mail exchanges on two company–owned laptops. The court found that the plaintiffs<br />

waived privilege claims as to emails sent prior to the defendant’s acquisition of the plaintiffs’<br />

business because the plaintiffs had not taken steps to “protect or segregate” those emails from the<br />

defendant’s systems. As to other emails sent <strong>and</strong> received after the acquisition, the court found<br />

that because the plaintiffs had received notice of the defendant’s e-mail monitoring policy, the<br />

90


plaintiffs waived any privilege claims by utilizing the defendant’s e-mail system to send <strong>and</strong> receive<br />

those communications.<br />

� Wachtel v. Guardian Life Ins. Co., 2006 WL 1286189 (D.N.J. May 8, 2006). In this opinion, the<br />

court addressed plaintiff’s motion to compel the production of certain documents being withheld by<br />

the defendants. While the defendants maintained that the documents were protected by attorneyclient<br />

privilege, the plaintiff asserted that the documents were discoverable under the crime-fraud<br />

exception. The court considered evidence that the defendants had used their counsel to delay<br />

discovery <strong>and</strong> make false representations to the court, while failing to preserve relevant e-mail<br />

evidence. The court found these facts sufficient to support a prima facie showing that in camera<br />

review of the materials might establish whether the crime-fraud exception applied. The court also<br />

upheld the magistrate judge’s adverse inference sanction regarding deleted emails, <strong>and</strong><br />

denounced the defendants use of deceptive discovery tactics <strong>and</strong> willful disregard for court orders.<br />

Responding to the defendants’ appeal of the magistrate’s discovery order, the court observed,<br />

“[h]ad c<strong>and</strong>id disclosures to the [m]agistrate [j]udge occurred, an appropriate order could have<br />

been tailored to deal with these issues <strong>and</strong> keep costs down. The huge costs now being<br />

complained of could have been minimized by timely compliance when the e-mails were more<br />

current. The defendants were ordered to produce emails stored on backup tapes as they had been<br />

previously instructed to do by the magistrate.<br />

� Doe v. XYC Corp., 887 A.2d 1156 (N.J. Super. Ct. 2005). On behalf of her minor daughter, the<br />

plaintiff sued her husb<strong>and</strong>’s employer after her husb<strong>and</strong> used his work computer to send pictures<br />

of the daughter to an Internet pornography site. Granting the employer’s motion for summary<br />

judgment, the lower court determined the employer did not have a duty to monitor the employee’s<br />

Internet activities. On appeal, the court reversed <strong>and</strong> declared the employer had a duty to use<br />

reasonable care to prevent the employee from accessing child pornography sites on his work<br />

computer. The appellate court noted the employer was on notice the employee was viewing child<br />

pornography <strong>and</strong> the employer had the capability to monitor the employee’s activities on his work<br />

computer. In addressing potential privacy concerns, the appellate court determined the employee<br />

had no legitimate expectation of privacy that would prevent the employer from accessing the<br />

computer to determine if he was using it to view adult or child pornography. The court held that if<br />

the employer failed to exercise reasonable care – by failing to terminate the employee or by failing<br />

to report his activities to law enforcement – the employer could be liable to a third party for resulting<br />

harm. The court rem<strong>and</strong>ed the case for a summary judgment determination on the issues of<br />

causation <strong>and</strong> harm.<br />

� Commodity Futures Trading Com’n. v. Equity Fin. Group, LLC., 2005 WL 2205789 (D.N.J.<br />

Sept. 9, 2005). The plaintiff sought a computer backup tape containing data from two desktop <strong>and</strong><br />

one laptop computers located in defendant Abernethy’s home office. Abernethy was an employee<br />

of another named defendant, Sterling. The plaintiff alleged the tape was necessary because<br />

relevant electronic evidence may have been altered or destroyed <strong>and</strong> the tape "may contain the<br />

only remaining copy of that evidence." The plaintiff stated it needed the tape in order to compare<br />

the files on the backup tape to the original files on the computers. Objecting to the production,<br />

defendant Sterling argued the tape was a backup of a Sterling computer making it Sterling’s<br />

property <strong>and</strong> not Abernethy’s property. Sterling also argued the plaintiff already had the documents<br />

on the tape, the tape was not subject to a previously issued consent order, <strong>and</strong> the files on the tape<br />

contained proprietary information that could not be produced. Rejecting these arguments, the court<br />

ordered production of the tape, concluding the tape was Abernethy’s property <strong>and</strong> not Sterling’s<br />

property. The court also refused to accept Sterling’s argument that the plaintiff had already<br />

91


obtained copies of the files through a forensic request <strong>and</strong> could request any deleted files it wished<br />

to have that existed on the tape.<br />

� Lloyd v. United States, 2005 WL 2009890 (D.N.J. Aug. 16, 2005). The defendant appealed from<br />

a conviction under a federal computer fraud statute, arguing, inter alia, the prosecution had<br />

tampered with the evidence leading to his conviction. An investigation of the defendant’s former<br />

employer’s network revealed that a string of computer comm<strong>and</strong>s, designated as a “Time Bomb,”<br />

had been programmed to automatically delete massive amounts of the company’s data at a<br />

predetermined time. <strong>Kroll</strong> <strong>Ontrack</strong> investigated hard drives damaged by the Time Bomb program.<br />

On appeal, the defendant argued the government tampered with copies of the hard drives it<br />

received back from <strong>Kroll</strong> <strong>Ontrack</strong> because the drives were not the same as those provided by the<br />

Secret Service. Specifically, the defendant claimed different amounts of "zeroes" were inserted<br />

onto the drives. The defendant also alleged his expert fully recovered the lost data once the zeroes<br />

were removed. The defendant further argued four files were added onto copies of the drives from<br />

<strong>Kroll</strong> <strong>Ontrack</strong>, one of which was deleted <strong>and</strong> no longer contained data <strong>and</strong> three that consisted of<br />

resumes <strong>and</strong> correspondence documents. Rejecting the defendant’s arguments, the court upheld<br />

the defendant’s conviction <strong>and</strong> found the defendant failed to show the discrepancy among the<br />

copied drives was sufficient evidence to overcome the trial court’s determination. See also United<br />

States v. Lloyd, 269 F.3d 228 (3d Cir. 2001).<br />

� Getty Props. Corp. v. Raceway Petroleum, Inc., 2005 WL 1412134 (D.N.J. June 14, 2005). In a<br />

case involving property contamination allegations, the plaintiff filed a motion for sanctions against<br />

the defendant/third party plaintiff. Citing Zubulake V, the plaintiff requested an adverse inference<br />

instruction <strong>and</strong> costs, arguing the defendant failed to create <strong>and</strong> preserve alarm history reports<br />

contained in a computer system. The defendant argued the computer system did not automatically<br />

generate printed reports <strong>and</strong> that these reports were not generated in the ordinary course of<br />

business. The defendant further asserted that sanctions were unwarranted for failing to produce<br />

records it never even possessed. The court distinguished this case from Zubulake, stating that<br />

Zubulake “deal[t] with the active deletion of data as opposed to the failure to create data. [The<br />

defendant’s] failure to create more reports than it used in the daily activities of its business is not<br />

the kind of willful action that discovery sanctions are intended to redress.” Stating the defendant<br />

was not responsible to produce records not kept within the normal course of business, the court<br />

declined to sanction the plaintiff for failing to preserve the records.<br />

� F&M Expressions Unlimited, Inc. v. O’Connell, No. C-240-04 (Sup. Ct. N.J. Sept. 10, 2004). In a<br />

case involving allegations of stolen company confidential information, the court granted an order<br />

allowing the plaintiff access to the defendants’ business <strong>and</strong> personal computers for mirror<br />

imaging. The plaintiff’s expert accessed the defendant’s computers <strong>and</strong> discovered damaging emails<br />

between the defendants <strong>and</strong> third parties. Based on this evidence, the plaintiff sought access<br />

to the third parties’ personal home computers. The plaintiff had already examined the third parties’<br />

business e-mail accounts, <strong>and</strong> the third parties had already searched their home computers for<br />

relevant e-mails. The defendants objected to the request on the grounds of invasion of privacy <strong>and</strong><br />

redundancy. The plaintiff declared it could limit its investigation by using a keyword search or by<br />

preparing a list of relevant documents <strong>and</strong> submitting them for the court to review in camera. The<br />

court refused to allow the plaintiff access to the computers because such access would be an<br />

invasion of privacy. However, the court indicated the plaintiff could attempt to retrieve the<br />

information through more specific discovery requests.<br />

� Mosaid Techs. Inc. v. Samsung Elecs. Co., 2004 WL 2550306 (D.N.J. July 7, 2004). In a case<br />

involving a patent infringement claim, the plaintiff moved for discovery sanctions, alleging the<br />

92


defendants failed to preserve <strong>and</strong> disclose discoverable e-mail evidence. Challenging the plaintiff’s<br />

motion, the defendants pointed out that their own discovery request expressly included e-mails <strong>and</strong><br />

claimed the plaintiff did not specifically include e-mail in its definition of “document” during<br />

discovery. The defendants also argued that the plaintiff did not demonstrate it was prejudiced as a<br />

result of not receiving the e-mails. The court rejected the defendants’ arguments stating that the<br />

defendants “knew, or should have known, those e-mails were discoverable, given their heavy<br />

reliance on e-mails obtained from plaintiff during discovery, not to mention the obvious realities of<br />

modern litigation…the fact that UnoU technical e-mails were preserved…demonstrates, at the<br />

least, extremely reckless behavior.” In an order following the July opinion, the judge issued<br />

$566,838 in sanctions against the defendants as well as an adverse inference instruction for<br />

spoliation of e-mail evidence. Mosaid Techs. Inc. v. Samsung Elecs. Co., 224 F.R.D. 595 (D.N.J.<br />

2004). See also Mosaid Techs. Inc. v. Samsung Elecs. 2004 WL 2550309 (D.N.J. Oct. 1, 2004)<br />

<strong>and</strong> Mosaid Techs. Inc. v. Samsung Elecs. 348 F.Supp.2d 332 (D.N.J. 2004) (both affirming<br />

sanctions awards).<br />

� In re Bristol-Myers Squibb Securities Litigation, 2002 WL 169201 (D.N.J. Feb. 4, 2002). The<br />

court modified the plaintiff’s original discovery cost commitment where the defendants "dumped" an<br />

extraordinary number of paper documents resulting in a prohibitive copying charge. The court also<br />

denied the defendant’s motion for plaintiff’s one-half cost contribution for document scanning costs,<br />

but instead required plaintiff to pay only for the nominal cost of copying compact discs. The court<br />

reiterated the importance of a Rule 26(f) conference to discuss electronic discovery issues,<br />

including the fair <strong>and</strong> economical allocation of costs.<br />

� White v. White, 781 A.2d 85 (N.J. Super. Ct. Ch. Div. 2001). In a divorce action, the husb<strong>and</strong> filed<br />

a motion to suppress his e-mail that had been stored on the hard drive of the family computer. The<br />

court held that the wife did not unlawfully access stored electronic communications in violation of<br />

the New Jersey Wiretap Act <strong>and</strong> did not intrude on his seclusion by accessing those e-mails.<br />

“Having a legitimate reason for being in the files, plaintiff had a right to seize evidence she believed<br />

indicated her husb<strong>and</strong> was being unfaithful….Is rummaging through files in a computer hard drive<br />

any different than rummaging through files in an unlocked file cabinet . . . ? Not really.”<br />

� In re Prudential Ins. Co. Sale Practices Litig., 169 F.R.D. 598 (D.N.J. 1997). Life insurer’s<br />

consistent pattern of failing to prevent unauthorized document destruction in violation of a court<br />

order, in a suit alleging deceptive sales practices, warranted sanctions requiring payment of $1<br />

million to court <strong>and</strong> payment of some plaintiff’s attorney fees <strong>and</strong> costs.<br />

� Ciba-Geigy Corp. v. S<strong>and</strong>oz, Ltd., 916 F. Supp. 404 (D.N.J. 1995). The defendants produced all<br />

documents from database without conducting a privilege review. The court held that privilege is<br />

waived where the disclosure is a result of “gross negligence.”<br />

Pennsylvania<br />

� Patel v. Havana Bar, Restaurant <strong>and</strong> Catering, 2011 WL 6029983 (E.D.Pa. Dec. 5, 2011). In this<br />

discovery dispute, each party cross-motioned for sanctions citing discovery misconduct. At issue in<br />

the litigation was whether the plaintiff fell or jumped from a two-story balcony, as well as how<br />

intoxicated the plaintiff was at the time of injury. The plaintiff asserted that defendants spoliated<br />

evidence when they failed to preserve security tapes before they were routinely erased three<br />

weeks later. Conversely, the defendants contended that the plaintiff, through his sister-in-law,<br />

"spoon-fed friendly witness testimony" by soliciting testimony via Facebook <strong>and</strong> e-mail—many of<br />

which were allegedly "lost" when the defendant requested them from the plaintiff late in discovery.<br />

93


Responding to the plaintiff’s claim, the court found that the defendant spoliated evidence by failing<br />

to take reasonable measures to preserve the video <strong>and</strong> granted an adverse inference. Reviewing<br />

the plaintiff’s conduct, the court took particular issue with the plaintiff concealing potential witness<br />

testimony that was required by Rule 26(a)(1)(A) <strong>and</strong> further considered their "missing" testimony<br />

spoliated. Thus, the court ordered an adverse inference against the plaintiff, while also ordering redeposition<br />

of five witnesses <strong>and</strong> awarding fees <strong>and</strong> costs to the defendants for time <strong>and</strong> money<br />

spent acquiring information they were entitled to at the outset of litigation.<br />

� Gentex Corp. v. Sutter, 2011 WL 5040893 (M.D. Pa. Oct. 24, 2011). In this action alleging<br />

violations of the <strong>Computer</strong> Fraud <strong>and</strong> Abuse Act, the plaintiff sought default judgment sanctions<br />

alleging the defendants intentionally deleted relevant ESI by prematurely lifting a litigation hold,<br />

erasing a home computer belonging to one of the defendants, delaying preservation of computers<br />

<strong>and</strong> deleting files, defragmenting disks, <strong>and</strong> destroying server backup tapes, ghost images,<br />

portable storage devices, e-mails <strong>and</strong> a file server. First, the court determined that genuine issues<br />

of material fact existed as to whether one of the defendants should be sanctioned <strong>and</strong> excluded the<br />

defendant from this opinion. Second, the court found two of the other defendants engaged in<br />

spoliation <strong>and</strong> that sanctions were appropriate. The court considered several factors including fault,<br />

prejudice <strong>and</strong> proportionality, <strong>and</strong> determined that default judgment was appropriate given the<br />

defendants’ “unabashedly intentional destruction of relevant, irretrievable evidence” <strong>and</strong> egregious<br />

conduct.<br />

� In re Aspartame Antitrust Litig., 2011 WL 4793239 (E.D. Pa. Oct. 5, 2011). In this class action,<br />

the plaintiffs objected to the defendants’ bill of costs, which included costs associated with creating<br />

a litigation database, processing <strong>and</strong> hosting electronic data, conducting keyword <strong>and</strong> privilege<br />

screens, making documents OCR searchable, extracting metadata, creating CDs <strong>and</strong> DVDs of<br />

electronic documents, copying, scanning <strong>and</strong> other related work. In discussing the taxation of these<br />

costs, the court noted that in cases of this complexity, “e-discovery [processes <strong>and</strong> technology]<br />

saves costs overall by allowing discovery to be conducted in an efficient <strong>and</strong> cost-effective<br />

manner.” Although the court taxed costs for the work described, it drew the line at advanced ediscovery<br />

technology that exceeded “necessary keyword search <strong>and</strong> filtering functions” <strong>and</strong> related<br />

“Tech Usage” fees, in addition to costs associated with Bates <strong>and</strong> confidentiality labeling, <strong>and</strong><br />

converting TIFF documents to PDFs. In sum, the court awarded total costs of $510,138.18 which<br />

were split amongst the three defendants pursuant to the court’s analysis.<br />

� Offenback v. L.M. Bowman, Inc., 2011 WL 2491371 (M.D. Pa. June 22, 2011). In this personal<br />

injury case, the defendants requested an in camera review of the plaintiff’s Facebook <strong>and</strong><br />

MySpace accounts, arguing the plaintiff’s claims of physical <strong>and</strong> psychological impairment made<br />

relevant any evidence that documented the plaintiff’s social life, physical capabilities <strong>and</strong> emotional<br />

state of mind. To the extent that such information was relevant under Fed.R.Civ.P. 26, the plaintiff<br />

agreed that limited public information on his Facebook account was discoverable <strong>and</strong> provided the<br />

password to the court (the plaintiff claimed he could no longer access his MySpace account). Upon<br />

review, the court agreed to the relevance of a limited amount of photographs <strong>and</strong> postings that<br />

reflected the plaintiff continued to ride motorcycles, went hunting <strong>and</strong> rode a mule, <strong>and</strong> ordered<br />

production of this information. In a closing footnote, the court stated it was confused as to why<br />

intervention was necessary since the parties agreed that at least some of the information was<br />

relevant. The court further noted the plaintiff should have reviewed his own Facebook account for<br />

potentially responsive information, only soliciting the court’s assistance if a dispute remained.<br />

� Zimmerman v. Weis Markets, Inc., No. CV-09-1535 (C.P. Northumberl<strong>and</strong> May 19, 2011). In this<br />

personal injury litigation, the defendant requested preservation <strong>and</strong> disclosure of the non-public<br />

94


portions of the plaintiff’s Facebook <strong>and</strong> MySpace pages. Noting that recent photographs <strong>and</strong><br />

comments on the public portions of the plaintiff’s pages appeared to contradict claims of physical<br />

<strong>and</strong> emotional distress, the defendant argued it should have access to relevant information in<br />

areas designated as private. The plaintiff countered that allowing access to shielded information<br />

would violate his reasonable expectation of privacy. Rejecting the plaintiff’s argument, the court<br />

noted that no privilege exists in Pennsylvania for non-public social website information <strong>and</strong> the<br />

"paramount ideal" of pursuing truth favors liberal discovery. Further, the court agreed with the<br />

rationale in McMillen v. Hummingbird Speedway Inc. <strong>and</strong> cited Romano v. Steelcase, Inc., which<br />

held that an individual who voluntarily posts pictures <strong>and</strong> information on social websites does so<br />

with the intention of sharing, <strong>and</strong> thus cannot later claim any expectation of privacy, especially<br />

because the privacy policies of Facebook <strong>and</strong> MySpace disclose that any information posted may<br />

become publicly available at the user’s own risk. Finding a reasonable likelihood that additional<br />

relevant information existed on the non-public portions, the court ordered the plaintiff to provide all<br />

passwords <strong>and</strong> user names to the defendant, <strong>and</strong> preserve all existing information.<br />

� Race Tires Am., Inc. v. Hoosier Racing Tire Corp., 2011 WL 1748620 (W.D. Pa. May 6, 2011).<br />

In this antitrust litigation, the plaintiffs moved to appoint a special master <strong>and</strong> to review the taxation<br />

of electronic discovery costs awarded to the defendants. Refusing to appoint a special master to<br />

review the reasonableness of the e-discovery costs this late in litigation, the court remarked that its<br />

"underst<strong>and</strong>ing that e-discovery has become a necessary <strong>and</strong> sometimes costly function of civil<br />

litigation" was the only special expertise necessary. Turning to the clerk of court’s taxation of<br />

electronic discovery costs – totaling $143,007.05 <strong>and</strong> $246,101.41 for the respective defendants –<br />

the court considered the plaintiffs’ objection that the costs were not taxable pursuant to Title 28<br />

U.S.C. § 1920. As a matter of first impression for the court, it reviewed the varying case law among<br />

the jurisdictions but noted that since the section’s language was amended in 2008, "no court has<br />

categorically excluded e-discovery costs" under § 1920. Finding that the costs paid to third party<br />

vendors were necessary for highly technical services <strong>and</strong> not merely for the convenience of the<br />

parties, the court held they were properly taxable to the plaintiffs.<br />

� Susquehanna Commercial Fin. Inc. v. Vascular Res., Inc., 2010 WL 4973317 (M.D. Pa. Dec. 1,<br />

2010). In this commercial lending dispute, the defendants requested the plaintiff supplement its<br />

production, fully explain its discovery efforts <strong>and</strong> allow access to its ESI. The defendants<br />

speculated that the plaintiff failed to produce “hundreds if not thous<strong>and</strong>s of pages” <strong>and</strong> argued this<br />

failure evidenced either an intentional disregard of discovery obligations or an inadequate effort to<br />

locate <strong>and</strong> identify responsive materials. Unconvinced the plaintiff’s search of computers <strong>and</strong><br />

servers <strong>and</strong> production of e-mails was adequate, the court directed the plaintiff to undertake further<br />

efforts to locate, identify <strong>and</strong> produce responsive documents. The court also found that an<br />

agreement between prior counsel that stipulated all documents would be produced on a disc or in<br />

hard copy could not control the defendants’ ability to discover ESI. Finally, remarking that<br />

communication about discovery <strong>and</strong> production format that is crucial to this process appears to<br />

have been compromised, the court ordered the parties to meet <strong>and</strong> confer to reach an agreeable<br />

production schedule.<br />

� Romero v. Allstate Ins. Co., 2010 WL 4138693 (E.D. Pa. Oct. 21, 2010). In this rem<strong>and</strong>ed<br />

employment class action suit, the plaintiffs sought to compel responses to numerous document<br />

requests, production of metadata, disclosure of the defendants’ search methodology <strong>and</strong><br />

certification of the defendants’ document retention policies. Following an order from the Third<br />

Circuit Court of Appeals, the court granted the motion to compel responses to document requests,<br />

noting the requests sought relevant <strong>and</strong> admissible information. Turning to the production of<br />

95


metadata, the court referenced the Sedona Conference <strong>and</strong> multiple court decisions <strong>and</strong> found that<br />

the defendants’ “blanket statement” of objections failed to show undue burden. As a result, the<br />

court ordered production of metadata with respect to documents that have not already been<br />

produced, finding the information will provide the plaintiffs with crucial information <strong>and</strong> permit them<br />

to engage in a more meaningful search. The court then denied disclosure of the defendants’<br />

search methodology, but ordered the parties to meet <strong>and</strong> confer to reach an agreement on search<br />

terms, custodians, date ranges <strong>and</strong> other essential details. Finally, the court refused to order a<br />

certification of the defendants’ document retention policies absent sufficient evidence of spoliation.<br />

� McMillen v. Hummingbird Speedway, Inc., No. 113-2010 CD (C.P. Jefferson Sept. 9, 2010). In<br />

this personal injury litigation, the defendants sought production of the user names, log-in names<br />

<strong>and</strong> passwords granting access to the plaintiff’s Facebook <strong>and</strong> MySpace accounts. Having found<br />

comments on the public portions of the plaintiff’s social media sites indicated the plaintiff<br />

exaggerated his injuries, the defendants argued that private portions might similarly contain<br />

impeaching content. Objecting, the plaintiff contended that communications shared among private<br />

friends on social network sites are confidential <strong>and</strong> thus protected against disclosure. Equating the<br />

plaintiff’s argument with a request for a new “social network site privilege,” the court expressed<br />

concern that recognizing such a privilege would contravene the purpose <strong>and</strong> policy of<br />

Pennsylvania’s broad discovery rules. Thus, finding no reasonable expectation of confidentiality<br />

given the clear language contained on both sites regarding the possibility of disclosure, no<br />

subjective or objective relational need for privilege outside of attorney-client communications <strong>and</strong> a<br />

failure to outweigh the interests of justice, the court ordered the plaintiff to preserve existing<br />

information <strong>and</strong> provide his Facebook <strong>and</strong> MySpace user names <strong>and</strong> passwords to the defendants’<br />

counsel.<br />

� Universal Delaware, Inc. v. Comdata Corp., 2010 WL 2330284 (E.D.Pa. June 4, 2010). In this<br />

antitrust litigation, one of the defendants requested a protective order shielding itself <strong>and</strong> a nonparty<br />

from complying with a subpoena served upon the non-party, arguing it was "harassing" <strong>and</strong><br />

an "unwarranted fishing expedition" that improperly sought production of irrelevant <strong>and</strong> proprietary<br />

information. The defendant also argued the subpoena was unduly burdensome as it would require<br />

collecting, reviewing <strong>and</strong> producing data from 38 total custodians who possessed approximately<br />

1,017 gigabytes each. The court denied the defendant’s undue burden argument, citing the likely<br />

overlap of custodians, existence of tools designed to reduce the burden of reviewing ESI, feasibility<br />

of adding search terms, exaggerated page counts <strong>and</strong> the defendant’s failure to argue that ESI<br />

was not reasonably accessible. The court also found the language of a prior governing protective<br />

order sufficient to protect information disclosed, especially since the disclosures would be to the<br />

plaintiffs <strong>and</strong> not the co-defendants who are the defendant’s competitors.<br />

� Camesi v. Univ. of Pittsburgh Med. Ctr., 2010 WL 2104639 (W.D.Pa. May 24, 2010). In this<br />

FLSA collective action, the plaintiffs sought discovery <strong>and</strong> sanctions based on the defendants’<br />

alleged incomplete production <strong>and</strong> excessive deadline extensions. Despite noting it was "not<br />

entirely unsympathetic" to the defendants’ difficulties based on the complexity of the litigation, the<br />

court found the time for "don’t worry, we’ll get it to you" had passed, especially given the original<br />

discovery deadline of November 2009. The court was not impressed with the defendants’<br />

statement that they produced "over 21,000 documents" <strong>and</strong> granted the plaintiffs’ production<br />

requests where appropriate. The court ordered the parties to meet <strong>and</strong> confer to discuss the<br />

production of ESI, consistent with its rulings that electronic files must be produced in a<br />

"searchable" format <strong>and</strong> the defendants must supplement production by reproducing ESI in native<br />

format, with metadata, seeking technical expertise <strong>and</strong> assistance when necessary. Finally, the<br />

96


court denied sanctions, but issued the defendants a "wake-up call" to "tighten up their discovery<br />

practices." The court emphatically directed opposing counsel to act reasonably <strong>and</strong> in good faith,<br />

working through "disagreements amicably whenever possible" as the court "has neither the time<br />

nor the resources to resolve every discovery agreement that surfaces in this or any other case."<br />

� Universal Del., Inc. v. Comdata Corp., 2010 WL 1381225 (E.D.Pa. Mar 31, 2010). In this<br />

discovery dispute, the plaintiffs sought third-party compliance to the subpoena requesting<br />

production of responsive ESI, without requiring the plaintiffs to provide compensation for applicable<br />

attorneys’ fees. According to the plaintiffs, the third party had an “interest in the outcome of the<br />

litigation” <strong>and</strong> therefore was not entitled to reimbursements for production <strong>and</strong> review costs of<br />

discovery material. The court determined that as a result of the potentially large costs of<br />

production, the third party had met its burden of proof in showing that the ESI was not reasonably<br />

accessible <strong>and</strong> that the information was in marginally accessible media form (backup tapes).<br />

Based on the recommendations of an electronic evidence consultant, the court ordered the<br />

requested information be imaged <strong>and</strong> produced for the plaintiffs in a separate searchable<br />

database. Citing the seven-factor cost-shifting test set forth in Zubulake I, the court ordered the<br />

database creation costs be evenly distributed between the plaintiffs <strong>and</strong> the third party based on<br />

the inaccessible format of the information.<br />

� Adhi v. Twp. of W. Pikel<strong>and</strong>, 2010 WL 1047894 (E.D.Pa. Mar. 16, 2010). In this property <strong>and</strong><br />

zoning litigation, the defendant sought enforcement of a pre-existing court order <strong>and</strong> production of<br />

additional e-mails. The plaintiff contended that if additional e-mails ever existed, they were deleted<br />

in the good faith ordinary course of business <strong>and</strong> therefore could not be produced. In response, the<br />

defendant argued that the “mere deletion of an e-mail does not make it lost forever” <strong>and</strong> requested<br />

retrieval of the ESI through the use of an e-discovery specialist. Relying on the plaintiff’s failure to<br />

deny that additional e-mails may have existed, the court ordered the plaintiff to allow the<br />

defendant’s e-discovery expert to inspect the plaintiff’s computers for responsive information.<br />

Additionally, because the court further concluded there was no substantial justification for the<br />

plaintiff’s discovery failure, the defendant was entitled reasonable expenses associated with filing<br />

<strong>and</strong> attorney’s fees as a sanction.<br />

� Phillips v. Potter, 2009 WL 1362049 (W.D.Pa. May 14, 2009). In this sexual discrimination case,<br />

the plaintiff filed a motion for sanctions based on the defendant’s failure to preserve electronically<br />

stored information; the defendant admitted that a litigation hold was not put into place after litigation<br />

became foreseeable <strong>and</strong> that e-mails were destroyed by an automatic deletion system as a result.<br />

The defendant argued that sanctions are nevertheless not appropriate because the e-mails<br />

destroyed were not relevant. The court agreed with the defendant that there was no evidence of<br />

destruction of relevant documents <strong>and</strong> refused to order sanctions arising out of "mere speculation"<br />

that relevant documents were destroyed, noting also that there was no indication of any bad intent<br />

on the part of the defendant.<br />

� Hohider v. United Parcel Serv., Inc., 2009 WL 1163931 (W.D.Pa. Apr. 28, 2009). In this litigation,<br />

the defendant filed an emergency motion to stay the court’s order requiring in camera review of<br />

alleged work product documents withheld by the defendant. Noting it was "very troubled by<br />

defendant’s efforts to delay or stop the court’s resolution" of the defendant’s potential preservation<br />

failures, the court determined an in camera review was necessary. The court was also troubled by<br />

the defendant’s request to the court of appeals to stay the special master’s investigative actions<br />

<strong>and</strong> believed this action raised suspicions about the defendant’s motives. Accordingly, the court<br />

denied the defendant’s motion <strong>and</strong> directed the special master to submit his report <strong>and</strong><br />

recommendation regarding the privilege assertions. The court also noted that an argument against<br />

97


in camera review by a trial court was unprecedented because this review is often the only way to<br />

determine whether documents are privileged.<br />

� Kvitka v. Puffin Co., LLC, 2009 WL 385582 (M.D.Pa. Feb. 13, 2009). In this litigation, the plaintiffs<br />

filed suit alleging fabricated e-mails wrongly led to an improper ban of its advertisements. In the<br />

instant motion, the defendants sought sanctions alleging the plaintiffs intentionally destroyed<br />

relevant evidence when discarding a laptop after receiving a preservation letter. Finding the<br />

plaintiffs acted in bad faith by discarding the laptop with relevant e-mails <strong>and</strong> severely prejudiced<br />

the defendants’ ability to defend against the plaintiffs’ claims, the court granted the defendants’<br />

spoliation motion <strong>and</strong> dismissed the plaintiffs’ claims with prejudice.<br />

� Bro-Tech Corp. v. Thermax, Inc., 2008 WL 5210346 (E.D.Pa. Dec. 11, 2008). In this ongoing<br />

trade secrets misappropriation litigation, the plaintiffs sought production of a privileged document<br />

that the defendants previously “clawed back” pursuant to a voluntary clawback agreement. The<br />

defendants opposed the request, arguing that the challenge provision in the clawback agreement<br />

specifically called for written notice of plaintiffs’ objection within five business days of the receipt of<br />

defendants’ written dem<strong>and</strong> for the return of the erroneously produced document. Because<br />

plaintiffs failed to follow the challenge provision of the clawback agreement, the defendants argued<br />

the motion was untimely. Analyzing the clawback agreement, the court found the plaintiffs’ motion<br />

to be untimely <strong>and</strong> declined to order the defendants to produce the document.<br />

� Rhoads Indus., Inc. v. Bldg. Materials Corp. of America, 2008 WL 4916026 (E.D.Pa. Nov. 14,<br />

2008). In this breach of contract litigation, the defendants sought an order determining attorneyclient<br />

privilege to be waived by plaintiff’s production of over eight hundred allegedly privileged<br />

documents. The defendants argued that the production was careless, the plaintiff delayed in<br />

seeking return of the documents <strong>and</strong> the plaintiff failed to produce complete <strong>and</strong> accurate privilege<br />

logs. The court applied the test of newly enacted Fed.R.Evid. 502, which weighs three factors in<br />

determining whether an inadvertent disclosure should constitute a waiver: 1) whether the<br />

disclosure was inadvertent, 2) whether the holder of the privilege took reasonable steps to prevent<br />

disclosure <strong>and</strong> 3) whether the holder of the privilege took reasonable steps to rectify the error. The<br />

court held that once the producing party has shown at least minimum compliance with the three<br />

factors in Rule 502(b) but when reasonableness is still in dispute, the court should look to the<br />

traditional five factor test set forth by Fidelity & Deposit Co. of Maryl<strong>and</strong> v. McCulloch: 1)<br />

reasonableness of precautions taken to prevent inadvertent disclosure; 2) number of inadvertent<br />

disclosures; 3) extent of disclosure; 4) delay <strong>and</strong> measures taken to rectify disclosure; <strong>and</strong> 5)<br />

whether overriding interests of justice would or would not be served by relieving the party of errors<br />

to find evidence of an inadvertent waiver. Finding the first four factors to be in favor of the<br />

defendants <strong>and</strong> the fifth factor to strongly favor the plaintiff, the court determined there was no<br />

waiver of privilege of the remaining documents.<br />

� Integrated Serv. Solutions, Inc. v. Rodman, 2008 WL 4791654 (E.D.Pa. Nov. 3, 2008). In this<br />

ongoing litigation, the plaintiff sought production of responsive electronic data contained on<br />

computers owned by a non-party. The parties to this dispute agreed to retain a vendor to perform a<br />

search of the laptop in question, to determine whether it contained, or once contained, any<br />

documents responsive to the subpoena. The plaintiff also sought the vendor report detailing the<br />

inspection, claiming there was an underst<strong>and</strong>ing between the parties that such a report would be<br />

provided. The non-party argued against production asserting the search terms were overbroad <strong>and</strong><br />

likely to reach competitive information that was irrelevant to the litigation at h<strong>and</strong> <strong>and</strong> that there<br />

was no agreement to provide the vendor report. Accepting the non-party’s assertions of nonresponsiveness,<br />

the court denied the plaintiff’s motion to compel. The court stated it would not<br />

98


equire the non-party to allow the plaintiff, a competitor, to “thumb through an electronic file drawer”<br />

to double-check document review for relevance. However, the court found evidence of an<br />

underst<strong>and</strong>ing that the plaintiff would receive a written vendor report <strong>and</strong> allowed the plaintiff the<br />

option to seek the report at its own expense.<br />

� United States v. Crist, 2008 WL 4682806 (M.D.Pa. Oct. 22, 2008). In this criminal action, the<br />

defendant filed a motion to suppress evidence recovered from his computer, claiming its search<br />

was warrantless, in violation of his Fourth Amendment rights. The defendant did not consent to the<br />

search of his computer; rather he reported it stolen upon learning that it was given away. However,<br />

upon receipt, the forensic examiner hashed the drive then took a forensic image. Then, the<br />

examiner hashed the image, later comparing the hash value to files known to contain pornographic<br />

images. The court determined that subjecting the computer to a hash value analysis constituted a<br />

search, reasoning that instead of the hard drive being analogous to an individual item, it constitutes<br />

multiple items as it is comprised of many platters with multiple data storage units. The court<br />

accordingly granted the defendant’s motion to suppress the evidence obtained from the forensic<br />

search of his computer.<br />

� Law Office of Douglas T. Harris, Esq. v. Philadelphia Waterfront Partners, LP, 2008 WL<br />

4291319 (Pa.Super. Sept. 22, 2008). In this breach of contract case, inter alia, the defendants<br />

appealed the trial court’s order requiring the production of two of the defendants’ “broken”<br />

computers. The defendants argued against production, claiming the computers may contain<br />

privileged documents. In response the plaintiffs argued the defendants previously agreed to<br />

produce the computers at trial. Disagreeing with the defendants, the court held the privilege was<br />

waived as a result of the defendants’ prior agreement to produce the computers.<br />

� Young v. Pleasant Valley Sch. Dist., 2008 WL 2857912 (M.D.Pa. July 21, 2008). In this civil<br />

rights case, the plaintiffs requested production of e-mail stored on backup tapes. The defendants<br />

objected, arguing the request was unduly burdensome <strong>and</strong> unlikely to produce relevant material. In<br />

response to a previous court order, the defendant provided an estimate that the search’s cost<br />

would be a minimum of $10,000. The court analyzed the factors laid out in Fed.R.Civ.P. 26(b)(2)<br />

<strong>and</strong> cited three factors that weighed against requiring production: (1) the burden <strong>and</strong> expense of<br />

the proposed discovery outweighed its likely benefit; (2) the needs of the case limit the usefulness<br />

of the information sought as it could be accessed in a more cost-efficient <strong>and</strong> less burdensome<br />

manner; <strong>and</strong> (3) the resources of the parties involved <strong>and</strong> the amount in controversy were relatively<br />

small. The court also rejected the plaintiffs’ offer to have their own expert search the backup tapes<br />

finding the request unduly burdensome, impractical <strong>and</strong> contrary to the spirit of the Federal Rules,<br />

noting that privacy concerns would undoubtedly require the defendant to closely supervise the<br />

plaintiff’s search thus creating unnecessary costs.<br />

� Square D. Co. v. Scott Elec. Co., 2008 WL 2779067 (W.D.Pa. July 15, 2008). In this intellectual<br />

property litigation, the parties filed cross motions for sanctions based on the execution of a<br />

previous forensic inspection of the defendant’s computer systems. The plaintiff requested a<br />

forensic inspection of the defendant’s remaining computer systems, the removal of imaged data<br />

from the defendants’ premises, <strong>and</strong> for a default judgment sanction. The defendant requested the<br />

plaintiff be required to complete its forensic inspection on the defendant’s premises, that further<br />

inspection of certain computers be prohibited, <strong>and</strong> sanctions for the plaintiff’s intentional disregard<br />

for previous orders. Determining the defendant’s imposition of limitations to be untimely, the court<br />

granted the plaintiff access to the defendant’s computer workstations. However, the court denied<br />

the plaintiff’s motion for default judgment as the defendant’s conduct “falls just shy of conduct<br />

befitting default judgment, i.e., ‘flagrant bad faith’ <strong>and</strong> ‘callous disregard.’” The court ordered the<br />

99


defendant to bear all costs related to the forensic inspection, consistent with past orders <strong>and</strong><br />

warned that future “baseless barriers impeding the completion of discovery will be met with<br />

sanctions” <strong>and</strong> cautioned that future discovery disputes may require the utilization of a special<br />

master with costs borne by the parties.<br />

� Race Tires Am., Inc., a Div. of Specialty Tires of Am., Inc. v. Hoosier Racing Tire Corp., 2008<br />

WL 2487835 (W.D.Pa. June 16, 2008). In this antitrust litigation, the plaintiffs filed a motion to<br />

compel seeking the completed production of paper documents <strong>and</strong> electronically stored information<br />

(ESI). The defendants had been continually producing documents on a “rolling basis” <strong>and</strong> had not<br />

specified a completion date. Addressing the plaintiffs’ motion, the court noted the defendants’<br />

production was due four months prior <strong>and</strong> ordered completed production of all non-privileged<br />

documents <strong>and</strong> responsive ESI within seven days. Noting this dispute was the fifth discovery<br />

motion filed in this litigation, the court reminded both parties that discovery is supposed to occur<br />

with minimal judicial intervention. The court also warned both parties sanctions would be imposed if<br />

further “discovery shenanigans” or other discovery abuse were to occur.<br />

� Mon River Towing, Inc. v. Industry Terminal <strong>and</strong> Salvage Co., 2008 WL 2412946 (W.D.Pa.<br />

June 10, 2008). In this negligence litigation, the defendant filed a motion to compel production of<br />

computer printouts <strong>and</strong> records. The plaintiff objected, arguing that the requested documents are<br />

not kept in the ordinary course of business <strong>and</strong> that the Federal Rules of Civil Procedure do not<br />

require the creation of documents for production. Analyzing Fed.R.Civ.P. 34(a)(1), the court found<br />

that Rule 34’s translation requirement does not require a responding party to create responsive<br />

material but does require the production of computer printouts, <strong>and</strong> granted the defendant’s motion<br />

to compel. The court also strongly encouraged the parties to meet <strong>and</strong> confer to reach an<br />

agreement in line with the court’s order.<br />

� United States v. Bunty, 2008 WL 2371211 (E.D.Pa. June 10, 2008). In this unlawful images<br />

criminal case, the defendant filed several motions including a motion to dismiss the case for<br />

spoliation of evidence. The defendant argued the government destroyed important <strong>and</strong> potentially<br />

exculpatory evidence in three ways: by connecting a seized flash drive to a forensically unsecure<br />

environment prior to making a forensic copy, by returning two seized laptops without making<br />

forensic copies <strong>and</strong> by viewing the contents of a floppy disk without first making a copy. The<br />

government disputed the facts as presented by the defendant instead claiming that the devices in<br />

question were preserved <strong>and</strong> detained for later examination by a forensic expert <strong>and</strong> that the<br />

laptops were imaged by the expert. Agreeing with the government, the court found no spoliation<br />

regarding the flash drive or laptops. Despite determining the “last accessed” date was altered after<br />

the government opened the floppy disk, the court found the defendant failed to demonstrate the<br />

government acted in bad faith or that the alteration prejudiced his case, <strong>and</strong> denied the motion to<br />

dismiss based on spoliation.<br />

� Binary Semantics Ltd. v. Minitab, Inc., 2008 WL 2020362 (M.D. Pa. May 5, 2008). In this trade<br />

secrets litigation, the defendants filed an emergency motion for court intervention to allow the<br />

defendants’ forensic expert to image the plaintiffs’ FTP <strong>and</strong> file servers, in addition to certain<br />

employees’ computers <strong>and</strong> removed hard drives. The defendants claimed this imaging was<br />

necessary to determine the integrity of previously produced ESI that contained questionable<br />

metadata. The plaintiffs opposed the motion <strong>and</strong> argued the request was overly-broad <strong>and</strong><br />

intrusive. Agreeing in part with the plaintiffs, the court found the defendants’ request was largely<br />

overly broad because an image of relevant folders would resolve the documents’ integrity issue.<br />

The court permitted the defendants to image the relevant folders contained on the plaintiffs’ FTP<br />

100


server. The court also granted the defendants’ unopposed request to image the removed hard<br />

drives.<br />

� Yeisley v. PA State Police, 2008 WL 906465 (M.D.Pa. March 31, 2008). In this civil rights<br />

litigation, the plaintiff sought sanctions for untimely discovery disclosures <strong>and</strong> a lack of e-mail<br />

production. Claiming the turnover in defense counsel attributed to discovery delays, the defendants<br />

asserted any untimely production resulted from a desire to fully comply with discovery requests.<br />

Ordering the re-depositions of select people at no cost to the plaintiff, the court refused to impose<br />

further sanctions. However, the court ordered the defendants to promptly search <strong>and</strong> produce<br />

electronic records, including e-mail, or further sanctions would be considered.<br />

� Bro-Tech Corp. v. Thermax, Inc., 2008 WL 724627 (E.D.Pa. Mar. 17, 2008). In this trade secret<br />

misappropriation suit, the defendants objected to a magistrate judge’s order requiring disclosure of<br />

forensically sound images of data storage devices without any scope or privilege filtering. The<br />

plaintiffs sought production without limitation, claiming review of the entire record was necessary to<br />

determine defendant’s compliance with an earlier order. Additionally, the plaintiffs asserted the<br />

defendants waived privilege upon disclosure of the servers’ contents to a third party. Finding the<br />

defendants satisfied an exception to the privilege waiver rule since the content disclosed to a third<br />

party was necessary for informed legal advice, the court overruled a portion of the magistrate’s<br />

order, <strong>and</strong> limited the production in scope <strong>and</strong> privilege.<br />

� Bro-Tech Corp. v. Thermax, Inc., 2008 WL 356928 (E.D.Pa. Feb. 7, 2008). In this discovery<br />

dispute, the plaintiffs moved to compel the defendants to produce forensically sound copies of<br />

numerous electronic data storage devices that allegedly contained the plaintiffs’ proprietary<br />

information. Per an earlier court order, the defendants were directed to return <strong>and</strong> then purge the<br />

plaintiffs’ electronic files that were stored on its servers, hard drives <strong>and</strong> thumb drives. Agreeing<br />

with the plaintiffs that an examination of the defendants’ hard drives <strong>and</strong> servers was necessary to<br />

determine if a violation occurred, the court ordered the defendants to produce the forensic copies<br />

to the plaintiffs’ attorneys on a “confidential-designated counsel” basis.<br />

� United States v. Richardson, 2007 WL 2253566 (W.D.Pa. Aug. 3, 2007). In a suit alleging<br />

possession of child pornography, the defendant motioned the court to suppress evidence obtained<br />

from the search of his computer hard drives. The investigators gained entry to the defendant’s<br />

home under a ruse, claiming they were merely searching for evidence of identity theft. In reality<br />

they were investigating the attempted credit card purchase of access to an Internet site containing<br />

child pornography from an IP address registered to the defendant at the defendant’s home. The<br />

defendant offered his consent to image the hard drive of one computer, <strong>and</strong> allowed investigators<br />

to confiscate the other. A forensic expert located numerous child pornography images on the<br />

imaged hard drive <strong>and</strong> confiscated computer. The court held that failure to reveal the object of the<br />

investigation was not a violation of the defendant’s fourth amendment rights <strong>and</strong> denied the<br />

defendant’s motion to suppress.<br />

� Healthcare Advocates, Inc. v. Harding, Earley, Follmer & Frailey, 2007 WL 2085358 (E.D.Pa.<br />

July 20, 2007). In a suit alleging copyright infringement, inter alia, the plaintiff motioned the court to<br />

sanction the defendant for spoliation of evidence. Prior, the plaintiff sued a party that was<br />

represented by the defendant. In defending that suit, the defendant viewed archived screen shots<br />

of the plaintiff’s former website, printing copies of each archived screenshot viewed <strong>and</strong> using the<br />

images during the course of the underlying litigation. The defendant did not actively save electronic<br />

copies any of the screenshots viewed. In the instant suit, the plaintiff claimed the defendant hacked<br />

the archival website to gain access to these screen shots <strong>and</strong> had a duty to preserve the<br />

information they viewed <strong>and</strong> printed. The plaintiff argued that failure to preserve the screen shots<br />

101


that were temporarily stored in the cache files but not downloaded onto the defendant’s hard<br />

drives, entitled it to a spoliation inference at trial. The court rejected the plaintiff’s argument <strong>and</strong><br />

accepted the defendant’s summary judgment motion on the issue, holding it impractical for the<br />

defendant to have had the duty to preserve such evidence.<br />

� Cenveo Corp. v. Slater, 2007 WL 442387 (E.D. Pa. Jan. 31, 2007). In a trade secrets<br />

misappropriation case, the parties presented two differing approaches for how electronic data<br />

contained on hard drives in the defendant’s possession would be produced to the plaintiff. The<br />

plaintiff requested that the hard drives be completely imaged <strong>and</strong> given to a third-party expert to<br />

search for relevant information. Under the plaintiff’s approach, the expert would sign a<br />

confidentiality agreement to protect privileged information. The defendant argued, however, that<br />

the parties agree upon search terms <strong>and</strong> the defendant will provide the search results from the<br />

images of the hard drives. Agreeing with the plaintiff’s method, the court ordered a third-party<br />

computer forensics expert to image <strong>and</strong> examine the hard drives. The expert will be chosen by the<br />

plaintiff <strong>and</strong> the actual imaging will take place on the defendant’s premises under the supervision of<br />

an expert chosen by the defendant. Furthermore, the court ordered the expert to provide the<br />

defendant with a report of the documents recovered. The defendant must review the documents for<br />

privileged material <strong>and</strong> thereafter produce relevant documents to the plaintiff.<br />

� In Re the Twenty-Fourth Statewide Investigating Gr<strong>and</strong> Jury, 907 A.2d 505 (Pa. 2006). During<br />

a gr<strong>and</strong> jury investigation, the court reviewed objections to the gr<strong>and</strong> jury’s subpoena requiring a<br />

newspaper publisher to produce four computer workstations <strong>and</strong> two hard drives. The newspaper<br />

eventually produced the four computer workstations pursuant to the subpoena but refused to<br />

produce the two hard drives. The lower court held the newspaper in contempt <strong>and</strong> imposed a<br />

$1,000 per day sanction for failure to comply with the subpoena. The newspaper filed an<br />

emergency application for review of the gr<strong>and</strong> jury’s subpoena with the state supreme court. The<br />

newspaper argued the subpoena’s requirement for the hard drives was overly broad. It further<br />

argued that production of hard drives is much like producing an entire file cabinet filled with files.<br />

Furthermore, the newspaper stated such production would produce a “chilling effect” on many of<br />

the newspaper’s confidential sources for news stories since their identities may be revealed during<br />

the investigation. The state countered by asserting the only information desired was the internet<br />

browsing history of several employees <strong>and</strong> assuring any confidential information would be<br />

safeguarded from disclosure. In vacating the lower court’s sanctions for failure to comply, the state<br />

supreme court held that the state’s “particular method of disclosure is unduly intrusive in the<br />

circumstances presented.” The court agreed with the newspaper’s argument <strong>and</strong> further held that<br />

entire “filing cabinets” cannot be extracted <strong>and</strong> held by the government under the guise of a gr<strong>and</strong><br />

jury subpoena when the result could be the disclosure of confidential information vital to the<br />

newspaper’s business.<br />

� Paramount Pictures Corp. v. Davis, 234 F.R.D. 102 (E.D. Pa. 2005). Alleging the defendant<br />

infringed upon its motion picture copyright, the plaintiff sought a permanent injunction, attorneys’<br />

fees <strong>and</strong> costs, <strong>and</strong> money damages. After uncovering the defendant’s alleged activities by tracing<br />

his Internet protocol address, the plaintiff was granted access to the defendant’s computer <strong>and</strong><br />

hired a <strong>Kroll</strong> <strong>Ontrack</strong> computer forensic expert to conduct an examination. The expert determined<br />

that, after wiping all data off of his hard drive, the defendant reinstalled the operating system just<br />

16 days after the defendant received notice of the lawsuit. As a result, it was impossible to<br />

determine whether the motion picture or related software was on the computer prior to the<br />

investigation. In defending his actions, the defendant claimed he wiped the drive in preparation for<br />

selling it to another individual. The court declared: “This argument does not obviate his duty to<br />

102


preserve the computer’s memory . . . His failure to preserve this evidence places the fault for its<br />

destruction squarely upon Davis.” Although the court determined an adverse inference instruction<br />

would be appropriate, it did not issue the instruction because the case was not being tried to a jury.<br />

As an alternative, the plaintiff proposed the court grant summary judgment in favor of the plaintiff.<br />

The court found such a remedy would be too severe <strong>and</strong> noted it would instead take the<br />

defendant’s “willful destruction of evidence into consideration at the time of trial.”<br />

� Rousseau v. Echosphere Corp., 2005 WL 2176839 (W.D. Pa. Aug. 30, 2005). In a suit arising<br />

from unlawful termination allegations, the defendant sought attorney’s fees <strong>and</strong> costs from the<br />

plaintiff’s counsel. The defendant claimed it had fired the plaintiff for intentionally using two different<br />

social security numbers on his job application materials. However, the plaintiff argued this was<br />

merely a mistake caused by mild adult dyslexia <strong>and</strong> memory impairing mental illnesses. During the<br />

litigation, the defendant filed a Rule 37 sanctions motion for dismissal claiming the plaintiff<br />

"abus[ed] the discovery process, perpetrat[ed] a fraud on this Court <strong>and</strong> attempt[ed] to conceal the<br />

one document that would expose Plaintiff’s fraudulent conduct." To support its argument, the<br />

defendant pointed to an e-mail produced by the plaintiff that undermined the plaintiff’s dyslexia <strong>and</strong><br />

mental illness argument. Although it did not grant the motion, the court allowed the defendant an<br />

additional 60 days for conducting discovery about the belated e-mail production. Following the<br />

order, the plaintiff admitted he intentionally used the two social security numbers, <strong>and</strong> the case was<br />

dismissed with prejudice by stipulation of the parties. In addressing the issue of attorney’s fees <strong>and</strong><br />

costs, the court determined the plaintiff’s attorney committed “unreasonable <strong>and</strong> vexatious conduct<br />

that multiplied the proceedings” because the attorney knew about the e-mail but continued filing<br />

various motions <strong>and</strong> an appeal. Thus, the court required the plaintiff’s attorney to “personally<br />

satisfy the excess costs, expenses <strong>and</strong> attorneys’ fees it reasonably incurred because of his<br />

conduct.”<br />

� In re F.P., 878 A.2d 91 (Pa. Super. Ct. 2005). The defendant appealed from an assault conviction,<br />

asserting the trial court erred in admitting improperly authenticated computerized instant messages<br />

into evidence. The defendant argued the messages should have been authenticated by either the<br />

source Internet Service Provider or computer forensic expert testimony. Rejecting this argument,<br />

the appellate court declared the circumstantial evidence properly rendered the instant messages<br />

admissible. The court noted the defendant’s argument would require it to “create a whole new body<br />

of law just to deal with e-mails or instant messages.” The court further stated it found “no<br />

justification for constructing unique rules for admissibility of electronic communications such as<br />

instant messages.” In this case, the instant messages were properly authenticated based on the<br />

following factual circumstances: the defendant referred to himself by name, his testimony mirrored<br />

some of the comments in the instant messages, <strong>and</strong> he referenced one of the instant messages in<br />

a conversation with school authorities.<br />

� United States v. Merck-Medco Managed Care, L.L.C., 2005 WL 273030 (E.D. Pa. Feb. 2, 2005).<br />

Based on the defendants’ prior discovery conduct, the plaintiffs filed a motion to modify a case<br />

management order, establish discovery deadlines, <strong>and</strong> appoint a special master or neutral<br />

consultant. A month after the discovery deadline, the defendants completed their electronic<br />

document production with the exception of documents withheld as potentially privileged, 13<br />

additional boxes, <strong>and</strong> corrupted electronic data that was being restored. At that time, the plaintiffs<br />

sent a letter to the defendants stating the “completed” document production was incomplete<br />

because several major technical defects existed, including hard drive errors <strong>and</strong> files containing<br />

questionable or missing data. The defendants denied knowledge of the defective document<br />

production. The court found the “[d]efendants have been dilatory in their disclosure of these<br />

103


defective files, costing [the plaintiffs] unnecessary time <strong>and</strong> expense. Consequently, the Court<br />

admonishes [the defendants] for its discovery practices, <strong>and</strong> reminds [the defendants] of its<br />

obligation to this Court to contact it when discovery issues arise.” The court determined the<br />

defendants’ conduct had prejudiced the plaintiffs <strong>and</strong> granted the motion to amend the order,<br />

noting that further violations may result in sanctions. Declining to appoint a special master, the<br />

court stated the current magistrate was capable of resolving any technical discovery disputes but<br />

declared the parties could hire a neutral technical consultant at their own expense.<br />

� In re Plastics Additives Antitrust Litig., 2004 WL 2743591 (E.D. Pa. Nov. 29, 2004). The<br />

plaintiffs filed a class action antitrust lawsuit alleging price fixing in violation of various federal<br />

statutes. The plaintiffs offered a proposed scheduling order, requesting the defendants produce all<br />

relevant data in an electronic format <strong>and</strong> provide technical assistance for underst<strong>and</strong>ing the data.<br />

The defendants objected, arguing the proposed order was excessively burdensome <strong>and</strong> did not<br />

place a similar burden on the plaintiffs. The court granted the plaintiffs’ proposed scheduling order<br />

in part, finding that both parties’ data must be produced electronically “to the extent reasonably<br />

feasible.” However, the court did not require the defendants to provide technical assistance to the<br />

plaintiffs, stating “[u]nless otherwise agreed upon, interpretations of data produced through<br />

discovery should be obtained through traditional discovery outlets <strong>and</strong> through the hiring of expert<br />

witnesses.”<br />

� In re Spring Ford Indus., Inc., 2004 WL 1291223 (Bankr. E.D. Pa. May 20, 2004). In a<br />

commercial rent collection dispute, the debtor produced an e-mail from its attorney regarding<br />

proposed amendments to the lease contract. The debtor’s counsel also indicated that it had other<br />

related e-mails but that they were subject to the attorney-client privilege. In response, the creditor<br />

argued that the debtor should be compelled to produce the e-mails because the privilege had been<br />

waived when the debtor produced the original e-mail from its attorney. Determining that the<br />

privilege had not been waived, the court declared that there was “no evidence that the document<br />

was created in the course of rendering legal advice…[a]t best, the Disclosed E-mail is educational<br />

in nature.” The court further stated that even had the disclosed e-mail been privileged, the privilege<br />

would not necessarily be waived as to subsequent e-mails.<br />

� Capricorn Power Co. v. Siemens Westinghouse Power Corp., 220 F.R.D. 429 (W.D.Pa. 2004).<br />

The defendant sought a preservation order requiring the plaintiff to preserve documents <strong>and</strong> things,<br />

including electronic documents. The plaintiff, in responding to the defendant’s motion, countered<br />

with a preservation order request of its own, requiring the defendant to preserve <strong>and</strong> produce<br />

documents. In addressing the need for these orders, the court focused on the medium in which the<br />

evidence was stored. The court stated that “[if] the evidence is stored upon a computer floppy disk<br />

or hard drive, finding physical space to store the evidence will not be as much of an issue … [but]<br />

evidence stored within a computer hard drive may present a difficulty in that it may be<br />

compromised or degraded as new information is added <strong>and</strong> pieces of old information are ‘deleted’<br />

<strong>and</strong> subsequently written over by the computer.” In discussing when an order would be<br />

appropriate, the court declared that timing is of the essence, particularly in cases where a party<br />

does not know that electronic evidence needs to be preserved. Denying both preservation order<br />

requests, the court determined that there was insufficient proof showing that evidence would be<br />

lost or destroyed absent these orders.<br />

� Koen v. Powell, 212 F.R.D. 283 (E.D. Pa. 2002). In a legal malpractice suit, the court held that the<br />

attorney-client privilege <strong>and</strong> work product doctrine did not shield the defendants from turning over<br />

e-mails relating to the threatened malpractice suit.<br />

104


� Itzenson v. Hartford Life <strong>and</strong> Accident Ins. Co., 2000 WL 1507422 (E.D. Pa. Oct. 10, 2000). “It<br />

is difficult to believe that in the computer era” that the defendant could not identify files <strong>and</strong> filter out<br />

information based on specific categories.<br />

� Storch v. IPCO Safety Prods. Co., 1997 WL 401589 (E.D. Pa. July 16, 1997). “This Court finds<br />

that in this age of high-technology where much of our information is transmitted by computer <strong>and</strong><br />

computer disks, it is not unreasonable for the defendant to produce the information on computer<br />

disk for the plaintiff.”<br />

� United States v. Keystone Sanitation Co., 885 F. Supp. 672 (M.D. Pa. 1994). In complying with<br />

the court’s discovery order, the defendants inadvertently disclosed e-mail messages that contained<br />

potentially confidential communications. This inadvertent disclosure waived any attorney-client<br />

privilege that may have protected portions of the e-mail.<br />

� Rhone-Poulenc Rorer, Inc. v. Home Indemnity Co., 1991 WL 111040 (E.D. Pa. June 17, 1991).<br />

An unwieldy computerized record-keeping system, which requires heavy expenditures in money<br />

<strong>and</strong> time to produce relevant records, is simply not an adequate excuse to frustrate discovery. The<br />

plaintiffs were required to pay for copies of any documents on microfilm/microfiche which the<br />

plaintiff requests, while the defendants bear the burden of searching <strong>and</strong> producing the documents.<br />

� National Union Elec. Corp. v. Matsushita Elec. Ind. Co., 494 F. Supp. 1257 (E.D. Pa. 1980).<br />

The defendant filed a motion to compel production of a computer tape containing the information<br />

that the plaintiff previously produced in a hard copy. The court required the plaintiff to have<br />

computer experts create a computer-readable tape containing data previously supplied to the<br />

defendant in printed form.<br />

Fourth Circuit – State <strong>and</strong> Federal <strong>Case</strong>s<br />

� Nicholas v. Wyndham Int’l, Inc., 373 F.3d 537 (4th Cir. July 2, 2004). On behalf of their daughter,<br />

the plaintiffs filed an action in the Virgin Isl<strong>and</strong>s against a hotel chain, alleging that one of the<br />

hotel’s employees had molested the plaintiffs’ daughter. In response, the defendants had a<br />

subpoena issued in Virginia for the deposition of a nonparty corporation owned by the plaintiffs.<br />

The subpoena also ordered the corporation to produce any relevant documents, including e-mails<br />

relating to the action. After the plaintiffs did not respond to the subpoena or appear for the<br />

deposition, the defendant sought to compel the corporation’s deposition <strong>and</strong> the document<br />

production. The plaintiff moved for a protective order. Determining that the defendant’s discovery<br />

requests were cumulative <strong>and</strong> duplicative, unduly burdensome, <strong>and</strong> harassing, the district court<br />

granted the protective order to the plaintiffs’ company. On appeal, the appellate court affirmed the<br />

district court’s decision noting that the “[p]laintiffs had already produced some 400 pages of emails…<strong>and</strong><br />

they remain under continuing obligation to supplement their earlier productions.”<br />

� Columbia Communications v. Echostar, 2 Fed.Appx. 360 (4th Cir. 2001). In a contract dispute,<br />

the court held that failure of the lessor to turn over certain computer databases during discovery did<br />

not justify a judgment for the distributor or a new trial.<br />

� United States v. Bowers, 920 F.2d 220 (4th Cir. 1990). <strong>Computer</strong> data consisting of IRS taxpayer<br />

data compilations is admissible as official records.<br />

North Carolina<br />

� Wood v. Town of Warsaw, 2011 WL 6748797 (E.D.N.C. Dec. 22, 2011). In this employment<br />

discrimination litigation, the defendant sought to modify a Fed.R.Civ.P. 45 subpoena seeking<br />

105


inspection of a non-party former supervisor’s personal hard drive. Specifically, the defendant<br />

argued that the subpoena was overbroad, unduly burdensome <strong>and</strong> not calculated to lead to the<br />

discovery of admissible evidence. Before laying out its analysis, the court noted the st<strong>and</strong>ard for<br />

quashing a Rule 45 subpoena, requiring consideration of relevance, the requesting party’s need,<br />

<strong>and</strong> the potential hardships suffered by the party subject to the subpoena. Addressing the<br />

defendant’s objections, the court found that the non-party’s connection to the plaintiff offered the<br />

possibility of discovering some relevant evidence on his personal hard drive, especially in an age<br />

“where it is increasingly common for work to be conducted outside the office through the use of<br />

personal electronic devices.” Furthermore, the court found that the plaintiff’s willingness to<br />

negotiate search terms <strong>and</strong> bear the cost of a search mitigated any undue burden. Based on these<br />

facts, the court concluded that the plaintiff was entitled to search the non-party’s personal hard<br />

drive through an expert with the proposed search terms.<br />

� Kinetic Concepts, Inc. v. ConvaTec Inc., 2010 WL 1912245 (M.D.N.C. May 12, 2010). In this<br />

patent infringement litigation, the defendants filed a motion to compel alleging the plaintiffs failed to<br />

respond to several production requests <strong>and</strong> deficiently produced some documents. The plaintiffs<br />

argued that they did not withhold or refuse to produce the relevant, responsive <strong>and</strong> non-privileged<br />

documents sought. Reviewing the parties’ communications, the court determined that the plaintiffs<br />

often responded to the defendants’ requests with boilerplate objections including the unilateral<br />

claim that all relevant documents were produced pursuant to the requests. The plaintiffs also<br />

delayed their responses, agreed to comply with requests at an unstated future time <strong>and</strong> abruptly<br />

amended their reply, leading to the defendants’ confusion <strong>and</strong> suspicion. Citing the plaintiffs’<br />

“pattern of apparently calculated ambiguity,” the court ordered the plaintiffs to produce all<br />

responsive documents, except for the properly recorded privileged documents determined on a<br />

good faith basis. The court further ordered the plaintiffs to make the original versions of certain<br />

documents available for inspection.<br />

� High Voltage Beverages, LLC. v. Coca-Cola Co., 2009 WL 2915026 (W.D.N.C. Sept. 8, 2009).<br />

In this trademark infringement litigation, the plaintiff filed a motion to compel 17 gigabytes of data,<br />

which amounted to about 1.5 million pages. The defendant did not object to producing the<br />

documents but argued that a review was unnecessary as it believed every document related to the<br />

merits of the underlying action had already been produced. Applying Fed.R.Civ.P. 26(b)(2)(C)’s<br />

proportionality st<strong>and</strong>ard, the court determined the plaintiff’s request would be unreasonably<br />

duplicative of earlier efforts <strong>and</strong> outweighed its likely benefit because the plaintiff had ample<br />

opportunity to obtain the information, which in all likelihood, it had already obtained. The court<br />

further held that the defendant must extend to the plaintiff’s counsel the opportunity to search data<br />

on the defendant’s computers at the defendant’s place of business.<br />

� Eckhardt v. Bank of America Corp., 2008 WL 1995310 (W.D.N.C. May 6, 2008). In this disability<br />

discrimination litigation, the plaintiff filed a motion for discovery sanctions <strong>and</strong> additional discovery.<br />

The plaintiff alleged the defendant did not fully comply with a previous court order requiring the<br />

defendant to identify the computers used by decision makers in the plaintiff’s employment<br />

termination. The defendant claimed all documents of known locations were produced <strong>and</strong> the<br />

relevancy of the documents of unknown locations had not been established. Finding relevant<br />

documents were not produced, the court allowed the plaintiff to seek documents from the<br />

defendant’s backup tapes of electronically stored material. However, the court did not find that the<br />

defendant acted in bad faith, but rather commented that the discovery problem “highlights the<br />

changing face of discovery in an electronic world.” The court ordered the defendant to pay costs<br />

associated with making its current <strong>and</strong> former employee deponents available.<br />

106


� Eckhardt v. Bank of America, 2008 WL 111219 (W.D.N.C. Jan. 9, 2008). In this wrongful<br />

termination suit based on alleged disability discrimination, the plaintiff filed a motion to compel<br />

responses to several interrogatories <strong>and</strong> document requests. The defendant objected to several of<br />

the plaintiff’s requests claiming the requests did not lead to the production or discovery of relevant<br />

evidence. Disagreeing with the defendant, the court ordered the defendant to certify that a<br />

thorough search was conducted <strong>and</strong> outlining what responsive, but not readily accessible,<br />

documents might be retained in archive form or backup media.<br />

� Orrell v. Motorcarparts of America, Inc., 2007 WL 4287750 (W.D.N.C. Dec. 5, 2007). In this<br />

sexual harassment suit, the plaintiff sought damages alleging sexual harassment, gender<br />

discrimination, hostile work environment <strong>and</strong> wrongful discharge based on receipt of inappropriate<br />

e-mails from co-workers <strong>and</strong> customers. Alleging improper destruction of evidence <strong>and</strong> incomplete<br />

compliance with discovery obligations, the defendant filed a motion to compel seeking production<br />

of the plaintiff’s home <strong>and</strong> work computers <strong>and</strong> an order prohibiting further destruction of evidence.<br />

The plaintiff argued that complying fully with all of the defendant’s requests would create an undue<br />

burden. Agreeing with the defendant, the court determined that the burden to preserve evidence<br />

was not eliminated due to the alleged crashing of the plaintiff’s home computer. The court found<br />

the defendant’s requests to be “reasonably calculated to lead to the discovery of admissible<br />

evidence”, <strong>and</strong> ordered the plaintiff to produce her home computer for forensic examination. The<br />

court also ordered the plaintiff not to further destroy relevant evidence. Additionally, the court<br />

warned the plaintiff that failure to comply may result in sanctions including dismissal of the case<br />

with prejudice <strong>and</strong> payment of the defendant’s attorney’s fees.<br />

� In re Rule 45 Subpoena Issued to Robert K. Kochan, 2007 WL 4208555 (E.D.N.C. Nov. 26,<br />

2007). In this underlying investigation of allegedly fraudulent insurance practices arising from<br />

damages caused by Hurricane Katrina, the plaintiffs served a subpoena on Robert Kochan,<br />

president of the defendant corporation, seeking to image the laptop computer of two corporate<br />

employees. Kochan’s attorney filed written electronic objections to the subpoena following close of<br />

business the evening before the subpoena was to be executed. The next morning, having traveled<br />

from Mississippi <strong>and</strong> New Mexico, the plaintiff’s counsel <strong>and</strong> computer forensic consultant arrived<br />

at the defendant’s office in North Carolina to image the relevant hard drives. The defendant refused<br />

to allow access to the requested information. The plaintiff moved the court for an order compelling<br />

compliance with the subpoena <strong>and</strong> sought to hold Kochan <strong>and</strong> his attorney in contempt of court.<br />

The plaintiff also sought prior <strong>and</strong> future travel expenses. The court found the defendant’s objection<br />

to the subpoena timely as it was technically filed before the specified time for compliance <strong>and</strong><br />

denied the plaintiff’s request to hold the defendant in contempt. However, the court found that the<br />

defendant improperly relied “on bald assertions that the production sought is impermissible” <strong>and</strong><br />

therefore granted the plaintiff’s motion to compel, ordering Kochan to comply with the subpoena by<br />

5 p.m. on the day of the decision.<br />

� Parkdale Am., LLC v. Travelers Cas. <strong>and</strong> Sur. Co. of Am., Inc., 2007 WL 4165247 (W.D.N.C.<br />

Nov. 19, 2007). In this declaratory judgment action, the defendant’s insurance company sought<br />

discovery of documents through several interrogatories <strong>and</strong> requests for production of documents.<br />

The plaintiffs objected to each request asserting that the information prepared in anticipation of<br />

litigation is protected work-product under Fed. R. Civ. P. 26(b)(3). The plaintiffs also contended that<br />

production of electronically stored information would present undue burden <strong>and</strong> cost. The court<br />

ultimately ordered production of e-mail asserting that it may include relevant <strong>and</strong> material evidence<br />

<strong>and</strong> that the plaintiffs failed to meet their burden in establishing inaccessibility. Finding opinion<br />

work-product to be more carefully protected, the court ordered production of all materials not<br />

107


considered opinion work-product. Further, the court ordered production of information revealed to<br />

or discussed in the presence of third parties as it does not fall under work-product protection.<br />

� O’Bar v. Lowe’s Home Centers, Inc., 2007 WL 1299180 (W.D.N.C. May 2, 2007). In this class<br />

action suit, the plaintiffs alleged the defendant engaged in employment discrimination because they<br />

are not females or minorities. Having addressed whether the plaintiffs had st<strong>and</strong>ing to represent a<br />

class, the court determined the time ripe for the parties to begin precertification discovery. The<br />

plaintiffs claimed they were entitled to broad discovery of electronic documents, including e-mail,<br />

relating to all employees, in all positions, in every store owned by the defendant. The defendant<br />

disagreed with this contention. The court held that the plaintiffs could not obtain discovery for every<br />

person employed by the defendant, <strong>and</strong> limited the discovery to managers <strong>and</strong> officers at the<br />

regional, district <strong>and</strong> national level. The court noted that although the precertification discovery was<br />

limited, it was still very broad <strong>and</strong> the court was in “no way condoning or encouraging broad,<br />

unduly burdensome, or irrelevant discovery requests.” The court instructed the parties to construct<br />

a Rule 26(f) discovery plan. Anticipating the potential conflicts of discovering electronically stored<br />

information (ESI), the court ordered the parties to follow the “Suggested Protocol for <strong>Discovery</strong> of<br />

<strong>Electronic</strong>ally Stored Information” as set forth by the United States District Court for the District of<br />

Maryl<strong>and</strong>. The court noted that although these guidelines provide a comprehensive list of ESI<br />

discovery issues, it was not meant to be an inflexible list. Moreover, the court set forth an extensive<br />

list of issues to be addressed by the parties in their joint discovery plan.<br />

� Teague v. Target Corp., 2007 WL 1041191 (W.D.N.C. Apr. 4, 2007). In a gender discrimination<br />

suit, the defendant brought a motion for sanctions against the plaintiff for spoliation of evidence,<br />

specifically seeking dismissal of the suit because the plaintiff disposed of her home computer after<br />

filing an EEOC claim against the defendant. The plaintiff’s home computer contained evidence<br />

relating to her lawsuit against the defendant. The plaintiff claimed that she disposed of her<br />

computer after the hard drive crashed <strong>and</strong> was unable to be repaired by her brother. The court held<br />

that sanctions were appropriate since the computer contained evidence directly related to the<br />

plaintiff’s claims <strong>and</strong> her efforts to mitigate her damages by finding another job after leaving<br />

defendant’s company. The court determined that she disposed of the computer with a “culpable<br />

state of mind” <strong>and</strong> that an adverse inference jury instruction at trial was proper.<br />

� Analog Devices Inc. v. Michalski, 2006 WL 3287382 (N.C. Super. Nov. 1, 2006). In a<br />

misappropriation of trade secrets matter, the defendant compelled the court to order the production<br />

of inaccessible e-mails from over 400 back-up tapes held by the plaintiff. The plaintiff objected<br />

because the production would require an undue burden <strong>and</strong> cost <strong>and</strong> would not likely uncover any<br />

probative e-mail evidence. The court examined five factors using a straightforward application of<br />

North Carolina Rule 26. It also noted the “Guidelines from the Conference of Chief Justices” would<br />

provide the proper legal guidance for e-discovery issues. The court analyzed <strong>and</strong> balanced the<br />

following factors: (1) the burden <strong>and</strong> expense of production; (2) the needs of the case; (3) the<br />

amount in controversy; (4) any limitations on the parties’ resources; <strong>and</strong> (5) the importance of the<br />

issues at stake. The court found the potential for discovery of probative evidence was “too great to<br />

deny Defendants’ motion” <strong>and</strong> the evidence central to the defendants’ case may be uncovered by<br />

the inquiry. However, the court noted the discovery costs were unknown <strong>and</strong> reserved the right to<br />

re-examine any cost-shifting issues until the final costs were determined by the plaintiff. The court<br />

required the parties to equally split the costs of restoration. NOTE: This case is the companion<br />

case to Bank of Amer. Corp. v. SR Int’l Bus. Ins. Co., 2006 WL 3093174 (N.C. Super. Nov. 1,<br />

2006), which the court filed concurrently.<br />

108


� Bank of Amer. Corp. v. SR Int’l Bus. Ins. Co., 2006 WL 3093174 (N.C. Super. Nov. 1, 2006).<br />

The defendants sought deleted e-mails from 400 backup tapes of Marsh, Inc., a broker of the<br />

plaintiff <strong>and</strong> non-party to the litigation. Marsh previously produced over 50,000 e-mail documents<br />

for the litigation but the defendants argued all relevant e-mails may not have been produced.<br />

Marsh argued, as a non-party, the defendant’s request would impose an undue burden <strong>and</strong><br />

expense. Marsh’s expert from <strong>Kroll</strong> <strong>Ontrack</strong> stated such recovery <strong>and</strong> organization could cost as<br />

much as $1.4 million. The defendants argued Marsh may have only produced e-mails responsive<br />

to the subpoena <strong>and</strong> none that related to the claims <strong>and</strong> defenses of the case. The court denied<br />

the defendants’ motion because “such a low level of marginal utility does not justify imposing a<br />

heavy burden on a nonparty … nonparties should not be penalized for having a backup system by<br />

making them produce inaccessible backup data without good cause.” Additionally, the court found<br />

no evidence that Marsh had failed to produce responsive documents or that the requested e-mails<br />

would show anything contrary to the e-mails already produced. NOTE: The court listed this as the<br />

companion case to Analog Devices Inc. v. Michalski, 2006 WL 3287382 (N.C. Super. Nov. 1,<br />

2006), which was filed concurrently by the court.<br />

� Warner Bros. Records, Inc. v. Souther, 2006 WL 1549689 (W.D.N.C. June 1, 2006). In a<br />

copyright infringement case, the plaintiffs accused the defendant of unlawfully downloading <strong>and</strong><br />

distributing copyrighted materials through a peer-to-peer, online media distribution system. After<br />

the defendant failed to provide electronic copies of her computer’s desktop <strong>and</strong> registry files in<br />

response to a production request, the court ordered the defendant to bring the computer to an<br />

evidentiary hearing. At the hearing, the court permitted the plaintiff’s forensic technician to make a<br />

mirror image of the defendant’s computer in the court’s chambers. Issuing a protective order, the<br />

court restricted the plaintiffs from using or disclosing any electronic information obtained from the<br />

computer that was unrelated to the case. The court also reserved the right to issue Rule 37<br />

sanctions against the defendant after having the opportunity to consider the defendant’s computer<br />

skills <strong>and</strong> the reasonableness of her efforts to comply with discovery in light of them.<br />

� Arndt v. First Union Nat’l Bank, 613 S.E.2d 274 (N.C. Ct. App. 2005). In a dispute involving a<br />

contract made between the defendants <strong>and</strong> the plaintiff, the jury awarded the plaintiff over<br />

$830,000 in damages, relying in part on a spoliation instruction. Although the plaintiff had<br />

requested various e-mails <strong>and</strong> profit <strong>and</strong> loss statements relating to the allegations, the defendant<br />

failed to preserve <strong>and</strong> produce these documents. As a result, the trial court had instructed the jury<br />

that, “[e]vidence has been received that tends to show that certain profit <strong>and</strong> loss statements <strong>and</strong><br />

E-mails were in the exclusive possession of the defendant…<strong>and</strong>, [sic] have not been produced for<br />

inspection….From this, you may infer, though you are not compelled to do so, that the profit <strong>and</strong><br />

loss statements <strong>and</strong> the E-mails would be damaging to the defendant.” On appeal, the defendants<br />

argued, inter alia, that the instruction was unfairly prejudicial. The appellate court noted that<br />

testimony from one of the defendants’ employees indicated the defendants were on notice early on<br />

of the plaintiff’s intent to sue but failed to preserve the plaintiff’s e-mails or hard drive. The<br />

employee further testified that no effort was made to save the hard drive even after receiving a<br />

letter from the plaintiff’s counsel about the case. Based on this evidence, the appellate court<br />

determined the trial court did not err in giving the spoliation instruction.<br />

� Evans v. Evans, 610 S.E.2d 264 (N.C. Ct. App. 2005). In a domestic relations dispute, the<br />

defendant contended the trial court erred in admitting sexually explicit e-mails. The defendant<br />

argued the e-mails were illegally intercepted pursuant to a federal statute prohibiting the disclosure<br />

or use of any electronic communication that was intercepted in violation of the <strong>Electronic</strong><br />

Communications Privacy Act (ECPA). The court rejected her argument, noting the ECPA<br />

109


interceptions must occur contemporaneously with transmission. The court further held that the emails<br />

did not fall within that requirement because they “were stored on, <strong>and</strong> recovered from, the<br />

hard drive of the family computer” rather than intercepted at the time of transmission.<br />

� Commissioner v. Ward, 580 S.E.2d 432 (N.C. App. 2003). In this matter, the plaintiffs <strong>and</strong> the<br />

defendants engaged in a long <strong>and</strong> complex discovery battle relating to the protocols for discovery<br />

of both paper <strong>and</strong> electronic documents stored off-site by the defendants. Upon the plaintiffs’ first<br />

motion to compel, the court ordered the defendants to permit the plaintiffs to examine, review <strong>and</strong><br />

copy stored documents <strong>and</strong> make a good faith search for other documents, including all electronic<br />

data on DAT tapes, for inspection <strong>and</strong> review by the plaintiffs. When the defendants failed to<br />

cooperate, the plaintiffs sought a second motion to compel. Prior to the hearing on this second<br />

motion, the parties entered into a consent order which included provisions allowing the plaintiffs to<br />

examine, inspect <strong>and</strong> copy “all information stored in computers, computer hard drives, removable<br />

electronic data storage media, diskettes, magnetic tapes, CD ROMs, zip discs <strong>and</strong> jazz discs” <strong>and</strong><br />

requiring the defendants to produce all backup data <strong>and</strong> describe in writing the process used to<br />

access the data. Again the defendants failed to comply with the consent order in providing the<br />

required electronic information. The plaintiffs then made its third motion to compel <strong>and</strong> sought<br />

sanctions. Finding that the defendants had intentionally <strong>and</strong> willfully refused to comply with<br />

discovery, the trial court sanctioned the defendants by ordering them to produce, at their cost,<br />

copies of the backup tape data. The appellate court affirmed the sanctions.<br />

� DeLoach v. Philip Morris Co., 206 F.R.D. 568 (M.D.N.C. 2002). The plaintiffs sought discovery<br />

sanctions alleging that the defendant’s expert report relied on computerized transaction data that<br />

was deliberately withheld from the plaintiffs during discovery. The discovery request at issue<br />

sought "[a]ll summary documents (including electronic data) relating to your leaf tobacco bids,<br />

purchases, or price paid, including but not limited to the entire Tobinet database in electronic form,<br />

but excluding individual transaction documents such as purchase orders <strong>and</strong> invoices." The<br />

plaintiffs were only provided the database data after the defendant’s expert report was issued (in<br />

which the defendant’s expert relied heavily on this other computerized data). The court held that<br />

the withholding of the data resulted in unfairness to the plaintiffs <strong>and</strong> allowed the plaintiffs to<br />

respond to the report <strong>and</strong> provided no opportunity for the defendant to reply.<br />

� Burroughs v. Barr Lab., Inc., 143 F.R.D. 611 (E.D.N.C. 1992), vacated in part on other grounds<br />

40 F.3d 1223 (Fed. Cir. 1994). The court held that the attorney work product privilege applied to<br />

printed results of computerized database searches.<br />

South Carolina<br />

� Uhlig LLC v. Shirley, 2011 WL 2728445 (D.S.C. July 13, 2011). In this discovery dispute, the<br />

plaintiff moved to impose sanctions <strong>and</strong> modify the forensic examination protocol for the<br />

defendants’ computers <strong>and</strong> peripheral devices. The parties had agreed to the protocol following<br />

numerous interventions by a magistrate judge; however, disputes continued to arise after forensic<br />

experts conducted searches <strong>and</strong> the plaintiffs sought to broaden the scope of discovery. Finding<br />

the plaintiff presented sufficient evidence that the broader scope of e-discovery was warranted, the<br />

court lifted the protocol’s date restrictions <strong>and</strong> agreed that running hash value comparisons<br />

eliminated any need to limit search terms. Finally, the court declined to impose sanctions against<br />

the defendants, who were simply opposing the plaintiffs’ efforts to modify <strong>and</strong> extend a previously<br />

agreed upon discovery protocol.<br />

110


� Morris v. Metals USA, 2011 WL 94559 (D.S.C. Jan. 11, 2011). In this personal injury litigation, the<br />

plaintiff moved for sanctions including the exclusion of a witness <strong>and</strong> videotape from evidence.<br />

Alleging a “trial by ambush,” the plaintiff argued the defendant failed to disclose the identity of a<br />

witness (an investigator) <strong>and</strong> corresponding surveillance videotape until six months after receiving<br />

the interrogatories <strong>and</strong> requests for production, <strong>and</strong> roughly one week prior to the discovery<br />

deadline. The defendant argued production was not required as it intended to use the evidence<br />

solely for impeachment purposes. Analyzing the evidence, the court found the tape could also<br />

serve a substantive purpose as the video showed the plaintiff performing normal daily activities <strong>and</strong><br />

might contradict or diminish the plaintiff’s quality of life claims. Despite a lack of bad faith, the<br />

defendant’s violation of Fed.R.Civ.P. 26(a) <strong>and</strong> (e) was “not substantially justified nor harmless”;<br />

thus, the court prohibited the use of the investigator as a witness <strong>and</strong> the videotape as evidence at<br />

trial, but declined to impose further sanctions.<br />

� Almarri v. Gates, 2008 WL 4449858 (D.S.C. Oct. 2, 2008). In this case, the plaintiff, an enemy<br />

combatant in military custody, requested the court impose a preservation order to preserve<br />

documents related to his detention <strong>and</strong> determine if spoliation occurred. The plaintiff claimed the<br />

government destroyed relevant evidence, did not have a preservation policy <strong>and</strong> that a<br />

preservation order was necessary to prevent further evidence destruction. The defendants claimed<br />

they had issued several preservation directives calling for the retention of evidence pertaining to<br />

the plaintiff <strong>and</strong> that the loss or destruction of certain records was inadvertent. Finding the<br />

defendants’ efforts to be in good faith, the court determined the plaintiff failed to demonstrate that<br />

there was significant risk relevant evidence would be destroyed absent a preservation order,<br />

thereby denying the plaintiff’s motion.<br />

� Koosharem Corp. v. Spec Personnel, LLC, 2008 WL 4458864 (D.S.C. Sept. 29, 2008). In this<br />

breach of contract, inter alia, litigation, the plaintiffs claimed the former employee defendant stole<br />

confidential information <strong>and</strong> used it to exp<strong>and</strong> the business of his current employer. The plaintiff<br />

thus sought production of the defendants’ business <strong>and</strong> personal computers for forensic inspection,<br />

alleging the e-mails produced by the defendants were not accurate copies. The plaintiffs also<br />

argued that electronic documents were modified after the defendants were put on notice of<br />

litigation, noting that the defendants did not make any preservation efforts. Finding forensic<br />

analysis appropriate, the court granted the motion to compel. The court established a detailed<br />

procedure to govern the forensic examination <strong>and</strong> ordered the parties to share equally in the fees,<br />

costs <strong>and</strong> expenses charged by the forensic expert.<br />

� KnifeSource, LLC v. Wachovia Bank, N.A., 2007 WL 2326892 (D.S.C. Aug. 10, 2007). In a suit<br />

alleging common law <strong>and</strong> UCC conversion, the plaintiff motioned the court to compel the<br />

defendant’s production of all bank statements from a specified person who allegedly altered the<br />

payee information on checks to deposit them in her personal account at the defendant’s bank. The<br />

defendant claimed it could not comply with such request, arguing that it did not maintain copies of<br />

the statements <strong>and</strong> therefore such an order would require it to create documents for the sole<br />

purpose of complying with this discovery request. As the defendant merely claimed it did not<br />

maintain physical copies of the requested information, not that it did not have the information, the<br />

court held that it failed to demonstrate the information was not reasonably accessible. The court<br />

ordered the defendant to comply with the request to the extent the information was maintained<br />

electronically.<br />

� Trammell v. Anderson Coll., 2006 WL 1997425 (D.S.C. July 17, 2006). In an employmenttermination<br />

dispute, the defendant moved to quash a subpoena issued to a computer consultant<br />

retained in “anticipation of litigation.” In turn, the plaintiff sought a motion to quash a subpoena<br />

111


equesting “any <strong>and</strong> all electronic storage media including hard drives, zip drives, thumb drives,<br />

CD’s, DVD’s, etc. from <strong>and</strong> pertaining to any computer including desk top computers <strong>and</strong>/or<br />

laptops, used by [the plaintiff] from January 1, 2002 to the present.” Before terminating the plaintiff,<br />

the defendant hired a computer consultant to analyze the plaintiff’s hard drive to determine the<br />

authenticity of certain e-mails. Following this, the defendant retained a computer forensics expert,<br />

<strong>Kroll</strong> <strong>Ontrack</strong> Inc., to create a forensic image of the hard drive, conduct a more thorough<br />

investigation of the computer media, <strong>and</strong> store the hard drive with the defendant’s law firm for<br />

preservation. Although the defendant withheld the computer consultant’s records, the defendant<br />

provided the plaintiff with the more in-depth report by <strong>Kroll</strong> <strong>Ontrack</strong>, insisting the plaintiff conduct its<br />

own forensic analysis if unsatisfied with the investigation. Arguing it had maintained strict chain-ofcustody<br />

procedures, the defendant submitted affidavits stating “there has been no change in the<br />

data or information on the hard drive from the time it was retrieved…to the present.” Finding the<br />

plaintiffs failed to show evidence that information on the hard drive had been altered, the court<br />

granted the defendant’s motion to quash <strong>and</strong> ruled the plaintiffs had not met their burden in<br />

demonstrating substantial need for the computer consultant’s analysis or showing they would suffer<br />

undue hardship in obtaining the relevant information through other means. The court continued by<br />

granting the plaintiff’s motion to quash, noting a party cannot issue a subpoena to another party<br />

under Rule 45, but should have requested production of the plaintiff’s personal computer pursuant<br />

to Rule 34.<br />

� QZO, Inc. v. Moyer, 594 S.E.2d 541 (S.C. Ct. App. 2004). A corporation alleged that the<br />

defendant, a former officer <strong>and</strong> shareholder of the corporation, violated state trade secret laws by<br />

planning to compete with the corporation. The corporation requested the defendant turn over a<br />

computer, which allegedly contained evidence of the defendant’s plans to compete. The trial court<br />

granted a temporary restraining order (TRO) directing the defendant to h<strong>and</strong> over the computer to<br />

the corporation or to a neutral third party. The defendant waited until seven days after the TRO was<br />

issued to deliver the computer to the corporation. After receiving the computer, the corporation<br />

hired a computer expert to inspect <strong>and</strong> retrieve any potential evidence from the computer’s hard<br />

drive. The expert discovered the hard drive had been reformatted a day before the defendant<br />

delivered the computer to the corporation, which erased any evidence that may have been on the<br />

computer. The corporation requested sanctions in the form of a default judgment against the<br />

defendant for intentionally violating the TRO. The trial court granted the corporation’s motion for<br />

sanctions <strong>and</strong> entered the default judgment in favor of the corporation. The defendant appealed<br />

stating that the evidence was insufficient to support such severe sanctions. On appeal, the<br />

appellate court affirmed the trial court’s judgment, determining that the sanctions were not too<br />

severe.<br />

West Virginia<br />

� Hanson v. First Nat’l Bank, 2011 WL 5201430 (S.D.W. Va. Oct. 31, 2011).<br />

In this case, the plaintiff sought production of a defendant-employee’s e-mails with his attorney.<br />

The plaintiff contended that the employer’s data policy, which stated that employee e-mails were<br />

not confidential <strong>and</strong> were subject to review, constituted a waiver of any existing attorney-client<br />

privilege. The defendant, while conceding awareness of the policy, tried to show that he<br />

nonetheless believed the e-mails were confidential by relying on a different section of the policy.<br />

The relevant section provided that other employees should regard messages as confidential <strong>and</strong><br />

accessible only by the intended recipient. Noting that the defendant’s reliance was misplaced as it<br />

112


did not address the employer’s ability to review the e-mail, the court held that the defendant’s<br />

knowledge of the policy waived the attorney-client privilege.<br />

� Mt. Hawley Ins. Co. v. Felman Prod., Inc., 2010 WL 1990555 (S.D.W.Va. May 18, 2010). In this<br />

insurance claim dispute, the defendants argued the plaintiff waived privilege following the<br />

inadvertent disclosure of privileged documents during discovery, including an alleged “smoking<br />

gun” e-mail. The defendant claimed the plaintiff failed to take reasonable precautions to prevent<br />

inadvertent disclosure, citing the nearly 980 attorney-client communications that were produced,<br />

<strong>and</strong> argued the plaintiff failed the five-factor Victor Stanley test. In response, the plaintiff argued the<br />

disclosure occurred due to an undetermined error in the vendor’s software. Despite citing<br />

numerous steps the plaintiff undertook to prevent disclosure <strong>and</strong> the existence of a clawback<br />

agreement, the court found the plaintiff failed to perform critical quality control sampling <strong>and</strong><br />

concluded the plaintiff did not take reasonable steps to prevent disclosure. As such, the efforts did<br />

not satisfy Fed.R.Evid. 502(b) <strong>and</strong> privilege was waived. In making its decision, the court also<br />

noted the e-mail was “a bell which cannot be unrung,” which influenced the defendants’ discovery<br />

requests <strong>and</strong> deposition questions.<br />

Maryl<strong>and</strong><br />

� Victor Stanley, Inc. v. Creative Pipe, Inc., <strong>Case</strong> 8:06-cv-02662-MJG (D. Md. June 15, 2011). In<br />

this ongoing intellectual property litigation, the court reviewed Magistrate Judge Grimm’s order<br />

requiring the defendant to pay $1,049,850.04 in attorney fees <strong>and</strong> costs as a monetary sanction for<br />

its egregious spoliation. The defendant objected to the amount of the award on the grounds that it<br />

exceeded the st<strong>and</strong>ard set by the court because the cost tabulations included discovery conducted<br />

before the spoliation could affect the plaintiff. Rejecting the defendant’s general objections that the<br />

sanctions included fees <strong>and</strong> costs completely unrelated to the spoliation, the court also noted that<br />

the defendant’s bad behavior began before the first set of depositions <strong>and</strong> impacted the discovery<br />

process from that point forward, as Judge Grimm had previously concluded. Furthermore, the court<br />

found the plaintiff’s counsel made a good faith effort to conservatively allocate the costs to the<br />

spoliation. Finding the recommended award was only for those fees <strong>and</strong> costs reasonably flowing<br />

from the defendants’ spoliation, the court adopted Judge Grimm’s order <strong>and</strong> directed the<br />

defendants to pay the $571,440.12 balance of the sanction within 30 days.<br />

� Griffin v. State, 2011 WL 1586683 (Md. Apr. 28, 2011). In this criminal case, the state’s highest<br />

court granted the convicted defendant’s petition for a writ of certiorari to review the trial judge’s<br />

decision (affirmed on appeal) to admit electronic evidence obtained from a MySpace profile. Noting<br />

that the required level of authentication required for social networking site evidence was a question<br />

of first impression, the court held that the potential for manipulation in this context required greater<br />

scrutiny of the foundational authentication requirements than that of traditional records. Because<br />

the authentication of key electronic evidence based upon a picture, birth date <strong>and</strong> residence<br />

location alone provided an inadequate foundation, the court found the trial court committed<br />

reversible error, overturned the conviction <strong>and</strong> rem<strong>and</strong>ed for a new trial. However, the court<br />

suggested that testimony from the purported creator, a search of her computer or information<br />

obtained directly from the social networking website could suffice to authenticate electronic<br />

evidence.<br />

� Océ N. Am., Inc. v. MCS Servs., Inc., 2011 WL 197976 (D. Md. Jan. 20, 2011). In this intellectual<br />

property litigation, the plaintiff sought forensic images of flash (or thumb) drives alleged to contain<br />

copies of its proprietary software. Pursuant to an agreement among the parties, a neutral third<br />

113


party expert created the forensic images <strong>and</strong> subsequently destroyed the original drives. Opposing<br />

the motion, the defendant claimed the plaintiff requested the drives themselves – not the forensic<br />

images – <strong>and</strong> that the parties’ agreement limited the scope of e-discovery. Rejecting the<br />

defendant’s arguments, the court noted that parties have a continuing obligation to supplement<br />

discovery responses. Further, because the forensic images of the thumb drives contained the<br />

exact same information as the original media, the images were discoverable. Finally, the court<br />

found the agreement did not express a specific intention to limit discovery <strong>and</strong> found no compelling<br />

reason to deny the plaintiff access to this important information.<br />

� Victor Stanley, Inc. v. Creative Pipe, Inc., <strong>Case</strong> 8:06-cv-02662-MJG (D. Md. Jan. 24, 2011). In<br />

this ongoing intellectual property litigation, the parties disputed the amount of reasonable attorneys’<br />

fees <strong>and</strong> costs to be paid by the defendants as a sanction for intentional spoliation of evidence <strong>and</strong><br />

other egregious misconduct during discovery. The plaintiff sought $936,503.75 in attorneys’ fees<br />

<strong>and</strong> $148,297.04 in costs, while the defendants previously were ordered to pay $337,796.37.<br />

Noting that willful spoliation “taints the entire discovery <strong>and</strong> motions practice,” the court refused the<br />

defendants’ “shotgun approach” to narrow the costs sought. Concluding that $901,553 was the<br />

reasonable amount of the plaintiff’s attorneys’ fees, the court found that the “‘time <strong>and</strong> labor<br />

required’ to address Defendants’ spoliation was commensurate with the magnitude of the spoliation<br />

itself.” The court also awarded the proposed costs, including the expense of hiring a computer<br />

forensic consultant. In total, the court ordered the defendants to pay $1,049,850.04, with the<br />

balance of $712,053.67 due in 30 days.<br />

� Huggins v. Prince George’s County, Maryl<strong>and</strong>, 2010 WL 4484180 (D. Md. Nov. 9, 2010). In this<br />

civil rights litigation, the plaintiff sought to modify a previously denied motion for spoliation<br />

sanctions, alleging a key county administrator’s e-mail account had been deleted <strong>and</strong> purged in<br />

violation of its preservation obligations. Reviewing the magistrate judge’s original findings, the court<br />

agreed that the duty to preserve did not arise until a year after the administrator’s employment<br />

ended <strong>and</strong> six months after his account was deleted in accordance with the county’s st<strong>and</strong>ard<br />

operating procedure. Despite the fact that the administrator was a “key player” in the litigation, the<br />

court affirmed the absence of a culpable state of mind as the e-mail account was deleted “pursuant<br />

to a neutral policy” when no preservation duty existed. Finally, the court found that because the<br />

administrator’s involvement was peripheral, the damage from losing his e-mails was “de minimis in<br />

light of all available evidence” – a finding supported by the plaintiff’s failure to reference him in the<br />

original action despite awareness of his role. Accordingly, the court denied the motion for<br />

sanctions.<br />

� Victor Stanley, Inc. v. Creative Pipe, Inc., <strong>Case</strong> 8:06-cv-02662-MJG (D. Md. Nov. 1, 2010). In<br />

this intellectual property litigation, the defendants appealed Magistrate Judge Grimm’s order from<br />

September 9, 2010 holding the defendant President in contempt of court <strong>and</strong> ordering a two-year<br />

imprisonment unless <strong>and</strong> until attorney fees <strong>and</strong> costs were paid. Agreeing with Judge Grimm’s<br />

recommendation, the court adopted the decision except as to the order for imprisonment. Declining<br />

to address the possibility of referral for criminal prosecution at this time, the court found it<br />

inappropriate to order incarceration for the possible future failure to comply with an as-yetundetermined<br />

payment obligation. The court ordered the defendants to pay $337,796.37 by the<br />

end of the week, constituting the minimum amount of sanctions imposed, <strong>and</strong> referred to Judge<br />

Grimm the matter of determining any additional amount payable. In the event this payment was not<br />

made, the defendants would be required to appear in court to show cause why they should not be<br />

held in civil contempt for their failure to comply with the order, <strong>and</strong> additional failures may permit a<br />

warrant for the defendant President’s arrest.<br />

114


� Mezu v. Morgan State Univ., 2010 WL 4183680 (D. Md. Oct. 22, 2010). In this Family Leave <strong>and</strong><br />

Medical Act litigation, the parties filed multiple cross-motions including the plaintiff’s motions to<br />

compel <strong>and</strong> extend discovery <strong>and</strong> the defendant’s motion for terminating sanctions. Finding that<br />

counsel for both parties exhibited a “substantial disregard” of the federal <strong>and</strong> local rules <strong>and</strong><br />

guidelines, the court temporarily halted the filing of additional discovery motions, denied all pending<br />

motions <strong>and</strong> set discovery guidelines going forward. Citing an affirmative duty to cooperate, the<br />

court admonished counsel for filing a “barrage” of motions <strong>and</strong> countermotions, which<br />

demonstrated counsels’ intent “to use this Court as a trampoline on which to exercise their mutual<br />

animosity” in violation of Fed.R.Civ.P. 26(g)(1). In an effort to end the discovery “grudge match,”<br />

the court suspended all discovery motion filings until he was convinced that discovery was<br />

proceeding appropriately. To facilitate this process, both parties were ordered to submit a written<br />

verification that they carefully read the Federal Rules of Civil Procedure, the Local Rules, the<br />

<strong>Discovery</strong> Guidelines of the District of Maryl<strong>and</strong> <strong>and</strong> the Mancia v. Mayflower Textile Services<br />

opinion. The court also ordered the parties to engage in an in-person, recorded meet <strong>and</strong> confer<br />

session to cooperatively resolve existing disputes <strong>and</strong> develop a joint discovery plan.<br />

� Victor Stanley, Inc. v. Creative Pipe, Inc., 2010 WL 3703696 (D. Md. Sept. 9, 2010). In this<br />

intellectual property litigation, the plaintiff sought terminating <strong>and</strong> other sanctions arising out of the<br />

defendants’ intentional spoliation of evidence <strong>and</strong> other litigation misconduct. The plaintiff identified<br />

eight discrete preservation failures, including the president of the defendant company’s use of<br />

wiping software, failure to implement a litigation hold <strong>and</strong> failure to preserve an external hard drive,<br />

files <strong>and</strong> e-mails following the plaintiff’s dem<strong>and</strong>s <strong>and</strong> multiple court orders. Calling this a case of<br />

the "gang that couldn’t spoliate straight," Judge Grimm remarked that through four years of<br />

discovery, the defendant president had actual knowledge of his duty to preserve, yet delayed <strong>and</strong><br />

misrepresented the completeness of the ESI production <strong>and</strong> deleted, destroyed <strong>and</strong> otherwise<br />

failed to preserve evidence. The Judge stated that these failures "collectively constitute the single<br />

most egregious example of spoliation [that he has] encountered in any case … in nearly fourteen<br />

years on the bench." Following a thorough discussion of preservation st<strong>and</strong>ards <strong>and</strong> spoliation<br />

laws among the Circuits, including in Pension Committee <strong>and</strong> Rimkus Consulting Group, Judge<br />

Grimm issued a default judgment for the copyright claim only <strong>and</strong> held that the defendant president<br />

pervasively <strong>and</strong> willfully violated court orders in civil contempt of court, ordering him to be<br />

imprisoned for up to two years, or until he paid the attorneys’ fees <strong>and</strong> costs – estimated to be a<br />

"significant amount."<br />

� Griffin v. State, 2010 WL 2105801 (Md.App. May 27, 2010). In this criminal case, the defendant<br />

appealed his murder <strong>and</strong> h<strong>and</strong>gun convictions, arguing the court erred in admitting a printed<br />

MySpace page into evidence, as it was not properly authenticated <strong>and</strong> was prejudicial. Given that a<br />

MySpace personal profile contains content supplied by the site’s individual users, the State<br />

contended that the identifying information in the page’s content sufficiently linked the page to the<br />

person because it included the person’s photograph, date of birth, references to the person’s<br />

children <strong>and</strong> the defendant’s nickname. Agreeing with the State, the court held that even with<br />

pseudonymous <strong>and</strong> anonymous profile names, individualized content on social networking sites<br />

“may lend itself to authentication of a particular profile page as having been created by the person<br />

depicted in it.” The court also denied the defendant’s argument regarding the prejudicial effect of<br />

the evidence, citing the trial court’s redaction of irrelevant evidence from the profile <strong>and</strong> the limiting<br />

instruction given to the jury.<br />

� Goodman v. Praxair Servs., Inc., 2009 WL 1955805 (D. Md. July 7, 2009). In this breach of<br />

contract dispute, the plaintiff, a pro se litigant, sought spoliation sanctions alleging the defendant<br />

115


failed to issue litigation holds <strong>and</strong> preserve relevant evidence, destroyed employees’ computers<br />

<strong>and</strong> failed to search disaster recovery tapes. The defendant argued a litigation hold was properly<br />

issued, there was no duty to preserve employees’ computers, the plaintiff’s motion was untimely<br />

<strong>and</strong> the plaintiff failed to provide proof regarding the disaster recovery tapes claim. Despite finding<br />

the plaintiff brought his motion for spoliation more than five months after discovery’s conclusion,<br />

the court denied the defendant’s argument that the motion was untimely because the dispositive<br />

motions had not yet been ruled on. The court then determined that the duty to preserve arose<br />

when the plaintiff sent a letter informing the defendant that he had consulted attorneys regarding<br />

the matter. Next, the court held that the defendant failed to issue litigation holds to key players <strong>and</strong>,<br />

as a result, three computers were discarded in violation of the preservation duty. The court<br />

determined that, while the defendant did not act in bad faith, it acted willfully when it intentionally<br />

destroyed the computers <strong>and</strong> e-mails. Finding only one of the destroyed computers contained<br />

relevant evidence, the court issued an adverse jury instruction for the evidence contained on that<br />

particular computer. Finally, the court allowed the plaintiff to compile a list of expenses incurred in<br />

filing the instant motion, excluding attorney’s fees because the plaintiff was pro se.<br />

� Williams v. Long, 2008 WL 4848362 (D.Md. Nov. 7, 2008). In this employment compensation<br />

dispute, the plaintiffs filed for conditional class action certification <strong>and</strong> submitted several affidavits<br />

<strong>and</strong> printed webpages from official websites, consisting of case search results <strong>and</strong> a copy of a<br />

similar complaint in support of the motion. Citing Lorraine v. Markel Am. Ins. Co., Magistrate Judge<br />

Paul W. Grimm stated that accepting electronically stored information as evidence implicates a<br />

series of “evidentiary hurdles” that must be cleared, including relevancy <strong>and</strong> authenticity.<br />

Magistrate Judge Grimm held that since the webpages were printed from government websites,<br />

they were self-authenticating, “official publications,” <strong>and</strong> thus clear the authentication hurdle.<br />

Finding the webpages authentic <strong>and</strong> relevant to the issue of class certification, the court turned to<br />

the issue of hearsay. Finding that the requirements for the hearsay exception for public records<br />

were met, the court granted the plaintiffs motion to conditionally certify the class.<br />

� Mancia v. Mayflower Textile Servs. Co., 2008 WL 4595175 (D.Md. Oct. 15, 2008). In this<br />

collective employment action, the plaintiffs raised issues regarding numerous discovery <strong>and</strong><br />

supplemental interrogatory requests. The defendants objected to these requests with, “boilerplate,<br />

non-particularized objections.” Frustrated with the party’s inability to approach discovery<br />

responsibly, Chief Magistrate Judge Paul W. Grimm scheduled an in-court hearing to discuss the<br />

discovery violations <strong>and</strong> issued this opinion to explain concerns <strong>and</strong> instruct counsel on how to<br />

reach resolution. Judge Grimm stated that the failure to abide by Rule 26(g), requiring<br />

particularized facts for a discovery objection, was one reason for the excessive costs of discovery.<br />

He also stated that, “discovery must be initiated <strong>and</strong> responded to responsibly, in accordance with<br />

the letter <strong>and</strong> spirit of the discovery rules, to achieve a proper purpose, <strong>and</strong> be proportional to what<br />

is at issue in the litigation, <strong>and</strong> if it is not, the judge is expected to impose appropriate sanctions to<br />

punish <strong>and</strong> deter.” Due to the lack of record establishing an estimated amount in controversy, the<br />

court ordered the parties to meet <strong>and</strong> confer in good faith to: estimate a likely range of provable<br />

damages to quantify a “discovery budge” that is proportional to what is at stake in the case, discuss<br />

the additional discovery sought by the plaintiffs <strong>and</strong> attempt to reach an agreement, <strong>and</strong> provide<br />

the court with a status report indentifying any unresolved issues.<br />

� P<strong>and</strong>ora Jewelry, LLC v. Chamilia, LLC, 2008 WL 4533902 (D.Md. Sept. 30, 2008). In this<br />

dispute alleging multiple violations of the Lanham Act, the plaintiff sought sanctions, asserting the<br />

defendant engaged in discovery abuses <strong>and</strong> spoliation. The defendant claimed they were unable to<br />

provide the communications at issue, possibly due to their e-mail retention policy, but claimed that<br />

116


any such information was irrelevant. The defendant also argued the plaintiff was unable to<br />

establish the elements of their claims <strong>and</strong> sought summary judgment. The court agreed with the<br />

defendant <strong>and</strong> granted its motion for summary judgment, but also found the defendant abused the<br />

discovery process by failing to timely or fully respond to the plaintiff’s production request <strong>and</strong><br />

deposition notice. Unwilling to ignore the defendant’s “stonewalling” of the discovery process, the<br />

court imposed monetary sanctions by awarding the plaintiff reasonable costs associated with<br />

bringing the motion at issue. However, the court was unwilling to impose spoliation sanctions as<br />

the plaintiff was unable to offer concrete proof that any lost information would have been relevant<br />

or supported its claims.<br />

� Victor Stanley, Inc. v. Creative Pipe, Inc., 2008 WL 2221841 (D. Md. May 29, 2008). In this<br />

copyright infringement case, the plaintiff sought a ruling that 165 electronic attorney-client<br />

privileged <strong>and</strong> work-product protected documents produced in discovery were discoverable. The<br />

plaintiff claimed privilege was waived because the defendants failed to conduct a reasonable<br />

privilege review prior to production. The defendants claimed the waiver of privilege was<br />

inadvertent, since they conducted a reasonable search using seventy keyword search terms to<br />

review potentially discoverable documents. Noting “all keyword searches are not created equal”,<br />

the court used the intermediate test mentioned in Hopson v. Mayor of Baltimore balancing several<br />

factors to determine whether the waiver of privilege was inadvertent. Determining the defendants<br />

did not take reasonable precautions to prevent inadvertent disclosure, the court found the<br />

defendants waived their privilege. Additionally, the court noted several measures could have<br />

helped prevent this waiver, including the usage of a clawback (or other non-waiver) agreement the<br />

defendants voluntarily ab<strong>and</strong>oned <strong>and</strong>/or complying with the Sedona Conference Best Practices<br />

for use of search <strong>and</strong> information retrieval.<br />

Lorraine v. Markel Am. Ins. Co., 2007 WL 1300739 (D. Md. May 4, 2007). In this action, the<br />

plaintiffs brought suit to enforce an arbitrator’s award determining that damages to their yacht were<br />

the result of a lightning strike <strong>and</strong> motioned the court to award a judgment of $36,000. The<br />

defendant’s insurer counterclaimed, seeking to enforce part of the arbitrator’s award which<br />

concluded that damages were limited to $14,100. Both parties filed cross-motions for summary<br />

judgment but each party failed to support their motions with admissible evidence as required under<br />

the Rules of Evidence. Specifically, both parties offered copies of e-mail as parol evidence which<br />

were attached as exhibits to the summary judgment motions <strong>and</strong> not authenticated properly. The<br />

magistrate judge dismissed both parties’ summary judgment motions without prejudice to allow<br />

resubmission with proper evidentiary support. The magistrate observed that unauthenticated emails<br />

are a form of computer generated evidence that pose evidentiary issues. The magistrate<br />

stated the admissibility of ESI as evidence is determined by “a collection of evidence rules that<br />

present themselves like a series of hurdles to be cleared by the proponent of the evidence.” He<br />

found there were “five distinct but interrelated evidentiary issues that govern whether electronic<br />

evidence will be admitted into evidence.” The five issues may not apply to every exhibit, but the<br />

magistrate held that each must be considered. The magistrate held that ESI must be 1) relevant, 2)<br />

authentic, 3) not hearsay or admissible hearsay, 4) the “best evidence”, <strong>and</strong> 5) not unduly<br />

prejudicial before it can be found to be admissible evidence. Regarding the five issues, the<br />

magistrate found the parties’ e-mail exhibits were relevant to the suit. However, both parties failed<br />

to authenticate the e-mail exhibits because they “simply attached the exhibits” <strong>and</strong> the “complete<br />

absence of authentication stripped the exhibits of any evidentiary value because the Court could<br />

not consider them as evidentiary facts.” Additionally, the magistrate found that the parties failed to<br />

address the last three hurdles of admissibility. They did not resolve any potential hearsay issues<br />

117


that were likely to arise, nor did they comply with the original writing requirement or demonstrate<br />

the absence of unfair prejudice. After explaining the legal st<strong>and</strong>ard for each step of ESI<br />

admissibility, the magistrate stated “it can be expected that electronic evidence will constitute<br />

much, if not most, of the evidence used in future motions practice or at trial, [<strong>and</strong>] counsel should<br />

know how to get it right on the first try.”<br />

� Quotient, Inc. v. Toon, 2005 WL 4006493 (Md. Cir. Ct. Dec. 23, 2005). In a breach of contract<br />

suit, the plaintiff alleged that the defendant, while in plaintiff’s employ, provided a former employee<br />

access to the plaintiff’s computer system so that the former employee could obtain trade secrets<br />

<strong>and</strong> confidential information. In order to preserve potentially relevant email evidence on the<br />

defendant’s personal computer, the plaintiff filed an emergency motion for expedited discovery.<br />

The plaintiff offered to pay for a computer expert to make a mirror image of the defendant’s<br />

computer <strong>and</strong> stipulated that the contents could be sealed until further court order. In granting the<br />

emergency motion, the court found a “substantial probability” that relevant electronic evidence,<br />

including e-mails <strong>and</strong> instant messages, “could be made less accessible to the parties merely by<br />

the defendant’s normal course of computer use, regardless of his intentions <strong>and</strong> motive.” The court<br />

observed, where “the unintentional destruction of relevant evidence should be halted when it can<br />

be done so in a fashion that is minimally intrusive <strong>and</strong> where [the other party] is willing to bear the<br />

full cost of the process.” Citing the Sedona Principles, the court granted the emergency order,<br />

finding, in certain circumstances, preservation orders may aid the discovery process, by promoting<br />

efficiency <strong>and</strong> by specifying the parties’ preservation obligations. The court requested that the<br />

defendant’s lawyers screen the computer data for privacy, privilege, <strong>and</strong> relevancy issues before<br />

disclosing the contents to the plaintiffs.<br />

� Hopson v. Mayor <strong>and</strong> City Council of Baltimore, 232 F.R.D. 228 (D.Md. 2005). In an action<br />

based on racial discrimination allegations, the plaintiffs requested hard copy <strong>and</strong> electronic records<br />

<strong>and</strong> issued interrogatories with questions “specifically designed to discover the nature, extent, <strong>and</strong><br />

location of electronically stored records, the [d]efendants’ IT capabilities, the nature of archived<br />

data, e-mail, <strong>and</strong> records retention policies.” Based on concerns about performing pre-production<br />

privilege review, the defendant claimed undue burden <strong>and</strong> expense. Referencing the proposed<br />

Federal Rules of Civil Procedure amendments, the court declared that both parties had a duty to<br />

negotiate a reasonable discovery plan <strong>and</strong> present the plan to the court. The court asserted, “[t]he<br />

days when the requesting party can expect to ‘get it all’ <strong>and</strong> the producing party to produce<br />

whatever they feel like producing are long gone…electronic discovery is not played on a level field.<br />

The plaintiff typically has relatively few electronically stored records, while the defendant often has<br />

an immense volume of it. In such cases, it is incumbent upon the plaintiff to have reasonable<br />

expectations as to what should be produced by the defendant.” The court ordered the parties to<br />

meet <strong>and</strong> confer within 30 days about e-discovery matters, including discovery scope <strong>and</strong> issues<br />

relating to privilege review. After that meeting, the court indicated it would conduct a follow-up<br />

hearing to discuss those issues.<br />

� Broccoli v. Echostar Communications Corp., 229 F.R.D. 506 (D. Md. 2005). In an employment<br />

discrimination case, the plaintiff filed a motion for sanctions against the defendants for failing to<br />

preserve electronic documents <strong>and</strong> for spoliating e-mail evidence. Citing Zubulake, the court<br />

addressed the defendants’ duty to preserve e-mails <strong>and</strong> other relevant documents. The evidence<br />

showed the defendants were on notice of the lawsuit long before they halted their data destruction<br />

policy. In fact, the defendants admitted they never issued a company-wide instruction regarding<br />

suspension of their data destruction policy <strong>and</strong> they did not save the plaintiff’s e-mails relating to<br />

the harassment incidents or his termination. Based on this evidence, the court granted the<br />

118


plaintiff’s motion for sanctions <strong>and</strong> issued an adverse inference jury instruction relating to spoliation<br />

of the e-mails. The court declared the defendants acted in bad faith by failing to suspend their email<br />

<strong>and</strong> data destruction policy <strong>and</strong> by failing to preserve essential personnel documents in order<br />

to comply with their preservation obligations. The court further stated, “Given [the defendants’]<br />

status as a large public corporation with ample financial resources <strong>and</strong> personnel management<br />

know-how, the court finds it indefensible that such basic personnel procedures <strong>and</strong> related<br />

documentation were lacking.”<br />

� MMI Prods., Inc. v. Long, 2005 WL 757073 (D.Md. Apr. 1, 2005), rev’d, 231 F.R.D. 215 (D.Md.<br />

2005). Alleging a former employee misappropriated confidential company information, the plaintiff<br />

hired a computer forensic expert to analyze the employee’s hard drive. The plaintiff’s expert<br />

concluded, “there was an attempt to overwrite data through a selective restoration from previous<br />

backup session or a reinstallation of Microsoft Windows 2000.” In defending the action, the<br />

employee hired a <strong>Kroll</strong> <strong>Ontrack</strong> computer forensic expert to examine the plaintiff expert’s report.<br />

The <strong>Kroll</strong> <strong>Ontrack</strong> expert discovered a Dell computer support Web site listing the laptop as having<br />

been shipped to the plaintiff after the date the plaintiff’s expert concluded the restoration activity<br />

might have taken place. The <strong>Kroll</strong> <strong>Ontrack</strong> expert also concluded any deletions or overwrites<br />

resulted from normal processes, not efforts by a user to delete information. Finally, the <strong>Kroll</strong><br />

<strong>Ontrack</strong> expert noted the laptop had been imaged by the plaintiff’s expert after at least two<br />

sessions of non-forensic access while the plaintiff’s lawyers had control of the laptop. A magistrate<br />

judge proposed the plaintiff <strong>and</strong> its counsel pay <strong>Kroll</strong> <strong>Ontrack</strong>’s costs as a sanction for failing to<br />

make reasonable inquiries into the reliability of their own expert’s report. Although the court found<br />

no error with the magistrate’s factual findings, it declined to award costs <strong>and</strong> concluded attorneys<br />

should not be sanctioned for deficiencies or errors in an expert’s report.<br />

� Weaver v. Zenimax Media, Inc., 2004 WL 2755852 (Md. Cir. Ct. Sept. 3, 2004). An employer<br />

brought a motion for sanctions against a former employee, claiming the employee’s egregious<br />

discovery conduct warranted dismissal of the suit. The employee confessed under oath that he had<br />

accessed, searched, printed, <strong>and</strong> reviewed e-mails from the computers of company executives<br />

without permission, in an attempt to find information relevant to his personal interests. The court<br />

evaluated five factors in determining if dismissal was warranted: (1) the employee’s willfulness,<br />

wrongfulness <strong>and</strong> bad faith; (2) the relationship between the misconduct <strong>and</strong> the issues in the<br />

case; (3) the amount of prejudice the employee’s actions caused the employer; (4) the promotion<br />

<strong>and</strong> safeguarding of judicial administration versus the importance of resolving disputes on the<br />

merits; <strong>and</strong> (5) the likelihood that a lesser sanctions would deter the behavior. After weighing these<br />

factors, the court determined the employee “engaged in a systematic, calculated, <strong>and</strong> months-long<br />

scheme to obtain an advantage in a litigation that he planned to file <strong>and</strong> pursue” by scanning <strong>and</strong><br />

printing the e-mails without authorization. The court granted the motion for sanctions <strong>and</strong><br />

dismissed the complaint.<br />

� LeJeune v. Coin Acceptors, Inc., 849 A.2d 451 (Md. 2004). In a case involving the violation of a<br />

state trade secrets act, an employer alleged that a former employee copied proprietary electronic<br />

documents from his work laptop to a compact disc (CD), shortly before he went to work for a<br />

competitor. The employee stated that, for the sake of simplicity <strong>and</strong> because he did not know how<br />

to save individual files onto a CD, he had transferred his entire “My Documents” folder, which<br />

contained personal files such as his wedding photographs, <strong>and</strong> inadvertently captured some of his<br />

former employer’s confidential business documents. The employer’s computer forensics expert<br />

refuted the employee’s claims, testifying that a file, which was not contained in the “My Documents”<br />

folder, was also copied to the CD. The expert also determined that the employee had attempted to<br />

119


hide the document transfer by deleting information about the downloads from the laptop. Based on<br />

this evidence, the appellate court affirmed the lower court’s finding that the evidence supported a<br />

finding of trade secret misappropriation.<br />

� Attorney Grievance Comm’n of Maryl<strong>and</strong> v. Potter, 844 A.2d 367 (Md. 2004). The court<br />

considered a Petition for a Disciplinary Action filed by the Attorney Grievance Commission against<br />

the defendant, an attorney, for violating the Maryl<strong>and</strong> Rules of Professional Conduct. Upon<br />

resigning from a law firm, the defendant took paper files pertaining to two clients of the firm stating<br />

that he believed that the clients would choose to have the defendant continue to represent them.<br />

Additionally, the defendant deleted the client files from the firm’s computer without authorization<br />

from the firm. The computer records included all documents prepared by the defendant <strong>and</strong> the<br />

firm’s secretaries relating to matters involving the clients. The Commission sought suspension of<br />

the attorney’s license alleging that the defendant committed “a criminal act that reflects adversely<br />

on the lawyer’s honesty, trustworthiness or fitness as a lawyer in other respects.” The judge<br />

appointed to hear the initial action held that the defendant did not violate the Code. However, the<br />

court of appeals reversed, finding by “clear <strong>and</strong> convincing evidence” that the defendant’s conduct<br />

in deleting the files violated the Rules of Professional Conduct. The court further noted,<br />

“[n]otwithst<strong>and</strong>ing the attorney’s motive, lawyers in this State may not delete computer records or<br />

take client files…without authorization.” The court concluded that the defendant’s misconduct<br />

warranted a 90 day suspension from the practice of law.<br />

� Thompson v. United States, 219 F.R.D. 93 (D.Md. 2003). The plaintiffs served upon the<br />

defendants a series of Rule 34 document production requests seeking electronic records <strong>and</strong> email.<br />

When the defendants failed fully to produce these records, the plaintiffs filed a motion seeking<br />

sanctions. The court issued Rule 37(b)(2) relief to the plaintiffs by ruling that the defendants could<br />

not call certain witnesses unless they were able to demonstrate that there were no responsive email<br />

records generated or received by the witness or, if such records did exist, that they had been<br />

produced to the plaintiffs by a certain date. Long after the discovery cutoff deadline <strong>and</strong> the court’s<br />

sanction order, the defendant announced that it had discovered 80,000 e-mail records, after having<br />

repeatedly told the plaintiff <strong>and</strong> the court that e-mail records either did not exist or already had<br />

been produced. The court revised its previous sanction order, (1) precluding the defendants from<br />

introducing into evidence any of the 80,000 e-mails that were "discovered" at the last minute; (2)<br />

ordering that counsel for the defendants were forbidden to use any of these e-mails to prepare any<br />

of their witnesses for testimony at trial, <strong>and</strong> that at trial counsel for the defendants were forbidden<br />

from attempting to refresh the recollection of any of their witnesses by using any of the undisclosed<br />

e-mails; (3) ordering that the plaintiffs were permitted to use any of the 80,000 e-mails during their<br />

case <strong>and</strong> in cross-examining any of the defendants witnesses; (4) ordering that, if the plaintiffs<br />

incurred any additional expense <strong>and</strong> attorney’s fees in connection with reviewing the 80,000<br />

records <strong>and</strong> analyzing them for possible use at trial, this could be recovered from the defendants<br />

upon further motion to the court; <strong>and</strong> (5) ordering that if, at trial, the evidence revealed additional<br />

information regarding the non-production of e-mail, the plaintiffs were free to make a motion to the<br />

court that the failure to produce e-mail records as ordered by this court constituted a contempt of<br />

court.<br />

Virginia<br />

� Global Aerospace, Inc. v. L<strong>and</strong>ow Aviation, L.P., No. CL 61040 (Vir. Cir. Ct. April 23, 2012). In<br />

this state-level consolidated case arising out of the collapse of three hangars during a snowstorm<br />

120


at Dulles airport, the defendants filed a motion for a protective order approving the use of predictive<br />

coding in processing <strong>and</strong> producing their own ESI. In their memor<strong>and</strong>um supporting the order, the<br />

defendants claimed they had over 250 gigabytes of reviewable information, which they estimated<br />

would cost over two million dollars for the 20,000 hours needed to manually review all of the data.<br />

The defendants also included U.S. Magistrate Judge Andrew Peck’s February 24 order in Da Silva<br />

Moore v. Publicis Groupe approving predictive coding as an exhibit to support their motion. In a<br />

one-paragraph order written partially by h<strong>and</strong>, the Loudon County Circuit Judge granted the<br />

motion, allowing the defendants to use predictive coding subject to any objections the plaintiffs<br />

might raise following production.<br />

� United States v. Universal Health Servs., Inc., 2011 WL 3426046 (W.D. Va. Aug. 5, 2011). In<br />

this federal false claims litigation, the defendants requested production of e-mails contained on<br />

backup tapes <strong>and</strong> the imposition of an adverse inference sanction alleging spoliation. Conceding<br />

that records created since 2009 were accessible via their current exchange server, the plaintiffs<br />

argued that producing e-mails pre-dating 2009 would be unduly burdensome as it would require<br />

recreating the old Microsoft® Exchange server at an estimated cost of $100,000. The defendants<br />

claimed the plaintiffs’ proffered method of retrieval represented only one option that happened to<br />

be the most laborious <strong>and</strong> time-consuming. Instead, the defendants suggested the data could be<br />

recovered in a cost-effective, timely manner by using readily available industry technology. Finding<br />

the plaintiffs’ own negligence caused the undue burden by failing to issue a timely litigation hold,<br />

<strong>and</strong> that the data was likely to be highly responsive, the court granted the motion <strong>and</strong> ordered the<br />

government to produce the backup tapes to the defendants, with the costs subject to<br />

reimbursement by the government.<br />

� E.I. Du Pont De Nemours & Co. v. Kolon Indus., Inc., 2011 WL 2966862 (E.D. Va. July 21,<br />

2011). In this ongoing trade secrets litigation, the plaintiff sought sanctions alleging the defendant<br />

spoliated evidence by deliberately destroying relevant ESI <strong>and</strong> engaged in prolonged efforts to<br />

conceal misconduct. Offering a "no harm, no foul" defense, the defendant claimed that because<br />

many of the deleted files were recovered, no spoliation occurred <strong>and</strong> the plaintiff suffered no<br />

prejudice. Finding the defendant did not engage in a widespread effort to delete relevant<br />

information, the court however determined the litigation hold notices were inadequate <strong>and</strong>,<br />

according to forensic analysis, several key employees intentionally <strong>and</strong> in bad faith destroyed<br />

approximately 12,836 e-mails <strong>and</strong> 4,975 electronic files. Declaring these deletions significant in<br />

substance <strong>and</strong> number, the court imposed an adverse inference instruction <strong>and</strong> ordered payment<br />

of attorney fees <strong>and</strong> costs incurred as a result of the spoliation.<br />

� E.I. du Pont de Nemours <strong>and</strong> Co. v. Kolon Indus., Inc., 2011 WL 1597528 (E.D. Va. Apr. 27,<br />

2011). In this trade secrets litigation, the defendant sought spoliation sanctions alleging the plaintiff<br />

deleted e-mail accounts <strong>and</strong> documents of four former employees containing evidence highly<br />

probative to its defenses. In light of a parallel criminal investigation into the former employee’s<br />

alleged misappropriation, the government instructed the plaintiff to keep the matter confidential.<br />

Although the plaintiff’s initial litigation hold issued to 18 potential custodians was twice exp<strong>and</strong>ed as<br />

the matter progressed, the defendant argued that critical information was lost due to the plaintiff’s<br />

failure to incorporate employees likely to be relevant to the suit. Citing Victor Stanley, the court held<br />

that the scope of a party’s duty to preserve is not absolute, but must only be reasonable <strong>and</strong><br />

proportional to the circumstances. The court found this st<strong>and</strong>ard did not require the plaintiff to<br />

anticipate preserving evidence potentially relevant to possible defense theories fashioned by the<br />

defendant. Accordingly, the court determined the plaintiff’s preservation efforts did not constitute<br />

the willful spoliation required to grant an adverse inference instruction <strong>and</strong> denied the motion.<br />

121


� Corinthian Mortgage Corp. v. Choicepoint Precision Mktg., LLC, 2009 WL 36606 (E.D.Va. Jan.<br />

5, 2009). In this contract dispute, the prevailing defendant moved for attorneys’ fees, including fees<br />

for document review <strong>and</strong> production. The defendant argued its time spent on discovery was<br />

reasonable because: (1) more than 2.6 million document pages were reviewed in order to produce<br />

1.2 million pages; (2) it took extra care to avoid spoliation; <strong>and</strong> (3) its review of the plaintiff’s<br />

documents was hindered by the plaintiff’s disorganized production. The plaintiff argued the claimed<br />

attorneys’ fees were excessive <strong>and</strong> that it produced documents electronically as they were<br />

maintained in the course of business. Finding the time spent on discovery “excessively high,” the<br />

court reduced the total fee awarded. The court noted that the plaintiff should not be charged for the<br />

defendant’s inefficiencies in document review <strong>and</strong> production.<br />

� Sprenger v. Rector <strong>and</strong> Bd. of Visitors of Va. Tech, 2008 WL 2465236 (W.D.Va. June 17,<br />

2008). In this disability <strong>and</strong> civil rights litigation, the plaintiff filed a motion to quash a subpoena<br />

issued by the defendants to a third party agency, seeking all electronically stored information on<br />

various pieces of media utilized by her husb<strong>and</strong>. Specifically, the defendants sought e-mail sent<br />

between the plaintiff <strong>and</strong> her husb<strong>and</strong> regarding her medical condition. The plaintiff argued the<br />

subpoena was overbroad, burdensome <strong>and</strong> sought records protected by spousal privilege. The<br />

defendants argued that any spousal privilege was obviated by the fact that both the plaintiff <strong>and</strong> her<br />

husb<strong>and</strong> were state agency employees <strong>and</strong> the state has both the right to monitor employee e-mail<br />

<strong>and</strong> a written policy which provides employees should have no expectation of internet privacy. In<br />

this case of first impression, the court considered persuasive precedent <strong>and</strong> determined the<br />

defendants did not meet their burden of demonstrating a waiver of privilege after noting the<br />

defendants had provided no evidence that the plaintiff or her husb<strong>and</strong> were aware of the internet<br />

usage policy, <strong>and</strong> thereby granted the plaintiff’s motion.<br />

� In re Subpoena Duces Tecum to AOL, LLC, 2008 WL 1956266 (E.D.Va. April 18, 2008). In this<br />

insurance fraud litigation, the defendant objected to the magistrate judge’s order that quashed its<br />

subpoena. The subpoena sought production of documents from the non-party witnesses’ e-mail<br />

accounts through AOL. The non-party witnesses claimed the subpoena violated the <strong>Electronic</strong><br />

Communications Privacy Act, imposed an undue burden, <strong>and</strong> sought e-mails protected by the<br />

attorney-client privilege. Determining the statutory language of the Privacy Act does not allow AOL<br />

to divulge the contents of the requested electronic communications, the court upheld the<br />

magistrate judge’s order. Additionally, the court held the subpoena was overbroad <strong>and</strong> imposed an<br />

undue burden under Fed.R.Civ.P. 45(c), since it requested all e-mails from a six week period<br />

including private information unrelated to the litigation.<br />

� De Technologies, Inc. v. Dell, Inc., 2006 WL 3500962 (W.D. Va. Dec. 4, 2006). In a patent<br />

infringement suit, the plaintiff claimed the defendant’s production of documents was insufficient in<br />

response to specific discovery requests <strong>and</strong> certain electronic documents produced in an online<br />

document database should not be allowed as evidence at trial. The defendant used an online<br />

database to produce over 500,000 electronic documents in a searchable, electronic format to the<br />

plaintiff. The database was searchable by keyword but the database did not reference or identify<br />

which documents were responsive to each discovery request. The plaintiff argued that Federal<br />

Rule of Civil Procedure 34 required the production of documents as “kept in the ordinary course of<br />

business” <strong>and</strong> that a searchable database did not meet this definition, requiring the plaintiff to<br />

guess which documents would be used by the defendant in response to the plaintiff’s claims at<br />

trial. The court agreed with the plaintiff <strong>and</strong> held the electronic documents were downloaded into a<br />

specially created database <strong>and</strong> were not produced in a form consistent with the defendant’s<br />

internal computer system. Furthermore, they found that the database did not organize the<br />

122


documents in a manner that was responsive to plaintiff’s discovery requests <strong>and</strong> therefore could<br />

not be used at trial as evidence by the defendant.<br />

� Samsung Elecs. Co., Ltd. v. Rambus, Inc., 439 F.Supp.2d 524 (E.D. Va. 2006). In a patentinfringement<br />

case, the court refused to award attorney fees against the defendant for the spoliation<br />

of relevant evidence, finding the sanction inappropriate under either 35 U.S.C. § 285 or the court’s<br />

inherent power. However, relying on substantial documentation of the defendant’s spoliation that<br />

was developed through discovery in two other cases, Rambus v. Infineon <strong>and</strong> Hynix<br />

Semiconductor, Inc., the court found the defendant implemented a document retention policy to<br />

justify destroying relevant patent infringement claims when the defendant anticipated, or<br />

reasonably should have anticipated, litigation with the plaintiff. The court found the defendant’s<br />

vague litigation hold instruction to “not destroy relevant documents” did not satisfy preservation<br />

obligations in light of several factors, including: the large volume of documents destroyed, the<br />

extent <strong>and</strong> kind of evidence destroyed following the hold, the failure of the instruction to specify<br />

which documents were relevant to litigation, <strong>and</strong> the fact that the defendant had maintained no<br />

records of documents that were destroyed. In addition, the court offered guidance on how<br />

companies can comply with their preservation duties by modifying document retention policies<br />

already in existence. The court instructed companies to inform its officers <strong>and</strong> employees of a<br />

pending litigation <strong>and</strong> identify for them the kinds of documents considered relevant, in addition to<br />

collecting <strong>and</strong> segregating relevant documents. The court observed a company cannot “make a<br />

document retention program an integral part of its litigation strategy <strong>and</strong>, pursuant thereto, target<br />

for destruction documents that are discoverable in litigation.”<br />

� Liggett v. Rumsfeld, 2005 WL 2099782 (E.D.Va. Aug. 29, 2005). In an action for employment<br />

discrimination on the basis of race <strong>and</strong> for unlawful retaliation, the plaintiff sought, inter alia, an<br />

adverse inference instruction for evidence spoliation. In response, the defendant filed a motion for<br />

summary judgment on the grounds that a genuine issue of material fact did not exist. Specifically,<br />

the plaintiff, a former information technology specialist with the Defense Logistics Agency (“DLA”),<br />

claimed the DLA failed to preserve his computer hard drive. The DLA did not image the plaintiff’s<br />

hard drive although it claimed the plaintiff had used the computer to view pornographic Web sites.<br />

The court noted the DLA “should have preserved or ‘imaged’ the hard drive of [the plaintiff’s]<br />

computer as evidence, however, DLA’s failure to do so does not in <strong>and</strong> of itself suggest fraud or<br />

fabrication of evidence.” In addition, the court noted it was undisputed that the plaintiff’s activity<br />

was brought to his supervisor’s attention in an unrelated matter. His supervisors neither instigated<br />

the computer investigation nor examined the computer themselves. Thus, the court denied the<br />

plaintiff’s request for an adverse inference instruction <strong>and</strong> granted summary judgment in favor of<br />

the defendants. The court concluded the plaintiff did not raise a genuine issue of fact about<br />

whether the government’s investigation of the misuse of his computer <strong>and</strong> subsequent failure to<br />

preserve the computer hard drive was based on race or retaliation.<br />

� Galaxy <strong>Computer</strong> Servs., Inc. v. Baker, 325 B.R. 544 (E.D. Va. 2005). A Chapter 11 debtor<br />

brought an action against two of its former officers, who purchased a portion of the debtor’s assets,<br />

<strong>and</strong> the parent company that purchased the assets. Interalia, the plaintiff, sought to introduce<br />

testimony from a computer forensic expert to establish that the defendants deleted files from the<br />

plaintiff’s computer. The expert analyzed nine of the plaintiff’s hard drives <strong>and</strong> prepared an expert<br />

report detailing the deletion of the foreclosing bank’s directory, all files containing the word "Baker,”<br />

from the plaintiff’s mail server <strong>and</strong> several other deletions. Seeking to have the testimony excluded,<br />

the defendants argued that the testimony was irrelevant, the expert did not follow proper<br />

procedures, <strong>and</strong> the expert was unqualified to offer opinions about altered or deleted data. The<br />

123


defendants further argued the expert <strong>and</strong> its employer failed to follow their own internal chain of<br />

custody procedures, making them unable to ensure the recovered data was accurate. Rejecting<br />

the defendants’ arguments, the court declared the expert could testify based on his knowledge,<br />

skill, experience, training <strong>and</strong> education. The court also declared the defendants could crossexamine<br />

on any chain of custody issues.<br />

� James v. Saks Fifth Avenue, 2005 WL 603131 (Va. Cir. Ct. Mar. 8, 2005). The plaintiff sought<br />

injunctive relief <strong>and</strong> damages in a case involving allegations of intentional interference with<br />

business <strong>and</strong> contractual relations, breach of fiduciary duty, conversion, <strong>and</strong> other charges. At trial,<br />

a former employee – solicited to work for the defendant – testified that on two separate occasions<br />

he <strong>and</strong> another one of the plaintiff’s top sales employees generated hard copies of their customers’<br />

personal information stored on the plaintiff’s in-store computers. The employee testified this was<br />

done during store business hours for the “express purpose of demonstrating to [the defendant] that<br />

they had a large number of customers to bring with them.” This testimony was corroborated by<br />

print-outs of the confidential lists containing h<strong>and</strong>written notes <strong>and</strong> by the other employee<br />

testimony. The court found it clear that the defendant knew the employees “planned to take the<br />

confidential customer lists from [the plaintiff] <strong>and</strong> use them to solicit business for [the defendant],<br />

<strong>and</strong> knowingly <strong>and</strong> actively encouraged <strong>and</strong> participated in this activity.” The court awarded over<br />

$2 million in compensatory <strong>and</strong> statutory treble damages.<br />

� Beck v. Shelton, 593 S.E.2d 195 (Va. Sup. Ct. 2004). The court held an e-mail exchange between<br />

city council members was not a "meeting" subject to the provisions of a state Freedom of<br />

Information Act (FOIA). The court equated e-mail communication to other forms of communication<br />

not falling within the definition of a prohibited FOIA “meeting” (i.e. traditional letters sent by ordinary<br />

mail, courier or facsimile). However, the court distinguished e-mail from communication taking<br />

place in "chat rooms" or by "instant messaging." The court inferred the virtually simultaneous<br />

nature of instant messaging may place it – unlike e-mail – within the prohibited “meeting” FOIA<br />

definition.<br />

� Hickman v. Virginia Commonwealth Univ., 2004 WL 435846 (Va. Cir. Ct. Mar. 5, 2004). The<br />

defendant terminated the plaintiff, a secretary, from employment with the state university for the<br />

“unauthorized removal of state records, state property, <strong>and</strong> the property of other persons <strong>and</strong><br />

breaches of confidentiality.” Without permission from the university president or anyone else, the<br />

plaintiff forwarded e-mails that were addressed to the president to individuals outside of the<br />

president’s office. The plaintiff argued her actions did not warrant termination because “one cannot<br />

remove e-mail.” The court rejected the plaintiff’s argument asserting that “[w]hile it is true that the<br />

original e-mails remained on the office computer after they were sent by the appellant to others,<br />

copies of those e-mails were ‘removed’ when appellant forwarded them out of the office.”<br />

Moreover, even if the e-mails were not technically “copied” or “removed,” the court declared that<br />

the plaintiff breached confidentiality. As such, the court affirmed the hearing officer’s determination<br />

that the defendant did not act inappropriately in terminating the plaintiff’s employment.<br />

� Rambus, Inc. v. Infineon Techs. AG, 2004 WL 383590 (E.D.Va. Feb. 26, 2004), amended by,<br />

220 F.R.D. 264 (E.D.Va. 2004)(subsequent determination by 222 F.R.D. 280) (E.D. Va. 2004)).<br />

The defendant moved to compel the production of documents including those documents relating<br />

to the plaintiff’s document retention policy. The defendant alleged that the plaintiff instituted a<br />

document-purging program despite being on notice of impending litigation for the patents at issue.<br />

In support of its allegations, the defendant pointed to internal e-mails that reflected the plaintiff’s<br />

“Shred Day,” an event in which the plaintiff’s employees shredded about two million documents as<br />

part of its document retention <strong>and</strong> destruction policy. At trial, the plaintiff did not dispute that it<br />

124


“destroyed some documents because of their ‘discoverability’.” Additionally, the trial court found<br />

that the plaintiff’s creation of its document retention policy clearly demonstrated that the plaintiff<br />

was on notice that the defendant might be bringing patent infringement lawsuits. The plaintiff<br />

argued that its true motive was not to destroy potentially discoverable information <strong>and</strong> that the<br />

plaintiff was legitimately trying to reduce search <strong>and</strong> review costs. The court concluded that even if<br />

the plaintiff “did not institute its document retention policy in bad faith, if it reasonably anticipated<br />

litigation when it did so, it is guilty of spoliation.” The court further noted that “even if it was merely<br />

instituting a valid purging program, even valid purging programs need to be put on hold when<br />

litigation is ‘reasonably foreseeable’.” As such, the court granted the defendant’s motion <strong>and</strong><br />

ordered the plaintiff to immediately produce documents containing information about or relating to<br />

the creation, preparation, or scope of the plaintiff’s document retention policy.<br />

� Physicians Interactive v. Lathian Sys., Inc., 2003 WL 23018270 (E.D.Va. Dec. 5, 2003). The<br />

plaintiff, the host of a medial website, contended that the defendant’s employee secretly hacked<br />

into the plaintiff’s website <strong>and</strong> stole confidential customer lists <strong>and</strong> computer software code. The<br />

plaintiff moved for a temporary restraining order, preliminary injunction, <strong>and</strong> limited expedited<br />

discovery order. Specifically, the plaintiff requested permission to enter the defendant’s computer<br />

server, work <strong>and</strong> home desktop <strong>and</strong> notebook computers, <strong>and</strong> any sites where the computers used<br />

in the alleged attacks were located to secure a mirror image of the computer equipment containing<br />

electronic data concerning the defendant’s alleged attack on the plaintiff’s website. The court found<br />

that the plaintiff made a preliminary showing of an invasion of its computer system, unauthorized<br />

copying of its customer list, <strong>and</strong> theft of its trade secrets. The court granted the plaintiff’s request<br />

<strong>and</strong> directed that discovery must be done with the assistance of a computer forensic expert.<br />

� Commonwealth v. Simone, 2003 WL 22994245 (Va. Cir. Ct. Nov. 12, 2003), rev’d, 2005 WL<br />

588257 (Va. App. Ct. Mar. 15, 2005). The trial court determined that the defendant knowingly<br />

possessed three sexually explicit images of juveniles found in the cache of his computer even<br />

though the images could have appeared on the defendant’s computer screen as “pop-ups” for<br />

websites other than ones intentionally accessed or manually downloaded by the defendant. A<br />

computer forensic investigator recovered the sexually explicit images from the computer’s directory<br />

cache, also known as temporary internet files. The investigator testified that when accessing a<br />

website, a computer operator normally cannot stop these images from being placed in the cache;<br />

however, images must actually appear on the computer screen before they are automatically<br />

placed in the cache. The trial court determined the defendant exhibited knowing possession of the<br />

three child pornography images contained in his computer’s cache/temporary Internet files. The<br />

appellate court reversed, finding the defendant did not have sufficient dominion <strong>and</strong> control over<br />

the computer to conclude he possessed the images contained on the computer on the date in<br />

question.<br />

� United States v. Moussaoui, 2003 WL 548699 (E.D.Va. Jan. 7, 2003). The defendant claims that<br />

the government failed to provide him with information retrieved from various computers used by the<br />

defendant. The court held that the government provided the defendant with sufficient information,<br />

including: information about the authentication of the computer hard drives, confirmation that the<br />

computer evidence had not been contaminated, the timing of the forensic examinations, <strong>and</strong> the<br />

software used to restore a hard drive image. The court further stated that the Defense possessed<br />

the computer hard drives at issue <strong>and</strong> had expert resources <strong>and</strong> subpoena power to conduct any<br />

further investigation it deemed necessary.<br />

� Trigon Ins. Co. v. United States, 204 F.R.D. 277 (E.D.Va. 2001). Based on computer forensic<br />

expert analysis, the court found that the defendant willfully <strong>and</strong> intentionally destroyed documents<br />

125


that should have been produced during discovery. The court issued adverse inferences <strong>and</strong><br />

reimbursement of the plaintiff’s attorneys fees as damages for the spoliation. Trigon Ins. Co. v.<br />

United States, 2002 WL 31864265 (E.D.Va. Dec. 17, 2002.). Despite objection by the defendant,<br />

the court found the plaintiff’s fees <strong>and</strong> expenses (in the amount of $179,725.70) for hiring <strong>and</strong><br />

deposing computer forensics experts <strong>and</strong> briefing <strong>and</strong> adjudicating the issues related to the<br />

spoliation warranted <strong>and</strong> reasonable.<br />

� America Online, Inc. v. Anonymous, 542 S.E.2d 377 (Va. 2001). In a case of first impression, the<br />

court refused to allow a corporation to seek information from AOL without revealing its identity.<br />

� Adams v. Dan River Mills, Inc., 54 F.R.D. 220 (W.D. Va. 1972). In an employment discrimination<br />

case, the court required the defendant to provide an electronic version of the printouts already<br />

submitted to the plaintiff. “Because of the accuracy <strong>and</strong> inexpensiveness of producing the<br />

requested documents in the case at bar, this court sees no reason why the defendant should not<br />

be required to produce the computer cards or tapes <strong>and</strong> the W-2 print-outs to the plaintiffs.”<br />

Fifth Circuit – State <strong>and</strong> Federal <strong>Case</strong>s<br />

� Union Pump Co. v. Centrifugal Tech. Inc., 2010 WL 5186616 (C.A.5 (La.) Dec. 16, 2010). In this<br />

intellectual property dispute, the plaintiff appealed the district court’s refusal to award attorney’s<br />

fees as a sanction for the defendants’ spoliation of evidence. Responding to the plaintiff’s pre-trial<br />

request for sanctions, the district court issued a permissive adverse inference instruction but<br />

declined to rule further on sanctions until after the jury verdict. After the jury returned a verdict in<br />

favor of the plaintiff in the amount of $2,125,559, the plaintiff requested all attorney’s fees <strong>and</strong><br />

costs totaling close to $1 million, which the district court ultimately declined to award. On appeal,<br />

the court remarked that intentional spoliation “threatens the sanctity <strong>and</strong> spirit of the judicial<br />

process,” but found no abuse of discretion in declining to issue sanctions. The court also noted the<br />

plaintiff failed to renew its request for attorney’s fees as a spoliation sanction <strong>and</strong> affirmed the<br />

district court’s judgment.<br />

� In re: Vioxx Prods. Liab. Litig. 2006 WL 1726675 (5th Cir. May 26, 2006). In a product liability<br />

litigation, the defendant sought interlocutory appeal <strong>and</strong> a writ of m<strong>and</strong>amus of the district court’s<br />

ruling regarding the defendant’s attorney-client privilege claims. Out of more than 2,000,000<br />

documents produced in response to the plaintiff’s discovery request, the defendant withheld<br />

approximately 30,000, claiming attorney-client privilege. After conducting an in camera, documentby-document,<br />

review of the 30,000 documents, the district court determined only 491 documents<br />

were privileged <strong>and</strong> ordered the remainder be produced to the plaintiff. On appeal, the court only<br />

examined the trial court’s review process, rather than the merit of the privilege claim on any single<br />

document. The Fifth Circuit found the district court judge’s efforts commendable, but inadequate,<br />

<strong>and</strong> determined that a continuation of the current review process without modification would<br />

constitute an abuse of discretion. The Fifth Circuit granted the defendant’s motion for a reexamination<br />

of 2,000 documents <strong>and</strong> instructed the defendant to supplement the privilege log <strong>and</strong><br />

offer assistance in easing the burden of review on the district court judge. The Fifth Circuit allowed<br />

the district court discretion in determining whether further review of the documents would be<br />

necessary.<br />

� United States v. Vela, 673 F.2d 86 (5th Cir. 1982). The court admitted computerized telephone<br />

bills under the Business Records exception where a telephone company employee laid the proper<br />

foundation for the reliability of the telephone bills record-keeping process. In describing the<br />

reliability of the computer generated documents, the court stated that the computerized reports<br />

126


“would be even more reliable than . . . average business record(s) because they are not even<br />

touched by the h<strong>and</strong> of man.”<br />

Louisiana<br />

� Yelton v. PHI, Inc., 2011 WL 6100445 (E.D.La. Dec. 7, 2011). In this dispute related to litigation<br />

following a helicopter crash, the defendant who owned the helicopter cross-motioned the defendant<br />

who manufactured the helicopter for product liability. With regard to discovery, the owners argued<br />

that the manufacturer spoliated evidence by delaying a litigation hold to a key custodian until<br />

relevant data on his laptop was deleted. Although the manufacturer initially issued a litigation hold<br />

to several key custodians before the initial lawsuit was filed, they did not issue a hold to a staff<br />

engineer, who was hired at the time of the accident to investigate the cause of the crash, until two<br />

years later. During those two years, counsel for the manufacturer relied heavily on the staff<br />

engineer’s report for the defense, <strong>and</strong> the laptop containing data from the investigation was<br />

reformatted <strong>and</strong> resold before a hold was issued. The court found a "significant degree of<br />

culpability" in the manufacturer’s conduct that prejudiced the owner of the helicopter’s defense.<br />

Accordingly, the court granted the plaintiff’s motion, awarding monetary sanctions <strong>and</strong> ordering an<br />

adverse inference against the defendant manufacturer.<br />

� Who Dat Yat Chat, LLC v. Who Dat, Inc., 2011 WL 4575215 (E.D. La. Sept. 30, 2011). In this<br />

trademark litigation, the defendants requested a finding of contempt <strong>and</strong> sought sanctions alleging<br />

the plaintiff failed to comply with court discovery orders <strong>and</strong> altered response deadlines. Objecting,<br />

the plaintiff claimed it did not act willfully or in bad faith, <strong>and</strong> that it was waiting for a written court<br />

order before proceeding. Finding no good cause for the plaintiff’s noncompliance the court noted<br />

the “glaring problem” that this was the plaintiff’s seventh attempt to fulfill its discovery obligations<br />

<strong>and</strong> determined the plaintiff was in contempt. Although the court awarded the defendants with<br />

attorney fees in connection with the subject motion, it refused to strike the plaintiff’s affirmative<br />

defenses as requested by the defendants because other sanctions were available.<br />

� Tango Transp., LLC v. Transp. Int’l Pool, Inc., 2009 WL 3254882 (W.D. La. Oct. 8, 2009). In this<br />

contract dispute, the defendant sought monetary <strong>and</strong> adverse inference sanctions alleging that<br />

after months of repeated requests for e-mail documents, the plaintiff failed to ask employees to<br />

locate, preserve or produce e-mail documentation. The plaintiff placed a litigation hold on e-mail<br />

accounts of some custodians; however, in-house counsel for the plaintiff admitted a litigation hold<br />

was not placed on three key players until six months after the request. Citing the plaintiff’s failure to<br />

issue litigation holds, the court determined sanctions were appropriate <strong>and</strong> awarded the defendant<br />

almost $13,000 in attorneys’ fees <strong>and</strong> costs to serve as a deterrent against the plaintiff’s future<br />

commission of similar discovery abuses. However, because the defendant failed to demonstrate<br />

the destroyed e-mails would have supported its case, the court denied the adverse inference<br />

request.<br />

� Council of the City of New Orleans v. Washington, 2009 WL 1492869 (La. May 29, 2009). In<br />

this litigation, the Supreme Court of Louisiana held that the Court of Appeal erred when it vacated<br />

the preliminary injunction issued by the District Court since it considered a constitutional issue that<br />

was not raised on appeal. Previously in Council of the City of New Orleans v. Washington, 2009<br />

WL 1300747 (La. App.4 Cir. May 12, 2009), the Court of Appeal considered the defendant’s appeal<br />

of the preliminary injunction preventing the defendant from disseminating e-mails. The plaintiff<br />

argued the e-mails were not sanitized for privilege, that ethical rules require return of the<br />

documents, <strong>and</strong> that the temporary nature of the injunction did not violate the defendant’s First<br />

127


Amendment rights. Finding the injunction violated the defendant’s constitutional rights since the<br />

records had already been released pursuant to a written public records request, the Court of<br />

Appeal vacated the injunction. The court recognized that ethical <strong>and</strong> procedural violations would<br />

likely be asserted against the defendant if the inadvertently privileged documents—by definition not<br />

public records—were disseminated but found the constitutional issues overrode any ethical<br />

concerns.<br />

� S. Capitol Enterprises, Inc. v. Conseco Services., LLC, 2008 WL 4724427 (M.D.La. Oct. 24,<br />

2008). In this ongoing electronic discovery dispute, the plaintiffs sought sanctions <strong>and</strong>/or additional<br />

discovery orders claiming the defendants failed to comply with a previous discovery ruling. The<br />

plaintiff claimed the defendant failed to produce 1,000 relevant documents, however the court<br />

stated that the likely benefit in having more documents produced was outweighed by the burden<br />

<strong>and</strong> expense associated with retrieving the evidence. The court noted that “perfection in document<br />

production is not required,” <strong>and</strong> held that experts were allowed to estimate based on the data<br />

already produced.<br />

� Hoover v. Fla. Hydro, Inc., 2008 WL 4467661 (E.D.La. Oct. 1, 2008). In this contract dispute, the<br />

plaintiff moved to quash the defendant’s subpoenas duces tecum issued to two third-party<br />

individuals dem<strong>and</strong>ing computer equipment for inspection. The plaintiff argued the subpoenas<br />

were unwarranted, unduly burdensome <strong>and</strong> were a “fishing expedition.” The defendant disagreed<br />

with the plaintiff, arguing the subpoenas were issued with good cause. Finding the first individual<br />

sufficiently responded to a previous subpoena, the court granted the motion to quash. Regarding<br />

the second individual, the court denied the motion to quash determining there was relevant<br />

information on the requested computer. The court ordered the defendant to prepare a search<br />

protocol for inspection of the individual’s computer that excluded privileged communications.<br />

� In re Riverside Healthcare, Inc. v. Sysco Food Serv. of San Antonio, LP, 393 B.R. 422<br />

(M.D.La. Sept. 11, 2008). In this bankruptcy case, the plaintiff sought an adverse inference<br />

instruction based on the defendant’s deletion of relevant e-mail from its servers. Stating that bad<br />

faith must be demonstrated to support an adverse inference, the court held that the plaintiff did not<br />

prove that the defendant intentionally deleted any e-mail since it was deleted in accordance with<br />

the defendant’s routine practice prior to litigation. The court also noted that the plaintiff’s failure to<br />

pursue this evidence from other potentially available sources undermined its claim of unfair<br />

prejudice <strong>and</strong> the dem<strong>and</strong> for sanctions. Accordingly, the court denied the plaintiff’s motion.<br />

� Sherman v. Harrah’s New Orleans Casino, 2008 WL 3914970 (E.D.La. Aug. 20, 2008). In this<br />

litigation involving the settlement of a gambling debt, the defendants filed an objection to the<br />

magistrate’s prior report <strong>and</strong> recommendation granting the plaintiff’s motion to compel <strong>and</strong><br />

awarding plaintiff attorney’s fees <strong>and</strong> expenses. The magistrate recommended the plaintiff be<br />

awarded attorneys fees <strong>and</strong> costs associated with the filing of the second motion to compel <strong>and</strong><br />

three additional depositions made necessary due to the defendant’s failure to meet their discovery<br />

obligations. The defendants objected to this recommendation, arguing that its discovery response<br />

was substantially justified <strong>and</strong> the amount awarded for attorney’s fees was excessive <strong>and</strong> contrary<br />

to Fed.R.Civ.P. 37(a)(5). Denying the defendants’ objection, the court approved the magistrate’s<br />

report, agreeing that the defendant had abused the discovery process by repeatedly waiting until<br />

the eve of deposition to provide hundreds of pages of responsive documents.<br />

� Canon U.S.A., Inc. v. S.A.M., Inc., 2008 WL 2522087 (E.D.La. June 20, 2008). In this litigation<br />

involving an alleged breach of a dealer agreement between the plaintiff distributer <strong>and</strong> the<br />

defendant dealer, the plaintiff filed a motion to compel production <strong>and</strong> sought sanctions. The<br />

plaintiff sought paper <strong>and</strong> electronic documents from the defendant’s server <strong>and</strong> argued the<br />

128


defendant’s withholding of responsive documents <strong>and</strong> incomplete responses justified sanctions.<br />

The defendant argued that either the documents did not exist due to the destruction caused by<br />

Hurricanes Katrina <strong>and</strong> Rita, or that production would occur if the current searches yielded<br />

responsive information. Finding the defendant’s responses to date to be insufficient as they<br />

appeared to have been conducted “lackadaisically,” the court ordered the defendant to bear the<br />

costs of employing a third-party computer forensic analyst to search its server <strong>and</strong> produce the<br />

requested information. The court also granted sanctions in part, awarding costs to the plaintiff<br />

incurred in issuing a third-party subpoena <strong>and</strong> in seeking insurance information.<br />

� Thomas v. IEM, 2008 WL 695230 (M.D.La. Mar. 12, 2008). In this discrimination suit, the plaintiff<br />

served a Fed.R.Civ.P. 45 subpoena on the defendant (her former employer), seeking production of<br />

a complete electronic copy of the e-mail boxes of nine named individuals as they appeared on a<br />

specified date. Rather than responding to the subpoena, the defendant served formal objections to<br />

the plaintiff who then filed this motion to compel a response to the subpoena. The defendant<br />

objected to the use of a Rule 45 subpoena on a party as well as the limited response time <strong>and</strong><br />

argued that the information sought was irrelevant, confidential, duplicative <strong>and</strong> unduly burdensome.<br />

Agreeing with the defendant, the court denied the plaintiff’s motion as the information sought<br />

constituted discovery within the meaning of Fed.R.Civ.P. 26 <strong>and</strong> 34 <strong>and</strong> the request was not limited<br />

in time or subject matter.<br />

� Marketfare Annunciation, LLC v. United Fire & Cas. Ins. Co., 2007 WL 3273440 (E.D.La. Nov.<br />

5, 2007). In this lawsuit involving an insurance claim for damages resulting from Hurricane Katrina,<br />

the plaintiffs sought monetary sanctions <strong>and</strong> an adverse jury instruction. Prior to the close of<br />

discovery, the plaintiffs requested the defendants to produce relevant e-mails <strong>and</strong> implement a<br />

litigation hold to preserve relevant electronic records. The plaintiffs then sought sanctions,<br />

contending a failure by the defendants to establish a m<strong>and</strong>atory litigation hold to lead to the loss of<br />

relevant electronic evidence <strong>and</strong> e-mails from relevant key players. Finding inadequacy in the<br />

plaintiffs’ explanation for why this discovery matter was not pursued earlier, the court determined<br />

that the plaintiffs should have moved to compel production prior to seeking sanctions.<br />

Subsequently the court denied sanctions, as the plaintiffs had not demonstrated how the<br />

defendants violated a court preservation order.<br />

� Auto Club Family Ins. Co. v. Ahner, 2007 WL 2480322 (E.D.La. Aug. 29, 2007). In this insurance<br />

dispute, the defendants’ subpoenaed evidence from a third party, Rimkus Consulting Group, which<br />

investigated their home for property damage following Hurricane Katrina. Rimkus motioned the<br />

court to quash the subpoena <strong>and</strong> instead issue a protective order <strong>and</strong> argued for production in<br />

paper to prevent any compromise in the authenticity or integrity of its engineering reports. The<br />

court denied the motion as the files were stored electronically in the ordinary course of business<br />

<strong>and</strong> the defendant requested an electronic production. The court further noted Rimkus failed to<br />

provide evidence sufficient to meet its burden that the electronically stored information was not<br />

reasonably accessible due to undue burden or cost. While recognizing Rimkus as a non-party<br />

entitled them to protection from undue burden <strong>and</strong> expense, the court noted Rimkus must to show<br />

that the requested electronic information would be unduly burdensome to produce. In applying Fed.<br />

R. Civ. P. 45(d)(1)(D), the court refused to find the mere statement of an attorney sufficient<br />

evidence to prove burden.<br />

� In re Vioxx Prod. Liab. Litig., 2007 WL 2309877 (E.D.La. Aug. 14, 2007). In this multidistrict<br />

product liability suit, Merck, the producer of the pain medication at issue in this dispute, claimed<br />

attorney-client privilege on numerous electronic documents <strong>and</strong> refused to produce them.<br />

Specifically, Merck produced over two million documents <strong>and</strong> claimed privilege as to approximately<br />

129


thirty thous<strong>and</strong>, all of which the court reviewed individually in camera <strong>and</strong> made individual privilege<br />

rulings. Appealing the court’s privilege rulings, Merck sought relief from the Fifth Circuit Court of<br />

Appeals. The appeal was denied on jurisdictional grounds, but the Appeals Court did suggest the<br />

lower court reexamine a subset of disputed documents, selected by Merck, pursuant to a different<br />

review protocol. Subsequently, the court appointed a special master <strong>and</strong> a special counsel to<br />

reexamine the subset of documents, promulgate substantive guidelines <strong>and</strong> issue a set of initial<br />

recommendations regarding the documents claimed as privileged. Following Merck’s time to object<br />

to the special master’s recommendations, the court entered the report into the record <strong>and</strong><br />

reproduced substantive portions of the special master’s report. The report was attentive to the<br />

issues faced by corporations where their in-house legal department assists on numerous fronts<br />

<strong>and</strong> that drug companies are heavily regulated by the food <strong>and</strong> drug administration when individual<br />

privilege decisions were made for each document at issue. The court adopted the special master’s<br />

review protocol <strong>and</strong> recommendations.<br />

� Frees, Inc. v. McMillian, 2007 WL 184889 (W.D. La. Jan. 22, 2007). In a claim involving an<br />

employer suing a former employee under the <strong>Computer</strong> Fraud <strong>and</strong> Abuse Act for downloading<br />

plaintiff’s proprietary information, the plaintiff compelled the defendant to produce hard drives from<br />

a laptop that the defendant received from his new employer, as well as a hard drive from the<br />

defendant’s home computer. The plaintiff argued the requested hard drives are likely sources of<br />

evidence pertaining to defendant’s illegal downloading of information <strong>and</strong> data. The defendant<br />

argued the requested hard drives were acquired two years after he started working for a competitor<br />

<strong>and</strong> only contains information relevant to his new employment. The court held that the plaintiff was<br />

entitled to the information, stating that the hard drives were the most likely places where the<br />

defendant would have possibly transferred <strong>and</strong> stored the missing information. The court also<br />

indicated that although the defendant obtained the requested hard drives two years after he left the<br />

plaintiff’s employment, the defendant easily could have transferred information to newly acquired<br />

hard drives <strong>and</strong>, thus, could be likely sources of evidence relevant to the plaintiff’s claims.<br />

� Recinos-Recinos v. Express Forestry, Inc., 2006 WL 2349459 (E.D. La. Aug. 11, 2006). In a<br />

class-action suit, plaintiffs filed a motion to compel for sanctions <strong>and</strong> for contempt against<br />

defendants for withholding documents, misrepresenting their availability throughout the entire<br />

litigation process, <strong>and</strong> for deliberate spoliation of evidence. Defendant claimed to have lost several<br />

key requested documents stored in an electronic form due to Hurricane Katrina. Defendant claimed<br />

to have lost these key documents because they were moved from the main Arkansas business<br />

office to defendant’s Mississippi beach house on the Gulf of Mexico at the height of hurricane<br />

season. The court found that even if this unwise move of key documents to a susceptible area was<br />

not deliberate, it was, in the least, negligent <strong>and</strong> worthy of sanctions based on a failure to properly<br />

preserve documents. The court also discovered that several key officers of the defendant company<br />

lied during depositions <strong>and</strong> that the entire litigation was filled with defendant’s resistance towards<br />

any discovery requests. The court chastised defendant, “To date, trial preparation has been<br />

accomplished only through plaintiffs’ Herculean efforts bolstered by staccato motions to compel<br />

<strong>and</strong> a corresponding series of orders compelling production of responsive documents <strong>and</strong>/or<br />

information” because “[d]efendants have continually flouted the orders of this Court”. The court<br />

imposed monetary sanctions in the form of attorneys’ fees plus expenses necessarily incurred.<br />

� Consolidated Aluminum Corp. v. Alcoa, Inc., 2006 WL 2583308 (M.D. La. July 19, 2006). The<br />

court awarded monetary sanctions against a defendant company for failing to preserve electronic<br />

evidence. The court established that the defendant’s “litigation hold” came too late in the litigation<br />

process because the company issued the “hold” policy after litigation had already started instead of<br />

130


when it was reasonably anticipated. Furthermore, the court found that the scope of the “hold” was<br />

not broad enough <strong>and</strong> did not prevent certain key employees from inadvertently discarding relevant<br />

information. Although the defendant had a “litigation hold” policy in place, the court ruled that<br />

defendant’s policy was not adequate enough to fulfill preservation requirements. Plaintiff motioned<br />

the court to impose sanctions in the form of adverse jury instructions, but it declined to do so since<br />

there was no evidence that the spoliation occurred with malice or bad faith. Instead, the court<br />

issued monetary sanctions to compensate plaintiff for costs <strong>and</strong> fees related to discovering the<br />

spoiled evidence.<br />

� Griggs v. Harrah’s Casino, 929 So. 2d 204 (La. Ct. App. 2006). In a casino gaming dispute, the<br />

defendants appealed the trial court’s decision as erroneous for relying on witness testimony rather<br />

than forensic tests in ruling that the plaintiffs had won a slot machine jackpot. The defendants<br />

offered the testimony of several experts who, after conducting a forensic examination of the<br />

computer microprocessor of the slot machine, concluded that no jackpot had been won by the<br />

plaintiffs. However, one of the defendant’s experts had made a pre-trial statement suggesting data<br />

had been lost, casting his conclusions into doubt. The plaintiff’s expert did not conduct an<br />

examination of the slot machine, but opined that the record of the win was stored in temporary<br />

memory which was lost or corrupted when the casino technician powered the slot machine off <strong>and</strong><br />

on before a forensic examination could be conducted. The appellate court affirmed the trial court’s<br />

decision, holding that there was sufficient eyewitness testimony to provide an adequate basis for<br />

the verdict as well as admissions from defendant’s forensics experts to allow the jury to doubt their<br />

testimony.<br />

� BG Real Estate Servs., Inc. v. American Equity Ins. Co., 2005 WL 1309048 (E.D. La. May 18,<br />

2005). In an insurance dispute, the plaintiffs sought production of a computer hard drive. The<br />

defendants objected on the grounds that the request was overly broad <strong>and</strong> sought irrelevant<br />

information that was unlikely to lead to admissible evidence. Finding for the defendants, the court<br />

declined to order production of the entire drive. However, the court noted that Fed. R. Civ. P. 34(a)<br />

includes relevant materials contained on a computer hard drive in its definition of "other data<br />

compilations." The court further stated that “[i]f particular non-privileged items on the referenced<br />

computer hard drive are responsive to other requests for production as to which defendants’<br />

objections have not been sustained, those items must be ‘translated, if necessary, by the<br />

respondent through detection devices into reasonably usable form’." The court noted that the<br />

defendants could withhold materials it considered privileged <strong>and</strong> list them on a privilege logs for a<br />

possible later discoverability determination.<br />

� In re Vioxx Prods. Liab. Litig., 2005 WL 756742 (E.D.La. Feb 18, 2005). In a multi-district<br />

litigation, the court ordered all parties to preserve evidence relevant to the litigation, including<br />

relevant “writings, records, files, correspondence, reports, memor<strong>and</strong>a, calendars, diaries, minutes,<br />

electronic messages, voice mail, E-mail, telephone message records or logs, computer <strong>and</strong><br />

network activity logs, hard drives, backup data, removable computer storage media such as tapes,<br />

discs <strong>and</strong> cards, printouts, document image files, Web pages, databases, spreadsheets, software,<br />

books, ledgers, journals, orders, invoices, bills, vouchers, checks statements, worksheets,<br />

summaries, compilations, computations, charts, diagrams, graphic presentations, drawings, films,<br />

charts, digital or chemical process photographs, video, phonographic, tape or digital recordings or<br />

transcripts thereof, drafts, jottings <strong>and</strong> notes, studies or drafts of studies or other similar such<br />

material.” In addition, the court ordered perseveration of “[i]nformation that serves to identify,<br />

locate, or link such material, such as file inventories, file folders, indices, <strong>and</strong> metadata.” The court<br />

131


noted the parties were obligated to take reasonable steps to preserve this information until the<br />

parties formed a preservation plan agreement or the court ordered otherwise.<br />

� EEOC v. E.I. dupont de Nemours & Co., 2004 WL 2347559 (E.D. La. Oct. 18, 2004). In a case<br />

brought under the Americans with Disabilities Act, the Equal Employment Opportunity Commission<br />

(EEOC) sought to admit a computer printout from the website of the U.S. Census Bureau. The<br />

printout contained the image’s Internet domain address <strong>and</strong> the date on which it was printed. The<br />

defendant objected to the admission, claiming that the printout was inherently untrustworthy.<br />

Rejecting this, the court determined that the Bureau’s website was a reliable source <strong>and</strong> further<br />

observed that “‘in an age where so much information is calculated, stored <strong>and</strong> displayed on a<br />

computer, massive amounts of evidence would be inadmissible’ if the Court were to accept<br />

DuPont’s characterization of all information on the Internet as inherently unreliable.” Pursuant to<br />

Fed.R.Evid. 803(8), the court admitted the computer printout as a public records exception to the<br />

hearsay rule.<br />

� Pamlab, L.L.C. v. Rite Aid Corp., 2004 WL 2358106 (E.D.La. Oct. 13, 2004). The plaintiff sought<br />

to compel discovery from the defendant, including information pertaining to when the defendant<br />

received a prescription for <strong>and</strong> distributed a certain drug. The defendant objected on the ground<br />

that privacy laws protected the information <strong>and</strong> that the information would be too burdensome to<br />

collect. The court determined that the request would only be unduly burdensome if the defendant<br />

had to manually retrieve the data. In this case, the court found the data would be easily retrievable<br />

because it could be produced from a computer system. The court ordered the defendant to<br />

determine which information must be retrieved manually <strong>and</strong> which information could be produced<br />

from a computer system. After receiving this information from the defendant, the court ordered the<br />

defendant to produce all of the responsive data that could be produced without identifying patient<br />

specific information. If the data had to be manually produced, the court ordered the parties to agree<br />

upon a sampling process.<br />

� Giardina v. Lockheed Martin Corp., 2003 WL 1338826 (E.D.La. Mar. 14, 2003). In an<br />

employment discrimination suit, the plaintiff’s discovery requests sought a list of all “non-work<br />

related Internet sites” accessed with sixteen different company computers. The defendant objected<br />

to this request as overly broad <strong>and</strong> unduly burdensome as it would require creation of detailed <strong>and</strong><br />

lengthy reports that would take many hours to compile. The magistrate judge granted the plaintiff’s<br />

motion to compel <strong>and</strong> awarded attorney fees <strong>and</strong> the district court affirmed.<br />

� Murphy Oil USA v. Fluor Daniel, No. 2:99-cv-03564 (E.D. La. Dec. 3, 2002). This Order follows<br />

the court’s decision in Murphy Oil USA, Inc. v. Fluor Daniel, Inc., 2002 WL 246439 (E.D. La. Feb.<br />

19, 2002) ordering the defendant to produce relevant e-mail communications archived on backup<br />

tapes. In this motion to compel before the court, the plaintiff sought production of a particular e-mail<br />

<strong>and</strong> argued that the defendant waived the attorney-client privilege by voluntarily producing the<br />

contents of an e-mail. Two copies of the e-mail in question existed on the defendant’s backup<br />

tapes: (1) the e-mail attached to a message from the mail system administrator stating that the<br />

attached e-mail was not deliverable due to an error in the mail address <strong>and</strong> (2) a copy of the same<br />

e-mail sent to the correct e-mail address. The defendant produced a privilege log identifying the<br />

subject e-mail as an attorney-client communication, but at the same time inadvertently produced<br />

the administrator e-mail <strong>and</strong> attachment. The court held that this inadvertent disclosure waived the<br />

attorney-client privilege <strong>and</strong> granted the plaintiff’s motion to compel.<br />

� Murphy Oil USA, Inc. v. Fluor Daniel, Inc., 2002 WL 246439 (E.D. La. Feb. 19, 2002). The court<br />

used the eight-factor balancing test set forth in Rowe to determine operating protocols <strong>and</strong> the cost<br />

shifting formula. It placed the burden on the producing party to elect one of two proposed protocols.<br />

132


Mississippi<br />

� PIC Grp., Inc. v. L<strong>and</strong>Coast Insulation, Inc., 2011 WL 2669144 (S.D. Miss. July 7, 2011). In this<br />

commercial liability litigation, the court reviewed the recommendations of a special master<br />

assigned to investigate alleged discovery abuses <strong>and</strong> provide a report on the plaintiff’s motion for<br />

sanctions. In his report, the special master found the majority of the defendant’s conduct<br />

constituted gross negligence, exemplified by the defendant failing to turn over e-mails it claimed<br />

had been destroyed, but in actuality resided on an external hard drive directly connected to the email<br />

server <strong>and</strong> clearly labeled "backups." Further, the defendant’s de facto in-house counsel<br />

willfully ran a scrubbing program on his laptop just hours before the special master arrived to<br />

inspect his files <strong>and</strong> no litigation hold or preservation plan was ever put in place. The special<br />

master recommended sanctions covering the plaintiff’s additional expenses, to be paid directly by<br />

the defendant <strong>and</strong> not indemnified by an insurer. The defendant argued that such sanctions were<br />

too harsh given its relative lack of technical sophistication <strong>and</strong> the lack of prejudice to the plaintiff,<br />

<strong>and</strong> challenged the court’s authority to sanction directly without the possibility of indemnification.<br />

Setting aside all of these objections, the court adopted the special master’s recommendations <strong>and</strong><br />

ordered the plaintiff to tabulate its costs stemming from the discovery misconduct for the purpose<br />

of assessing sanctions.<br />

� Kermode v. Univ. of Miss. Med. Ctr., 2011 WL 2619096 (S.D. Miss. July 1, 2011). In this<br />

wrongful termination litigation, the plaintiff sought default judgment for various discovery violations<br />

<strong>and</strong> an evidentiary hearing regarding the alleged spoliation of relevant e-mails. Despite the<br />

discovery violations alleged by the plaintiff, including the failure to preserve <strong>and</strong> produce relevant<br />

e-mails, the court noted that procedural defects <strong>and</strong> the Rule 37(e) safe harbor provision barred<br />

the imposition of sanctions as the e-mails were deleted as part of a routine system. Turning to the<br />

request for an evidentiary hearing regarding alleged spoliation of relevant e-mails, the court found<br />

that despite having nine months to develop the evidentiary record, the plaintiff had failed to present<br />

evidence the e-mails actually existed, <strong>and</strong> that even if he had, did not sufficiently demonstrate the<br />

presence of bad faith. Finally, the court dismissed the plaintiff’s belatedly proffered authenticity<br />

challenge of e-mails produced in paper form, noting that the opportunity for such a motion had<br />

passed.<br />

� Larkin v. Trinity Lighting, Inc., 2011 WL 1496248 (S.D. Miss. Apr. 20, 2011). In this employment<br />

litigation, the defendant requested payment from the plaintiff (a former employee) for an estimated<br />

$8,000 to $10,000 in deleted data restoration costs. Alleging the deleted data contained<br />

information relevant to its counterclaims, the defendant argued the plaintiff had actual knowledge<br />

that he was not to delete files from company-issued computer equipment before returning it<br />

following termination of his employment. However, the plaintiff contended the files were not deleted<br />

in anticipation of the lawsuit because he had no knowledge the negotiations would fail <strong>and</strong> had<br />

consulted counsel solely to negotiate severance pay. In addition, the plaintiff argued he had no<br />

other way of removing his personal information from the computers in order to return the property<br />

to the defendant <strong>and</strong> that the documents were already in the defendant’s possession. Finding it<br />

was "far from clear" whether the plaintiff deleted the files in bad faith, the defendant suffered<br />

prejudice <strong>and</strong> the information to be retrieved would provide any substantial benefit, the court<br />

denied the motion <strong>and</strong> concluded the defendant could recover the apparently retrievable<br />

information at its own cost if it chose to do so.<br />

133


� Maggette v. BL Dev. Corp., 2010 WL 3522798 (N.D. Miss. Sept. 2, 2010). In this wrongful death<br />

litigation, the defendants sought to avoid dispositive sanctions for discovery misconduct by arguing<br />

mere negligence. Finding the defendants continually stonewalled discovery in bad faith over a<br />

period of many months, the court noted the defendants obstructed the process <strong>and</strong> were willing to<br />

write off minor discovery sanctions. The court determined the defendants undertook “sham efforts”<br />

as they could not “describe the databases searched, the search terms, methods or parameters<br />

used…or provide any expert information confirming that there are no documents, electronically<br />

stored information or other [responsive] information.” Nor could they explain numerous production<br />

discrepancies or alterations <strong>and</strong> deletions of documents. The court found it “quite difficult … to<br />

accept that a multi-billion dollar corporation facing very high-stakes litigation was unable–for close<br />

to five years–to uncover its own documents at its own facilities when the special master” located<br />

the information in five to seven minutes. Finding the defendants engaged in lies <strong>and</strong> misconduct<br />

despite escalating warnings, the court imposed dispositive sanctions.<br />

� Gaddis v. Smith & Nephew, Inc., 2008 WL 2415183 (S.D. Miss. June 11, 2008). In this product<br />

liability litigation, the defendants filed a motion to dismiss claiming the plaintiff failed to comply with<br />

the deadline for court ordered initial disclosures. After the plaintiff failed to make initial disclosures<br />

despite a second order <strong>and</strong> extended deadline, the defendants sent a letter in an attempt to<br />

resolve the discovery dispute under Fed.R.Civ.P. 37. Finding the plaintiff completely failed to<br />

comply with any discovery requirements <strong>and</strong> respond to the motion to dismiss, the court dismissed<br />

the plaintiff’s case without prejudice for failure to meet discovery obligations <strong>and</strong> comply with court<br />

orders.<br />

� Great Am. Ins. Co. of New York v. Lowry Development, LLC, 2007 WL 4268776 (S.D. Miss.<br />

Nov. 30, 2007). In this contract dispute, the plaintiff sought sanctions for spoliation of evidence,<br />

claiming the defendant willfully destroyed relevant electronic evidence which it had a duty to<br />

preserve. During his first deposition, the defendant testified that his computer crashed during a<br />

lightning storm <strong>and</strong>, was left with the computer repair service as it was unable to be repaired. The<br />

computer technician later testified that the computer was repaired <strong>and</strong> returned to the defendant.<br />

During his second deposition, the defendant offered no explanation for the contradiction but stated<br />

that the computer failed again after its return from the computer repair service, at which point he<br />

threw it away. As the plaintiff was able to establish the disposal of potentially relevant documents<br />

after the litigation began, the court determined that the plaintiff proved willful spoliation by clear <strong>and</strong><br />

convincing evidence. The court held the appropriate sanction was to reduce the plaintiff’s burden of<br />

proof on the issue of mutual mistake from clear <strong>and</strong> convincing evidence to a preponderance of the<br />

evidence.<br />

� Butler v. Kmart Corp., 2007 WL 2406982 (N.D.Miss. Aug. 20, 2007). In this case, the plaintiff<br />

motioned the court to order the defendant to comply with earlier discovery requests <strong>and</strong> argued<br />

that defendant’s mere attempt to locate documents did not sufficiently discharge its discovery<br />

obligations. The defendant produced affidavits attesting to its search efforts for documents at the<br />

relevant locations <strong>and</strong> lack of results, but mentioned very little about whether it conducted searches<br />

of its computer systems. The court ordered the defendant to produce responsive ESI or<br />

demonstrate unsuccessful diligent searching. The plaintiff also sought open access to the<br />

defendant’s home office databases, but the court denied the motion based on the lack of evidence<br />

of improper action.<br />

� Kearley v. Mississippi, 843 So.2d 66 (Miss. Ct. App. 2002). A criminal defendant was convicted<br />

of sexual battery <strong>and</strong> appealed on several issues including proper authentication of e-mails which<br />

134


he allegedly sent to the victim. The appellate court held that the victim’s testimony that she had<br />

received <strong>and</strong> printed the e-mails on her computer was sufficient authentication under the rules of<br />

evidence, <strong>and</strong> the court upheld the conviction.<br />

� Harveston v. State, 798 So.2d 638 (Miss. Ct. App. 2001). In a criminal burglary prosecution, the<br />

court refused to allow in computer database print-outs under the State’s business records<br />

exception to the hearsay rule. The court held that the State failed to meet its burden because<br />

“[T]here was no evidence offered as to the means by which the information…was compiled. The<br />

only testimony came from an investigating officer who limited his testimony to the fact that law<br />

enforcement officers routinely make use of such information. [However, t]he reliability of the<br />

information in ‘business records’ is determined by the competence of the compiler of the<br />

information <strong>and</strong> not the extent of the consumer’s reliance on information received from another<br />

source.”<br />

Texas<br />

� Tienda v. State, 358 S.W.3d 633 (Tex. Crim. App. Feb 8, 2012). In this appeal of a murder<br />

conviction, the defendant alleged that various postings from two MySpace accounts registered<br />

under the defendant’s e-mail address were inadmissible because the State could not establish that<br />

he was the author. Extending the basic rationale used to authenticate e-mails, chat room<br />

dialogues <strong>and</strong> text messages, the court looked at whether the MySpace postings were sufficiently<br />

linked “such that a reasonable juror could have found that they were created <strong>and</strong> maintained” by<br />

the defendant. The State pointed to the substance of the postings—which made reference to the<br />

deceased, the defendant’s gang, the shooting, the State’s key witness <strong>and</strong> further contained<br />

numerous photos of the defendant’s unique tattoos—in an attempt to meet this threshold. Affirming<br />

the lower court’s decision, the court found that this circumstantial evidence, taken as a whole,<br />

sufficiently established that the MySpace pages were created <strong>and</strong> maintained by the defendant.<br />

� Gaalla v. Citizens Medical Ctr., 2011 WL 2115670 (S.D. Tex. May 27, 2011). In this discovery<br />

dispute, the plaintiffs sought sanctions, alleging the defendants failed to preserve backup tapes,<br />

take timely snapshots of relevant e-mail accounts <strong>and</strong> deleted e-mails. Citing Zubulake, the court<br />

noted that the duty to preserve generally does not extend to inaccessible backup tapes <strong>and</strong><br />

declined to impose sanctions finding the plaintiffs failed to demonstrate any applicable exception to<br />

this general rule. Further, the plaintiffs failed to present evidence of bad faith, a prerequisite to<br />

severe sanctions in the Fifth Circuit. On the contrary, the court determined the defendants took<br />

reasonable preservation steps by issuing a timely litigation hold, taking multiple "snapshots" of<br />

relevant e-mail accounts <strong>and</strong> preserving available backup tapes. The court ordered the defendants<br />

to institute a "journaling process" to continue preserving all relevant e-mail accounts indefinitely in<br />

addition to the available backup tapes, which the plaintiffs’ forensic expert was given access to<br />

search. Finally, the court ordered the parties to reach a preservation agreement going forward.<br />

� In re Royce Homes, LP, 2011 WL 873428 (Bkrtcy. S.D. Tex. Mar. 11, 2011). In this bankruptcy<br />

litigation, the trustee sought production of documents that a key employee of the debtor company<br />

claimed as privileged. Despite using his work computer <strong>and</strong> company e-mail account for personal<br />

matters, the employee argued that he did not waive attorney-client privilege <strong>and</strong> maintained that<br />

only necessary third parties were privy to his communications. Rejecting this argument, the court<br />

focused on the debtor company’s <strong>Electronic</strong> Communications Policy. The policy stated that nothing<br />

contained on any company electronic system would be considered private <strong>and</strong> permitted limited<br />

personal communications "with the underst<strong>and</strong>ing that personal communications may be<br />

135


accessed, viewed, read or retrieved by a company manager or employee" but that "Employees are<br />

NOT to disseminate any confidential information over the company’s system." Finding the policy<br />

explicitly <strong>and</strong> straightforwardly banned confidential communications, the court rendered evidence<br />

of actual enforcement irrelevant. Noting the policy was memorialized in the employee h<strong>and</strong>book,<br />

the court also determined that actual or direct notification to employees was not required <strong>and</strong> that it<br />

was unreasonable for the employee to believe his e-mails would remain confidential. Finding<br />

insufficient evidence that privilege applied or was waived, the court ordered production of the<br />

communications listed in the employee’s privilege log.<br />

� Green v. Blitz U.S.A., Inc., 2011 WL 806011 (E.D. Tex. Mar. 1, 2011). In this products liability<br />

litigation, the plaintiff sought to re-open the case <strong>and</strong> requested sanctions alleging the defendant<br />

systematically destroyed evidence, failed to produce relevant documents <strong>and</strong> committed other<br />

discovery violations in bad faith. The plaintiff’s counsel uncovered the unproduced documents<br />

nearly a year after trial while conducting discovery in a related matter. Analyzing the dispute, the<br />

court determined the e-mails that were not produced, were extremely valuable <strong>and</strong> prejudiced the<br />

plaintiff. The court found the defendant’s discovery efforts were unreasonable, as the defendant<br />

placed a single employee who was admittedly "as computer literate —illiterate as they get" in<br />

charge. Moreover, the defendant did not conduct a search of electronic data, failed to institute a<br />

litigation hold, instructed employees numerous times to routinely delete information <strong>and</strong> rotated its<br />

backup tapes repeatedly, which resulted in permanently deleting data. Although the court declined<br />

to re-open the case, it ordered the defendant to pay $250,000 in civil contempt sanctions.<br />

Additionally, the court imposed a "purging" sanction of $500,000, extinguishable if the defendant<br />

furnished a copy of the order to every plaintiff in every lawsuit proceeding against it for the past two<br />

years. Finally, the court ordered the defendant to file a copy of the order with its first pleading or<br />

filing in all new lawsuits for the next five years.<br />

� In re Howard K. Stern, 2010 WL 3365856 (Tex.App.-Hous. (1 Dist.) Aug. 25, 2010). In this<br />

defamation suit, the defendant petitioned for a writ of m<strong>and</strong>amus seeking to vacate the trial court’s<br />

discovery orders <strong>and</strong> the appointment of a special master. The defendant argued the trial court<br />

abused its discretion by ordering overbroad discovery, assigning a special master to conduct a<br />

forensic examination of his hard drive despite no<br />

evidence of discovery noncompliance <strong>and</strong> authorizing the forensic examination as it exceeded the<br />

scope of discovery relevant to establish personal jurisdiction. Upon review of the record, the court<br />

found the motion to compel production of the defendant’s hard drive <strong>and</strong> e-mail communications<br />

between 39 individuals was excessive <strong>and</strong> amounted to "an impermissible ‘fishing expedition.’" The<br />

court further rejected the appointment of a special master who had "virtually free reign to plumb"<br />

the defendant’s hard drive, <strong>and</strong> which the trial court had authorized based solely on the plaintiff’s<br />

allegations that the defendant was noncompliant. Finding a clear abuse of discretion, the court<br />

granted the petition <strong>and</strong> vacated the discovery order.<br />

� In re Art Harris, 2010 WL 1612205 (Tex.App. Apr. 22, 2010). In this defamation litigation, the<br />

defendant filed a petition for writ of m<strong>and</strong>amus requesting withdrawal of the trial court’s discovery<br />

orders. The defendant argued that the trial court abused its discretion by compelling production of<br />

electronic media for forensic examination, by refusing to apply applicable state rules regarding<br />

treatment of privileged documents <strong>and</strong> privilege logs, <strong>and</strong> by appointing a special master.<br />

Addressing the defendant’s arguments, the court found the trial court acted arbitrarily <strong>and</strong> without<br />

considering the Texas Rules of Civil Procedure by compelling discovery from the defendant without<br />

requiring identification of specific requests, by failing to hold a hearing on the defendant’s<br />

protective order motion, by failing to consider whether privilege applied <strong>and</strong> in ordering production<br />

136


absent a motion to compel. The court also found that the trial court erred by ordering the defendant<br />

to produce his hard drives contrary to the provisions of Rule 196.4 as discussed in In re Weekley<br />

Homes. Finally, the court noted that e-discovery is a “common component of modern litigation” <strong>and</strong><br />

does not by presence alone require a special master. Since the case did not require specialized<br />

knowledge, the trial court also abused its discretion by appointing a special master.<br />

� Rimkus Consulting Group, Inc. v. Cammarata, 2010 WL 645253 (S.D.Tex. Feb. 19, 2010). In<br />

this employment agreement dispute, the plaintiff sought sanctions, costs <strong>and</strong> attorneys’ fees, <strong>and</strong> a<br />

finding of contempt, alleging the defendants intentionally spoliated evidence <strong>and</strong> failed to produce<br />

requested discovery. Before addressing the parties’ specific arguments, the court noted that<br />

“spoliation of evidence – particularly of electronically stored information – has assumed a level of<br />

importance in litigation that raises grave concerns” <strong>and</strong> “distract[s] from the merits of a case, add[s]<br />

costs to discovery, <strong>and</strong> delay[s] resolution.” Moving to the case specifics, the court found the<br />

defendants intentionally lost, altered <strong>and</strong> deleted e-mails, <strong>and</strong> sent the case back to the jury with a<br />

permissive adverse inference instruction. The court also awarded the plaintiff attorneys’ fees <strong>and</strong><br />

costs incurred in the spoliation investigation. Notably, the court distinguished the recent Pension<br />

Committee ruling from the Southern District of New York, finding the differences between circuits in<br />

relation to culpability of parties limited the applicability of the approach taken in Pension<br />

Committee. The court identified an additional distinction in regard to the burden of proof in relation<br />

to relevance <strong>and</strong> prejudice of spoliated evidence.<br />

� MRT, Inc. v. Vounckx, 2009 WL 3491165 (Tex.App.-Dallas, Oct. 30, 2009). In this civil litigation<br />

case, the plaintiffs appealed from a jury verdict in favor of the defendants, arguing they were<br />

entitled to a new trial because the defendants failed to comply with discovery obligations <strong>and</strong><br />

misrepresented the steps taken to search <strong>and</strong> produce backup tapes (some of which were<br />

destroyed). The defendants argued the plaintiffs failed to make a specific request for the backup<br />

tapes as required by Texas Rules of Civil Procedure 196.4. Citing In re Weekley Homes, L.P. <strong>and</strong><br />

the specificity requirement of Rule 196.4, the court disregarded the plaintiffs’ contentions <strong>and</strong><br />

affirmed the lower court’s judgment. The court noted Rule 196.4’s purpose was to ensure the clear<br />

underst<strong>and</strong>ing by both parties of ESI requests <strong>and</strong> reiterated the duties of both parties to share<br />

pertinent information regarding electronic storage systems prior to e-discovery requests, which did<br />

not occur in this case. Finally, the court concluded that the plaintiffs failed to demonstrate that the<br />

defendants knew, or should have known, that the destroyed tapes contained relevant information,<br />

<strong>and</strong> they therefore were not entitled to spoliation instructions because the defendants did not have<br />

a duty to preserve the backup tapes in question.<br />

� In re Weekly Homes, L.P., 2009 WL 2666774 (Tex. Aug. 28, 2009). In this breach of contract<br />

litigation, the defendant petitioned the Texas Supreme Court for writ of m<strong>and</strong>amus of a trial court<br />

order that directed the defendant to provide four employees’ hard drives to the plaintiff’s forensic<br />

experts to image, copy <strong>and</strong> search for deleted e-mails. The defendant argued that the plaintiff<br />

failed to comply with Texas Rules of Civil Procedure 196.4 which governs production requests for<br />

electronic data. Applying Rule 196.4, the court found the trial court did not abuse its discretion<br />

regarding the deleted e-mails request even though the plaintiff failed to satisfy the rule’s specificity<br />

requirement since it became "abundantly clear" that this information was sought <strong>and</strong> no prejudice<br />

was suffered by the defendant. Turning to the imaging <strong>and</strong> forensic examination dispute, the court<br />

relied on the Federal Rules of Civil Procedure <strong>and</strong> case law since there are no express guidelines<br />

contained within Rule 196.4. Through this analysis, the court determined that the trial court abused<br />

its discretion since the search of the employees’ hard drives was highly intrusive <strong>and</strong> unjustifiable.<br />

The court granted the writ of m<strong>and</strong>amus <strong>and</strong> rem<strong>and</strong>ed the case advising the trial court to be<br />

137


mindful of protecting sensitive information by utilizing the least intrusive means necessary to facility<br />

e-discovery.<br />

� Proctor & Gamble Co. v. S.C. Johnson & Son, Inc., 2009 WL 440543 (E.D.Tex. Feb. 19, 2009).<br />

In this patent infringement litigation, the court considered whether the defendant should be ordered<br />

to perform the OCR process on TIFF formatted documents prior to production. The defendant<br />

estimated the total cost of OCR to exceed $200,000 <strong>and</strong> argued for cost-shifting. The plaintiff<br />

argued that the defendant’s estimate was unsupported <strong>and</strong> the cost would be closer to three cents<br />

per page. Agreeing with the plaintiff, the court ordered the defendant to perform the OCR process.<br />

The court determined OCR was not unreasonable or burdensome as it was likely to “streamline the<br />

discovery process” <strong>and</strong> reduce the chance either party would hide relevant information in “a<br />

mountain of difficult-to-search documents.” Focusing on the potential relevancy of the information<br />

sought, the court found the seven Zubulake cost-shifting factors did not favor cost shifting.<br />

� Gateway Senior Hous., Ltd. V. MMA Fin., Inc., 2008 WL 5142152 (E.D. Tex. Dec. 4, 2008). In<br />

this contract litigation, the plaintiffs moved for a determination of privilege waiver <strong>and</strong> sought<br />

sanctions, alleging the defendants withheld relevant information. The plaintiffs argued that privilege<br />

with regard to inadvertently produced e-mails was waived because the defendants failed to list<br />

them in a privilege log, <strong>and</strong> that sanctions were appropriate because two key hard drives were<br />

never produced. Conversely, the defendants argued that everything requested was produced <strong>and</strong><br />

that privilege was timely asserted after notice of the disclosure. Finding the defendants failed to<br />

carry the burden of proving privilege <strong>and</strong> unreasonably delayed in disclosing the existence of the<br />

alleged privilege documents, the court held the attorney-client privilege was waived. Regarding<br />

sanctions, the court granted a discretionary adverse inference that the missing hard drives<br />

contained information unfavorable to the defendants evidenced by its failure to produce them along<br />

with reasonable expenses <strong>and</strong> attorneys fees associated with bringing the current motion.<br />

� Super Future Equities, Inc. v. Wells Fargo Bank Minn., N.A., 2008 WL 3261095 (N.D.Tex. Aug.<br />

8, 2008). In this racketeering litigation, the plaintiff filed an objection to the magistrate judge’s order<br />

that recommended monetary sanctions <strong>and</strong> a jury instruction allowing for the consideration of<br />

spoliation. Previously the defendants moved for sanctions <strong>and</strong> contempt against the plaintiff <strong>and</strong><br />

two counter-defendants, alleging they failed to preserve hard drives as instructed by a preservation<br />

order. An independent forensic expert reviewed the two counter-defendants’ hard drive images for<br />

relevant documents <strong>and</strong> determined the first hard drive was actually a damaged DVD that<br />

contained only active files, excluding unallocated space. When examining an additional drive, the<br />

forensic expert noted it was wiped using “Window Washer,” which intentionally deleted large<br />

quantities of data. Based on this willful spoliation, the magistrate judge recommended monetary<br />

sanctions as well as an adverse jury instruction on the remaining counterclaim. After conducting a<br />

de novo review, the court overruled the plaintiff’s objection <strong>and</strong> adopted the magistrate judge’s<br />

order in full.<br />

� United States v. General Maritime Mgmt., 2008 WL 2810594 (S.D.Tex. July 21, 2008). In this<br />

criminal prosecution, the government’s material witness filed a motion to assert attorney-client<br />

privilege <strong>and</strong> for reconsideration of the court’s previous order to disclose a mirror image of the<br />

witness’ computer hard drive. The witness previously provided the government with voluntary<br />

consent to search <strong>and</strong> create a forensically sound image of his computer’s hard drive. Subsequent<br />

to this search, the government provided the defendants with all material relevant to this case. The<br />

defendants argued for disclosure of the imaged hard drive claiming the witness’ voluntary consent<br />

waived the attorney-client privilege. Agreeing with the defendants, the court held that the voluntary<br />

138


disclosure of the hard drive to the government resulted in waiver of any attorney-client privilege<br />

<strong>and</strong> ordered the government to produce the mirror image in its entirety.<br />

� Texas v. City of Frisco, 2008 WL 828055 (E.D.Tex. Mar. 27, 2008). In this case, the State of<br />

Texas sought a declaratory judgment <strong>and</strong> protection from a litigation hold request previously sent<br />

by the City of Frisco seeking preservation of all electronic data related to a potential environmental<br />

litigation. The defendant filed a motion to dismiss, arguing that the plaintiff was seeking an advisory<br />

opinion concerning the proper method of preservation without pleading all necessary elements of a<br />

viable claim. Agreeing with the defendant <strong>and</strong> dismissing the case, the court determined the issues<br />

were not yet ripe <strong>and</strong> encouraged both parties to make a good faith effort in preservation <strong>and</strong><br />

production of documents in the absence of court intervention.<br />

� Equity Analytics, LLC v. Lundin, 2008 WL 615528 (D.D.C. Mar. 7, 2008). In this suit, the plaintiff<br />

claimed the defendant, a former employee, illegally accessed electronically stored information after<br />

being terminated. The parties agreed a computer forensics examination was necessary to analyze<br />

the defendant’s computer, but could not reach agreement on how the examination should<br />

progress. To protect his privacy, the defendant sought to restrict the search by keywords <strong>and</strong> file<br />

type, but the plaintiff argued such would be under inclusive. Recognizing that the effectiveness of a<br />

particular search methodology requires expert testimony, Magistrate Judge Facciola required the<br />

plaintiff to submit an affidavit from its examiner explaining, inter alia, the limitation of the proposed<br />

search, how the search is to be conducted, whether a mirror image would be a perfect copy <strong>and</strong><br />

whether there would be some reason to preserve the drive once imaged.<br />

� Xpel Tech. Corp. v. Am. Filter Film Distrib., 2008 WL 744837 (W.D.Tex. Mar. 17, 2008). In this<br />

copyright infringement claim, the plaintiff filed a motion for expedited computer forensic imaging of<br />

various electronic media. Finding the plaintiff had demonstrated good cause under Fed.R.Civ.P.<br />

26(d), the court ordered the defendant to produce computers, servers <strong>and</strong> other electronic storage<br />

devices for bit-for-bit imaging by a specified forensic examiner. The court also ordered<br />

authentication of the images via comparison of their MD5 hash values to the originals.<br />

� Diabetes Ctr. of Am. v. Healthpia Am., Inc., 2008 WL 336382 (S.D.Tex. Feb. 5, 2008). In this<br />

breach of contract case, both parties moved for sanctions, alleging spoliation <strong>and</strong> discovery<br />

abuses. The plaintiff’s motion sought a spoliation jury instruction alleging the defendant failed to<br />

backup e-mails which were subsequently lost when the defendants’ laptops were stolen. The<br />

plaintiff also sought monetary sanctions for alleged discovery abuses, alleging the defendants’<br />

withholding of documents caused the plaintiff’s attorney to incur unnecessary travel expenses. The<br />

defendants sought a spoliation jury instruction <strong>and</strong> alleged the plaintiff failed to preserve <strong>and</strong><br />

produce requested copies of critical e-mails. Additionally, the defendants sought monetary<br />

sanctions alleging the plaintiff failed to notify the defendants that evidence had been lost prior to<br />

flying an employee to the site to inspect it. The court determined there was an absence of bad faith<br />

<strong>and</strong> denied both requests for sanctions. The court further denied both parties’ requests for<br />

monetary sanctions finding both parties produced discovery in an “incomplete or lax manner” on<br />

certain occasions.<br />

� In re Honza, 2007 WL 4591917 (Tex. App. Dec. 28, 2007). In this real estate litigation, the<br />

defendants sought a writ of m<strong>and</strong>amus to set aside a discovery order requiring them to produce<br />

office hard drives for imaging by a computer forensic expert in an effort to locate two particular<br />

documents. The defendants objected to the discovery order, arguing it was overbroad <strong>and</strong> would<br />

lead to the disclosure of privileged <strong>and</strong> confidential information. The court looked to federal <strong>and</strong><br />

state courts for guidance on the general process of hard drive mirror imaging for discovery.<br />

Disagreeing with the defendants, the court found the order was not overbroad, as the defendants<br />

139


were granted a right of first refusal in determining whether information obtained was relevant to the<br />

two documents at issue. Further, the court found there were adequate safeguards against<br />

disclosure of privileged information as the defendant was able to review for privilege prior to<br />

production.<br />

� Escobar v. City of Houston, 2007 WL 2900581 (S.D.Tex. Sept. 29, 2007). In this wrongful death<br />

proceeding, the plaintiff sought an adverse inference sanction for the defendant’s alleged<br />

destruction of electronic communications following notice of the claim. The defendant argued that<br />

the officer involved in the shooting death of the 14 year-old plaintiff did not have an e-mail address<br />

<strong>and</strong> therefore the likelihood of finding any relevant information was nonexistent. The defendant<br />

also claimed the 90 day automatic e-mail deletion policy would have deleted anything relevant prior<br />

to the two years it took the plaintiff to seek electronic communications. Citing Fed.R.Civ.P. 37(f),<br />

the court denied the motion, finding no evidence that relevant e-mails were destroyed in bad faith<br />

in the routine operation of the police department’s computer system.<br />

� Mugworld, Inc. v. G.G. Marck & Assoc., Inc. 2007 WL 1745606 (E.D.Tex. June 15, 2007). In a<br />

suit alleging breach of contract, the defendant motioned the court to issue a protective order to<br />

designate an inadvertently produced email as confidential. The defendant claimed the email<br />

contained trade secret information regarding a list of chemicals used in the manufacture of a<br />

product. The defendant produced the email in January 2006, <strong>and</strong> the email was used by the<br />

plaintiff in a deposition of the defendant’s president in October 2006 without objection. Several<br />

months later, in February 2007, the defendant sought to designate the document as confidential.<br />

The court denied the defendant’s motion <strong>and</strong> held that even if the document had contained trade<br />

secret information the defendant waived any grounds for protection due to its delay in seeking<br />

protection.<br />

� Anadarko Petroleum Corp. v. Davis, 2006 WL 3837518 (S.D. Tex. Dec. 28, 2006). In a<br />

misappropriation of trade secrets case, the plaintiff alleged the defendant stole confidential <strong>and</strong><br />

proprietary electronic information when he left the plaintiff’s company to work for a competitor. The<br />

defendant admitted to taking information from the company on his personal laptop. When the<br />

plaintiff sent him a preservation letter asking not to destroy the information, the defendant, under<br />

advice from his attorney, transferred all of the data on his laptop onto a USB drive <strong>and</strong> deleted all<br />

of the plaintiff’s data from his hard drive. The plaintiff believed that not all information was<br />

transferred <strong>and</strong> some relevant information was deleted. A computer forensics investigation of the<br />

defendant’s computer showed that he only produced around 1GB of information on the USB drive<br />

when around 7GB of information was downloaded. The plaintiff asked the court for sanctions<br />

based on spoliation of evidence. It argued the defendant deliberately destroyed evidence when he<br />

was under a preservation obligation. The defendant argued he only produced less electronic<br />

evidence on the USB drive because he deleted any duplicate documents found during the transfer<br />

<strong>and</strong> only did so for the convenience of the plaintiff. Nevertheless, the defendant agreed to a<br />

forensic examination of his computers to discover if any relevant evidence was deleted. The court<br />

ruled there was not enough evidence to demonstrate the defendant destroyed records in bad faith.<br />

It noted that there was no bad faith destruction because the files were copied to a USB drive to be<br />

given to the plaintiff <strong>and</strong> not completely destroyed as in most spoliation sanction cases. Despite<br />

this ruling, the court ordered the plaintiff to supplement its motion for sanctions once the forensic<br />

investigation is complete. If the investigation reveals that the defendant failed to copy relevant<br />

documents to the USB drive for the plaintiff’s review, then sanctions may be appropriate.<br />

� Williams, Cohen & Gray, Inc. v. CPS Group, Inc., 2006 WL 3316783 (S.D. Tex. Nov. 14, 2006).<br />

On a motion to compel, the plaintiff requested production of documents from the defendant relating<br />

140


to all payment histories of accounts the defendant had with the plaintiff. The defendant objected to<br />

producing hard copies of these documents because of the volume involved. The court noted that<br />

electronic production should be discussed between the parties <strong>and</strong> used since there was no<br />

evidence that such production “would not be ‘reasonably accessible’ electronically, or that<br />

gathering <strong>and</strong> copying the information electronically will cause ‘undue burden’” on the defendant.<br />

The court also cited the proposed changes to Federal Rules of Civil Procedure 26(b)(2) <strong>and</strong> stated<br />

that electronic production costs would be borne by the defendant.<br />

� Arista Records v. Tschirhart, 2006 WL 2728927 (W.D. Tex. Aug. 23, 2006). In a copyright<br />

infringement case involving the illegal downloading of music from the internet, the plaintiff motioned<br />

the court to award default judgment against the defendant for deletion of key computer records.<br />

The defendant was required to produce her computer for inspection two times to determine if<br />

songs had illegally been downloaded from the internet. However, once the defendant eventually<br />

produced her computer, a computer forensics expert determined that wiping software was run<br />

shortly before <strong>and</strong> after production was ordered. The defendant argued that she merely ran a<br />

defragmentation program which comes installed on most computers <strong>and</strong> is run automatically.<br />

However, the plaintiff argues that the defragmentation was performed at key moments in the<br />

litigation <strong>and</strong> was not indicative of a program running a monthly or weekly scan. The court held that<br />

the timeliness of the data deletion was consistent with intent to destroy. The defendant argued<br />

sanctions should be sufficient to prevent the destruction of any more evidence in the case.<br />

However, the court found no other relevant evidence existed that the defendant could destroy.<br />

Therefore, the court held that only an order for default judgment would be fair since key evidence<br />

was missing <strong>and</strong> without it, only piecemeal evidence would remain which greatly prejudiced the<br />

plaintiff in presenting its case.<br />

� MGE UPS Systems v. Fakouri Electrical Engineering, Inc., 2006 WL 680513 (N.D. Tex. March<br />

14, 2006). The defendants filed a motion to strike the plaintiff’s expert testimony, claiming that the<br />

expert had contaminated <strong>and</strong> destroyed electronic evidence by using improper forensic<br />

methodology. The defendant’s expert contended that the plaintiff’s expert had made a number of<br />

errors in conducting an examination of six impounded laptop computers, specifically: (1) used a<br />

methodology that deleted 71 files on the computers; (2) used a methodology that contaminated<br />

<strong>and</strong> altered the date <strong>and</strong> time stamps on 8,803 files on the computers; (3) did not use sanitized<br />

floppy disks to boot the computers or to copy data from the computers; (4) performed multiple<br />

forced shutdowns on the computers that may have created a number of cross-linked files found on<br />

the computers; (5) used improper ghosting procedures to image the computers’ hard drives <strong>and</strong><br />

only obtained part of the data on the computers; <strong>and</strong> (6) used computers without wiped hard drives<br />

during the ghosting procedure. Although the court found evidence that some files were deleted or<br />

altered, the court accepted the plaintiff expert’s explanations that he had excluded the<br />

compromised electronic data in reaching his conclusions. The court denied the defendant’s motion,<br />

finding that the expert’s qualifications <strong>and</strong> explanations of his methodology in conducting a forensic<br />

examination of the laptop computers “were sufficiently reliable <strong>and</strong> that he applied the principles<br />

<strong>and</strong> methods reliably.” The court also refused the defendant’s motion to limit the subject area of<br />

plaintiff’s expert, holding that FRE Rule 702 <strong>and</strong> Daubert principles would be inconsistent with<br />

attempting “to parse these computer issues <strong>and</strong> the experts allowed to discuss them into very<br />

narrow specialties.”<br />

� Crossroads Sys., Inc. v. Dot Hill Sys. Corp., 2006 WL 1544621 (W.D. Tex. May 31, 2006). In a<br />

patent infringement action, the plaintiff sought an order compelling the defendant’s witness to<br />

testify about communications in relation to an email inadvertently produced during discovery. Filing<br />

141


a counter motion, the defendant claimed that the email was protected by attorney-client privilege<br />

<strong>and</strong> dem<strong>and</strong>ed return of the document. The court denied the defendant’s counter motion, finding<br />

the privilege had been waived after the defendant had repeatedly failed to take steps in securing<br />

the return of the email after first learning that the document had been inadvertently disclosed.<br />

Noting that the plaintiff had deposed one of the defendant’s witnesses about the substance of the<br />

email without objection from the defendant in July of 2004, the court chided the defendant’s<br />

counsel for failing to assert a claim of attorney-client privilege at the deposition. The court observed<br />

that the substance of the email should have placed the defendant on notice that it had produced a<br />

document containing privileged communications seeking legal advice. The email contained<br />

attachments specifically labeled “Confidential-Attorney’s Eyes Only” <strong>and</strong> was addressed to a law<br />

firm. Not until February of 2005, when the email was introduced again at another deposition did the<br />

defendant assert attorney-client privilege. Still, the defendant waited three months to petition the<br />

court for return of the document <strong>and</strong> only after the plaintiff refused to return the email <strong>and</strong> brought a<br />

motion to compel further testimony. The court determined that the plaintiff was entitled to keep the<br />

email <strong>and</strong> dem<strong>and</strong> further testimony in relation to it.<br />

� Vela v. Wagner & Brown, Ltd., 2006 WL 1004476 (Tex. App. Apr. 19, 2006) substituted opinion<br />

<strong>and</strong> aff’d by 203 S.W.3d 37 (Tex. App. 2006). Asserting a cross-appeal in an oil <strong>and</strong> gas case, the<br />

appellee challenged an award of $75,000 in monetary sanctions for spoliation of computer data<br />

<strong>and</strong> discovery abuse. The appellee argued, inter alia, it did not have a duty to preserve the<br />

computer data at issue, the data was not intentionally or negligently destroyed, <strong>and</strong> the appellants<br />

were not prejudiced by the absence of the data. During discovery, the appellee had failed to<br />

produce its testifying expert’s underlying computer data work product. The appellee claimed the<br />

data had been stored on the expert’s computer, which had been inadvertently upgraded <strong>and</strong><br />

replaced by the expert’s employer <strong>and</strong> was no longer available. The appellant sought to exclude<br />

the expert’s testimony as a sanction for spoliation of the computer data. The trial court permitted<br />

the expert to testify but ordered the appellee to re-create the expert’s calculations <strong>and</strong> provide the<br />

computer data to the appellants. When the appellee again failed to produce the data, the trial court<br />

awarded sanctions. On appeal, the appellate court affirmed the sanctions award stating, “the trial<br />

court’s order meets both parts of the test for a ‘just’ sanction based on both a pattern of discovery<br />

abuse by [the appellee] <strong>and</strong> its failure to preserve <strong>and</strong> produce [the expert’s] computer data.”<br />

� In re BP Prods., N. Am, Inc., 2006 WL 648816 (Tex. Ct. App. Mar. 13, 2006) Defendant BP<br />

Products North America, Inc. filed a petition for a writ of m<strong>and</strong>amus complaining that the trial judge<br />

had abused her discretion in signing an order on February 6, 2006 compelling BP to produce by<br />

March 17, 2006 “all e-data derived from backup tapes <strong>and</strong> maintained on computer hard drives<br />

under BP’s control” that were responsive to plaintiff’s steering committee request. The Texas<br />

appellate court, which had previously denied BP’s motion for emergency relief requesting a stay of<br />

the order, denied the petition.<br />

� Tantivy Communications, Inc. v. Lucent Techs. Inc., 2005 WL 2860976 (E.D.Tex. Nov. 1,<br />

2005.) In a patent infringement case, the plaintiff sought to exclude evidence based on the<br />

defendant’s “hide the ball” discovery abuse. During discovery, the plaintiff had sought documents<br />

<strong>and</strong> data compilations including documents contained on the defendant’s Internet Web site,<br />

relating to interoperability testing for the products at issue. The defendant had represented<br />

repeatedly it was unaware of any such documents. However one of the defendant’s employees<br />

revealed at a later deposition, pursuant to the defendant’s document destruction practices, paper<br />

documents were shredded <strong>and</strong> electronic documents were deleted that included interoperability<br />

contracts <strong>and</strong> test plans. Citing Zubulake, the court stated, “[the defendant] <strong>and</strong> its counsel are well<br />

142


aware that a party in litigation must suspend its routine document retention/destruction policy <strong>and</strong><br />

establish a ‘litigation hold’ to ensure the preservation of relevant documents.” The court further<br />

declared it would not allow “lawyers or their clients to lay behind the log <strong>and</strong> disregard their<br />

discovery obligations.” As a result, the court stated it would issue an appropriate remedy for both<br />

the defendant <strong>and</strong> its counsel after considering all the evidence.<br />

� Fowler v. Bell Helicopter Textron, Inc., 2005 WL 548076 (N.D. Tex. Mar. 9, 2005). The plaintiff<br />

filed suit against the defendant claiming copyright infringement, breach of contract, <strong>and</strong> trade<br />

secret theft. The plaintiff claimed he wrote a computer software program prior to his employment<br />

with the defendant <strong>and</strong> was promised compensation for the program by the defendant. The<br />

defendant failed to pay <strong>and</strong> developed a similar program after the plaintiff terminated his<br />

employment. The defendant claimed the plaintiff wrote the program during his employment,<br />

counterclaimed with similar allegations, <strong>and</strong> sought a declaratory judgment <strong>and</strong> partial summary<br />

judgment. Contending summary judgment was inappropriate, the plaintiff argued that date <strong>and</strong> time<br />

stamps on floppy discs containing the code proved he created the program prior to working for the<br />

defendant. The plaintiff presented a computer forensic expert’s affidavit that indicated it would have<br />

been an “enormous task” to change the date <strong>and</strong> time stamps associated with the files on the<br />

floppy discs. The defendant offered an opinion by another expert who stated it would be “relatively<br />

easy to doctor the time <strong>and</strong> date stamps on the floppy discs containing [the plaintiff’s] original<br />

code.” Declining to grant the defendant’s motion for summary judgment, the court found a genuine<br />

issue of material fact existed <strong>and</strong> declared, “[a]ny determination as to which expert to<br />

believe…belongs to the jury.”<br />

� Computek <strong>Computer</strong> & Office Supplies, Inc. v. Walton, 156 S.W.3d 217 (Tex. App. 2005). The<br />

plaintiff sought injunctive relief <strong>and</strong> damages against the defendants for misappropriating trade<br />

secrets obtained while working for the plaintiff. The trial court awarded more than $200,000 in<br />

actual <strong>and</strong> exemplary damages <strong>and</strong> entered a permanent injunction in favor of the plaintiff. As<br />

entered by the trial court, the injunction banned the defendants from “[r]emoving or destroying any<br />

files, or copies of files, including but not limited to [the defendants’] computer or computer files.” On<br />

appeal, the defendants argued the injunction was overbroad because it prohibited them from<br />

engaging in lawful “routine” document destruction of records or files unrelated to the plaintiff or the<br />

litigation. The appellate court agreed <strong>and</strong> modified the injunction to forbid the defendants from<br />

“[r]emoving or destroying any files, or copies of files, including but not limited to Defendants’<br />

computer or computer files, relating to [the plaintiff].”<br />

� In re Estate of Steed, 152 S.W.3d 797 (Tex. Ct. App. 2004). In a case involving a will contest, the<br />

sons of the deceased filed an application to probate a 2001 computer-generated will. The<br />

deceased’s widow filed a conflicting application to probate a 1998 holographic will. At trial, the jury<br />

determined the deceased never executed the computer-generated will <strong>and</strong> the deceased did not<br />

execute the holographic will with testamentary intent. On cross-appeal, the sons argued the<br />

computer-generated will – found on the deceased’s computer after his death – was properly<br />

executed as a matter of law <strong>and</strong> the jury’s decision went against the great weight of the evidence.<br />

At trial, the widow’s expert had suggested someone could have easily manipulated the create date<br />

of the computer-generated will, making it unreliable. The appellate court noted, however, that the<br />

widow’s expert was not a computer expert <strong>and</strong> had not actually examined the deceased’s<br />

computer. Moreover, the testimony from the widow’s expert conflicted with testimony given by the<br />

sons’ expert – who had actually examined the computer. The sons’ computer expert testified that<br />

any manipulation of the create date would have been easily detectable. The sons’ expert further<br />

testified he found no evidence of manipulation. Based on this <strong>and</strong> other testimony, the court<br />

143


eversed <strong>and</strong> rem<strong>and</strong>ed, stating the jury’s decision was “clearly wrong <strong>and</strong> unjust” <strong>and</strong> contradicted<br />

the great weight of the evidence.<br />

� BASF Fina Petrochemicals Ltd. Partnership v. H.B. Zachry Co., 168 S.W.3d 867 (Tex. Ct. App.<br />

2004). In a breach of contract action, the defendants subpoenaed electronic data from a non-party.<br />

The non-party responded by producing 30,000 e-mails <strong>and</strong> attachments, 70 megabytes of e-mail<br />

data, 8,000 spreadsheets, <strong>and</strong> hard copy documents. The non-party requested legal fees <strong>and</strong><br />

costs from the defendants for collecting, reviewing <strong>and</strong> producing this data based on a state statute<br />

requiring a party to reimburse a non-party for reasonable production costs. The non-party argued<br />

the costs <strong>and</strong> attorneys’ fees were an “undue burden or expense” they suffered as a result of<br />

responding to the defendants’ subpoena. The trial court awarded the non-party production costs<br />

but denied attorneys’ fees, on the grounds that the statute excluded attorney fee awards. On<br />

appeal, the appellate court affirmed <strong>and</strong> held the statute did not include attorney’s fees as part of<br />

production costs <strong>and</strong> the attorneys’ fees were not an “undue burden or expense,” absent a showing<br />

that the requesting party did not take “reasonable steps” to limit the scope of discovery.<br />

� Propath Services, LLP v. Ameripath, Inc., 2004 WL 2389214 (N.D.Tex. Oct. 21, 2004). Alleging<br />

the defendants violated a non-compete employment contract, the plaintiffs sought a preliminary<br />

injunction against the defendants. The court had previously issued a temporary restraining order<br />

prohibiting the defendants from using confidential information, deleting relevant e-mails or<br />

documents, <strong>and</strong> accessing the plaintiffs’ e-mail system. Among the items at issue were electronic<br />

marketing materials <strong>and</strong> a confidential client list. The defendant argued that the marketing<br />

materials – including PowerPoint slides – were not confidential since they were presented in public<br />

settings. While the court concluded that the PowerPoint presentations were not confidential, it<br />

nonetheless prohibited the defendants from having unrestricted access based on the plaintiffs’ right<br />

to protect their proprietary data. The court ordered the defendants to refrain from using any<br />

PowerPoint slides produced or modified during the defendants’ employment. Regarding the<br />

confidential client list, the court found that one of the defendants accessed the client list while<br />

simultaneously burning CDs <strong>and</strong> sending e-mails that may have contained confidential information.<br />

Based on these findings, the court ordered the defendants to refrain from deleting or modifying any<br />

documents, e-mails or computer drives that contained information about the plaintiff’s business.<br />

The court further ordered the defendants to separate these materials from the rest of their files <strong>and</strong><br />

to store them in a confidential file.<br />

� Positive Software Solutions, Inc. v. New Century Mortgage Corp., 337 F.Supp.2d 862<br />

(N.D.Tex. 2004). In a copyright infringement suit, the plaintiff filed a contempt motion against the<br />

defendants for violating a preliminary injunction <strong>and</strong> protective order. In response, the defendants<br />

also moved for a contempt motion <strong>and</strong> sought to affirm an arbitration award in their favor. In<br />

reference to the protective order, the defendants represented they would cease using <strong>and</strong> destroy<br />

all copies of the plaintiff’s proprietary software. Defense counsel asserted that it would keep<br />

backup tapes <strong>and</strong> forensic copies of the software in a temperature-controlled, secure facility.<br />

Despite the order, however, the defendants continued to use the software <strong>and</strong> inadvertently<br />

produced a document to the plaintiff detailing their analysis of the database schema of the<br />

software. The defendants also restored seven or eight backup forensic copies of the software to<br />

use during its unauthorized analysis. The court noted that the protective order did not specifically<br />

address the defendants’ conduct because the defendants had represented such prohibition would<br />

be unnecessary. The court stated that the defendant “thus created a loophole, <strong>and</strong> then covertly<br />

took advantage of it.” The court held “with considerable reluctance” that the protective order was<br />

144


not clear enough to warrant enforcement by contempt <strong>and</strong> declined to hold either party in<br />

contempt.<br />

� Massimo v. State, 144 S.W.3d 210 (Tex. Ct. App. 2004). Challenging a misdemeanor conviction<br />

for harassment by electronic communication, the defendant argued, among other things, that the<br />

trial court erred by not granting her a continuance. Specifically, the defendant argued she was<br />

entitled to a continuance because she did not receive e-mails, relied upon by the prosecution, until<br />

the day of trial. Defense counsel further argued that it needed the e-mails in order to have an<br />

expert evaluate their source before trial. Denying the defendant’s motion, the trial court noted<br />

copies of the e-mails were available three days before trial <strong>and</strong> defense counsel should have<br />

picked up the copies at the District Attorney’s office. On appeal, the appellate court also indicated<br />

that counsel should not have waited 17 days before the trial to file discovery <strong>and</strong> inspection of<br />

evidence motions <strong>and</strong> that counsel could have hired an expert even if the e-mails were unavailable<br />

for review. In affirming the trial court’s decision, the appellate court declared, “the failure to obtain<br />

an expert or to obtain the e-mails until the eve of trial can hardly be the fault of the State…[the<br />

defendant] was at least partially, if not totally, responsible for their last-minute production.”<br />

� Multitechnology Servs. v. Verizon Southwest, 2004 WL 1553480 (N.D. Tex. July 12, 2004). In a<br />

discovery dispute relating to the allocation of costs for responding to interrogatories, the defendant<br />

sought a protective order declaring that it would cost $60,000 to produce the requested<br />

information, which was in electronic format. A magistrate judge ordered the plaintiff to pay half of<br />

the costs. In response to the order, the plaintiff argued that it was requesting only “accessible<br />

data,” making cost-shifting inappropriate in this case under the Zubulake seven-factor test. Finding<br />

cost-shifting was fair, the magistrate asserted that “requiring the parties to evenly shoulder the<br />

expense is the most effective resolution because it balances the benefit of the discovery for [the<br />

plaintiff] <strong>and</strong> provides [the defendant] with incentive to manage the costs it incurs in answering [the<br />

plaintiff’s] interrogatories.” The magistrate further classified the expenses as court costs that the<br />

prevailing party could recover. See also Multitechnology Servs. v. Verizon Southwest, No. 4:02-<br />

CV-702-Y (N.D. Tex. July 19, 2004) (affirming the magistrate judge’s decision).<br />

� In re Lowe’s Cos., Inc., 2004 WL 1092374 (Tex. App. May 18, 2004). In a personal injury lawsuit,<br />

the trial court granted the plaintiff’s motion for an order compelling production of the defendant’s<br />

computer database. Specifically, the trial court ordered the defendant to bring or have access to a<br />

computer at the defendant’s deposition that could search, sort, <strong>and</strong> print any database information<br />

that the plaintiff’s counsel might request. The defendant objected to the order claiming that the<br />

request was overbroad <strong>and</strong> argued that producing the entire database electronically would give the<br />

plaintiff unfettered access to privileged or irrelevant information. Ruling in favor of the defendant,<br />

the appellate court declared that “requests for information that are not reasonably tailored as to<br />

time, place, or subject matter amount to impermissible ‘fishing expeditions’.” Finding the discovery<br />

order overbroad, the appellate court issued a writ of m<strong>and</strong>amus, vacating the portion of the order<br />

that required production of the database.<br />

� Cisco Sys., Inc. v. Alcatel USA, Inc., 301 F. Supp.2d 599 (E.D. Tex. 2004). The plaintiff sued the<br />

defendant, a competitor, for antitrust violations, <strong>and</strong> the defendant counterclaimed declaring that it<br />

owned the allegedly misappropriated property. The plaintiff moved to dismiss the counterclaim on<br />

res judicata principles given that the defendant’s allegations were the subject of a prior litigation<br />

that had been dismissed by the trial judge. In response, the defendant argued that the plaintiff’s<br />

late production of volumes of electronic data contained on back up tapes prevented the defendant<br />

from bringing its claim in the first lawsuit. Rejecting this argument, the court concurred with the trial<br />

judge in the first case <strong>and</strong> gave the defendant “no allowances for having sat on the information” for<br />

145


nine months after it was finally made available to the defendant. As such, the court dismissed the<br />

defendant’s counterclaim on the grounds that it was barred by res judicata.<br />

� Kupper v. State, 2004 WL 60768 (Tex. App. Jan. 14, 2004). The defendant appealed his sexual<br />

assault conviction, challenging the admissibility of e-mail messages retrieved from the defendant’s<br />

deleted files on his work computer <strong>and</strong> an e-mail message <strong>and</strong> a photograph retrieved from the<br />

temporary internet files on his work computer. At trial, a police detective trained in computer<br />

forensics testified that she imaged the defendant’s home <strong>and</strong> work computers <strong>and</strong> engaged in a<br />

computer forensic investigation to locate the evidence in question against the defendant. The<br />

appellate court rejected the defendant’s arguments <strong>and</strong> concluded that the police detective’s<br />

testimony established that the appearance, contents, substance, internal patterns, or other<br />

distinctive characteristics, taken in conjunction with the circumstances, authenticated the computer<br />

evidence. The court further determined that there was no evidence raising chain of custody issues.<br />

� Positive Software Solutions v. New Century Mortgage Corp., 259 F. Supp. 2d 561 (N.D.Tex.<br />

2003). To ensure no other potentially relevant information was deleted, the court ordered the<br />

defendants to preserve all backups <strong>and</strong> images of servers <strong>and</strong> personal computers that contain or<br />

contained files at issue. The court further ordered the defendant to refrain from deleting any such<br />

files still resident on any servers or personal computers <strong>and</strong> to preserve all backups or images.<br />

Finding the scope substantially overbroad, the court denied the plaintiff’s motion to compel imaging<br />

"of all of defendants’ media potentially containing any of the software <strong>and</strong> electronic evidence<br />

relevant to the claims in this suit" <strong>and</strong> "all images of [defendants’] computer storage facilities,<br />

drives, <strong>and</strong> servers taken to date.”<br />

� In re CI Host, Inc., 92 S.W.3d 514 (Tex. 2002). Customers brought a breach of contract class<br />

action against the company hosting their web services. During discovery, the trial court ordered the<br />

defendant to preserve <strong>and</strong> produce computer backup tapes containing potentially relevant<br />

evidence. The defendant objected that the request was overbroad, dem<strong>and</strong>ed confidential<br />

information, <strong>and</strong> was in violation of the federal <strong>Electronic</strong> Communications Privacy Act. The<br />

appellate court held that in light of the defendant’s failure to produce evidence supporting its<br />

objections as required by Texas Rule of Civil Procedure 193.4(a), the trial court did not abuse its<br />

discretion in ordering the contents of the tapes to be produced.<br />

� Taylor v. State, 93 S.W.3d 487 (Tex. App. 2002). On appeal, the defendant argued that the trial<br />

court’s refusal to order the State to provide him with a complete copy of the hard drive in question<br />

as “material physical evidence” for inspection requires reversal. Likening the situation to a drug<br />

case in which the defendant has the right to have the contrab<strong>and</strong> reviewed by an independent<br />

expert, the appellate court stated, “mere inspection of the images … is not the same as an<br />

inspection of the drive itself (or an exact copy thereof). It is certainly not the same as an<br />

independent forensic examination of the contents of the hard drive by an expert.”<br />

� Harris v. WHMC, Inc., 2002 WL 1821989 (Tx. Ct. App. Aug. 8, 2002). In a medical malpractice<br />

suit, the plaintiff appealed the trial court’s exclusion from evidence certain e-mail correspondence<br />

based on privilege. The trial court ruled that the plaintiff could use the e-mails at trial for<br />

impeachment purposes, but the e-mails themselves would not be admitted. The appellate court<br />

concluded that even if the trial court erred in excluding the e-mails, it was harmless error <strong>and</strong> did<br />

not cause an improper judgment.<br />

� Broderick v. State, 35 S.W.3d 67 (Tex. App. 2000). In child sex abuse prosecution, the court<br />

affirmed the trial court’s admission of a duplicate of the defendant’s hard drive, in place of the<br />

original. The court concluded that the state’s best evidence rule did not preclude admission<br />

146


ecause the computer expert testified that the copy of the hard drive exactly duplicated the<br />

contents of the hard drive.<br />

� St. Clair v. Johnny’s Oyster & Shrimp, 76 F. Supp. 2d 773 (S.D. Tex. 1999). “[A]ny evidence<br />

procured off the Internet is adequate for almost nothing, even under the most liberal interpretation<br />

of the hearsay exception.”<br />

� Smith v. Texaco, Inc., 951 F. Supp. 109, (E.D. Tex 1997), rev’d on other grounds, 263 F.3d 394<br />

(5th Cir. 2001). Modifying the original state court TRO in a race discrimination case, the court<br />

permitted the moving of certain documents in the ordinary <strong>and</strong> usual course of business <strong>and</strong> the<br />

deletion of electronic records in the ordinary <strong>and</strong> usual course of business, provided that hard copy<br />

records be made <strong>and</strong> kept.<br />

� American Banker Ins. Co. v. Caruth, 786 S.W.2d 427 (Tex. Ct. App. 1990). Courts can impose<br />

sanctions on parties that fail to comply with electronic discovery requests.<br />

� Pearl Brewing Co. v. Joseph Schiltz Brewing Co., 415 F. Supp. 1122 (S.D. Tex. 1976). In an<br />

antitrust action, the court allowed the defendant to inspect <strong>and</strong> copy the computer programs <strong>and</strong><br />

systems documentation at issue <strong>and</strong> to depose the plaintiff’s computer experts as to the creation of<br />

the systems.<br />

Sixth Circuit – State <strong>and</strong> Federal <strong>Case</strong>s<br />

� Grange Mut. Cas. Co. v. Mack, 2008 WL 744723 (6th Cir. Mar. 17, 2008). In this suit alleging<br />

fraud, the defendant appealed a default judgment <strong>and</strong> liability award of damages plus attorney’s<br />

costs <strong>and</strong> fees, arguing abuse of judicial discretion. The defendant purposely delayed discovery,<br />

ignored court discovery deadlines <strong>and</strong> orders to compel, instructed employees to ignore court<br />

orders <strong>and</strong> ignored a serious warning from the district judge relating to his continued discovery<br />

misconduct. Based on the defendant’s willful bad faith <strong>and</strong> the resulting prejudice suffered by the<br />

plaintiffs, the court affirmed the default judgment, “[B]oth to punish the defendant for his egregious<br />

conduct <strong>and</strong> to deter other litigants who might be tempted to make a mockery of the discovery<br />

process.”<br />

� First Tech. Safety Sys., Inc. v. Depinet, 11 F.3d 641 (6th Cir. 1993). “In order to justify<br />

proceeding ex parte…the applicant must do more than assert that the adverse party would dispose<br />

of evidence if given notice.” Instead, the party must demonstrate that the adverse party has a<br />

“history of disposing of evidence or violating court orders…”<br />

Kentucky<br />

� GATX Corp. v. Appalachian Fuels, LLC, 2010 WL 5067688 (E.D. Ky. Dec. 7, 2010). In this<br />

litigation regarding an alleged breach of two leases, the defendant argued the plaintiff intentionally<br />

produced hundreds of documents protected by privilege which resulted in a subject matter waiver<br />

under Fed.R.Evid. 502. Upon review of over 200 produced documents, the court determined that<br />

roughly 25 e-mail communications contained privileged material. In disagreeing with the plaintiff’s<br />

claim that these documents were inadvertently produced, the court found that the plaintiff did not<br />

demonstrate the steps it took to comply with 502(b) as it failed to identify which document(s) it<br />

sought the return of. Noting that attorney-client privilege waiver does not automatically lead to<br />

subject matter waiver, the court found that the relatively low number of privileged documents<br />

produced did not necessarily warrant a finding that the disclosure was intentional. Further, the<br />

court noted that subject matter waiver exists only in cases where a party deliberately discloses<br />

147


privileged information in an attempt to gain a tactical advantage <strong>and</strong>, because the plaintiff did not<br />

use privilege as both a “shield <strong>and</strong> a sword,” subject matter waiver did not extend to documents<br />

withheld in the privilege log.<br />

� Mohrmeyer v. Wal-Mart Stores E., L.P., 2009 WL 4166996 (E.D. Ky. Nov. 20, 2009). In this "slip<br />

<strong>and</strong> fall" personal injury action, the plaintiff sought sanctions against the defendant based on<br />

alleged spoliation of certain materials including surveillance video <strong>and</strong> a restroom maintenance log.<br />

The defendant argued the log was destroyed in the routine course of business long before it was<br />

made aware of the possibility of litigation. Relying on Fed.R.Civ.P. 37(e), the court found imposing<br />

sanctions on the defendant would be inappropriate because the evidence was destroyed as a<br />

result of routine, good-faith records management practices long before the defendant received any<br />

notice of the likelihood of litigation. Thus, the court denied the plaintiff’s motion for sanctions <strong>and</strong><br />

admonished the plaintiff’s lack of inquiry of relevant facts prior to seeking such serious sanctions.<br />

� KCH Servs., Inc. v. Vanaire, Inc., 2009 WL 2216601 (W.D.Ky. July 22, 2009). In this copyright<br />

infringement action, the plaintiff moved for sanctions in the form of a default judgment or, in the<br />

alternative, an adverse inference instruction for spoliation. The court found that an October 2005<br />

phone call from the plaintiff <strong>and</strong> the November 2005 filing of a complaint were both notice of<br />

litigation, <strong>and</strong> that the defendant subsequently failed to preserve potentially discoverable e-mails by<br />

continuing to delete <strong>and</strong> overwrite data even after the receipt of a preservation letter. The court<br />

held that the defendant’s deletion of data <strong>and</strong> failure to implement a litigation hold fell beyond the<br />

scope of the routine, good faith operation of an electronic information system <strong>and</strong> constituted<br />

spoliation. Finding that an adverse inference instruction would redress the spoliation, the court<br />

granted the motion for adverse inference sanctions but denied awarding default judgment.<br />

� In re Classicstar Mare Lease Litig., 2009 WL 260954 (E.D.Ky. Feb. 2, 2009). In this litigation, the<br />

defendant moved for a protective order after the plaintiffs sought reproduction of financial<br />

documents in native format. Previously, the defendant produced 273,000 pages in TIFF format <strong>and</strong><br />

claimed that reproduction in native format would be extremely difficult <strong>and</strong> burdensome as some<br />

information would need to be redacted <strong>and</strong> older data could be corrupted. The defendant also<br />

argued the first production was in a “reasonably usable format” in compliance with Fed.R.Civ.P<br />

34(b). However, the plaintiffs argued native format would save them “hundreds of hours” <strong>and</strong> make<br />

the data much more usable as it was complex information <strong>and</strong> extremely reliant on the reporting<br />

features within the software. Citing an exchange between the parties in which the defendant<br />

agreed to produce material in native format if the plaintiff purchased the software needed to review<br />

the documents, the court ordered the defendant to reproduce the data in native format. The court<br />

shifted the reasonable cost of copying <strong>and</strong> delivering the second production to the plaintiff as the<br />

defendant had complied with its obligations during the first production.<br />

� Static Control Components, Inc. v. Lexmark Int’l, Inc., 2006 WL 897218 (E.D. Ky. Apr. 5, 2006).<br />

In a patent infringement case, the plaintiff sought production of a copy of a database <strong>and</strong> offered to<br />

bear the burden of extracting relevant data. The defendant claimed it had already produced<br />

relevant data from after November of 2004 <strong>and</strong> had given the plaintiff an opportunity to inspect the<br />

database for relevant information pre-dating November 2004. Additionally, the defendant explained<br />

it could not produce relevant records prior to November 2004 as that information was not text<br />

searchable <strong>and</strong> it required software that was no longer available. The magistrate ordered the<br />

defendant to produce the pre-November 2004 database to the plaintiff in a “reasonably usable<br />

form” stating, “The Federal Rules do not permit [the defendant] to hide behind its peculiar computer<br />

system as an excuse for not producing this information to [the plaintiff].” However, finding the<br />

148


database contained proprietary information, the magistrate required the plaintiff to designate any<br />

extracted data as “Outside Counsel Only” information.<br />

� Williams v. Du Pont, 119 F.R.D. 648 (W.D. Ky. 1987). The discovering party must bear costs of<br />

data production <strong>and</strong> reimburse responding party for a portion of its expense in assembling the<br />

database.<br />

Michigan<br />

� Tompkins v. Detroit Metropolitan Airport, 278 F.R.D. 387 (E.D. Mich. Jan. 2012). In this slip <strong>and</strong><br />

fall case, the defendants sought a court order granting it access to the plaintiff’s entire Facebook<br />

account. Citing McMillen v. Hummingbird Speedway, Inc. <strong>and</strong> Romano v. Steelcase, Inc., the<br />

defendants asserted that nonpublic Facebook postings are generally not protected by any privacy<br />

privilege. Next, the defendants attempted to show that the private portions sought were reasonably<br />

calculated to lead to admissible evidence. The defendants argued that publicly available photos of<br />

the plaintiff st<strong>and</strong>ing at a birthday party in Florida—while holding a small dog—were inconsistent<br />

with her claims of inability to work <strong>and</strong> enjoy life. While the court agreed with defendants that there<br />

is no such thing as a social media privilege, it noted that the defendant “does not have a<br />

generalized right to rummage at will through information that Plaintiff has limited from public view.”<br />

Distinguishing McMillen <strong>and</strong> Romano, the court ruled that the defendant’s preliminary showing was<br />

not enough to show any inconsistency with the plaintiff’s damage claims.<br />

� Nissan N. Am., Inc. v. Johnson Elec. N. Am., Inc., 2011 WL 1002835 (E.D. Mich. Feb. 17,<br />

2011). In this discovery dispute, the plaintiff moved for a protective order in response to the<br />

defendant’s informal request for additional information. Having produced more than 1.79 million<br />

pages of documents during discovery, along with 84,000 pages of documents from its non-party<br />

Japanese parent company, the plaintiff argued the order was necessary to prevent producing its<br />

record retention policies <strong>and</strong> data map, <strong>and</strong> conducting broad system-wide searches along with<br />

searches of systems not readily accessible. Although the court agreed the backup systems were<br />

not readily accessible, it found that the defendant had not requested this information or the systemwide<br />

searches. Instead, the defendant requested the plaintiff’s backup policies, tracking records,<br />

requests for restores <strong>and</strong> confirmation that relevant data sources of 41 employees had been<br />

searched. Regarding the data map, the court noted that counsel must be knowledgeable about<br />

their client’s computer systems <strong>and</strong> ESI at the onset of litigation pursuant to Fed.R.Civ.P.<br />

26(a)(1)(ii); thus, producing this information should not be an undue burden. Accordingly, the court<br />

denied the protective order.<br />

� Whited v. Motorists Mut. Ins. Co., 2010 WL 3862717 (E.D. Mich. Sept. 28, 2010). In this litigation<br />

involving claims for insurance benefits, the defendants moved for dismissal of the plaintiff’s claims<br />

<strong>and</strong> for summary judgment on multiple counterclaims alleging, inter alia, fraud <strong>and</strong> unjust<br />

enrichment. During the “acrimonious” discovery process, substantial allegations that some<br />

documents were falsified led the court to order the plaintiff to surrender all computers for forensic<br />

examination. Although the court warned the plaintiff that her conduct was perilously close to<br />

willfulness <strong>and</strong> bad faith <strong>and</strong> forbade anyone from using the computers, the forensic examination<br />

revealed evidence of extensive tampering including the replacement of a hard drive, deletion of<br />

1,300 files <strong>and</strong> backdating of dozens of documents. Upon review of this evidence, the court found<br />

the plaintiff’s inherently suspect explanations strained credulity <strong>and</strong> undermined her claims of good<br />

faith. Noting that the intentional deletion of files alone was sufficient to support a finding of<br />

149


willfulness <strong>and</strong> bad faith, the court found this case justified the extreme sanctions <strong>and</strong> granted<br />

dismissal with prejudice.<br />

� Laethem Equip. Co., v. Deere & Co., 2009 WL 3064663 (E.D. Mich. Sept. 21, 2009). In this<br />

ongoing breach of contract dispute, the court adopted the magistrate judge’s report that<br />

recommended denial of the defendant’s motion for sanctions <strong>and</strong> additional discovery of trial<br />

witnesses. The defendant sought sanctions, arguing the plaintiff failed to produce relevant ESI <strong>and</strong><br />

privilege logs before depositions were taken. The plaintiff denied the defendant’s allegations,<br />

arguing the motion for sanctions was intended to "divert attention from [defendant’s] misconduct."<br />

Noting that this motion was a further example of how discovery is now a "black hole" that has the<br />

power to "annihilate the case itself," the magistrate judge recommended denial of the defendant’s<br />

motion, finding the defendant failed to establish its defenses had been "materially prejudiced." The<br />

report further found the defendant failed to demonstrate that it was unable to obtain information it<br />

had a right to seek during depositions, but recommended the court allow an additional opportunity<br />

to depose trial witness not already deposed.<br />

� Sungjin Fo-Ma, Inc. v. Chainworks, Inc., 2009 WL 2022308 (E.D.Mich. July 8, 2009). In this<br />

contract dispute, the defendant moved to compel responses to interrogatories. In regard to several<br />

of the disputed interrogatories, the plaintiff had produced English <strong>and</strong> nontranslated Korean<br />

language documents under Fed.R.Civ.P. 33, which provides the option to produce business<br />

records in response to an interrogatory provided the burden of ascertaining the answer will be<br />

substantially the same for either party. The court held that the plaintiff’s failure to specify which of<br />

the disclosed documents are responsive to which interrogatories does not satisfy Rule 33’s<br />

specificity requirement. Moreover, the court held that the burden of ascertaining the answers to the<br />

interrogatories was not substantially similar for the parties, noting that the plaintiff can readily refer<br />

to its documents—which it should be familiar with—<strong>and</strong> extract the information necessary to<br />

provide an English language answer to the defendant’s interrogatories while the translation burden<br />

would be great on the defendant.<br />

� Valeo Elec. Sys., Inc. v. Clevel<strong>and</strong> Die & Mfg. Co., 2009 WL 1803216 (E.D. Mich. June 17,<br />

2009). In this contract dispute, the defendant moved to compel the plaintiff to organize the data it<br />

produced into the 28 specific categories of the document production request. The plaintiff had<br />

produced more than 270,000 pages of documents in the order that they were found on the hard<br />

drive of each document custodian along with two indices to aid in interpreting <strong>and</strong> sorting the<br />

documents. The defendant asserted that the plaintiff’s production required it to manually open <strong>and</strong><br />

review each file <strong>and</strong> that the plaintiff had given each file “innocuous” names in order to frustrate the<br />

defendant’s review. Finding the plaintiff had produced the documents as they were kept in the<br />

ordinary course of business, the court determined there was no indication that the documents or<br />

file names were modified by the plaintiff. Accordingly, the court found the plaintiff’s production<br />

satisfied Fed.R.Civ.P. 34 <strong>and</strong> denied the defendant’s motion, noting that to require more would<br />

impose an unfair burden on the producing party.<br />

� Technical Sales Associates, Inc. v. Ohio Star Forge Co., 2009 U.S. Dist. (E.D.Mich. May 1,<br />

2009). In this sales contract dispute, a third-party forensic examination corporation sought<br />

attorneys’ fees <strong>and</strong> costs for its defense against an unsuccessful motion for contempt filed by the<br />

defendant. The defendant had moved for contempt arguing that the third party’s disclosure of<br />

findings of spoliation to the plaintiff directly, without noticing the defendant, was a violation of the<br />

stipulated order. The court ruled that the third party had not violated the stipulated order because<br />

the order dealt narrowly with the discovery of actual data <strong>and</strong> did not govern the discovery of<br />

wrongdoing. The court, however, determined that the third party was not "free from taint" <strong>and</strong><br />

150


should have provided the substance of the report to the defendant. The court further noted that all<br />

the parties had behaved poorly by engaging in "procedural wrangling" during discovery, resulting in<br />

an electronic discovery dispute that "has become the sideshow which eclipses the circus." The<br />

court ordered the third party to submit its billing records but reserved decision on the motion until<br />

the end of the case consistent with the determination of the sanctions motion.<br />

� Forest Labs., Inc. v. Caraco Pharm. Labs., Ltd., 2009 WL 998402 (E.D. Mich. Apr. 14, 2009). In<br />

this patent litigation, the defendants moved for a hearing on sanctions for spoliation alleging the<br />

plaintiffs intentionally or recklessly destroyed backup tapes. Opposing the motion, the plaintiffs<br />

denied misconduct claiming they preserved electronic records pursuant to their st<strong>and</strong>ard operating<br />

procedures but admitted they did not halt all backup tape recycling. Thus, the court determined that<br />

potentially relevant evidence was destroyed after the duty to preserve arose. However, the court<br />

also determined the backup tapes were inaccessible <strong>and</strong> there is no duty to preserve inaccessible<br />

backup tapes beyond a company’s normal retention period unless the Zubulake exception applies.<br />

The Zubulake exception requires the preservation of backup tapes containing documents of "key<br />

players" if the information is not otherwise available. Zubulake v. UBS Warburg, LLC, 220 F.R.D.<br />

212 (S.D.N.Y. 2003). The court granted the defendants’ motion <strong>and</strong> ordered a hearing to determine<br />

whether the Zubulake exception applies <strong>and</strong>, if so, whether the plaintiffs acted with the requisite<br />

culpability <strong>and</strong> whether the spoliated evidence was relevant.<br />

� Technical Sales Assocs., Inc. v. Ohio Star Forge Co., 2009 WL 728520 (E.D.Mich. Mar. 19,<br />

2009). In this sales commission dispute, the plaintiff sought sanctions alleging evidence destruction<br />

<strong>and</strong> the defendant filed a motion for contempt arguing the plaintiff violated a computer forensic<br />

examination order by breaching its confidentiality provisions. The motions were premised on a<br />

forensic examination of the defendant’s computer which revealed the deletion of approximately<br />

70,000 files. Denying the defendant’s motion for contempt, the court found that the stipulated order<br />

protected the "discovery of actual data, not the absence of data." (Emphasis in original.)<br />

Addressing the plaintiff’s motion, the court outlined a timeline of events to determine when the duty<br />

to preserve arose. Based on this timeline, the court concluded that the timing of the destruction<br />

appeared "more than coincidental" since it occurred at about the same time the forensic<br />

examination was requested. The court granted the plaintiff’s motion in part by determining<br />

monetary sanctions for the cost of the forensic examination appeared to be appropriate, but<br />

postponed a final determination as to the amount of sanctions <strong>and</strong> a potential adverse jury<br />

instruction until trial when the substantive harm caused by the defendant is known.<br />

� Laethem Equipment Co. v. Deer <strong>and</strong> Co., 2008 WL 4997932 (E.D.Mich. Nov. 21, 2008). In this<br />

ongoing breach of contract dispute, inter alia, the defendant sought production of electronically<br />

stored information (ESI) <strong>and</strong> an order establishing waiver of the attorney-client privilege based on<br />

plaintiffs’ alleged discovery misconduct. The defendant argued that the plaintiffs withheld relevant<br />

e-mails, were untruthful in past discovery responses <strong>and</strong> waived privilege by inadvertently<br />

disclosing two disks. Opposing the motion, the plaintiffs argued they had properly responded to<br />

each of the defendant’s requests <strong>and</strong> that additional production would be an undue burden. As<br />

jurisdiction was based on diversity of citizenship <strong>and</strong> absent objection from either party, the court<br />

analyzed the privilege waiver issue under new Fed.R.Evid. 502(b). The rule establishes that<br />

disclosure does not operate as a waiver if: (1) the disclosure was inadvertent, (2) reasonable steps<br />

were taken to prevent disclosure <strong>and</strong> (3) reasonable steps were taken to rectify the error. Finding<br />

each of these criteria satisfied, the court held that privilege was not waived. The court noted that<br />

Fed.R.Evid. analysis does not take into consideration alleged discovery abuses, focusing instead<br />

on the disclosure of the privileged information itself.<br />

151


� Michigan v. Raar, 2008 WL 4228349 (Mich.App. Sept. 16, 2008). In this criminal prosecution, the<br />

defendant appealed his jury trial convictions, including a conviction for using the Internet or<br />

computer system to engage in criminally prohibited communications. The defendant argued the<br />

trial court improperly permitted the government’s expert witness to offer opinions on computer<br />

activity. At trial, the defendant objected to the expert witness’ computer forensics qualifications, but<br />

did not specifically identify a basis for objection. Overruling the objection, the trial court noted the<br />

expert witness had: over 800 hours of training in computer forensics; three years of experience<br />

working in state police computer forensics lab; was a certified member of the International<br />

Association of <strong>Computer</strong> Specialists; <strong>and</strong> had performed over 100 computer forensic examinations.<br />

This court held that the trial court did not abuse its discretion in relying on the forensic expert’s<br />

testimony <strong>and</strong> its determination that the witness had “sufficient ‘knowledge, skill, experience,<br />

training, or education’ in the field of computer forensics.”<br />

� Laethem Equip. Co. v. Deere & Co., 2008 WL 4056359 (E.D.Mich. Aug. 26, 2008). In this breach<br />

of contract <strong>and</strong> tortious interference with business relationships, inter alia, dispute, the defendant<br />

objected to the magistrate judge’s recommendation that the defendant’s motion to dismiss the<br />

complaint be denied. Seeking dismissal, the defendant alleged irreparable harm due to the plaintiff<br />

intentionally withholding two disks containing electronically stored information <strong>and</strong> failing to provide<br />

a privilege log despite asserting privilege. Countering, the plaintiff argued the existence of the disks<br />

was disclosed in 2005 <strong>and</strong> that the defense counsel abused the plaintiff’s inadvertently produced<br />

privileged documents by using them as exhibits. Weighing the factors considered when<br />

determining whether to dismiss a case under either Fed.R.Civ.P 37(b) or 41(b), the magistrate<br />

judge found dismissal to be an inappropriate sanction for the discovery misconduct, citing lack of<br />

bad faith <strong>and</strong> the availability of less dramatic sanctions. The court adopted the magistrate judge’s<br />

report <strong>and</strong> recommendation <strong>and</strong> referred the issue of the appropriateness of alternative sanctions<br />

back to the magistrate judge.<br />

� Flagg v. City of Detroit, 2008 WL 3895470 (E.D.Mich. Aug. 22, 2008). In this ongoing wrongful<br />

death action, the court previously determined text messages of certain city employees were<br />

potentially discoverable <strong>and</strong> established a protocol under which two designated magistrate judges<br />

would make the initial determination as to their discoverability. In this current dispute, the<br />

defendants sought to prevent discovery from going forward, arguing that the court’s previous order<br />

violated the Stored Communications Act (“SCA”), claiming it wholly precludes the production of<br />

electronic communications stored by a non-party service provider in civil litigation. Rejecting the<br />

defendants’ reading of the SCA, the court held that possession for purposes of requiring production<br />

includes control over the information, which defendants maintained through its contractual<br />

relationship with the non-party service provider. However, the court was willing to modify the<br />

means of production - holding that the third party subpoena was unnecessary <strong>and</strong> instead the court<br />

ordered the plaintiff to file a Fed.R.Civ.P. 34 production request. See also Flagg v. City of Detroit,<br />

2008 WL 787061 (E.D.Mich. Mar. 20, 2008).<br />

� Cason-Merenda v. Detroit Medical Center, 2008 WL 2714239 (E.D.Mich. July 7, 2008). In this<br />

antitrust litigation, the defendant requested an order under Fed.R.Civ.P. 26(c) requiring the<br />

plaintiffs to share its third party vendor e-discovery costs for discovery already completed. The<br />

defendant supported their motion with several arguments, including: that the Federal Rules of Civil<br />

Procedure do not envision a ruling on cost shifting early in the case; that a previously stipulated<br />

order reserved the unrestricted right for the parties to later seek a cost-shifting order; <strong>and</strong> that costshifting<br />

is not restricted to “inaccessible data.” Disagreeing with the defendant’s arguments, the<br />

court denied the order. The court stated the Federal Rules “plainly contemplate that a motion for<br />

152


protective relief (including cost shifting) is to be brought before the court in advance of the undue<br />

burden, cost or expense from which protection is sought.” The court reasoned any other<br />

interpretation would offend “common sense” since the rule must be interpreted as a “means of<br />

avoiding undue burden or cost, rather than simply distributing it.”<br />

� Acker v. Workhorse Sales Corp., 2008 WL 1902034 (E.D.Mich. April 28, 2008). In this suit, the<br />

plaintiff objected to the Magistrate’s Order requiring the plaintiff to pay the defendant’s costs <strong>and</strong><br />

attorneys’ fees incurred in the previous motion to compel. The plaintiff claimed the promised<br />

disclosure was provided <strong>and</strong> argued the delay was attributable to the defendant’s failure to give<br />

adequate production format directions. Rejecting the plaintiff’s numerous justifications for the<br />

discovery delay, the court overruled the objection determining the Magistrate’s award of costs <strong>and</strong><br />

attorneys’ fees was not erroneous or unreasonable.<br />

� Flagg v. City of Detroit, 2008 WL 787061 (E.D.Mich. Mar. 20, 2008). In this suit, the plaintiff<br />

sought production of text messages to support his claim that the defendants’ lax investigation<br />

prevented the filing of a wrongful death lawsuit. After determining that certain text messages were<br />

discoverable, the court set forth a detailed set of parameters for the review <strong>and</strong> production of the<br />

text messages. The defendant was ordered to provide the third party service provider with names<br />

<strong>and</strong> related PIN numbers for the relevant individuals, thereby allowing the service provider to<br />

willingly produce the text messages to the court under seal for privilege review. Due to the time<br />

consuming nature of this task, the court appointed two magistrate judges to collect <strong>and</strong> review the<br />

text messages <strong>and</strong> make the initial determination as to discoverability.<br />

� Henry v. Quicken Loans, Inc., 2008 WL 474127 (E.D.Mich. Feb. 15, 2008). In this class action<br />

suit claiming the defendants withheld overtime pay, the plaintiffs filed a motion for relief from a<br />

computer forensic expert’s invoice, claiming that while they originally agreed to pay the expert’s<br />

fees, the defendants unilaterally modified the agreed upon screening process. The parties<br />

previously agreed upon the search terms <strong>and</strong> exclusionary terms to be utilized in the search<br />

process <strong>and</strong> the expert was given direction to work under the direction <strong>and</strong> control of the defense<br />

counsel for instruction, not the plaintiffs’ counsel. Upon discovering the defendants made<br />

numerous unauthorized revisions to the filtering process resulting in additional computer forensic<br />

expert costs, the plaintiffs sought relief. Determining the additional costs to be unauthorized, the<br />

court ordered the defendants to pay all costs other than those associated with the original<br />

agreement.<br />

� Simon Prop. Group, Inc. v. Taubman Ctr., Inc., 2008 WL 205250 (E.D.Mich. Jan. 24, 2008). In<br />

this suit involving securities <strong>and</strong> tort claims, the defendant contested the enforcement of third-party<br />

subpoenas. The defendant argued that compliance with the subpoenas would be unduly<br />

burdensome <strong>and</strong> expensive since the search terms provided by the plaintiffs resulted in the<br />

identification of over 250,000 files. The defendant claimed it would take three full-time employees<br />

four weeks to determine the responsiveness of those documents. The plaintiffs offered to narrow<br />

the scope of the search by time period, search terms <strong>and</strong> perhaps even limit the number of servers<br />

to be searched. The court granted the plaintiffs’ motion to enforce the subpoenas, holding the<br />

requests were not unduly burdensome as discovery of electronic files are common place in<br />

business litigation.<br />

� Arista Records, LLC v. Does 1-4, 2007 WL 4178641 (W.D. Mich. Nov. 20, 2007). In this copyright<br />

infringement suit, the plaintiff requested leave to subpoena a third party internet service provider<br />

(ISP) to supply contact information for the four “Doe” defendants, who allegedly downloaded <strong>and</strong><br />

distributed hundreds of music files illegally. In reaching its decision, the court considered the<br />

pending amendment to Fed. R. Civ. P. 26(d)(1) (which became effective December 1, 2007) that<br />

153


would allow for discovery prior to the Rule 26 hearing upon a showing of good cause. The court<br />

found that the plaintiff established good cause based on the allegation of a prima facia claim of<br />

copyright infringement, the limited period of time the ISP retained activity logs, the narrow tailoring<br />

of the request <strong>and</strong> the necessity of the information to the case. The court therefore allowed the<br />

plaintiff to take immediate discovery by serving a subpoena on the ISP.<br />

� Michigan First Credit Union v. Cumis Ins. Soc’y, Inc., 2007 WL 4098213 (E.D. Mich. Nov. 16,<br />

2007). In this suit, the plaintiff sought sanctions based on the defendant’s alleged failure to comply<br />

with a previous court order pertaining to production of ESI. The plaintiff claimed the defendant’s<br />

production contained no metadata <strong>and</strong> was not in native format as requested. The defendant<br />

claimed that the information was not stored in a way that allowed for easy retrieval of metadata, if<br />

any metadata even existed. Because the previous court order did not address the issue of<br />

metadata or native files, the court held that the defendant’s failure to produce that information did<br />

not violate the order. Further, agreeing with the defendant’s argument that production of metadata<br />

would be overly burdensome, the court concluded that no evidentiary value would be gained from<br />

the metadata to warrant imposing the significant burden on the defendant.<br />

� Pipefitters Local No. 636 Pension Fund v. Mercer Human Resource Consulting, Inc., 2007<br />

WL 2080365 (E.D.Mich. July 19, 2007). On the plaintiffs’ objection to the Magistrate’s previously<br />

issued scheduling order in which the defendants were required to produce requested discovery to<br />

the plaintiffs <strong>and</strong> the plaintiffs were to bear the cost of restoring or locating electronic data, the<br />

district court considered amending the scheduling order. The district court stated that Rule<br />

26(b)(2)(B) of the Federal Rules of Civil Procedure requires the producing party to show<br />

inaccessibility before the requesting party can then establish good cause <strong>and</strong> the court may<br />

consider shifting costs. Because the Magistrate issued the cost shifting provision without any<br />

motions from the parties, it was not apparent that the Magistrate engaged in the proper analysis<br />

before shifting the cost of discovery to the plaintiffs. The court therefore granted the plaintiffs’<br />

motion to strike the cost shifting order.<br />

� Thielen v. Buongiorno USA, Inc., 2007 WL 465680 (W.D. Mich. Feb. 8, 2007). In a claim where<br />

the plaintiff brought an action against the defendant arguing violation of the Telephone Consumer<br />

Protection Act of by sending text messages to plaintiff’s cell phone without his permission, the<br />

defendant filed a motion to compel the production of the plaintiff’s computer. The defendant claims<br />

that in order to activate the automated text message service, a person must either text message<br />

the defendant’s company or access their website to provide a telephone number. The defendant<br />

seeks information contained on the plaintiff’s computer to refute claims that the text messages<br />

were sent without his permission. The plaintiff argues against producing his computer, stating that<br />

privileged information not related to the case may be disclosed. The court found that the plaintiff<br />

failed to respond to the discovery request for the computer within the discovery deadline, thereby<br />

foreclosing any objections to the request. However, notwithst<strong>and</strong>ing the untimely objection, the<br />

court held that it must “take steps to satisfy the discovery request without the result being a<br />

wholesale rummaging through plaintiff’s filing cabinet.” Therefore, the court granted the motion <strong>and</strong><br />

ordered the plaintiff to produce his computer for inspection. The court also ordered a computer<br />

forensics expert to image the computer <strong>and</strong> to provide the full report to the plaintiff first so that he<br />

may address any privileged documents before disclosure to the defendant.<br />

� PML N. Am., LLC. v. Hartford Underwriters Ins. Co., 2006 WL 3759914 (E.D. Mich. Dec. 20,<br />

2006). In this fraud case, the plaintiff filed for default judgment sanctions against one of the<br />

defendants for failure to preserve electronic evidence <strong>and</strong> bad faith destruction of documents. The<br />

defendant failed to produce a USB drive <strong>and</strong> backup servers <strong>and</strong> produced a badly damaged hard<br />

154


drive from a vital computer in the case. The damaged hard drive showed evidence that the<br />

computer casing had been opened <strong>and</strong> the hard drive removed with a screwdriver. A computer<br />

forensic expert testified that the computer had been tampered with <strong>and</strong> that because of the<br />

tampering no electronic data could be harvested from the key piece of evidence. The plaintiff<br />

argued that such failure to produce the information <strong>and</strong> the badly damaged hard drive was evident<br />

of willful, bad faith spoliation. The defendant did not produce any logical explanation for the<br />

damaged computer or the lack of production of the thumb drive <strong>and</strong> backup servers. The court<br />

agreed with the plaintiff’s argument <strong>and</strong> found evidence that the hard drive belonging to the<br />

defendant was tampered with before production. The court held that the hard drive was proof of the<br />

defendant’s willful <strong>and</strong> intentional destruction of evidence <strong>and</strong> that default judgment was proper<br />

since all parties were substantially prejudiced. Furthermore, the court ordered the defendant to pay<br />

all attorney’s fees <strong>and</strong> costs.<br />

� Easton Sports, Inc. v. Warrior Lacrosse, Inc., 2006 WL 2811261 (E.D. Mich. Sept. 28, 2006).<br />

The plaintiff sought sanctions against the defendant for bad faith destruction of relevant documents<br />

<strong>and</strong> e-mails. The defendant in this case was a competitor of the plaintiff in the sporting goods<br />

business. The defendant hired a former employee of the plaintiff after he voluntarily ended his<br />

employment with the plaintiff. When the employee left the company, he forwarded several<br />

confidential documents from the plaintiff’s company e-mail account directly to his personal Yahoo!<br />

account. A computer forensics expert determined the employee opened the documents on his<br />

home computer, <strong>and</strong> several of the confidential documents were also found on a computer issued<br />

to the employee from his new employer. Upon the filing of the plaintiff’s lawsuit, the employee<br />

cancelled his Yahoo! e-mail account, thereby causing all e-mails stored on the account to be<br />

destroyed <strong>and</strong> unrecoverable. The plaintiff motioned the court to issue sanctions in the form of<br />

dismissal for bad faith destruction of key documents after litigation commenced. The defendant<br />

argued no knowledge of the stolen trade secrets from the plaintiff <strong>and</strong> alleged the employee<br />

transferred <strong>and</strong> deleted the files on his own. The court found the employee destroyed wrongfully<br />

obtained records when he cancelled his personal e-mail account with Yahoo!. The court did not<br />

find enough evidence to prove the defendant willfully <strong>and</strong> in bad faith supervised or instructed the<br />

destruction of the trade secrets. However, the court did find the defendant negligent in its failure to<br />

preserve relevant evidence from its employee. The negligence by the defendant did not warrant a<br />

dismissal of the case as the plaintiff urged, but the court ruled a negative inference may be allowed<br />

at trial because it “should have done more to detect <strong>and</strong> preserve relevant data under [the<br />

employee’s] control.”<br />

� Powers v. Thomas M. Cooley Law School, 2006 WL 2711512 (W.D. Mich. Sept. 21, 2006). In a<br />

claim brought by a law student under a state Persons With Disability Act, the plaintiff sought to<br />

examine the defendant’s computer system with her computer forensics expert. The plaintiff claimed<br />

her poor scores on final tests were attributed to faulty software provided by the law school to assist<br />

the plaintiff with her vision disability while taking tests. The plaintiff originally sought the production<br />

of several work orders from the law school relating to the software but the school changed<br />

computer systems <strong>and</strong> during the switch some documents were deemed unrecoverable. The<br />

plaintiff argued the defendant used the system changeover as an excuse not to produce relevant<br />

documents. The defendant argued it already produced every work order they were able to recover<br />

<strong>and</strong> the other work orders could not be retrieved from the old computer system. The court found for<br />

the defendant, stating “[t]his court is therefore loathe to sanction intrusive examination of an<br />

opponent’s computer as a matter of course, or on the mere suspicion that the opponent may be<br />

withholding discoverable information.”<br />

155


� ACS Consultant Co., Inc. v. Williams, 2006 WL 897559 (E.D. Mich. Apr. 6, 2006). The plaintiff<br />

sought a temporary restraining order <strong>and</strong> a preliminary injunction enjoining the defendants, former<br />

employees of the plaintiff, from violating the terms of employment agreements. Granting the<br />

plaintiff’s motion, the court noted that the defendants failed to return company-issued materials <strong>and</strong><br />

electronic media <strong>and</strong> that the defendants provided third parties with trade secrets <strong>and</strong> confidential<br />

information. In issuing the order, the court enjoined the defendants “from taking any action to<br />

delete, destroy, damage or ‘wipe clean’ any computer hard drive, including…[company-issued]<br />

laptops <strong>and</strong> Blackberrys, containing [the plaintiff’s] confidential information or evidence relevant to<br />

this case.” The court also required the defendants to return all of the plaintiff’s property, including<br />

laptops, Blackberries <strong>and</strong> “other data kept in any form or media.”<br />

� Powerhouse Marks, L.L.C. v. Chi Hsin Impex, Inc., 2006 WL 83477 (E.D. Mich. Jan. 12, 2006).<br />

In response to the plaintiffs’ interrogatories, the defendants produced 1,771 pages of Batesstamped<br />

documents from a database. Claiming this production was “indecipherable” <strong>and</strong> failed to<br />

adequately answer their interrogatories, the plaintiffs moved to compel complete production of the<br />

database information. In resolving the matter, the court stated the raw data would be more easily<br />

used in conjunction with its corresponding database. The court further determined the defendants<br />

were in the best position to accurately interpret <strong>and</strong> explain the information. Thus, the court<br />

ordered the defendants to produce the data in a “more usable form”, noting the Federal Rule<br />

Advisory Committee notes specified a party may be ordered to produce information to aid in<br />

interpreting <strong>and</strong> explaining the data even when the electronic information does not exist in the<br />

format requested.<br />

� DaimlerChrysler Motors v. Bill Davis Racing, Inc., 2005 WL 3502172 (E.D. Mich. Dec. 22,<br />

2005). In a breach of contract claim relating to the defendant’s NASCAR team, the plaintiff sought<br />

sanctions against the defendant for destroying relevant e-mails. In defending its actions, the<br />

defendant claimed its computer system was set up to delete both internal <strong>and</strong> external e-mails<br />

automatically, unless affirmative efforts were taken to preserve them. As a result of the automated<br />

deletion, internal e-mails from key custodians were “irretrievably lost.” One key individual testified<br />

he was never instructed to preserve relevant communications, even after the lawsuit commenced.<br />

In considering whether sanctions were justified, a magistrate judge declared “[s]uch normal<br />

procedures for destruction of documents must . . . be suspended when a party is on notice that<br />

they may be relevant to litigation, <strong>and</strong> the failure to make an adequate search of such documents<br />

before their destruction may be evidence of bad faith.” Although ultimately finding the defendant’s<br />

actions amounted to negligent spoliation <strong>and</strong> did not show evidence of bad faith, the magistrate<br />

found sanctions would be appropriate <strong>and</strong> recommended the trial court issue an adverse inference<br />

instruction <strong>and</strong> an order allowing the plaintiff to present evidence of the spoliation.<br />

� Holt v. Northwestern Mut. Life Ins. Co., 2005 WL 3262420 (W.D.Mich. Nov. 30, 2005). The<br />

plaintiff, an emergency room physician, alleged the defendant, an insurance company, failed to<br />

produce an e-mail that contained an investigative report relating to an insurance dispute. The<br />

plaintiff requested an adverse inference instruction as a sanction for the alleged non-production. At<br />

a hearing, one of the defendant’s employees testified that if the e-mail had contained substantive<br />

information, a copy would have been placed in the claim file <strong>and</strong> produced during discovery. The<br />

employee further testified it would have been unusual for substantive information to be sent in an<br />

e-mail as such information was typically attached in a memor<strong>and</strong>um <strong>and</strong> merely transmitted by email.<br />

Thus, the defendant argued the e-mail was merely an “envelope” for the substantive report –<br />

which was already previously produced to the plaintiff – <strong>and</strong> not subject to the discovery request.<br />

Citing Zubulake, the court agreed with the defendant <strong>and</strong> stated, “[A] corporation is not required to<br />

156


preserve ‘every shred of paper, every e-mail or electronic document, <strong>and</strong> every backup tape’<br />

because to require such would ‘cripple large corporations . . . that are almost always involved in<br />

litigation’.” The court found the e-mail was merely an “e-mail envelope” <strong>and</strong> contained no<br />

substantive information. Additionally, the court declared that even if the non-production was<br />

improper, the plaintiff failed to demonstrate the e-mail would have been favorable to the plaintiff.<br />

� People v. Schilke, 2005 WL 1027039 (Mich. Ct. App. May 3, 2005). The defendant appealed a<br />

conviction for unauthorized access to her former employer’s computer. The defendant argued the<br />

trial court should not have admitted evidence relating to the employer’s cost of repairing the<br />

network <strong>and</strong> the amount of lost revenue arising out of the company’s inability to conduct business<br />

due to the unavailability of the network. On appeal, the court determined the evidence was properly<br />

admitted because it was relevant in determining the amount of damage the company sustained as<br />

a result of the defendant’s actions. The evidence further rebutted the defendant’s assertion that her<br />

actions “should have been easily correctable, <strong>and</strong> should not have caused very much damage.”<br />

� Nartron Corp. v. General Motors Corp., 2005 WL 26991 (Mich. Ct. App. Jan. 6, 2005). In a case<br />

involving a breach of contract claim, the plaintiff appealed the trial court’s decision granting costs,<br />

sanctions for discovery abuse, <strong>and</strong> prejudgment interest in favor of the defendant. The trial court<br />

determined the plaintiff’s failure to produce a database in response to the defendant’s discovery<br />

request “tainted, corrupted, or permeated all of the discovery in the case.” On appeal, the plaintiff<br />

argued the trial court’s finding was unsupported by the evidence <strong>and</strong> clearly erroneous since it had<br />

produced more than 61,000 pages of documentation <strong>and</strong> the defendant did not assert those<br />

documents were fraudulent. Rejecting this contention, the appellate court observed the plaintiff did<br />

not attempt to refute the trial court’s finding by demonstrating its conduct regarding the database<br />

did not “taint, corrupt, or permeate all the discovery.” The appellate court affirmed the trial court’s<br />

order in part <strong>and</strong> awarded the defendant attorney fees, costs <strong>and</strong> expert witness fees. The<br />

appellate court declined to award prejudgment interest, deciding that the state statute referring to<br />

prejudgment interest did not apply to monetary sanction awards.<br />

� Compuware Corp. v. Moody’s Investors Servs., Inc., 2004 WL 2931401 (E.D.Mich. Dec. 15,<br />

2004). The defendant requested clarification of a discovery order <strong>and</strong> asked the court to order the<br />

plaintiff to sort through a “catalog of ‘tens of millions’ of documents” to separate the relevant from<br />

non-relevant documents. The defendant’s original request had called for “[a]ll documents produced<br />

by [the defendant] to IBM in any litigation.” The plaintiff contended it had satisfied this request by<br />

offering to provide the defendant with a $40,000 set of portable computer disks containing all of the<br />

documents produced to IBM in litigation. Reviewing the matter, the court noted the parties’ inability<br />

to agree upon discovery matters “highlight[ed] attempts by both sides to needlessly delay <strong>and</strong><br />

complicate discovery.” Despite this, the court stated it would not order the plaintiff to produce fewer<br />

documents than the defendant initially dem<strong>and</strong>ed. As such, the court denied the defendant’s<br />

requests to narrow the catalog of data to documents relevant in this litigation.<br />

� United States v. Alex<strong>and</strong>er, 2004 WL 2095701 (E.D.Mich. Sept. 14, 2004). In a criminal<br />

proceeding, the government seized the defendant’s computer to search for evidence that the<br />

defendant unlawfully transferred obscene pictures over the Internet. After the seizure, the<br />

defendant requested that the government provide him with a mirror image of his computer hard<br />

drive to allow his computer forensic expert to examine the drive for potential evidence. In an<br />

affidavit, the forensic expert declared he planned to form an opinion, based upon his examination<br />

of the hard drive, as to whether the defendant knowingly received the obscene images. The expert<br />

stated that a mirror image was necessary so he could perform his analysis in his own laboratory,<br />

using his own computer forensic software <strong>and</strong> hardware, which might be difficult to transport to<br />

157


another location. The government objected, declaring the defense forensic expert could review the<br />

mirror image only under its supervision. Determining the hard drive could contain relevant dates,<br />

times, <strong>and</strong> circumstances surrounding the receipt of the pictures, the court ordered the government<br />

to produce the mirror image.<br />

� Superior Consultant Co. v. Bailey, 2000 WL 1279161 (E.D. Mich. Aug. 22, 2000). The court<br />

ordered the defendant to create <strong>and</strong> produce for the plaintiff a backup file of the defendant’s laptop<br />

computer, <strong>and</strong> a backup file of any personal computer hard-drive to which the defendant had<br />

access.<br />

� In re Dow Corning Corp., 250 B.R. 298 (Bankr. E.D. Mich. 2000). Federal Government did not<br />

satisfy its obligation to make medical records stored in computer databases available to Debtor,<br />

where Government directed Debtor to warehouses around the world where the information was<br />

stored.<br />

� In re Air Crash Disaster at Detroit Metro, 130 F.R.D. 634 (E.D. Mich. 1989). In litigation brought<br />

after a passenger jet crash, the court ordered the aircraft manufacturer to provide relevant flight<br />

simulation data on computer-readable nine-track magnetic tape even though the aircraft<br />

manufacturer had already provided the data in hard copy print-outs. Because material did not<br />

currently exist on magnetic tape, the requesting party (the airline) was required to pay all<br />

reasonable <strong>and</strong> necessary costs associated with manufacture of tape.<br />

Ohio<br />

� In re Porsche Cars N. Am., Inc. Plastic Coolant Tubes Prods. Liab. Litig., 2012 WL 203493<br />

(S.D. Ohio Jan. 24, 2012). In this products liability litigation, the court addressed the plaintiffs’<br />

stipulation proposal that the defendant’s production of ESI be in native format together with<br />

associated metadata. The defendant argued that production in native format “invites significant<br />

control risks in that such documents can be altered after production . . . <strong>and</strong> cannot be Bates<br />

numbered,” thus incurring significant monitoring costs. Instead, the defendant offered to produce<br />

documents in PDF or TIFF format, <strong>and</strong> to produce specific documents in native format only after<br />

the plaintiffs showed relevance. Pursuant to Fed.R.Civ.P. 34(b)(1)(C), the court determined that the<br />

plaintiffs may specify production form, regardless of relevance, unless the defendant demonstrated<br />

undue burden. Given the relatively small amount of ESI at issue, the court ruled that the<br />

defendant’s concerns did not demonstrate undue burden. Therefore, the court granted the<br />

plaintiffs’ motion <strong>and</strong> ordered the defendant to follow plaintiffs’ production request when made. The<br />

plaintiffs additionally moved that each party identify a “Designated ESI Liaison” to respond to<br />

requests. Denying that motion, the court concluded that if <strong>and</strong> when ESI production is required, the<br />

parties shall appoint an “e-discovery coordinator” pursuant to the Default St<strong>and</strong>ard for <strong>Discovery</strong> of<br />

[ESI] adopted by this <strong>and</strong> other U.S. district courts, but that “[t]he ultimate responsibility for<br />

complying with e-discovery requests rests on the parties.”<br />

� United States v. Warshak, 2010 WL 5071766 (C.A.6 (Ohio) Dec. 14, 2010). In this criminal case,<br />

the defendants appealed their numerous convictions for fraud claiming the government violated the<br />

Fourth Amendment prohibition against unreasonable search <strong>and</strong> seizures by obtaining private emails<br />

without a warrant. The defendants also argued that the government turned over immense<br />

quantities of discovery in a disorganized <strong>and</strong> unsearchable format, that the government violated its<br />

Brady obligations by producing “gargantuan ‘haystacks’ of discovery” <strong>and</strong> that the district court<br />

erroneously denied a 90-day continuance to allow the defendants to finish sifting through the<br />

“mountains of discovery.” Addressing the Fourth Amendment concerns, the court first found the<br />

158


defendant plainly manifested an expectation that his e-mails would remain private given the<br />

sensitive <strong>and</strong> “sometimes damning substance” of the e-mails, viewing it as highly unlikely the<br />

defendant expected the e-mails to be made public as people “seldom unfurl their dirty laundry in<br />

plain view.” Next, the court determined that it would defy common sense to treat e-mails differently<br />

than more traditional forms of communication <strong>and</strong> found that neither the possibility nor the right of<br />

access by the Internet Service Provider (ISP) is decisive to the issue of privacy expectations.<br />

Based on these conclusions, the court held the government may not compel an ISP to turn over emails<br />

without obtaining a warrant first. However, the court ultimately found the government relied in<br />

good faith on the Stored Communications Act in obtaining the e-mails <strong>and</strong> determined the<br />

exclusionary rule does not apply. Turning to the “prodigious” volume of discovery that consisted of<br />

millions of pages, the court disagreed with the defendants’ arguments, noting in particular that<br />

Fed.R.Crim.P. 16 is silent on what form discovery must take.<br />

� State v. Rivera, 2010 WL 339811 (Ohio App. 12 Dist. Feb. 1, 2010). In this action involving the<br />

Stored Communications Act (SCA), the defendant appealed his conviction, arguing text <strong>and</strong> picture<br />

messages obtained from his cell phone provider should have been suppressed. The defendant<br />

also argued the trial court erred in not denying the SCA as unconstitutional. Denying the<br />

defendant’s argument regarding the constitutionality of the SCA, the court found the detective<br />

violated the SCA by not providing notice to the defendant as required. However, the SCA does not<br />

include exclusion as a remedy, <strong>and</strong> thus the exclusionary rule was inapplicable. Addressing the<br />

suppression argument, the court deferred to the trial court’s determination of probable cause <strong>and</strong><br />

found that based on the facts <strong>and</strong> circumstances, there was a substantial probability that evidence<br />

of criminal activity would have been found through other locations <strong>and</strong> media. Thus, the court<br />

denied the defendant’s appeal <strong>and</strong> affirmed the trial court’s ruling.<br />

� Enquip Tech. Group, Inc. v. Tycon Technoglass, S.R.L., 2010 WL 53151 (Ohio App. 2 Dist.<br />

Jan. 8, 2010). In this complex international business litigation, the defendants appealed an order of<br />

the trial court that held the European Union Data Protection Directive 95/46/EC (“Directive”) did not<br />

limit discovery. The defendants argued that the trial court’s ruling was a clear error, <strong>and</strong> that the<br />

exception provided in Article 26(1)(d), which permits the transfer of data when necessary to<br />

establish, exercise or defend legal claims, was inapplicable. In response, the plaintiffs claimed that<br />

the defendants failed to meet the burden required to obtain a protective order because no effort<br />

was made to demonstrate the relevance of the Directive to any of the plaintiffs’ specific discovery<br />

requests. Agreeing with the plaintiffs, the appellate court affirmed the trial court’s ruling. In support<br />

of its opinion, the appellate court cited the trial court’s reasoning that the defendants subjected<br />

themselves to Ohio law by doing business there <strong>and</strong> that no reason existed to preclude response<br />

to discovery requests under the Ohio Rules of Civil Procedure.<br />

� Cornwell v. N. Ohio Surgical Ctr., Ltd., 2009 WL 5174172 (Ohio App. 6 Dist. Dec. 31, 2009). In<br />

this wrongful death litigation, the defendants appealed the trial court’s ruling allowing the plaintiff’s<br />

forensic expert to create a mirror image of the defendants’ hard drives. The defendants asserted<br />

such intrusive access was not authorized under Fed.R.Civ.P. 34 <strong>and</strong> would violate prohibitions<br />

against the disclosure of confidential medical information. In affirming the trial court’s order, the<br />

appellate court dismissed the confidentiality argument, relying on testimony of the plaintiff’s expert<br />

explaining that viewing confidential information was not necessary to the forensic imaging process.<br />

The court also discarded the defendants’ Rule 34 argument, noting that the circumstances<br />

surrounding the case gave rise to an inference of improper conduct on part of the defendants. In<br />

further support of the trial court’s decision, the court noted the direct relationship between the<br />

159


plaintiff’s claims <strong>and</strong> the hard drives <strong>and</strong> said the specific protocol <strong>and</strong> search terms established by<br />

the trial court made the defendants’ arguments meritless.<br />

� Bennett v. Martin, II, 2009 WL 4048111 (Ohio App. 10 Dist. Nov. 24, 2009). In this employment<br />

dispute, the defendants appealed the trial court’s judgment requiring production of forensic copies<br />

of their computer hard drives to the plaintiff. The trial court concluded that the forensic imaging was<br />

a reasonable solution “given defendants’ consistent intransigence to providing discovery materials.”<br />

On appeal, the court noted privacy <strong>and</strong> confidentiality concerns must be weighed, but the "scales<br />

tip in favor" of compelling forensic imaging when the requesting party can demonstrate discovery<br />

failures or discrepancies. The court found the defendants engaged in outright defiance of court<br />

orders <strong>and</strong> "adopted a lackadaisical <strong>and</strong> dilatory approach to providing discovery." Based on the<br />

defendants’ misrepresentations, willful disregard of discovery rules <strong>and</strong> history of noncompliance<br />

with court-ordered discovery requests, the court determined the trial court did not abuse its<br />

discretion in ordering production of forensic copies.<br />

� Reckley v. City of Springfield, Ohio, 2008 WL 5234356 (S.D.Ohio Dec. 12, 2008). In this<br />

employment litigation, the defendant produced five e-mails of which it later claimed were protected<br />

by the attorney-client privilege <strong>and</strong> inadvertently produced. Therefore the defendant sought return<br />

of the e-mails <strong>and</strong> plaintiff argued that the production waived the privilege. Applying Fed.R.Evid.<br />

502(b), the court held that privilege was not waived. The court noted that at least some of the<br />

inadvertently disclosed e-mails were labeled “attorney-client privileged” <strong>and</strong> that the defendant took<br />

prompt steps to claim privilege <strong>and</strong> seek return of the e-mails after they were disclosed. The court<br />

also noted that the disclosure took place in the context of electronically stored information; a<br />

context particularly intended to be addressed by Rule 502.<br />

� State ex. rel. Toledo Blade Co. v. Seneca County Bd. of Comm’rs, 2008 WL 5157733 (Ohio<br />

Dec. 9, 2008). In this litigation, the plaintiff filed an action seeking a writ of m<strong>and</strong>amus to compel<br />

the defendant to recover the content of requested e-mails that had been deleted. The plaintiff<br />

argued that a public office has an obligation to maintain certain records, such as the records at<br />

issue here, <strong>and</strong> make them available for inspection <strong>and</strong> copying under the Public Records Act.<br />

Finding substantial gaps in the responsive e-mails provided by the defendant, the court determined<br />

that a reasonable inference was raised that at one time, additional responsive e-mails were deleted<br />

in violation of the defendant’s document retention schedule. Additionally, through an affidavit of a<br />

computer expert specializing in forensic data-recovery services, the plaintiff established that there<br />

was some likelihood that the recovery of the deleted e-mails would be successful. Therefore, the<br />

court also concluded the defendant should be required to attempt to restore deleted e-mails. The<br />

court ordered the defendant to bear the expense of the forensic analysis but stated that the<br />

“recovery efforts need only be reasonable, not Herculean.”<br />

� Superior Prod. P’ship v. Gordon Auto Body Parts Co., Ltd., 2008 WL 5111184 (S.D. Ohio Dec.<br />

2, 2008). In this predatory pricing case, the plaintiff sought production of electronic documents in<br />

native format that were previously produced in hard copy. The defendants opposed native<br />

production, arguing their computer system did not maintain metadata <strong>and</strong> therefore no purpose<br />

would be served in native production. Citing Fed.R.Civ.P. 26’s preference for native format<br />

production, the court ordered the defendants to produce the documents natively, finding benefit in<br />

the ease at which electronic documents can be stored <strong>and</strong> manipulated during the litigation<br />

process.<br />

� Moore v. Abbott Lab., 2008 WL 4981400 (S.D.Ohio Nov. 19, 2008). In this employment<br />

discrimination case, the plaintiff filed a motion to compel discovery, seeking documents<br />

unrestricted by time frame, geographic area or number or type of job applicants. The defendant<br />

160


argued that it previously produced 14,000 pages of documents, that further review of e-mail would<br />

cost $300,000 <strong>and</strong> that it should not have to spend additional time <strong>and</strong> money to produce nonrelevant<br />

documents. Agreeing with the defendant, the court found plaintiff’s discovery requests,<br />

“extraordinarily overbroad.” The court stated that, “mere speculation about relevance,” is not<br />

enough to order production of requested documents. Accordingly, the court denied the plaintiff’s<br />

motion.<br />

� Ross v. Abercrombie & Fitch, Co., 2008 WL 4758678 (S.D.Ohio Oct. 27, 2008). In this securities<br />

litigation, the plaintiff requested the court to order the defendant to produce an additional 95,000<br />

documents “hit” by a revised keyword search. The plaintiff argued these documents would most<br />

likely have been produced had the defendant understood the list of “Search Term Revisions”<br />

supplied by the plaintiff to be supplemental rather than replacing the plaintiff’s previous list of<br />

search terms. The defendant argued it should not have to spend the time <strong>and</strong> resources to review<br />

<strong>and</strong> produce the additional documents under the revised search terms since the requested<br />

documents would likely be irrelevant <strong>and</strong> because it previously produced over one million pages of<br />

documents. Determining the plaintiff failed to meet its burden <strong>and</strong> show that the documents’ likely<br />

relevance outweighed the review <strong>and</strong> production costs, the court denied the plaintiff’s motion.<br />

� Ed Schmidt Pontiac-GMC Truck, Inc. v. Chrysler Motors Co., LLC, 2008 WL 2704859<br />

(N.D.Ohio July 7, 2008). In this breach of contract suit, the plaintiff sought summary judgment on<br />

its spoliation claim. The plaintiff alleged that the defendant engaged in spoliation of electronic<br />

evidence by failing to issue a litigation hold, thereby neglecting to retain relevant evidence as well<br />

as the destruction of relevant hard drive data. The plaintiff argued this failure resulted in the<br />

destruction of potentially relevant data, in addition to destruction of evidence contained on<br />

computer hard drives. The court found no direct evidence that the defendant deleted data with an<br />

intent to avoid disclosure to the plaintiff. Determining a genuine dispute of material fact to exist<br />

regarding intent with each aspect of the plaintiff’s spoliation claim, the court denied the plaintiff’s<br />

motion.<br />

� Ferron v. Search Cactus, L.L.C., 2008 WL 1902499 (S.D.Ohio April 28, 2008). In this case<br />

involving an alleged violation under the Ohio Consumer Sales Practices Act, the court ordered a<br />

protocol for viewing the information contained on the plaintiff’s home <strong>and</strong> office computers. In<br />

considering the protocol, the court identified three categories of information contained on the<br />

plaintiff’s hard drives: confidential personal information, attorney-client privileged information, <strong>and</strong><br />

information relating to e-mail <strong>and</strong> website advertisements. The court ordered the plaintiff’s<br />

computer forensics expert to mirror image the hard drives, removing information deemed personal<br />

<strong>and</strong> confidential that could not lead to the discovery of relevant information. Additionally, the court<br />

ordered the defendant’s computer forensics expert to meet with the plaintiff to identify for deletion<br />

information that is irrelevant <strong>and</strong> create a privilege log of any relevant information which is<br />

privileged. Finally, the court ordered both parties to share the costs associated with their chosen<br />

computer forensics expert.<br />

� Ed Schmidt Pontiac-GMC Truck, Inc. v. DaimlerChrysler Motors Co., 2008 WL 668267<br />

(N.D.Ohio Mar. 11, 2008). In this suit alleging breach of a settlement agreement, the plaintiff<br />

sought to amend the complaint to include a claim for spoliation following two years of discovery.<br />

The plaintiff alleged the defendant knowingly destroyed relevant evidence – specifically the<br />

defendant replaced employees’ hard drives days before the plaintiff could make forensic images of<br />

those drives. The defendant argued that a spoliation claim would be futile <strong>and</strong> cause undue<br />

prejudice. Applying state law for spoliation <strong>and</strong> appropriate sanctions, the court granted the<br />

plaintiff’s motion <strong>and</strong> allowed the plaintiff to add a claim of spoliation.<br />

161


� Kelly v. Montgomery Lynch & Assoc., 2007 WL 4412572 (N.D.Ohio Dec. 13, 2007). In this<br />

lawsuit, the plaintiff filed a motion to compel discovery necessary to support a motion for class<br />

certification. The defendant claimed the discovery request was unduly burdensome because the<br />

filing system was not maintained in a searchable format. Finding the defendant did not make a<br />

reasonable inquiry into the discovery request apart from claiming an undue burden, the court<br />

ordered the defendant to comply with the plaintiff’s narrowly tailored discovery request.<br />

Additionally, the court strongly advised the parties to make a sincere attempt at cooperation in the<br />

discovery process. The court further warned the defendant that a failure to comply will result in the<br />

consideration of sanctions.<br />

� United States v. Warshak, 2007 WL 2417407 (S.D.Ohio Aug. 21, 2007). In this criminal matter,<br />

the defendants moved to bar the government from using evidence allegedly obtained in violation of<br />

the attorney-client privilege doctrine. While the government asserted its case was not based on<br />

privileged information, the defendants questioned the government’s apparent decision to segregate<br />

the computers of three in-house attorneys without comprehensively screening other computers for<br />

privileged materials. The defendants also raised concerns with regard to the amount of time a U.S.<br />

postal inspector possessed certain computers containing privileged information. Finding the<br />

defendants’ questions to be well-founded, the court held there were temporal <strong>and</strong> substantive gaps<br />

that could only be resolved by sworn testimony <strong>and</strong> ordered an evidentiary hearing to ascertain the<br />

extent to which the government relied on privileged materials to obtain the evidence it intended to<br />

use at trial.<br />

� State of Ohio v. Rivas, 2007 Ohio App. LEXIS 3299 (Ohio.App. July 13, 2007). In a suit where the<br />

defendant challenged his conviction for importuning <strong>and</strong> attempted unlawful sexual conduct with a<br />

minor, the defendant challenged the trial court’s denial of his request to obtain a copy of the police<br />

department’s hard drive where records of online chats were stored. The defendant argued he was<br />

entitled to review of the transcripts <strong>and</strong> should not be required to rely on the representations of the<br />

adverse party. The state argued that its interest in safeguarding the details of other investigations<br />

contained on the hard drive outweighed the defendant’s request to have access to the hard drive.<br />

The trial court agreed with the state, but the appellate court reversed that holding, requiring the<br />

state to allow the defendant a reasonable means of verifying the accuracy <strong>and</strong> completeness of the<br />

transcript to meet the requirements of the right to a fair trial <strong>and</strong> the right of an accused to confront<br />

the evidence against him. The court suggested the trial court conduct an in camera review to verify<br />

the transcript.<br />

� Scotts Co. LLC v. Liberty Mut. Ins. Co., 2007 WL 1723509 (S.D.Ohio June 12, 2007). In this<br />

case, the plaintiff requested the court enter a discovery order, allowing its computer forensic expert<br />

to search the defendant’s computer systems, network servers, databases <strong>and</strong> backup tapes for the<br />

last nine years. The plaintiff also sought to compel the re-production of ESI previously produced in<br />

hard copy form <strong>and</strong> the production of deleted documents. The defendant argued the request for a<br />

forensic examination was not authorized as a matter of course by the Fed. R. Civ. P. amendments<br />

in 2006 <strong>and</strong> that its production was proper since the plaintiff’s requests made no such production<br />

format specification. The defendant further argued the deleted information sought by the plaintiff<br />

was inaccessible <strong>and</strong> not relevant. The court found the plaintiff’s request for an intrusive<br />

examination of its opponent’s computer systems was based on mere suspicion that the defendant<br />

may be withholding discoverable information <strong>and</strong> denied the request. On the production format <strong>and</strong><br />

request for deleted documents discovery issues, the court ordered the parties to further meet <strong>and</strong><br />

confer.<br />

162


� United States v. Premera Blue Cross, 2007 WL 852080 (S.D. Ohio Mar. 16, 2007). In a case<br />

brought under the False Claims Act, the plaintiff subpoenaed e-mails from an accounting services<br />

provider for the defendant, a non-party to the suit. The non-party produced some e-mail records;<br />

however, the plaintiff claimed that the production was incomplete <strong>and</strong> compelled the court to order<br />

the non-party to produce all of the sought after e-mail records. The non-party argued that it would<br />

be unduly burdensome <strong>and</strong> costly to retrieve <strong>and</strong> produce the e-mails at issue. Inferring that the<br />

non-party had already retrieved all of the e-mails based on a statement contained in its briefing of<br />

the issue, the court held that the non-party had already assumed the costs of retrieval <strong>and</strong> should<br />

produce the sought after e-mails, with the plaintiff responsible for the costs of production.<br />

� May v. Pilot Travel Centers LLC, 2006 WL 3827511 (S.D. Ohio Dec. 28, 2006). In a wrongful<br />

termination case, the plaintiff moved for spoliation sanctions against the defendant for failing to<br />

produce <strong>and</strong> preserve relevant evidence. The defendant failed to produce electronic documents<br />

such as e-mail, invoices, <strong>and</strong> payroll records which were central to the plaintiff’s case. The<br />

defendant claimed not to have the information but eventually produced some, but not all, of the<br />

requested records after the motion for sanctions was filed. The defendant argued that the plaintiff<br />

provided no proof that it destroyed evidence <strong>and</strong> the sanctions should be denied. The defendant<br />

also argued that it did not have a duty to supplement discovery disclosures because the plaintiff did<br />

not request supplementation during the discovery period. Not satisfied with the defendant’s<br />

arguments, the court concluded that sanctions were appropriate. The defendant’s production of<br />

some of the records shortly after the motion was filed was evidence of the defendant’s bad faith.<br />

Additionally, the burden to prove no destruction occurred was on the defendant since it was in<br />

control of the evidence at issue <strong>and</strong> the burden should not shift to plaintiff.<br />

� Flexsys Americas, LP v. Kuhmo Tire U.S.A., Inc., 2006 WL 3526794 (N.D. Ohio Dec. 6, 2006).<br />

In a patent infringement suit, the defendants brought a motion to compel the plaintiff to produce<br />

electronic documents. The defendants claimed the plaintiff only provided <strong>and</strong> searched for<br />

documents related to one individual. The defendants argued they were entitled to search all<br />

documents created by every employee within plaintiff’s company. The plaintiff responded it had<br />

produced all documents at issue <strong>and</strong> that a company-wide search would be costly <strong>and</strong> could not<br />

occur before the discovery deadline. The court found the parties had not come to any agreement<br />

regarding the scope of e-discovery according to the new guidelines set forth in the amended<br />

Federal Rules of Civil Procedure. As a compromise in this discovery dispute, the court ordered the<br />

plaintiff to produce all electronic documents from 10 individuals of the defendant’s choosing.<br />

� Exact Software N. Am., Inc. v. Infocon, Inc., 2006 WL 3499992 (N.D. Ohio Dec. 5, 2006). In a<br />

collection action by the plaintiff, the defendant sought sanctions for the plaintiff’s failure to produce<br />

<strong>and</strong> preserve electronic evidence. The defendant argued the plaintiff completely failed to produce<br />

adequate reasons for the non-production of electronic documents. Additionally, the defendant<br />

argued the plaintiff deleted electronic documents before <strong>and</strong> after litigation started. The plaintiff<br />

failed to respond to the allegations of deliberate spoliation. The court ruled sanctions <strong>and</strong> default<br />

were likely against the plaintiff since it completely failed to produce any adequate excuse as to why<br />

electronic evidence was not produced or preserved. However, the court ruled it could not issue a<br />

default judgment because it was unclear who was at fault for the discovery mishaps. The court<br />

found that it could not ascertain whether the discovery misconduct was due to willfulness or bad<br />

faith on the part of the plaintiff, its counsel, or both, <strong>and</strong> set a hearing at which the plaintiff would<br />

have an opportunity to show cause why it should not be sanctioned.<br />

� JPMorgan Chase Bank, N.A. v. Neovi, Inc., 2006 WL 3803152 (S.D. Ohio Nov. 14, 2006). In a<br />

claim under the UCC, the plaintiff filed a motion for sanctions <strong>and</strong> a motion to compel discovery.<br />

163


The defendant failed to properly answer an interrogatory question that directly related to its motion<br />

for of dismissal based on the defendant’s lack of jurisdiction. The defendant claimed the plaintiff<br />

lacked jurisdiction <strong>and</strong> the plaintiff asked for information in discovery to support that contention.<br />

Throughout the litigation the defendant failed to answer the interrogatory <strong>and</strong> failed to give<br />

information regarding its research of the issue during multiple depositions. The plaintiff argued that<br />

it was only in search of information from the defendant’s electronic database of client names to<br />

determine their residency <strong>and</strong> whether the clients were in fact within the plaintiff’s jurisdiction. The<br />

defendant asserted that it lacked knowledge of the information <strong>and</strong> could not produce the<br />

evidence. It also claimed that it would research the issue <strong>and</strong> during a subsequent deposition, a<br />

key defense witness stated he forgot the research results <strong>and</strong> would supplement the plaintiff later.<br />

However, he never did. The court ordered the defendant to produce their electronic database of<br />

clients to the plaintiff <strong>and</strong> noted that the defendant “has engaged in exactly the type of<br />

gamesmanship which is expressly prohibited by the Federal Rules of Civil Procedure <strong>and</strong><br />

universally condemned by the applicable case law.” The court also ordered the defendant to pay<br />

the plaintiff’s attorney’s fees <strong>and</strong> costs.<br />

� Marwaha v. SBC Global Services, Inc., 2006 WL 2882854 (N.D. Ohio Oct. 6, 2006). In an<br />

employment discrimination suit, the plaintiff motioned the court to sanction the defendant for failure<br />

to produce a particular e-mail during discovery. The plaintiff attempted to negotiate with the<br />

defendant about the production of an e-mail not originally dem<strong>and</strong>ed by the plaintiff in initial<br />

discovery requests. The plaintiff stated they would not file a motion to compel the production of the<br />

relevant e-mail if the defendant stipulated to certain facts, which would be proven by the e-mail.<br />

The defendant did not stipulate to the agreement <strong>and</strong> the plaintiff brought a motion for sanctions<br />

based on the defendant’s failure to follow thorough with the “informal agreement.” The court ruled<br />

there was no evidence the defendant agreed to the informal agreement <strong>and</strong> even if they had<br />

agreed, the court stated they “cannot be called upon to police such ambiguous agreements.” The<br />

court also stated the request for the e-mail was beyond the scope of the plaintiff’s discovery<br />

requests, <strong>and</strong> it could not be compelled for production.<br />

� King Lincoln Bronzeville Neighborhood Assoc. v. Blackwell, 448 F.Supp.2d 876 (S.D. Ohio<br />

2006). In an action to prevent voting discrimination, the plaintiff brought sued to determine if voting<br />

in the state of Ohio was racially discriminated against during the 2004 election. The plaintiff claims<br />

a disproportionate number of black voting districts in Ohio were provided with a smaller number of<br />

balloting machines compared to the more predominately white districts during the 2004 presidential<br />

elections. The plaintiff seeks fairer voting procedures during the upcoming 2008 national elections.<br />

The court ordered that all 88 county election boards preserve all ballots from the 2004 election in<br />

any form they are contained, including electronic form. The court noted that it has the power to<br />

issue sanctions in the form of contempt <strong>and</strong> otherwise for any third-party that fails to preserve any<br />

ballots in their paper or electronic form.<br />

� O’Brien v. Ed Donnelly Enters., 2006 WL 2583327 (S.D. Ohio Sept. 5, 2006). In a wage <strong>and</strong> hour<br />

claim against a former employer, the employee plaintiffs sought sanctions against the defendant<br />

employer for deliberately destroying discoverable documents. Plaintiffs argued that defendant<br />

“destroyed … records with a culpable state of mind.” The documents in question were time card<br />

records printed out routinely <strong>and</strong> backed-up on defendant’s in-house server. Defendants<br />

acknowledged that, while they intended to keep all time card records, they were not able to locate<br />

the records for a small fraction of the days for which the plaintiffs requested documents.<br />

Defendants stated that they did not realize until after the lawsuit was filed, that the records were<br />

missing. Defendants contended that, the records “were created [<strong>and</strong> the electronic information<br />

164


overwritten] well before th[is] lawsuit was filed.” The court denied plaintiffs’ motion for sanctions<br />

finding that the destruction or loss of evidence occurred before defendant had notice of the<br />

litigation <strong>and</strong> there was no evidence of intentional destruction. Moreover, the court ruled that<br />

“plaintiffs’ perception of the deficiencies of defendants’ electronic record-keeping [was] simply<br />

irrelevant.”<br />

� Yancey v. Gen. Motors Corp., 2006 WL 2045894 (N.D. Ohio July 20, 2006). In a disparate<br />

treatment employment claim, defendant requested that the court exclude certain employee’s hard<br />

drives <strong>and</strong> e-mails from the definition of “documents” as it related to a magistrate’s discovery order.<br />

Additionally, the defendant argued that although production of the hard drives may generate some<br />

relevant documents, a large amount of data on the hard drive was irrelevant <strong>and</strong> likely to be barred<br />

under certain privileges. In refusing to exclude the terms from the definition of discovery<br />

“documents”, the court agreed with plaintiffs that the term “encompassed computer hardware,<br />

software, e-mails <strong>and</strong> ‘computer forensics.’” Further, the court decided that to mitigate any possible<br />

disclosure of privileged information, the defendant must produce a confidentiality log of all possible<br />

documents from the hard drive. Lastly, since “the removal of the hard drives is not an undue<br />

expense for a large corporation such as GM”, the court ordered that they alone bear the costs of<br />

production to plaintiff.<br />

� Kemper Mortgage, Inc. v. Russell, No. 3:06-cv-042 (S.D. Ohio Apr. 18, 2006). The plaintiff<br />

requested instructions on implementing a litigation hold for electronic evidence <strong>and</strong> dem<strong>and</strong>ed cost<br />

shifting for expenses related to the litigation hold. The plaintiff’s computer forensic expert advised<br />

the plaintiff to effect a litigation hold by mirror imaging its server <strong>and</strong> laptops, which would cost<br />

approximately $4,000, an amount the plaintiff contended the defendant should pay. Denying the<br />

plaintiff’s requests, the court noted the defendant had not imaged the plaintiff’s computers because<br />

of the costs involved <strong>and</strong> the defendant had not yet made a dem<strong>and</strong> on the plaintiff for a litigation<br />

hold. The court declared, “One of the unexpected costs of using the electronic tool is that it may<br />

become costly to abide by one’s duty to preserve evidence, but that is not a cost which can be<br />

shifted to the opposing party, at least in the absence of a dem<strong>and</strong> for a litigation hold which seeks<br />

court enforcement <strong>and</strong>/or requests for discovery which can limit the amount of information which<br />

needs to be preserved.”<br />

� Electrolux Home Prods., Inc. v. Whitesell Corp., 2006 WL 355453 (S.D. Ohio Feb. 15, 2006).<br />

The respondents, a non-party subpoenaed by the defendant, petitioned for a certificate of<br />

interlocutory appeal <strong>and</strong> sought to stay enforcement of a magistrate’s order allowing the defendant<br />

to conduct a forensic review of the respondents’ computer systems. The reviewing magistrate<br />

found the issue was not ripe for appeal <strong>and</strong> the respondents waived any appeal rights by failing to<br />

raise the issue in their initial appeal. The court declared the enforcement orders took “every<br />

measure to protect” the respondents because the defendant was bearing discovery costs <strong>and</strong><br />

discovery was to be conducted on an “attorneys-eyes-only” basis. The court also noted the<br />

attorney-client privilege was not compromised because the respondents’ counsel would have<br />

access to the master data <strong>and</strong> an opportunity to create a privilege log. The reviewing magistrate<br />

stated, “Respondents have complained throughout this proceeding of the burden being imposed on<br />

them. Instead of lessening that burden by cooperating in discovery, they have fought a Stalingrad<br />

defense costing untold thous<strong>and</strong>s of dollars in attorney fees <strong>and</strong> providing increased evidence that<br />

they have something to hide.”<br />

� In re OM Group Sec. Litig., 226 F.R.D. 579 (N.D. Ohio 2005). In a shareholder litigation suit, the<br />

plaintiff sought to compel production of e-mails <strong>and</strong> spreadsheets listed on a privilege log relating<br />

to a committee’s investigation of corporate inventory problems. The defendants asserted that some<br />

165


of the e-mails <strong>and</strong> spreadsheets were protected by the work-product doctrine <strong>and</strong> other e-mails<br />

were protected by the attorney-client privilege. The court declined to find any of the documents<br />

protected by the work-product doctrine, finding they were not prepared in “anticipation of litigation.”<br />

Addressing the attorney-client privilege documents, the court found the defendants had waived the<br />

attorney-client privilege only to the documents prepared on or before the date on which the<br />

committee presented its findings relating to the ongoing investigation.<br />

� State v. Morris, 2005 WL 356801 (Ohio Ct. App. Feb. 16, 2005). The defendant appealed<br />

convictions relating to p<strong>and</strong>ering sexually-oriented matter involving minors. The defendant’s son<br />

testified he called the police after finding pornographic images of minors in the recycle bin of his<br />

computer, which the defendant had previously used. During a forensic analysis of the computer, a<br />

computer forensic expert mirror imaged the hard drive. Before returning the computer, the expert<br />

overwrote the hard drive, erasing all data on the drive. At trial, the state presented the mirror image<br />

copy as evidence. The expert testified it was st<strong>and</strong>ard protocol not to run tests on the original hard<br />

drive in order to prevent corrupting the evidence <strong>and</strong> stated the mirror image was an exact copy of<br />

the original hard drive. The expert further noted he wiped the hard drive because it was corrupt <strong>and</strong><br />

repeatedly accessing <strong>and</strong> testing the drive would have rendered it useless. On appeal, the<br />

defendant argued he was denied an opportunity to examine the original hard drive to see if it<br />

contained exculpatory evidence. The court declared state evidentiary rules permit admission of<br />

duplicates <strong>and</strong> noted the expert had testified that the copy was an exact copy of the original hard<br />

drive. The court upheld the convictions, finding the defendant failed to specifically argue what type<br />

of exculpatory evidence may have been lost during the copying procedure <strong>and</strong> the original was not<br />

destroyed in bad faith.<br />

� In re Telxon Corp. Sec. Litig., 2004 WL 3192729 (N.D. Ohio July 2, 2004). In a case involving<br />

alleged violations of the Securities <strong>and</strong> Exchange Act, the SEC requested documents from an<br />

accounting firm relating to its financial audit of the corporation being investigated. The corporation<br />

sought sanctions against the accounting firm, claiming the accounting firm committed fraud,<br />

misrepresentation, <strong>and</strong> breach of contract in relation to the corporation’s financial statements. The<br />

corporation argued the accounting firm failed to produce all relevant documents <strong>and</strong> databases <strong>and</strong><br />

versions of relevant documents <strong>and</strong> databases <strong>and</strong> to promptly protect the documents from<br />

alteration. They also claimed the accounting firm produced hard copy documents in versions<br />

different from the electronic versions <strong>and</strong> failed to produce certain e-mails, metadata <strong>and</strong> other<br />

documents. In reviewing the matter, the magistrate judge, in a recently unsealed opinion, found the<br />

absence of the e-mails suggested spoliation after the accounting firm was on notice to preserve<br />

those documents. The magistrate also declared the accounting firm had to have known multiple<br />

database versions existed <strong>and</strong> the hard copy production failed to capture relevant components –<br />

such as metadata – of the database. The magistrate recommended default judgment in favor of the<br />

corporation, declaring “[n]o reasonable person could believe that PwC’s production…to<br />

Telxon…was a ‘good faith’ production.” The court further stated “[b]ecause PwC’s conduct has<br />

made it impossible to try this case with any confidence in the justice of the outcome, PwC should<br />

bear the burden created by its conduct.”<br />

� Hollingsworth v. Time Warner Cable, 812 N.E.2d 976 (Ohio App. 2004). In an employment<br />

discrimination lawsuit, a former employee alleged that she was wrongfully discharged <strong>and</strong> sought<br />

unemployment benefits. In response to the employee’s request for benefits, the defendant<br />

produced an e-mail at the benefits hearing. The e-mail, which was from the company’s human<br />

resources vice president to legal counsel, stated the reasons for the employee’s termination. After<br />

the e-mail was produced at the hearing, the employee requested production of any other related<br />

166


documents for use in her wrongful discharge claim. Stating that the e-mail was privileged <strong>and</strong> had<br />

been produced unintentionally, the defendant moved for a protective order. The trial court granted<br />

the protective order <strong>and</strong> instructed the employee to return the e-mail. The appellate court reversed<br />

stating that the company waived any privilege claims when it “voluntarily divulged” the e-mail.<br />

� Hildreth Mfg. v. Semco, Inc., 785 N.E.2d 774 (Ohio Ct. App. 2003). The appellate court found no<br />

basis for the defendant’s motion for contempt for spoliation of computer evidence. The court found<br />

that even though the plaintiff failed to preserve data contained on the computer hard drives at<br />

issue, there was not a reasonable possibility that the hard drives contained evidence that would<br />

have been favorable to the defendant’s claims.<br />

� State v. Cook, 2002 WL 31045293 (Ohio Ct. App. Sept. 13, 2002). The defendant appealed his<br />

conviction for possessing nude images of minors, claiming in part that the trial court erred in<br />

admitting materials, over the defendant’s objection, that were generated from a "mirror image" of<br />

the defendant’s hard drive. After a detailed discussion of the mirror imaging process, the<br />

authenticity of the data taken from the image, <strong>and</strong> the possibility for tampering, the appellate court<br />

found that the trial court properly admitted the evidence.<br />

� Zonaras v. General Motors Corp., 1996 WL 1671236 (S.D. Ohio Oct. 17, 1996). In this case, the<br />

plaintiffs sought to compel discovery of data compiled concerning different crash test dummy tests.<br />

In response, the defendant GMC asserted that it produced data tracings <strong>and</strong> backup materials for<br />

all but eleven of these tests, <strong>and</strong> objects to production of the remaining tests “as unduly<br />

burdensome <strong>and</strong> expensive.” After balancing the elements outlined in Rule 26(b)(2)(iii), the court<br />

ordered the defendant GMC to produce data tracings <strong>and</strong> backup materials of the eleven tests<br />

where the benefits of the discovery outweighed the expense of production. Because admissibility of<br />

the electronic evidence was still undecided, the court ordered the plaintiffs to pay half the<br />

production costs.<br />

� Toledo Fair Hous. Ctr. v. Nationwide Mut. Ins. Co., 703 N.E.2d 340 (Ohio C.P. 1996). The court<br />

ordered discovery of certain documents from the defendant’s database. The judge stated that the<br />

defendant cannot avoid discovery simply because their own record keeping scheme makes<br />

discovery burdensome. The court ordered the defendant to pay costs of the discovery.<br />

� City of Clevel<strong>and</strong> v. Clevel<strong>and</strong> Electric Illuminating Co., 538 F. Supp. 1257 (N.D. Ohio 1980).<br />

In an antitrust suit brought by a city against an electric utility, the court ordered the electric utility<br />

was entitled to pretrial production by the city of computer data <strong>and</strong> calculations underlying<br />

conclusions contained in reports of certain experts the city intended to call as witnesses.<br />

Tennessee<br />

� Lubber v. Optari LLC, 2012 WL 899631 (M.D. Tenn. Mar. 15, 2012). In this “latest volley of<br />

discovery disputes,” Magistrate Judge Joe Brown addressed the defendants’ motion for a<br />

protective order, or in the alternative, cost shifting under Fed.R.Civ.P. 26(b)(2)(C)(iii). The<br />

defendants argued that a purportedly effective settlement agreement limited discovery to a small<br />

window that began to run when the plaintiff filed for bankruptcy, <strong>and</strong> that requiring production<br />

before this time period would be too expensive. Simultaneously seeking a motion to compel on<br />

nine different topics (including information before the defendant’s bankruptcy filing date), the<br />

plaintiff attacked the agreement <strong>and</strong> argued that production before the time period was warranted,<br />

as it was relevant to their claims after the filing date. Reviewing the arguments, Judge Brown<br />

believed that both parties were leveraging the American “producer pays” rule to “bludgeon” their<br />

opposition with substantial discovery costs. Declaring that the documents sought were likely only of<br />

167


marginal relevance, the court denied the protective order but m<strong>and</strong>ated the parties to share equally<br />

in any further discovery costs.<br />

� Nacco Materials H<strong>and</strong>ling Grp., Inc. v. Lilly Co., 2011 WL 5986649 (W.D.Tenn. Nov. 16, 2011).<br />

In litigation arising from the defendant’s repeated illegal access to the plaintiff’s "secure dealer"<br />

website, the plaintiff sought sanctions for the defendant’s discovery misconduct. After preliminary<br />

forensic analysis of 35 of the defendant’s computers, the plaintiff discovered that the defendant did<br />

not issue a company-wide litigation hold <strong>and</strong> left collection up to individual employees absent<br />

managerial oversight. Additionally, the plaintiff found that the Rule 30(b)(6) deponent produced by<br />

the defendant did not review any of the particular files in question <strong>and</strong> was improperly prepared for<br />

deposition. Finding the defendant ‘s "woefully inadequate" preservation <strong>and</strong> collection methods<br />

negligent at minimum, the court found sanctions appropriate, but limited them due to plaintiff’s<br />

failure to substantiate the amount of prejudice suffered from the defendant’s misconduct. As such,<br />

the court awarded monetary sanctions related to the cost of the previous forensic examination,<br />

additional imaging of company computers <strong>and</strong> reasonable fees <strong>and</strong> costs the plaintiff incurred in<br />

the motion.<br />

� United States v. Carell, 2011 WL 2078023 (M.D. Tenn. May 26, 2011). In this False Claims Act<br />

litigation involving alleged improper Medicare billing, both parties requested additional discovery.<br />

The government asserted that during more than fourteen months of discovery, the defendants<br />

failed to produce a single electronic document <strong>and</strong> neglected to implement a litigation hold.<br />

Determining the government’s timeline was too broad <strong>and</strong> the defendants’ too narrow, the court<br />

established a relevant timeline to be three years after the sale in question <strong>and</strong> two years after the<br />

defendants’ possessed an e-mail system, <strong>and</strong> ordered the defendants to conduct <strong>and</strong> certify an<br />

adequate search for responsive documents. Declining to rule on the defendants’ alleged failure to<br />

preserve absent a motion for sanctions, the court turned to the defendants’ request for 37 e-mails<br />

(or e-mail strings) withheld by the government as work product <strong>and</strong> ordered the government to<br />

submit the e-mails for an in camera review.<br />

� Barnes v. CUS Nashville, LLC, 2010 WL 2265668 (M.D. Tenn. June 3, 2010). In this slip <strong>and</strong> fall<br />

tort action, the defendant moved to compel ESI <strong>and</strong> for a trial continuance to resolve the protracted<br />

arguments between parties regarding the plaintiff’s <strong>and</strong> witnesses’ Facebook photos <strong>and</strong> e-mails.<br />

The magistrate judge found that the defendant’s mish<strong>and</strong>ling of a Facebook subpoena caused a<br />

major delay in discovery, while also noting that "[c]ooperation on the part of both parties could have<br />

prevented this delay." To resolve this discovery issue expeditiously, the magistrate judge stated he<br />

was willing to create a Facebook account. If the witnesses would accept the judge as a Facebook<br />

"friend" "for the sole purpose of reviewing photographs <strong>and</strong> related comments in camera," he would<br />

"promptly review <strong>and</strong> disseminate any relevant information to the parties" <strong>and</strong> then close the<br />

account. Additionally, the judge reviewed submitted materials from the plaintiff’s Facebook account<br />

<strong>and</strong> deemed one message, seven pictures <strong>and</strong> the accompanying metadata relevant to the case.<br />

Ultimately, the judge granted the continuance but denied the motion to compel ESI for lack of<br />

jurisdiction.<br />

� John B. v. Goetz, 2008 WL 2520487 (Tenn. June 26, 2008). In this class action litigation, the<br />

defendants filed a petition for m<strong>and</strong>amus seeking relief from two discovery orders issued by the<br />

district court which ordered the state defendant to allow the plaintiffs’ computer expert to examine<br />

<strong>and</strong> forensically image <strong>and</strong> examine the computer systems of 50 key defendant custodians,<br />

including privately owned computers, in order to determine if information was removed, impaired or<br />

compromised, <strong>and</strong> to ensure preservation. The court granted the defendants’ petition in part,<br />

setting aside the portion of the order that required forensic imaging of hard drives <strong>and</strong> other<br />

168


devices that contain relevant electronically stored information. The court held the imaging of the<br />

media primarily for the purpose of preservation was an abuse of discretion, citing the fact that the<br />

record “lacks any evidence that defendants have intentionally destroyed relevant ESI” <strong>and</strong> noting<br />

the significant privacy <strong>and</strong> confidentiality concerns raised by the order.<br />

� John B. v. Goetz, 2007 WL 3012808 (M.D.Tenn. Oct. 10, 2007). In this discovery dispute, the<br />

court granted the plaintiffs’ motion to compel <strong>and</strong> ordered the defendants to provide complete<br />

responses to the plaintiffs’ ESI requests, including all metadata <strong>and</strong> deleted information for any of<br />

the defendants’ key custodians. Additionally, the court ordered the defendants to file certifications<br />

regarding whether ESI was removed from any state computer or personal computer provided by<br />

the state. Any managed care contractors (MCCs) were ordered to respond to ESI requests <strong>and</strong> if<br />

production was found inadequate, the plaintiffs were allowed to renew their motion to compel<br />

further production. Addressing the plaintiffs’ spoliation concerns, the court allowed the plaintiffs’<br />

ESI expert to oversee the defendants’ production <strong>and</strong> inspect whether any changes were made to<br />

the defendants’ computer(s). Finally, the court ordered the defendants to respond as to why they<br />

should not be required to pay all production costs <strong>and</strong> attorney fees as provided in the order.<br />

� Univ. of Pittsburgh v. Townsend, 2007 WL 1002317 (E.D. Tenn. Mar. 30, 2007). In a case where<br />

the plaintiff alleged that the defendants misappropriated the plaintiff’s rights to medical scanning<br />

technology, the defendants moved the court to sanction the plaintiff for spoliation of evidence by<br />

excluding the testimony of the plaintiff’s proposed experts. The defendants alleged that the experts<br />

<strong>and</strong> plaintiff’s counsel destroyed copies of e-mails <strong>and</strong> draft expert reports, to which they were<br />

entitled. The experts stated that they did not retain e-mail from the plaintiff’s counsel because they<br />

were instructed not to do so by the plaintiff’s counsel. The experts stated that they did not have the<br />

prior draft expert reports because they only worked from one copy. The court rejected the<br />

defendants’ argument <strong>and</strong> denied the request for sanctions. It ruled that although a draft an expert<br />

report may be discoverable under the Federal Rules of Civil Procedure, an expert need not<br />

preserve the drafts until the need to retain exists. Here, the experts <strong>and</strong> the plaintiff’s counsel were<br />

not under an obligation to preserve the reports until the defendants subpoenaed records from the<br />

experts. Since the draft reports were destroyed prior to the creation of any obligation to retain, the<br />

court held that the destruction of the draft reports was “not done intentionally, fraudulently, <strong>and</strong> with<br />

‘a desire to suppress the truth,’ <strong>and</strong> therefore, [was] not sanctionable.” However, the court did hold<br />

that it was improper for the plaintiff’s counsel to have instructed or otherwise suggested to the<br />

experts that all e-mails be destroyed, as they were the subject of multiple discovery requests. The<br />

plaintiff’s counsel apologized for the error, <strong>and</strong> the court did not issue sanctions.<br />

� Inventory Locator Serv., LLC v. Partsbase, Inc., 2005 WL 2179185 (W.D.Tenn. Sept. 6, 2005).<br />

The plaintiff alleged the defendant unlawfully accessed the plaintiff’s computerized database, <strong>and</strong><br />

the defendant counterclaimed arguing similar conduct on the part of the plaintiff. In support of its<br />

counterclaims, the defendant offered "Web server logs," purporting to record various unlawful<br />

entries into the defendant’s computer system from an internet protocol ("IP") address assigned to<br />

the plaintiff. The plaintiff sought, inter alia, to exclude the evidence, arguing the logs were<br />

"incredible on their face," appeared to have been altered, had been moved <strong>and</strong> deleted, <strong>and</strong> were<br />

inadmissible hearsay. As evidence that the logs were altered or fabricated, the plaintiff noted a<br />

"cookie anomaly." When a user from a specific IP address logs onto the defendant’s Web site, a<br />

“cookie” containing information such as the IP address from which the user was logging in, would<br />

be created <strong>and</strong> recorded alongside the entry in the server logs. According to the plaintiff, none of<br />

the cookies corresponded with the entries allegedly coming from its IP address. In response, the<br />

defendant submitted the affidavit from a technology services company president who explained the<br />

169


“cookie anomaly” as a technical glitch not confined to entries from the plaintiff’s IP address.<br />

Weighing this evidence, the court determined evidence exclusion was not warranted as “[a]bsent<br />

more detailed evidence or expert testimony” it could not determine if the “cookie anomaly”<br />

undermined the authenticity of the defendant’s log records.<br />

� State v. Butler, 2005 WL 735080 (Tenn. Crim. App. Mar. 30, 2005). In a case involving child<br />

pornography allegations, the state appealed from an order requiring it to provide the defendant with<br />

a copy of the defendant’s hard drive, along with copies of the alleged child pornography that<br />

formed the basis for the state’s case. The state argued that it could not allow defense counsel to<br />

take a copy of the computer hard drive because a state sexual exploitation statute did not contain<br />

any exemption for defense counsel to be given child pornography. The state also declared that it<br />

would accommodate counsel <strong>and</strong> its computer experts by allowing them to examine a mirror image<br />

copy of the hard drive while it remained in the state’s custody. On appeal, the court affirmed the<br />

trial court’s order, holding that the defendant was entitled to a copy of the hard drive. The court<br />

further noted that providing the alleged pornographic evidence to defense counsel under a court<br />

protective order did not violate the state’s “sexual exploitation of a minor” statutes.<br />

� Medtronic Sofamor Danek, Inc. v. Michelson, 229 F.R.D. 550 (W.D.Tenn. 2003). In a trade<br />

secret violation suit, the defendant moved for the production of approximately 996 network backup<br />

tapes <strong>and</strong> argued that the plaintiff should bear production costs. The defendant also requested that<br />

the court appoint a special master to aid in the discovery process. The plaintiff objected to the<br />

defendant’s requests stating that the request was “unduly burdensome because extracting the data<br />

from the backup tapes <strong>and</strong> reviewing it for relevance <strong>and</strong> privilege will be astronomically costly.”<br />

The parties did not dispute the relevance of the electronic data at issue. Agreeing that producing<br />

the backup data as a whole would be burdensome on the plaintiff, the court applied the Rowe 8<br />

factor cost-shifting test to determine burden <strong>and</strong> cost. Finding that the majority of the factors<br />

favored shifting a portion of discovery costs to the defendant, the court outlined a detailed<br />

discovery protocol. Pursuant to Fed.R.Civ.P. 53(b), the court appointed a special master to<br />

oversee discovery <strong>and</strong> to review the data. The court also ordered the plaintiff’s vendor to “search<br />

the extracted data using the keywords identified in Appendix A to this order or otherwise agreed<br />

upon by the parties or directed by the special master” <strong>and</strong> to “produce to [the defendant] a<br />

complete list of the files identified by the backup tape restoration keyword search.”<br />

� Delozier v. First Nat’l Bank of Gatlinburg, 109 F.R.D. 161 (E.D. Tenn. 1986). “A court will not<br />

shift the burden of discovery onto the discovering party where the costliness of the discovery<br />

procedure involved is entirely a product of the defendant’s record-keeping scheme over which the<br />

plaintiff has no control.”<br />

Seventh Circuit – State <strong>and</strong> Federal <strong>Case</strong>s<br />

� Heraeus Kulzer, GMBH v. Biomet, Inc., Nos. 09-2858, 10-2639 (7th Cir. Jan. 24, 2011). In this<br />

foreign trade secrets litigation, the plaintiff appealed the district court’s denial of its request for<br />

discovery in U.S. federal district court pursuant to 28 U.S.C. § 1782. Noting that discovery in the<br />

federal court system is broader than in most foreign countries, the court listed several potential<br />

abuses that could warrant a denial – including, inter alia, harassing the opposing party, “swamping<br />

a foreign court with fruits of American discovery” <strong>and</strong> gaining an arbitrary advantage through the<br />

lack of reciprocity in access to broad U.S. discovery. The court determined the defendant failed to<br />

demonstrate any such abuses, finding it was not “seeking to circumvent German law” <strong>and</strong><br />

successfully demonstrated a need for extensive discovery for aid in its foreign lawsuit. Next,<br />

170


asserting that the Federal Rules of Civil Procedure apply with respect to foreign discovery, the<br />

court found the defendant failed to demonstrate undue burden <strong>and</strong> refused to cooperate or<br />

negotiate directly with the plaintiff to modify the scope of discovery. Accordingly, the court reversed<br />

<strong>and</strong> rem<strong>and</strong>ed for consideration of the discovery request under federal discovery rules.<br />

� United States v. Kimoto, 588 F.3d 464 (7th Cir. Dec. 2, 2009). In this criminal case, the defendant<br />

appealed his conviction, arguing that the government had destroyed or withheld exculpatory<br />

evidence <strong>and</strong> failed to provide forensic copies of hard drives, which resulted in a Brady violation.<br />

Specifically, the defendant claimed the government did not provide e-mails that he claimed would<br />

demonstrate the existence of a conspiracy between a witness <strong>and</strong> another party. The government<br />

rebutted these claims, asserting that copies of all electronic evidence reviewed <strong>and</strong> all original<br />

evidence to be used at trial was provided to the defendant. In affirming the conviction, the court<br />

determined there was no Brady violation. To support its ruling, the court noted that no destruction<br />

or spoliation on behalf of the government existed, there was a material lack of proof that certain<br />

alleged evidence was missing, <strong>and</strong> the defendant failed to make a request for forensic copies until<br />

immediately prior to trial.<br />

� Kathrein v. McGrath, Fed.Appx. 858 (7th Cir. Feb. 7, 2006). In a case involving a defamation<br />

action, the plaintiff was ordered to stop posting pornographic material on a Web site <strong>and</strong> to stop<br />

creating redirections from that site to other pornographic Web sites. Suspecting the plaintiff violated<br />

the order, the allegedly defamed individual sought to hold the plaintiff in contempt. The plaintiff<br />

admitted he inserted a comm<strong>and</strong> that would redirect users of the Web site, but stated the<br />

programmed redirection would occur only after a three hundred billion second delay. Doubting the<br />

delay feature existed, the individual sought <strong>and</strong> received an order permitting immediate inspection<br />

of the plaintiff’s computer. A computer forensic expert inspected the computer <strong>and</strong> concluded the<br />

computer he was given was not the one used as the server for the Web site. Admitting he switched<br />

computers, the plaintiff claimed he left the old computer outside his office <strong>and</strong> did not know who<br />

took it. The court awarded the individual the costs of the expert’s wasted investigation. The plaintiff<br />

then filed a lawsuit against the expert (cited above) claiming the expert drafted a fraudulent bill <strong>and</strong><br />

violated federal statutes by performing an inspection beyond the scope of his authority. The expert<br />

sought dismissal of the suit. The trial court dismissed, ordering the plaintiff to pay more than<br />

$20,000 to the expert for his attorneys’ fees in defending a frivolous lawsuit. On appeal, the court<br />

concluded dismissal was warranted because the plaintiff lacked st<strong>and</strong>ing to challenge the<br />

fraudulent bill. Because the appellate court’s reason for dismissal differed from the trial court’s<br />

reason for dismissal, the appellate court vacated the sanctions award <strong>and</strong> rem<strong>and</strong>ed the case for<br />

re-evaluation.<br />

� Minnesota Mining & Mfg. v. Pribyl., 259 F.3d 587 (7th Cir. 2001). The plaintiff brought suit<br />

against three former employees for misappropriation of trade secrets. The appellate court affirmed<br />

the trial court’s negative inference instruction to the jury where the one defendant committed<br />

spoliation of evidence by downloading six gigabytes of music onto his laptop, which destroyed<br />

many files sought by the plaintiff, the night before the defendant was to turn over his computer<br />

pursuant to the discovery request. However, the fact that hard drive space was destroyed on one<br />

defendant’s computer did not relieve the plaintiff from proving the elements of its claims.<br />

� Sattar v. Motorola, Inc., 138 F.3d 1164 (7th Cir. 1997). The plaintiff sought hard copies of over<br />

200,000 e-mails, since its system was unable to read the defendant’s electronic files. The appellate<br />

court affirmed the district court’s ruling that a more reasonable accommodation was (1) some<br />

combination of downloading the data from the tapes to conventional computer disks or a computer<br />

hard-drive, (2) loaning the plaintiff a copy of the necessary software, or (3) offering the plaintiff on-<br />

171


site access to its own system. If all of those options failed, the court ordered that the parties would<br />

each bear half the cost of the copying the 200,000 e-mails.<br />

� Crown Life Ins. Co. v. Craig, 995 F.2d 1376, 1382-83 (7th Cir. 1993). Affirmed trial court’s<br />

decision to sanction insurer <strong>and</strong> enter default judgment (counterclaim) against insurer when it failed<br />

to comply with discovery order requesting raw data from database. Data from a computer said to<br />

be “documents” within the meaning of FRCP 34.<br />

Illinois<br />

� Last Atlantis Capital, LLC v. AGS Specialist Partners, 2011 WL 6097769 (N.D. Ill. Dec. 5,<br />

2011). In this securities fraud litigation, the plaintiffs requested that the defendants share the costs<br />

of obtaining data from a third party. To support their contention that cost-sharing was appropriate,<br />

the plaintiffs cited Sedona Conference commentary <strong>and</strong> several court opinions advocating that<br />

parties “address” cost-sharing. In opposition, the defendants asserted that neither reason nor<br />

precedent required them to share the cost of plaintiffs’ discovery requests. Denying the plaintiffs’<br />

request, the court held that both the Sedona Conference <strong>and</strong> case law failed to support the notion<br />

that a non-requesting, opposing party should be required to aid the requesting party in funding its<br />

efforts to obtain third-party ESI. In particular, the court stated that the plaintiffs’ reliance upon<br />

Sedona Conference commentary “is especially curious, as it is almost entirely irrelevant to the<br />

instant matter.” Further, the court pointed to the idea that the Sedona Conference’s only reference<br />

to cost-sharing between two parties is merely a best practices suggestion that the parties meet <strong>and</strong><br />

confer to address cost-sharing in their initial Rule 26(f) conference. The court concluded that the<br />

plaintiffs’ reference did not m<strong>and</strong>ate that the defendants share the costs for evidence that the<br />

plaintiffs needed to prove their case.<br />

� Oleksy v. General Electric Co., 2011 WL 4626015 (N.D. Ill. Oct. 3, 2011).<br />

In this patent infringement case, the defendant requested reconsideration of a prior court order that<br />

compelled production of litigation hold documents. The defendant contended that at the time it<br />

deleted the data at issue, the relevance of the data was unforeseeable due to the allegedly<br />

countless ways by which future damages in an infringement case could be calculated. Noting that<br />

the scope of preservation is broader than the defendant assumed, the court reasoned that as soon<br />

as the defendant knew of the infringement claim, the "well-known" factors for an infringement<br />

damage calculation put the defendant on notice of issues that could be relevant to damages.<br />

Because the defendant failed to specifically state why the relevance of the particular data was<br />

unforeseeable in light of these factors, the court denied the defendant’s motion for reconsideration.<br />

� IWOI, LLC v. Monaco Coach Corp., 2011 WL 2038714 (N.D. Ill. May 24, 2011). In this breach of<br />

warranty <strong>and</strong> consumer fraud litigation, the plaintiff sought sanctions for the defendants’ failure to<br />

produce a highly relevant e-mail that was discovered during a court-authorized search at the<br />

plaintiff’s expense. The plaintiff alleged this e-mail was deliberately withheld under an improper<br />

extension of privilege, <strong>and</strong> accordingly sought to shift the entire cost of the search – $15,069 – onto<br />

the defendants. The defendants argued that their employees were unable to discover the e-mail<br />

despite a diligent search, the e-mail was not reasonably accessible <strong>and</strong> the request did not<br />

encompass the e-mail in question as required by Principle 2.01 of the Seventh Circuit <strong>Electronic</strong><br />

<strong>Discovery</strong> Pilot Program. Citing forensic expert testimony that “a simple word search . . . would<br />

have uncovered the e-mail,” the court noted that it is the responding party’s obligation to ensure<br />

relevant documents are produced <strong>and</strong> determined the plaintiff’s discovery requests fairly<br />

encompassed the e-mail. Although the plaintiff suffered no prejudice, the court held there was “no<br />

172


excuse” for the obvious discovery violation <strong>and</strong> ordered the defendants to pay half the costs of the<br />

search. The court also admonished both parties, remarking that their unwillingness to cooperate or<br />

compromise was “more responsible for the dispute…than any one action taken by either party.”<br />

� Clean Harbors Envtl. Servs., Inc. v. ESIS, Inc., 2011 WL 1897213 (N.D. Ill. May 17, 2011). In this<br />

professional negligence <strong>and</strong> breach of contract litigation, the plaintiff sought to shift the expense of<br />

retaining a third party vendor to filter, cull <strong>and</strong> process 166 gigabytes of data that cost nearly<br />

$91,000. The defendants argued that the information was not inaccessible <strong>and</strong> that the plaintiff<br />

could have first sought to narrow the requests. Finding the information was not reasonably<br />

accessible as it was kept on backup tapes, the court considered numerous cost-shifting factors <strong>and</strong><br />

determined that these factors mattered less than the plaintiff’s reliance on the defendants’ repeated<br />

indications that they would consider sharing costs. Commending the plaintiff for its efforts to<br />

negotiate discovery prior to seeking court intervention, the court m<strong>and</strong>ated that the parties split the<br />

costs of e-discovery, but required both defendants to pay only a quarter of the cost each because<br />

there was no “meeting of the minds” on the actual agreement.<br />

� Sara Lee Corp. v. Kraft Foods Inc., 2011 WL 1311900 (N.D. Ill. Apr. 1, 2011). In this false<br />

advertising litigation, the plaintiff sought to compel deposition testimony <strong>and</strong> disclosure of<br />

documents from the defendants’ expert. Responding, the defendants argued that pursuant to their<br />

choice-of-law agreement, the plaintiff sought materials beyond the scope of expert discovery.<br />

Applying amended Fed.R.Civ.P. 26 relating to expert disclosures <strong>and</strong> discovery, the court<br />

determined the communications at issue did not contain facts, data or assumptions provided by the<br />

party’s attorney <strong>and</strong> therefore did not fall under the testifying expert rubric. Further, the court found<br />

the materials received work product protection as they were communications between the expert<br />

<strong>and</strong> defense counsel. Denying the plaintiff’s motion, the court also noted the plaintiff was able to<br />

obtain the information by other means <strong>and</strong> had already retained its own expert.<br />

� Rosenthal Collins Grp., LLC v. Trading Tech. Int’l Inc., 2011 WL 722467 (N.D. Ill. Feb. 23,<br />

2011). In this patent litigation, the defendant sought monetary sanctions <strong>and</strong> a default judgment<br />

claiming significant <strong>and</strong> sustained discovery misconduct. After an admission that the plaintiff’s<br />

consultant <strong>and</strong> expert witness had fabricated critical evidence, the trial court granted the<br />

defendant’s motion for attorney fees <strong>and</strong> additional discovery. However, the plaintiff did not comply<br />

with the discovery order for another year, until after two additional court orders by two separate<br />

judges. Although the plaintiff adamantly denied the allegations that virtually every piece of media<br />

ordered to be produced was wiped, altered or destroyed, the court determined the defendant’s<br />

contentions were supported by forensic analysis. Finding that the last modified dates for critical<br />

evidence were backdated <strong>and</strong> otherwise modified, <strong>and</strong> that seven zip disks, three USB thumb<br />

drives <strong>and</strong> two computers had been wiped or reformatted in "bad faith <strong>and</strong> with willful disregard for<br />

the rules of discovery" <strong>and</strong> court orders, the court imposed a default judgment, dismissed the<br />

plaintiff’s complaint with prejudice <strong>and</strong> ordered $1,000,000 in sanctions for its egregious conduct.<br />

The court also ordered the plaintiff’s counsel to pay all costs <strong>and</strong> attorney fees for their part in the<br />

misconduct.<br />

� Carlock v. Williamson, 2011 WL 308608 (C.D. Ill. Jan. 27, 2011). In this civil rights litigation, the<br />

defendants sought to seal or strike the plaintiff’s motion for sanctions for the defendants’ alleged<br />

spoliation of ESI. The defendants asserted that a litigation hold spreadsheet <strong>and</strong> an e-mail were<br />

inadvertently produced, <strong>and</strong> without these documents, the plaintiff’s motion for sanctions was<br />

baseless. The plaintiff claimed any privilege was waived because it had been given “unfettered<br />

access” to the defendants’ server. Addressing the litigation hold spreadsheet, the court determined<br />

it was an ordinary business record not protected by work product doctrine <strong>and</strong> was discoverable<br />

173


ased on the virtual absence of ESI produced by the defendants, which constituted a threshold<br />

showing that they failed to preserve documents. However, the court held the spreadsheet must be<br />

properly redacted <strong>and</strong> allowed the plaintiff to refile once the redaction was completed. Next, the<br />

court conducted a Rule 502 analysis <strong>and</strong> found that the defendants took reasonable steps to<br />

prevent <strong>and</strong> rectify disclosure of the privileged e-mail communication by obtaining <strong>and</strong> relying on a<br />

protective order, <strong>and</strong> engaging in several meet <strong>and</strong> confer sessions. Finding no waiver of privilege,<br />

the court granted the defendants’ emergency motion to strike.<br />

� DeGeer v. Gillis, 2010 WL 5096563 (N.D. Ill. Dec. 8, 2010). In this ongoing employment contract<br />

litigation, the defendants moved to compel the non-party former employer’s compliance with a<br />

subpoena for ESI. Arguing that an order to search additional custodians <strong>and</strong> backup tapes along<br />

with the application of supplementary search terms would likely yield “a needle in a giant haystack<br />

search” that would lead to undue burden <strong>and</strong> expense, the non-party refused compliance unless<br />

costs were shifted to the defendants. Noting it was immersed in a discovery dispute that likely<br />

could have been avoided by the exercise of cooperation <strong>and</strong> compromise among counsel, the<br />

court ordered limited additional keyword searches <strong>and</strong> tailored searches of certain data custodians.<br />

Finding that neither party approached production “with a spirit of cooperation or efficiency,” the<br />

court ordered the parties to share cost responsibility for any future electronic production, except the<br />

costs related to searching the non-party’s former CEO’s data as he employed a policy of<br />

immediately deleting e-mails to avoid production during discovery.<br />

� Tamburo v. Dworkin, 2010 WL 4867346 (N.D. Ill. Nov. 17, 2010). In this business tort litigation,<br />

the defendants moved to stay discovery pending adjudication of their motion to dismiss.<br />

Recognizing that a "garden-variety motion to dismiss" does not ordinarily warrant a stay of<br />

discovery – which would delay resolution of the already six year-old lawsuit – the court<br />

nevertheless noted that the Fed.R.Civ.P. 26 proportionality test allows limits on discovery if the<br />

burden outweighs the benefit. Accordingly, the court ordered the parties to meet <strong>and</strong> confer to<br />

prepare a phased discovery schedule <strong>and</strong> familiarize themselves with the court’s <strong>Case</strong><br />

Management Procedures, the Seventh Circuit’s <strong>Electronic</strong> <strong>Discovery</strong> Pilot Program’s Principles<br />

Relating to the <strong>Discovery</strong> of <strong>Electronic</strong>ally Stored Information <strong>and</strong> the Sedona Conference®<br />

Cooperation Proclamation. In developing the schedule, the court ordered that the initial phase<br />

would only consist of written discovery on named parties <strong>and</strong> advised the parties to focus on<br />

completing initial disclosures first, then concentrate <strong>and</strong> prioritize efforts on the most viable claims<br />

<strong>and</strong> least expensive <strong>and</strong> burdensome discovery procedures going forward.<br />

� Kmart Corp. v. Footstar, Inc., 2010 WL 4512337 (N.D. Ill. Nov. 2, 2010). In this insurance<br />

indemnification litigation, the defendants sought sanctions <strong>and</strong> a protective order regarding<br />

inadvertently produced privileged documents. Conducting the privilege analysis using Fed.R.Evid.<br />

502, the court found that the documents at issue were privileged <strong>and</strong> inadvertently produced but<br />

determined that the defendants failed to take reasonable steps to prevent disclosure or seek their<br />

return in a timely manner. The court found that the number of privileged documents was small<br />

relative to the total production (less than 3% of the 4,500 materials produced), <strong>and</strong> a large<br />

percentage of the documents were easily identifiable as non-privileged as they were public court<br />

documents, leaving only a fraction that would have dem<strong>and</strong>ed more extensive review.<br />

Furthermore, the defendants did not employ “software used to prevent disclosure, [or] any sort of<br />

records management system” to screen the documents. The defendants’ efforts to rectify the error<br />

were also insufficient, as they failed to retrieve them until twelve days after their discovery at a<br />

deposition. Based on this analysis, the court denied the protective order <strong>and</strong> determined the<br />

174


defendants were not entitled to reclaw the material. The court also denied sanctions, finding the<br />

plaintiff made no misrepresentations regarding the privileged documents.<br />

� Alford v. Rents, 2010 WL 4222922 (S.D. Ill. Oct. 20, 2010). In this employment discrimination<br />

litigation, the court reviewed the magistrate judge’s recommendation advocating sanctions against<br />

both defendants’ counsels individually for discovery misconduct. Upon review of the record, the<br />

court found substantial <strong>and</strong> repeated violations of both the Federal Rules of Civil Procedure <strong>and</strong><br />

the Illinois Rules of Professional Conduct based on the filing of over 14 discovery-related motions,<br />

incessant “accusation-laced, uncivil correspondence,” the need for judicial supervision of<br />

depositions <strong>and</strong> the appointment of a special master to decide discovery disputes. In light of<br />

counsels’ “scorched-earth approach to discovery” in which the attorneys “embarked upon a course<br />

entailing a conscious effort to maximize litigation <strong>and</strong> to make certain [it] was as time-consuming,<br />

difficult, unpleasant, <strong>and</strong> expensive as possible,” the court adopted the magistrate judge’s<br />

recommendation <strong>and</strong> held the two attorneys personally liable for sanctions in the amount of $3,750<br />

each, to be paid without reimbursement from the law firms or clients.<br />

� DeGeer v. Gillis, 2010 WL 3732132 (N.D. Ill. Sept. 17, 2010). In this breach of contract litigation,<br />

the defendants objected to the plaintiff’s assertion of attorney-client privilege <strong>and</strong> work product with<br />

regard to nine e-mails <strong>and</strong> attachments. The plaintiff argued he exercised due diligence in<br />

asserting <strong>and</strong> maintaining privilege in advance of litigation <strong>and</strong> throughout the discovery process,<br />

while the defendants contended the plaintiff waived privilege <strong>and</strong> failed to provide sufficient<br />

information to determine whether the communications were privileged or protected. Addressing the<br />

six e-mails sent via the plaintiff’s person e-mail address, the court found they were likely pulled<br />

from the company server <strong>and</strong> added to the external hard drive that was given to the defendants’<br />

counsel. Referencing Fed.R.Evid. 502(d), the court noted that the Stipulated Protective Order<br />

protected the inadvertent production of privileged material <strong>and</strong> thus found that privilege was not<br />

waived. Turning to the three e-mails sent by the plaintiff to his attorney via the work e-mail address,<br />

the court determined that the employer believed privilege was not waived by communicating using<br />

work e-mail addresses on work-issued computers. Thus, privilege was not waived with respect to<br />

these three e-mails.<br />

� Peal v. Lee, 2010 WL 3001338 (Ill. App. 1 Dist. July 30, 2010). In this defamation action, the<br />

plaintiff appealed the circuit court’s dismissal with prejudice following his failure to comply with<br />

discovery requests <strong>and</strong> intentional destruction of evidence. On appeal, the court affirmed the circuit<br />

court’s order based on review of testimony from the defendants’ computer forensic expert that<br />

indicated the plaintiff obtained a new hard drive <strong>and</strong> “used seven different data ‘wiping’ programs to<br />

permanently delete data” from his personal computer just days prior to its surrender. Forensic<br />

investigation of the personal computer also indicated the plaintiff failed to produce as many as five<br />

external storage devices that may have contained discoverable information. In affirming the order’s<br />

severity, the court berated the plaintiff for seeking “to cover up his electronic tracks by subterfuge”<br />

<strong>and</strong> making an argument of “pure pettifoggery” on appeal, characterizing his actions as “the<br />

personification of bad faith” <strong>and</strong> a “deliberate, contumacious <strong>and</strong> unwarranted disregard of the<br />

court’s authority.” Finally, the court denied the defendant’s request for monetary sanctions finding<br />

dismissal an adequately severe sanction.<br />

� Chapman v. Gen. Bd. of Pension <strong>and</strong> Health Benefits of the United Methodist Church, Inc.,<br />

2010 WL 2679961 (N.D. Ill. July 6, 2010). In this litigation arising from claimed violations of the<br />

Americans with Disabilities Act, the plaintiff sought punitive sanctions for discovery noncompliance<br />

alleging the defendant engaged in a “flagrant violation of both the letter <strong>and</strong> the spirit of <strong>Discovery</strong><br />

rules” by unreasonably delaying production of electronic copies <strong>and</strong> accompanying metadata of<br />

175


equested documents previously produced in a hard copy. Denying the request for sanctions, the<br />

court affirmed the defendant’s argument that no duty existed to also produce electronic copies<br />

when the initial request merely sought “documents” – making no mention of digital information.<br />

Instead the court stated the fact that the defendant “ultimately agreed to do so <strong>and</strong> did is the<br />

occasion not for sanctions, but for some measure of commendation.” After disposing of the motion,<br />

the court further admonished the plaintiff for prematurely seeking sanctions under Fed.R.Civ.P. 37<br />

in a brief that lacked analysis, was devoid of supporting case law <strong>and</strong> asked for documents<br />

“concededly obtained without any court intervention.”<br />

� Jones v. Bremen High Sch. Dist. 228, 2010 WL 2106640 (N.D.Ill. May 25, 2010). In this<br />

employment discrimination litigation, the plaintiff sought sanctions alleging the defendant failed to<br />

preserve relevant documents <strong>and</strong> intentionally concealed its document retention policy to hide its<br />

lack of compliance. Detailing the defendant’s preservation efforts, the court found it “undisputed”<br />

that the defendant failed to place a litigation hold in effect when it learned the plaintiff filed charges<br />

in October 2007. Instead, the defendant directed just three employees – whose conduct was in<br />

question in the lawsuit – to search through their e-mail <strong>and</strong> cull out relevant documents without<br />

supervision of outside counsel. Notably, all employees in the district could permanently delete emails<br />

by “double-deleting” them from their computers, <strong>and</strong> the e-mails would then be automatically<br />

erased from the backup system in thirty days. Despite finding that the defendant “clearly breached<br />

its duty to preserve relevant documents,” the court determined the actions were not willful <strong>and</strong><br />

declined to impose an adverse inference instruction. However, the court found the defendant’s<br />

behavior grossly negligent, <strong>and</strong> precluded the defendant from arguing that an absence of<br />

discriminatory statements evidenced that no such statements were made <strong>and</strong> allowed for<br />

additional depositions at cost to the defendant.<br />

� OCE N. Am., Inc. v. Brazeau, 2010 U.S. Dist. LEXIS 25523 (N.D.Ill. Mar. 18, 2010). In this trade<br />

secrets litigation, the plaintiff objected to the magistrate judge’s recommendation that denied an<br />

adverse inference sanction for the defendants’ admitted failure to preserve instant messages.<br />

Recognizing that no dispute existed as to whether the defendants used the instant-messaging<br />

system <strong>and</strong> failed to save messages until after the suit was filed, the court determined that the<br />

defendants breached the duty to preserve. However, the court denied an adverse inference<br />

sanction finding an absence of evidence that the defendants acted with “willfulness, bad faith or<br />

fault.” The court further concluded that even if there had been evidence of the defendants’<br />

culpability, the plaintiff failed to prove prejudice as a result of the spoliation since the missing<br />

messages did not contain the “smoking gun” regarding the misappropriation claim.<br />

� Mintel Int’l Group, Ltd. v. Neergheen, 2010 WL 145786 (N.D.Ill. Jan. 12, 2010). In this<br />

employment litigation, the plaintiff sought sanctions up to <strong>and</strong> including default judgment based on<br />

the defendant’s alleged spoliation. The plaintiff argued that the defendant failed to preserve the<br />

hard drive of a company-issued laptop by using programs on the computer to destroy metadata<br />

<strong>and</strong> overwrite files. The defendant, whose use of the computer consisted of turning on the<br />

computer, accessing the Internet <strong>and</strong> allowing an automated defragmentation program to run,<br />

claimed his actions were not prohibited <strong>and</strong> did not result in the destruction of relevant evidence.<br />

Relying on expert testimony, the court found that any programs on the laptop that would have<br />

destroyed metadata, such as antivirus software, were not user initiated. The court held that the<br />

defendant’s destruction of any evidence was unintentional, resulting from typical computer use<br />

“rather than a pattern that is easily recognized by forensic experts as spoliation.” (Emphasis in<br />

original.) Thus, the court found sanctions were not warranted <strong>and</strong> denied the plaintiff’s motion.<br />

176


� Whitlow v. Martin, 2009 WL 33381013 (C.D. Ill. Oct. 15, 2009). In this employment dispute, the<br />

plaintiff subpoenaed a non-party seeking production of electronic information relevant to the<br />

defendants’ employment practices. The non-party’s numerous objections to the subpoena included<br />

that the requests were not reasonably likely to lead to the discovery of admissible evidence, could<br />

be obtained from more convenient sources, sought not reasonably accessible documents, <strong>and</strong><br />

were overly broad <strong>and</strong> unduly burdensome. The non-party claimed complying with the subpoena<br />

would cost hundreds of thous<strong>and</strong>s of dollars <strong>and</strong> would take more than two years to complete<br />

because several Microsoft® Exchange Servers <strong>and</strong> 200 to 300 file servers located across the state<br />

would have to be searched. Acknowledging the non-party status as a significant factor in<br />

determining whether a subpoena presents an undue burden, the court applied a relative hardship<br />

test to determine if the burden outweighed the value of the produced material. After considering<br />

such factors as relevance, need <strong>and</strong> particularity, the court, while slightly modifying the production<br />

requirements, ordered the non-party’s compliance with the plaintiff’s subpoena.<br />

� Coburn Group, LLC v. Whitecap Advisors LLC, 2009 WL 2424079 (N.D. Ill. Aug. 7, 2009). In<br />

this breach of an oral contract dispute, the defendant requested the return of a half-page long email<br />

the defendant claimed was protected work product. In opposition, the plaintiff made several<br />

arguments including that the e-mail was not protected <strong>and</strong> that, if it was, the inadvertent production<br />

waived protection. After determining the e-mail constituted work product, the court considered the<br />

waiver issue under Fed.R.Evid. 502. The court interpreted the "inadvertent disclosure" portion of<br />

Rule 502 as asking whether the party intentionally produced a privileged or work product protected<br />

document <strong>and</strong> found the defendant did not intend to produce the e-mail. Next, the court considered<br />

prior case law regarding what constituted "reasonable steps" to prevent an inadvertent disclosure.<br />

The court discussed the defendant’s thoroughly documented review process <strong>and</strong> noted that in this<br />

case only three documents slipped through the review of 72,000 document pages. Finding that<br />

Rule 502 would have no purpose if the inadvertent production of a single privileged document<br />

deemed the document review process unreasonable, the court granted the defendant’s motion <strong>and</strong><br />

ordered the plaintiff to return all copies of the e-mail.<br />

� United States v. Weaver, 2009 WL 2163478 (C.D. Ill. July 15, 2009). In this unlawful materials<br />

prosecution, the Government subpoenaed the Internet service provider (ISP) seeking the contents<br />

of electronic communications, including previously opened or sent e-mail that belonged to the<br />

defendant. After the ISP failed to produce e-mails that had been stored for fewer than 181 days,<br />

the Government moved to compel production of the e-mails’ content. The ISP argued the<br />

information sought required a warrant. Analyzing the issue using the Stored Communications Act<br />

(SCA), the court determined the ISP must comply with the Government’s subpoena if the e-mails<br />

are held or maintained solely to provide the customer storage or computer processing services.<br />

The court also determined that previously opened e-mails stored by the ISP for web-based e-mail<br />

systems—as distinguished from other e-mail systems—are not in "electronic storage," which is<br />

defined by the Wiretap Act as storage incidental to electronic transmission <strong>and</strong> for the purposes of<br />

backup protection of the e-mail. Based on this finding, the court ordered the ISP to comply fully<br />

with the Government’s subpoena.<br />

� Plunk v. Village of Elwood, IL, 2009 WL 1444436 (N.D.Ill. May 20, 2009). In this civil rights<br />

action, both parties filed a "slew of pretrial motions." The defendants argued the court should bar<br />

the plaintiffs’ expert from testifying unless discovery was re-opened. The plaintiffs requested an<br />

examination of the defendants’ computer system by their expert to determine if any deleted ESI<br />

was backed up. The plaintiffs also sought default judgment sanctions based on the defendants’<br />

destruction of an audio recording, failure to preserve data on computers <strong>and</strong> hard drives, <strong>and</strong><br />

177


failure to back up relevant ESI. Addressing the defendants’ motion, the court found the defendants’<br />

discovery failures <strong>and</strong> withdrawn expert statement that certain hard drives were not wiped clean<br />

necessitated testimony from the plaintiffs’ expert, <strong>and</strong> thus allowed a short deposition from the<br />

plaintiffs’ expert at cost to the defendants as a "fair discovery sanction for defendants’ failure to<br />

follow the rules." Turning to the plaintiffs’ motions, the court denied the examination request as<br />

expensive <strong>and</strong> futile. Regarding sanctions, the court rejected the defendants’ arguments that<br />

evidence erasure was inadvertent <strong>and</strong> found the defendants breached their preservation<br />

obligations. The court determined an adverse inference sanction was appropriate, using the<br />

plaintiffs’ expert’s identification of e-mail chains suggesting relevant documents were destroyed<br />

accidentally or intentionally as partial justification.<br />

� Mintel Int’l Group, Ltd. v. Neergheen, 2009 WL 1033357 (N.D.Ill. Apr. 17, 2009). In this ongoing<br />

misappropriation of trade secrets litigation, both parties offered testimony from qualified computer<br />

forensics <strong>and</strong> electronic discovery experts. The defendant sought exclusion of the plaintiff’s expert<br />

from testifying, alleging the expert failed to meet the appropriate st<strong>and</strong>ards, <strong>and</strong> requested<br />

exclusion of evidence regarding spoliation allegations claiming the evidence was irrelevant <strong>and</strong><br />

prejudicial. The plaintiff objected to the magistrate judge’s order denying production of a mirror<br />

image from a third party. Granting the defendant’s motion to exclude in part, the court ordered<br />

preclusion of the expert’s legal conclusions regarding whether the defendant’s conduct constituted<br />

spoliation, but otherwise allowed testimony. The court noted the expert must be able to technically<br />

explain the conclusion reached regarding whether the defendant used a "defrag" program <strong>and</strong> not<br />

simply speculate "to please the side that hired him." Turning to the spoliation issue, the court<br />

denied the defendant’s motion, concluding the experts’ views on whether evidence was deleted<br />

would be "extremely helpful given the complexity of the electronic evidence issues." Finally, the<br />

court upheld the magistrate judge’s recommendation to deny production of the third party’s mirror<br />

image given the magistrate judge’s previous analysis of the conflicting expert testimony <strong>and</strong><br />

evidence presented by the plaintiff.<br />

� Heriot v. Byrne, 2009 WL 742769 (N.D.Ill. Mar. 20, 2009). In this copyright dispute over the madefor-television<br />

documentary, The Secret, the defendants <strong>and</strong> plaintiffs both sought production of<br />

documents. The defendants sought sequestered documents that had been inadvertently produced<br />

as a result of mistakes made by the plaintiffs’ vendor, arguing the plaintiffs’ counsel was "asleep at<br />

the switch" by not re-examining the documents received from the vendor. Applying Fed.R.Evid.<br />

502, the court held privilege of certain documents was not waived, finding the plaintiffs took<br />

reasonable procedures to prevent inadvertent disclosure <strong>and</strong> promptly notified the defendants of<br />

the disclosure. The court also determined that no duty to re-review exists since it would be against<br />

the spirit of Rule 502. Turning to the plaintiffs’ motion (which sought production of 132 documents<br />

identified in a privilege log), the court reserved its ruling on privilege protection. The court noted<br />

that the documents presented were a "befuddling assemblage" <strong>and</strong> that the party asserting<br />

privilege is responsible to organize the documents in a manner that enables efficient review.<br />

Accordingly, the court ordered the defendants to submit an amended privilege log <strong>and</strong> a revised<br />

compilation of documents after they are organized chronologically.<br />

� Mintel Int’l Group, Ltd. v. Neergheen, 2009 WL 249227 (N.D.Ill. Feb. 3, 2009). In this trade<br />

secrets <strong>and</strong> computer fraud litigation, the plaintiff sought a reconsideration of the court’s previous<br />

ruling denying the plaintiff’s fifth request for a mirror image of a third party’s computers. The plaintiff<br />

alleged the defendant illegally e-mailed the plaintiff’s documents to his personal e-mail account<br />

before leaving the company. The plaintiff filed this motion based upon “newly discovered evidence”<br />

from a forensic analysis of two USB drives produced by the defendant that contained proprietary<br />

178


documents belonging to the plaintiff. Two experts – one each for the plaintiff <strong>and</strong> third party –<br />

analyzed the evidence <strong>and</strong> presented conflicting testimony regarding whether data was destroyed.<br />

In this “battle of the experts,” the court determined that the plaintiff did not establish that a wiping<br />

program was utilized given the testimony of the third party’s expert, which provided a reasonable<br />

alternative. Based on the court’s unwillingness to violate the privacy interests of the third party, the<br />

court denied the plaintiff’s motion to reconsider.<br />

� GSI Group, Inc. v. Sukup Mfg. Co., 2008 WL 3849695 (C.D.Ill. Aug. 18, 2008). In this intellectual<br />

property litigation, the defendant filed an objection to the magistrate judge’s report <strong>and</strong><br />

recommendation, denying the defendant’s motions to dismiss, or in the alternative to compel<br />

production of e-mails. The magistrate cited the lack of clear evidence of willfulness or bad faith by<br />

the plaintiff <strong>and</strong> the defendant’s failure to present sufficient evidence why further production was<br />

necessary. However, based on the defendant’s good faith attempt to resolve this dispute prior to<br />

bringing it before the court, the magistrate recommended the plaintiff pay the defendant’s<br />

reasonable expenses incurred in bringing the motion to compel. Denying the defendant’s objection,<br />

the court approved the recommendation in full, denying defendant’s motion to dismiss the<br />

complaint <strong>and</strong> instead ordered the plaintiff to pay reasonable expenses, including attorney’s fees.<br />

� United States v. Kimoto, 2008 WL 2003187 (S.D. Ill. May 8, 2008). In this post-conspiracy<br />

conviction hearing, the defendant filed a motion to dismiss alleging that the government either<br />

failed to provide, or destroyed, digital forensic evidence <strong>and</strong> relevant e-mail. Specifically, the<br />

defendant claimed approximately 2500 e-mail were missing <strong>and</strong> further electronic evidence was<br />

intentionally withheld. The government argued that open file discovery was allowed from the<br />

beginning, making “every scrap” of electronic evidence available. Finding the defendant failed to<br />

prove the government acted in bad faith, failed to show the exculpatory value of the evidence was<br />

apparent, <strong>and</strong> failed to show the evidence could not have been obtained by other reasonably<br />

available means, the court denied the defendant’s motion.<br />

� Peterson v. Union Pacific R.R. Co., 2008 WL 1930453 (C.D. Ill. May 1, 2008). In this wrongful<br />

death litigation, the plaintiffs filed a motion to compel additional discovery <strong>and</strong> sought sanctions.<br />

The plaintiffs sought additional depositions, alleging that the defendant concealed data or engaged<br />

in spoliation of three potential sources of electronic data. Determining that no discovery abuse<br />

existed, the court found that the plaintiffs failed to diligently pursue the requested information.<br />

Additionally, the court found that additional discovery was not needed at this stage of litigation. The<br />

court ordered the plaintiffs to show why their motion to compel was substantially justified in<br />

response to the defendant’s request for fees associated with opposing the motion.<br />

� Autotech Techs. Ltd. P’ship v. Automationdirect.com, Inc., 2008 WL 902957 (N.D.Ill. April 2,<br />

2008). In this trademark <strong>and</strong> copyright infringement litigation, the defendant sought production of a<br />

document in its native format with metadata. Arguing against production, the plaintiff asserted the<br />

document in question was previously produced in both .PDF format <strong>and</strong> in paper format. Finding<br />

no previous specific production format request, the court determined the plaintiff had the option to<br />

produce the document in the form in which it is ordinarily maintained, or in a reasonably usable<br />

form. Additionally, the court stated the defendant “was the master of its production requests [<strong>and</strong>] it<br />

must be satisfied with what it asked for” – as the original request did not include metadata.<br />

� Autotech Technologies, Ltd. v. Automationdirect.com, Inc., 2008 WL 783301 (N.D.Ill. Mar. 25,<br />

2008). In this trademark infringement litigation, the defendant moved for sanctions claiming<br />

inadequate discovery production due to missing information. Finding the plaintiff complied with the<br />

defendant’s discovery request, the court declined to issue sanctions. The court further ordered the<br />

parties to meet to resolve how the specific information sought by the defendant may be obtained,<br />

179


with the defendant bearing the costs unless able to demonstrate the information should have been<br />

produced by the original search.<br />

� Muro v. Target Corp., 2007 WL 3254463 (N.D.Ill. Nov. 2, 2007). In this suit, the plaintiff alleged<br />

the defendants sent unsolicited credit cards in the mail which violated the Truth in Lending Act <strong>and</strong><br />

sought class-action certification. Several discovery disputes ensued, involving questions regarding<br />

the discoverability of the defendants’ litigation hold notices <strong>and</strong> adequacy of the defendants’<br />

privilege log. The court upheld the magistrate judge’s finding that the defendants’ litigation hold<br />

notice was protected by the work-product doctrine. Relying upon Upjohn Co. v. United States, 449<br />

U.S. 383 (1981), the court found that Fed. R. Civ. P. 26(b)(5)(A) does not require privilege logs to<br />

separate entries of multiple e-mails within the same string <strong>and</strong> that a single e-mail of a forwarded<br />

chain to counsel is protected by the attorney-client privilege. However, the court found serious<br />

defects in the defendants’ privilege log because it failed to identify all of the recipients of some<br />

messages <strong>and</strong> the plaintiff was unable to assess whether recipients fell within the sphere of<br />

corporate privilege. The log also used “sometimes-cryptic job titles to explain the recipients of emails,”<br />

which made it difficult to assess the applicability of privilege. The court allowed the<br />

defendants ten days to submit a revised privilege log addressing the above defects so the court<br />

could perform an in camera review <strong>and</strong> determine privilege protection.<br />

� APC Filtration, Inc. v. Becker, 2007 U.S. Dist. LEXIS 76221 (N.D.Ill. Oct. 12, 2007). The plaintiff<br />

in this case brought suit against a former employee for trade secret misappropriation <strong>and</strong> breach of<br />

contract. Days after receiving the complaint, the defendant discarded his computer, resulting in the<br />

plaintiff moving for default judgment, sanctions <strong>and</strong> attorney’s fees. Relying on its inherent power<br />

<strong>and</strong> Fed.R.Civ.P. 37, the court refused to enter default judgment but affirmed the plaintiff’s motion<br />

for sanctions, finding the defendant acted in bad faith. The court also ordered the defendant to pay<br />

reasonable attorneys fees <strong>and</strong> costs associated with the plaintiff’s motion, third party discovery<br />

required due to the computer destruction, <strong>and</strong> retention of the computer expert.<br />

� Modern Eng’g, Inc. v. Peterson, 2007 WL 2680563 (C.D.Ill, July 16, 2007). In this employment<br />

contract dispute, the plaintiff alleged the defendant e-mailed sensitive information to the plaintiff’s<br />

largest competitor in an attempt to gain employment with that competitor. The plaintiff sought<br />

production of all electronic communications sent by the defendant to certain third parties <strong>and</strong> the<br />

defendant objected, arguing they did not belong to him <strong>and</strong> were in the possession of his current<br />

employer. The court held that the defendant was not obligated to produce documents in the care,<br />

custody or control of his employer, but ordered him to produce responsive documents that were in<br />

his own care, custody or control, regardless of the ownership of those documents.<br />

� In re Kmart Corp., 2007 WL 2198309 (Bkrtcy.N.D.Ill. July 31, 2007). In a Chapter 11 bankruptcy<br />

proceeding, Global Property Services, Inc. (Global) filed an administrative claim against the debtor,<br />

Kmart Corporation, for breach of contract <strong>and</strong> tortuous misconduct. Shortly thereafter, Global<br />

issued its first discovery requests <strong>and</strong> sought assurances that all responsive documents would be<br />

preserved <strong>and</strong> produced. After months of struggling to obtain responsive documents from Kmart,<br />

Global motioned the court to sanction Kmart for spoliation <strong>and</strong> violation of a previous production<br />

order. Kmart filed a response to the motion, noting that there was no contention Kmart had<br />

destroyed documents intentionally or in bad faith <strong>and</strong> that Global had failed to identify any “trigger<br />

date” for Kmart’s duty to preserve evidence. The court applied a three step analysis requiring<br />

culpability, an obligation to preserve, <strong>and</strong> that the other party suffered prejudice as a result before<br />

ordering sanctions. The court reasoned that where the duty to preserve information is well known<br />

<strong>and</strong> the party fails to do so, they will be charged with a higher culpability. The court held that even<br />

though Kmart had a duty to preserve the relevant electronically stored information as of the date of<br />

180


the filing of the claim, its failure to do so was with mere fault, not willfulness or bad faith, <strong>and</strong><br />

therefore refused severe spoliation sanctions. Finding a small element of prejudice, the court<br />

required Kmart to pay a portion of Global’s attorney’s fees <strong>and</strong> costs associated with drafting <strong>and</strong><br />

presenting the motion.<br />

� Ridge Chrysler Jeep, LLC v. Daimler Chrysler Servs., 2006 WL 2808158 (N.D. Ill. Sept. 6,<br />

2006). A court dismissed with prejudice plaintiffs’ racial discrimination claims when it found that<br />

plaintiffs consistently lied in affidavits <strong>and</strong> deposition testimony regarding the location of evidence,<br />

including electronic evidence, found on computer hard drives <strong>and</strong> backup tapes. The court also<br />

found that plaintiffs failed to properly preserve relevant financial records found on these computers<br />

<strong>and</strong> backup tapes. In dismissing the plaintiffs’ claims because monetary sanctions would “not<br />

suffice to repair the harm inflicted on this case <strong>and</strong> on the judicial system as a whole”, it declared:<br />

“[t]hese are not the actions of truth-seeking individuals intent on having their day in court, but<br />

rather, sleight of h<strong>and</strong> tactics of manipulators seeking to use the federal court system to their own<br />

advantage.”<br />

� Lewis v. Sch. Dist. #70, 2006 WL 2506465 (S.D. Ill. Aug. 25, 2006). In a wrongful termination<br />

claim, the plaintiff filed a motion to compel defendant to produce requested e-mails in a searchable<br />

electronic form rather than in the already provided hard-copy form. Plaintiff argued that modern<br />

technology should allow the defendant to produce any requested e-mails in electronic form which<br />

could be searched for key words by plaintiff. The court stated that it “does not doubt that modern<br />

technology would lessen the burden of searching for relevant e-mails, but the search would<br />

undoubtedly not be perfect.” The court held that the defendant made a reasonable attempt to<br />

produce the requested e-mails <strong>and</strong> that “plaintiff has been provided with more materials than she is<br />

rightfully entitled to.” Plaintiff also argued that the defendant “should have altered their usual<br />

document retention practices . . . because they anticipated litigation.” The court noted that plaintiff<br />

relied upon “case law from the Southern District of New York” (presumably the Zubulake line of<br />

cases) <strong>and</strong> firmly noted that such caselaw “is not controlling on this Court.”<br />

� Krumwiede v. Brighton Assocs., L.L.C., 2006 WL 1308629 (N.D. Ill. May 8, 2006). In an<br />

employment lawsuit, the defendants sought a default judgment against the plaintiff for destroying<br />

relevant computer data. The plaintiff insisted that the data had not been intentionally destroyed,<br />

arguing that the files “probably” still existed on the defendants’ laptop with only minimal alterations<br />

in the files’ metadata fields. However, a neutral computer forensic expert analyzed the laptop <strong>and</strong><br />

concluded that the combination of a “court order violation, deliberate movement of file data,<br />

admitted deletion activities, multiple use of defrag, use of ZIP file to conceal or transport [the<br />

defendants’] data, [<strong>and</strong> use of] multiple USB devices . . . [establishes that] [the plaintiff] did intend<br />

to destroy evidence <strong>and</strong> did intend to conceal the existence <strong>and</strong>/or movement of data.” Issuing a<br />

default judgment against the plaintiff, the court found the plaintiff had continued to delete, modify<br />

<strong>and</strong> access thous<strong>and</strong>s of files despite knowing the laptop was subject to a litigation hold. The court<br />

declared, “[this] will send a strong message to other litigants, who scheme to abuse the discovery<br />

process <strong>and</strong> lie to the Court, that this behavior will not be tolerated <strong>and</strong> will be severely<br />

sanctioned.” See Krumwiede v. Brighton Assoc., 2006 WL 2714609 (N.D. Ill. Sept. 20, 2006)<br />

(ordering plaintiff to immediately pay the $111,000 in production costs).<br />

� Hagenbuch v. 3B6 Sistemi Elettronici Industriali S.R.L., 2006 WL 665005 (N.D. Ill. Mar. 8,<br />

2006). In a case involving a patent infringement claim, the plaintiff sought to compel native file<br />

production of compact discs, floppy discs <strong>and</strong> DVDs. Despite the plaintiff’s protests, the defendants<br />

converted responsive electronic information to TIFF images, downloaded the images onto CDs <strong>and</strong><br />

delivered the CDs to the plaintiff. The defendants argued they satisfied their Fed.R.Civ.P. 34<br />

181


discovery obligations by producing the documents in TIFF format. Objecting, the plaintiff asserted<br />

the TIFF production lacked clarity, color <strong>and</strong> metadata, made it difficult to determine which pages<br />

were part of one document, lacked clear indications as to which documents were stored together,<br />

<strong>and</strong> made quick <strong>and</strong> efficient searching impossible. Although the defendants asserted they<br />

converted the documents to TIFF format in order to add Bates numbers, the court found this<br />

argument unpersuasive. The court granted the plaintiff’s motion, noting the TIFF production did<br />

“not contain all of the relevant, non-privileged information,” lacked metadata, e-mail attachments<br />

<strong>and</strong> recipients, <strong>and</strong> were not produced in the “usual course of business.”<br />

� In re Old Banc One Shareholders Sec. Litig., 2005 WL 3372783 (N.D. Ill. Dec. 8, 2005). The<br />

plaintiffs sought default judgment or an adverse inference instruction based on the defendant’s<br />

failure to preserve relevant documents relating to underlying data, calculations <strong>and</strong> drafts of<br />

relevant documents. Specifically, the plaintiffs argued that the defendant’s document retention<br />

policy allowed for destruction of these essential documents <strong>and</strong> data. Despite being unable to<br />

locate <strong>and</strong> produce many of these documents, the defendant claimed it had met its preservation<br />

obligations. In evaluating the defendant’s document retention h<strong>and</strong>ling, the court noted the<br />

defendant was not obligated to preserve “every scrap of paper.” The court, however, stated the<br />

defendant should have implemented a comprehensive document retention policy to ensure<br />

relevant documents were retained <strong>and</strong> should have distributed that policy to its employees. The<br />

court found the defendant did not comply with these requirements <strong>and</strong> determined the appropriate<br />

remedy was precluding the defendant from cross-examining the plaintiffs’ financial expert at trial.<br />

� Experian Info. Solutions, Inc. v. I-Centrix, L.L.C., No. 04 C 4437 (N.D. Ill. July 21, 2005).<br />

Claiming breach of contract <strong>and</strong> misappropriation of trade secrets, the plaintiffs filed suit against<br />

the defendant, a former employee, <strong>and</strong> his new company, formed after he stopped working for the<br />

plaintiffs. During discovery, the plaintiffs sought to obtain mirror images of the defendant’s<br />

computers. The defendant argued the request was overbroad, would capture proprietary<br />

information, <strong>and</strong> would hinder the defendant’s business operations. Alternatively, in the event the<br />

court decided the mirror images were discoverable, the defendant proposed that it use the<br />

st<strong>and</strong>ards set forth in Simon Prop. Group L.P. v. mySimon, Inc., 194 F.R.D. 639 (S.D. Ind. 2000).<br />

In mySimon, an independent expert created <strong>and</strong> examined a mirror image of the defendant’s hard<br />

drive <strong>and</strong> then submitted potentially relevant documents to the defendants. The plaintiffs argued<br />

the method was too narrow as it would not allow them to evaluate “relevant contextual data” <strong>and</strong><br />

“metadata” found in the mirror image. The court adopted a modified version of the mySimon<br />

framework, adding a provision to facilitate the recovery of metadata specified in a list generated by<br />

the plaintiffs. The court ordered “an independent expert [to] review the bitstream copy for<br />

contextual information <strong>and</strong> metadata that falls within the scope of this list, as well as for documents<br />

relevant to Plaintiff’s discovery requests.”<br />

� People v. Downin, 828 N.E.2d 341 (Ill. App. Ct. 2005). The defendant appealed a conviction for<br />

aggravated criminal sexual abuse, arguing that the trial court erred in admitting e-mails containing<br />

admissions of guilt. Specifically, the defendant contended the e-mails were not properly<br />

authenticated, making them inadmissible for lack of proper foundation. He further stated that<br />

without any evidence of an Internet provider address linking the e-mail to himself, there was no<br />

way to verify that the victim did not falsify the e-mails. The appellate court found the trial court did<br />

not abuse its discretion <strong>and</strong> concluded that the victim’s testimony <strong>and</strong> other circumstantial<br />

evidence sufficiently established authenticity of the e-mails.<br />

� Liebert Corp. v. Mazur, 827 N.E.2d 909 (Ill. Ct. App. 2005). The plaintiffs sought to enjoin several<br />

of its former employees from allegedly using electronic “e-commerce” Web sites – containing<br />

182


confidential customer lists, quotations <strong>and</strong> price books – in a new, competing business. One of the<br />

defendants admitted that he downloaded price books from the company’s server to his laptop on<br />

the day he resigned. The plaintiffs hired a computer forensic expert to examine the laptop, <strong>and</strong> the<br />

expert discovered confidential files were accessed, downloaded <strong>and</strong> placed in a Zip file. The expert<br />

also determined a new Zip folder – containing quote histories <strong>and</strong> budgets – was created <strong>and</strong><br />

subsequently copied from the hard drive to a CD-Rom on the same day the defendant was served<br />

with the plaintiffs’ complaint <strong>and</strong> preliminary injunction motion. During the copy, the computer<br />

automatically placed the files in a “CD burning folder”, a folder most computer users are not aware<br />

exists. During the next few days, in a “mass wave of deletion,” over 12,000 files were deleted from<br />

the defendant’s computer. The laptop’s application log, which tracks programs like the CD-Rom<br />

burning program, was also deleted four days after the complaint was served. Despite this<br />

evidence, the trial court denied the plaintiff’s motion for a preliminary injunction, finding insufficient<br />

evidence existed to prove any of the defendants used the price books before they were destroyed.<br />

On appeal, the court reversed the decision, determining the trial court abused its discretion, <strong>and</strong><br />

ordered the trial court to grant a reasonable preliminary injunction. The appellate court noted,<br />

“[b]ecause [the defendant] destroyed this crucial piece of evidence [the application log], we<br />

presume it would have showed he successfully copied the price books on a CD.”<br />

� DirecTV, Inc. v. Borow, 2005 WL 43261 (N.D.Ill. Jan. 6, 2005). The plaintiff brought a motion for<br />

summary judgment, claiming the defendant used the plaintiff’s satellite television signal without<br />

authorization <strong>and</strong> then spoliated evidence of the unauthorized use. The court had previously<br />

awarded sanctions against the defendant for deliberately destroying evidence by using “Evidence<br />

Eliminator,” a software wiping utility program, to erase electronic evidence requested by the<br />

plaintiff. The plaintiff’s computer forensic expert examined the computer <strong>and</strong> recovered some of the<br />

deleted files, including programs used by satellite pirates to intercept the plaintiff’s encrypted signal<br />

<strong>and</strong> files listing the name of piracy websites the defendant visited. Other files were permanently<br />

deleted. The defendant argued “somebody else” was responsible for these actions, even though he<br />

declared the computer remained in his exclusive possession. Granting the plaintiff’s summary<br />

judgment motion, the court noted, “[t]he fact that [the defendant] deleted certain files on his<br />

computer only five weeks after the start of this litigation creates an inference that he destroyed<br />

evidence that would have been harmful to his defense.”<br />

� Peter Rosenbaum Photography Corp. v. Otto Doosan Mail Order Ltd., 2004 WL 2973822<br />

(N.D.Ill. Nov. 30, 2004). Claiming the defendants violated a limited publication agreement, the<br />

plaintiffs subpoenaed relevant electronic documents. The defendants refused to comply with the<br />

subpoena claiming undue burden <strong>and</strong> expense. The plaintiffs brought a motion to compel<br />

document production. In response, defense counsel advised the court that the automatic stay<br />

provision under bankruptcy law did not subject a debtor to civil discovery unless a bankruptcy court<br />

lifts the automatic stay. Based on this representation, the court gave the plaintiffs leave to withdraw<br />

their motion to show cause. Filing in bankruptcy court, the plaintiffs moved a second time to compel<br />

the document production. The plaintiffs also sought sanctions against defense counsel for her<br />

“unsupported verbal representations” regarding the automatic stay provision. Noting the<br />

defendants’ non-compliance argument was unsupported by case law <strong>and</strong> the plaintiffs had<br />

attempted to minimize compliance costs, the bankruptcy court granted the plaintiff’s motion to<br />

compel the electronic documents. The bankruptcy court also granted the motion for monetary<br />

sanctions against defense counsel, declaring “[t]here is a not so fine line…between zealous<br />

advocacy <strong>and</strong> intentional misrepresentation of the facts of this case.”<br />

183


� Telewizja Polska USA, Inc., v. Echostar Satellite Corp., 2004 WL 2367740 (N.D.Ill. Oct. 15,<br />

2004). In a case involving a sales contract dispute, the plaintiff brought a series of preliminary<br />

motions requesting exclusion of evidence, including that of an archived website. The plaintiff<br />

argued that the website should be excluded because it constituted double hearsay. Rejecting this<br />

argument, the court determined that the images <strong>and</strong> text on the website were not “statements” as<br />

defined in the hearsay rule. Even if they were statements, the court concluded they would fall<br />

within the party-opponent admission exclusion. The plaintiff also claimed the website was not<br />

properly authenticated. Acknowledging that the “Internet Archive is a relatively new source for<br />

archiving websites,” the court nonetheless determined that the website satisfied the threshold<br />

requirement of evidentiary reliability under Fed.R.Evid. 901 <strong>and</strong> indicated the plaintiff was free to<br />

argue the issue of reliability in front of the jury.<br />

� Wiginton v. CB Richard Ellis, Inc., 229 F.R.D. 568 (N.D.Ill. 2004). In a class action sexual<br />

harassment lawsuit, the plaintiff requested the defendant bear the costs of searching 94 backup<br />

tapes for relevant e-mails. The plaintiff based its argument on a sample search of three backup<br />

tapes, purportedly containing a large number of relevant documents. The defendant disputed the<br />

volume of relevant documents recovered <strong>and</strong> asserted it should not be responsible for the costs<br />

since only a small number of the recovered documents contained relevant data. In conducting its<br />

sampling analysis, the plaintiff retained <strong>Kroll</strong> <strong>Ontrack</strong> to retrieve relevant e-mails from three tapes,<br />

conduct keyword searches, <strong>and</strong> load the results into an online review tool. <strong>Kroll</strong> <strong>Ontrack</strong> discovered<br />

8,660 documents relating to eight search terms provided by the plaintiff. In analyzing who should<br />

bear the costs, the court adopted the seven-factor Zubulake test <strong>and</strong> added an eighth factor, which<br />

required the court to weigh “the importance of the requested discovery in resolving the issues at<br />

stake in the litigation.” Balancing these eight factors, the court determined cost-shifting was<br />

appropriate <strong>and</strong> ordered the plaintiff to pay 75 percent of the costs of restoring the backup tapes,<br />

searching the data, <strong>and</strong> transferring it to the online review tool.<br />

� Sondker v. Philips <strong>Electronic</strong>s North America, 2004 WL 1687016 (N.D. Ill. July 27, 2004). In a<br />

partial motion for summary judgment, the defendant sought to strike two of the plaintiff’s exhibits,<br />

submitted by the plaintiff as evidence in favor of denying the motion. The defendant argued the<br />

plaintiff should be not allowed to use the exhibits, which were hard copies of e-mail attachments,<br />

because the plaintiffs did not produce the exhibits during discovery. Contending the defendant<br />

should have tried to solve the dispute before filing its motion to strike, the plaintiff maintained the<br />

defendant was not entitled to relief pursuant to Fed. R. Civ. P. 37(a)(2) <strong>and</strong> Local Rule 37.2. Both<br />

rules require a “good faith” attempt to confer with an opposing party who is not meeting disclosure<br />

requests. Attempting to show it met these requirements, the defendant produced a letter it sent to<br />

the plaintiff, which requested production of any attachments to e-mails being used as evidence.<br />

Determining the defendant’s letter did not certify it had attempted a good faith contact, the court<br />

denied the defendant’s motion to strike.<br />

� Zenith Elec. Corp. v. WH-TV Broad. Corp., 2004 WL 1631676 (N.D. Ill. July 19, 2004). In a<br />

breach of contract action, the plaintiff <strong>and</strong> the defendant filed separate motions to vacate litigation<br />

costs awarded against them pursuant to a federal statute. The costs, which related to the<br />

production of electronic documents by third-party defendants, involved the printing of electronic<br />

documents, as well as other e-discovery costs. The court denied the award of costs for printing the<br />

documents, noting that printing was a convenience <strong>and</strong> the documents could have been produced<br />

in their original electronic form. The court also refused to award expenses for the e-discovery<br />

costs, stating such costs were not recoverable under a federal statute. One component of the ediscovery<br />

costs related to 19 disks containing files that were originally printed by the third-party<br />

184


defendants at a cost of more than $100,000. After this paper production, the defendant requested<br />

these same documents be produced electronically because the printed copies lacked metadata<br />

<strong>and</strong> the electronic files could be more easily searched. The district court granted the request. The<br />

third-party defendants then hired a consultant to categorize the disks <strong>and</strong> redact privileged<br />

documents, incurring an additional $182,595.47 in costs. The court declined to award any of the<br />

costs relating to the 19 disks.<br />

� Portis v. City of Chicago, 2004 WL 1535854 (N.D. Ill. July 7, 2004). In response to a federal civil<br />

rights class action lawsuit, the city moved to compel discovery of a document database prepared<br />

by the plaintiffs’ attorneys. The city had previously rejected the plaintiff’s proposal to work jointly on<br />

assembling the costly <strong>and</strong> time-consuming database containing arrest reports deemed relevant to<br />

the lawsuit. In response to the city’s motion, the plaintiffs, who had spent more than $90,000 to<br />

compile the database, claimed that the database was protected as attorney work product. Although<br />

the court agreed that the database contained attorney work product, it determined the database<br />

was neither selective nor revealing enough to constitute opinion work product. The court further<br />

declared the city had a “substantial need for the information” <strong>and</strong> “the amount of time <strong>and</strong> money<br />

the City would have to expend to compile a similar database from scratch warrants a finding of<br />

undue hardship.” As such, the court granted the city’s motion to compel the database as long as<br />

the city reimbursed the plaintiffs for half of the costs associated with compiling the database. See<br />

also Portis v. City of Chicago, 347 F.Supp.2d 573 (N.D. Ill. 2004) (The court calculated database<br />

expenses based on the number of hours spent creating the database multiplied by hourly billing<br />

rates).<br />

� Tempco Elec. Heater Corp. v. Temperature Eng’g Co. 2004 WL 1254134 (N.D.Ill. Jun. 3, 2004),<br />

vacated <strong>and</strong> rev’d in part, <strong>Case</strong> No. 02 C 3572 (Jun. 29, 2004). In response to the plaintiff’s claims<br />

of trademark infringement, breach of contract, <strong>and</strong> misappropriation of trade secrets, the defendant<br />

moved for partial summary judgment arguing that the plaintiff presented no evidence to support its<br />

claims. In support of its motion, the defendant submitted findings by a computer company, who<br />

inspected the defendant’s computers <strong>and</strong> determined that no remnants of the plaintiff’s confidential<br />

database existed on the defendant’s computers. Arguing that the court should deny the summary<br />

judgment motion, the plaintiff declared that the computer company had performed a minimal<br />

inspection <strong>and</strong> that a more complete computer forensic investigation might have revealed evidence<br />

of the database. The court granted the defendant’s partial summary judgment motion declaring that<br />

the plaintiff “has the burden of proof, <strong>and</strong> therefore the responsibility to conduct a thorough<br />

investigation. [The plaintiff] cannot simply sit back <strong>and</strong> complain about the inadequacy <strong>and</strong>/or bias<br />

of [the defendant’s] inspection efforts.” The plaintiff appealed this decision claiming testimony from<br />

one of the defendant’s employees revealed the defendant did not remove all copies of a computer<br />

program at issue from its computers as it claimed it did. Finding this established enough evidence<br />

to overcome summary judgment, the court vacated <strong>and</strong> reversed its original summary judgment<br />

finding.<br />

� In re 3817 W. West End, First Floor Chicago, Illinois 60621, 2004 WL 1380272 (N.D. Ill. May<br />

27, 2004). In a case involving tax fraud, the government asked the court for permission to seize<br />

<strong>and</strong> search a home computer hard drive <strong>and</strong> disks for evidence. Although the court authorized<br />

seizure of the computer, it conditioned the search upon the government submitting a search<br />

protocol, outlining the search methods that it would use in order to ensure that irrelevant, private<br />

documents were excluded from the investigation. The government objected to the court’s order<br />

asserting that the court could not regulate the manner in which the computer was searched. In a<br />

subsequent ex parte proceeding, the court rejected the government’s claim, declaring that a<br />

185


magistrate judge can require the government to set forth computer search protocol in order to<br />

ensure constitutionally protected privacy rights. The court concluded that the search protocol was<br />

necessary “in the context of computer searches, where the volume of intermingled documents may<br />

be substantial <strong>and</strong> there are tools to focus those searches that are unavailable for searches of hard<br />

copy documents.”<br />

� YCA, LLC v. Berry, 2004 WL 1093385 (N.D.Ill. May 7, 2004). In a case involving the alleged<br />

breach of a restrictive covenant, the defendant requested that the court sanction the plaintiff by<br />

striking its computer expert’s testimony <strong>and</strong> findings. Although the defendant’s original deposition<br />

indicated that a search of his computer was unnecessary, he later admitted that relevant<br />

documents may have existed on his computer. In response to the defendant’s late admission, the<br />

plaintiff hired a computer forensic expert, who retrieved deleted documents from the defendant’s<br />

computer. The defendant contended that his case was unfairly prejudiced because the plaintiff<br />

failed to disclose its computer expert in responding to the defendant’s document production<br />

requests. The plaintiff asserted that the defendant’s late admission justified its delay in disclosing<br />

the expert. The court declined to sanction the plaintiff stating that had the defendant “wished to<br />

avoid ‘unfair surprise’ concerning his legal strategy…perhaps he should have followed the spirit of<br />

the discovery rules <strong>and</strong> informed YCA [earlier] that his YCA computer might contain relevant<br />

documents.”<br />

� United States v. Segal, 313 F.Supp.2d 774 (N.D.Ill. 2004). In a criminal investigation, the<br />

government seized over 200 boxes of documents <strong>and</strong> several personal computers <strong>and</strong> back-up<br />

tapes belonging to the defendants. The defendants moved for the return of all seized attorneyclient<br />

privileged communications <strong>and</strong> to bar the government from using these communications for<br />

any purpose. In addition, the defendants claimed the government failed to adhere to Department of<br />

Justice guidelines, which required a meaningful screening process to insure that it did not review<br />

privileged electronic communications. Conversely, the government claimed it endeavored to create<br />

an efficient document review system by using search programs to identify documents relating to<br />

particular search terms rather than browsing all of the hard drives in its possession. In ruling, the<br />

court stated that “[t]he government’s sloppy h<strong>and</strong>ling of Defendants’ electronic information should<br />

not be condoned, but it is not of sufficient magnitude to violate Defendants’ due process rights <strong>and</strong><br />

thus warrant the ‘strong medicine’ of evidence suppression.” Although it refused to authorize the<br />

suppression of derivative evidence, the court ordered the government not to review any of the<br />

documents contained in the defendants’ privilege log or to introduce any of those documents at trial<br />

without a court determination that those documents were not privileged.<br />

� Aero Prods. Int’l v. Intex Rec. Corp., 2004 WL 417193 (N.D. Ill. Jan. 30, 2004). In a patent<br />

infringement suit, the plaintiffs moved for production of documents relating to the development of<br />

the products in question. When the plaintiffs uncovered that the defendant had been deleting all of<br />

its e-mails every 30 days since the initiation of the suit, the court entered a protective order<br />

requiring the defendant to make a full <strong>and</strong> complete effort to recover any <strong>and</strong> all deleted electronic<br />

documents, including e-mail. The order also stated that the plaintiffs could petition for the<br />

appointment of a computer forensics expert to assist in recovering electronic data, <strong>and</strong> that the<br />

plaintiffs could request that the defendant bear the costs of the expert. Responding to the order,<br />

the defendant produced 45 pages of documents <strong>and</strong> an expert report that described the<br />

defendant’s efforts to recover the deleted e-mails. Although the plaintiffs found these submissions<br />

unacceptable, they did not file a petition seeking the appointment of a neutral computer forensics<br />

expert. In denying the motion, the court declared that the plaintiffs, as was their right pursuant to<br />

the protective order, should have filed a petition seeking the appointment of a computer forensics<br />

186


expert. The court also held that an award of sanctions would be unjust because plaintiffs waited<br />

more than seven months before filing the discovery motion.<br />

� Wiginton v. Ellis, 2003 WL 22439865 (N.D.Ill. Oct. 27, 2003). Two days after filing a sexual<br />

harassment class action suit, the plaintiff’s counsel sent the defendant a preservation letter<br />

requesting that all electronic materials <strong>and</strong> records relevant to the lawsuit be retained. Upon receipt<br />

of this letter, the defendant sent one e-mail to its employees requiring preservation of all<br />

documents relating to the plaintiff. The defendant continued to follow its normal document retention<br />

<strong>and</strong> destruction policies until several months later when the court entered a preservation order. Email<br />

system backup tapes were destroyed <strong>and</strong> former employees’ hard drives (including the<br />

plaintiff’s former supervisor) were not saved. The plaintiff sought a motion for spoliation sanctions.<br />

The court found that the defendant had the duty to preserve relevant electronic documents that<br />

were likely to be the subject of discovery requests, had knowledge of this duty, <strong>and</strong> willfully <strong>and</strong><br />

intentionally did not fulfill this duty. Despite this, the court denied the plaintiff’s motion for sanctions,<br />

stating that the extent of the lost electronic documents was not known. The court stated that the<br />

backup data that was preserved <strong>and</strong> produced by the defendant may perhaps give some insight<br />

into what was destroyed. If the plaintiff’s expert is able to discover relevant documents on the<br />

backup tapes, then the plaintiff will be allowed to renew its motion for sanctions.<br />

� Kucala Enters. Ltd. v. Auto Wax Co., 2003 WL 22433095 (N.D.Ill. Oct. 27, 2003). After<br />

conducting an evidentiary hearing, the magistrate judge in the patent infringement suit Kucala<br />

Enters. Ltd. v. Auto Wax Co., 2003 WL 21230605 (N.D.Ill. May 27, 2003), recommended that the<br />

plaintiff’s claims be dismissed <strong>and</strong> that attorneys’ fees <strong>and</strong> expenses attributable to the motion for<br />

sanctions be granted against the plaintiff for destroying computer evidence. The federal district<br />

judge rejected the magistrate’s recommendation that the plaintiff’s claims be dismissed with<br />

prejudice. The magistrate did so despite the fact that the plaintiff used computer software called<br />

"Evidence Eliminator" to delete files the night before a scheduled discovery inspection. The district<br />

judge stated that the interest of justice would be best served by adjudicating the claim <strong>and</strong><br />

counterclaim at issue. The court upheld the magistrate’s recommendation that the plaintiff bear the<br />

expenses flowing from the discovery misconduct. See also Kucala Enters. Ltd. v. Auto Wax Co,<br />

2004 WL 742252 (N.D.Ill. Apr. 6, 2004) (Court awarded $93,125.74 in sanctions for the plaintiff’s<br />

discovery misconduct <strong>and</strong> ordered the parties to provide full responses to outst<strong>and</strong>ing discovery<br />

but denied the defendant’s motion for a permanent injunction).<br />

� <strong>Computer</strong> Assocs. Int’l, Inc. v. Quest Software, Inc., 2003 WL 21277129 (N.D.Ill. June 3, 2002).<br />

The plaintiff brought a copyright infringement <strong>and</strong> trade secret misappropriation suit against six of<br />

the defendant’s employees arising from improper use of some of plaintiff’s software source code.<br />

The plaintiff asked the defendants to make specific work <strong>and</strong> home computer hard drives available<br />

for electronic imaging so that the plaintiff could search for <strong>and</strong> reconstruct deleted files that would<br />

be otherwise undiscoverable. The defendants argued that the drives contained privileged<br />

information relating directly to this litigation <strong>and</strong> worked with a computer consultant to remove the<br />

privileged information from the images <strong>and</strong> indicate where the removed information was located.<br />

The defendants filed a motion to require the plaintiff to pay for the computer consultation that was<br />

necessary to prepare the drives for disclosure. After seeking advice from the Rowe 8-factor cost<br />

shifting test, the court determined that the defendants’ costs were analogous to the review of<br />

documents for privileged information <strong>and</strong> should not be shifted to the requesting party.<br />

� Lakewood Eng’g v. Lasko Prod., 2003 WL 1220254 (N.D.Ill. Mar. 14, 2003). In a patent<br />

infringement suit, the plaintiff produced e-mail <strong>and</strong> other electronic documents after the close of the<br />

discovery period. The court found that while the plaintiff did not engage in a good faith effort to<br />

187


produce all requested discovery in a timely manner, the cost to the defendant was minimal <strong>and</strong><br />

therefore refused to issue sanctions. To the extent that it had not already done so, the plaintiff was<br />

ordered to produce all e-mails generated or received by the inventor relating to the patent at issue.<br />

� In re Amsted Indus., 2002 WL 31844956 (N.D.Ill. Dec. 17, 2002). In a suit by plaintiff employees<br />

against their employer for breach of fiduciary duty <strong>and</strong> other wrongs stemming from a hostile<br />

takeover with use of employee stock assets, the court considered the plaintiffs’ various discovery<br />

motions, including a motion compelling the defendants to retrieve e-mail <strong>and</strong> documents generated<br />

on or after January 1, 1997. In response to the plaintiffs’ discovery requests, the defendants limited<br />

its investigation to word searches of its backup tapes <strong>and</strong> only produced relevant documents<br />

generated after January 1, 1999. The production did not include e-mail. The plaintiffs argued that<br />

the defendants’ search of electronic documents was inadequate, <strong>and</strong> that the defendants should<br />

have actually searched the hard drive of each individual defendant <strong>and</strong> each person having access<br />

to relevant information. The court ordered the defendant to re-search their backup tapes under a<br />

broader subject matter <strong>and</strong> time period. The court also indicated they should search the in-box,<br />

saved, <strong>and</strong> sent folders of any relevant individual’s e-mail in the same manner. The court<br />

determined the additional searches were not so burdensome or expensive as to require a limiting<br />

of the requests.<br />

� Eolas Technologies Inc. v. Microsoft Corp., 2002 WL 31375531 (N.D.Ill. Oct. 18, 2002). In a<br />

patent infringement suit against Microsoft, the parties engaged in extensive motion practice, both<br />

on dispositive summary judgment issues <strong>and</strong> on various discovery issues. With regard to one<br />

discovery motion aimed at obtaining information which the defendant alleged was outside the<br />

scope of the issues in the case, the court restricted discovery to spreadsheet data regarding<br />

licenses, revenue <strong>and</strong> profitability of “accused server versions of Windows 2000 <strong>and</strong> Windows NT<br />

4.0 operating system software with Internet Explorer.” With regard to another discovery motion,<br />

addressing whether certain e-mail messages in a chain of messages must be produced, the court<br />

ordered the defendant to produce certain e-mails to <strong>and</strong> from one key individual so that the court<br />

could analyze the documents in camera <strong>and</strong> then make a determination as to whether the plaintiff<br />

is entitled to receive them in an unredacted form.<br />

� Williams v. Saint-Gobain Corp., 2002 WL 1477618 (W.D.N.Y. June 28, 2002). In an employment<br />

discrimination suit, the court refused to issue sanctions or attorney’s fees stemming from myriad<br />

discovery disputes. Despite an earlier assertion that no further responsive documents could be<br />

located, the defendant produced e-mails obtained from an executive’s computer five days before<br />

trial. The court found no evidence of any bad faith as to the withholding or destruction of the emails<br />

<strong>and</strong> issued the parties an extended time period to complete discovery. The court ordered<br />

each party to bear its own discovery costs.<br />

� Byers v. Illinois State Police, 2002 WL 1264004 (N.D. Ill. June 3, 2002). In an employment<br />

discrimination suit, the plaintiffs sought an order compelling the defendants to produce archived emails.<br />

The court stated, “Based on the cost of the proposed search <strong>and</strong> the plaintiffs’ failure to<br />

establish that the search will likely uncover relevant information, the court concludes that the<br />

plaintiffs are entitled to the archived e-mails only if they are willing to pay for part of the cost of<br />

production….Requiring the plaintiffs to pay part of the cost of producing the e-mails will provide<br />

them with an incentive to focus their requests.” The court granted the motion to the extent that the<br />

plaintiffs bear the cost of licensing the archived e-mail software while the defendants continue to<br />

bear the expense of review for responsive, privileged, <strong>and</strong> confidential documents.<br />

� Stallings-Daniel v. Northern Trust Co., 2002 WL 385566 (N.D. Ill. Mar. 12, 2002). In an<br />

employment discrimination action, the plaintiff moved for reconsideration of the court’s denial of<br />

188


electronic discovery of the defendant’s e-mail system. The court, in denying the plaintiff’s motion<br />

for reconsideration, determined that the plaintiff presented no new information that justified an<br />

intrusive electronic investigation.<br />

� RKI, Inc. v. Grimes, 177 F. Supp. 2d 859 (N.D. Ill. 2001). In a trade secret misappropriation action<br />

against the plaintiff’s former employee, the court found that the defendant defragmented his home<br />

computer in an effort to prevent the plaintiff from learning that he had deleted confidential<br />

information <strong>and</strong> software. The court ordered the defendant to pay $100,000 in compensatory<br />

damages, $150,000 in punitive damages, attorneys’ fees, <strong>and</strong> court costs.<br />

� McNally Tunneling v. City of Evanston, 2001 WL 1568879 (N.D. Ill. Dec. 10, 2001). In a dispute<br />

between a construction contractor <strong>and</strong> the City of Evanston, the court denied Evanston wide-scale<br />

access to both hard-copy <strong>and</strong> electronic versions of McNally’s computer files where Evanston’s<br />

need for both sets of documents was not fully briefed to the court. However, where McNally’s hardcopy<br />

productions were incomplete, the court ordered McNally to supplement the hard-copy<br />

versions with its computer files to ensure that it has produced all of the relevant information.<br />

� Danis v. USN Communications, 2000 WL 1694325 (N.D. Ill. Oct. 23, 2000). The court found that<br />

the defendant failed to properly preserve information on the computer database. The court allowed<br />

the trial judge to inform jury that some of the gaps in the case were caused by the defendant’s<br />

failure to turn over computer tapes <strong>and</strong> documents. The court fined the CEO of the defendant<br />

company $10,000 for failing to properly preserve such electronic information, but denied the<br />

plaintiff’s motion for default judgment.<br />

� Illinois Tool Works, Inc. v. Metro Mark Prod. Ltd., 43 F. Supp. 2d 951 (N.D. Ill. 1999). In an<br />

unfair competition case, the court ordered the defendant to produce for inspection its computer<br />

after the plaintiff showed that the defendant had been less than forthcoming in producing hard<br />

copies of requested documents. The court further issued sanctions, in the form reasonable<br />

attorney’s fees <strong>and</strong> costs, for the failure to comply with the discovery orders.<br />

� Chidichimo v. University of Chicago Press, 681 N.E.2d 107 (Ill. App. Ct. 1997). Some<br />

jurisdictions recognize a tort action for negligent spoliation of evidence.<br />

� In re Br<strong>and</strong> Name Prescription Drugs Antitrust Litig., 1995 WL 360526 (N.D. Ill. June 15,<br />

1995). The court found that expense of retrieving electronic data was mainly due to the defendant’s<br />

own record-keeping scheme. As such, the court required the defendant to produce its responsive,<br />

computer-stored e-mail at its own expense, subject to some limitations. The court also instructed<br />

the plaintiffs to narrow the scope of their request. The parties were encouraged by the court to<br />

confer regarding scope of requests for e-mails.<br />

� Murlas Living Trust v. Mobil Oil Corp., 1995 WL 124186 (N.D. Ill. Mar. 20, 1995). The court<br />

refused to require the defendant to undergo intrusive or burdensome discovery for its electronic<br />

files where the burden is not justified by the relevance of the evidence likely to be discovered.<br />

� Leeson v. State Farm Mut. Ins. Co., 546 N.E.2d 782 (Ill. App. Ct. 1989). Appellate Court held that<br />

the defendant’s claims were justified on grounds of oppressiveness, <strong>and</strong> therefore; the trial court<br />

abused its discretion in entering default sanctions for the defendant’s failure to comply with the<br />

discovery order. Such production would have been overly burdensome where compliance would<br />

have required the defendant to create a computer program to find the records <strong>and</strong> at least 15<br />

minutes for an analyst to look through each of the 2,100 claims.<br />

Indiana<br />

189


� Annex Books, Inc. v. City of Indianapolis, 2012 WL 892170 (S.D.Ind. Mar. 14, 2012). In this<br />

discovery dispute, the defendant sought to compel the plaintiffs’ bookkeeping data in a reasonably<br />

usable format. Although the plaintiffs hired two forensics experts, spent over $9,000 in services,<br />

<strong>and</strong> purchased QuickBooks Pro, they were unable to convert their data (ordinarily maintained on<br />

Platinum) into a format compatible with the defendant’s bookkeeping program (QuickBooks).<br />

Applying Fed.R.Civ.P. 34(a) <strong>and</strong> the corresponding advisory committee notes, the court recognized<br />

that while Rule 34(a) requires a responding party to take steps in order to translate information into<br />

a “reasonably usable form,” sometimes the form by which ESI is ordinarily maintained may not be<br />

reasonably usable by all parties—especially when dealing with legacy data like the case at h<strong>and</strong>. In<br />

determining whether to require production, the court reasoned the appropriate analysis required<br />

weighing the benefit of the evidence against the burden of translation pursuant to Fed.R.Civ.P.<br />

26(b)(2)(C). While the court found that the bookkeeping information was likely “relevant” <strong>and</strong><br />

“important,” it found the plaintiffs had made a good faith effort to translate the ESI <strong>and</strong> need not act<br />

further. Finding that the defendant had established good cause for the ESI at h<strong>and</strong>, the court<br />

further held that if the defendant wished to proceed attempting to import the data, they could do so<br />

on their own dime.<br />

� Promote Innovation LLC v. Roche Diagnostics Corp., 2011 WL 3490005 (S.D. Ind. Aug. 9,<br />

2011). In this qui tam action, the plaintiff objected to the defendant’s request for taxation of ediscovery<br />

costs pursuant to 28 U.S.C. § 1920, arguing the costs were not allowable <strong>and</strong>,<br />

alternatively, that they should be exempted as a qui tam relator. Dismissing the plaintiff’s first<br />

contention that the defendant did not inform them of search terms used, the court held the plaintiff<br />

did not provide evidence demonstrating the search terms were improper or unnecessary. Next, the<br />

court rejected the plaintiff’s allegation that the defendant’s ESI management techniques including<br />

data restriction, custodian filtration, de-duplication <strong>and</strong> repairing corrupted documents <strong>and</strong><br />

database errors, were implemented for the defendant’s own convenience <strong>and</strong> therefore fell outside<br />

the scope of taxable costs. Instead, the court determined that if the defendant had not used these<br />

efficient processes, the costs may have been significantly greater. Noting that precedent supported<br />

the taxation of e-discovery costs under § 1920 <strong>and</strong> provided no exception for qui tam relators, the<br />

court granted the Bill of Costs in the amount of $10,040.09.<br />

� Haraburda v. Arcelor Mittal USA, Inc., 2011 WL 2600756 (N.D. Ind. June 28, 2011). In this<br />

employment discrimination suit, the plaintiff requested the court order the defendant to preserve email<br />

evidence, claiming the defendant previously deleted e-mails from the plaintiff’s account<br />

without her permission <strong>and</strong> refused to issue a litigation hold prior to the Fed.R.Civ.P. 26(f) meet<br />

<strong>and</strong> confer. The defendant argued the plaintiff’s request was premature as Rule 26(d)(1) prohibits a<br />

party from seeking discovery before the Rule 26(f) conference. Disagreeing with the defendant’s<br />

argument, the court noted Rule 26(d)(1) prohibits requesting production – not compelling<br />

preservation – <strong>and</strong> stated that ruling to the contrary would leave a party with knowledge of an intent<br />

to destroy evidence without a remedy. Accordingly, the court found the plaintiff could suffer<br />

measurable prejudice based on the suit’s heavy reliance on e-mails if evidence was destroyed <strong>and</strong><br />

ordered the defendant to implement a litigation hold.<br />

� Sofaer Global Hedge Fund v. Brightpoint, Inc., 2010 WL 4701419 (S.D. Ind. Nov. 12, 2010). In<br />

this corporate litigation, the defendants sought to compel production to which the plaintiff objected<br />

claiming that producing documents from the French corporation’s possession would violate French<br />

law, that some of the sought-after documents do not exist <strong>and</strong> that it should not be required to<br />

search for documents in files other than those in possession of its principal. Addressing these<br />

arguments, the court found the documents belonging to the wholly-owned French subsidiary to be<br />

190


within the plaintiff’s control <strong>and</strong> cited the lack of arguments given regarding the potential violation of<br />

French law in ordering their production. Next, the court determined that the search of the principal’s<br />

files – by the principal himself – was not thorough based on “the paucity of documents” found <strong>and</strong><br />

ordered the plaintiff to search electronic <strong>and</strong> paper files of additional employees. Addressing the<br />

issue of sanctions, the court held that “the scant amount” of documents acquired through the<br />

plaintiff’s search process, the inability to locate highly relevant <strong>and</strong> responsive documents <strong>and</strong> the<br />

overall resistance to discovery, “should have alerted counsel that a more substantial effort must be<br />

made to search for <strong>and</strong> locate responsive documents,” <strong>and</strong> awarded partial attorney fees<br />

accordingly.<br />

� Meridian Fin. Advisors LTD v. Pence, 2010 WL 2772840 (S.D. Ind. July 12, 2010). In this<br />

business litigation, the defendants sought dismissal sanctions alleging one of the plaintiffs engaged<br />

in deceptive discovery practices, which included withholding 250,000 “secret e-mails” obtained<br />

from the defendants’ hard drives, <strong>and</strong> working with a co-defendant <strong>and</strong> a former employee of the<br />

defendants to gather privileged information. The plaintiff argued it did not disclose the e-mails’<br />

existence until formal requests were made to “lock the Defendants into sworn testimony” <strong>and</strong> that<br />

adequate disclosures were made via the indications it possessed “e-mails, documents <strong>and</strong><br />

corporate minutes.” Dismissing these arguments, the court determined the plaintiff’s actions<br />

violated Fed.R.Civ.P. 26. The court also held the plaintiff violated attorney-client privilege by failing<br />

to disclose to the defendants that it had seen potentially privileged e-mails <strong>and</strong> accessed personal<br />

communications. Finding dismissal an inappropriate sanction given the lack of prejudice suffered<br />

by the defendants, the court ordered the plaintiff to pay all attorneys’ fees <strong>and</strong> costs <strong>and</strong> precluded<br />

the plaintiff’s use of the ESI.<br />

� St. Paul Fire & Marine Ins. Co. v. Schilli Transp. Servs., Inc., 2010 WL 2629485 (N.D.Ind. June<br />

28, 2010). In this insurance litigation, the plaintiff requested production of physical <strong>and</strong> electronic<br />

evidence arguing the defendant - a corporation dissolved since 2003 - was required to "continue its<br />

corporate existence" to the extent necessary to resolve any pending litigation. The defendant<br />

claimed that a more limited discovery form was appropriate given its dissolved status <strong>and</strong> that the<br />

request was unduly burdensome as it would require "hundreds of hours." Finding the defendant<br />

"failed to demonstrate any substantially justifiable reason for withholding discovery," the court<br />

granted production <strong>and</strong> ordered the defendant to pay the fees <strong>and</strong> costs associated with the<br />

motion.<br />

� Cmty. Bank v. Progressive Cas. Ins. Co., 2010 WL 1435368 (S.D.Ind. Apr. 8, 2010). In this<br />

insurance litigation, the plaintiff requested a protective order to prevent the defendant’s use of<br />

privileged material <strong>and</strong> work product inadvertently disclosed by a non-party as evidence in a<br />

summary judgment motion. Although the plaintiff had previously returned privileged documents<br />

inadvertently sent to the defendant on numerous occasions, the court found the defendant’s<br />

assurances that it would afford the plaintiff the same courtesy were “too amorphous to be binding.”<br />

The use of the word “courtesy” instead of “agreement” in the parties’ communications<br />

demonstrated that the expected reciprocal conduct was moral in nature, not a legal right, <strong>and</strong> the<br />

communications did not reference applicability to non-parties. Citing Fed.R.Evid. 502(b), the court<br />

also found the plaintiff took no reasonable precautions to prevent the disclosure since no<br />

supervision of the non-party’s production occurred. However, the court determined the defendant<br />

violated Fed.R.Civ.P. 26(b)(5) by using the privileged exhibits in its summary judgment motion prior<br />

to resolution of the dispute. Based on this behavior, the court ordered the defendant to pay onehalf<br />

of the plaintiff’s fees <strong>and</strong> costs associated with the motion <strong>and</strong> prohibited use of the exhibits as<br />

substantive evidence.<br />

191


� Lawson v. Sun Microsystems, Inc., 2010 WL 503054 (S.D.Ind. Feb. 8, 2010). In this discovery<br />

dispute, the plaintiff’s former counsel (two attorneys from a law firm) objected to the magistrate<br />

judge’s recommendation that they be sanctioned $13,625 for failure to read e-mails from the<br />

plaintiff that divulged discovery misconduct, claiming no bad faith or willful misconduct occurred.<br />

During review, the plaintiff accessed password-protected files produced by the defendant <strong>and</strong> sent<br />

e-mails to counsel referencing these actions. Recognizing the attorneys’ failure to read or react to<br />

the plaintiff’s e-mails <strong>and</strong> adequately supervise the plaintiff’s behavior during the discovery phase<br />

amounted to carelessness, the court nonetheless concluded “careless conduct does not equate to<br />

‘wanton’ conduct” <strong>and</strong> found the recommendation for sanctions against the plaintiff’s counsel<br />

unsupported. The court further concluded the defendant was not harmed as a result of the<br />

plaintiff’s actions, since the password-protected documents contained information that could have<br />

been obtained through other discovery means.<br />

� 1100 West, LLC v. Red Spot Paint & Varnish Co., Inc., No. 1:05-CV-1670 (S.D. Ind. June 5,<br />

2009). In this environmental litigation, the plaintiff requested default judgment sanctions alleging<br />

that the defendant purposefully withheld responsive documents <strong>and</strong> that the witnesses lied or<br />

misrepresented material truths. The defendant argued that it relied on its attorneys for discovery<br />

advice <strong>and</strong> therefore any error was the attorneys’ responsibility. The defendant’s attorneys claimed<br />

the defendant failed to provide accurate <strong>and</strong> complete information, <strong>and</strong> that once potential attorney<br />

misconduct was discovered, the firm took prompt steps to remove the offending attorneys.<br />

Determining the case was “replete with examples of violations of discovery rules” that contributed<br />

to the lengthy litigation, the court noted that the defendant “made a mockery of the discovery<br />

process <strong>and</strong> [has] subjected the truth to ridicule.” In addition, the court stated that the defendant<br />

could “not hide behind [its] own failure to organize its records then rely upon its lawyer to straighten<br />

up its mess.” The court also found the defendant’s attorneys had enough “knowledge of its client’s<br />

apparent disregard” for the Federal Rules of Civil Procedure <strong>and</strong> thus must be held accountable.<br />

Accordingly, the court granted the plaintiff’s motion for default judgment sanctions <strong>and</strong> ordered the<br />

defendant <strong>and</strong> its attorneys each pay one-half of the plaintiff’s reasonable attorneys’ fees <strong>and</strong><br />

costs.<br />

� Alcon Mfg., Ltd. v. Apotex Inc., 2008 WL 5070465 (S.D.Ind. Nov. 26, 2008). In this patent<br />

infringement lawsuit, the plaintiffs argued the defendants should delete or return an inadvertently<br />

produced electronic document containing privileged information <strong>and</strong> that the document should be<br />

stricken from the expert report pursuant to a stipulated protective order. The defendants argued<br />

that the plaintiffs waived privilege when they failed to object to the document’s introduction during<br />

two previous depositions. Finding the plaintiffs had complied with the protective order by asserting<br />

privilege within days of discovering the inadvertent production, the court ordered the defendants to<br />

delete or return the privileged document <strong>and</strong> to redact any references to it.<br />

� Containment Technologies Group v. Am. Soc’y of Health Sys. Pharmacists, 2008 WL<br />

4545310 (S.D.Ind. Oct. 10, 2008). In this defamation case, the defendants moved to compel<br />

production of documents containing trade secrets, <strong>and</strong> the plaintiff moved for a protective order.<br />

The parties began negotiating a proposed protective order, but could not agree to specific terms.<br />

The defendants argued that a protective order was unnecessary <strong>and</strong> that the “confidential”<br />

designation should only apply to those portions or pages that are confidential, while the plaintiff<br />

wanted to designate the entire document as confidential. Requiring higher scrutiny for a<br />

confidential designation for documents filed under seal as opposed to those produced during<br />

discovery, the court allowed the plaintiff to designate entire documents as confidential if done so in<br />

good faith.<br />

192


� Perfect Barrier LLC v. Woodsmart Solutions Inc., 2008 WL 2230192 (N.D. Ind. May 27, 2008).<br />

In this litigation alleging breach of contract, the plaintiff filed a motion to compel protective order<br />

compliance <strong>and</strong> for sanctions, claiming the defendant’s production abused the protective order.<br />

The defendant produced 75,000 pages worth of e-mail based on search terms supplied by the<br />

plaintiff <strong>and</strong> designated every document for attorney eyes only. Finding the defendants sufficiently<br />

complied with the protective order, the court determined if the plaintiff wanted a more selective<br />

designation of the documents it should have drafted the protective order more clearly. Additionally,<br />

the court determined the plaintiff had “no entity to blame except itself” for providing an expansive<br />

search request that returned a voluminous amount of documents. However, the court left open a<br />

challenge by the plaintiffs to the appropriateness of the “attorney eyes only” designation after the<br />

documents have been examined. Finally, the court rejected the plaintiff’s request for production in<br />

hard copy form, finding the defendant’s production of e-mails on a disc adequate under<br />

Fed.R.Civ.P. 34. The court also warned both parties that a special master may be used, funded by<br />

the wrongful party, if this type of dispute continues.<br />

� Guy Chem. Co. v. Romaco AG, 2007 WL 1521468 (N.D.Ind. May 22, 2007). In a suit alleging<br />

breach of contract, the defendant motioned the court for a third party subpoena, seeking<br />

information establishing the extent of the plaintiff’s damages. Upon receipt of the subpoena, the<br />

third party estimated the cost of production at approximately $7,000 since all documents were<br />

stored electronically. The third party did not object to producing the material, but requested that the<br />

defendant pay the production costs. The defendant argued the third party was unreasonable by<br />

requiring payment before they would produce. The court held that while the defendant established<br />

good cause for the materials, they had to pay the costs of production. The court reasoned, “[N]ot<br />

only is it fundamentally unfair for non-parties to bear the significant litigations costs of others, but<br />

also if this Court were to allow litigating parties like [the defendant] to impose such a burden on<br />

non-parties, then the likelihood of cooperation by non-parties in the future would be placed in<br />

jeopardy.” The court determined a third party may have to bear its own costs of production when<br />

they are de minimis, but the burden of proof is placed on the requesting party to show that the<br />

costs are de minimis.<br />

� Bitler Investment Venture II, LLC v. Marathon Ashl<strong>and</strong> Petro., LLC, 2007 WL 465444 (N.D.<br />

Ind. Feb. 7, 2007). In a case regarding breach of contract claims, inter alia, the defendant filed a<br />

motion to compel the production of e-mails sent to the plaintiff’s damages assessment expert prior<br />

to the issuance of an expert report. The e-mails in question were communications between the<br />

plaintiff’s attorney <strong>and</strong> the plaintiff. The plaintiff’s attorney forwarded these e-mails to the expert<br />

prior to his final report. The plaintiff argued the e-mails were protected by the attorney-client <strong>and</strong><br />

work-product privileges. The plaintiff also argued the e-mails “had nothing to do” with the expert’s<br />

opinion. The defendant argued it had a right to discover any information used by the expert which<br />

he based his opinion on for trial. The court, in granting the defendant’s motion, noted that although<br />

the attorney-client privilege may apply in this situation, the e-mails were disclosed to a third-party,<br />

destroying any privileges. The work-product privilege also did not apply because the e-mails were<br />

intentionally forwarded from the plaintiff’s attorney to the expert. Furthermore, the court conducted<br />

an in camera review of the e-mails <strong>and</strong> determined that they were relevant <strong>and</strong> must be produced.<br />

� Ball v. Versar, Inc., 2005 WL 4881102 (S.D. Ind. Sept. 23, 2005). In a contract dispute involving a<br />

trust fund, the defendant filed several motions to compel the e-mail of the two plaintiff trustees. One<br />

trustee preserved all relevant e-mail, but one trustee deleted some e-mail after litigation<br />

commenced. The trustee’s e-mail relevant to the litigation was stored on his personal home<br />

computer <strong>and</strong> his work-issued computer. The defendant argues that the trustee’s home <strong>and</strong> work-<br />

193


owned computers should be produced <strong>and</strong> the plaintiff sanctioned for the deliberate spoliation of email<br />

evidence. The plaintiff argues the trustee did not destroy the e-mail in bad faith because he<br />

did not know he was supposed to preserve the e-mail. The court ruled the trustee’s deletion of the<br />

e-mail was not justifiable <strong>and</strong> permitted the defendant to examine all computers used in the<br />

trustee’s home for an eight-year period <strong>and</strong> of all work-owned computers used by him during the<br />

same time. Although the court declined to issue any severe sanctions, it did awards costs to the<br />

defendant.<br />

� Tracy v. Financial Ins. Mgmt Corp., 2005 WL 2100261 (S.D.Ind. Aug. 22, 2005). In an action<br />

alleging violations of the Americans with Disabilities Act <strong>and</strong> Employee Retirement Income Security<br />

Act, the plaintiff sought sanctions pursuant to Fed. R. Civ. P. 37 for the defendant’s late e-mail<br />

production. Citing Zubulake, the plaintiff argued the defendant “hindered <strong>and</strong> prejudiced the<br />

discovery process when it produced requested e-mails in the eleventh hour of discovery <strong>and</strong> after<br />

intrastate deposition of key witnesses had commenced.” In response, the defendant claimed any<br />

late e-mail production was inadvertent, an unforeseen result of two physical upgrades to its<br />

computer systems, <strong>and</strong> did not prejudice the plaintiff’s case. The defendant further argued<br />

Zubulake did not apply as no evidence showed the defendant failed to preserve or retain relevant<br />

evidence. Although the court agreed Zubulake did not apply, it determined the defendant did not<br />

have a substantial justification for the late production. The court awarded sanctions in part stating,<br />

“Presumably, the [d]efendant was aware of the physical upgrades to its own computer system <strong>and</strong><br />

was in a position to know, or should have known, that responsive electronic data may have been<br />

stored elsewhere than in the new system.” The court also permitted the plaintiff to re-depose the<br />

defendant’s key witnesses concerning the production of certain documents <strong>and</strong> ordered the<br />

defendant to bear such costs.<br />

� Bryant v. Aventis Pharmaceuticals, Inc., 2002 WL 31427434 (S.D. Ind. Oct. 21, 2002). The<br />

Indiana court mentioned without further comment that e-mails were recovered from the plaintiff’s<br />

computer after her termination, confirming the general discoverability of e-mail evidence. The court<br />

considered the content of these e-mails in granting summary judgment in favor of the defendant.<br />

� Long v. Anderson Univ., 204 F.R.D. 129 (S.D.Ind. Oct. 30, 2001). The court found that the<br />

attorney-client privilege applied to electronic mail sent from a Univ. human resources director to the<br />

dean of students regarding a conversation with counsel <strong>and</strong> his legal advice in a Civil Rights action<br />

against the Univ..<br />

� Simon Property Group v. mySimon, Inc., 194 F.R.D. 639 (S.D. Ind. 2000). On the plaintiff’s<br />

motion to compel in a trademark case, the court held that the plaintiff was entitled to attempt to<br />

recover deleted computer files from computers used by the defendant’s employees. The court<br />

required that protective measures be taken, including the plaintiff’s appointment of an expert who<br />

would serve as an officer of the court <strong>and</strong> turn over the recovered information to the defendant’s<br />

counsel for appropriate review.<br />

Wisconsin<br />

� Thermal Design, Inc. v. Guardian Bldg. Prod., Inc., 2011 WL 1527025 (E.D. Wis. Apr. 20, 2011).<br />

In this discovery dispute, the plaintiff sought discovery of all archived e-mail accounts <strong>and</strong> shared<br />

network drives without restriction as to custodian or individual. Having already produced over 1.46<br />

million pages of ESI (91 gigabytes) at a cost of $600,000, the defendants argued the additional<br />

discovery – estimated to cost $2.5 million for filtering, search <strong>and</strong> review – was not reasonably<br />

accessible. Finding the plaintiff made virtually no effort to justify the additional discovery beyond<br />

194


citing the defendants’ considerable resources, the court refused to tolerate "fishing expeditions"<br />

simply because the party could afford to comply <strong>and</strong> denied the plaintiff’s motion.<br />

� Wisconsin v. Huggett, No. 2009AP1684-CR (Wis.Ct.App. Apr. 6, 2010). In this criminal case, the<br />

State of Wisconsin appealed an order dismissing, with prejudice, an intentional homicide charge<br />

against the defendant. On the night of the homicide, sheriff’s deputies seized two cell phones,<br />

which contained threatening voicemails from the victim directed at the defendant <strong>and</strong> his girlfriend.<br />

Upon defense counsel’s formal request to preserve all messages, the State admitted it had not<br />

preserved the voicemails. Finding it reasonable the defendant would expect the State to preserve<br />

the voicemail recordings, the court determined this expectation made the State “responsible for<br />

ensuring that it occurred.” The failure to preserve the voicemail evidence violated the defendant’s<br />

due process rights. Recognizing that it would be fundamentally unfair to induce reliance <strong>and</strong> then<br />

place preservation responsibility on the defendant, the court affirmed the case dismissal since the<br />

voicemails would be central to a jury’s application of self-defense <strong>and</strong> the defense of others<br />

st<strong>and</strong>ard.<br />

� Mirbeau of Geneva Lake LLC v. City of Lake Geneva, 2009 WL 3347101 (E.D. Wis. Oct. 15,<br />

2009). In this discovery dispute, the plaintiff requested production of the defendants’ "computers<br />

<strong>and</strong> other electronic storage devices" for computer forensics analysis. The defendants argued that<br />

the plaintiff failed to demonstrate the need for a sequestering of all of the defendants’ electronic<br />

devices. Denying the plaintiff’s motion, the court found the plaintiff failed to justify the need for the<br />

forensic mapping of the defendants’ entire computer system. However, the court acknowledged the<br />

need for the defendants to develop an organized system for the preservation <strong>and</strong> production of<br />

relevant ESI. The defendants’ "click through" process to search e-mails "did not meet the level of<br />

diligence required for a fair discovery process." The court noted that the primary motivation for its<br />

decision was the failure of both parties to advance alternatives for discovery methods <strong>and</strong> stated<br />

that it expected the parties to develop a meaningful ESI discovery plan.<br />

� Kay Beer Distrib., Inc. v. Energy Br<strong>and</strong>s, Inc., 2009 WL 1649592 (E.D. Wis. June 10, 2009). In<br />

this dispute involving an alleged breach of an oral agreement, the plaintiff sought access to five<br />

DVDs containing the defendant’s e-mails <strong>and</strong> other ESI that pertained to three specified search<br />

terms from the five-year period in which the parties did business <strong>and</strong> beyond. The defendant<br />

argued that the DVDs contained privileged material <strong>and</strong> that the costs were unduly burdensome<br />

given the narrow issues remaining. The plaintiff countered that the cost of attorney review for<br />

privileged material could be diminished through a “claw back” policy <strong>and</strong> the use of targeted<br />

keyword searches. Denying the plaintiff’s request, the court determined production would be<br />

unduly burdensome as it would contain approximately 650,000 to 975,000 pages of material<br />

responsive to the plaintiff’s search terms. However, the court ordered the defendant to conduct a<br />

search of the DVDs using terms reasonably likely to locate relevant information in response to the<br />

plaintiff’s previous production request. Finally, the court denied the plaintiff’s request for native<br />

format production upholding the agreement reached at the Fed.R.Civ.P. 26(f) conference that<br />

allowed the defendant to choose the format depending on cost-effectiveness, because metadata<br />

was not material to the dispute.<br />

� Henderson v. U.S. Bank, 2009 WL 1152019 (E.D.Wis. Apr. 29, 2009). In this confidential<br />

information misappropriation suit, the defendant sought production of electronic devices from the<br />

counter-defendant. The counter-defendant objected to providing direct access to their electronic<br />

devices <strong>and</strong> argued the defendant’s request was the equivalent of requesting all of their filing<br />

cabinets. Finding the defendant’s request for direct access premature as the counter-defendant<br />

had not had the opportunity to search their electronic devices, the court denied the motion to<br />

195


compel; however, the court ordered the counter-defendant to perform a search <strong>and</strong> disclose all<br />

responsive documents.<br />

� Metavante Corp. v. Emigrant Savings Bank, 2008 WL 4722336 (E.D.Wis. Oct. 24, 2008). In this<br />

contract litigation, inter alia, the defendant filed a motion to compel the discovery of the plaintiff’s<br />

source code, claiming such information was essential to the defendant’s counterclaim. The<br />

defendant argued the source code was the only evidence that may have revealed the quality of the<br />

product the plaintiff produced under the contract. The plaintiff argued against production of the<br />

source code, claiming undue burden in that it would cost $300,000 <strong>and</strong> take 5,000 hours. Due to<br />

the defendant’s willingness to employ outside consultants to review the code for relevant<br />

information, thereby reducing cost, the court ordered its production finding the potential value of the<br />

source code outweighed the burden.<br />

� Maxpower Corp. v. Abraham, 2008 WL 1925138 (W.D.Wis. April 29, 2008). In this litigation<br />

against former employees, the plaintiffs sought a preliminary injunction requiring the defendants to<br />

return information allegedly deleted from the plaintiffs’ servers, in addition to spoliation sanctions.<br />

The plaintiffs’ computer forensics expert examined the defendants’ laptops, finding evidence of<br />

hard drive wiping software <strong>and</strong> of “text strings” referring to information about outdated products.<br />

The defendants argued the deletions of information from their laptops were done for maintenance<br />

purposes <strong>and</strong> complied with company policy. Finding the plaintiffs’ computer forensic evidence<br />

insufficient <strong>and</strong> ambiguous, the court denied the motion for preliminary injunctive relief.<br />

Additionally, the court denied the plaintiffs’ motion for sanctions finding insufficient evidence to<br />

support the argument that wiping the hard drive constituted deliberate spoliation.<br />

� State ex rel. Gehl v. Connors, 2007 WL 3024436 (Wis.Ct.App. Oct. 18, 2007). In this dispute over<br />

the production of public records, the petitioner appealed the circuit court’s decision to deny his<br />

petition seeking e-mail communications under the public records law. The petitioner claimed county<br />

government officials improperly denied his request per the public records law <strong>and</strong> wrongfully failed<br />

to retain responsive e-mails. The petitioner additionally requested the search of approximately 150<br />

backup tapes <strong>and</strong> more than thirty employees’ computer hard drives for over 20 keywords.<br />

Affirming the circuit court’s decision, the court found the petitioner’s request to be overbroad <strong>and</strong><br />

overly burdensome, finding that the right to inspect public records is not absolute. The court noted<br />

that the request virtually sought every e-mail passed between all employees of the county named<br />

in the request over a two-year period. In addition, the court stated that the search terms chosen by<br />

the petitioner were broad on their face as to require the production of records relating to virtually all<br />

county zoning matters over a two-year period.<br />

� Haka v. Lincoln County, 2007 U.S. Dist. LEXIS 64480 (W.D.Wis. Aug. 29, 2007). In this wrongful<br />

termination suit, the defendants motioned the court for a protective order to limit their discovery<br />

obligations. The plaintiff sought all documents, notes, memos, emails <strong>and</strong> metadata from all<br />

officials, board members <strong>and</strong> officers regarding the reorganization of the Lincoln County Child<br />

Support Agency. Documents responsive to this request, which existed on two external hard drives<br />

containing about four terabytes of data extracted from computer servers, accounted for<br />

approximately 500 billion typewritten pages. The parties’ attempts to limit the production based on<br />

keyword searching were unsuccessful as they could not agree on which words to use. The court<br />

considered the Zubulake factors as well as the Advisory Committee Notes to Rule 26(b)(2) <strong>and</strong><br />

found that although the issues were important, the potential damages were low <strong>and</strong> the cost of<br />

production was disproportionate. The court granted the defendants’ motion in part by ordering the<br />

plaintiff to determine the keywords to be used <strong>and</strong> the parties to split the cost of the search 50/50.<br />

The defendants were required to pay for the cost of the privilege <strong>and</strong> relevance review.<br />

196


� Kasten v. Doral Dental USA, LLC, 2007 WL 1791226 (Wis. June 22, 2007). In a suit by a nonmanaging<br />

member of a limited liability company seeking to review company records, the district<br />

court held email was neither a record nor a company document. The district court determined that<br />

email was just a communication like a telephone call, not a document or record. The plaintiff<br />

appealed this distinction, <strong>and</strong> the Wisconsin Supreme Court reversed.<br />

� WIREdata, Inc. v. Village of Sussex, 2007 WL 10110 (Wis. Ct. App. Jan. 3, 2007). In a dispute<br />

over a request for public property records under state law, the plaintiff filed a motion compelling the<br />

defendant to produce native files from a public record. The defendant produced a PDF version of<br />

the requested public record according to a decision from the lower court, but the plaintiff required<br />

native data from the document not found on a PDF <strong>and</strong> filed this motion. The plaintiff argued that<br />

the native format of the public record database was owned by the public, <strong>and</strong> the defendant could<br />

not deny access to it. The defendant argued that it would be unduly burdensome <strong>and</strong> costly to<br />

produce the document. It also argued the information sought by the plaintiff was information<br />

physically entered into the computer system by the defendant’s employees <strong>and</strong> not subject to<br />

public disclosure. The court held in favor of the plaintiff since the defendant, as a public entity, did<br />

not create the document in PDF form <strong>and</strong> should produce it as viewed by the defendant. Therefore,<br />

the court held that the plaintiff had a right to “access to this database for purposes of examination<br />

<strong>and</strong> copying of the source data” <strong>and</strong> thereby ordered the defendant to grant the plaintiff access to<br />

its original information.<br />

� Liturgical Pubs., Inc. v. Karides, 715 N.W.2d 240 (Wis. App. 2006). In an appeal from a<br />

judgment dismissing unfair competition <strong>and</strong> computer theft claims, the appellant claimed the trial<br />

court erred in granting summary judgment in favor of the respondents. In granting summary<br />

judgment, the trial court found the appellant had failed to present any evidence establishing that<br />

the respondents, former employees of the appellant, had stolen computer data. During discovery,<br />

the trial court ordered mirror images of the respondents’ computers, limiting inspection of the<br />

images to a hash value search. The trial court also appointed a referee to assist in the process.<br />

When no hash value matches were found, the appellant requested a second inspection to search<br />

for specified words, evidence of reformatting, wiping or deleting files, <strong>and</strong> other computer activity.<br />

As the first inspection had yielded nothing, the trial court ruled further discovery would be<br />

unreasonable. In affirming the trial court’s decision, the appellate court concluded the trial court<br />

“acted within the scope of its discretion in denying [the appellant’s] additional request, which<br />

essentially amounted to a fishing expedition.”<br />

� Hagemeyer North American, Inc. v. Gateway Data Sciences Corp., 222 F.R.D. 594 (E.D.Wis.<br />

2004). In a discovery dispute involving two corporations, the plaintiff moved to compel the<br />

defendant to conduct <strong>and</strong> bear the costs of electronically searching backup tapes already produced<br />

by the defendant. The plaintiff also sought to compel production of e-mail contained on additional<br />

backup tapes not produced to the plaintiff. In response, the defendant argued it would be costly<br />

<strong>and</strong> time-consuming to produce the additional backup tape e-mail <strong>and</strong> to search the alreadyproduced<br />

backup tapes. The court determined that the plaintiff failed to establish additional<br />

relevant backup tape data existed <strong>and</strong>, as a result, denied the plaintiff’s motion to compel<br />

additional documents. In assessing whether cost-shifting for the backup tapes already produced<br />

was warranted, the court adopted the Zubulake seven-factor cost-shifting analysis. The court<br />

approved the sampling approach conducted in Zubulake <strong>and</strong> ordered the defendant to recover<br />

responsive data from any five backup tapes of the plaintiff’s choosing. The court would then assess<br />

whether the cost of recovering e-mails from the remaining backup tapes would be proportionate to<br />

the likely benefit.<br />

197


� In re John Doe Proceeding, 680 N.W.2d 792 (Wis. 2004). In a suit involving the criminal<br />

investigation of state legislators <strong>and</strong> caucuses, the trial court issued a subpoena ordering the<br />

Legislative Technology Service Bureau (LTSB) to produce backup tapes for 54 government<br />

servers or, as an alternative, to produce extracted documents for certain individuals. The trial court<br />

defined documents to include electronic files, e-mails, recycle bins, temporary Internet files, <strong>and</strong><br />

image files. On appeal, the LTSB objected to the subpoena asserting, among other things, that the<br />

trial judge abused his discretion by issuing an overly broad <strong>and</strong> unreasonable order. The<br />

Wisconsin Supreme Court determined that the subpoena was overbroad because it compelled<br />

production of computer data from an entire branch of government rather than requesting specific<br />

topics, document types, or time periods. In quashing the subpoena, the court stated that “[b]ecause<br />

the records sought are computer records, a key word search would not have been too difficult to<br />

incorporate in the subpoena.” See also In re John Doe Proceeding, 689 N.W.2d 908 (Wis. 2004)<br />

(Denying motion for reconsideration).<br />

� Northern Crossarm Co. v. Chemical Specialties, Inc., 2004 WL 635606 (W.D.Wis. Mar. 3,<br />

2004). The plaintiff sought to compel production of 65,000 pages of e-mail in electronic form,<br />

claiming that Rule 34(a) of the Federal Rules of Civil Procedure requires that the defendant put<br />

electronic information into a reasonably usable electronic format. The defendant, who had already<br />

produced the documents in paper form, objected to the request, claiming that compliance with<br />

plaintiff’s request would be “unfairly time consuming <strong>and</strong> expensive.” Holding that the plaintiff had<br />

misinterpreted Rule 34, the court refused to grant the plaintiff relief. The court stated that “neither<br />

the letter nor the spirit of Rule 34 m<strong>and</strong>ates that a party is entitled to production in its preferred<br />

format.” Instead, producing electronic information in a format that “mimics” the electronic format is<br />

sufficient. The court also added that when a party “specifically requests the production of electronic<br />

information in a specific electronic format, then the respondent cannot simply ignore the request: it<br />

must comply, compromise, or seek court protection.” Because the plaintiff did not explicitly request<br />

production in an electronic form at the time the request was made, the court did not require the<br />

defendant to re-produce the e-mail in an electronic form.<br />

� Milwaukee Police Assoc. v. Jones, 615 N.W.2d 190 (Wis. Ct. App. 2000). In considering the<br />

provisions of the state’s open records laws, the court concluded that the city’s production of an<br />

analog tape was insufficient when a digital version existed. The court stated, “A potent open<br />

records law must remain open to technological advances so that its statutory terms remain true to<br />

the law’s intent.”<br />

Eighth Circuit – State <strong>and</strong> Federal <strong>Case</strong>s<br />

� Greyhound Lines, Inc. v. Wade, 2007 WL 1189451 (8th Cir. Apr. 24, 2007). In a suit arising from<br />

a vehicle collision, the defendants appealed the district court’s decision not to issue spoliation<br />

sanctions against the plaintiff. The electronic evidence at issue was contained in an electronic<br />

recording device connected to the plaintiff’s vehicle which stored information about the vehicle at<br />

the time of collision. After the collision, the plaintiff sent the device to the engine manufacturer who<br />

erased the electronic data contained on the device. The defendants argued that the duty to<br />

preserve the electronic data existed because litigation was likely to occur. The defendants also<br />

argued that discovery sanctions should have been issued since the plaintiff not only destroyed the<br />

data but notified the defendants of the data’s existence only three months before trial in its<br />

interrogatory answers. The appellate court upheld the district court’s refusal to issue spoliation<br />

sanctions, stating that the ultimate focus in imposing sanctions for spoliation is the intentional<br />

198


destruction of evidence indicating a desire to suppress the truth, not the prospect of litigation. The<br />

court found that there was no proof that the plaintiff aimed to suppress the discoverable evidence.<br />

As to the discovery violations, the court found that the district court’s refusal was also proper since<br />

the plaintiff’s discovery answers were responsive <strong>and</strong> the defendants were not prejudiced by the<br />

untimely disclosure of the data’s existence.<br />

� United States v. Ray, 428 F.3d 1172 (8th Cir. 2005). The defendant appealed an extortion<br />

conviction relating to an attempt to extort $2.5 million from a company by sending e-mails<br />

threatening to exploit a breach in the company’s computer security. Arguing insufficiency of the<br />

evidence, the defendant contended the government had not established who actually sent the emails.<br />

During the government’s investigation, a computer forensic expert had examined the<br />

defendant’s hard drive <strong>and</strong> found three threatening e-mails <strong>and</strong> other incriminating evidence. The<br />

expert testified the e-mails <strong>and</strong> documents were created by someone typing on the computer. The<br />

expert also stated that someone had logged onto the Internet from the computer using the screen<br />

name <strong>and</strong> password used to send the e-mails. Further, the expert found no evidence of remote<br />

access or hacking into the computer. Based on this evidence, as well as the defendant’s admission<br />

he logged onto his computer <strong>and</strong> the Internet several times a day, the appellate court upheld the<br />

conviction.<br />

� United States v. Bach, 310 F.3d 1063 (8th Cir. 2002). In a criminal prosecution for possession of<br />

child pornography, Yahoo! technicians retrieved, pursuant to a search warrant, all information from<br />

the defendant’s e-mail account. The lower court ruled that the seizure of the e-mails by Yahoo! was<br />

unlawful because police were not present when the defendant’s e-mail account was searched.<br />

Reversing the lower court’s opinion, the appellate court held that Yahoo!’s search of the<br />

defendant’s e-mails without a police officer present was reasonable under the Fourth Amendment<br />

<strong>and</strong> did not violate the defendant’s privacy rights.<br />

Arkansas<br />

� Helmert v. Butterball, LLC, 2010 WL 2179180 (E.D.Ark. May 27, 2010). In this employment<br />

litigation, the plaintiffs alleged the defendant’s production response was inadequate based on its<br />

failure to conduct a meaningful search of electronic information. The defendant argued the<br />

plaintiffs’ request was overbroad, addressed information that was not reasonably accessible <strong>and</strong><br />

would require privilege determinations. Addressing one of the four search term categories, the<br />

court determined it was narrowly tailored except for the terms that would require an electronic<br />

search of e-mails for “one term within the same sentence as another term,” since the plaintiff<br />

offered no evidence that the search could be performed electronically. The court found the second<br />

category of terms to be duplicative <strong>and</strong> unnecessary, but held the third <strong>and</strong> fourth term categories<br />

were appropriately constructed. Next, the court narrowed the custodian list to include only the<br />

employees who were likely to possess relevant information <strong>and</strong> denied the proposed search of<br />

backup tapes, finding the information not reasonably accessible. The court also ordered a search<br />

of hard drives, laptops <strong>and</strong> personal e-mail accounts of two custodians for the identified search<br />

terms. Finally, the court denied the defendant’s request for cost-shifting as it had not ordered the<br />

restoration <strong>and</strong> search of backup tapes.<br />

� B & B Hardware, Inc. v. Fastenal Co., 2011 WL 2115546 (E.D. Ark. May 25, 2011). In this<br />

discovery dispute, the plaintiff sought to compel production <strong>and</strong> requested a hearing to determine<br />

what the defendant had done to meet its obligation to produce responsive ESI, forensically image<br />

hard drives <strong>and</strong> conduct a search of 1,182 backup tapes (estimated to cost $84,854,704.90).<br />

199


Characterizing the plaintiff’s motion as peremptory, the court determined the plaintiff failed to abide<br />

by Local Rule 7.2(g) of the U.S. District Court for the Eastern District of Arkansas which requires<br />

attorneys to confer in good faith before filing a motion to compel. Further, the court noted the<br />

defendant produced approximately 31,000 documents within the response period, thus fulfilling its<br />

production obligations. Admonishing the plaintiff’s actions, the court declined to compel discovery<br />

or grant a hearing. Regarding the issues of forensic imaging <strong>and</strong> backup tapes, the court found the<br />

defendant sufficiently raised objections on the grounds of undue burden <strong>and</strong> scope, denied the<br />

motion <strong>and</strong> warned the parties to “act less like armed combatants <strong>and</strong> more like highly skilled<br />

professionals” going forward.<br />

� Cooney v. Beverly Enter., Inc. No. CV 2003-1049-3 (Ark. Cir. Ct. June 15, 2005). In a class<br />

action lawsuit, the plaintiffs filed a motion for contempt <strong>and</strong> for sanctions due to the defendants’<br />

discovery practices. The court declared the defendants in contempt of an earlier discovery order<br />

<strong>and</strong> ordered the defendants to pay $25,000 in plaintiffs’ attorney fees. Additionally, the court<br />

ordered the defendants to comply with the previous discovery order, which included producing<br />

electronic data <strong>and</strong> e-mails. The court also declared that the plaintiffs could have “some access” to<br />

the defendants’ computer in order to ensure compliance with the discovery orders. Moreover, the<br />

court noted that it “has not ruled out the possibility of other sanctions…[<strong>and</strong>] will be watching<br />

closely the Defendants’ efforts to comply with discovery.”<br />

� Concord Boat v. Brunswick Corp., 1996 WL 33347247 (E.D.Ark. Dec. 23, 1996). The plaintiffs<br />

contend that the defendant’s search for <strong>and</strong> production of relevant information was insufficient<br />

because it failed to review all computer documents <strong>and</strong> e-mail. The plaintiffs filed motions to<br />

compel discovery of electronic information <strong>and</strong> to prevent further destruction of documents. The<br />

defendant asserted that the search was reasonable <strong>and</strong> submitted that the plaintiffs’ dem<strong>and</strong>s<br />

were overly broad <strong>and</strong> unduly burdensome. The court ordered the parties to have a meeting with<br />

counsel <strong>and</strong> computer experts for both sides, conducting a good faith discussion to see whether<br />

agreement can be reached on a procedure to further search the defendant’s e-mail, the choice of<br />

an expert, the procedure for specifying the expert’s responsibilities, <strong>and</strong> allocation of the costs. The<br />

court also ordered the defendant to produce a detailed description of the defendant’s electronically<br />

stored information.<br />

� Cedar Rapids Lodge & Suites, LLC v. JFS Dev., Inc., 2011 WL 4499259 (N.D. Iowa Sept. 27,<br />

2011). In this discovery dispute, the plaintiffs sought a default judgment alleging the defendants<br />

willfully destroyed ESI. Previously, the defendants produced “seven computers/laptops, ten<br />

internal/external hard drives, <strong>and</strong> twenty-three compact discs” to the plaintiffs’ expert for inspection<br />

<strong>and</strong> copying. Following the forensic examination, the plaintiffs’ expert identified that four external<br />

media devices <strong>and</strong> three drives were not produced for imaging, <strong>and</strong> noted that numerous<br />

documents, orphan files <strong>and</strong> e-mails had been deleted or were missing. Citing the defendants’<br />

status as a “small company” who is “unsophisticated in the requirements of litigation <strong>and</strong><br />

preservation of documents,” the court denied the default judgment request. Further supporting the<br />

court’s finding was the lack of bad faith present <strong>and</strong> the inability to prove the deleted documents<br />

were likely to be helpful to the plaintiffs’ claims.<br />

� Rattray v. Woodbury County, Iowa, 2010 WL 5437255 (N.D. Iowa Dec. 27, 2010). In this Fourth<br />

Amendment unreasonable strip search case, the plaintiff sought sanctions pertaining to the<br />

defendants’ destruction of video evidence. The plaintiff argued her threats of litigation during the<br />

Iowa<br />

200


incident, her attorney’s letter complaining about her treatment <strong>and</strong> a court order to preserve the<br />

video recording all put the police department on notice of imminent litigation such that they should<br />

have preserved the entire recording. Objecting, the defendants asserted that preserving only part<br />

of the recording complied with routine procedure, the plaintiff failed to demonstrate prejudice from<br />

the loss, the uncopied segment would have been automatically overwritten by the time the<br />

defendants received notice to preserve it <strong>and</strong> they did not act in bad faith. Finding sufficient<br />

evidence to constitute a fact question, the court ordered the question of bad faith be submitted to<br />

the jury <strong>and</strong> included a permissive adverse inference instruction.<br />

� MHC Investment Comp. v. Racom Corp., 209 F.R.D. 431 (S.D. Iowa 2002). The Iowa court<br />

mentioned without further comment that e-mails were made available during discovery confirming<br />

the general discoverability of e-mail evidence.<br />

Minnesota<br />

� Escamilla v. SMS Holdings Corp., 2011 WL 5025254 (D. Minn. Oct. 21, 2011).<br />

In this sexual battery <strong>and</strong> harassment litigation, the defendants—a former employer <strong>and</strong><br />

supervisor—objected to a magistrate judge’s order to produce a personal laptop for forensic<br />

review, search backup tapes for deleted e-mails <strong>and</strong> pay the associated costs. Specifically,<br />

defendants object that reinstalling the operating system on the supervisor’s personal computer at a<br />

technician’s recommendation was not done intentionally or in bad faith <strong>and</strong> that the court<br />

compelled discovery based solely on a forensics expert’s "speculation" that reinstallation was done<br />

to "hide or destroy relevant information." Additionally, the defendants argued that the court did not<br />

properly conduct a proportionality analysis by considering the prejudice suffered by the plaintiff.<br />

Finally, the defendants argued that data on the employer’s backup tapes was not reasonably<br />

accessible <strong>and</strong> would constitute an undue burden. The court overruled the objections related to the<br />

personal laptop, finding the timing of the reinstallation—which was done two weeks after the<br />

plaintiff’s motion to compel—highly suspect <strong>and</strong> further noted that the prejudice suffered could only<br />

be determined by allowing a forensics expert to review the laptop. With regard to searching<br />

employer’s backup tapes, the court overruled the defendants’ objection, finding that the cost<br />

estimate from a single vendor was "wildly overstated" <strong>and</strong> further found that increased costs were<br />

a result of the defendants failure to preserve data at the outset of litigation. However, the court<br />

found that searching the backup tapes for deleted data was technically impossible <strong>and</strong> ordered the<br />

defendants to search the backup tapes only for live data.<br />

� In re Hecker, 2010 WL 654151 (Bkrtcy.D.Minn. Feb. 23, 2010). In this ancillary bankruptcy<br />

proceeding, the plaintiff requested default judgment sanctions, alleging the defendant repeatedly<br />

failed to produce privilege logs <strong>and</strong> responsive ESI, <strong>and</strong> engaged in offensive discovery despite<br />

court orders prohibiting those actions. The defendant argued he was unable to produce large<br />

amounts of the requested ESI since the documents were located on his computers <strong>and</strong> servers<br />

that were in government custody. First, the court noted that the majority of information requested<br />

remained in the defendant’s possession, since the government made forensic images of the data.<br />

Next, the court detailed the “shocking” behavior of the defendant <strong>and</strong> his counsel throughout the<br />

discovery process, which included belated <strong>and</strong> incomplete productions, violation of court orders,<br />

<strong>and</strong> delivery of an external hard drive containing 1.1 million scrambled files <strong>and</strong> folders. Based on<br />

this behavior, the court determined the defendant acted in bad faith <strong>and</strong> willfully abused the<br />

discovery process. Due to the court’s certainty that no court order would secure the defendant’s<br />

201


cooperation, the plaintiff’s motion for a default judgment sanction was granted <strong>and</strong> $83,070,987 of<br />

the plaintiff’s judgment against the defendant was not dischargeable.<br />

� Cenveo Corp. v. S. Graphic Sys., 2009 WL 4042898 (D. Minn. Nov. 18, 2009). In this discovery<br />

dispute, the defendants filed an amended motion to compel disclosure following the plaintiff’s<br />

failure to produce electronic files in native format. The plaintiff argued that its production of the<br />

documents in PDF format fulfilled Fed.R.Civ.P. 34(b)’s "reasonably usable" requirement because<br />

the defendants failed to define "native format." Citing numerous cases, the court found that "native<br />

format" is not an ambiguous term. Although some native format production requests may be<br />

"overbroad <strong>and</strong> unduly burdensome," the responding party must object <strong>and</strong> specify the alternative<br />

form it intends to use. Because the plaintiff failed to make an objection, the court granted the<br />

defendants’ motion <strong>and</strong> ordered the plaintiff to reproduce electronic documents in native form.<br />

� In re Zurn Pex Plumbing Prods. Liab. Litig., 2009 WL 1606653 (D. Minn. June 5, 2009). In this<br />

property damage litigation, the plaintiffs requested a search using 26 keywords of the e-mail<br />

accounts belonging to the defendants’ employees who had received litigation hold notices, <strong>and</strong><br />

also requested a search of two shared drives <strong>and</strong> DVDs. The defendants argued that the<br />

information was not necessary for the plaintiffs’ class certification <strong>and</strong> that the requested<br />

production would be overly broad <strong>and</strong> costly as it would consist of nearly 27 million pages, take<br />

approximately 17 weeks <strong>and</strong> cost $1,150,000 to process. Using its own calculation, the court<br />

determined the production would consist of roughly 3.6 million pages <strong>and</strong> found the defendants’<br />

attorney’s affidavit regarding burden unpersuasive. The court did recognize the high burden<br />

imposed by the proposed search terms <strong>and</strong> limited the search to 14 specific terms based on the<br />

likelihood they would produce relevant information. The court allowed the parties to decide on a<br />

different set of search terms <strong>and</strong> reserved the defendant’s right to renew its objection if the<br />

production proved to be too costly or overly burdensome.<br />

� Best Buy Stores, L.P. v. Developers Diversified Realty Corp., 2007 WL 4230806 (D.Minn. Nov.<br />

29, 2007). In this claim alleging inter alia, breach of contract, the plaintiff, a commercial tenant,<br />

brought suit against the defendant l<strong>and</strong>lords. Following the issuance of the magistrate judge’s<br />

discovery order, both parties filed objections. The plaintiff objected to the magistrate judge’s order<br />

as it required production of an alternative database prepared for another litigation. The defendants<br />

objected to the magistrate judge’s order to the extent that it denied the defendants’ motion to<br />

compel the plaintiff to fulfill its discovery obligations. After conducting a Fed. R. Civ. P. 26(b) <strong>and</strong><br />

Zubulake analysis, the court found that the high costs associated with restoring the database did<br />

not allow the previous discovery database to be reasonably accessible. In response, the<br />

defendants claimed that the plaintiff should have been on notice of potential production <strong>and</strong> thus<br />

had a duty to preserve the database due to this pending litigation. Disagreeing with the defendants’<br />

objection, the court found the database to be relevant in any potential litigation <strong>and</strong> that specific<br />

discovery requests did not exist to create an obligation to maintain the database. The court then<br />

conducted a good cause analysis using seven factors as required by Fed. R. Civ. P. 26(b)(2)(B) to<br />

determine if discovery using the database should be permitted. Despite the defendants’ concerns,<br />

the court found that the absence of specific arguments to connect the concerns to the magistrate<br />

judge’s discovery order could not constitute sufficient good cause to order restoration of the<br />

database.<br />

� State v. Wells, 2007 WL 2769686 (Minn.App. September 25, 2007). In this criminal case, the<br />

defendant was charged with illegal dissemination <strong>and</strong> possession of child pornography <strong>and</strong><br />

motioned the court to compel the state to provide copies of all electronic information <strong>and</strong> a forensic<br />

copy of his seized computer hard drive. The district court denied the motion <strong>and</strong> certified the<br />

202


question to this court to determine whether the state is required to produce such information in a<br />

child pornography case. The defendant argued withholding the information sought violated his right<br />

to effective assistance of counsel <strong>and</strong> due process of law, but the court did not agree. Noting that<br />

under federal law the state is prohibited from producing child pornography to a defendant <strong>and</strong> that<br />

child pornography is contrab<strong>and</strong>, the court affirmed the trial court’s decision.<br />

� Best Buy Stores, L.P. v. Developers Diversified Realty Corp., 2007 WL 333987 (D. Minn. Feb.<br />

1, 2007). In a discovery dispute, the defendants appealed to the district court judge the magistrate<br />

judge’s order which required them to produce certain electronic evidence on back-up tapes. The<br />

defendants argued that the production of back-up tapes would be time <strong>and</strong> cost prohibitive <strong>and</strong><br />

thus would be unable to meet the discovery deadline. The defendants argued that technological<br />

constraints beyond their control rendered compliance with the deadline impossible. The magistrate<br />

judge determined that defendants had not met their burden to establish that the information sought<br />

was not reasonably accessible because of undue burden or cost. The magistrate found that the<br />

defendants offered “no proof, aside from conclusory statements, about the cost to obtain<br />

documents from electronic archives” <strong>and</strong> that those concerns “cannot shield the defendants from<br />

discovery.” The district court judge upheld the magistrate’s denial of the deadline extension<br />

because the magistrate’s ruling was neither clearly erroneous nor contrary to law. The district court<br />

judge held that discovery deadline modification might be warranted if compliance with the deadline<br />

is in fact technologically impossible. However, the district court judge chose to follow the decisions<br />

of the magistrate judge because the magistrate judge’s prior decisions regarding electronic<br />

discovery disputes were “thorough <strong>and</strong> well-reasoned.”<br />

� Roberts v. Canadian Pacific R.R. Ltd., 2007 WL 118901 (D. Minn. Jan. 11, 2007). In a claim<br />

relating to a train derailment accident, the plaintiff filed a motion to compel the production of an<br />

expert report from the defendant. During the state court proceeding, one of the defendant’s<br />

witnesses admitted to deleting a damaging e-mail. Subsequent to that admission, the defendant<br />

hired a computer forensics expert to determine if any e-mail had been destroyed <strong>and</strong> lost as<br />

evidence. The plaintiff now files for production of the expert’s report in this federal action. The<br />

defendant argues that federal law will preempt the plaintiff’s claim <strong>and</strong>, therefore, any spoliated<br />

evidence is irrelevant to the plaintiff’s case. However, the court disagreed with the defendant’s<br />

argument that there is “no harm, no foul” by the destroyed e-mail. The court held that it “must<br />

insure that any ‘tradition’ of destroying derailment-related documents be discovered <strong>and</strong> brought to<br />

an end.” The court’s order stated that the plaintiff would be able to conduct limited discovery of the<br />

expert’s report by deposing the expert.<br />

� 3M v. Tomar Elec., 2006 WL 2670038 (D. Minn. Sept. 18, 2006). In a patent infringement case,<br />

the district court upheld the magistrate’s decision to award sanctions based on the defendant’s<br />

discovery insufficiencies. In this case, the defendant repeatedly gave false testimony regarding the<br />

existence <strong>and</strong> content of relevant e-mails of employees within his company. In addition, the<br />

defendant failed to inquire into whether other employees had potentially relevant material, but<br />

merely looked at his own e-mail <strong>and</strong> files. The court found the defendant “should have conducted a<br />

reasonable inquiry into whether employees … had documents or information responsive to 3M’s<br />

request” <strong>and</strong> that he “should have instigated a litigation hold after being notified of this litigation.”<br />

The court held that such deliberate failure to comply with any rules of discovery warranted<br />

sanctions that included: adverse jury instructions, negative inferences to the jury <strong>and</strong> monetary<br />

sanctions to cover the costs of the plaintiff in bringing the motions related to the discovery <strong>and</strong> any<br />

future depositions needed to correct the defendant’s withholdings.<br />

203


� Olson v. International Bus. Machs., 2006 WL 503291 (D. Minn. Mar. 1, 2006). In a case involving<br />

allegations of wrongful termination from employment, the parties filed cross-motions for summary<br />

judgment. After terminating the plaintiff, the defendant requested the return of a company-issued<br />

laptop <strong>and</strong> instructed the plaintiff not to make any changes to the laptop. The laptop was returned<br />

<strong>and</strong> examined by a computer forensic expert, who found evidence of data deletion. The expert<br />

indicated the computer’s file content was unrecoverable, but file names – several of which related<br />

to sexually explicit material – were located. Following the investigation, the plaintiff admitted to<br />

deleting data from the laptop after his termination, but testified others, including family <strong>and</strong> friends,<br />

had used the machine. In seeking summary judgment, the defendants claimed they would have<br />

terminated the plaintiff if they knew he was visiting Internet sites featuring sexual content. The<br />

defendants also claimed the plaintiff’s spoliation of data was grounds for termination. In support of<br />

his summary judgment motion, the plaintiff declared the defendants could not prove facts to<br />

support its “after-acquired evidence defense.” The court declined to grant summary judgment for<br />

either side <strong>and</strong> found “a factual dispute exists regarding whether [the plaintiff] is responsible for the<br />

files found on the laptop <strong>and</strong> regarding whether [the defendants] would actually have terminated<br />

[the plaintiff] in this situation.”<br />

� Afremov v. Amplatz, 2006 WL 44341 (Minn. Ct. App. Jan. 10, 2006). An attorney appealed a<br />

sanctions award prohibiting him from appearing before the district court. During discovery, the<br />

court ordered the attorney’s client to immediately turn over his computer to a court-appointed<br />

recipient. A computer forensic expert examined the computer <strong>and</strong> found e-mail had been deleted<br />

on the morning the computer was h<strong>and</strong>ed over. The expert subsequently stated he recovered 300<br />

e-mails that were moved <strong>and</strong> may have been archived rather than deleted. The district court<br />

determined the attorney had instructed his client to "open the computer, turn it on <strong>and</strong> to look at<br />

‘what was in there.’ " In sanctioning the attorney, the court found the attorney “had been ‘untruthful<br />

to the court directly <strong>and</strong> by omission,’ had deliberately <strong>and</strong> intentionally impeded discovery <strong>and</strong><br />

violated the court’s order, <strong>and</strong> had engaged in the spoliation of evidence that would not have been<br />

discovered without the services of an expert.” On appeal, the court reversed the award on the<br />

grounds that the attorney’s due process rights had been violated as the attorney was not provided<br />

with sufficient notice of a hearing at which sanctions might be considered.<br />

� Foust v. McFarl<strong>and</strong>, 698 N.W.2d 24 (Minn. Ct. App. 2005). The defendants appealed an $11<br />

million jury verdict in a personal injury lawsuit involving an automobile accident. Specifically, the<br />

defendants argued that the trial court erred by barring evidence relating to the plaintiff’s intentional<br />

spoliation of electronic evidence. The defendants also contended the court should have granted a<br />

mistrial or dismissed the case with prejudice, instead of granting a spoliation adverse inference<br />

instruction. Upon examining the plaintiff’s computer, the defendants’ computer forensic expert had<br />

discovered evidence of child pornography, illegal downloads of intellectual property, <strong>and</strong> evidence<br />

that a software wiping program was used in an attempt to permanently delete data from the<br />

computer hard drive. The trial court refused to admit the evidence on the grounds that it was more<br />

prejudicial than probative. The trial court further concluded an adverse inference instruction was an<br />

appropriate spoliation sanction in light of the circumstances. On appeal, the appellate court<br />

determined the trial court properly issued the adverse inference instruction <strong>and</strong> concluded that<br />

intentional spoliation did not create “a presumption that a dismissal with prejudice of the spoiling<br />

party’s claims is the best <strong>and</strong> fairest sanction.” The appellate court also found the spoliation<br />

evidence was appropriately excluded as “some of the information was character assassination <strong>and</strong><br />

was more prejudicial than probative.”<br />

204


� State v. Levie, 695 N.W.2d 619 (Minn. Ct. App. 2005). In a case involving allegations of attempting<br />

to use a minor in a sexual performance, the trial court admitted evidence of the defendant’s<br />

Internet use <strong>and</strong> of the existence of an encryption program on his computer. Specifically, the trial<br />

court admitted parts of a computer forensic report, which revealed the defendant used search<br />

terms such as “Lolita” relating to sex with minors. The computer forensic expert who authored the<br />

report testified the computer also contained the text of a statute relating to sex with minors as well<br />

as an encryption program. The expert stated the encryption program could "basically encrypt any<br />

file" <strong>and</strong> that "other than the National Security Agency" he was not aware of anyone who could<br />

break such an encryption. On appeal, the defendant argued that his case was prejudiced because<br />

the court specifically used evidence of his Internet use <strong>and</strong> the encryption program in finding him<br />

guilty. The defendant further contended these factors were unrelated to the charges in the case.<br />

The appellate court rejected the defendant’s argument <strong>and</strong> found the evidence was appropriately<br />

admitted, noting “the district court did exclude other <strong>and</strong> more inflammatory search terms <strong>and</strong><br />

phrases because it found them more prejudicial than probative…Evidence of appellant’s computer<br />

usage <strong>and</strong> the presence of an encryption program on his computer was relevant to the state’s<br />

case.”<br />

� E*Trade Securities LLC v. Deutsche Bank AG, et al., No. 02-3711 RHK/AJB <strong>and</strong> No. 02-3682<br />

RHK/AJB (D. Minn. Feb. 17, 2005). The plaintiffs – who alleged the defendants engaged in a<br />

fraudulent securities lending scheme – sought sanctions against the defendants for “convert[ing]<br />

the litigation process into a sport of dirty tricks <strong>and</strong> obfuscation” by allegedly destroying evidence,<br />

suppressing discoverable material, <strong>and</strong> failing to search for responsive documents. The defendants<br />

counterclaimed, arguing they complied with all discovery requests <strong>and</strong> requested an award of<br />

attorney fees <strong>and</strong> costs. A magistrate judge analyzed the defendants’ duty to preserve their<br />

computer hard drives, telephone recordings <strong>and</strong> e-mail. The magistrate found sanctions were<br />

appropriate because the defendants acted in bad faith by permanently erasing all of the company’s<br />

hard drives in mid-2002, despite being on notice of potential litigation in January 2002. The<br />

magistrate also found the defendants’ failure to preserve relevant phone calls – recorded on DVDs<br />

– warranted sanctions because they should have realized the recordings would be highly relevant<br />

<strong>and</strong>, as a result, should have halted their recycling policy. Finally, the defendants argued they were<br />

not obligated to halt their e-mail retention policy because they had stored the e-mail on backup<br />

tapes. However, the magistrate found this unsatisfactory since the defendants recycled their<br />

backup tapes every three years. The magistrate recommended an adverse inference instruction<br />

<strong>and</strong> $10,000 in sanctions, declaring the “destruction of potentially relevant evidence … prejudiced<br />

the plaintiffs.”<br />

� Hypro, LLC v. Reser, 2004 WL 2905321 (D.Minn. Dec. 10, 2004). Alleging breach of various<br />

employment <strong>and</strong> confidentiality agreements <strong>and</strong> conspiracy to misappropriate trade secrets, the<br />

plaintiff filed a motion to preserve <strong>and</strong> protect evidence. The plaintiff claimed the defendant<br />

installed “Incinerate,” a software wiping utility, on his company laptop that deleted 94 megabytes of<br />

information, <strong>and</strong> returned the laptop without mentioning the deleted files. The plaintiff informed the<br />

court that it had made a backup copy of all of the documents on the laptop prior to the defendant’s<br />

actions, <strong>and</strong> a comparison of the backup copy with the returned laptop revealed the defendant had<br />

deleted documents relating to his involvement in the activities at issue. Based on the plaintiff’s<br />

allegations, the court ordered all parties to preserve <strong>and</strong> “not erase, alter, modify, or destroy” any<br />

evidence, including e-mail <strong>and</strong> electronic documents.<br />

� State v. K<strong>and</strong>el, 2004 WL 1774781 (Minn. App. Aug. 10, 2004). In a criminal prosecution for<br />

possession of child pornography, the state appealed a trial court’s order dismissing the case<br />

205


against the defendant as a sanction for the state’s discovery violations. Pursuant to a court order,<br />

the defendant had requested a “forensically sound” image copy of his computer hard drive, which<br />

had been turned over to the state by someone other than the defendant. When the state failed to<br />

comply with this <strong>and</strong> other discovery requests, the defendant moved to suppress any evidence<br />

derived from the computer <strong>and</strong> to have the charges dismissed. Refusing to award sanctions at that<br />

time, the district court granted the state more time to produce the disclosures. However, the state<br />

still had not produced the requests or allowed the defendant to access the computer even after<br />

several months had passed. As a result, the trial court granted the defendant’s motions for<br />

suppression <strong>and</strong> dismissal. On appeal, the state argued that it did not want to lose the forensic<br />

value of the computer by giving access to the defendant since that would violate laws prohibiting<br />

dissemination of child pornography. Affirming the trial court’s decision, the appellate court noted,<br />

“[a]lthough dismissal is an extreme sanction, ‘[t]he values sought to be achieved through reciprocal<br />

discovery will be attained only if the rules are properly observed, <strong>and</strong> to this end the trial courts<br />

must have the ability to make those obligations meaningful’.”<br />

� In re Pemstar, Inc. Secs. Litig., Civ. No. 02-1821 (DFW/SRN) (D. Minn. Apr. 23, 2004). In a<br />

securities fraud class action lawsuit, the plaintiffs filed a motion to compel production of<br />

spreadsheets, electronic documents <strong>and</strong> databases in native format. In support of its argument, the<br />

plaintiffs declared that the “usual course of business” requirement set forth in Fed. R. Civ. P. 34<br />

should be interpreted as requiring production of the data in native format. The defendants claimed<br />

that the production format should be either paper, TIFF or PDF <strong>and</strong> argued that Fed. R. Civ. P. 34<br />

does not require native production <strong>and</strong> TIFF production would adequately address any of the<br />

plaintiffs’ concerns about retaining metadata <strong>and</strong> file structure. The court ordered the defendants to<br />

produce a sub-set of documents in native format, stating that “production of electronic discovery in<br />

native format is appropriate, feasible, <strong>and</strong> important under the circumstances of this case.” The<br />

court further noted that in this case the substantive allegations were based upon an employee’s<br />

native Lotus Notes file, making it “most useful to the fact finder to view, underst<strong>and</strong>, <strong>and</strong> step into<br />

the shoes of the information source that actually provided the alleged knowledge <strong>and</strong> access.”<br />

� Anderson v. Crossroads Capital Partners, L.L.C., 2004 WL 256512 (D.Minn. Feb. 10, 2004). In<br />

a sexual harassment <strong>and</strong> whistleblower lawsuit, the defendants sought to recover the hard drive of<br />

the plaintiff’s personal computer because it allegedly contained an October 2001 document<br />

outlining the harassment. After a protracted discovery battle, the defendants sought a Motion to<br />

Compel <strong>and</strong> the judge ordered the plaintiff to furnish the defendant with a "copy of all<br />

documents/files relevant to this litigation that exist on Ms. Anderson’s personal computer as well as<br />

those that have been deleted or otherwise adulterated." Pursuant to the judge’s Order, the<br />

defendants’ computer forensic expert examined the plaintiff’s hard drive <strong>and</strong> discovered that a data<br />

wiping software application had been installed after the plaintiff had agreed not to “delete any<br />

existing documents” in a deposition. The computer forensic expert also found that the hard drive<br />

installed in the machine was manufactured in August 2002. The plaintiff claimed that she did not<br />

use the software program to destroy evidence, but that she used it routinely to protect her<br />

computer files. She also stated that in her view she owned the same computer throughout the<br />

litigation despite changing the hard drive in 2002. The defendants then moved to dismiss the<br />

complaint due to the plaintiff’s alleged discovery violations <strong>and</strong> destruction of evidence. The court<br />

noted that the plaintiff’s “exceedingly tedious <strong>and</strong> disingenuous claim of naiveté! regarding her<br />

failure to produce the requested discovery…defies the bounds of reason” but was not sufficiently<br />

egregious to warrant dismissal of the case. Instead, the court issued an adverse inference jury<br />

206


instruction because the plaintiff intentionally destroyed evidence <strong>and</strong> attempted to suppress the<br />

truth.<br />

� Star Tribune v. Minn. Twins Partnership, 659 N.W.2d 287 (Minn. Ct. App. 2003). In litigation<br />

between a sports facilities commission <strong>and</strong> a professional baseball team, three media companies<br />

brought a motion to intervene <strong>and</strong> modify a protective order, which protected all assertedly<br />

confidential material. The media companies sought access to discovery materials, including a CD-<br />

ROM containing 9,000 documents held by the commission. The appellate court denied the media<br />

companies’ request <strong>and</strong> determined the trial court was within its discretion in entering the<br />

protective order. The appellate court further concluded the protective order denied the media<br />

companies’ the right to access the CD-ROM pursuant to a state statute.<br />

� Kerber v. Dairy Queen Operators Ass’n, 2003 WL 21694395 (Minn. Ct. App. July 22, 2003).<br />

After being fired for violating a company computer use policy by instant messaging a co-worker, an<br />

employee applied for unemployment benefits. The employment department denied her benefits on<br />

the grounds that she was terminated for employment misconduct, namely the unauthorized instant<br />

messaging. An unemployment-law judge affirmed the decision. Although several lines of the<br />

employee’s instant message were not work-related, most of the message was devoted to whether<br />

Good Friday was a paid holiday. The employment commissioner’s representative reversed,<br />

deciding that, while her conduct may have been inadvertent or negligent, it did not rise to the level<br />

of employment misconduct. The employer appealed the decision, arguing a company h<strong>and</strong>book<br />

prohibited an employee’s "personal use" of work computers, although the h<strong>and</strong>book did not<br />

explicitly prohibit instant messaging. The h<strong>and</strong>book also provided an e-mail policy that directed the<br />

e-mail system “may not be used for personal business." On appeal, the court affirmed the<br />

commissioner’s decision, noting “the h<strong>and</strong>book does not put employees on notice that instant<br />

messaging or e-mail is prohibited among co-workers concerning work-related topics.”<br />

� Antioch v. Scrapbook Borders, Inc, 210 F.R.D. 645 (D.Minn. 2002). In a copyright infringement<br />

action, the plaintiff moved for issuance of an order directing the defendant to: preserve records,<br />

expedite discovery, compel discovery, <strong>and</strong> appoint a neutral computer forensics expert.<br />

Emphasizing the potential for spoliation of the computer data, the court stated “we conclude that<br />

the defendants may have relevant information, on their computer equipment, which is being lost<br />

through normal use of the computer, <strong>and</strong> which might be relevant to the plaintiff’s claims, or the<br />

defendants’ defenses.”<br />

� Moench v. Red River Basin Board, 2002 WL 31109803 (Minn. Ct. App. Sept. 24, 2002). The<br />

plaintiff was forced to resign from his executive director position after being confronted with<br />

allegations that pornographic images were found on his computer. The plaintiff’s employer used a<br />

computer forensic expert to investigate the pornographic material stored in the cache file of the<br />

plaintiff’s computer. Given that the plaintiff’s employment was terminated for cause, the<br />

Commissioner of Economic Security refused to issue unemployment benefits. The appellate court<br />

reversed the denial of benefits stating that the evidence in the record did not support the finding<br />

that the plaintiff intentionally downloaded or stored any pornographic material on his computer.<br />

� The Gorgen Co. v. Brecht, 2002 WL 977467 (Minn. Ct. App. May 14, 2002). The plaintiff brought<br />

suit against former employees for misappropriation of trade secrets. Prior to serving the complaint,<br />

plaintiff obtained a TRO, which prohibited the defendants from destroying or altering electronic<br />

documents <strong>and</strong> provided for expedited discovery of relevant electronic data. The Appellate Court<br />

found that the district court abused its discretion by issuing the TRO <strong>and</strong> by denying the<br />

defendants’ motion to dissolve it. The Appellate Court stated, “Although the TRO seems<br />

207


easonable on its face…this issue cannot be resolved at this early stage of the litigation without a<br />

showing of irreparable harm or without complying with the rules of procedure.”<br />

� In re St. Jude Med., Inc., Silzone Heart Valves Product Liab. Litig., 2002 WL 341019 (D. Minn.<br />

Mar. 1, 2002). The court entered a pretrial preservation order to address the parties’ obligation to<br />

preserve documents (including but not limited to electronic data, backup tapes <strong>and</strong> e-mail). The<br />

order prohibited "the routine erasure of computerized information potentially relevant to the subject<br />

matter of this litigation," but stated that "[t]he full <strong>and</strong> complete back-up of any server or other<br />

computer on a periodic basis (e.g. monthly) shall relieve the party of any obligation to maintain any<br />

interim backups of the same server or other computer."<br />

� Northwest Airlines v. Local 2000, C.A. No. 00-08DWF/AJB (D. Minn. Feb. 2, 2000) (Order on the<br />

defendants’ Motion for Protective Order <strong>and</strong> the plaintiff’s Motion to Compel <strong>Discovery</strong>); Northwest<br />

Airlines v. Local 2000, C.A. No. 00-08DWF/AJB (D. Minn. Feb. 29, 2000) (Memor<strong>and</strong>um Opinion<br />

<strong>and</strong> Order). The court ordered the plaintiff’s expert to act as a neutral third party expert; on behalf<br />

of the court, the expert collected <strong>and</strong> imaged the defendants’ personal hard drives <strong>and</strong> provided<br />

the parties with a complete report of all data “deemed responsive.” The court issued detailed<br />

protocol for conducting the electronic discovery.<br />

� Lexis-Nexis v. Beer, 41 F. Supp. 2d 950 (D. Minn. 1999). Employer sued former employee for<br />

misappropriation of trade secrets. Court issued monetary sanctions against former employee<br />

where former employee failed to produce a specific copy of an electronic database he made at the<br />

time of his resignation.<br />

� State of Minnesota v. Phillip Morris, 1995 WL 862582 (Minn. Ct. App. Dec. 26, 1995). Petitioners<br />

seek relief from a trial court’s discovery order claiming that the material is attorney work product.<br />

The trial court made specific findings that (a) the computerized databases include fields containing<br />

objective information, (b) release of the specified information will not reveal the impressions,<br />

opinions, or theories of counsel, <strong>and</strong> (c) respondents have met the st<strong>and</strong>ards for disclosure. Both<br />

the trial court <strong>and</strong> the court of appeals found unpersuasive the Petitioners’ argument that the mere<br />

selection of documents for inclusion in the database would reveal attorney strategies.<br />

Missouri<br />

� Custom Hardware Eng’g & Consulting, Inc. v. Dowell, 2012 WL 10496 (E.D. Mo. Jan. 3, 2012).<br />

In this trade secret litigation, the plaintiff submitted a discovery proposal that accounted for<br />

acronyms <strong>and</strong> misspellings of specified search terms. The defendants objected, believing such<br />

terms were overbroad <strong>and</strong> offered their own proposal that required precise matches of the search<br />

terms. Responding, the plaintiff objected that the defendants’ proposal was unduly narrow <strong>and</strong><br />

likely to prevent the production of discoverable ESI. Before analyzing the parties’ claims, the court<br />

advised the parties to exercise greater civility to avoid putting the court “in the position of having to<br />

craft keyword search methodology without adequate information.” Responding, the court found that<br />

each of the defendants’ concerns lacked evidence to substantiate their “fears” of producing<br />

irrelevant or privileged documents, further noting that the plaintiff’s requests were well within the<br />

defendants’ duty to produce all responsive information. Additionally, when reviewing the<br />

defendants’ proposed list, the court found that requiring exact keyword matches would fail to<br />

produce relevant documents, effectively stifling the plaintiff’s discovery efforts. As such, the court<br />

ordered that discovery be conducted according to the plaintiff’s proposed search terms.<br />

� Monsanto Co. v. E.I. DuPont de Nemours & Co., 2011 WL 1004852 (E.D. Mo. Mar. 18, 2011). In<br />

this intellectual property litigation, the defendants moved to compel production in response to the<br />

208


plaintiffs’ alleged failure to meet the terms of a stipulated preservation <strong>and</strong> production agreement.<br />

Contending the defendants’ interpretation of the agreement was overbroad, unrealistic <strong>and</strong> a<br />

moving target, the plaintiffs argued their obligations were satisfied by interviewing all stipulated<br />

custodians except former employees. Although the court agreed with the plaintiffs’ narrower<br />

interpretation, it characterized the plaintiffs’ decision not to interview former employees as "an<br />

inadequate <strong>and</strong> unsupportable excuse" <strong>and</strong> concluded the plaintiffs failed to comply with the<br />

custodian protocol required by the agreement. However, finding an order to fully comply at this<br />

point in the litigation would likely do "violence," <strong>and</strong> that the parties might already have received the<br />

requested information in late productions, the court instead ordered the parties to meet <strong>and</strong> confer<br />

<strong>and</strong> report any agreement concerning how to proceed with non-expert discovery, after which time<br />

the court will rule on the 12 categories included in the defendants’ motion to compel.<br />

Trickey v. Kaman Indus. Techs. Corp., 2010 WL 5067421 (E.D. Mo. Dec. 6, 2010). In this<br />

employment discrimination litigation, the plaintiff sought production of all relevant electronic<br />

communications, alleging the defendants failed to adequately preserve electronic data in<br />

anticipation of litigation. Employees of the defendants manually selected <strong>and</strong> preserved documents<br />

<strong>and</strong> e-mails contained in the live database or archive that they deemed potentially relevant instead<br />

of preserving a mirror image of the e-mail server <strong>and</strong> relevant data sets. Although concerned by<br />

the defendants’ failure to create a mirror image, the court declined to issue sanctions as the plaintiff<br />

made no spoliation claims <strong>and</strong> the defendants made considerable remedial efforts by hiring an<br />

independent forensic computer expert to examine the electronic data for relevant information.<br />

Based on this retention of the forensic IT consultant <strong>and</strong> efforts to search existing data, the court<br />

agreed that the requested documents no longer existed <strong>and</strong> denied the motion to compel unless<br />

the plaintiff could identify now-existing databases that were not previously searched.<br />

� Secure Energy, Inc. v. Coal Synthetics, 2010 WL 597388 (E.D.Mo. Feb. 17, 2010). In this<br />

business dispute, the plaintiffs sought production of electronic engineering drawings in native<br />

format with metadata. The plaintiffs argued that the definition of “documents” in previous discovery<br />

requests included ESI, that they were under the impression the defendants agreed to produce the<br />

files <strong>and</strong> that the terms of a proposed joint scheduling plan entitled them to native production.<br />

Citing Fed.R.Civ.P. 34, the court determined the defendants were not obligated to produce the<br />

drawings in native format since the plaintiffs failed to identify a specific format in their requests. The<br />

court also found the plaintiffs’ motion untimely, since they waited until two months after the<br />

discovery <strong>and</strong> motion to compel deadlines had passed. Finally, the court recognized that expert<br />

testimony may be required regarding retrieval <strong>and</strong> interpretation of the metadata from the drawings<br />

<strong>and</strong> determined the defendants would be prejudiced if the plaintiffs’ request was granted. Thus, the<br />

court denied the plaintiffs’ motion <strong>and</strong> held the defendants fulfilled discovery obligations by<br />

producing the drawings in PDF format.<br />

� Am. Boat Co., Inc. v. Unknown Sunken Barge, 2008 WL 1821486 (E.D.Mo. April 22, 2008). In<br />

this negligence action, the plaintiffs moved to reopen the time to file an appeal claiming the<br />

plaintiffs’ attorney did not receive the electronic notice of the court order. The defendants’ computer<br />

forensic expert imaged the computer hard drive belonging to the plaintiffs’ counsel <strong>and</strong> found no<br />

evidence the notice had ever been on the computer system. Based on his investigation, the expert<br />

opined the notice was successfully sent, but was removed from the server after the attorney’s<br />

secretary accessed the e-mail from a remote computer using the internet Post Office Protocol. The<br />

court found that proof an e-mail is not in a recipient’s possession is insufficient to rebut the<br />

presumption that a generally reliable, properly dispatched e-mail reached its intended recipient.<br />

209


� Claredi Corp. v. SeeBeyond Tech. Corp., 2007 WL 735018 (E.D. Mo. Mar. 8, 2007). In a breach<br />

of contract claim, the plaintiff moved the court to order sanctions against the defendant for<br />

discovery misconduct. The plaintiff requested e-mail <strong>and</strong> documents from the defendant related to<br />

its dealings with competitors in the field. The defendant vehemently denied the existence of any emails<br />

or agreements with third parties <strong>and</strong> refused to search its systems or archived databases.<br />

The plaintiff obtained e-mail records from the third-party competitors <strong>and</strong> discovered that the<br />

defendant had, in fact, communicated <strong>and</strong> contemplated agreements with the third-party<br />

competitors. The plaintiff argued that sanctions in the amount of $317,000 should be awarded to<br />

cover the plaintiff’s fees <strong>and</strong> expenses in bringing the discovery motions. The defendant argued<br />

that the plaintiff’s claims were “merely a boy crying wolf, unnecessarily taking up the Court’s time<br />

on baseless accusations.” The court agreed with the plaintiff <strong>and</strong> issued sanctions because the<br />

documents were material to the plaintiff’s case, finding the defendant’s discovery compliance “to be<br />

dilatory <strong>and</strong> inadequate.” The court stated that the case was filed almost two years ago <strong>and</strong> the<br />

defendant “has yet to run appropriate searches on its archived database for responsive<br />

documents, a search that should have been completed long ago.” The court awarded the plaintiff<br />

$54,000 for its fees <strong>and</strong> costs related to bringing the motion to compel <strong>and</strong> issued sanctions in the<br />

amount of $20,000.<br />

� Self v. Equilon Enter., 2007 WL 427964 (E.D. Mo. Feb. 2, 2007). In a drawn-out litigation<br />

spanning more than six years, the plaintiffs filed a motion to compel the discovery of additional<br />

electronic documents <strong>and</strong> e-mail from the defendants. The defendants already produced over<br />

16,000 e-mails taking hits on search terms provided by the plaintiff. The plaintiff argued that in the<br />

latest production of e-mails, the defendants withheld or “cherry-picked” relevant e-mails. The court<br />

denied the plaintiffs’ motion to compel, stating that they did not show that the need for further<br />

electronic discovery outweighed the burdens <strong>and</strong> costs of locating, retrieving, <strong>and</strong> producing more<br />

electronic discovery. Additionally, the court found no evidence that the defendant was “cherry<br />

picking” relevant e-mails during discovery disclosure. However, the court held that if after<br />

completing their review of the produced e-mails the plaintiffs locate any "smoking gun" e-mails<br />

showing the defendants withheld relevant documents then the court would reconsider the denial of<br />

the plaintiffs’ motion.<br />

� Ameriwood Industries, Inc. v. Liberman, 2006 WL 3825291 (E.D. Mo. Dec. 27, 2006). In a suit<br />

alleging misappropriation of trade secrets inter alia, the plaintiff sought e-mails from the defendants<br />

containing specific communications related to the claims. After the defendants failed to produce an<br />

e-mail, which was subsequently discovered by the plaintiff, the plaintiff motioned the court for an<br />

order to compel the defendants to produce computer hard drives for imaging. The plaintiff not only<br />

requested all work-related computers, but any home computers that may have been used to<br />

transmit the trade secrets. The plaintiff argued it was entitled to the hard drives even if information<br />

was deleted since the computers might contain evidence that went to the heart of the claims. The<br />

defendants argued the costs involved would be substantial <strong>and</strong> imaging should not be completed.<br />

The court determined the data requested was not reasonably accessible because of undue burden<br />

<strong>and</strong> cost. However, the court closely examined the newly implemented Federal Rules of Civil<br />

Procedure <strong>and</strong> determined there was good cause for the plaintiffs to search the defendants’ hard<br />

drives since “allegations that a defendant downloaded trade secrets onto a computer provide a<br />

sufficient nexus between plaintiff’s claims <strong>and</strong> the need to obtain a mirror image of the computer’s<br />

hard drive.” The court then provided detailed guidance for the mirror-imaging process <strong>and</strong><br />

discovery of documents on the defendants’ hard drives. It instructed the plaintiff to choose a<br />

qualified computer forensics expert <strong>and</strong> required the defendants to produce all hard drives,<br />

210


including those from their homes. A disclosure process, including provisions regarding production<br />

of documents <strong>and</strong> privilege issues, was also ordered.<br />

� In re Celexa <strong>and</strong> Lexapro Prods. Liab. Litig., 2006 WL 3497757 (E.D. Mo. Nov. 13, 2006). In this<br />

multi-district litigation regarding two prescription drugs, the parties agreed to a document<br />

management plan which the court incorporated into its order. The parties established that the<br />

plaintiffs would preserve the hard drives of computers used by the plaintiffs <strong>and</strong> the plaintiffs’<br />

decedents, <strong>and</strong> such hard drives would be imaged <strong>and</strong> analyzed pursuant to an agreed forensic<br />

examination protocol. The parties also decided the defendants would not be required to restore any<br />

of their backup tapes at this time, <strong>and</strong> instead, responsive electronically stored information would<br />

be collected from the defendants’ active IT environment. They must preserve the thirty-five backup<br />

tapes set aside for this litigation, but may otherwise resume backup tape recycling. The plaintiffs<br />

deferred the production format decision to the defendants <strong>and</strong> allowed them to produce data in any<br />

format that is generally searchable <strong>and</strong> manageable. The parties were unable to agree on how<br />

costs should be apportioned, the scope of discovery into electronic databases, <strong>and</strong> who should<br />

perform the forensic examination of the computer hard drives. The court determined it would<br />

decide these issues after more briefing by the parties.<br />

� State v. Tripp, 168 S.W.3d 667 (Mo. Ct. App. 2005). The defendant appealed a murder, rape <strong>and</strong><br />

kidnapping conviction, arguing the trial court erred in admitting evidence regarding the contents of<br />

his laptop. The defendant alleged, inter alia, the testimony was legally irrelevant <strong>and</strong> that its<br />

prejudicial effect outweighed any probative value it might have had. At trial, the State’s computer<br />

forensic expert testified that a significant amount of unallocated space remained on the hard drive<br />

<strong>and</strong> that the space was filled with zeros. The expert also uncovered a reference to “wipinfo.exe” in<br />

the computer’s swap file on the hard drive. Based on these factors, the expert concluded that a<br />

wiping utility was used on the computer <strong>and</strong> that 160 files had been accessed, modified or deleted<br />

the day the victim disappeared. The defendant’s computer expert argued it was impossible to<br />

distinguish between a hard drive on which a wiping utility had been used <strong>and</strong> a hard drive on which<br />

the unallocated space was in the same condition as it was when the manufacturer delivered it. On<br />

appeal, the court noted the “State’s position would be stronger if there had been any testimony or<br />

other evidence that suggested that the laptop ever had anything on it that would connect [the<br />

defendant] with the offenses for which he was being tried.” Despite this, the court affirmed the trial<br />

court’s judgment, stating that admission of the testimony <strong>and</strong> evidence did not constitute plain error<br />

as the state only made a passing reference to the free space on the computer <strong>and</strong> the evidence of<br />

a wiping utility.<br />

Nebraska<br />

� Union Pac. R.R. Co. v. United States Envtl. Prot. Agency, 2010 WL 2560455 (D.Neb. June 24,<br />

2010). In this environmental contamination dispute, the plaintiff sought a temporary restraining<br />

order <strong>and</strong> preliminary injunction against the Environmental Protection Agency (EPA). Seeking to<br />

evaluate the merits of the EPA’s lead contamination claim, the plaintiff requested information<br />

pursuant to the Freedom of Information Act (FOIA). Based on information contained in e-mails<br />

gathered from the initial disclosure, the plaintiff argued that an EPA supervisor ordered employees<br />

to destroy information responsive to the plaintiff’s FOIA requests <strong>and</strong> "relevant in future<br />

enforcement actions." Granting the temporary restraining order to prevent further destruction of<br />

evidence, the court ordered the defendant to produce all relevant data <strong>and</strong> designate "an individual<br />

211


well acquainted" with its technology, electronically stored information systems <strong>and</strong> management<br />

structure to ensure proper enforcement of the order.<br />

� Seger v. Ernest-Spencer Metals, Inc., 2010 WL 378113 (D.Neb. Jan. 26, 2010). In this personal<br />

injury case, the defendants requested production of a non-party’s e-mails <strong>and</strong> previously produced<br />

privileged documents. In support of their motion, the defendants argued that the information sought<br />

was not privileged, but if it was, any claim of privilege had been waived. Recognizing the nonparty’s<br />

failure to take reasonable precautions to prevent inadvertent disclosure of privileged<br />

information <strong>and</strong> its lack of promptness in asserting a claim of privilege, the court found the<br />

disclosure to be “knowing <strong>and</strong> intentional” <strong>and</strong> granted the defendants’ motion to compel. Turning<br />

to the production issue, the court largely disagreed with the non-party’s undue burden argument<br />

with respect to the two disputed production requests. The court found that narrowing the search<br />

terms would provide the necessary limitations on the request <strong>and</strong> left open the resolution of costshifting<br />

pending more accurate estimates.<br />

� GP Indus., LLC v. Bachman, 2008 WL 1733606 (D.Neb. April 10, 2008). In this patent litigation,<br />

the court reconsidered the plaintiff’s motion for sanctions <strong>and</strong> to compel after the defendant<br />

produced approximately 3,000 pages of documents “in a jumbled fashion” <strong>and</strong> refused to identify<br />

which documents were responsive to which document requests. The defendant argued the<br />

documents were produced as they were kept in the ordinary course of business <strong>and</strong> submitted an<br />

index. Finding the index to be untimely <strong>and</strong> unhelpful, the court determined the defendant did not<br />

comply with the previous court order. Additionally, the court ordered the defendant to identify the<br />

responsiveness of each document or potentially face the imposition of sanctions. The court also<br />

awarded the plaintiff costs associated with bringing the motion to compel.<br />

� Kellogg v. Nike, Inc., 2007 WL 4570871 (D.Neb. Dec. 26, 2007). In this patent infringement suit,<br />

the plaintiff filed a motion to compel, alleging the defendants’ response to production requests was<br />

“slow <strong>and</strong> evasive” in regard to electronically stored information. The plaintiff also sought<br />

documents from a privilege log allegedly created prior to the defendants’ knowledge of the<br />

impending litigation. In regard to the first issue, the plaintiff argued that the defendants failed to<br />

provide information regarding document retention <strong>and</strong> preservation policies. Subsequent to the<br />

filing of the motion, the plaintiff deposed a Rule 30(b)(6) witness regarding the defendants’<br />

document retention policy. At the time of the hearing, the plaintiff did not dispute he had all the<br />

information sought with regard to information document storing. As such, the court did not compel<br />

the defendants to supplement their discovery responses. Because of the plaintiff’s failure to make a<br />

good faith effort to resolve the discovery issue <strong>and</strong> the defendants’ willingness to produce the<br />

requested information, the court refused to impose sanctions. In regard to the privilege log, the<br />

plaintiffs argued that privilege did not apply as the documents were generated before the threat of<br />

litigation <strong>and</strong> the underlying facts are not privileged. The court disagreed with the plaintiffs in that<br />

the document creation date controlled the privilege analysis <strong>and</strong> held that the documents were<br />

protected by the attorney-client privilege <strong>and</strong> therefore not discoverable.<br />

� Bd. of Regents of the Univ. of Nebraska v. BASF Corp., 2007 WL 3342423 (D.Neb. Nov. 5,<br />

2007). In this breach of contract case, the defendant moved to impose sanctions against the<br />

plaintiff for violation of an earlier court order compelling document production. The defendant’s<br />

request included full compliance by continued search <strong>and</strong> production of employee files, certification<br />

of full compliance by plaintiff, reproduction of witnesses for deposition as well as reasonable fees<br />

<strong>and</strong> expenses. The record revealed that the plaintiff continued to produce documents following the<br />

discovery deadline <strong>and</strong> an additional 6,000 pages following the deposition of the plaintiff’s<br />

witnesses. In fact, one of the plaintiff’s witnesses testified during his deposition that while the<br />

212


litigation was pending, he had not received a litigation hold notice but was rather encouraged to<br />

review <strong>and</strong> eliminate as many files as he could. The court determined that such lack of compliance<br />

with the motion to compel was not willful but that the plaintiff’s counsel was far from diligent in<br />

complying with the order. The court held that as the litigation was pending at the time of the<br />

destruction, bad faith was not required for sanctions <strong>and</strong> ordered the plaintiff to pay for all costs<br />

<strong>and</strong> expenses associated in re-deposing witnesses <strong>and</strong> the filing of this motion.<br />

� United States v. Jackson, 2007 WL 1381772 (D. Neb. May 8, 2007). In a criminal case, the<br />

defendant filed a motion in limine to exclude evidence of chat room conversations. At the<br />

conclusion of each chat room session, an undercover police officer conducting the chat room<br />

conversation would cut-<strong>and</strong>-paste the entire conversation into a word document for later review.<br />

However, a computer forensics expert testified that this cut-<strong>and</strong>-paste method created several<br />

errors <strong>and</strong> that several portions of the defendant’s conversations were omitted. The defendant<br />

argued the omitted portions of the transcript contained evidence relating directly to his intent <strong>and</strong><br />

should not be admitted as evidence. The court found that the cut-<strong>and</strong>-paste document was not<br />

admissible evidence at trial because it was not authentic under the Federal Rules of Evidence. The<br />

government did not prove the proper foundation to show that the cut-<strong>and</strong>-paste transcript was a<br />

trustworthy source of evidence. Additionally, the court found that the transcript was not the “best<br />

evidence” as required by the Federal Rules of Evidence. Although original duplicate documents<br />

may be admitted as evidence in lieu of original documents, they still must be an accurate reflection<br />

of the original’s content. The court found the cut-<strong>and</strong>-paste document offered by the government<br />

could not be proven to be an accurate reflection of the original chat room discussions.<br />

� United States v. Bailey, 272 F. Supp. 2d 822 (D.Neb. 2003). The FBI suspected that an employee<br />

within American Family Insurance was distributing child pornography using his company e-mail<br />

account. Pursuant to a subpoena, American Family Insurance accessed the contents of the<br />

defendant’s e-mail account <strong>and</strong> reported to the FBI that pornographic images were found. Based<br />

on this information, the FBI issued a warrant to search the defendant’s office space <strong>and</strong> computer.<br />

The defendant moved to suppress evidence of child pornography located during the search of his<br />

work computer. The court held that the defendant did not have an expectation of privacy in the<br />

information stored on his work computer given his employer’s practices, procedures, <strong>and</strong> regulation<br />

over the use of the computer property. Specifically, the company had a log-in notice that warned of<br />

possible monitoring or searching <strong>and</strong> required users to click "OK" to proceed. The employer also<br />

posted company computer-use policies on its intranet site <strong>and</strong> sent e-mail notification to all users<br />

reminding them to read the policy.<br />

North Dakota<br />

� Executive Air Taxi Corp. v. City of Bismarck, North Dakota, 2008 WL 564725 (8th Cir. Mar. 4,<br />

2008). In this §1983 discrimination claim, the plaintiff claimed the defendant violated its<br />

constitutional rights to equal protection of the laws, causing a diminution in the value of its<br />

business. The plaintiff sought a forensic inspection of the defendant’s laptop, claiming such was<br />

necessary to search for e-mail not produced in discovery. The defendant argued that it had a<br />

rational basis for preferring other businesses over the plaintiff, namely generating revenue for the<br />

city. The defendant further argued against a forensic inspection, claiming it produced all relevant email<br />

<strong>and</strong> such inspection could produce confidential or privileged information. The defendant filed a<br />

motion for summary judgment which was granted by the district court <strong>and</strong> upheld by the United<br />

States Court of Appeals for the Eighth Circuit.<br />

213


� In re Ward, 701 N.W.2d 873 (N.D. 2005). A hearing panel found an attorney violated a state<br />

professional responsibility rule in failing to maintain duplicate records or electronic backup to<br />

account for portions of money placed in a client’s trust account as an advance on future fees. The<br />

attorney argued the client’s sister took the original fee record out of the client’s file, <strong>and</strong> a computer<br />

virus destroyed the backup record. The court found the attorney violated the rule <strong>and</strong> stated,<br />

“[a]lthough it is unfortunate that a computer virus destroyed Ward’s backup billing record files, it<br />

does not relieve him of his duty to maintain records.”<br />

� Bertsch v. Duemel<strong>and</strong>, 639 N.W.2d 455 (N.D. 2002). In an action alleging tortious interference<br />

with a business relationship, the appellate court affirmed a lower court’s denial of the plaintiff’s<br />

motion to compel discovery of data from some of the defendant’s computers. Specifically, the court<br />

denied the plaintiff access to computers purchased by the defendant after the transaction that gave<br />

rise to the litigation. The court reasoned that the resulting data could not be relevant to the case,<br />

<strong>and</strong> that granting access “would not lead to relevant information” <strong>and</strong> “could result in disclosure of<br />

privileged <strong>and</strong> confidential information.” The court had previously permitted e-discovery of the<br />

defendant’s computer that was owned at the time of the alleged torts.<br />

South Dakota<br />

� Benson, M.D. v. Sanford Health, 2011 WL 1135379 (D.S.D. Mar. 25, 2011). In this discovery<br />

dispute, the plaintiff filed a fourth motion to compel seeking production of a single e-mail. Asserted<br />

that its e-mail retention policies <strong>and</strong> document destruction cycles would have destroyed any such<br />

e-mail – if it ever existed – years before the plaintiff’s request, the defendant nevertheless<br />

attempted to locate <strong>and</strong> retrieve the e-mail. Discrediting the plaintiff’s "counterproductive<br />

overstatement <strong>and</strong> half truth," the court determined the plaintiff’s "picture of her own ‘pure driven<br />

snow’ innocence <strong>and</strong> [the defendant’s] dastardly evasion" <strong>and</strong> description of the first three motions<br />

were inaccurate. Instead, the court acknowledged the defendant’s efforts <strong>and</strong> characterized the<br />

fourth motion as duplicative to an order previously denied. Finding a strong probability that the email<br />

no longer existed anywhere on the defendant’s laptops, networks, backup tapes or in hard<br />

copy, <strong>and</strong> concluding there was nothing else the defendant could reasonably do, the court denied<br />

the motion <strong>and</strong> awarded attorney fees to the defendant.<br />

� United States v. Two Bank Accounts, 2008 WL 2696927 (D.S.D. July 2, 2008). In this litigation<br />

seeking forfeiture of two specific bank accounts, the government filed a motion to compel seeking<br />

production of requested electronic information <strong>and</strong> production of specified computers used in<br />

transactions alleged in the complaint for imaging. Appearing pro se, the defendant, who asserted<br />

an interest in some of the potentially forfeited accounts, filed a motion to deny requests for<br />

production, claiming undue expense. Finding insufficient facts to establish undue burden or<br />

expense given the government’s ability to travel to the relevant computers <strong>and</strong> willingness to copy<br />

the relevant documents at their own expense, the court granted the motion to compel. Additionally<br />

the court sternly reminded the defendant that discovery is “not a game” but is a “two-way street”<br />

that must be diligently followed. See also United States v. 11 Bank Accounts, 2008 WL 2660969<br />

(D.S.D. July 2, 2008).<br />

� United States v. Luken, 2007 WL 2428656 (D.S.D. Aug. 21, 2007). In a criminal prosecution for<br />

possession of child pornography, the defendant argued that he was not in possession of<br />

contrab<strong>and</strong> materials because he did not possess forensic software necessary to access the illegal<br />

images in question. Denying the defendant’s motions to suppress evidence <strong>and</strong> dismiss the<br />

indictment, the court found that evidence of the defendant’s purposeful downloading <strong>and</strong> saving of<br />

214


the illegal images onto his computer hard drive, in order to view them in thumbnail format, was<br />

sufficient to establish knowing possession.<br />

215


� State v. Guthrie, 627 N.W.2d 401 (S.D. 2001). In a criminal prosecution for murder, a computer<br />

specialist conducted several forensic searches on a computer used by the defendant, finding that<br />

the computer had been used to conduct numerous Internet searches on subjects related to the<br />

incidents surrounding the murder. In addition, the forensic analysis was able to reveal that a<br />

computer printed suicide note, offered to exculpate the defendant, was created several months<br />

after the victim’s death. State v. Guthrie, 654 N.W.2d 201 (S.D. 2002). Anticipating that the State<br />

would not have time to thoroughly examine the evidence against the defendant for murdering his<br />

wife, Defense counsel failed to disclose the victim’s purported computerized suicide note during the<br />

discovery period. The appellate court affirmed the trial court’s finding that defense counsel acted in<br />

bad faith by holding this evidence back from discovery. The appellate court also held that the fees<br />

of the State’s computer forensic expert were reasonable because the expert was highly qualified in<br />

computer forensics.<br />

Ninth Circuit – State <strong>and</strong> Federal <strong>Case</strong>s<br />

� Suzlon Energy Ltd. v. Microsoft Corp., No. 10-35793 (9th Cir. Oct. 3, 2011). In this civil fraud<br />

proceeding, the appellant objected to the district court’s holding that denied production of e-mails<br />

sent by an Indian citizen (a former employee of the appellant) via his Hotmail account. Previously<br />

the district court did grant production, but then reconsidered following Microsoft’s objections. The<br />

district court disagreed with two of these objections, including that the documents sought must be<br />

discoverable in the foreign proceeding <strong>and</strong> that the subpoenas must be compliant with the Federal<br />

Rules of Civil Procedure, but agreed with the third objection that raised the <strong>Electronic</strong><br />

Communications Privacy Act (ECPA). This ruling forms the basis of the plaintiff/appellant’s<br />

objection. Upon appeal, the United States Court of Appeals for the Ninth Circuit analyzed the<br />

statutory framework of the ECPA <strong>and</strong> determined that “any person” as defined in § 2510(13) of the<br />

ECPA extends protection to literally any person, including foreign citizens. Based on this plain text<br />

reading of the statute, the court upheld the district court’s ruling finding the ECPA protects the<br />

domestic communications of noncitizens.<br />

� In re Oracle Corp. Sec. Litig., 627 F.3d 376 (9th Cir. Nov. 16, 2010). In this securities litigation,<br />

the plaintiffs appealed a summary judgment order entered for the defendants, contesting the<br />

adequacy of adverse inferences given regarding the defendants’ willful failure to preserve the<br />

CEO’s e-mails <strong>and</strong> taped discussions. The plaintiffs argued the adverse inferences should have<br />

been “sufficient to defeat a challenge to the insufficiency of their prima facie case,” instead of<br />

merely that the e-mails <strong>and</strong> tapes would have proved the defendants’ knowledge of any material<br />

facts the plaintiffs established. While more than 2.1 million documents were produced during<br />

discovery, the court found that the plaintiffs were unable to glean any material issues of fact from<br />

these documents or from depositions <strong>and</strong> written discovery, <strong>and</strong> that the plaintiffs’ problem resided<br />

in the “dearth of admissible evidence” to demonstrate fraud. Accordingly, the court found the<br />

sanction was carefully fashioned with no abuse of discretion to deny the defendants any benefit<br />

from their preservation failures. Further asserting that “[i]t behooves litigants, particularly in a case<br />

with a record of this magnitude, to resist the temptation to treat judges as if they were pigs sniffing<br />

for truffles,” the court ultimately affirmed summary judgment for the defendants.<br />

� Truckstop.net, LLC v. Sprint Corp., 2008 WL 4710681 (9th Cir. Oct. 28, 2008). In this contract<br />

dispute, the defendant filed an interlocutory appeal following the district court’s order. The district<br />

court’s order redacted privileged portions of an inadvertently produced e-mail but found that other<br />

216


portions of the e-mail were not protected by the attorney-client privilege. Finding a lack of appellate<br />

jurisdiction under the collateral order doctrine because the privileged information had already been<br />

disclosed, the court dismissed the appeal. The court noted that while the disclosure of the e-mail<br />

was unfortunate, “the chicken has already flown the coop – the alleged harm from disclosure has<br />

already occurred.”<br />

� Quon v. Arch Wireless Operating Co., Inc., 529 F.3d 892 (9th Cir. 2008). In this case, the<br />

plaintiffs appealed the district court’s ruling, claiming the defendants violated the Stored<br />

Communications Act (“SCA”) <strong>and</strong> their Fourth Amendment rights by producing plaintiff’s text<br />

messages to the police department. The police department claimed it sought the plaintiffs’ text<br />

message transcripts to determine if the usage overages the plaintiffs incurred were due to personal<br />

messages. Categorizing the defendant service provider as an “electronic communication service”<br />

(ECS) that knowingly provided transcripts of the text messages to the defendant City who was<br />

merely a “subscriber” <strong>and</strong> not “an addressee or intended recipient of such communication,” the<br />

court determined the defendant violated the SCA <strong>and</strong> rem<strong>and</strong>ed the case to the district court. The<br />

court also agreed with the plaintiffs that the search violated the Fourth Amendment, finding that the<br />

plaintiffs had a reasonable expectation of privacy in the text messages stored on the service<br />

provider’s network <strong>and</strong> that the search was conducted unreasonably <strong>and</strong> intrusively.<br />

� United States v. Giberson, 527 F.3d 882 (9th Cir. 2008). In this criminal conviction appeal, the<br />

appellant argued that the trial court erred in denying his motion to suppress incriminating evidence<br />

found on his computer. The computer was seized via a search warrant for documents <strong>and</strong> records<br />

relating to child support obligation failures, <strong>and</strong> was forensically searched under a warrant for<br />

evidence of fraudulent activities. The appellant argued that the general principle that a search<br />

warrant for materials authorizes the search of objects that may contain those materials should not<br />

apply to computers because computers contain an enormous volume of data, likely contain<br />

irrelevant personal data, <strong>and</strong> likely contain First Amendment-protected data. Also, the appellant<br />

argued that the forensic search of his computer should have been limited to files likely to contain<br />

documents relevant to the search warrant’s purpose. Finding the appellant’s technology-based<br />

arguments to be unpersuasive, the court held that a search warrant describing a document<br />

reasonably likely to be contained on a computer authorizes the seizure of that computer. The court<br />

also cited precedent which reasoned that a forensic search methodology limited to certain files is<br />

unreasonable since computer records are extremely susceptible to tampering, hiding or<br />

destruction. Subsequently, the court upheld the trial court’s decision not to suppress the computer<br />

evidence <strong>and</strong> the appellant’s conviction.<br />

� Leon v. IDX Sys. Corp., 464 F.3d 951 (9th Cir. 2006). In a discrimination suit based on an ADA<br />

claim, the plaintiff appealed sanctions against him for evidence spoliation involving the deletion of<br />

2,200 files from his work-issued laptop. The defendant’s computer forensic expert determined the<br />

plaintiff intentionally wiped the laptop’s hard drive before turning it over to defendant for<br />

examination. The plaintiff admitted to running a program designed to delete any files from the<br />

unallocated space on his hard drive but argued that the deletion was only performed to protect his<br />

privacy interests. The court, however, stated the plaintiff had “ample notice” to preserve any<br />

relevant evidence <strong>and</strong> “the files he destroyed were not merely ‘private’ <strong>and</strong> were potentially<br />

relevant to the litigation at h<strong>and</strong>.” The appellate court determined that the district court did not<br />

abuse its discretion when determining that the plaintiff acted in bad faith in destroying electronic<br />

files <strong>and</strong> that defendant was prejudiced because of such destruction. The court agreed further that<br />

lesser sanctions would not be useful since any attempts to rectify the harm done by plaintiff would<br />

be “futile.” Therefore, dismissal was proper.<br />

217


� U.S. v. Ziegler, 456 F.3d 1138 (9th Cir. 2006). In an appeal from Montana district court, defendant<br />

claimed that child pornography <strong>and</strong> other information found on his workplace computer was<br />

protected as private information under the 4th Amendment. Plaintiff argued that a workplace<br />

computer is much like a locked desk drawer in an office <strong>and</strong> that a similar expectation of privacy<br />

should follow. However, the government argued that no employee can possibly have an<br />

expectation of privacy when the computer <strong>and</strong> internet access is paid for by the employer <strong>and</strong><br />

when there is an entire company department dedicated to monitoring employee’s internet use. The<br />

court held that the defendant could not have an objective expectation of privacy since his employer<br />

published <strong>and</strong> practiced a computer monitoring policy. The court noted that the defendant’s<br />

personal password protection did not increase privacy expectations. Furthermore, the court stated<br />

that if the employer did not have a properly practiced policy in place, than an objective expectation<br />

of privacy may have existed for defendant. However, the court concluded “[s]ocial norms suggest<br />

that employees are not entitled to privacy in the use of workplace computers.”<br />

� Barton v. United States, 2005 WL 1355481 (9th Cir. June 9, 2005). In a suit relating to an<br />

antidepressant drug, the trial court denied the plaintiff’s writ of m<strong>and</strong>amus to prevent disclosure of<br />

answers to a law firm questionnaire completed online by prospective clients. The trial court’s<br />

decision rested on a disclaimer on the bottom of the questionnaire that stated filling out the<br />

questionnaire "does not constitute a request for legal advice <strong>and</strong> that I am not forming an attorney<br />

client relationship by submitting this information." On appeal, the court reversed the trial court’s<br />

decision <strong>and</strong> determined the questionnaire answers were submitted in the course of prospective<br />

attorney-client relationship <strong>and</strong> were thus confidential <strong>and</strong> protected by the attorney-client privilege.<br />

� United States v. Gordon, 393 F.3d 1044 (9th Cir. 2004). After discovering missing stock shares,<br />

an employer suspected embezzlement <strong>and</strong> requested the defendant’s laptop computer for<br />

examination. The employer specifically told the defendant not to delete anything from the hard<br />

drive. A computer forensic analysis revealed the defendant attempted to overwrite files on the<br />

computer by running “Evidence Eliminator,” a software wiping program, at least five times the night<br />

before he turned over the computer. The defendant was convicted of embezzlement <strong>and</strong> ordered<br />

to pay restitution, including reimbursing the employer for a portion of the investigation costs. On<br />

appeal, the defendant argued the trial court should not have awarded the employer investigation<br />

costs, including the costs of the forensic examination. The appellate court rejected this argument<br />

<strong>and</strong> affirmed the district court’s award, noting the defendant “purposefully covered his tracks as he<br />

concealed his numerous acts of wrongdoing from [his employer] over a period of years. As the<br />

victim, [the employer] cannot be faulted for making a concerted effort to pick up his trail <strong>and</strong> identify<br />

all the assets he took amid everything he worked on.”<br />

� Theofel v. Farey Jones, 341 F.3d 978 (9th Cir. 2003), amended by, 359 F.3d 1066 (9th Cir.<br />

2004), cert. denied, 125 S. Ct. 48 (2004). Seeking e-mail discovery, a party in a commercial<br />

litigation issued a third party subpoena on the opposing party’s Internet Service Provider (ISP).<br />

Instead of limiting the scope of the subpoena to particular subject matters, custodians, or time<br />

periods, the subpoena sought all e-mail to or from the opposing party. The ISP substantially<br />

complied, but when the opposing party learned of the subpoena, it moved to quash. The court<br />

severely criticized the subpoenaing party for its overbroad subpoena <strong>and</strong> issued $9,000 in<br />

sanctions. The employees of the subpoenaed party then brought a new civil suit against the<br />

subpoenaing party <strong>and</strong> its attorney under the Stored Communications Act, the Wiretap Act <strong>and</strong> the<br />

<strong>Computer</strong> Fraud <strong>and</strong> Abuse Act. The trial court granted a motion to dismiss the new suit, finding<br />

that no claim was stated. The Ninth Circuit reversed <strong>and</strong> reinstated the civil suit, holding that an<br />

overbroad subpoena is not valid especially when directed against a third party that may not have<br />

218


the resources to oppose the subpoena. The ISP’s consent by complying with the e-mail production<br />

was invalid since the subpoenaing party had at least constructive knowledge of the subpoena’s<br />

invalidity <strong>and</strong> thus any consent was obtained deceptively <strong>and</strong> through mistake.<br />

� Advanced Micro Devices, Inc. v. Intel Corp., 292 F.3d 664 (9th Cir. 2002). In a dispute relating<br />

to the market conduct of Intel Corp, Advanced filed a complaint with the European Commission,<br />

<strong>and</strong> sought discovery according to practices <strong>and</strong> rules in the United States under federal law.<br />

Adopting a broad interpretation of the scope of discovery rights in cases involving foreign tribunals,<br />

the court permitted domestic-style discovery under 28 U.S.C. § 1782 in an investigation conducted<br />

by the European Community Directorate.<br />

� Sea-L<strong>and</strong> Service, Inc. v. Lozen Int’l, 285 F.3d 808 (9th Cir. 2002). The court ruled that the trial<br />

court should have admitted an internal company e-mail, which an employee of the plaintiff had<br />

forwarded to the defendant. The defense persuasively argued on appeal that the e-mail was not<br />

excludable hearsay because her remarks in forwarding the e-mail manifested an adoption or belief<br />

in truth of the information contained in the original e-mail. The court ruled that this satisfied the<br />

requirements for an adoptive admission under Fed.R.Evid. 801(d)(2)(B).<br />

� Monotype Corp. v. Int’l Typeface Corp., 43 F.3d 443 (9th Cir. 1994). The court declined<br />

admission of a detrimental e-mail in a license infringement action, due to the prejudicial nature of<br />

the message <strong>and</strong> fact that the e-mail was not admissible under the business record exception.<br />

� United States v. Catabran, 836 F.2d 453 (9th Cir. 1988). <strong>Computer</strong> printouts are admissible as<br />

business records under the Federal Rules of Evidence 803(6), provided that proper foundational<br />

requirements are first established.<br />

� Williams v. Owens-Illinois, Inc., 665 F.2d 918 (9th Cir. 1982). In an employment discrimination<br />

suit, the court refused to order production of the electronic information on computer tape where all<br />

the data was previously produced in hard copy. Therefore, the court determined that the Appellants<br />

were not deprived of any data.<br />

� Transamerican <strong>Computer</strong> Co. v. IBM, 573 F.2d 646 (9th Cir. 1978). The court was more lenient<br />

regarding waiver of privilege where the party was required to produce larger amounts of data <strong>and</strong><br />

where they actually performed some degree of privilege review.<br />

� None reported<br />

Alaska<br />

Arizona<br />

� Surowiec v. Capital Title Agency, Inc., 2011 WL 1671925 (D. Ariz. May 4, 2011). In this breach<br />

of contract, inter alia, litigation, the plaintiff requested sanctions, arguing the defendants spoliated<br />

evidence <strong>and</strong> misrepresented the extent of its discovery efforts. In response, the defendants<br />

argued a letter it received threatening future litigation did not trigger a duty to preserve because the<br />

letter did not specifically name the plaintiff. Clarifying the duty is owed to the court rather than the<br />

party’s potential adversary, the court found the letter clearly encompassed a threat from<br />

homeowners such as the plaintiff, thus triggering the duty to preserve. Although the court declined<br />

to apply the Pension Committee culpability st<strong>and</strong>ard, it nonetheless found the defendants’ in-house<br />

counsel’s failure to issue a litigation hold, suspend routine document destruction <strong>and</strong> capture<br />

evidence, constituted gross negligence. Reviewing the alleged discovery abuses, the court<br />

determined the defendant used unreasonably narrow <strong>and</strong> literal search terms that initially<br />

219


succeeded in returning zero results, <strong>and</strong> found its boilerplate objections to be inexcusable.<br />

Concluding the defendants acted willfully, the court imposed an adverse inference instruction <strong>and</strong><br />

issued monetary sanctions to reimburse the plaintiff’s expenses incurred as a result of the<br />

misconduct <strong>and</strong> to pay reasonable attorney fees.<br />

� Lake v. City of Phoenix, 2009 WL 3461304 (Ariz. Oct. 29, 2009). In this employment<br />

discrimination claim, the plaintiff appealed the appellate court’s ruling that metadata is not<br />

considered a public record. The plaintiff sought production of electronic public records, including<br />

embedded metadata, after suspecting hard copies produced by the defendants were backdated.<br />

The Supreme Court of Arizona found the metadata to be a part of the underlying electronic<br />

document that could not st<strong>and</strong> on its own. As a result of this analysis, the court found that any<br />

embedded metadata is part of the electronic public record <strong>and</strong> is subject to disclosure. The court<br />

noted that this decision would be unlikely to cause the administrative nightmare the city prophesied<br />

because properly responding to a request for metadata would only require producing a copy of the<br />

electronic record in native format.<br />

� Lake v. City of Phoenix, 2009 WL 73256 (Ariz.Ct.App. Jan. 13, 2009). In this special action to<br />

compel the defendant City to produce public records, the plaintiff appealed a lower court decision<br />

denying his motion to compel the production of metadata. The plaintiff argued metadata was<br />

necessary to determine whether the produced notes were backdated <strong>and</strong> for authentication<br />

purposes. The defendant argued that metadata is not a public record. Agreeing with the defendant,<br />

the court affirmed the lower court’s holding that metadata is not a public record <strong>and</strong> need not be<br />

produced.<br />

� Kinnally v. Rogers Corp., 2008 WL 4850116 (D.Ariz. Nov. 7, 2008). In this age discrimination<br />

litigation, the plaintiffs sought an adverse inference sanction alleging spoliation of relevant<br />

evidence. The plaintiffs claimed the defendant failed to issue a litigation hold, failed to produce<br />

document retention <strong>and</strong> destruction policies, <strong>and</strong> failed to produce certain evidence, which resulted<br />

in spoliation. The defendant argued the plaintiffs’ motion was raised after the close of discovery<br />

<strong>and</strong> was therefore untimely <strong>and</strong> also that the plaintiffs failed to show that any of the requested<br />

documents were destroyed. Finding the discovery dispute should have been raised during the<br />

allowable discovery period, the court denied the plaintiffs’ motion as untimely. Moreover, the court<br />

determined the motion, had it been timely, would have been denied due to the lack of evidence that<br />

information was destroyed.<br />

� Atlantic Recording Corp. v. Howell, 2008 WL 4080008 (D.Ariz. Aug. 29, 2008). In this copyright<br />

infringement litigation, the plaintiffs sought terminating sanctions alleging the defendant willfully<br />

destroyed material evidence. The defendant removed the file-sharing program at issue from his<br />

computer after receiving the notice of litigation, without taking a proper backup. He also reinstalled<br />

the operating system after he received the request for copies of various files on his computer. In<br />

addition, a forensic examination showed that the defendant downloaded wiping software to<br />

permanently delete traces of files shortly after he filed his answer. Finding the defendant to have<br />

engaged in “brazen destruction of evidence,” which made it impossible for the case to be decided<br />

on the merits, the court imposed a default judgment against defendant <strong>and</strong> awarded the plaintiff<br />

$40,500 in statutory damages <strong>and</strong> $350 in filing fees.<br />

� State v. Jensen, 173 P.3d 1046 (Ariz.App.Div. Jan. 15, 2008). In this criminal case, the defendant<br />

appealed his conviction for sexual exploitation of a minor, claiming the evidence was insufficient to<br />

support the jury verdict that he knowingly possessed or received child pornography. The<br />

government conducted a forensic examination of the defendant’s computer, which revealed three<br />

images that were automatically saved to the hard drive. Two of the images were found on the hard<br />

220


drive in temporary internet file folders <strong>and</strong> the third was recovered from an unallocated cluster.<br />

Disregarding the defendant’s claims he did not knowingly possess the images as they were saved<br />

automatically into the computer’s r<strong>and</strong>om access memory (RAM), the court determined the<br />

defendant’s active search for the images was sufficient to support the conviction.<br />

� United States v. Flyer, 2007 WL 2051373 (D.Ariz. July 13, 2007). In this case, the defendant was<br />

charged with attempted transportation <strong>and</strong> shipping of, as well as possession of, child<br />

pornography. After initially pleading guilty to the charges, the defendant retained substitute counsel<br />

<strong>and</strong> withdrew his plea. The defendant then hired a computer forensics expert to review the<br />

electronic evidence gathered through the search warrant. The expert testified via affidavit that<br />

numerous files were accessed <strong>and</strong> created months after the laptop had been seized by the<br />

government, making the data completely unreliable <strong>and</strong> unusable. The government’s expert<br />

responded that battery malfunction caused the erroneous files <strong>and</strong> access dates. The court held<br />

that while the government may have been negligent, the defendant was not prejudiced, <strong>and</strong><br />

therefore denied the defendant’s motions to dismiss, suppress the evidence, <strong>and</strong> to hold a hearing<br />

to debate the evidentiary foundation of the affidavit relied on in issuing the search warrant.<br />

California<br />

� Calvert v. Red Robin Int’l, Inc., 2012 WL 1668980 (N.D. Cal. May 11, 2012). In this wage <strong>and</strong><br />

hour class action, the defendant motioned to impose sanctions <strong>and</strong> disqualify the class<br />

representative for failing to disclose relevant evidence in the form of Facebook conversations with<br />

putative class members. After the plaintiff failed to submit initial disclosures on three separate<br />

occasions, the defendant made a request for production of documents, <strong>and</strong> the plaintiff moved for<br />

class-wide discovery. Upon deposing the plaintiff, the defendant learned of the plaintiff’s repeated<br />

cycle of attempts to contact putative class members in an attempt to recruit additional class<br />

members, as well as to suborn perjury. Despite several requests for these messages, the plaintiff<br />

claimed ignorance of such conversations, blamed counsel for insufficient production, <strong>and</strong> testified<br />

that they did not delete any content. Once the defendant filed a motion to disqualify the plaintiff as<br />

class representative, several incomplete Facebook conversations were produced—many of which<br />

contradicted the plaintiff’s earlier assertions. Reviewing the plaintiff’s conduct, the court found<br />

repeated non-compliance with basic discovery obligations <strong>and</strong> disqualified the plaintiff as class<br />

representative. Additionally, due to the plaintiff’s bad faith efforts to suborn perjury, the court<br />

imposed sanctions in the amount of $15,985.<br />

� In re Online DVD Rental Antitrust Litig., 2012 WL 1414111 (N.D. Cal. April 20, 2012). In this<br />

antitrust litigation, the plaintiffs motioned for review of the clerk’s award of $737,838.79 in taxable<br />

costs. In its analysis, the court took note of “the Third Circuit’s well-reasoned opinion in Race Tires<br />

Am., Inc. v. Hooiser Racing Tire Corp.,” which limited taxable costs to a very narrow reading of 28<br />

U.S.C. § 1920, but identified the “absence of directly analogous Ninth Circuit authority.” Thus, the<br />

court concluded that a broad reading of § 1920 for e-discovery costs was most appropriate in this<br />

matter. Reviewing the taxation award, the court denied costs taxed for production of black <strong>and</strong><br />

white copies of PowerPoint slides, restamping of documents, <strong>and</strong> transcripts—totaling<br />

approximately $27,000. With regard to the rest of the e-discovery costs, the court declined to deny<br />

them, modifying the taxation award to $710,194.23, for which payment was stayed pending further<br />

appeal of the court’s decision.<br />

221


� In re National Ass’n of Music Merchants, 2011 WL 6372826 (S.D. Cal. Dec. 19, 2011). In this<br />

antitrust litigation, the plaintiffs moved for a nine-day extension of a previously-extended discovery<br />

deadline. Among other contentions, the plaintiffs argued that the defendants’ delays made it<br />

difficult to review late productions, identify deponents <strong>and</strong> complete ten depositions by the<br />

deadline. In response, the defendants argued that the plaintiffs were not diligent in pursuing<br />

discovery <strong>and</strong> failed to request their first deposition until two weeks before the deadline. The court<br />

granted the plaintiffs’ request for an extension of the discovery deadline, but disallowed further<br />

depositions without court permission. Next, the plaintiffs requested that each defendant run<br />

additional document searches containing abbreviations <strong>and</strong> acronyms for agreed-upon search<br />

terms, based upon the realization that the defendants’ search within relevant ESI did not capture<br />

the agreed-upon universe of responsive documents. Citing Fed.R.Civ.P. 26(b)(2)(B), the court<br />

emphasized the importance of cooperation in e-discovery, holding that the plaintiff squ<strong>and</strong>ered<br />

ample opportunities to meet <strong>and</strong> confer with defendants for additional discovery <strong>and</strong> that the<br />

burden to the defendants in complying with the request would outweigh its likely benefit.<br />

Acknowledging that the defendants already incurred significant discovery expenses, the court<br />

permitted further ESI searches if the plaintiff was willing to bear the cost.<br />

� Jardin v. DATAllegro, Inc., 2011 WL 4835742 (S.D.Cal. Oct. 12, 2011).<br />

In this patent infringement litigation, the plaintiff objected to a taxation of costs award for the<br />

defendants, who prevailed on summary judgment. Specifically, the plaintiff requested that the court<br />

"stay, deny, or re-tax" portions of the award for the costs of converting data to TIFF format <strong>and</strong> a<br />

for a project manager who oversaw the conversion process. The plaintiff also motioned to deny<br />

costs entirely based on economic disparity between the plaintiff <strong>and</strong> Microsoft, the defendant’s<br />

parent company. First addressing the plaintiff’s economic disparity argument, the court denied on<br />

grounds that Microsoft was not a party <strong>and</strong> further noted that an economic disparity argument<br />

required limited financial resources, which the plaintiff’s earlier assertions contradicted. Turning to<br />

the TIFF conversion discussion, the court noted the variety of file formats in which the plaintiffs<br />

produced ESI, <strong>and</strong> considered the TIFF conversion done "in lieu of making traditional paper<br />

copies," thus within the scope of Federal Rule of Civil Procedure 54’s language. Finally, the court<br />

considered the work done by the project manager substantially different than the work done by an<br />

attorney or paralegal because it was confined solely to physical production <strong>and</strong> required no<br />

"intellectual efforts." Thus, the court denied motions to deny or re-tax the award.<br />

� Couch v. Wan, 2011 WL 2971118 (E.D. Cal. July 20, 2011). In this RICO action, the plaintiffs<br />

sought reconsideration of a magistrate judge’s order requiring the parties to share costs of the<br />

plaintiffs’ requests for ESI. The plaintiffs argued the cost-shifting order was contrary to law because<br />

the requested data was stored on reasonably accessible hard drives or optical drives. Alternatively,<br />

the plaintiffs argued that cost-shifting was premature because they should not have to "bear the<br />

burden" of sharing costs for the initial 140 gigabytes of data identified by the defendants, which<br />

likely contains irrelevant <strong>and</strong> unrequested information. Finding for the defendants, the court noted<br />

that the plaintiffs’ unsupported assertions that the $54,000 estimated cost to produce the requested<br />

ESI was exaggerated <strong>and</strong> that hard drives are accessible did not support a finding that the ruling<br />

was clearly contrary to law. In denying the motion, the court also admonished the plaintiffs for<br />

seeking reconsideration without the benefit of first attending the court ordered meet <strong>and</strong> confer<br />

session, noting this failure was currently the only issue of prematurity.<br />

� In re Google Inc. St. View Elec. Commc’ns Litig., 2011 WL 2571632 (N.D. Cal. June 29, 2011).<br />

In this class action litigation, the defendant moved to dismiss claims alleging violations of the<br />

federal Wiretap Act <strong>and</strong> various state wiretap statutes. Although the defendant admitted it had used<br />

222


"wireless sniffers" to intercept approximately 600 GB of information containing whole e-mails,<br />

usernames, passwords <strong>and</strong> other private data in over 30 countries, it argued the communications<br />

were sent over unencrypted Wi-Fi networks <strong>and</strong> were thus readily accessible to the general public<br />

as excepted under the Wiretap Act. In response, the plaintiff argued the readily accessible<br />

exception applied only to radio communications. Turning to the legislative history to interpret the<br />

structure <strong>and</strong> intent of the Act, the court found the exception applied to all electronic<br />

communications rather than the more narrowly defined radio communications. But the court<br />

rejected Google’s broader argument because Wi-Fi networks, like cellular communications, are<br />

designed to make intentional monitoring by third parties difficult. Absent the use of "rare packet<br />

sniffing software" – a technology not possessed by the general public – the court found that<br />

intercepting information over Wi-Fi networks would be extremely difficult, <strong>and</strong> thus falls outside the<br />

readily accessible exception. Accordingly, the court denied the motion to dismiss the federal<br />

wiretap allegations.<br />

� Adams v. AllianceOne, Inc., 2011 WL 2066617 (S.D. Cal. May 25, 2011). In this class action suit,<br />

the plaintiff requested $17,076.06 in sanctions arguing the defendant committed discovery abuse<br />

by producing over 20 million pages of documents in unsearchable PDFs. In response, the<br />

defendant argued a PDF was the most useable format available because data extraction from its<br />

third party, proprietary software storage system rendered the data unreadable “mush” that could<br />

become readable only via printing (impractical due to the volume) or PDF conversion. Further, the<br />

PDFs could be searched using commercially available software. Finding the plaintiff did not specify<br />

a desired format <strong>and</strong> noting that past production practices do not dictate future requirements<br />

absent a party agreement, the court found no basis on which to impose sanctions. The court<br />

additionally found the information was usable <strong>and</strong> searchable, that translating data between<br />

formats was permissible under the Fed.R.Civ.P. <strong>and</strong> that there was insufficient evidence the<br />

defendant acted with willful intent. Although the court remained “less than pleased” with the<br />

defendant’s past discovery delays, it withdrew its informal recommendation for sanctions <strong>and</strong><br />

denied the motion.<br />

� United States v. Salyer, 2011 WL 1466887 (E.D. Cal. Apr. 18, 2011). In this criminal antitrust <strong>and</strong><br />

racketeering litigation, the defendant requested the creation of a web-based, common database to<br />

review the mass of documentation – estimated at 1 to 2 terabytes – collected by the government<br />

over a ten year investigation. Identifying numerous issues, including the size of information,<br />

resources <strong>and</strong> technological learning curve of defense counsel, need to review all discovery <strong>and</strong><br />

the inability to agree, the court noted that when information "reaches the hundreds of<br />

gigabytes/terabytes stage, the government should consider whether everyone is better served if<br />

this information is placed in a common database" (emphasis in original). However, in consideration<br />

of the high costs involved, estimated to be between $350,000 <strong>and</strong> $2 million, <strong>and</strong> finding there was<br />

neither a clear benefit to the parties nor authority of the court to compel such a contribution, the<br />

court declined to recommend delay of the motion schedule or compel creation of the database.<br />

Nonetheless, the court recommended the defendant file, ex parte, a Criminal Justice Act request<br />

for financial assistance.<br />

� In re Facebook PPC Adver. Litig., 2011 WL 1324516 (N.D. Cal. Apr. 6, 2011). In this breach of<br />

contract litigation, the plaintiffs sought resolution of various production disputes including a<br />

disagreement regarding the development of an <strong>Electronic</strong>ally Stored Information (ESI) Protocol.<br />

Rejecting as speculative the defendant’s concern that entering an ESI Protocol would frustrate <strong>and</strong><br />

slow the discovery process, the court ordered the parties to meet <strong>and</strong> confer to develop an ESI<br />

Protocol in light of the "clear thrust of the discovery-related rules, case law, <strong>and</strong> commentary,"<br />

223


including the Federal Rules of Civil Procedure, case law <strong>and</strong> the Sedona Conference® that<br />

suggest communication is crucial to a successful discovery process. Turning to the production<br />

disputes, the court prohibited the defendant from using a secure <strong>and</strong> restrictive document-viewing<br />

website in lieu of actual production, finding the website was unduly burdensome, inefficient <strong>and</strong><br />

unnecessary in light of a two-tiered protective order. The court also ordered the defendants to<br />

reproduce unusable, non-searchable files – including an 18,000 page customer complaint<br />

database – in their native format, disclose relevant source code, <strong>and</strong> meet <strong>and</strong> confer to determine<br />

the appropriate method of production for proprietary documents relating to the dispute.<br />

� Coleman v. Sterling, 2011 WL 1099793 (S.D. Cal. Mar. 24, 2011). In this employment litigation,<br />

the plaintiffs, former executives of the defendant company, sought unredacted copies of four<br />

investigative reports prepared by a private law firm concerning alleged misconduct. Arguing the law<br />

firm provided legal advice or analysis on certain legal issues, the defendant redacted nine pages<br />

citing attorney-client privilege <strong>and</strong> work product doctrine from the 364 pages of the reports<br />

produced. In finding that privilege <strong>and</strong> work product protection applied to the documents, the court<br />

noted that each page of the reports was marked as confidential, was prefaced with a warning to<br />

that effect, contained legal advice <strong>and</strong> analysis, <strong>and</strong> was prepared under the prospect of litigation.<br />

However, the court determined the defendant disclosed substantially all of the communications <strong>and</strong><br />

relied on counsel’s advice to justify its termination of the plaintiffs. In reliance of those facts <strong>and</strong><br />

Federal Rule of Evidence 502(a), the court found the defendant waived privilege <strong>and</strong> ordered it to<br />

produce unredacted copies of the reports.<br />

� Techsavies, LLC v. WDFA Mktg. Inc., 2011 WL 723983 (N.D. Cal. Feb. 23, 2011). In this<br />

discovery dispute, the plaintiff requested sanctions alleging the defendant failed to both timely<br />

produce documents <strong>and</strong> respond to an interrogatory. Despite the plaintiff’s multiple complaints that<br />

the first production of 32,000 documents was incomplete, the defendant did not produce<br />

approximately 120,000 additional responsive documents until after discovery closed, claiming it<br />

"moved offices <strong>and</strong> simply forgot about them." Agreeing the defendant was on notice of its<br />

inadequate responses, the court found the defendant had an affirmative duty to investigate but<br />

failed to do so in a timely manner. Further, the defendant did not seek leave of the court before<br />

correcting its production. Concluding the defendant was unable to show its conduct was<br />

substantially justified or harmless, the court held sanctions were appropriate; however, the court<br />

also noted that the plaintiff contributed to the problems as it never moved to compel discovery.<br />

Thus, the court barred the defendant from introducing <strong>and</strong> relying on any untimely produced<br />

documents <strong>and</strong> ordered the parties to meet <strong>and</strong> confer regarding this issue.<br />

� Muniz v. United Parcel Serv., Inc., 2011 WL 311374 (N.D. Cal. Jan. 28, 2011). In this<br />

employment discrimination litigation, the plaintiff moved to quash the defendants’ third party<br />

subpoena seeking additional documentation related to the plaintiff’s previous motion for attorney<br />

fees. Among the documentation sought by the defendants were postings by the attorney on<br />

listservs <strong>and</strong> social media networks (including LinkedIn <strong>and</strong> Facebook). To demonstrate the<br />

relevancy of the dem<strong>and</strong>, the defendants submitted postings from the attorney’s Facebook page<br />

<strong>and</strong> listservs. Denying the defendants’ request for this information, the court found the subpoena<br />

was not appropriately geared toward revealing information relevant to the fee dispute <strong>and</strong> ordered<br />

the postings submitted by the defendants to be removed from the record. The court also noted that<br />

the dispute had already "spiraled into the kind of ‘wasteful <strong>and</strong> time consuming satellite litigation’<br />

that should not occur in…post-trial fee disputes."<br />

� Holmes v. Petrovich Dev. Co., LLC, 2011 WL 117230 (Cal. App. 3 Dist. Jan. 13, 2011). In this<br />

employment litigation, the plaintiff appealed the trial court‘s finding that attorney-client<br />

224


communications sent over her work computer were not privileged. Regarding the transmission of<br />

electronic communications in the workplace, the court stated that privilege does not extend to when<br />

the employee uses the employer‘s systems, is advised that the communications are not private,<br />

<strong>and</strong> is aware of <strong>and</strong> agrees to these conditions. Although the attorney-client communication was<br />

sent via the employer‘s e-mail account <strong>and</strong> the plaintiff was informed of the usage policy, she<br />

argued communications were not monitored in practice <strong>and</strong> this contradiction provided her a<br />

reasonable expectation of privacy. Distinguishing the factual circumstances from City of Ontario v.<br />

Quon <strong>and</strong> Stengart v. Loving Care Agency, Inc., the court noted that “absent a company<br />

communication…explicitly contradicting” company policy, it is immaterial whether the company<br />

actually monitors communications. The court analogized the usage of an employer‘s<br />

communication systems to consulting an attorney in the employer‘s “conference rooms, in a loud<br />

voice, with the door open, yet unreasonably expecting that the conversation overheard” <strong>and</strong><br />

accordingly affirmed the trial court‘s finding that attorney-client privilege did not apply.<br />

� Brinckerhoff v. Town of Paradise, 2010 WL 4806966 (E.D. Cal. Nov. 18, 2010). In this<br />

employment discrimination litigation, the parties moved to compel discovery <strong>and</strong> production, obtain<br />

protective orders <strong>and</strong> impose sanctions. Among its motions to compel, the plaintiff sought<br />

production of responsive e-mails in their native format. Although the Federal Rules of Civil<br />

Procedure do not require a party to produce e-mails in their native format, the court noted this does<br />

not permit the party to produce the information in a form that “makes it more difficult or<br />

burdensome for the requesting party to use…efficiently.” The court acknowledged that both parties<br />

possess a mutual obligation to discuss electronic discovery at the Rule 26(f) conference <strong>and</strong><br />

considered the plaintiff’s failure to address e-discovery in both the conference <strong>and</strong> in her<br />

production requests. The belated request for native production along with the determination that<br />

the plaintiff would not be “hard pressed” to review the approximately 4,000 pages of e-mails<br />

produced, led the court to deny the plaintiff’s request with the exception of one document – for<br />

which the metadata would likely reveal useful information. Admonishing both parties for exhibiting<br />

unprofessional conduct, the court denied sanctions.<br />

� The Sunrider Corp. v. Bountiful Biotech Corp., 2010 WL 4590766 (C.D. Cal. Oct. 8, 2010). In<br />

this intellectual property litigation, the plaintiffs renewed their motion for terminating sanctions,<br />

alleging the defendant repeatedly perjured himself in an effort to thwart discovery, failed to comply<br />

with self-executing discovery obligations imposed by the federal rules <strong>and</strong> failed to comply with<br />

discovery orders. Analyzing the appropriateness of terminating sanctions, the court found the<br />

defendant acted with “disingenuousness, dishonesty, disregard of discovery obligations, <strong>and</strong><br />

disobedience of court orders.” Further, the court found prejudice to the plaintiff in that the<br />

defendant willfully <strong>and</strong> repeatedly gave perjurious testimony <strong>and</strong> other non-credible sworn<br />

statements, failed to produce (or belatedly <strong>and</strong> incompletely produced) responsive documents,<br />

breached his duty to supplement discovery responses <strong>and</strong> failed to comply with a discovery order<br />

requiring him to provide information relevant to evidence spoliation. In addition, the caretaker<br />

entrusted with the defendant’s personal <strong>and</strong> business affairs destroyed <strong>and</strong> failed to preserve<br />

documents, leaving no method to determine what documents were destroyed. Finding that the<br />

responsive documents were within the defendant’s possession, custody or control, the court<br />

determined the defendant breached his duty to preserve <strong>and</strong> recommended the motion for<br />

terminating sanctions be granted, the defendant’s answer be stricken <strong>and</strong> default judgment be<br />

entered against the defendant.<br />

� In re Toyota Motor Corp. Unintended Acceleration Mktg., Sales Practices, <strong>and</strong> Prods. Liab.<br />

Litig., 2010 WL 2901798 (C.D. Cal. July 20, 2010). In this products liability litigation, the court<br />

225


entered a preservation order based on the parties’ submissions regarding preservation methods<br />

<strong>and</strong> categories of content to be preserved for production <strong>and</strong> use in the ongoing multidistrict<br />

litigation. Among the ESI preservation requirements, the parties were ordered to retain existing<br />

documents in their existing form or in a reasonably usable format that would not result in loss of<br />

content or usability, including the preservation of metadata <strong>and</strong> e-mail attachments. Additionally, all<br />

subsequently created ESI was required to be retained in original or native format, or copied to an<br />

alternative storage device or media. The order also provided instructions for the identification of<br />

custodians <strong>and</strong> specified data that was not required to be preserved, such as “system” data<br />

created by the normal operation of computer systems. Finally, the order identified the permissible<br />

modifications <strong>and</strong> alterations of documents generally resulting from the routine maintenance <strong>and</strong><br />

operation of computer systems.<br />

� Multiven, Inc. v. Cisco Sys. Inc., 2010 WL 2813618 (N.D. Cal. July 9, 2010). In this antitrust<br />

litigation, the court adopted the magistrate judge’s recommendation directing the plaintiff <strong>and</strong><br />

counter-defendant to retain a third party vendor for assistance with further data collection, search,<br />

review <strong>and</strong> production. Having earlier rejected the idea of using an outside vendor, the producing<br />

parties instead relied on approximately five attorneys to review a “giant mass of information”<br />

without using search terms. Concerned by the looming discovery deadline <strong>and</strong> anticipating “no end<br />

in sight” to the process, the court agreed that “something must be done.” The court approved the<br />

order recommending that a vendor “assist with this increasingly perilous situation,” with the<br />

defendant paying half of the costs as it so offered. Noting that “there are several more [discovery]<br />

problems on the horizon,” the court additionally recommended granting full authority to a previously<br />

appointed special master to help the parties resolve any further discovery issues, such as choosing<br />

a third party vendor if the parties could not reach an agreement, crafting a search protocol <strong>and</strong><br />

establishing deadlines.<br />

� Crispin v. Christian Audigier, Inc., 2010 WL 2293238 (C.D.Cal. May 26, 2010). In this dispute<br />

over artwork licensing, the plaintiff moved to quash the defendants’ subpoenas on the social<br />

networking sites Facebook, MySpace, Inc. <strong>and</strong> Media Temple, Inc., which sought the plaintiff’s<br />

basic subscriber information <strong>and</strong> certain electronic communications. Appealing the magistrate<br />

judge’s order, the plaintiff claimed the Stored Communications Act (SCA) prohibits third-party<br />

Internet Service Providers from disclosing such communications. Agreeing with the plaintiff that<br />

some communications sought were not strictly “public,” the court quashed the subpoenas that<br />

sought private messaging (such as e-mail-type communications). With respect to the portion of<br />

subpoenas that sought information from the plaintiff’s Facebook wall <strong>and</strong> MySpace postings <strong>and</strong><br />

comments, the court vacated <strong>and</strong> rem<strong>and</strong>ed for further investigation to determine the plaintiff’s<br />

privacy settings <strong>and</strong> the extent of access allowed to his Facebook wall <strong>and</strong> MySpace comments.<br />

� Qualcomm Inc. v. Broadcom Corp., No. 05cv1958-B (S.D.Cal. Apr. 2, 2010). In this patent<br />

infringement litigation, the plaintiff was sanctioned $8.5 million for egregious discovery misconduct.<br />

Six of the plaintiff’s attorneys, who were personally sanctioned for assisting in the plaintiff’s<br />

withholding of critical information <strong>and</strong> failure to conduct reasonable inquiries into the plaintiff’s<br />

productions, filed objections to the sanctions order. The court determined the “fundamental<br />

problem…was an incredible breakdown in communication…that permeated all of the relationships.”<br />

In addition, outside counsel failed to meet with appropriate employees of the plaintiff, underst<strong>and</strong><br />

how the plaintiff’s computer system was organized <strong>and</strong> take supervisory responsibility to verify<br />

necessary discovery was conducted. Citing Fed.R.Civ.P. 26, the court determined that, despite the<br />

“massive discovery failure” <strong>and</strong> “number of poor decisions,” sanctions against the individual<br />

attorneys for discovery failures were unwarranted as the attorneys did not act in bad faith. The<br />

226


court also determined the attorneys made repeated efforts to verify accuracy of the plaintiff’s<br />

discovery responses <strong>and</strong> noted the lack of c<strong>and</strong>or demonstrated by some of the plaintiff’s<br />

employees.<br />

� Wixon v. Wyndham Resort Dev. Corp., 2009 WL 3075649 (N.D. Cal. Sept. 21, 2009). In this<br />

litigation, the parties filed several motions regarding the special master’s report. The report found<br />

the defendants’ violation of a previous production agreement was harmless but still held the<br />

defendants responsible for 75 percent of the fees related to the special master proceeding. In<br />

particular, the plaintiffs objected to the special master’s finding that the defendants’ noncompliant<br />

production was harmless. Addressing the timeliness of the production, the court upheld the report<br />

with respect to 47 of the documents because they did not contain any keywords selected by the<br />

plaintiffs. However, the court rejected the portion of the report that pertained to the defendants’<br />

failure to produce documents stored on a "shared" directory in a timely manner, noting the<br />

defendants should have noticed a flaw in the custodian-based search when a group of potentially<br />

relevant documents had no custodian. Based on this failure, the court issued sanctions, which<br />

included requiring the defendants to bear expenses incurred by the plaintiffs in preparing the<br />

motion to strike <strong>and</strong> the full cost of the special master’s fees.<br />

� United States v. Comprehensive Drug Testing, Inc., 2009 WL 2605378 (Cal. App. 9 Dist. Aug.<br />

26, 2009). In this federal investigation into steroid use by professional baseball players, the<br />

government appealed three orders entered by separate courts in the Ninth Circuit relating to the<br />

search <strong>and</strong> seizure of electronic information. The government argued it complied with the protocols<br />

set forth in United States v. Tamura <strong>and</strong> also that it was allowed to seize any additional data<br />

related to other players’ steroid use under the plain view exception of the Fourth Amendment.<br />

Labeling the government’s argument as "too clever by half," the court determined the government<br />

should "forswear reliance on the plain view doctrine or any similar doctrine" regarding seizure of<br />

data requiring segregation. The court also held that any future search warrant application should<br />

include a protocol that prevents agents from examining or retaining data other than that specified in<br />

the warrant, which may require segregation to be conducted by an independent third-party to<br />

protect privacy interests. Finally, the court acknowledged the reality that over-seizure of data is part<br />

of the electronic search process <strong>and</strong> issued five guidelines magistrate judges must follow when the<br />

government seeks a warrant regarding examination of electronic media. The guidelines aimed "to<br />

strike the proper balance between the government’s legitimate interest in law enforcement <strong>and</strong> the<br />

people’s right to privacy <strong>and</strong> property . . . as guaranteed by the Fourth Amendment."<br />

� Doppes v. Bentley Motors, Inc., 94 Cal. Rptr. 3d 802 (Cal. App. 4 Dist. June 2009). In this<br />

warranties <strong>and</strong> consumer fraud case, the plaintiff appealed a jury verdict, arguing the trial court<br />

abused its discretion by choosing to impose an adverse jury instruction <strong>and</strong> monetary sanctions<br />

instead of terminating sanctions against the defendant for discovery abuses. Prior to trial, the<br />

defendant failed to produce documents by the initial court-ordered production date <strong>and</strong> violated<br />

four discovery orders. After trial began, the plaintiff’s attorney reviewed e-mails produced by the<br />

defendant <strong>and</strong> renewed its prior motion for terminating sanctions, asserting that the defendant had<br />

failed to locate, withheld or destroyed relevant electronic documents. The court of appeals<br />

determined the defendant had stonewalled in producing highly relevant documents resulting in<br />

severe prejudice to the plaintiff, <strong>and</strong> that the defendant’s repeated <strong>and</strong> egregious violations of<br />

discovery laws threatened the integrity of the judicial process. While the court of appeals held that<br />

the trial court did not initially abuse its discretion in denying the plaintiff’s request for terminating<br />

sanctions, the duty to impose the severe sanctions arose when the trial court learned during trial<br />

that the defendant had failed miserably to comply with the discovery orders. Accordingly, the court<br />

227


of appeals reversed the trial court judgment <strong>and</strong> rem<strong>and</strong>ed with directions to enter a default<br />

judgment against the defendant. The court also awarded attorneys’ fees to the plaintiff in the<br />

amount of $402,187 in connection with discovery proceedings.<br />

� Oz Optics Ltd. v. Hakimoglu, 2009 WL 1017042 (Cal. App. 1 Dist. Apr. 15, 2009). In this<br />

employment dispute, both parties appealed the denial of their respective motions for judgment<br />

notwithst<strong>and</strong>ing the verdict (JNOV). The defendant argued that the court improperly allowed expert<br />

forensic testimony alleging it was "devoid of substance" <strong>and</strong> improperly awarded $90,000 in<br />

monetary sanctions based on the defendant’s hard drive file scrubbing. The plaintiff argued that the<br />

court abused its discretion by limiting sanctions to $90,000. The court of appeals affirmed the trial<br />

court on all grounds. First, the court rejected the defendant’s argument that the forensic testimony<br />

was prejudicial, citing the defendant’s inability to demonstrate why the testimony was inappropriate.<br />

Second, the court affirmed the sanctions as reasonable compensation for attorney’s fees, costs<br />

<strong>and</strong> expenses incurred as a result of the defendant’s discovery misconduct. In affirming, the court<br />

rejected the defendant’s argument that the spoliation was unintentional, determining that intent is<br />

not required for monetary sanctions under the California Code of Civil Procedure. The court also<br />

rejected the plaintiff’s argument that the monetary sanctions did not provide full compensation for<br />

reasonable expenses, finding the plaintiffs failed to establish the amount awarded was "arbitrary,<br />

capricious or whimsical."<br />

� Keithley v. Homestore.com, Inc., 2009 WL 816429 (N.D.Cal. Mar. 27, 2009). In this ongoing<br />

patent infringement litigation, the plaintiffs sought $1,379,410.50 in additional sanctions from the<br />

August 12, 2008 order (awarding the plaintiffs over $250,000 in fees <strong>and</strong> costs). The court awarded<br />

$282,970.37 in additional sanctions on the following issues: prevailing on the motion to compel;<br />

fees <strong>and</strong> costs incurred due to the defendants’ belated production; <strong>and</strong> fees <strong>and</strong> costs in taking<br />

discovery on late-produced reports, reducing the amount of requested sanctions by between five to<br />

ten percent to account for any inefficiency by the plaintiffs. The court denied the plaintiffs’ request<br />

for fees <strong>and</strong> costs incurred in seeking sanctions <strong>and</strong> ordered the plaintiffs to file a reply brief to the<br />

defendants’ objections to costs incurred by the plaintiffs’ expert.<br />

� United States v. Maxxam, Inc., 2009 WL 817264 (N.D.Cal. Mar. 27, 2009). In this False Claims<br />

Act qui tam action, the plaintiffs sought sanctions alleging spoliation of an important document,<br />

known as the sustained yield plan, central to their case. The court first determined the defendants<br />

were responsible for preserving the evidence despite it being possessed by a third party <strong>and</strong> then<br />

determined that relevant evidence was not preserved. However, the court denied the plaintiffs’<br />

motion because they did not satisfy their burden of establishing the evidence was destroyed after<br />

the duty to preserve arose, despite being "troubled" by the fact that the defendants did not issue a<br />

litigation hold notice to the third party.<br />

� Viacom Int’l, Inc. v. YouTube, Inc., 2009 WL 102808 (N.D.Cal. Jan. 14, 2009). In this ongoing<br />

copyright infringement litigation, the defendants sought documents from a third party via a<br />

subpoena duces tecum. (The third party was hired by the plaintiffs to monitor the defendant’s<br />

website for infringing materials.) The subpoena contained thirteen document requests for<br />

documents relating to the third party’s relationship with the plaintiffs <strong>and</strong> its actions with regard to<br />

monitoring <strong>and</strong> identifying infringing materials. The third party objected to the subpoena, arguing it<br />

was overly broad <strong>and</strong> imposed an undue burden. Finding the information sought to be relevant <strong>and</strong><br />

the economic burden to be lessened due to the plaintiffs’ reimbursement of legal expenses, the<br />

court overruled the third party’s objections <strong>and</strong> ordered compliance with the subpoena.<br />

Additionally, the court ordered the third party to provide privilege logs <strong>and</strong> an affidavit outlining the<br />

response methodology used.<br />

228


� Keithley v. Homestore.com, Inc., 2009 WL 55953 (N.D.Cal. Jan. 7, 2009). In this ongoing patent<br />

infringement litigation, the defendants sought $391,903.51 in additional sanctions. The sanctions<br />

sought were based on two categories: costs the defendants incurred in securing production <strong>and</strong><br />

costs relating to the use of materials produced late. After considering each specific monetary<br />

request, the court awarded a total of $205,507.53 to the defendants: $72,281.71 attributable to<br />

depositions costs; $11,606.00 for the costs incurred in preparing the documents for deposition; <strong>and</strong><br />

$428.83 for subpoena costs. The court also ordered the plaintiffs to pay the lodging expenses<br />

incurred during the re-depositions.<br />

� Keithley v. Homestore.com, Inc., 2008 WL 5234270 (N.D.Cal. Dec. 15, 2008). In this ongoing<br />

patent infringement litigation, the defendants objected to the magistrate judge’s report <strong>and</strong><br />

recommendation for monetary sanctions. The defendants objected to the monetary sanctions<br />

arguing: (1) the spoliation of source code is not sanctionable; (2) they reasonably believed they<br />

had complied with a previous production order; (3) appropriate document retention <strong>and</strong> litigation<br />

hold policies were in place; <strong>and</strong> (4) sanctions, if warranted, should only be imposed on the<br />

defendant Move (formerly homestore.com). Declining to find the magistrate’s report <strong>and</strong><br />

recommendation clearly erroneous, the court adopted it.<br />

� Keithley v. Home Store.com, Inc., 2008 WL 4830752 (N.D.Cal. Nov. 6, 2008). In this ongoing<br />

patent infringement litigation, the defendants sought multiple types of sanctions alleging the<br />

plaintiffs produced documents too late <strong>and</strong> committed spoliation. The defendants argued the late<br />

production <strong>and</strong> spoliation were prejudicial, caused them to conduct last-minute “triage” discovery<br />

<strong>and</strong> prevented them from conducting important depositions. Finding the belated production <strong>and</strong><br />

failure to produce e-mail attachments to be negligent, the magistrate judge issued sanctions under<br />

Rule 37, awarding fees <strong>and</strong> costs reasonably attributed to the spoliation. Additionally, the court<br />

extended the discovery cutoff date for the limited purpose of allowing the defendants to take<br />

additional depositions.<br />

� Dong Ah Tire & Rubber Co., Ltd. v. Glasforms, Inc., 2008 WL 4298331 (N.D.Cal. Sept. 19,<br />

2008). In this sales contract litigation, the defendant/third-party plaintiff moved for adverse<br />

inference <strong>and</strong> monetary sanctions, claiming the third-party defendant intentionally destroyed <strong>and</strong><br />

refused to produce relevant documents. The third-party defendant argued sanctions were<br />

inappropriate, arguing no duty to preserve existed as litigation was not anticipated prior to the date<br />

the suit was filed. Additionally, the third party defendant claimed that any document destruction<br />

occurred in accordance with the established document destruction policy. Frustrated with the lack<br />

of information on record, the court ordered the parties to file supplemental briefs addressing<br />

several specific issues, including: what evidence was destroyed, when it was destroyed, when<br />

litigation could have been reasonably anticipated <strong>and</strong> why the document destruction policy was not<br />

followed.<br />

� Cartwright v. Viking Indus., Inc., 2008 WL 4283614 (E.D.Cal. Sept. 11, 2008). In this products<br />

liability class action, the plaintiffs filed a motion to compel production of defendants’ privilege log<br />

identifying withheld documents, <strong>and</strong> the defendants’ moved for a protective order. The plaintiffs<br />

argued the defendants’ failure to provide a privilege log should result in a waiver of privilege. The<br />

defendants countered that production requests should be narrowly construed to not seek privileged<br />

information, <strong>and</strong> that any such production would be unduly burdensome. Disagreeing with the<br />

defendants’ undue burden argument, the court ordered production of the privilege log. However,<br />

the court did not believe a waiver of privilege was appropriate, noting the delay was excusable due<br />

to a mutual misunderst<strong>and</strong>ing.<br />

229


� Nursing Home Pension Fund v. Oracle Corp., 2008 WL 4093497 (N.D.Cal. Sept. 2, 2008). In<br />

this securities class action, the plaintiffs sought a default judgment or, alternatively, an adverse<br />

inference sanction. To support the motion, plaintiffs alleged the defendants: engaged in inadequate<br />

preservation efforts after receiving notice of the litigation; failed to preserve backup tapes; <strong>and</strong><br />

failed to preserve transcripts <strong>and</strong> audio files. Declining to issue default judgment, the court found<br />

that the plaintiffs had not demonstrated the degree of prejudice necessary to warrant such<br />

sanctions, noting that the alleged misconduct did not “eclipse entirely the possibility of a just result.”<br />

However, the court issued an adverse inference regarding the failure to preserve <strong>and</strong> produce emails<br />

from one of the defendant’s files, noting this failure raised questions of authenticity <strong>and</strong><br />

uncertainty.<br />

� Tierno v. Rite Aid Corp., 2008 WL 3876131 (N.D.Cal. Aug. 19, 2008). In this class action<br />

litigation, the defendant objected to a previous order requiring it to pay copying costs associated<br />

with producing responsive paper documents. See Tierno v. Rite Aid Corp., 2008 WL 3287035<br />

(N.D.Cal. July 31, 2008). The plaintiff argued the defendant’s failure to seek a protective order to<br />

shift costs waived the right of objection. Granting the defendant’s objection, the court held that a<br />

responding party is not obligated to seek a protective order if it complies fully with Fed.R.Civ.P. 34,<br />

which requires the producing party to make the documents available for inspection, but does not<br />

require them to pay copying costs. Notably, the court found it in error that the magistrate judge<br />

applied the Zubulake cost shifting factors, holding such factors inapplicable to the instant case<br />

involving only paper documents. Growing frustrated with the numerous discovery disputes, the<br />

court appointed a special master to avoid wasting judicial resources <strong>and</strong> ordered the parties to split<br />

the costs, unless the special master determined otherwise.<br />

� Dorn-Kerri v. South West Cancer Care, 2008 WL 3914458 (S.D.Cal. Aug. 18, 2008). In this<br />

wrongful termination litigation, the pro se plaintiff moved to compel the defendant to supplement its<br />

response to her request for production of documents. The plaintiff sought a report from her period<br />

of employment in 2004-2005 from a database that updates continually. The defendant responded<br />

that the records no longer exist since the printed records are destroyed post-processing, <strong>and</strong> that<br />

the software program is incapable of producing historical reports, as corroborated by plaintiff’s<br />

expert. Citing the Ninth Circuit’s “repeated admonition that courts construe pro se pleadings <strong>and</strong><br />

motions liberally,” the court imposed a burden on the defendant to prove discovery should not be<br />

allowed. Finding the defendant had met its discovery obligations by demonstrating the reports no<br />

longer tangibly exist <strong>and</strong> are incapable of electronic regeneration, the court denied the motion. The<br />

court stated that if requested material does not exist, it cannot be in the “possession, custody, or<br />

control of a party <strong>and</strong> therefore cannot be produced for inspection.”<br />

� Keithley v. Homestore.com, Inc., 2008 WL 3833384 (N.D.Cal. Aug. 12, 2008). In this patent<br />

infringement litigation, the plaintiffs sought monetary <strong>and</strong> evidentiary sanctions alleging spoliation<br />

of evidence. The defendants’ failure to issue a written document retention policy well after its<br />

preservation duty arose led the court to label the discovery misconduct “among the most egregious<br />

this Court has seen.” Additional factors justifying sanctions included the defendants’ numerous<br />

false <strong>and</strong> misleading representations made to the plaintiffs, in addition to the material<br />

misstatements made to the court. The court ordered the defendants to pay over $250,000 in fees<br />

<strong>and</strong> costs associated with prior <strong>and</strong> future motion practice <strong>and</strong> expert fees, deferring additional<br />

amounts until actual fees can be determined. Furthermore, the court ordered an adverse jury<br />

instruction against the defendants.<br />

� Gippetti v. United Parcel Service, Inc., 2008 WL 3264483 (N.D.Cal. Aug. 6, 2008). In this age<br />

discrimination litigation, the plaintiff sought sanctions for spoliation claiming the defendant<br />

230


destroyed relevant electronic documents, specifically tachographs, which records a vehicle’s speed<br />

<strong>and</strong> length of time it is moving or stationary. The defendant responded that some of the requested<br />

tachographs were destroyed as part of the company’s routine document retention policy, which due<br />

to the large volume of data, called for destruction of the records following 37 days. Additionally, the<br />

defendant argued it was not under a duty to preserve the records because they had no reason to<br />

believe that they had any bearing on the age discrimination claim. Agreeing with the defendant, the<br />

court refused to impose sanctions.<br />

� Tierno v. Rite Aid Corp., 2008 WL 3287035 (N.D.Cal. July 31, 2008). In this class action<br />

employment litigation, the defendant objected to the magistrate judge’s order that required them to<br />

pay the costs of copying responsive paper documents. The court stated, “the seven-factor<br />

Zubulake test which [the magistrate judge] applied is intended solely for electronic discovery, not<br />

for discovery of paper documents.” According to the court, the rule for paper documents is that “[a]<br />

party producing documents will ordinarily not be put to the expense of making copies for the<br />

requesting party.” Relying on these rules, the court held that the magistrate judge clearly erred by<br />

analyzing the cost-shifting dispute under Zubulake, but granted the plaintiffs an opportunity to brief<br />

the cost-shifting issue on other grounds. See also Zubulake v. UBS Warburg, LLC, 217 F.R.D. 309,<br />

322 (S.D.N.Y. 2003).<br />

� United States v. Arnold, 2008 WL 2675794 (Cal. July 10, 2008). In this suit charging the<br />

defendant with transporting child pornography, the government appealed the district court’s ruling<br />

granting the defendant’s motion to suppress evidence seized from his laptop computer by Customs<br />

<strong>and</strong> Border Patrol officers. The defendant argued that laptops were more analogous to a home <strong>and</strong><br />

the human mind rather than closed containers, because of the computer’s ability to record ideas, emails,<br />

chats <strong>and</strong> web habits. Conversely, the government argued reasonable suspicion was not<br />

required under the Fourth Amendment when dealing with border searches due to, “a sovereign’s<br />

inherent authority to protect its territorial integrity.” Finding the district court’s decision erroneous,<br />

the court held that reasonable, particularized suspicion is not required for customs officials to<br />

search a laptop or other personal electronic storage devices at the border.<br />

� L.H. v. Schwarzenegger, 2008 WL 2073958 (E.D. Cal. May 14, 2008). In this class action<br />

litigation, the plaintiffs filed a motion to compel an inadequate privilege log <strong>and</strong> sought sanctions.<br />

The plaintiffs claimed some of the defendants’ privileges were inadequately asserted <strong>and</strong> the<br />

defendants produced electronic documents in a non-searchable PDF format that were searchable<br />

in their native format. The defendants asserted they substantially complied with previous<br />

production orders <strong>and</strong> were not required to provide files natively because the plaintiffs did not<br />

specifically request that production format. Finding the defendants’ behavior representative of<br />

“purposeful foot dragging”, the court determined the defendants’ production of non-searchable<br />

documents violated Fed.R.Civ.P. 34’s requirement that electronic documents be produced in a<br />

reasonably usable form <strong>and</strong> ordered monetary sanctions. Additionally, the court found the<br />

previously produced privilege logs lacking in substance <strong>and</strong> usability, <strong>and</strong> ordered the defendants<br />

to produce a final omnibus privilege log. Finally, the court warned the defendants that it would allow<br />

the plaintiffs to bring a motion for sanctions or a waiver of privilege if the defendants continue to<br />

“abuse the privilege log procedure.”<br />

� R&R Sails, Inc. v. Ins. Co. of Pa., 2008 WL 2232640 (S.D. Cal. April 18, 2008). In this insurance<br />

litigation, the plaintiff sought sanctions <strong>and</strong> preclusion of ESI that the defendants produced after the<br />

discovery deadline. The defendants argued that sanctions were inappropriate because the<br />

untimely production was an “honest mistake” as they initially did not realize the logs existed, <strong>and</strong><br />

then belatedly realized they failed to produce six pages of computer notes from the electronic claim<br />

231


logs. Finding sanctions appropriate under Fed.R.Civ.P. 26(g), the magistrate judge determined a<br />

reasonable inquiry into potentially discoverable material must be made <strong>and</strong> that an “honest<br />

mistake” is not a substantial justification for an incorrect certification made by an attorney.<br />

Additionally, the magistrate justified sanctions under Fed.R.Civ.P. 37(c), citing the defendants’<br />

failure to timely supplement initial disclosures without substantial justification. The magistrate<br />

ordered monetary sanctions <strong>and</strong> recommended precluding the defendants from introducing or<br />

relying on documents <strong>and</strong> ESI that were not produced on time.<br />

� Ruiz v. Ed Richard Discing, Inc., 2008 WL 1925203 (N.D.Cal. April 29, 2008). In this suit alleging<br />

unpaid overtime wages, the plaintiff filed a motion to compel production <strong>and</strong> sought monetary<br />

sanctions. Prior to the hearing, the defendants contacted the plaintiffs to inform that the documents<br />

were available <strong>and</strong> would be produced if the plaintiffs agreed to absorb the costs of copying. The<br />

plaintiffs agreed to pay for costs incurred for copying the documents. Holding the motion to compel<br />

to be technically granted since the documents in dispute have not yet been produced, the court<br />

stated this dispute should never have reached court intervention due to this prior agreement <strong>and</strong><br />

denied the motion for monetary sanctions.<br />

� In re Flash Memory Antitrust Litig., 2008 WL 1831668 (N.D.Cal. April 22, 2008). In this antitrust<br />

litigation, the court issued an Order Regarding Preservation of Evidence <strong>and</strong> reminded the parties<br />

to comply with the duty to preserve all potentially relevant documents, data <strong>and</strong> tangible things in<br />

their possession, custody or control. The court identified documents, data <strong>and</strong> tangible things to<br />

encompass a broad list of electronically stored information, including writings, reports, calendars,<br />

telephone message logs, ledgers, bills, charts, films, <strong>and</strong> phonographic recordings. Additionally,<br />

the court ordered that each party must identify <strong>and</strong> notify non-parties of their duties to preserve<br />

potentially relevant information.<br />

� Qualcomm Inc. v. Broadcom Corp., 2008 WL 638108 (S.D.Cal Mar. 5, 2008). In this underlying<br />

patent infringement case, cross examination of the plaintiff’s witness revealed over 200,000 pages<br />

of undisclosed relevant e-mails during one of the last days of trial. The court, displeased with the<br />

“organized program of litigation misconduct,” ordered the plaintiff’s counsel to show cause as to<br />

why individual sanctions should not be imposed against the attorneys. The attorneys filed a motion<br />

shortly thereafter seeking application of the federal common law self-defense exception which<br />

would have allowed disclosure of attorney-client privileged information at the hearing. On January<br />

7th, 2008, the magistrate judge denied the motion <strong>and</strong> this appeal followed. The Senior District<br />

Court Judge, Rudi M. Brewster, vacated the trial court’s decision as violating the due process rights<br />

of the attorneys to fully defend themselves <strong>and</strong> found the self-defense exception to apply.<br />

� Finley v. Hartford Life & Accident Ins. Co., 2008 WL 509084 (N.D.Cal. Feb. 22, 2008). In this<br />

wrongful termination of disability benefits suit, the plaintiff filed a motion for sanctions alleging the<br />

defendant failed to timely disclose a relevant surveillance video taken of the plaintiff. The plaintiff<br />

sought monetary sanctions reimbursing the costs spent deposing members of the defendant<br />

corporation <strong>and</strong> retaining the services of an expert. Additionally, the plaintiff sought sanctions<br />

against the defendant’s attorney for failure to perform a reasonable inquiry. Citing an<br />

“administrative oversight”, the defendant claimed a reasonable search was conducted <strong>and</strong> upon<br />

discovery of its existence, supplied the full video six months later. In regard to the plaintiff’s claim of<br />

negligence, the attorney argued lack of evidence of bad faith should preclude sanctions.<br />

Disagreeing with the defendant’s position regarding the surveillance video, the court found it<br />

unreasonable to rely on a discovery system with few checks <strong>and</strong> balances. Further, while the court<br />

found the defendant’s attorney negligent in oversight of the discovery process, it refused to issue<br />

232


personal sanctions due to an absence of evidence of bad faith. Of the $57,888.50 sought by the<br />

plaintiff, the court awarded $9,000 as a reasonable sanction.<br />

� United States v. Comprehensive Drug Testing, Inc., 2008 WL 191672 (Cal. Jan. 24, 2008). In<br />

this investigation into illegal steroid use by professional athletes, the government executed a<br />

search warrant seizing computer equipment <strong>and</strong> storage devices, claiming they could not be sorted<br />

on-site due to extensive co-mingling with other data. The defendants sought return of the evidence,<br />

arguing its seizure constituted a callous disregard for the privacy rights of individuals named in the<br />

seized databases. The court, realizing the special complexities caused by ESI <strong>and</strong> the particular<br />

difficulty faced in instances where the data is incomprehensible <strong>and</strong> unusable when outside its<br />

native format, found in favor of the government <strong>and</strong> determined the seizures were reasonable.<br />

� Qualcomm Inc. v. Broadcom Corp., 2008 WL 66932 (S.D.Cal. Jan. 7, 2008). In this patent<br />

infringement litigation, the court found the plaintiffs to have committed “monumental <strong>and</strong><br />

intentional” discovery violations for failing to produce thous<strong>and</strong>s of documents requested in<br />

discovery. Several plaintiffs’ attorneys were ordered to show cause as to why they should not be<br />

personally sanctioned. Finding an absence of good faith participation in the discovery process, the<br />

court upheld the sanction previously issued, ordering Qualcomm to pay the defendant’s attorney’s<br />

fees in excess of $8.5 million. Additionally, the court sanctioned six attorneys for intentionally hiding<br />

or recklessly ignoring relevant documents <strong>and</strong> blindly accepting Qualcomm’s claims that the<br />

searches were adequate. The six attorneys were ordered to forward the sanction order to the<br />

California State Bar for review <strong>and</strong> consideration of possible further disciplinary actions due to<br />

violation of their ethical duties. Additionally, the attorneys were instructed to participate in a <strong>Case</strong><br />

Review <strong>and</strong> Enforcement of <strong>Discovery</strong> Obligations (CREDO) program. The court believed<br />

participation in this program may deter future discovery misconduct by providing a “road map” to<br />

assist in underst<strong>and</strong>ing ethical obligations during the discovery process as well as establish a<br />

turning point for increased ethical conduct in the practice of law.<br />

� Columbia Pictures v. Bunnell, <strong>Case</strong> No. 2:06-cv-01093 FMC-JCx (C.D.Cal. Dec. 13, 2007). In<br />

this copyright infringement suit, the plaintiffs sought default judgment sanctions based on the<br />

defendants’ spoliation of evidence. The plaintiffs claimed the defendants willfully spoliated<br />

evidence by deleting <strong>and</strong> modifying user forums to remove mention of copyrighted material,<br />

deleting directory headings, destroying full IP addresses previously kept on file <strong>and</strong> falsely claiming<br />

that identifying information of moderators was not available. The court set forth five factors to<br />

consider when deciding whether to enter default judgment: 1) expeditious resolution of litigation; 2)<br />

the court’s docket management; 3) risk of prejudice; 4) public policy in deciding cases on their<br />

merits; <strong>and</strong> 5) the availability of lesser sanctions. The court found the defendants engaged in<br />

efforts to destroy evidence <strong>and</strong> provided false testimony under oath. Considering lesser sanctions,<br />

the court concluded the prejudice suffered was too great to overcome with an adverse jury<br />

instruction. The court also noted past monetary sanctions imposed upon the defendants were<br />

clearly ineffective <strong>and</strong> granted the motion for a default judgment in favor of the plaintiffs.<br />

� Verigy US, Inc. v. Mayder, 2007 WL 3144577 (N.D.Cal. Oct. 24, 2007). In this trade secret<br />

misappropriation case, the plaintiff sought an expedited motion to compel the defendants to<br />

produce mirror images of all hard drives. The issue at question was whether the defendants should<br />

be permitted an opportunity to review <strong>and</strong> object to any potential third party expert searches<br />

deemed necessary by the plaintiff. The court held that the defendants’ review of the search terms<br />

was entirely reasonable, comporting with the normal conduct of discovery. The court approved the<br />

defendants’ proposed protocol which allowed for 1) discovery in areas the defendants deemed<br />

233


presumptively relevant <strong>and</strong> 2) other searches at the plaintiff’s request, subject to the defendants’<br />

opportunity to review <strong>and</strong> object.<br />

� United States v. Flinn, 2007 WL 3034932 (E.D.Cal. Oct.16, 2007). In this suit charging the<br />

defendant with possession of child pornography, the defendant filed a motion seeking to have a<br />

mirror image of his seized hard drive <strong>and</strong> thumb drive removed from government facilities for<br />

expert examination purposes. The defendant challenged the constitutionality of an act requiring the<br />

government to main control of seized material constituting child pornography. The defendant<br />

claimed that no defendant in a child pornography case would have an “ample opportunity” to<br />

inspect the contrab<strong>and</strong> unless the expert is free to take the contrab<strong>and</strong> to an expert’s facilities for<br />

use with the expert’s own devices/software. No pertinent appellate court cases existed <strong>and</strong> several<br />

district court cases determined that the act was consistent with due process. Additionally, the court<br />

determined that the defendant <strong>and</strong> the expert made no attempt to differentiate his case from the<br />

“ordinary” child pornography case. Therefore, the court found the government facilities offering an<br />

“ample opportunity” to perform at least the initial examination of the seized materials.<br />

� Schmidt v. Levi Strauss & Co., 2007 WL 2688467 (N.D.Cal. Sept. 10, 2007). In this action<br />

brought under the Sarbanes-Oxley Act, the plaintiffs, former employees of the defendant, claimed<br />

they were wrongfully terminated. The defendant counterclaimed, alleging that the plaintiffs took<br />

confidential company documents. In the discovery dispute at issue, the plaintiffs moved for an<br />

order requiring the defendant to reproduce its entire document production in native electronic<br />

format. As the plaintiffs’ initial discovery request occurred prior to the 2006 Fed. R. Civ. P.<br />

amendments <strong>and</strong> did not specify the form in which the documents should be produced, the court<br />

held that the defendant’s burden to reproduce documents in native electronic format would far<br />

outweigh any benefit to be gained by the plaintiffs.<br />

� In re eBay Seller Antitrust Litigation, 2007 WL 2852364 (N.D.Cal. Oct. 2, 2007). In this antirust<br />

litigation, the plaintiffs moved the court to order the defendant to disclose its efforts to preserve <strong>and</strong><br />

collect relevant electronically stored information (ESI). The plaintiffs sought information regarding<br />

the contents of the document retention notice as well as the names <strong>and</strong> job titles of the employees<br />

who received the notice. Finding the language of the document retention notice to be protected by<br />

attorney-client privilege, the court refused to give the defendants access to the document itself, but<br />

ordered a 30(b)(6) deposition to determine what employees were doing with respect to collecting<br />

<strong>and</strong> preserving ESI. The court also ordered the defendant to produce a list of names <strong>and</strong> job titles<br />

of the employees who received the notice.<br />

� Qualcomm, Inc. v. Broadcom Corp., 2007 WL 2900537 (S.D.Cal Sept. 28, 2007). In this patent<br />

infringement suit, the court issued numerous orders beginning with non-infringement of the patents<br />

at issue to most recently ordering the plaintiff’s attorneys to show cause why they should not be<br />

personally sanctioned for discovery abuses. During one of the last days of trial, cross-examination<br />

of the plaintiff’s witness revealed the existence of relevant e-mails that the court later held were<br />

“the tip of the iceberg” in an attempt to conceal over 200,000 pages of relevant e-mails. The court<br />

found by clear <strong>and</strong> convincing evidence that Qualcomm’s counsel engaged in misconduct by<br />

providing calculatedly misleading <strong>and</strong> false discovery responses, asserting patently false<br />

statements of fact during motion hearings, minimizing the significance of missing e-mail at trial,<br />

continuing through post-trial activity. The judge characterized the discovery abuses as, “an<br />

organized program of litigation misconduct” <strong>and</strong> ordered the plaintiff’s attorneys to demonstrate<br />

why they should not be sanctioned, without use of documents protected by the attorney-client<br />

privilege. See also Qualcomm, Inc. v. Broadcom Corp., 2007 WL 2261799 (S.D.Cal. Aug. 6, 2007);<br />

234


Qualcomm, Inc. v. Broadcom Corp., 2007 WL 2296441 (S.D.Cal. Aug. 6, 2007); Qualcomm, Inc. v.<br />

Broadcom Corp., 2007 WL 1031373 (S.D.Cal. March 21, 2007).<br />

� Wingnut Films, Ltd. v. Katja Motion Pictures Corp., 2007 WL 2758571 (C.D.Cal. Sept. 18,<br />

2007). In this contract dispute, discovery was a long, drawn out battle where the defendant<br />

repeatedly failed to comply with court ordered discovery. For over a year, the defendant responded<br />

to orders compelling production by repeatedly certifying they had fully complied without producing<br />

any correspondence, memor<strong>and</strong>a, e-mail, notes, work papers or litigation settlement documents.<br />

Relying on Tulip <strong>Computer</strong>s Int’l B.V. v. Dell <strong>Computer</strong> Corp., 2002 WL 818061 (D.Del. Apr.30<br />

2002), the court ordered the defendant to retain an outside vendor to access servers <strong>and</strong> hard<br />

drives of specified employees <strong>and</strong> conduct keyword searches for responsive documents <strong>and</strong> emails.<br />

The court also imposed monetary sanctions under Fed.R.Civ.P. 37(b)(2) <strong>and</strong> 26(g)(3) in the<br />

amount of $125,000.<br />

� Columbia Pictures, Inc. v. Bunnell, 2007 WL 2702062 (C.D.Cal. Aug. 24, 2007). In this copyright<br />

infringement litigation the defendant, the operator of a website engine that enables users to locate<br />

<strong>and</strong> download dot-torrent files, sought review of a magistrate’s order requiring production of server<br />

log data stored in r<strong>and</strong>om access memory (RAM). The defendant argued that data stored in RAM<br />

is too ephemeral <strong>and</strong> temporary to be considered electronically stored information (ESI) within the<br />

meaning of Fed. R. Civ. P. 34(a). Citing the Advisory Committee Notes to the Rules, the court<br />

explained that Fed. R. Civ. P. 34(a) was to be read expansively <strong>and</strong> denied the motion.<br />

Responding to concerns about the potential impact of the decision with respect to individual <strong>and</strong><br />

business record-keeping obligations, the court held the decision was limited to the defendant in this<br />

case, who, only after the issuance of a court order, was obliged to preserve <strong>and</strong> produce the server<br />

log data.<br />

� Google Inc. v. Am. Blind & Wallpaper Factory, Inc., 2007 WL 1848665 (N.D.Cal June 27, 2007).<br />

In this trademark case, the plaintiff sought terminating, evidentiary, <strong>and</strong> monetary sanctions from<br />

the defendant based on its alleged failure to preserve, collect, <strong>and</strong> produce documentary evidence.<br />

The plaintiff showed that no deposed employee recalled the existence of a preservation plan after<br />

the litigation ensued, that employees routinely deleted documents, <strong>and</strong> that the defendant confined<br />

its production to communications between the two companies, which were already in the plaintiff’s<br />

possession. The defendant offered little rebuttal evidence. The court agreed with the plaintiff<br />

finding “a willful indifference” with regards to the defendant’s discovery obligations. However, the<br />

court was unwilling to impose terminating sanctions <strong>and</strong> instead ordered evidentiary sanctions in<br />

the form of several judicially established facts <strong>and</strong> also ordered monetary sanctions in the form of a<br />

$15,000 sanction against the defendant. The plaintiff also argued the founder <strong>and</strong> CEO of the<br />

defendant’s company destroyed <strong>and</strong> erased electronic data from certain computers upon his<br />

resignation. However, the court found that only a possibility remained that some relevant<br />

documents may have been lost as a result of this conduct, <strong>and</strong> the weight of the evidence did not<br />

support an inference that any wholesale destruction of relevant evidence took place at that time.<br />

� In re ATM Fee Antitrust Litig., 2007 WL 1827635 (N.D. Cal. June 25, 2007). In a suit alleging an<br />

illegal price fixing scheme, the plaintiff motioned the court to compel the defendant to produce<br />

numerous additional documents in discovery <strong>and</strong> sought modification of the production format<br />

previously agreed upon by the parties. The plaintiff sought production of material regarding<br />

networks other than the defendants, material provided to the government or in connection with<br />

other relevant private litigation, material regarding ATM networks in foreign countries, material from<br />

the inception of the plaintiff’s network to date, materials regarding entities that the defendant<br />

acquired, among other things. The defendant argued the scope of discovery sought was limitless<br />

235


<strong>and</strong> sought relief from complying with all of the requests. The court set forth general guidance<br />

regarding the appropriate scope of discovery, operating under the perspective that discovery is<br />

limited by the specific subject matter presented in the complaint. As for the production format, the<br />

parties originally agreed to produce in a tiff image format, subject to optical character recognition<br />

scanning. The court declined to order a different production format because the parties had<br />

reached the agreement over two years prior, well before the new Federal Rules of Civil Procedure<br />

amendments were modified in December 2006.<br />

� 3M Co. v. Kanbar, 2007 WL 1725448 (N.D.Cal. June 14, 2007). In this trademark infringement<br />

case, the defendant motioned the court to order the plaintiff to organize or itemize its production in<br />

some useful way. The plaintiff produced over 170 boxes of printed documents, as organized by<br />

electronic storage methods in the ordinary course of business. The court held while in most<br />

situations the producing party has the option to produce documents either in the usual course of<br />

business or organized by categories, there are some instances where special factors justify the<br />

requesting party selecting the method, however, volume alone is insufficient for a finding of special<br />

circumstances. In this case, the court determined the large volume was due to the defendant’s<br />

broad document requests <strong>and</strong> lack of dem<strong>and</strong> for electronic production, <strong>and</strong> therefore of<br />

defendants own making. However, the court found the plaintiff’s printed production format<br />

concerning <strong>and</strong> ordered the plaintiff to produce all previously produced responsive ESI in an<br />

electronic <strong>and</strong> reasonably usable format. The court noted that although the electronic production<br />

did not provide the defendant quite what it asked for, it should enable the defendant to utilize<br />

commercially available software to manage <strong>and</strong> review the production.<br />

� Columbia Pictures Industries v. Justin Bunnell, No. 06-1093 FMC (JCx) (C.D.Cal. May 29,<br />

2007). In a suit alleging copyright infringement, specifically claiming the defendant enables,<br />

encourages, <strong>and</strong> induces profit from online piracy, the plaintiff sought preservation <strong>and</strong> production<br />

of the IP addresses of users of the defendant’s Web site <strong>and</strong> the dates <strong>and</strong> times of the users’<br />

requests. The defendant argued that this server log data was not stored on its Web site or in any<br />

form from which it could be retrieved. Instead, this data was temporarily stored in r<strong>and</strong>om access<br />

memory (RAM) on servers located in the Netherl<strong>and</strong>s <strong>and</strong> routed through a contracted server. The<br />

defendant also argued the data did not constitute ESI, was not within their possession, custody or<br />

control, that preservation <strong>and</strong> production was tantamount to requiring the creation of new data, <strong>and</strong><br />

such an order would be unduly burdensome. Additionally, the defendant argued that the<br />

preservation <strong>and</strong> production of their Web site user IP addresses raised privacy issues. Disagreeing<br />

with the defendant <strong>and</strong> ordering preservation <strong>and</strong> production of the data stored in RAM, the court<br />

found that the data was extremely relevant, did constitute ESI, was within the defendant’s<br />

possession <strong>and</strong> control, <strong>and</strong> the IP addresses should be masked to protect the privacy of the Web<br />

site users. The court also rejected defendant’s arguments as to violation of the Stored<br />

Communications <strong>and</strong> Wiretap Acts, holding that compliance with this order provides a complete<br />

defense to any civil or criminal action predicated on either statute. Lastly, the court refused to<br />

sanction the defendant or require them to pay plaintiff’s attorney’s fees <strong>and</strong> costs.<br />

� World Courier v. Barone, 2007 WL 1119196 (N.D. Cal. Apr. 16, 2007). In a case involving<br />

misappropriation of trade secrets, the plaintiff moved for monetary sanctions <strong>and</strong> adverse jury<br />

instructions against the defendant based on a claim of spoliation of evidence. The plaintiff alleged<br />

the defendant’s husb<strong>and</strong> destroyed a hard drive containing information related to the defendant’s<br />

professional career <strong>and</strong> underlying suit against her. The defendant argued that she did not destroy<br />

the hard drive but that her husb<strong>and</strong> was responsible for the destruction, <strong>and</strong> she cannot be held<br />

liable for his action since he was a non-party to the suit. The court held that the defendant was<br />

236


liable for the destruction of the hard drive since the affirmative duty to preserve evidence extends<br />

to instances when the evidence is not directly within the party’s custody or control, so long as the<br />

party has access to or indirect control over such evidence. The court found it hard to believe that<br />

she was not in regular contact with her husb<strong>and</strong> over the facts of the suit. It held that the defendant<br />

was “knowingly willful” or, at the very least, negligent in failing to prevent the destruction of relevant<br />

evidence by her husb<strong>and</strong>. In order to compensate for the destroyed hard drive, the court awarded<br />

the plaintiff adverse jury instructions <strong>and</strong> monetary sanctions.<br />

� IO Group, Inc. v. Veoh Networks, Inc., 2007 WL 1113800 (N.D. Cal. Apr. 13, 2007). In this<br />

copyright infringement suit, the plaintiff sought to compel the defendant to produce all copies of any<br />

video published on the defendant’s website in electronic form. The defendant company operated a<br />

website that enabled the sharing of user-provided video content over the internet. The plaintiff<br />

claimed that some of its videos were shared over the defendant’s website without the plaintiff’s<br />

authorization. The defendant argued that the request to produce all videos on its website was<br />

overbroad <strong>and</strong> likely to lead to the discovery of irrelevant third-party videos. The plaintiff argued<br />

that its videos can only be identified by examining all videos contained on the website. The court<br />

held that since information related to the plaintiff’s works was indisputably relevant <strong>and</strong> since there<br />

was no other way for plaintiff’s works to be identified except through a review of all material<br />

published on the defendant’s website, the defendant was required to produce all electronic video<br />

that was once published on its website. The defendant argued that the costs of production should<br />

be shifted to the plaintiff, but the court undertook a Zubulake cost-shifting analysis <strong>and</strong> determined<br />

that the defendant did not provide any information on how such information was “inaccessible,”<br />

much less any information necessary for the court to decide whether it would be appropriate to shift<br />

all costs of production to plaintiff. However, the court did encourage the parties to come to an<br />

agreement as to the most efficient means of production, <strong>and</strong> the plaintiff noted that it was willing to<br />

provide high capacity storage devices for the production in order to reduce costs.<br />

� Padgett v. City of Monte Sereno, 2007 WL 878575 (N.D. Cal. Mar. 20, 2007). In a case alleging<br />

civil rights violations <strong>and</strong> infliction of emotional distress, the plaintiff sought to explore claims about<br />

the authorship of a harassing letter he received from a city employee. The court initially denied the<br />

plaintiff’s request to compel inspection of the city’s computers but ordered the defendant to<br />

preserve “everything.” The city assured the court it would abide by the preservation order.<br />

However, after a subsequent court order for production of three of its employee’s hard drives, the<br />

defendant acknowledged it had destroyed one of them. The defendant explained that the hard<br />

drive in question had been inadvertently discarded after the user’s laptop “crashed.” However, at a<br />

hearing before the court the city indicated that it found the laptop, with no explanation other than<br />

that it “appeared”. Unsatisfied with the city’s explanation, the plaintiff moved for terminating<br />

sanctions, monetary sanctions, <strong>and</strong> default judgment. In turn, the defendant moved for clarification<br />

of the court’s previous order to allow inspection or, in the alternative, for a protective order. The<br />

court found the defendant had discarded the laptop with notice of its potential relevance, causing<br />

delay <strong>and</strong> additional expense to the plaintiff. While reserving judgment as to whether the<br />

defendant’s actions warranted terminating sanctions, the court ordered monetary sanctions against<br />

the defendant in the amount of the plaintiff’s attorney fees <strong>and</strong> traveling costs associated with<br />

bringing the motion. It also ordered the defendant to pay the plaintiff’s expert’s fees <strong>and</strong> to bear the<br />

cost of a court-appointed special master. The court declined to consider the defendant’s motion for<br />

clarification, directing the defendant to seek further direction from the special master.<br />

� Memry Corp. v. Kentucky Oil Tech., N.V., 2007 WL 832937 (N.D. Cal. Mar. 19, 2007). In this<br />

discovery dispute arising out of a multi-party litigation, the counter defendant moved to compel the<br />

237


counterclaimant to produce computer hard drives for forensic inspection. The counter defendant<br />

argued the counterclaimant’s production was incomplete when two e-mails were not produced in<br />

discovery. While acknowledging the counterclaimant’s production had not been “absolutely<br />

perfect,” the court noted that the counter defendant had not demonstrated that the data it sought<br />

was in jeopardy of spoliation or central to the dispute. Declaring the discovery phase of the<br />

litigation to have come to a close, the court denied the counter defendant’s motion to compel.<br />

� Phillips v. Netblue, Inc., 2007 WL 174459 (N.D. Cal. Jan. 22, 2007). In a dispute involving spam<br />

messages sent to the plaintiff through e-mail, the defendants brought a motion for sanctions<br />

against the plaintiff for not preserving the e-mails that were subject to the suit. In producing<br />

evidence to the defendants, the plaintiff did not preserve the hyperlinks contained in the spam email.<br />

The hyperlinks in the spam tell an e-mail recipient’s computer what web address to contact in<br />

order to download <strong>and</strong> display certain images. The defendants argued the e-mail links initially<br />

received in the spam messages were no longer active <strong>and</strong> that the plaintiff had a duty to preserve<br />

not only the e-mails but the images as displayed by the links attached to the e-mail. The plaintiff<br />

argued that it was under no duty to memorialize the e-mails as displayed to a user would, but only<br />

that they preserve the e-mails as sent by the sender. The court denied sanctions against the<br />

plaintiff stating that “the absurdity of [the defendants’] argument is patent.” The defendants’<br />

argument is not based on the plaintiff’s failure to preserve evidence but upon the plaintiff’s failure to<br />

gather evidence. The court noted that a plaintiff does not have a legal duty to gather evidence for a<br />

defendant. The defendants’ request was for information that is beyond what is contained in the<br />

actual e-mail. The plaintiff fulfilled its discovery duties by disclosing the e-mail as seen by the<br />

plaintiff <strong>and</strong> did not have control or custody of the requested information.<br />

� In Re Napster, Inc. Copyright Litigation, 2006 WL 3050864 (N.D. Cal. Oct. 25, 2006). In a<br />

copyright infringement matter, the plaintiffs alleged a Napster investor willfully deleted relevant email<br />

so the court should issue an adverse inference instruction <strong>and</strong> default judgment on some of<br />

the claims. The investor argued they did not have a duty to preserve the e-mails in question<br />

because they were not a named party to any Napster litigation at the time nor did they reasonably<br />

expect to be a part of any litigation related to Napster. The court disagreed <strong>and</strong> determined that as<br />

investors, the president of the company knew prior to the commencement of this litigation, they<br />

could be named as a party in the suit <strong>and</strong> be required to produce documents. Although the court<br />

did not find the investor willfully destroyed e-mail, it determined that it was grossly deficient in its<br />

attempt to preserve any evidence. Default judgment was not ordered; however, adverse inferences<br />

<strong>and</strong> monetary sanctions were awarded.<br />

� Zamora v. D’Arrigo Bros. Co., 2006 WL 3227870 (N.D. Cal. Nov. 7, 2006). In an employment<br />

discrimination case, the defendant produced electronic data in response to a document request.<br />

The plaintiffs’ electronic data consultant apparently found several problems with the data, including<br />

inconsistencies, incompleteness, <strong>and</strong> undecipherable codes. The plaintiffs’ then served the<br />

defendant with a subpoena requesting a 30(b)(6) deposition of a representative to explain the<br />

incomplete electronic data. The defendant argues the deposition will be duplicative of a 2004<br />

deposition <strong>and</strong> will not uncover any new information. The court ruled, however, that the prior<br />

deponent did not answer questions regarding the production of incomplete data. The court further<br />

ruled that an additional deposition of a corporate representative would not be unduly burdensome<br />

or costly to defendant <strong>and</strong> that the deposition must take place.<br />

� People v. Stone, 2006 WL 2893777 (Cal. App. 5th Dist. Oct. 12, 2006). In a murder case, the<br />

defendant motioned the court to exclude the discovery of documents found on his laptop by a<br />

computer forensics expert as inadmissible. The expert discovered certain documents in his<br />

238


investigation where the defendant referred to himself as a “hitman for hire”. The defendant argued<br />

that such documents were inadmissible because the prejudice of the documents outweighed the<br />

probative value. However, the court held the documents authored by the defendant found on his<br />

personal laptop computer could be classified as an admission by a party opponent <strong>and</strong> admissible<br />

in trial proceedings if accompanied with proper foundation.<br />

� Del Campo v. Kennedy, 2006 WL 2586633 (N.D. Cal. Sept. 8, 2006). During a claim under the<br />

Fair Debt Collection Practices Act, plaintiff filed a motion to prevent the destruction of documents<br />

<strong>and</strong> for an order requiring the parties to meet <strong>and</strong> confer to develop a document preservation plan.<br />

Defendant’s company implemented a telephone recording system for one month where all calls<br />

were recorded <strong>and</strong> saved on digital media. Plaintiff claims that defendant circulated an internal<br />

memo during litigation advising employees to discard the recorded information in the normal<br />

course of business. Defendant argued that it wanted to be relieved from the "burden" of<br />

maintaining the digital evidence. However, the court refused to accept that maintaining digital<br />

evidence was a burden <strong>and</strong> ordered the defendant to preserve all electronic evidence. The court<br />

also ordered the parties to meet <strong>and</strong> confer to develop a preservation plan for electronic evidence.<br />

� OKI Am., Inc. v. Advanced Micro Devices, Inc., 2006 WL 2547464 (N.D. Cal. Aug. 31, 2006). In<br />

a patent infringement case, the defendant filed a motion to compel the production of electronic<br />

documents. The defendant claimed the plaintiff produced a disk of information containing 29,000<br />

pages of material that were not in a proper electronic format <strong>and</strong> not searchable. The court noted<br />

the defendant’s motion was ironic since earlier in the litigation the defendant produced a similar<br />

disk of information to the plaintiff that contained the same unsearchable electronic formatting. The<br />

plaintiff claimed it bore the cost of converting the files into a searchable database because the<br />

defendant refused to produce the information in a searchable format. The court stated the<br />

defendant’s own prior refusal to convert its documents should not be rewarded in this situation by<br />

forcing the plaintiff to again expend costs in converting electronic documents. The court denied<br />

defendant’s motion.<br />

� In re CV Therapeutics, Inc., 2006 WL 2458720 (N.D. Cal. Aug. 22, 2006). In a securities litigation,<br />

the plaintiff claimed the defendant failed to follow a judge’s order compelling the defendant to<br />

produce documents found on various backup tapes <strong>and</strong> employee hard drives. The plaintiff<br />

claimed the defendant’s non-compliance came from their failure to produce documents determined<br />

as invalid through a de-duplication software filter. The defendant claimed approximately 423,000<br />

documents were discovered during their initial search. Upon using various search terms <strong>and</strong> a deduplication<br />

process the number was reduced to 125,000 documents, of which only 4,000 were<br />

relevant. The plaintiff motioned the court to discover all 423,000 documents before the filter<br />

process was applied. The court held that the search terms chosen by the defendant were proper<br />

<strong>and</strong> the de-duplication process was an acceptable method for narrowing the document set.<br />

However, the defendant agreed to provide additional cataloging information to the plaintiff for the<br />

non-produced documents <strong>and</strong> relieved the court of deciding the issue.<br />

� Quon v. Arch Wireless Op., 445 F.Supp.2d 1116 (C.D. Cal. 2006). In a suit claiming 4th<br />

Amendment <strong>and</strong> federal statutory violations, the court determined that public employees who send<br />

text messages through department-issued pagers are protected by the 4th Amendment. The<br />

plaintiffs, police department employees, were issued pagers by their employer police department.<br />

The department had a loose policy of reviewing the text messages sent on these pagers; however,<br />

they did not uniformly implement the policy of reviewing employee’s text messages. Plaintiffs<br />

argued that reviewing private text messages on department-issued pagers constituted an illegal<br />

search under the 4th Amendment <strong>and</strong> was an unreasonable invasion of privacy. The defendants<br />

239


contended that the pagers were subject to a lesser expectation of privacy since they were owned<br />

by the department <strong>and</strong> department policy of reviewing the messages was adequate notice of a<br />

reduced expectation of privacy. The court held that the plaintiff had a reasonable expectation of<br />

privacy in his text messages sent to <strong>and</strong> from his city-issued pager since the police department’s<br />

policy was to only review employee’s text messages if they went over the monthly limit for text<br />

messages – a policy that was used sparingly. Therefore, the plaintiff could not have reasonably<br />

expected his messages to be reviewed for content by his employer absent a policy stating<br />

otherwise. Furthermore, the court noted that the defendant’s argument that the police department<br />

actually owned the pager used to transmit the protected messages was of no merit.<br />

� Ukiah Auto. Invs. v. Mitsubishi Motors of N. Am., Inc., 2006 WL 1348562 (N.D. Cal. May 17,<br />

2006). Alleging that the plaintiff had failed to produce all relevant documents, the defendants<br />

sought permission from the court to inspect one of the plaintiff’s computers, which contained<br />

financial records pertinent to the case. The plaintiff maintained that it had produced all relevant<br />

documents from the computer to the defendant in paper form, <strong>and</strong> further, that the computer in<br />

question was no longer operational. Finding that an inspection of the computer was warranted, the<br />

court ordered a neutral expert to examine the computer at the plaintiff’s expense.<br />

� Advante Int’l Corp. v. Mintel Learning Tech., 2006 WL 1806151 (N.D. Cal. June 29, 2006). The<br />

defendant brought a motion to compel examination of the plaintiff’s computer hard drives,<br />

contending that the plaintiff’s conduct warranted a conclusion that the plaintiff was concealing<br />

evidence <strong>and</strong> misrepresenting facts. Although recognizing a forensic examination may be<br />

appropriate upon a showing that the opposing party has deleted electronic evidence, the<br />

magistrate judge observed, “a party would not be given an unfettered right to conduct its own<br />

examination of the opposing party’s computers. Rather, a protocol would have to be established to<br />

protect legitimate privacy, privilege, <strong>and</strong> safety concerns, <strong>and</strong> to minimize disruption.” The<br />

magistrate judge ultimately denied the defendant’s motion, noting that the defendant’s<br />

unsubstantiated accusations of discovery misconduct did not warrant the remedy of a forensic<br />

examination.<br />

� Oved & Assocs. Constr. Servs., Inc. v. Los Angeles County Metro. Transp. Auth., 2006 WL<br />

1703824 (Cal. Ct. App. June 22, 2006). In a construction dispute case, the appellate court affirmed<br />

the trial court’s award of terminating sanctions against the defendant for years of discovery abuses<br />

<strong>and</strong> the intentional spoliation of evidence. After the defendant repeatedly failed to produce financial<br />

documents responsive to the plaintiffs’ discovery requests, the plaintiffs sought an order to conduct<br />

a forensic examination of the defendant’s computer hard drive. When the trial court awarded the<br />

plaintiffs request, the defendant filed an interlocutory appeal. The retained computer forensic<br />

examiner determined a number of files had been individually selected <strong>and</strong> manually deleted. In<br />

addition, the expert testified that the recycle bin had been emptied on the same day the Court of<br />

Appeals denied the defendant’s appeal <strong>and</strong> issued an order to preserve <strong>and</strong> produce the computer<br />

hard-drive. Finding that the financial records were integral to the case, the court observed, “[the<br />

defendant’s] conduct effectively destroys the ability of [the plaintiffs] to litigate the trial.” In affirming<br />

the default judgment against the defendants, the appellate court noted, “any lesser sanction for this<br />

willful failure to comply would have condoned [the defendant’s] behavior <strong>and</strong> by definition would<br />

have been insufficient.” The court also awarded the plaintiffs’ attorneys fees <strong>and</strong> the costs of<br />

appeal.<br />

� O’Grady v. Superior Court, 139 Cal.App.4th 1423, 44 Cal.Rptr.3d 72 (Cal. App. 6th Dist. 2006).<br />

In a case involving the online publication of a company’s trade secrets, the defendants sought a<br />

protective order to enjoin discovery of documents identifying their confidential sources. Their<br />

240


motion was denied by the trial court. However, the appellate court, ruling on the rights of web<br />

publishers to resist the discovery of unpublished material, granted the protective order, citing<br />

federal <strong>and</strong> state law, <strong>and</strong> a constitutional privilege against the compulsory disclosure of<br />

confidential sources.<br />

� Miller v. International Bus. Machs., 2006 WL 995160 (N.D. Cal. Apr. 14, 2006). Alleging breach<br />

of contract <strong>and</strong> fraud claims, the defendant filed a motion for sanctions <strong>and</strong> argued, inter alia, the<br />

plaintiff failed to produce e-mails <strong>and</strong> accompanying attachments together as previously ordered.<br />

The plaintiff claimed the attachments, produced separately as files on a disk, sufficiently referenced<br />

the corresponding e-mails. Alternatively, the plaintiff argued he should not be compelled to<br />

determine which attachments accompanied which e-mails. The court noted, “It is not clear how [the<br />

plaintiff] can argue that he has identified specific e-mail to which the produced files were<br />

referenced, while at the same time stating that he cannot determine which attachments belong to<br />

which e-mails.” Thus, the court ordered the plaintiff to “produce the relevant e-mails with the<br />

attachments physically attached, or…provide specific references (i.e., date of production, Bates<br />

<strong>and</strong>/or page numbers, <strong>and</strong> labels) which enable [the defendant] to identify which attachments<br />

belong to which e-mails.” Failure to comply with the order would result in preclusion of improperly<br />

produced e-mails or attachments at trial.<br />

� Creative Sci. Sys., Inc. v. Forex Capital Mkts., LLC, 2006 WL 870973 (N.D. Cal. Apr. 4, 2006).<br />

In a copyright infringement lawsuit, the plaintiff moved for sanctions claiming the defendants failed<br />

to comply with a preservation order. The preservation order required the defendants to “preserve<br />

all relevant documents as defined under Federal Rule of Civil Procedure 34(a), including but not<br />

limited to all electronic evidence or evidence stored on computers regardless of the medium on<br />

which it is stored.” Upon inspecting five of the defendants’ forty servers, a computer forensic expert<br />

found the operating systems on three of the servers had been reinstalled after the preservation<br />

order was issued. The defendants claimed they reinstalled the operating systems in order to test<br />

<strong>and</strong> install new software. Although finding an adverse inference instruction was not warranted, the<br />

court ordered the defendants to bear the cost of analyzing the remaining servers. The court<br />

concluded “the failure of [the defendants <strong>and</strong> their] counsel to take affirmative steps to comply with<br />

the Preservation Order-which would have caused [the defendants] not to reinstall the operating<br />

systems on the servers at issue-is evidence of at least some degree of bad faith.”<br />

� Tessera, Inc. v. Micron Tech., Inc. 2006 WL 733498 (N.D. Cal. Mar. 22, 2006). The plaintiff<br />

sought to compel production of documents from a non-party in a patent infringement case.<br />

Objecting, the non-party claimed the request was overbroad, burdensome <strong>and</strong> not relevant to the<br />

issues in the litigation. In response, the plaintiff asserted the production merely required the nonparty<br />

to produce documents from existing electronic databases of documents, previously created<br />

for a government investigation. The plaintiff also argued the non-party needlessly delayed its<br />

response by failing to agree to a list of search terms proffered during the parties’ meet <strong>and</strong> confer<br />

conference. The court ordered the non-party to “produce on DVD-ROMS or hard drives documents<br />

derived using specific search terms from databases created for the U.S. Department of Justice<br />

investigation of the DRAM industry <strong>and</strong> any related preceding litigation in which the [non-party was]<br />

a party.” In addition, the court directed the plaintiff to review the documents for responsiveness <strong>and</strong><br />

to obtain third party permission for use of any responsive documents.<br />

� Bob Barker Co., Inc. v. Ferguson Safety Prods., Inc., 2006 WL 648674 (N.D. Cal. Mar. 9, 2006).<br />

In an action brought under the Lanham Act, the plaintiff sought, inter alia, all financial software<br />

databases used in the operation of the defendants’ business. The defendants protested arguing<br />

the request was overbroad. Noting the defendants did not appear to have the requested software,<br />

241


the court observed the plaintiff’s other requests were broad enough to encompass the requested<br />

data, regardless of whether it was maintained in a "financial software database." The court<br />

determined the defendants need not produce documents specific to the plaintiff’s request but<br />

declared the defendants “may not withhold any documents (including electronic documents) that<br />

are responsive to any other request simply because they were created by or exist in a financial<br />

database program.” The court also denied the plaintiff’s expert direct access to the database<br />

indicating the plaintiff could seek direct access upon “a showing of why [direct access] is<br />

necessary, <strong>and</strong> by proposing a procedure containing adequate safeguards to protect [the<br />

defendants’] interests.”<br />

� Nova Measuring Instruments Ltd. v. Nanometrics, Inc., 417 F.Supp.2d 1121 (N.D. 2006). In a<br />

patent infringement case, the plaintiffs sought to compel production of documents in native format<br />

with original metadata. The plaintiffs asserted native production format was m<strong>and</strong>ated by a local<br />

patent rule that required a party defending a patent infringement claim to make available "[s]ource<br />

code, specifications, schematics, flow charts, artwork, formulas, or other documentation…” Finding<br />

the defendants failed to offer relevant reasons why the documents should not be produced in their<br />

native format, the court granted the motion <strong>and</strong> ordered the defendants to “produce the documents<br />

in their native file format, with original metadata.” The court further declared the document<br />

production set “shall be separately identified by Bates numbers to correspond to each aspect or<br />

element of each accused instrumentality identified in [the defendant’s patent] chart.”<br />

� Hynix Semiconductor, Inc. v. Rambus, Inc. v., No. C-00-20905 RMW (N.D.Cal. Jan. 4, 2006). In<br />

a patent infringement suit, the plaintiffs argued the defendant’s claims should be dismissed based<br />

on the defendant’s adoption of a document retention policy that resulted in the destruction of<br />

potentially relevant electronic <strong>and</strong> paper documents. Prior to filing the litigation at issue, the<br />

defendant developed a document retention policy requiring the destruction of e-mail contained on<br />

backup tapes after three months. In addition, the defendant held several “Shred Days” during<br />

which employees were instructed to follow the retention policy guidelines to determine what to<br />

keep <strong>and</strong> what to throw away. In assessing the plaintiffs’ argument, the court noted the evidence<br />

failed to show the defendant targeted any specific document or category of relevant documents<br />

with the intent to prevent production in the upcoming lawsuit. The court further found the<br />

defendant’s adoption of the policy was not designed to prevent the plaintiffs from obtaining<br />

evidence that would be helpful to the plaintiffs’ defense. For these reasons, the court declined to<br />

accept the plaintiffs’ argument <strong>and</strong> declared, “[The defendant’s] adoption <strong>and</strong> implementation of its<br />

content neutral Document Retention Policy in mid-1998 was a permissible business<br />

decision…[<strong>and</strong>] did not constitute unlawful spoliation.”<br />

� Sony <strong>Computer</strong> Entertainment Am., Inc. v. Filipiak, 2005 WL 3556676 (N.D.Cal. Dec. 27,<br />

2005). The plaintiff sought injunctive relief <strong>and</strong> damages claiming the defendant sold products that<br />

allowed users to play illegal copies of the plaintiff’s PlayStation video games. After receiving a<br />

cease-<strong>and</strong>-desist letter from the plaintiff’s attorneys, the defendant signed the letter <strong>and</strong> agreed to<br />

an injunction prohibiting the marketing, sale <strong>and</strong> distribution of the products. Although the<br />

defendant removed the products from his Web site, he continued to sell them. After confronting the<br />

defendant about his violation of the previous agreement, the parties executed a Consent Judgment<br />

against the defendant for an undetermined amount which was to be based on further discovery. As<br />

a part of the discovery provisions, the defendant agreed he would not destroy any documents or<br />

computer files reflecting sales of his products. During discovery, the defendant’s hard drive was<br />

examined by a computer forensic expert, who determined thous<strong>and</strong>s of files had been deleted from<br />

the hard drive just days before production of the hard drive. The deleted files included numerous<br />

242


documents with titles indicating they were sales records. Finding a “significant” statutory damage<br />

award was warranted under the circumstances, the court awarded more than $6 million in<br />

damages. The court stated, “[the defendant] intentionally <strong>and</strong> in bad faith violated the terms of the<br />

Consent Judgment as well as his discovery obligations under Rule 26 of the Federal Rules of Civil<br />

Procedure.”<br />

� Hamilton v. Signature Flight Support Corp., 2005 WL 3481423 (N.D.Cal. Dec. 20, 2005). In an<br />

employment discrimination action, the plaintiffs sought sanctions against the defendants for<br />

destroying video surveillance recordings allegedly containing critical evidence about an altercation<br />

between an employee <strong>and</strong> a customer. During discovery, the plaintiffs had requested the video<br />

recording as well as information about the defendants’ surveillance system <strong>and</strong> a chain of custody<br />

for the video. The defendants only produced a portion of the footage but declared it had preserved<br />

the only video of the incident. The defendants further stated that the remaining portion was<br />

unavailable because the surveillance system automatically records over previous tapings every 15<br />

to 30 days. The court found the video contained relevant evidence, the defendants had a duty to<br />

preserve that evidence, <strong>and</strong> the defendants destroyed the evidence. However, the court declared<br />

that the defendants had, at the most, “acted negligently in failing to preserve the end of the<br />

recorded portion of the altercation” <strong>and</strong> declined to award sanctions. The court also noted the<br />

plaintiffs failed to show the missing video would have favored their case <strong>and</strong> that its destruction<br />

would have been harmful.<br />

� In re ATM Fee Antitrust Litig., 2005 WL 3299763 (N.D. Cal. Dec. 5, 2005). In addition to<br />

document production <strong>and</strong> admission requests, the plaintiffs sought interrogatories <strong>and</strong> 30(b)(6)<br />

depositions concerning document <strong>and</strong> electronic data storage <strong>and</strong> management issues. The<br />

defendant conceded that one of its wholly-owned subsidiaries, which was not a named party to the<br />

suit, would be the most likely source of this information. However, the defendant objected to<br />

providing the requested information <strong>and</strong> argued such a measure would be unduly burdensome <strong>and</strong><br />

expensive. The defendants stated the plaintiffs should directly request the documents themselves<br />

by subpoenaing the subsidiary or by adding them as a party to the suit. Rejecting this claim, the<br />

court ordered the defendant to respond to the plaintiffs’ discovery requests on behalf of its<br />

subsidiaries, stating the defendant had access to <strong>and</strong> control over this information. The court<br />

further found the defendants failed to show responding to the request would be unduly<br />

burdensome.<br />

� <strong>Electronic</strong> Funds Solutions v. Murphy, 36 Cal.Rptr.3d 663 (Cal. Ct. App. 2005). In a lawsuit<br />

involving various business tort claims, the defendants appealed a default judgment <strong>and</strong> argued the<br />

trial court abused its discretion. During discovery, the plaintiffs’ computer forensic expert<br />

discovered four of the defendants’ hard drives had been "wiped" after the date the court ordered<br />

their production. The expert further concluded data had been copied from the hard drives before<br />

the wiping <strong>and</strong> selected data was reinstalled after the wiping. On one of the computers, the<br />

defendants appeared to have aborted the data wiping program minutes before they were required<br />

to turn it over to the plaintiffs’ expert. Based on the defendants’ intentional data destruction, the<br />

court entered a terminating sanction <strong>and</strong> awarded a default judgment of $24 million in punitive <strong>and</strong><br />

compensatory damages in favor of the plaintiffs. On appeal, the court upheld the terminating<br />

sanctions in light of the “defendants’ brazen violation of a discovery order in the face of an express<br />

warning.” The court stated, the “Plaintiffs recovered e-mails from the computer only because<br />

defendants had not run the program properly…defendants’ actions have made it virtually<br />

impossible to determine what items defendants destroyed.” The court rem<strong>and</strong>ed the case, finding<br />

the damage award inconsistent with the amount sought in the complaint.<br />

243


� Sonista, Inc. v. Hsieh, 2005 WL 3113083 (N.D.Cal. Nov. 21, 2005). The plaintiff sought summary<br />

judgment in a case involving a breach of fiduciary duty claim. In support of its motion, the plaintiff<br />

produced e-mails, retrieved by a computer forensic expert from the defendant’s work laptop, that<br />

evidenced self-dealing on the part of the defendant. The defendant argued the mere presence of<br />

these e-mails was insufficient to establish the existence of undisputed material facts. Although it<br />

agreed, the court awarded summary judgment in favor of the plaintiff <strong>and</strong> declared a dispute of<br />

material fact did not exist because the defendant failed to contradict the e-mail evidence.<br />

� People v. Jiang, 31 Cal.Rptr.3d 227 (Cal. Ct. App. 2005), withdrawn, 33 Cal.Rptr.3d 184 (Cal. Ct.<br />

App. 2005). In an appeal from a rape conviction, the defendant argued, inter alia, that passwordprotected<br />

documents contained on his employer-issued laptop in a folder marked “Attorney” were<br />

protected by the attorney-client privilege. The trial court had previously determined these<br />

documents were not subject to the attorney-client privilege because the defendant had no<br />

reasonable expectation of privacy in documents on an employer-issued laptop computer. On<br />

appeal, the state argued the defendant did not have a reasonable expectation of privacy based on<br />

the terms of an employment agreement in which the defendant acknowledged he had no<br />

expectation of privacy for any company-owned property. The appellate court reversed the trial<br />

court’s holding <strong>and</strong> found the defendant “made substantial efforts to protect the documents from<br />

disclosure by password-protecting them <strong>and</strong> segregating them in a clearly marked <strong>and</strong> designated<br />

folder.” The appellate court further declared the prosecution failed to prove the documents were not<br />

confidential <strong>and</strong> noted the employment agreement did not prevent the defendant from using the<br />

laptop for personal use.<br />

� AdvantaCare Health Partners, LP v. Access IV, Inc., 2005 WL 1398641 (N.D. Cal. June 14,<br />

2005). One of the Defendants, Porter, sought reconsideration of a default judgment issued against<br />

her <strong>and</strong> other defendants in a case involving unfair competition allegations by a former employer.<br />

The employer’s computer forensic expert had previously discovered that another Defendant,<br />

Dangerfield, had copied numerous computer files prior to leaving the company <strong>and</strong> tried to conceal<br />

his actions by deleting the copied files from his hard drive. In an earlier order, the court had<br />

imposed $20,000 in monetary sanctions <strong>and</strong> issued an adverse inference instruction, directing the<br />

fact finder to conclude that the defendants copied all of the files on the employer’s computers.<br />

Approximately seven months later, the court entered a default judgment based upon its factual<br />

determination that while the sanctions motion was under submission, the defendants wiped two<br />

hard drives clean <strong>and</strong> continued deleting files after the sanctions order was issued. In her current<br />

motion, Porter argued that the court should not have entered default judgment against her because<br />

the court never determined she personally copied or destroyed files. While noting this was true, the<br />

court stated, “Porter apparently left compliance in Dangerfield’s h<strong>and</strong>s. The fact that Porter<br />

reposed trust in Dangerfield does not insulate her from the affirmative obligations placed upon all<br />

Defendants… especially in light of the Court’s repeated findings that Dangerfield has engaged in<br />

misconduct with respect to AdvantaCare’s files throughout this litigation.” The court denied the<br />

motion for reconsideration <strong>and</strong> entered a default judgment against all of the defendants.<br />

� Hypertouch, Inc. v. Superior Court, 27 Cal. Rptr. 3d 839 (Cal. Ct. App. 2005). In a class action<br />

lawsuit relating to unsolicited advertisements sent to fax machines, the plaintiffs had sought<br />

discovery of a database containing the telephone numbers to which the defendants allegedly sent<br />

the advertisements. The defendants argued the database contained confidential customer<br />

information <strong>and</strong> was protected as a trade secret. Agreeing with the defendants, the court denied<br />

the plaintiff’s motion to compel. Shortly after, the plaintiff learned the defendants destroyed a<br />

second database – called the “do not fax” database – which listed phone numbers from which the<br />

244


defendants had received requests to stop sending faxes. The plaintiff then moved for an order<br />

approving certified class, asserting the defendant should pay for identifying <strong>and</strong> noticing class<br />

members due to the defendant’s destruction of the “do not fax” database, its refusal to disclose the<br />

telephone number database, <strong>and</strong> its financial resources. The court determined the defendants<br />

should bear notice costs if they either "unnecessarily complicated the problems of identifying <strong>and</strong><br />

notifying the class" or "possess the ability to provide class notice easily <strong>and</strong> at relatively little cost."<br />

Thus, the appellate court determined the superior court could order the defendants to provide<br />

notice by telephone fax “to the persons whose numbers are in the ‘fax database’ if that can be<br />

done without disclosure of the database to [the] plaintiff, <strong>and</strong> would be relatively easy <strong>and</strong> less<br />

expensive than alternative forms of notice.”<br />

� Communications Ctr., Inc. v. Hewitt, 2005 WL 3277983 (E.D. Cal. Apr. 5, 2005). In a case<br />

arising from misappropriation of trade secrets, unfair competition, <strong>and</strong> other allegations, the plaintiff<br />

brought a motion for terminating sanctions against the defendant for violating a magistrate’s<br />

discovery order. The order required the defendant to produce a compact disc containing mirror<br />

images of any responsive hard drives in the defendant’s possession. The production was to be<br />

designated for “Attorney’s Eyes Only” <strong>and</strong> no documents were to be withheld from production.<br />

Although the defendant produced three CDs, the CDs were not mirror images of the defendant’s<br />

hard drives. The defendant supplemented the production with ten discs, which also failed to<br />

contain mirror images. Days after the production, the defendant ran a software wiping program<br />

called Evidence Eliminator on three of the hard drives. The defendant claimed he purchased the<br />

program only after learning the true meaning of the “mirror image” as set forth in the magistrate<br />

order. He further stated he used the program to cover up evidence of an affair <strong>and</strong> to prevent<br />

disclosure of embarrassing Web sites. The defendant further admitted he re-installed an operating<br />

system on one of the drives, despite knowing that this would destroy data on the drive. The<br />

magistrate found this conduct “a stark affront to the judicial process.” Noting the destroyed data<br />

was “gone forever,” the magistrate awarded the plaintiff over $145,000 in costs <strong>and</strong> fees. The<br />

magistrate further recommended that a default judgment be entered for six out of the eight causes<br />

of action.<br />

� Satchell v. FedEx Corp., 2005 WL 646058 (N.D. Cal. Mar. 21, 2005). In a case involving an<br />

employment discrimination class action lawsuit, the plaintiffs requested that the court compel<br />

production of certain personnel records. The defendant contended it had already produced all of<br />

the requested information in an electronic database. However, the court ordered the defendant to<br />

re-produce the personnel records, stating that “the electronic data produced for class discovery<br />

purposes is not an adequate substitute for the personnel records…<strong>and</strong> other discovery sought.”<br />

� People v. Samuels, 2005 WL 639143 (Cal. Ct. App. Mar. 21, 2005). The defendant appealed a<br />

jury conviction for gr<strong>and</strong> theft relating to alleged exorbitant contingency fees charged by the<br />

defendant. Specifically, the defendant argued the trial court should have granted his pretrial motion<br />

to dismiss because the prosecution destroyed evidence that would have supported the defendant’s<br />

claim of right defense. In the pretrial motion, the defendant contended state bar investigators failed<br />

to preserve case files <strong>and</strong> computer records necessary for his defense. He further alleged the state<br />

bar failed to provide an inventory of his computer files after they seized the files. When the case<br />

files <strong>and</strong> computer records were returned, they were incomplete, making it impossible for the<br />

defendant to prove the amount, complexity <strong>and</strong> nature of the work performed for his clients.<br />

Although the defendant filed an affidavit from an investigator who stated the computer was turned<br />

off abnormally while in the state bar’s possession, the trial court refused to consider the evidence<br />

unless the affiant testified. The appellate court affirmed the trial court’s judgment, concluding that<br />

245


the defendant failed to demonstrate bad faith on the part of the state bar or that any of the seized<br />

evidence was exculpatory or material.<br />

� Green v. Baca, 225 F.R.D. 612 (C.D.Cal. 2005). A former county jail detainee filed a motion for<br />

fees <strong>and</strong> costs, claiming the county failed to produce computer-based records relating to an overdetention<br />

claim. Despite persistent questioning by the court <strong>and</strong> orders requiring the county to<br />

provide the requested information, the county did not inform the court or the plaintiff about the<br />

computer-based records for nearly nine months. In its defense, the county argued the plaintiff did<br />

not make a good faith effort to narrow the scope of its discovery request. The court rejected this<br />

argument <strong>and</strong> stated production would not have occurred absent court intervention, even if the<br />

plaintiff had acted in good faith. The court awarded $54,375 in attorney fees <strong>and</strong> costs <strong>and</strong><br />

declared the “plaintiff’s efforts to obtain discovery … were unduly complicated <strong>and</strong> extraordinarily<br />

delayed by the failure of the county <strong>and</strong>/or its counsel to investigate promptly <strong>and</strong> effectively the<br />

records available, both in hard-copy <strong>and</strong> computer-based formats, regarding such over-detentions.”<br />

� Icu Med., Inc. v. B. Braun Med., Inc., 2005 WL 151927 (N.D.Cal. Jan. 4, 2005). The defendant<br />

sought an order compelling the plaintiff to adequately search for <strong>and</strong> produce all non-privileged<br />

documents. Upon reviewing information submitted by the parties, the magistrate judge ordered the<br />

plaintiff to search “all computerized files, e-mails, voice mails, work files, desk files, calendars <strong>and</strong><br />

diaries, <strong>and</strong> any other locations <strong>and</strong> sources if materials of the type to be produced might plausibly<br />

be expected to be found there.” The magistrate also ordered the plaintiff to produce all nonprivileged<br />

documents, along with a written list setting forth each specific source <strong>and</strong> location<br />

searched as well as the individuals conducting the search <strong>and</strong> their areas of search responsibility.<br />

In addition, the plaintiff was to provide a list describing the specific source for each produced item<br />

<strong>and</strong> a list of items withheld on the basis of privilege. The magistrate further required the plaintiff to<br />

confirm it had searched all locations potentially containing this material <strong>and</strong> produced all nonprivileged<br />

documents.<br />

� United States v. Conte, 2004 WL 2988567 (N.D.Cal. Dec. 28, 2004). In an investigation relating to<br />

suspicions that the defendants supplied athletes with illegal performance-enhancing drugs, a<br />

magistrate judge issued search warrants permitting the government to search Yahoo! <strong>and</strong> AOL email<br />

accounts allegedly used by the defendants <strong>and</strong> a drug company. The defendants challenged<br />

these warrants <strong>and</strong> a warrant permitting seizure of e-mail correspondence with athletes, claiming<br />

the warrants were stale, overbroad <strong>and</strong> lacked probable cause. Concluding it was likely the e-mail<br />

accounts would contain e-mails relating to the distribution of the drugs, the court found probable<br />

cause existed for issuing the warrants. The court also declared the warrants were not stale since<br />

the e-mail accounts were used recently. In addition, the court found the warrants were not<br />

overbroad because they did not permit the seizure of all e-mails in the accounts. Rather, the<br />

warrants only permitted seizure of e-mails that were restricted to financial matters <strong>and</strong><br />

performance-enhancing drugs.<br />

� Toshiba Am. Elec. Components, Inc. v. The Superior Court of Santa Clara County, 21 Cal.<br />

Rptr. 3d. 532 (Cal. Ct. App. 2004). Alleging misappropriation of trade secrets, breach of fiduciary<br />

duty, <strong>and</strong> unfair competition claims, the plaintiff moved for production of relevant evidence<br />

contained on more than 800 backup tapes <strong>and</strong> asked that the defendant bear the costs of<br />

retrieving the data. The defendant objected, claiming undue burden <strong>and</strong> expense. The defendant<br />

also revealed that some of the tapes had become obsolete, making the data accessible only<br />

through the use of specialized tools. The plaintiff contended that it should not be penalized<br />

because the defendant chose to keep records in a format difficult for retrieval. Without comment,<br />

explanation or suggestion of a sampling protocol, the trial court ordered the defendant to produce<br />

246


the backup tape data <strong>and</strong> to bear production costs. On appeal, the court declined to apply the<br />

Zubulake seven-factor cost-shifting test <strong>and</strong> instead referenced California Code of Civil Procedure<br />

§2031, stating that “our Legislature has identified the expense of translating data compilations into<br />

usable form as one that, in the public’s interest, should be placed upon the dem<strong>and</strong>ing party.” The<br />

appellate court required the plaintiff to pay for translating the backup tape data. The court stated<br />

that the plaintiff could seek a protective order or file a motion to compel production if asked to pay<br />

costs that it finds unreasonable <strong>and</strong> unnecessary. The court indicated that sampling would be an<br />

appropriate test for determining necessity <strong>and</strong> rem<strong>and</strong>ed the case for a determination on whether<br />

the backup tapes were necessary <strong>and</strong> reasonable.<br />

� Sempra Energy Trading Corp. v. Brown, 2004 WL 2714404 (N.D.Cal. Nov. 30, 2004). In a<br />

discovery dispute relating to a preliminary investigation of gas-price increases, the court ordered<br />

the plaintiff to restore, review <strong>and</strong> produce responsive e-mail spanning a 15-month period. The<br />

plaintiff brought a motion for costs stating it was not a named party to the investigation. Denying<br />

the request, the administrative law judge determined the party was not “an uninvolved third party”<br />

<strong>and</strong> thus should bear production costs. Several months later, the judge held another discovery<br />

hearing to implement a faster e-mail review process <strong>and</strong> amended the early order to expedite the<br />

review process. The plaintiff then filed the instant action in district court, challenging the discovery<br />

orders relating to the underlying investigation <strong>and</strong> claiming “irreparable injury” as it had already<br />

spent $1.4 million in attempting to comply with the discovery orders. The court refused to exercise<br />

its jurisdiction <strong>and</strong> declared the plaintiff’s litigation costs did not demonstrate “irreparable injury.”<br />

The court dismissed the action but declared the plaintiff could pursue other remedies if warranted.<br />

� Collaboration Properties, Inc. v. Polycom, Inc., 2224 F.R.D. 473 (N.D. Cal. 2004). In a patent<br />

infringement case, the plaintiff, inter alia, sought to compel production of electronic documents <strong>and</strong><br />

e-mails. The defendant claimed the disputed documents fell within the attorney-client privilege<br />

since they were exchanged between the defendant’s engineers <strong>and</strong> former defense counsel. In<br />

response, the plaintiff argued the defendant had waived the privilege because it was asserting an<br />

advice-of-counsel defense to charges of willfulness <strong>and</strong> because it sent the documents to its<br />

current counsel. The defendant maintained that the attorney-client privilege still existed because its<br />

counsel never opened the e-mail attachments containing the privileged documents. Denying its<br />

motion to compel, the court found the plaintiff did not present sufficient evidence to refute the<br />

defendant’s argument. The plaintiff also disputed 58 e-mails identified by the defendant as<br />

privileged. These e-mails were exchanged between non-attorney employees but contained a<br />

forwarded exchange with an attorney. Although the defendants had produced redacted copies of<br />

the e-mails, the plaintiffs argued the redactions were overbroad because they blocked out<br />

information about the author <strong>and</strong> the recipient of the e-mails. The court agreed, ordering the<br />

defendant to show the plaintiff unredacted copies of the e-mails in order to discuss the scope of<br />

privilege. This disclosure conference, the court added, would not waive any existing attorney-client<br />

privilege.<br />

� Online Policy Group v. Diebold, Inc., 337 F.Supp.2d 1195 (N.D.Cal. Sept. 30, 2004). The<br />

plaintiffs sought a judicial declaration preventing the defendants from claiming that the plaintiffs<br />

unlawfully posted the defendants’ e-mail archive on multiple websites <strong>and</strong> in electronic newsletters.<br />

After the posting, the defendants sent cease <strong>and</strong> desist letters threatening to sue for copyright<br />

infringement under the Digital Millennium Copyright Act (DMCA) if the archive remained accessible<br />

on the Internet. The defendants argued that the e-mail archive, in which employees acknowledged<br />

problems with the company’s electronic voting machines, also contained proprietary <strong>and</strong> trade<br />

secret information as well as personal employee contact information. Although the court<br />

247


determined that the plaintiffs allegations were moot <strong>and</strong> did not entitle them to receive declaratory<br />

or injunctive relief, it found that publishing portions of the e-mail archive was lawful. The court<br />

noted “[e]ven if portions of the e-mail archive have commercial value…[the plaintiffs] used the email<br />

archive to support criticism that is in the public interest, not to develop electronic voting<br />

technology.” The court also determined that the defendants unlawfully used the DMCA safe harbor<br />

provisions “as a sword to suppress publication of embarrassing content rather than as a shield to<br />

protect its intellectual property.”<br />

� Advantacare Health Partners, LP v. Access IV, 2004 WL 1837997 (N.D.Cal. Aug. 17, 2004). The<br />

plaintiffs filed suit against the defendants, former employees of the plaintiffs, alleging the<br />

defendants’ newly created company competed directly with the plaintiffs’ business. In support of<br />

their claims, the plaintiffs hired a computer forensic expert to examine the defendants’ former work<br />

computers. The forensic expert discovered that, prior to leaving the company, one of the<br />

defendants accessed the plaintiffs’ computer network, copied company confidential files, <strong>and</strong><br />

deleted the copied files from his hard drive, in an attempt to conceal the file copying. Based on this<br />

evidence, the court granted the plaintiffs’ request to make forensic copies of the defendants’<br />

current home <strong>and</strong> business computers <strong>and</strong> server. The forensic expert found that after the court<br />

issued the order, numerous computer searches for data deletion software were performed <strong>and</strong> a<br />

program called “BC Wipe” was used to delete more than 13,000 files from the defendant’s home<br />

<strong>and</strong> office computers <strong>and</strong> server. The forensic expert also found an additional 100 files deleted just<br />

hours before the defendants submitted the hard drives to the plaintiffs for analysis. Based on these<br />

facts, the court ordered the defendants to permanently delete the files <strong>and</strong> authorized the plaintiffs<br />

to re-image the defendants’ hard drives to verify compliance. Upon re-imaging the hard drives, the<br />

plaintiffs’ expert discovered thous<strong>and</strong>s of confidential files still existed on the drives. The<br />

defendants argued they could not ensure whether they had deleted all of the files because the<br />

plaintiffs failed to identify the files by name, directory, <strong>and</strong> computer. Declining to accept the<br />

defendants’ argument, the court stated, “[d]efendants’ behavior, from the very inception of this<br />

case, has demonstrated willfulness, fault, <strong>and</strong> bad faith.” The court awarded $20,000 in sanctions<br />

<strong>and</strong> indicated that it would instruct the jury to make a negative inference concerning the deleted<br />

files.<br />

� Feather River Anesthesia Med. Group, Inc. v. Fremont-Rideout Health Group, 2004 WL<br />

1468741 (Cal. Ct. App. June 30, 2004). In a case involving unfair competition allegations, the<br />

plaintiff claimed that the defendant failed to adequately respond to its document production<br />

requests. After the defendant failed to adequately respond for almost an entire year, the trial court<br />

issued a production order <strong>and</strong> awarded monetary sanctions against the defendant. The defendant<br />

then filed a motion for clarification. In response, the trial court modified its original order <strong>and</strong> upheld<br />

the sanction award. Among other things, the modified order required the defendant to report the<br />

authority <strong>and</strong> expertise of the person searching any electronic data. The defendant was also<br />

ordered to assure that the person could access all relevant data <strong>and</strong> that they had made an effort<br />

to recover any relevant deleted data. On appeal, the defendant argued that its actions were<br />

substantially justified because it opposed the plaintiff’s motion to compel. In affirming the trial<br />

court’s imposition of sanctions, the appellate court stated that even if the defendant’s “objections to<br />

disclosure of…some of the evidence may have been valid [that] does not make its refusal to<br />

disclose other discoverable evidence substantially justified.”<br />

� People v. Superior Court, 2004 WL 1468698 (Cal. Ct. App. June 29, 2004). In a case arising from<br />

a fraud <strong>and</strong> gr<strong>and</strong> theft investigation, the defendant was accused of creating false evidence when<br />

served with a federal subpoena that required him to produce certain documents. The false<br />

248


documents included an inaccurate billing statement <strong>and</strong> five letters pertaining to “future” meetings.<br />

A computer forensics investigation of the defendant’s computer revealed that the letters were<br />

actually created after the “future” meetings were set to occur. In addition, the billing statement was<br />

created within an hour of the letters. The trial court held that this evidence was insufficient to show<br />

that the defendant created the documents after he found out about the audit. On appeal, the<br />

government argued that because that the defendant’s fellow director knew about the audit the day<br />

before the defendant created the documents, a fact finder could reasonably infer that the defendant<br />

created the backdated letters in response to the audit. Determining that the evidence supported the<br />

government’s argument, the appellate court reversed the trial court’s decision <strong>and</strong> declared that a<br />

reasonable person could conclude that the defendant was aware of the audit when he created the<br />

backdated documents.<br />

� People v. Dominguez, 2004 WL 1068809 (Cal. Ct. App. May 13, 2004). In a child pornography<br />

prosecution case, the State examined the defendant’s computer for illegal material. The<br />

prosecution’s computer forensic expert recovered 45 child pornography images, deleted from the<br />

computer’s active memory, <strong>and</strong> 20 deleted “favorites folders,” which marked prior visits to child<br />

pornography Web sites. The expert also testified that he discovered child pornography “cookie<br />

files,” files designed to make return visits to a Web site faster. In response, the defendant noted,<br />

inter alia, that, because the evidence was located in his computer’s inactive memory <strong>and</strong> could not<br />

be recovered without the use of specialized computer programs, it was insufficient evidence to<br />

support the conviction. In rejecting the defendant’s argument, the court declared that “[t]he fact that<br />

the evidence of that possession was the result of a forensic examination of the inactive memory of<br />

his computer is meaningless.” As such, the court determined that the evidence supported the<br />

defendant’s conviction for possession of child pornography.<br />

� In re Verisign, Inc. Sec. Litig., 2004 WL 2445243 (N.D. Cal. Mar. 10, 2004). In a class action<br />

securities lawsuit, the plaintiffs sought to compel production of electronic documents in electronic<br />

form. The magistrate judge granted the order, specifically stating that a tiff document production<br />

was insufficient <strong>and</strong> ordered the defendants to produce the documents in a searchable electronic<br />

format – such as a native .pst format – that included metadata. The defendants objected to the<br />

magistrate’s order, arguing that production in native format rather than in tiff format was contrary to<br />

Fed.R.Civ.P. 34. The district court judge rejected this argument <strong>and</strong> declared the Rules “required<br />

[the defendants] to produce responsive electronic documents in their native .pst format if that is<br />

how they were stored in Defendants’ usual course of business.”<br />

� OpenTV v. Libertate Technologies, 219 F.R.D. 474 (N.D.Cal. 2003). The plaintiff requested that<br />

the defendant produce copies of its source code for various products at issue in the litigation. The<br />

defendant objected to the request, claiming that producing this data would be overly burdensome,<br />

but offered to make the source code data available for review at its facilities. The plaintiff rejected<br />

this offer, claiming that it inappropriately shifted the costs of production to the requesting party as<br />

the code must be extracted at its expense. Relying on the analysis set forth in Zubulake cases, the<br />

court found that the source code data was stored in an inaccessible format for purposes of<br />

discovery. The court used the Zubulake seven factor balancing test to determine that the parties<br />

should split the costs of extracting the data equally, with the defendant bearing the copying costs<br />

once the data has been extracted.<br />

� Dodge, Warren, & Peters Ins. Servs. v. Riley, 130 Cal. Rptr. 2d 385 (Cal. Ct. App. 2003). Prior to<br />

termination of their employment, the defendants copied <strong>and</strong> took with them volumes of<br />

computerized data maintained in the plaintiff’s files <strong>and</strong> storage media. The plaintiff sued the<br />

defendants alleging claims of misappropriation of trade secrets, unfair business practices, breach<br />

249


of fiduciary duty <strong>and</strong> breach of contract. The appellate court affirmed the trial court’s order issuing a<br />

preliminary injunction against the defendants, requiring the preservation of electronic evidence <strong>and</strong><br />

ordering them to allow a court-appointed expert to copy the data, recover lost or deleted files, <strong>and</strong><br />

perform automated searches of the evidence under guidelines agreed to by the parties or<br />

established by the court.<br />

� Perfect 10, Inc. v. Cybernet Ventures, Inc., 213 F. Supp. 2d 1146 (C.D.Cal. 2002). In a copyright<br />

<strong>and</strong> trademark infringement action, the court refused to find that all evidence printed from websites<br />

is inauthentic <strong>and</strong> inadmissible. Instead, the court found that the printouts were properly<br />

authenticated under Fed.R.Evid. 901(a) where the plaintiff’s CEO adequately established that the<br />

exhibits attached to his declaration were “true <strong>and</strong> correct copies of pages printed from the Internet<br />

that were printed by [him] or under his direction.”<br />

� Lombardo v. Broadway Stores, Inc., 2002 WL 86810 (Cal. Ct. App. Jan. 22, 2002). The court<br />

upheld sanctions where the defendant destroyed computerized payroll data that was the subject of<br />

the plaintiff’s discovery request.<br />

� Pennar Software Corp. v. Fortune 500 Sys. Ltd., 2001 WL 1319162 (N.D.Cal. Oct. 25, 2001). In<br />

a breach of contract suit, the court imposed sanctions upon the defendant in the form of attorney’s<br />

fees for committing spoliation of evidence <strong>and</strong> prolonging the discovery process. The court based<br />

its findings on the defendant’s failure to present a maintenance policy, log files, or backup tapes<br />

that would track the website maintenance <strong>and</strong> deletion procedures. When the evidence was<br />

produced, the court found that the defendant tampered with <strong>and</strong> deleted evidence in order to evade<br />

personal jurisdiction.<br />

� Unnamed Physician v. Board of Trustees of St. Agnes Medical Center, 113 Cal.Rptr.2d 309<br />

(Cal. Ct. App. 2001). In a physician review hearing, the hospital was ordered to provide the<br />

physician with all existing documents related to the hospital’s computer programs, except those of<br />

a proprietary nature.<br />

� In re Pacific Gateway Exchange, Inc., 2001 WL 1334747 (N.D.Cal. Oct. 17, 2001). In a securities<br />

violation case, the court lifted the discovery stay, stating “The court finds that there is a significant<br />

risk that relevant documents, both paper <strong>and</strong> electronic, could be irretrievably lost, which could<br />

result in prejudice to plaintiffs.”<br />

� Benton v. Allstate Ins. Co., 2001 WL 210685 (C.D. Cal. Feb. 26, 2001). The court refused to<br />

grant a continuance on the defendant’s summary judgment motion where the plaintiff claimed that<br />

he had not had an adequate opportunity to conduct discovery of the defendant’s computer system.<br />

The court concluded that the plaintiff did not show that a further continuance was necessary to<br />

prevent irreparable harm or that further discovery will enable him to obtain evidence essential to his<br />

opposition to the motion.<br />

� Adobe Sys., Inc. v. Sun South Prod., Inc., 187 F.R.D. 636 (S.D. Cal. 1999). In a computer piracy<br />

suit, the court denied the plaintiff’s ex parte application for a temporary restraining order. The court<br />

based its decision on the fact that it is more difficult to erase evidence that is magnetically encoded<br />

on a computer hard disk than it is to physically destroy floppy disks, compact discs, invoices, <strong>and</strong><br />

other tangible forms of evidence. “Manual or automated deletion of that software may remove<br />

superficial indicia, such as its icons or presence in the user’s application menu. However, telltale<br />

traces of a previous installation remain, such as ab<strong>and</strong>oned subdirectories, libraries, information in<br />

system files, <strong>and</strong> registry keys…Even if an infringer managed to delete every file associated with<br />

the plaintiffs’ software, the plaintiffs could still recover many of those files since the operating<br />

system does not actually erase the files, but merely marks the space consumed by the files as free<br />

for use by other files.”<br />

250


� Playboy Enters., Inc. v. Welles, 60 F. Supp. 2d 1050 (S.D. Cal. 1999). The court appointed a<br />

computer expert who specialized in the field of electronic discovery to create a “mirror image” of<br />

the defendant’s hard drive. The court reserved Respondent’s right to object to production after data<br />

capture by expert <strong>and</strong> review of materials.<br />

� Symantec Corp. v. McAfee Assoc., Inc., 1998 WL 740807 (N.D. Cal. Aug. 14, 1998). The plaintiff<br />

sought to obtain the entire source code for all of the defendant’s products dating back to 1995, as<br />

well as copies of all hard drives which had access to the server from which the information was<br />

copied. The court found that production of this magnitude would be unduly burdensome to the<br />

defendant, both in terms of volume <strong>and</strong> in terms of the proprietary nature of the information sought.<br />

� Aviles v. McKenzie, 1992 WL 715248 (N.D. Cal. Mar. 17, 1992). In an action involving claims of<br />

wrongful termination <strong>and</strong> employment discrimination, the plaintiff presented e-mail messages that<br />

demonstrated he was fired for whistleblowing about unsafe <strong>and</strong> illegal company practices.<br />

� Cabinetware Inc., v. Sullivan, 1991 WL 327959 (E.D. Cal. July 15, 1991). The court issued a<br />

default judgment as a sanction for spoliation of electronic evidence. “Destruction of evidence<br />

cannot be countenanced in a justice system whose goal is to find the truth through honest <strong>and</strong><br />

orderly production of evidence under established discovery rules.”<br />

� Lawyers Title Ins. Co. v. United States Fidelity & Guar. Co., 122 F.R.D. 567 (N.D. Cal. 1988).<br />

The court rejected, as broadly framed <strong>and</strong> intrusive, a request to inspect the responding party’s<br />

entire computer system where it was a mere possibility that responding party might produce<br />

applicable documents. The court required a showing that this inspection would lead to evidence<br />

that had not already been produced.<br />

� National Assoc. of Radiation Survivors v. Turnage, 115 F.R.D. 543 (N.D. Cal. 1987). The court<br />

imposed sanctions on party that altered <strong>and</strong> destroyed computer documents in the regular course<br />

of business. The court appointed special master to oversee the discovery process.<br />

� William T. Thompson Co. v. General Nutrition Corp., 593 F. Supp. 1443 (C.D. Cal. 1984). GNC<br />

was ordered to preserve all records that were maintained in the ordinary course of its business;<br />

despite this, company employees were instructed that these judicial orders “should not require us<br />

to change our st<strong>and</strong>ard document retention or destruction policies or practices.” The court ordered<br />

a default judgment <strong>and</strong> over $450,000 in monetary sanctions, where GNC deleted electronic<br />

documents that were not otherwise available.<br />

Hawaii<br />

� Hawaiian Airlines, Inc. v. Mesa Air Group, Inc., 2008 WL 185649 (Bkrtcy.D.Hawaii Jan. 22,<br />

2008). Previously in this breach of contract litigation, the court sanctioned the defendant for<br />

deliberate destruction of electronic evidence while under a preservation obligation by finding<br />

certain facts conclusively established in favor of the plaintiff. Subsequently, the plaintiff filed this<br />

motion for attorney’s fees <strong>and</strong> costs. Finding the defendant’s prior spoliation to be the cause of the<br />

expenditures of the plaintiff’s computer forensic expert, the court awarded the related fees <strong>and</strong><br />

expenses. However, as the additional expert witness fees, attorney travel, meal costs <strong>and</strong><br />

computerized legal research fees were unrelated to the misconduct, the court declined to award<br />

them to the plaintiff.<br />

� Hawaiian Airlines, Inc. v. Mesa Air Group, Inc., 2007 Bankr. LEXIS 3679 (Bankr.D.Haw. Oct. 30,<br />

2007). In this trade secret misappropriations claim, the plaintiff motioned the court to sanction the<br />

defendant, alleging deliberate destruction of evidence that the defendant had a duty to preserve.<br />

Before the complaint was filed, the defendant’s top officer installed program deletion software on<br />

251


his home computer <strong>and</strong> two laptops that permanently eliminated the residue of previously deleted<br />

files <strong>and</strong> changed the system clock. The court found the destruction to be intentional, deliberate,<br />

willful <strong>and</strong> in bad faith. Therefore, the court found spoliation <strong>and</strong> ordered an adverse inference that<br />

the evidence destroyed was unfavorable to the defendant.<br />

Idaho<br />

� Multiquip, Inc. v. Water Mgmt. Sys. LLC, 2009 WL 4261214 (D. Idaho Nov. 23, 2009). In this<br />

dispute, the defendants moved to exclude the plaintiff’s use of a privileged e-mail obtained after<br />

one defendant inadvertently included a third party via the "autofill" feature. The third party then<br />

passed the e-mail chain to the plaintiff’s counsel. After discovering the mistake, the defendants<br />

requested return of the e-mail, which the plaintiff denied claiming Fed.R.Civ.P. 26(b)(5)(B) only<br />

applied to documents turned over in discovery. Using Fed.R.Evid. 502(b) to determine whether<br />

disclosure constituted a waiver, the court determined that the disclosure was inadvertent, that the<br />

defendants took reasonable steps to prevent disclosure because reliance on the "autofill" feature<br />

was not unreasonable <strong>and</strong> that the defendants acted promptly to rectify the error. Based on this<br />

analysis, the court found privilege was not waived <strong>and</strong> granted the defendants’ motion to exclude<br />

the privileged information.<br />

� Alamar Ranch, LLC v. County of Boise, 2009 WL 3669741 (D. Idaho Nov. 2, 2009). In this Fair<br />

Housing Act lawsuit, the non-party’s attorney requested the return of privileged documents<br />

obtained through the plaintiff’s previous subpoena. The privileged information included e-mails sent<br />

to the non-party attorney from one of his clients via her work e-mail address. The plaintiff argued<br />

that any privilege was waived on account of the company’s privacy policy, which included the right<br />

to review <strong>and</strong> disclose all electronic messages created. Using a four-part balancing test that<br />

balanced the expectation of privacy against the lack of confidentiality, the court found that the<br />

company placed all employees on notice that e-mails would become the employer’s property. The<br />

court also noted that the client’s apparent lack of awareness of the privacy policy was<br />

unreasonable "in this technological age" <strong>and</strong> that the client’s e-mail address itself clearly put the<br />

non-party attorney on notice of a potential issue of confidentiality. Thus, the court determined<br />

privilege was waived with respect to the e-mails sent using the client’s work e-mail account.<br />

� Allcare Dental Mgmt., LLC v. Zrinyi, DDS, 2008 WL 4649131 (D.Idaho Oct. 20, 2008). In this<br />

libel case, the plaintiff sought limited expedited discovery prior to the Fed.R.Civ.P. 26(f)<br />

conference. The plaintiff sought permission to serve a subpoena duces tecum on the third-party<br />

internet service provider, requiring it to produce identifying information for the “Doe” defendants<br />

<strong>and</strong> also sought to image the named defendants’ hard drives. The plaintiff argued the expedition<br />

was necessary to ascertain the “Doe” defendants’ names <strong>and</strong> to preserve relevant ESI. Granting<br />

the plaintiff’s motion, the court noted that service providers typically retain user activity logs for a<br />

limited period of time <strong>and</strong> that the information was necessary for the litigation. Additionally, the<br />

court ordered the defendants’ to make any computer, portable, or detachable hard drive available<br />

to the plaintiff’s computer forensic expert for imaging, citing the defendants’ previous behavior of<br />

service evasion, which gave rise to the assumption that it had little respect for the legal process or<br />

the requirement to preserve electronic data. In order to prevent prejudice to the defendants, the<br />

forensic expert was ordered to keep the images confidential <strong>and</strong> file them under seal.<br />

Montana<br />

252


� Peschel v. City of Missoula, 2009 WL 3364460 (D. Mont. Oct. 15, 2009). In this §1983 claim<br />

asserting unreasonable force <strong>and</strong> lack of probable cause, the plaintiff sought default judgment<br />

sanctions alleging the defendants spoliated video-recorded evidence. The defendants argued<br />

sanctions were not appropriate because the video’s deletion was accidental. Citing the defendants’<br />

failure to have a backup system in place to ensure adequate preservation, the court determined the<br />

spoliation was the result of recklessness that warranted sanctions. In determining the appropriate<br />

sanction, the court found that an adverse inference was insufficient to cure the prejudice to the<br />

plaintiff. Although the court did not find an outright default judgment sanction appropriate, the court<br />

held that the defendants used unreasonable force. The court recognized this determination would<br />

effectively grant summary judgment on the issue of unreasonable force, "<strong>and</strong>, as such, [was]<br />

tantamount to a default judgment."<br />

Oregon<br />

� United States v. Sedaghaty, 2010 WL 1490306 (D.Or. Apr. 13, 2010). In this criminal case, the<br />

defendant moved to suppress electronic evidence <strong>and</strong> prevent additional searching of nine<br />

computer hard drives seized <strong>and</strong> copied during the execution of a search warrant. Citing United<br />

States v. Comprehensive Drug Testing, the defendant argued the government exceeded the<br />

warrant’s scope by searching the computer hard drive. Acknowledging the importance of the cited<br />

case, the court noted that the warrant <strong>and</strong> seizure in this case predated the Comprehensive Drug<br />

decision, which was not intended to be applied retroactively. Finding the procedure utilized was<br />

consistent with pre-existing case law, the court determined appropriate search terms were used<br />

that were reasonably related to the items described in the warrant. The court also noted that<br />

government exercised care in this case that exceeded what is required given the nature of white<br />

collar crimes <strong>and</strong> denied the defendant’s motion to suppress.<br />

� Relion, Inc. v. Hydra Fuel Cell Corp., 2008 WL 5122828 (D.Or. Dec. 4, 2008). In this patent<br />

litigation, the plaintiff moved to enforce a stipulated protective order <strong>and</strong> sought the return of two<br />

inadvertently produced e-mails, alleging they were attorney-client privileged. Analyzing the<br />

plaintiff’s conduct using Fed.R.Evid. 502(b), the court determined that the plaintiff did not pursue all<br />

reasonable means of preserving the inadvertently produced e-mails. The court based its decision<br />

on the fact that the plaintiff did not assert privilege until four months after the e-mails were<br />

produced, <strong>and</strong> then only in response to a letter from defense counsel discussing the two e-mails<br />

<strong>and</strong> the fact that the plaintiff had multiple opportunities to inspect the documents prior to<br />

production. The court held that such behavior was tantamount to a failure to pursue all reasonable<br />

means of preserving the confidentiality of the documents, which resulted in waiver of the privilege.<br />

� Van Westrienen v. Americontinental Collection Corp., 189 F.R.D. 440 (D. Or. 1999). The court<br />

held that “plaintiffs are not entitled to unbridled access [of] defendant’s computer system…plaintiffs<br />

should pursue other less burdensome alternatives, such as identifying the number of letters <strong>and</strong><br />

their content.”<br />

Nevada<br />

� United Factory Furniture Corp. v. Alterwitz, 2012 WL 1155741 (D. Nev. Apr. 6, 2012). In this<br />

computer fraud case, the plaintiff sought mirror imaging of the defendants’ home computers due to<br />

the defendants’ “history of tampering with <strong>and</strong> deleting electronic data.” The plaintiff specifically<br />

argued that because the defendants tampered with expense accounts <strong>and</strong> accounts payable files<br />

253


on plaintiff’s computer server, they were highly likely to destroy relevant evidence on their personal<br />

computers. The defendants objected, alleging that mirror imaging would be personally intrusive.<br />

Weighing the potential benefits against the burdens, the court found that a majority of factors—<br />

namely the substantial amount-in-controversy, the high likelihood that relevant ESI was on the<br />

drive, <strong>and</strong> the plaintiff’s willingness to bear associated costs—favored mirror imaging. Responding<br />

to the defendants’ privacy concerns, the court outlined a protocol where a neutral third party would<br />

examine the devices subject to a protective order <strong>and</strong> the clerk would lock the mirror images in an<br />

office vault unless allegations of spoliation arose.<br />

� Cannata v. Wyndham Worldwide Corp., 2011 WL 3495987 (D. Nev. Aug. 10, 2011). In this<br />

federal sexual harassment <strong>and</strong> discrimination litigation, the defendants sought an emergency<br />

protective order to limit the scope of the plaintiffs’ requested deposition, claiming it was overbroad.<br />

Prior to this motion, the plaintiffs had received a court order to depose the defendants’ "person<br />

most knowledgeable" on several topics, including the defendants’ litigation hold process. Noting<br />

that a litigation hold is generally not discoverable unless spoliation is at issue, the court determined<br />

the plaintiffs’ request for information regarding the basic details surrounding the litigation hold<br />

(when <strong>and</strong> to whom the hold was issued, what categories of ESI were included in the hold, etc.)<br />

was reasonable. In denying the defendants’ motion, the court further stated the request may<br />

ultimately benefit the defendants if questions arise regarding efforts to preserve ESI.<br />

� Corbello v. Devito, 2010 WL 4703519 (D. Nev. Nov. 12, 2010). In this intellectual property<br />

litigation, the court considered several discovery motions filed by both parties, including the<br />

requested production of native files, e-mail communications <strong>and</strong> privilege logs. The court had<br />

previously “admonished counsel regarding their lack of cooperation concerning electronically<br />

stored information <strong>and</strong> the exchange of ad hominem attacks,” <strong>and</strong> in an attempt to settle the<br />

ongoing discovery disputes, ordered the parties to file a joint status report following a meet <strong>and</strong><br />

confer session. Despite making significant progress, the parties were unable to reach a resolution,<br />

leaving several issues before the court. Addressing these motions, the court denied the request for<br />

native files as “an unjustifiable waste of time <strong>and</strong> resources” because the requested information<br />

was already produced in PDF form, which constituted a reasonably useable format. Regarding the<br />

requested e-mail communications, the court agreed with the defendants that the scope of the<br />

request <strong>and</strong> bulk of information available warranted a temporal limitation on discovery. Finally, the<br />

court ordered the defendants to produce a privilege log within thirty days of the order.<br />

� G.K. Las Vegas L.P. v. Simon Prop. Group, Inc., 2009 WL 4283086 (D. Nev. Nov. 30, 2009). In<br />

this business litigation, the defendants previously requested case dismissal <strong>and</strong> sanctions based<br />

on the plaintiffs’ alleged spoliation of evidence. Due to the defendants’ failure to demonstrate that<br />

electronic evidence was destroyed <strong>and</strong> no longer available, the motion was dismissed without<br />

prejudice. However, the court ordered a forensic examination of the plaintiffs’ computer equipment<br />

by a court-appointed independent computer forensics expert. Upon learning of the defendants’ ex<br />

parte communications with the independent expert during the imaging process, the plaintiffs moved<br />

to have the forensic examination order vacated <strong>and</strong> the spoliation motion modified to dismissal with<br />

prejudice. The defendants claimed that the expert was not court-appointed but was instead a "party<br />

retained independent expert." Finding the intent to enlist a court-appointed, independent expert<br />

blatantly clear in the record <strong>and</strong> subsequent agreement, the court determined the defendants<br />

"forfeited their opportunity to obtain an independent forensic examination" <strong>and</strong> granted the<br />

plaintiffs’ motions.<br />

� Johnson v. Wells Fargo Home Mortg., Inc., 2008 WL 2142219 (D. Nev. May 16, 2008). In this<br />

mortgage loans <strong>and</strong> credit dispute, the defendants filed a motion to dismiss, alleging evidence<br />

254


spoliation. Through forensic analysis, the defendants’ computer forensic expert established that the<br />

plaintiff reformatted both laptops shortly after a production request for the hard drives, <strong>and</strong> also<br />

found two documents containing metadata suggesting the plaintiff created the documents one year<br />

later than claimed. Opposing the motion, the plaintiff claimed the hard drives were wiped <strong>and</strong><br />

reformatted for maintenance purposes due to virus infections. The court ordered an adverse jury<br />

instruction creating a presumption in favor of the defendants finding the plaintiff acted willfully; was<br />

on notice that information contained on the hard drives was potentially relevant to litigation; <strong>and</strong> did<br />

not produce backup files despite numerous requests. The court reasoned that the harsh sanction<br />

of dismissal was not appropriate because the evidence secured by the defendants’ computer<br />

forensic expert, combined with the adverse jury instruction, did not render it “helpless to rebut any<br />

material that [the] plaintiff might use to overcome the presumption” at trial.<br />

� Coburn v. PN II, Inc., 2008 WL 879746 (D.Nev. Mar. 28, 2008). In this gender discrimination<br />

claim, the defendants filed a motion to compel the plaintiff to provide supplemental answers to<br />

interrogatories <strong>and</strong> requests for the production of documents. Specifically, the defendants sought a<br />

forensic examination of the plaintiff’s home computers, <strong>and</strong> the plaintiff opposed the request as<br />

potentially violating her privilege, privacy <strong>and</strong> confidentiality interests. Finding the burden of<br />

compliance to be minimal, the court set out a protocol for appointing a computer specialist to<br />

conduct the examination, whose cost was payable by the defendants. The protocol contemplated<br />

agreement of the parties, whereby access to protected information would not result in waiver of the<br />

attorney-client privilege. Additionally, the parties were ordered to agree to a time <strong>and</strong> date for<br />

collection whereby the plaintiff’s attorney would maintain the sole copy of the mirror image of the<br />

computers.<br />

� LVRC Holdings, LLC v. Brekka, 2007 WL 2891565 (D.Nev. Sept. 28, 2007). In this trade secret<br />

misappropriations suit, the defendant moved the court for summary judgment, claiming the plaintiff<br />

had not established an issue of material fact <strong>and</strong> they were entitled to judgment as a matter of law.<br />

To prevail on a claim based on the <strong>Computer</strong> Fraud <strong>and</strong> Abuse Act, the plaintiff must establish<br />

access to a protected computer without authorization. In this instance, the plaintiff’s computer<br />

forensic expert testified that the defendant’s personal computer had been used to access the<br />

plaintiff’s secured Web site, but was unable to testify as to when the access took place. Because<br />

the plaintiff did not present facts indicating that the date of access was after termination, the court<br />

granted the defendant’s summary judgment motion.<br />

� Koninklijke Philips Elec. N.V. v. KXD Tech., Inc., 2007 WL 879683 (D. Nev. Mar. 20, 2007). In a<br />

discovery dispute, the plaintiff filed an emergency motion with the court to clarify its discovery order<br />

with respect to the defendants’ production of documents. The plaintiff anticipated less than<br />

adequate discovery responses from the defendants in responding to the court’s order. The plaintiff<br />

also expressed concern that the defendants not be permitted to simply produce an unorganized<br />

body of electronic or paper records which the plaintiff would then be required to search through to<br />

locate documents responsive to particular requests. The defendants claimed that they did not have<br />

to produce the electronic data because during the plaintiff’s original seizure of documents, several<br />

hard drives <strong>and</strong> servers belonging to the defendants were damaged <strong>and</strong> many documents were<br />

lost. The court did not find the defendants’ arguments credible; instead, the court noted that the<br />

defendants had not produced any evidence to show that the hard drives were damaged <strong>and</strong> that<br />

no information could be gleaned from the drives. The court further cautioned that it could order a<br />

computer forensics examination of the alleged damaged drives to determine if the defendants were<br />

truthful <strong>and</strong> to establish if any discoverable information was retrievable. Furthermore, the court<br />

255


warned that the costs of the examination <strong>and</strong> sanctions could be imposed on either party,<br />

depending on what the investigation revealed.<br />

� Residential Constructors, LLC v. Ace Prop. & Cas. Ins. Co., 2006 WL 1582122 (D. Nev. June<br />

5, 2006). In this case, the plaintiffs produced documents in both paper <strong>and</strong> electronic form,<br />

presenting the defendants with a CD-ROM of imaged files, numbered according to the order in<br />

which they were scanned. Although the plaintiff did not provide an index or table of contents, the<br />

plaintiff maintained that the imaged documents were formatted so that defendant could perform key<br />

word searches for information. The plaintiffs argued that they had satisfied their Rule 34 obligations<br />

by presenting the documents in the manner in which they were maintained in the ordinary course<br />

of business <strong>and</strong> were not required to organize or label the documents to correspond with<br />

categories in the defendant’s discovery request. However, in recognizing that the documents had<br />

been gathered from different locations, the court found that a table of contents was “reasonably<br />

necessary to determine…from which entity or department the documents have been produced or<br />

the type of file in which they are contained.” While the court refused to award attorney fees for<br />

delays in discovery, which were “unavoidable in view of the voluminous nature of the documents in<br />

issue,” the court warned the plaintiffs that failure to timely comply with the order could result in<br />

future sanctions.<br />

� City of Reno v. Reno Police Protective Assoc., 59 P.3d 1212 (Nev. 2002). The court overturned<br />

the Employee Relations Board’s decision that documents sent by e-mail cannot be considered<br />

privileged. The court stated that “[C]ourts have generally looked to the content <strong>and</strong> recipients of the<br />

e-mail to determine if the e-mail is protected” <strong>and</strong> held that documents transmitted by e-mail are<br />

protected by the attorney-client privilege.<br />

Washington<br />

� Play Visions, Inc. v. Dollar Tree Stores, Inc., No. C09-1769 MJP (W.D. Wash. June 8, 2011). In<br />

this intellectual property litigation, the defendants sought discovery sanctions in response to the<br />

plaintiff’s motion for voluntary dismissal, alleging a persistent pattern of discovery-related<br />

misconduct. In response to the defendants’ production requests, the plaintiff initially pointed the<br />

defendants to 360 boxes of unsorted records. Even though the plaintiff certified that its production<br />

was complete, the plaintiff’s counsel e-mailed multiple addendums to discovery, many times<br />

requiring the defendants to scramble to meet court deadlines or necessitating extensions. Although<br />

the plaintiff certified that none of its records existed in electronic form, it eventually turned over<br />

some of the dem<strong>and</strong>ed ESI, claiming the accessibility of the database was unknown because "no<br />

one bothered to ask" the company’s IT consultant (plaintiff’s counsel also put the CFO <strong>and</strong> CEO in<br />

charge of discovery responsibilities). Citing this litany of discovery mishaps, the court found<br />

sanctions appropriate <strong>and</strong> awarded the plaintiff over $137,000. Further, because the plaintiff’s<br />

counsel did not abide by Fed.R.Civ.P. 26(g)(1), which requires lawyers to make a "reasonable<br />

inquiry" before certifying discovery responses, the court ordered him to share the burden of the<br />

sanctions.<br />

� O’Neill v. City of Shoreline, 2010 WL 3911347 (Wash. Oct. 7, 2010). In this action concerning the<br />

Public Records Act (PRA), the plaintiffs sought disclosure of an e-mail <strong>and</strong> its associated metadata<br />

that was sent to the deputy mayor alleging improprieties in city zoning decisions. The Court of<br />

Appeals determined the e-mail was a public record to which the plaintiffs were entitled (along with<br />

the metadata) <strong>and</strong> rem<strong>and</strong>ed the case to the trial court. The defendants petitioned for review,<br />

which the Supreme Court of Washington granted. Upon review, the court referenced Lake v. City of<br />

256


Phoenix <strong>and</strong> determined that an electronic version of a record along with its embedded metadata<br />

was a public record subject to disclosure. Further, the court found the State Records Management<br />

Guidelines did not justify the deletion of e-mails or related metadata that were subject to a pending<br />

PRA request <strong>and</strong> held the plaintiffs were entitled to disclosure of the original e-mail <strong>and</strong> associated<br />

metadata. In addition, the court reasoned that the PRA would be drastically undermined if<br />

government employees could circumvent it by using their home computers for government<br />

business <strong>and</strong> directed the City to inspect the hard drive of the deputy mayor’s computer to attempt<br />

recovery of the missing e-mail <strong>and</strong> metadata. Accordingly, the court rem<strong>and</strong>ed giving the City the<br />

chance to search for the requested metadata, <strong>and</strong> instructed the trial court to determine whether<br />

the City has violated the PRA if the metadata is not found <strong>and</strong> to decide if a monetary penalty is<br />

appropriate.<br />

� Magaña v. Hyundai Motor Am., 220 P.3d 191 (Wash. Nov. 25, 2009). In this personal injury<br />

action, the Supreme Court of Washington reviewed the Court of Appeals’ reversal of the trial<br />

court’s imposition of a default judgment sanction on the defendant corporation. Among the<br />

defendant’s violations: The defendant limited the search for documents to its legal department;<br />

made false, misleading <strong>and</strong> evasive responses; <strong>and</strong> willfully violated discovery rules. Arguing that<br />

the plaintiff’s discovery requests were overly broad, the defendant claimed that the harshness of a<br />

default judgment sanction was not warranted. The court noted that the defendant is a<br />

"sophisticated multinational corporation experienced in litigation,” <strong>and</strong> it analyzed the three factors<br />

assessed by the trial court to determine the appropriateness of a default judgment sanction –<br />

willfulness of violation, substantial prejudice to opposing party, <strong>and</strong> availability of lesser sanctions.<br />

The court found that the record reasonably <strong>and</strong> substantially supported the trial court’s conclusion,<br />

<strong>and</strong> it reinstated the $8 million default judgment.<br />

� Starbucks Corp. v. ADT Sec. Servs., Inc., 2009 WL 4730798 (W.D. Wash. Apr. 30, 2009). In this<br />

discovery dispute, the plaintiff sought production of e-mails from a specified time period. The<br />

defendant argued the e-mails were archived on the company’s "cumbersome" old system <strong>and</strong> were<br />

not reasonably accessible under Fed.R.Civ.P 26(b)(2)(B). In support of the position, the<br />

defendant’s information technology representative made several claims, including that accessing<br />

the e-mails would be disruptive to business operations <strong>and</strong> would take nearly four years to restore.<br />

The representative also provided an initial cost estimate for the work of $88,000, but upped the<br />

ante six months later to $834,285. The court noted that the representative "provided exaggerated<br />

reasons <strong>and</strong> exaggerated expenses as to why the [defendant] allegedly [could not] or should not<br />

be ordered to comply with its discovery obligations." The court found that the plaintiff should not be<br />

disadvantaged since the defendant, a "sophisticated" company, chose not to migrate the e-mails to<br />

the now-functional archival system <strong>and</strong> thus determined that the e-mails were reasonably<br />

accessible. Furthermore, the court explained that even if the information was ruled not reasonably<br />

accessible, good cause existed to order production.<br />

� Quinstreet, Inc. v. Ferguson, 2009 WL 1789433 (W.D. Wash. June 22, 2009). In this defamation<br />

<strong>and</strong> interference with contractual relations litigation, the plaintiff moved to compel production of<br />

electronically stored information in a reasonably usable format. In response to the plaintiff’s request<br />

for all documents <strong>and</strong> communications supporting the defendant’s claim <strong>and</strong> certain<br />

communications, the defendant provided the plaintiff with an Internet link. The plaintiff asserted the<br />

link contained more than 7,000 pages of raw code listing e-mails messages, <strong>and</strong> that it was<br />

impossible to separate one e-mail from another or to know which e-mails were responsive to which<br />

requests. Finding that the e-mails were not produced in a “reasonably usable format” <strong>and</strong> that the<br />

defendant’s lack of cooperation did not help the parties to reach the merits of the case, the court<br />

257


determined the defendant’s behavior was the kind that the Federal Rules of Civil Procedure<br />

specifically caution against. Accordingly, the court ordered the defendant to produce the e-mails in<br />

a readable format, number them individually <strong>and</strong> indicate which e-mails respond to the plaintiff’s<br />

specific requests for production.<br />

� Suarez Corp. Indus. v. Earthwise Technologies, Inc., 2008 WL 2811162 (W.D.Wash. July 17,<br />

2008). In this litigation involving trademark infringement, inter alia, the plaintiffs filed a motion to<br />

compel seeking electronic documents. Unsatisfied with the defendants’ production, the plaintiffs<br />

asserted the production was a disorganized “document dump” <strong>and</strong> that they should be able to<br />

specify production format with regard to the organization of production. Finding the plaintiffs’<br />

argument unpersuasive, the court determined the plaintiffs were without authority to m<strong>and</strong>ate the<br />

defendants’ production organization under Fed.R.Civ.P. 34(b). The court also determined the<br />

advisory committee comments to that rule do not specify the term “form” as referring to the<br />

organizational m<strong>and</strong>ates found in Fed.R.Civ.P. 34(b)(2)(E). Nevertheless, the court required the<br />

defendants to “convey some information as to how the documents were determined to be<br />

responsive or how the documents were kept in the normal course of business.” Accordingly, the<br />

court granted the motion to compel in part.<br />

� Daimler Truck N. Am. LLC v. Younessi, 2008 WL 2519845 (W.D.Wash. June 20, 2008). In this<br />

litigation alleging a breach of a duty of loyalty, the interested third party filed a motion to quash<br />

subpoenas served upon it by the plaintiff <strong>and</strong> sought a protective order. The third party argued the<br />

search of its hard drives was unduly burdensome <strong>and</strong> would result in the disclosure of confidential<br />

trade secrets. Finding the plaintiff’s discovery request to meet the good cause st<strong>and</strong>ard of<br />

Fed.R.Civ.P. 26(b)(1), the court nonetheless quashed the subpoena insomuch as it required the<br />

third party to produce its computers for copying. However, the court directed the third party to<br />

search its own computers. Recognizing the need for a protective order given the sensitive nature of<br />

trade secrets, the court relied on Playboy Enterprises, Inc. v. Welles, F.Supp.2d 1050 (S.D.Cal.<br />

1999) as a model for this case, ordering the third party to conduct a search of the hard drives,<br />

producing information that is relevant, responsive <strong>and</strong> does not disclose trade secrets.<br />

� Mikron Indus., Inc. v. Hurd Windows & Doors, Inc., 2008 WL 1805727 (W.D. Wash. April 21,<br />

2008). In this dispute, the defendants sought a protective order regarding electronically stored<br />

information (ESI), claiming searching through their ESI would create significant costs <strong>and</strong> would<br />

yield cumulative results. The defendants also relied on Fed.R.Civ.P. 26(b)(2) to make a costshifting<br />

argument. The plaintiff argued the defendants had not reasonably complied with discovery<br />

requests. Denying the protective order, the court determined the defendants did not sufficiently<br />

demonstrate the inaccessibility of the requested ESI, or an undue hardship; therefore, cost-shifting<br />

was not appropriate. Specifically, in alleging continued discovery of ESI would be unduly<br />

burdensome, the defendants failed to offer evidence beyond a cost estimate, such as the number<br />

of backup tapes, different methods used to store electronic information, or document retention<br />

policies. The court ordered the parties to meet <strong>and</strong> confer to discuss ESI discovery, prior to<br />

bringing any future motions.<br />

� City of Seattle v. Prof’l Basketball Club, LLC, 2008 WL 539809 (W.D.Wash. Feb. 25, 2008). In<br />

this dispute over performance of a lease agreement, the plaintiff filed a motion to compel the<br />

defendant to search <strong>and</strong> produce responsive e-mails from six of its eight members. Having<br />

produced 150,000 e-mails from two of the members, the defendant objected to this request,<br />

claiming the search would “increase the universe exponentially” <strong>and</strong> would generally produce<br />

irrelevant documents. Finding a principal-agent relationship between the defendant <strong>and</strong> its<br />

members, the court determined sufficient cause to dem<strong>and</strong> the documents from its members as<br />

258


the defendant was in possession, custody or control of the e-mails at issue. The court, therefore,<br />

ordered the defendant to produce e-mail from the remaining four members at issue, finding the<br />

defendant’s claim of burden to be insufficient under Fed.R.Civ.Pro. 26(b)(2)(B).<br />

� Am. Fast Freight, Inc. v. Nat’l Consolidation & Distribution, Inc., 2007 WL 3357694<br />

(W.D.Wash. Nov. 7, 2007). In this suit alleging breach of contract, the plaintiffs filed a motion to<br />

compel discovery of material relevant to the claim that the defendant intentionally used a corporate<br />

alter ego to evade duties to the plaintiffs. The defendant argued that the sought after information<br />

would not lead to the production of relevant information <strong>and</strong> that the burden of production<br />

outweighed the plaintiffs’ likely benefit. The court ordered production consistent with the plaintiffs’<br />

request <strong>and</strong> listed five factors relevant in determining the burden question: 1) the needs of the<br />

case; 2) the amount in controversy; 3) the parties’ resources; 4) the importance of the issue at<br />

stake; <strong>and</strong> 5) the importance of the proposed discovery. Further, court found that the breadth of the<br />

discovery requests justified the defendant’s failure to produce documents <strong>and</strong> denied the plaintiffs’<br />

request for attorney’s fees.<br />

� Vaughn v. City of Puyallup, 2007 WL 3306743 (W.D.Wash. Nov. 6, 2007). In this termination suit,<br />

the plaintiff alleged he was constructively discharged from his employment with the police<br />

department. After serving the defendant with discovery requests, the plaintiff filed a motion to<br />

compel, requesting the court to order the defendant to instruct its employees to conduct a diligent<br />

search for responsive <strong>and</strong> relevant electronic documents, extend the discovery deadline <strong>and</strong> grant<br />

appropriate sanctions including the costs resulting from the alleged discovery violations. Finding<br />

the defendant fulfilled its duties <strong>and</strong> was not under a duty to comply with every discovery procedure<br />

requested by the plaintiff, the court denied the plaintiff’s motion to compel <strong>and</strong> refused to impose<br />

sanctions.<br />

� Sims v. Lakeside School, 2007 WL 2745367 (W.D.Wash. Sept. 20, 2007). In this discovery<br />

dispute, the defendant made an image of the plaintiff’s employer-owned laptop with no objection<br />

from the plaintiff. Shortly thereafter, the plaintiff objected, prompting the defendant to file this<br />

motion to compel review of the hard drive. The court found the plaintiff had no reasonable<br />

expectation of privacy since the laptop was furnished by his employer <strong>and</strong> clearly articulated in the<br />

employee manual. The court granted the defendant’s request to review the contents of the<br />

plaintiff’s hard drive excluding web-based generated e-mails, communications between the plaintiff<br />

<strong>and</strong> his spouse (marital communications privilege) <strong>and</strong> communications between the plaintiff <strong>and</strong><br />

his attorney (attorney client privilege). Agreeing with the defendant’s proposal as to how the hard<br />

drive should be imaged, the court ordered the defendant to provide, at its expense, the parties with<br />

a list of files from the plaintiff’s computer, allowing the plaintiff a chance to review for any privileged<br />

files.<br />

� Mother, LLC v. L.L. Bean, Inc, 2007 WL 2302974 (W.D.Wash. Aug. 7, 2007). In a suit alleging<br />

false designation of origin, inter alia, the defendant motioned the court to sanction the plaintiff<br />

based on its failure to comply with an earlier discovery order requiring the plaintiff to produce all<br />

electronically stored information regarding its finances. In response to the motion, the plaintiff<br />

offered to forgo the claim for lost profits <strong>and</strong> continue only on the disgorgement claim <strong>and</strong> argued<br />

that the information sought could have been calculated from other information already in the<br />

defendant’s possession. Realizing that the plaintiff’s argument was made following a deposition,<br />

which was rescheduled due to the plaintiff being unprepared, <strong>and</strong> therefore disingenuous at best,<br />

the court granted the defendant’s motion. The court ordered the plaintiff to pay reasonable<br />

expenses, costs <strong>and</strong> attorney’s fees associated with the motion <strong>and</strong> ordered the lost profits claim<br />

stricken from the record.<br />

259


� Keystone Fruit Mktg., Inc. v. Brownfield, 2007 WL 788358 (E.D. Wash. Mar. 14, 2007). In a<br />

misappropriation of trade secrets case, the plaintiff alleged that one of its former employees<br />

opened <strong>and</strong> used a key document on her laptop after being fired from the plaintiff’s company. The<br />

employee was then hired by the defendant who is a competitor in the field. The fired employee<br />

stated that she merely opened up the document <strong>and</strong> viewed it <strong>and</strong> argued that it was only<br />

speculation that the document was given to or used with the defendant’s business. She also<br />

claimed that any documents belonging to the plaintiff were destroyed. However, the plaintiff<br />

conducted a computer forensics analysis on the hard drive of the employee’s laptop <strong>and</strong> home <strong>and</strong><br />

work computers. The analysis showed that the employee retained the plaintiff’s data <strong>and</strong> files on<br />

her home computer <strong>and</strong> that some of those files also existed in her e-mail account <strong>and</strong> on the<br />

computers at the defendant’s company. This evidence was contrary to the employee’s testimony<br />

that she destroyed all of plaintiff’s data <strong>and</strong> did not use the plaintiff’s computer data in her new<br />

employment. Based on these facts, the court allowed the plaintiff to amend its complaint to<br />

supplement claims against the defendant.<br />

� Hedenburg v. Aramark Am. Food Services, 2007 WL 162716 (W.D. Wash. Jan. 17, 2007). In a<br />

gender discrimination employment suit, the defendant moved the court to compel production of the<br />

plaintiff’s home computer hard drive. The defendant argues that the home hard drive may contain<br />

information, namely e-mails or letters to other people, which may reveal discrepancies between her<br />

testimony <strong>and</strong> statements to others regarding her actual emotional state of mind while working for<br />

the defendant. The plaintiff argues that the request is a “fishing expedition” for evidence <strong>and</strong><br />

information contained on the hard drive would have little relevance to the case. The court denied<br />

the defendant’s motion stating that the “central claims in the case are wholly unrelated to the<br />

contents of plaintiff’s computer.” The court further held that the “defendant is hoping blindly to find<br />

something useful in its impeachment of the plaintiff” <strong>and</strong> there is not a strong likelihood that<br />

evidence would be found on the hard drive. Furthermore, the court described the defendant’s<br />

request as a “search warrant” stating that defendant merely is searching for evidence that may not<br />

exist <strong>and</strong> the burden of such a search clearly outweighs the benefit.<br />

� The Bedford, LLC v. Safeco Ins. Co. of Am., 2006 WL 3616434 (Wash. App. Div. 1 Dec. 11,<br />

2006). In a breach of contract case, the plaintiff appealed a jury decision in favor of the defendant<br />

based on the defendant’s failure to disclose an attachment to an e-mail before trial. The<br />

defendant’s attachment to the e-mail was only available on a backup tape which was eventually<br />

recovered <strong>and</strong> produced shortly before the trial’s end. The e-mail was sent from the defendant’s<br />

expert <strong>and</strong> the attachment was a draft of his expert report. The plaintiff argued it was significantly<br />

prejudiced in its claim because of the discovery delay. The defendant argued the attachment was<br />

only a draft <strong>and</strong> it was under no obligation to produce mere drafts of expert reports which were<br />

ultimately submitted to the plaintiff. The court held that there is no duty to retain all experts’ drafts<br />

which are eventually overwritten <strong>and</strong> submitted in a separate final form. The court also held the<br />

plaintiff was not prejudiced by the surprise draft report before the trial ended because it had a<br />

chance to cross-examine the author of the report.<br />

� Henry v. IAC/Interactive Group, 2006 WL 354971 (W.D. Wash. Feb. 14, 2006). In a case<br />

involving employment discrimination allegations <strong>and</strong> breach of contract counterclaims, the<br />

defendants asserted they first learned (months into the discovery process) the plaintiff possessed<br />

tens of thous<strong>and</strong>s of company documents, a company-issued laptop, <strong>and</strong> a company e-mail<br />

account. The defendants promptly dem<strong>and</strong>ed the return of this data, any copies of the data, <strong>and</strong><br />

written declarations regarding use of the data. Ultimately, the plaintiff turned over several<br />

computers, documents, computer disks <strong>and</strong> CDs to a neutral computer forensic expert.<br />

260


Nevertheless, the defendants believed the plaintiff’s counsel retained copies of the data <strong>and</strong> sought<br />

a preliminary injunction. Granting the injunction, the court stated, “[a]llowing [the] plaintiff <strong>and</strong> her<br />

counsel to continue to have access to the documents increases the risk that they will review<br />

privileged documents. Any documents to which [the] plaintiff is entitled can be produced through<br />

the normal channels of discovery.” The court ordered the plaintiff to return all of the defendant’s<br />

property immediately, <strong>and</strong> indicated that the plaintiff’s attorney-client privilege documents<br />

contained on the computer media could be removed by a neutral computer forensic expert at the<br />

plaintiff’s expense. The expert was to supply the defendants with a log identifying any documents<br />

withheld as privileged.<br />

� Shank v. Kitsap County, 2005 WL 2099793 (W.D.Wash. Aug. 30, 2005). In an employment<br />

related suit, the defendants filed a motion for sanctions alleging the plaintiff violated a court order<br />

<strong>and</strong> withheld discovery. In its request for interrogatories <strong>and</strong> production of documents, the<br />

defendants specifically defined a “document” as including "electronic recordings" <strong>and</strong> "tape<br />

recordings." After the plaintiff failed to provide the requested documents <strong>and</strong> information, the<br />

defendants sought to compel discovery. The court granted the motion <strong>and</strong> ordered the plaintiff to<br />

comply, to which the plaintiff then submitted answers to the interrogatories. During a deposition a<br />

month later, the plaintiff revealed it failed to produce tape <strong>and</strong> electronic recordings falling within<br />

the scope of the defendants’ discovery requests. Although the plaintiff produced four electronic<br />

recordings shortly thereafter, the defendants sought Fed. R. Civ. P. 37 sanctions <strong>and</strong> requested<br />

dismissal of three of the plaintiff’s claims. Alternatively, the defendants sought an order prohibiting<br />

the plaintiff from introducing the recordings at trial. Defending the late production, the plaintiff<br />

claimed he did not initially turn over the recordings because they were stored on his computer in a<br />

format that could not be easily copied. The court found this “a wholly unacceptable basis for failing<br />

to comply with discovery” <strong>and</strong> determined the recordings would be excluded from evidence at trial.<br />

The court stated, “[m]uch of present day discovery is contained on computers. It is both parties’<br />

duty to comply with the rules of discovery <strong>and</strong> court orders despite technical difficulties.”<br />

� Nieshe v. Concrete Sch. Dist., 2005 WL 1580043 (Wash. Ct. App. July 5, 2005). A former student<br />

claimed a school district violated her due process rights by excluding her from participating in her<br />

high school graduation ceremony for not attaining the requisite grade point average. During<br />

discovery, the student requested sanctions against the district for failing to produce a computer<br />

disk containing grade report data. The district had provided hard copies of the student’s grading<br />

report but failed to produce the disk until the first day of trial. The trial court found there may have<br />

been a discovery violation because the disk was within the scope of discovery <strong>and</strong> was not<br />

produced before trial, but decided that sanctions were not warranted. On cross-appeal, the student<br />

argued the court erred by not sanctioning the district for violating the discovery rules. The appellate<br />

court, however, affirmed the district court’s decision <strong>and</strong> found the student did not request the court<br />

to order the district to produce additional documents under Rule 37(a). Moreover, sanctions were<br />

not warranted because the information on the disk did not contain any information that the plaintiff<br />

did not already have.<br />

� Banks v. United States, 2005 WL 974723 (W.D.Wash. Mar. 22, 2005). The plaintiff filed a medical<br />

malpractice suit relating to care received at a veteran’s hospital. During discovery, the plaintiff<br />

obtained a series of “privileged” e-mails attached to various discoverable documents. The<br />

defendant argued that the e-mails were privileged as attorney work product, had been inadvertently<br />

disclosed, <strong>and</strong> should be returned to the defendant <strong>and</strong> disallowed at trial. In response, the plaintiff<br />

contended that even if the e-mails were work product, the defendant waived protection of the<br />

privilege by producing the e-mails. The court adopted the Ninth Circuit’s five factor test relating to<br />

261


privilege waiver, which weighed the following factors: "(1) the reasonableness of the precautions to<br />

prevent inadvertent disclosure; (2) the time taken to rectify the error; (3) the scope of the discovery;<br />

(4) the extent of the disclosure; <strong>and</strong> (5) the ‘overriding issue of fairness’." Applying the test, the<br />

court noted neither party presented evidence of precautionary measures taken to prevent<br />

inadvertent disclosure. The court also noted the defendant timely attempted to rectify the error <strong>and</strong><br />

that the extent of the disclosure was limited. Based on its findings, the court determined the<br />

privilege was not waived, ordered the plaintiff to return the e-mails, <strong>and</strong> declared the e-mails would<br />

not be admissible at trial.<br />

� Go2Net, Inc. v. C I Host, Inc., 60 P.3d 1245 (Wash. Ct. App. 2003). After discovery commenced<br />

in a suit to collect payment due under a services contract, the parties exchanged document<br />

requests. In responding to the defendant’s requests, the plaintiff provided some documents, but<br />

advised that one of its servers had crashed <strong>and</strong> was in the process of being rebuilt. The plaintiff<br />

stated that it would supplement its production at a later date. A day prior to the summary judgment<br />

hearing in the case, the plaintiff produced the additional e-mails from the rebuilt server. The trial<br />

court issued summary judgment in favor of the plaintiff. On appeal, the defendant argued that the<br />

trial court abused its discretion in refusing to vacate the summary judgment order in light of "newly<br />

discovered evidence”, namely the internal e-mail messages produced just prior to the summary<br />

judgment hearing. The appellate court found that the e-mail messages were not “newly discovered<br />

evidence” where there was nothing to suggest that the plaintiff deliberately tried to hide these<br />

documents.<br />

� State v. Townsend, 57 P.3d 255 (Wash. 2002) (Bridge, J. concurring). The principal issue the<br />

court resolved was whether a police officer violated a provision in Washington’s privacy act when<br />

he saved <strong>and</strong> printed e-mail <strong>and</strong> real time client-to-client ICQ messages between the defendant<br />

<strong>and</strong> a fictitious child. The court upheld the conviction <strong>and</strong> held that the act was not violated. In a<br />

concurring opinion, one judge further addressed the unique aspects of electronically created <strong>and</strong><br />

stored e-mail. “Technically, e-mail messages are permanently recorded since ‘most e-mail<br />

programs keep copies of every message a user ever wrote, every message the user ever received,<br />

<strong>and</strong> every message the user deleted.’…Although some e-mail services may offer the possibility of<br />

‘shredding’ an e-mail message, arguably the equivalent of actually deleting it, the e-mail file may<br />

still be retrievable using certain software. ‘A deleted file is really not a deleted file, it is merely<br />

organized differently.’ “<br />

� Demelash v. Ross Stores, Inc., 20 P.3d 447 (Wash. Ct. App. 2001). In an action for a false<br />

shoplifting arrest, the court stated, “A trial court must manage the discovery process in a fashion<br />

that promotes full disclosure of relevant information while at the same time protecting against<br />

harmful side effects. Consequently, a court may appropriately limit discovery to protect against<br />

requests that are unduly burdensome or expensive.” The court limited the scope of to a<br />

computerized summary of the store’s files.<br />

� State of Wash. v. Ben-Neth, 663 P.2d 156 (Wash. Ct. App. 1983). <strong>Computer</strong>-generated evidence<br />

is hearsay but may be admitted as a business record provided a proper foundation is laid.<br />

Tenth Circuit – State <strong>and</strong> Federal <strong>Case</strong>s<br />

� Lee v. Max Int’l, LLC , 2011 WL 1651640 (10th Cir. May 3, 2011). In this contract dispute, the<br />

plaintiffs appealed an order dismissing the case as a sanction for discovery misconduct, arguing<br />

they complied with the second production order <strong>and</strong> contending the district court failed to<br />

sufficiently explain its reasons for dismissal. Rejecting both arguments, the court identified at least<br />

262


one violation of the second order, found the plaintiffs falsely declared their production was<br />

complete <strong>and</strong> concluded there was no abuse of discretion by the district court – which it noted<br />

should be given wide deference in imposing discovery sanctions. Remarking that "there is such a<br />

thing as discovery karma," the court warned that "[d]iscovery misconduct often may be seen as<br />

tactically advantageous at first. But just as our good <strong>and</strong> bad deeds eventually tend to catch up<br />

with us, so do discovery machinations." In affirming the dismissal, the court held, a "party’s thrice<br />

repeated failure to produce materials that have always been <strong>and</strong> remain within its control is strong<br />

evidence of willfulness <strong>and</strong> bad faith, <strong>and</strong> in any event is easily fault enough . . . to warrant<br />

dismissal or default judgment."<br />

� Procter & Gamble Co. v. Haugen, 427 F.3d 727 (10th Cir. 2005). In an action brought under the<br />

Lanham Act, the plaintiffs alleged defendant Haugen spread a voice-mail message to thous<strong>and</strong>s of<br />

Amway distributors falsely declaring profits from the plaintiffs’ products were used to support the<br />

Church of Satan. In assessing the impact of the Satanism rumors on its sales <strong>and</strong> market share,<br />

the plaintiffs hired experts to review market share databases created by an unrelated third party.<br />

The defendants sought sanctions against the plaintiffs for failing to preserve <strong>and</strong> produce these<br />

databases even after receiving several discovery requests <strong>and</strong> production orders. In response, the<br />

plaintiffs contended the following: its subscription contract did not allow it to download all of the<br />

third party database information; its computer system could not h<strong>and</strong>le the entire download; the<br />

data was unhelpful in assessing damages; the defendants refused the third party’s offer to make<br />

the databases available for a fee; <strong>and</strong> the discovery-related orders were not violated. The district<br />

court found the plaintiff failed to preserve data, granted the sanctions motion <strong>and</strong> dismissed the<br />

claim with prejudice. See Procter & Gamble Co. v. Haugen, 2003 WL 22080734 (D.Utah Aug. 19,<br />

2003), rev’d, 427 F.3d 727 (10th Cir. 2005). On appeal, the court reversed the ruling finding it<br />

“impossible to conclude that [the plaintiffs] acted with the requisite culpability to justify the sanction<br />

of dismissal.” The court also noted genuine issues of material fact existed as to whether the<br />

defendants were prejudiced by their lack of access to the databases.<br />

� United States v. Bass, 411 F.3d 1198 (10th Cir. 2005). The defendant appealed a conviction of<br />

five counts of knowing possession of child pornography on the grounds the evidence was<br />

insufficient to support the convictions. At trial, the defendant argued he did not know the images<br />

were automatically saved to the computer. However, he admitted he attempted to remove child<br />

pornography from the computer using two software programs, “History Kill” <strong>and</strong> “Window Washer.”<br />

Based on this admission, the appellate court found sufficient evidence existed to support the<br />

convictions. The defendant also challenged the sufficiency of his indictments, stating they were<br />

deficient because they identified the images as “bmp” files rather than “jpeg” files (which actually<br />

existed on the computer). The court also rejected this argument <strong>and</strong> declared “[t]he images<br />

identified in [the defendant’s] indictment indisputably came from his computer.” The court noted the<br />

file type identification change resulted from the forensic examiner’s software but was numerically<br />

identical to what existed in the defendant’s computer.<br />

� United States v. Hamilton, 413 F.3d 1138 (10th Cir. 2005). The defendant appealed from a<br />

conviction for transporting child pornography in interstate commerce in violation of federal law. At<br />

trial, the government introduced 44 child pornography images the defendant allegedly uploaded to<br />

a newsgroup. The images contained computer-generated header information (also known as<br />

metadata) linking the defendant to the images. On appeal, the defendant argued the headers<br />

constituted hearsay <strong>and</strong> should have been excluded from evidence. The appellate court rejected<br />

this argument <strong>and</strong> found the district court was correct in finding the headers did not amount to<br />

hearsay. The court reasoned the information did not fall within the Rule 801(c) definition of hearsay<br />

263


ecause “the header information was automatically generated by the computer hosting the<br />

newsgroup each time Hamilton uploaded a pornographic image to the newsgroup.”<br />

� United States v. Meienberg, 263 F.3d 1177 (10th Cir. 2001). The government introduced printouts<br />

of computerized records <strong>and</strong> the defendant objected to these print-outs based on lack of<br />

authentification. The court held that the government met its burden by presenting a witness who<br />

testified that the print-outs were a record of all transactions. The court held that this was in<br />

accordance with Federal Rule of Evidence 901(b)(7).<br />

� Hardison v. Balboa Ins. Co., 4 Fed. Appx. 663 (10th Cir. 2001). To prove that an insurance<br />

company had followed notice of cancellation requirements, the court admitted computer files <strong>and</strong><br />

print-outs regarding how the cancelled policy was processed <strong>and</strong> maintained. The court stated that<br />

computer business records are admissible under Rule 803(6) “if the offeror establishes a sufficient<br />

foundation in the record for [their] introduction.”<br />

Colorado<br />

� Grabenstein v. Arrow Elecs., Inc., 2012 WL 1388595 (D. Colo. April 23, 2012). In this<br />

employment discrimination <strong>and</strong> wrongful termination case, the plaintiff sought sanctions against the<br />

defendant former employer for deletion of e-mails related to the plaintiff’s request for disability<br />

benefits. At issue in this case was whether the defendant had a duty to preserve the e-mail in<br />

question before it had notice of impending litigation, <strong>and</strong> whether such deletion occurred in bad<br />

faith so as to warrant sanctions. The plaintiff argued that the defendant had such a duty under an<br />

EEOC retention regulation, 29 CFR § 1602.14, requiring “an employer covered by [the ADA] to<br />

retain all personal records” for one year after their creation, or “until the dispute has been resolved”<br />

when a discrimination charge has been filed against the employer. Although the court found the<br />

defendant adhered to its document retention policy, the defendant nonetheless had a duty to<br />

preserve under the EEOC regulation. In response to allegations of bad faith, however, the court<br />

found that the plaintiff did not sufficiently substantiate that the defendant deleted the e-mails with<br />

the intent to withhold unfavorable information. Thus, the court found no bad faith in the defendant’s<br />

adherence to a good faith document retention policy <strong>and</strong> denied the plaintiff’s motion for sanctions<br />

� McCargo v. Texas Roadhouse, Inc., 2011 WL 1638992 (D. Colo. May 2, 2011). In this racial<br />

discrimination litigation, the plaintiff sought spoliation sanctions based on the automatic destruction<br />

of surveillance video evidence, which included footage from multiple work shifts that allegedly<br />

showed discrimination <strong>and</strong> a persistently hostile work environment. Arguing it could not have<br />

reasonably anticipated litigation concerning events other than one particular incident, the defendant<br />

claimed its duty to preserve evidence was limited to video of that single work shift. Disagreeing, the<br />

court found the duty to preserve triggered when the plaintiff filed a formal complaint, putting the<br />

defendant on notice to preserve all existing <strong>and</strong> future video that included the plaintiff. Noting the<br />

defendant’s conduct went “well beyond corporate arrogance,” the court found the plaintiff was<br />

prejudiced by the recordings which the defendant willfully <strong>and</strong> in bad faith chose not to preserve.<br />

Accordingly, the court issued both m<strong>and</strong>atory <strong>and</strong> permissive adverse inference instructions as<br />

well as attorney fees relating to the spoliation motion.<br />

� Christou v. Beatport, LLC, 2011 WL 650377 (D. Colo. Feb. 10, 2011). In this antitrust litigation,<br />

one of the defendants moved for a protective order staying all discovery pending the adjudication<br />

of its motion to dismiss. Opposing the motion, the plaintiff argued that if discovery did not proceed,<br />

information stored by nonparties would be lost or destroyed pursuant to automatic retention<br />

schedules, or might be archived <strong>and</strong> require increased costs to restore, ultimately resulting in<br />

264


delays <strong>and</strong> financial harm. In support of the motion, the defendant offered a hypothetical scenario<br />

to demonstrate that it, along with the court <strong>and</strong> nonparties, would be burdened by discovery<br />

proceedings, protracted discovery disputes <strong>and</strong> piecemeal litigation. Finding the defendant failed to<br />

provide specific demonstrations of fact to establish good cause, <strong>and</strong> that granting the motion would<br />

cause piecemeal litigation <strong>and</strong> run counter to the public interest, the court denied the protective<br />

order.<br />

� Medcorp, Inc. v. Pinpoint Tech., Inc., 2010 WL 2500301 (D.Colo. June 15, 2010). In this<br />

discovery dispute, the defendants objected to the special master’s ruling, arguing the sanctions<br />

imposed (jury instruction <strong>and</strong> expenses) were not severe enough to address the prejudice caused<br />

by the plaintiff’s willful spoliation of approximately 43 hard drives. The defendants requested the<br />

entirety of fees <strong>and</strong> costs associated with litigating the sanctions motion <strong>and</strong> sought dismissal.<br />

Addressing the dismissal request, the court found that the mitigation of actual prejudice through the<br />

jury instruction <strong>and</strong> the plaintiff’s otherwise responsive production warranted a lesser penalty. The<br />

court also noted there was no evidence the plaintiff acted in a "premeditated” intentional manner,<br />

but rather was merely negligent. Turning to the defendants’ request for $130,000 in expenses, the<br />

court noted that the defendants spent "too much time <strong>and</strong> money . . . on this matter." However, in<br />

light of the nature of the wrongful conduct <strong>and</strong> the importance of the evidence destroyed, the court<br />

awarded the defendants $89,395.88 in attorneys’ fees <strong>and</strong> costs.<br />

� Cartel Asset Mgmt. v. Ocwen Fin. Corp., 2010 WL 502721 (D.Colo. Feb. 8, 2010). In this<br />

misappropriation of trade secrets litigation, the court addressed several motions, notably the<br />

defendants’ motion for a protective order. The defendants argued the production requests<br />

exceeded the discovery permitted by a previous court order, imposed an unreasonable expense<br />

<strong>and</strong> burden, <strong>and</strong> sought information that was duplicative or not likely to lead to the discovery of<br />

admissible evidence. Noting the burden required for a protective order cannot be met with “bald<br />

generalizations,” the court found the defendants’ undue burden <strong>and</strong> expense arguments regarding<br />

the discovery of ESI unpersuasive. The defendants did not provide specific information regarding<br />

ESI storage, the number of backup or archiving systems in place, or the capability to retrieve<br />

information. Rather the defense counsel argued that producing this information would affect<br />

profitability <strong>and</strong> client service. Determining this statement to be the “e-discovery equivalent of an<br />

unsubstantiated claim that the ‘sky is falling,’” the court denied the defendants’ motion in part <strong>and</strong><br />

ordered the defendants to supplement their discovery responses. The court also noted that ediscovery<br />

“has simply become too expensive <strong>and</strong> too protracted to permit superficial compliance<br />

with the ‘meet <strong>and</strong> confer’ requirement” under the Fed.R.Civ.P. <strong>and</strong> endorsed the Sedona<br />

Conference Cooperation Proclamation.<br />

� Silverstein v. Federal Bureau of Prisons, 2009 WL 4949959 (D. Colo. Dec. 14, 2009). In this<br />

discovery dispute, the plaintiff filed a motion for determination of privilege waiver regarding a single<br />

relevant document, arguing its production resulted in a subject matter waiver. After its initial<br />

determination that the document was protected by both attorney-client privilege <strong>and</strong> work product,<br />

the court relied on Fed.R.Evid. 502(b) to establish the scope of the waiver. First, the court<br />

determined the disclosure was intentional—not inadvertent—as defined by Rule 502, since it was<br />

originally examined <strong>and</strong> withheld by the defendants’ counsel. Citing the defendants’ knowledge of<br />

the production <strong>and</strong> failure to take reasonable steps to rectify the erroneous disclosure, the court<br />

held that the defendants had intentionally disclosed the material to gain advantage in litigation,<br />

which justified a subject matter waiver. Noting the plaintiff was not entitled to a "discovery free-forall,"<br />

the court also held that opinion work product would remain protected.<br />

265


� Am. Family Mut. Ins. Co. v. Gustafson, 2009 WL 641297 (D.Colo. Mar. 10, 2009). In this<br />

employment contract litigation, the plaintiff sought a court-ordered e-discovery plan for inspection<br />

of the mirror image of the defendant’s hard drive. Granting the motion, the court set forth the<br />

following protocol: the defendant shall redact privileged <strong>and</strong> confidential data from the mirror image<br />

hard drive, <strong>and</strong> provide a detailed privilege log <strong>and</strong> the redacted mirror image to the plaintiff; the<br />

parties shall then confer <strong>and</strong> agree on search terms with assistance from their respective forensic<br />

experts; the plaintiff shall conduct the forensic search <strong>and</strong> provide the defendant with a Bates<br />

labeled hard copy of relevant ESI which the defendant will then review for responsiveness <strong>and</strong><br />

privileged data, providing a privilege log as necessary.<br />

� Smith v. Slifer Smith & Frampton/Vail Assocs. Real Estate, LLC, 2009 WL 482603 (D.Colo.<br />

Feb. 25, 2009). In this real estate litigation, the defendants objected to the magistrate judge’s<br />

recommendation regarding the plaintiffs’ motion for sanctions for the destruction of evidence. The<br />

plaintiffs’ expert concluded the defendants engaged in a systemic effort to erase pertinent data<br />

based on evidence of wiping software <strong>and</strong> reformatting. The magistrate judge found the<br />

defendants’ actions to be willful <strong>and</strong> in bad faith after the duty to preserve arose. The magistrate<br />

judge therefore recommended an adverse inference jury instruction, a monetary award associated<br />

with attorneys’ fees <strong>and</strong> costs as well as the costs associated with the forensic examination of the<br />

computer files. Finding the recommendation based on substantial evidence, the court adopted the<br />

magistrate’s recommendation <strong>and</strong> warned the defendants that any further sanctions would be more<br />

severe <strong>and</strong> may include a default judgment.<br />

� Cunningham v. St<strong>and</strong>ard Fire Ins. Co., 2008 WL 2668301 (D.Colo. July 1, 2008). In this<br />

insurance contract dispute, the defendants moved for a protective order to prevent the plaintiff from<br />

inquiring into various topics contained in the plaintiff’s Rule 30(b)(6) Notice of Deposition. The<br />

defendants argued that the plaintiff’s notice of the topic regarding “knowledge concerning the<br />

storage, preservation <strong>and</strong> backup” of e-mail was irrelevant to the breach of contract claim. The<br />

plaintiff stated that he communicated with the defendants via e-mail about his claim, requested all<br />

e-mail relating to his claim, <strong>and</strong> yet received almost no e-mail. The court held that the plaintiff had<br />

not met his burden of establishing the topic’s relevance after noting that the defendants asserted<br />

the plaintiff had not referenced any specific missing e-mails. The court granted the defendants’<br />

motion for a protective order in part <strong>and</strong> denied in part; the court granted the motion with respect to<br />

the topic of e-mail storage, preservation <strong>and</strong> backup.<br />

� Palgut v. City of Colorado Springs, 2007 WL 4277564 (D.Colo. Dec. 3, 2007). In this suit, the<br />

plaintiff filed a motion to reconsider discovery rulings made by the magistrate judge <strong>and</strong> to compel<br />

responses to previous discovery requests <strong>and</strong> further discovery to prove unlawful spoliation of ESI.<br />

The court made several findings: the plaintiff’s requests were overbroad <strong>and</strong> unduly burdensome<br />

(affirming a prior ruling); the defendant completed an adequate search for all relevant ESI <strong>and</strong><br />

agreed to complete <strong>and</strong> pay for an additional search; according to Rule 34 of the FRCP, the<br />

plaintiff was no more entitled to the defendant’s ESI than to a warehouse storing paper documents;<br />

<strong>and</strong> the defendant’s backup tapes were not reasonably accessible due to the lack of hardware to<br />

access them <strong>and</strong> the cost of restoration, which outweighed any possible return of relevant<br />

information. Based on these findings, the court denied the plaintiff’s motions <strong>and</strong> ordered each<br />

party to pay their own attorney fees.<br />

� Garcia v. Berkshire Life Ins. Co. of Am., 2007 WL 3407376 (D.Colo. Nov. 13, 2007). In this<br />

lawsuit, the plaintiff brought a bad faith claim against her disability insurer. During discovery, the<br />

defendant sought a DVD produced by the University of Denver containing over 4,000 e-mails with<br />

1,500 attachments sent or received by the plaintiff while she was at the University. In response, the<br />

266


plaintiff produced a mere ten e-mail strings <strong>and</strong> a privilege log of 135 additional e-mails off the<br />

DVD. The plaintiff blamed the discrepancy on a lack of computer expertise <strong>and</strong> argued against<br />

production of the entire DVD as irrelevant <strong>and</strong> privileged. The court found the entire DVD relevant<br />

to the underlying claim of long term disability <strong>and</strong> ordered that it be produced by the plaintiff,<br />

subject to the provisions of FRCP 26(b)(2)(B).<br />

� Tomlinson v. El Paso Corp., 2007 WL 2521806 (D.Colo. Aug. 31, 2007). In this retirement<br />

benefits litigation, pension plan participants sought production of electronic pension plan records<br />

from the defendant employer. The defendant maintained it could not produce the data because it<br />

was in the possession of a third-party plan record-keeper. The plaintiffs argued that the defendant<br />

had a duty under the Employment Retirement Income Security Act (ERISA) to maintain the data for<br />

inspection or examination. In light of the defendant’s obligations under ERISA, the Court held the<br />

data was in the defendant’s possession, custody or control within the meaning of Fed. R. Civ. P.<br />

26(a)(1)(B) <strong>and</strong> subsequently ordered production of the requested documents.<br />

� Metro Wastewater Reclamation Dist. v. Alfa Laval, Inc., 2007 WL 1160012 (D. Colo. Apr. 19,<br />

2007). In a case involving claims of breach of contract, the defendant sought an order to compel<br />

the plaintiff to produce certain data in electronic format <strong>and</strong> all electronic documents, including<br />

archived or back-up e-mails <strong>and</strong> electronic files. The defendant specifically wanted electronic data<br />

for the plaintiff’s personnel identified in its responses to the defendant’s discovery requests.<br />

Although the plaintiff argued that the requested information was overly broad, unduly burdensome,<br />

<strong>and</strong> costly, the court succinctly referred to Fed. R. Civ. P. 26 <strong>and</strong> held that the requested<br />

documents were relevant to the issues of the case <strong>and</strong> were discoverable. The plaintiff was<br />

required to produce all electronic documents, including the archived <strong>and</strong> back-up e-mails for every<br />

employee referred to in their discovery responses.<br />

� Cache La Poudre Feeds, LLC v. L<strong>and</strong> O’ Lakes, Inc., 2007 WL 684001 (D. Colo. Mar. 2, 2007).<br />

In a trademark infringement claim, the plaintiff sought relief for alleged discovery violations.<br />

Specifically, the defendant produced various electronic documents <strong>and</strong> issued a litigation hold<br />

during the suit, but the plaintiff claimed that the defendant’s litigation hold came too late in the<br />

litigation process <strong>and</strong> resulted in systematic spoliation. The plaintiff first sent letters to the<br />

defendant regarding the trademark infringement in 2002 but did not initiate suit until 2004. The<br />

defendant issued its litigation hold once the lawsuit commenced. Furthermore, the plaintiff claimed<br />

the defendant failed to preserve hard drives of former employees. The defendant admitted that it<br />

wiped the hard drives of several employees who left the company during this litigation according to<br />

company policy. The plaintiff not only sought production of documents but spoliation sanctions. The<br />

defendant argued that its litigation hold was timely applied when litigation was reasonably<br />

foreseeable <strong>and</strong> that any spoliation of evidence was not purposeful conduct. Refusing to order<br />

spoliation sanctions, the court found that the defendant’s litigation hold was properly issued upon<br />

commencement of the lawsuit <strong>and</strong> that the plaintiff’s letters to the defendant before the suit was<br />

actually filed did not give the defendant sufficient notice that a suit was likely to occur. The court<br />

determined, however, that the defendant improperly destroyed evidence contained on former<br />

employee hard drives because this evidence was destroyed after suit was initiated. As such, the<br />

court found that the plaintiff was forced to incur additional expense in litigating the matter <strong>and</strong><br />

ordered $5,000 in monetary sanctions.<br />

� Palgut v. City of Colo. Springs, 2006 WL 3483442 (D. Colo. Nov. 29, 2006). In an age <strong>and</strong> sex<br />

discrimination dispute, the court entered a stipulated order regarding the discovery of electronically<br />

stored information. The order includes definitions of various e-discovery terms <strong>and</strong> sets forth a<br />

number of discovery protocols. The order included a m<strong>and</strong>ate that all electronic documents be<br />

267


produced in their native formats unless otherwise agreed amongst the parties. Additionally, the<br />

court established a procedure for the parties to object to the production of any electronic<br />

documents, requiring the parties to state reasons why the documents are not accessible, why there<br />

would be an undue burden or cost, <strong>and</strong> whether there is any available information that it is willing<br />

to produce. Finally, the court ordered all electronic evidence be preserved by the parties.<br />

� Cr<strong>and</strong>all v. The City <strong>and</strong> County of Denver, 2006 WL 2683754 (D.Colo. Sept. 19, 2006). In a<br />

case involving exposure to harmful chemicals, the plaintiffs sought sanctions against the defendant<br />

for deleting e-mail before <strong>and</strong> during the litigation. Specifically, the defendant’s e-mail protocol<br />

automatically deleted e-mails every seven days. The defendant did not change the server’s<br />

protocol until six months after litigation started, resulting in the deletion of many relevant e-mails.<br />

However, the defendant purchased data recovery software <strong>and</strong> recovered 91,000 deleted e-mails .<br />

The plaintiffs still allegeded several relevant e-mails were destroyed which could never be<br />

recovered <strong>and</strong> the missing e-mails severely prejudiced their case. The defendant argued no<br />

relevant e-mails were destroyed <strong>and</strong> it took substantial steps to recover any deleted e-mails. The<br />

plaintiffs urged the court to “create a presumption in favor of spoliation whenever a moving party<br />

can prove that records that might have contained relevant evidence have been destroyed.” The<br />

court declined to create a legal presumption in favor of spoliation. Instead, it re-opened discovery<br />

<strong>and</strong> allowed the plaintiffs to depose two persons having knowledge of the e-mail system. It also<br />

allowed the plaintiffs to have a computer expert examine the defendant’s e-mail system. The court<br />

found that because the plaintiffs were not prejudiced by loss of the alleged data, sanctions in the<br />

form of adverse inferences <strong>and</strong> fees <strong>and</strong> costs would not be assessed on the defendant. The court<br />

stated the defendant may file another motion if new evidence was discovered.<br />

� Marcin Eng’g, L.L.C. v. Founders at Grizzly Ranch, L.L.C., 2003 WL 23190385 (D.Colo. Dec.<br />

18, 2003). The plaintiff brought suit for payment of civil engineering services provided to the<br />

defendant <strong>and</strong> moved for summary judgment. The defendant moved to deny summary judgment<br />

based on the need to reopen discovery, claiming that the plaintiff “intentionally withheld” computer<br />

data that was relevant <strong>and</strong> material to the defendant’s claims. The “withheld” data included the<br />

computerized versions of the plaintiff’s work product, of which the defendant had already obtained<br />

hard copies. The court did not allow the defendant to reopen discovery because the defendant did<br />

not allege that the plaintiff’s production was deficient (because it omitted the computerized<br />

versions) until nearly five months after the discovery cut-off. The court stated that the defendant<br />

“was dilatory both in failing to review Marcin’s hard copy work product when it was timely produced<br />

<strong>and</strong> also in failing to inform Marcin <strong>and</strong> the court that it believed the production was incomplete.”<br />

The plaintiff counterclaimed for sanctions against the defendant, stating that the defendant failed to<br />

produce certain documents responsive to the plaintiff’s discovery requests, including an e-mail that<br />

terminated the plaintiff from the project. The defendant asserted that they diligently searched for<br />

the e-mail but could not find it. Based on the defendant’s diligent attempt to locate the documents,<br />

the court did not impose sanctions for failure to produce the documents.<br />

� Lauren Corp. v. Century Geophysical Corp., 953 P.2d 200 (Colo. Ct. App. 1998). In a breach of<br />

licensing agreement suit, the defendant’s employees, with knowledge of the significance of the<br />

hardware as crucial evidence in the lawsuit, destroyed computer hardware. The appellate court<br />

held that a trial court may impose attorney fees <strong>and</strong> costs as a sanction for the bad faith <strong>and</strong> willful<br />

destruction of evidence, even in the absence of a specific discovery order.<br />

� Gates Rubber Co. v. B<strong>and</strong>o Chem. Ind., 167 F.R.D. 90 (D. Colo. 1996). The court awarded<br />

sanctions (ten percent of the plaintiff company’s total attorney fees <strong>and</strong> costs) where the<br />

268


defendant’s employees continuously destroyed (by overwriting) electronic evidence. The court<br />

criticized the defendant’s expert for not making an image copy of the drive at issue for production.<br />

� <strong>Computer</strong> Assocs. Int’l, Inc. v. American Fundware, Inc., 133 F.R.D. 166 (D. Colo. 1990). The<br />

court issued a default judgment where the defendant revised portions of the source code after<br />

being served in the action, <strong>and</strong> thus put on notice that the source code was irreplaceable evidence.<br />

Revised code was a central piece of evidence to the litigation.<br />

Kansas<br />

� Chura v. Delmar Gardens of Lenexa, Inc., 2012 WL 940270 (D. Kan. Mar. 20, 2012). In this<br />

employment discrimination case, the plaintiffs motioned to compel the defendant to search for <strong>and</strong><br />

produce ESI responsive to several requests for production <strong>and</strong> provide supplemental answers to<br />

the plaintiffs’ interrogatories. Identifying the defendant as a large corporate body, the plaintiffs<br />

asserted that typical production in this type of litigation would include e-mails between managers<br />

<strong>and</strong> witnesses regarding the plaintiffs’ complaint, reports to <strong>and</strong> from the corporate office, <strong>and</strong><br />

investigation notes compiled by human resources. However, the defendant did not produce any<br />

written complaints, e-mails, or phone logs, arguing instead that “it cannot produce what does not<br />

exist.” Reviewing the defendant’s argument, U.S. Magistrate Judge Waxse considered it<br />

“questionable” that none of the defendant’s investigating employees exchanged e-mail or other<br />

correspondence on the matter. Finding insufficient evidence to opine on the defendant’s<br />

preservation <strong>and</strong> search methods, the court ordered an evidentiary hearing to gauge the<br />

reasonableness of the defendant’s conduct.<br />

� Rajala v. McGuire Woods, LLP, 2010 WL 2949582 (D. Kan. July 22, 2010). In this securities, inter<br />

alia, litigation, the defendant moved for an entry of a clawback provision that would govern<br />

inadvertent disclosure <strong>and</strong> protect against privilege waiver, arguing the provision was necessary to<br />

“prevent contentious, costly, <strong>and</strong> time consuming discovery disputes.” The plaintiff argued that, in<br />

light of Fed.R.Evid. 502, a clawback agreement was not justified <strong>and</strong> that such an agreement<br />

would prevent arguments relating to care <strong>and</strong> reasonableness if documents were inadvertently<br />

produced. Despite the plaintiff’s arguments <strong>and</strong> the parties’ inability to reach an independent<br />

agreement, the court found that “this case is precisely the type of case that would benefit from a<br />

clawback provision.” Based on the substantial amount of ESI involved <strong>and</strong> the defendant firm’s<br />

duty to protect its extensive client base, the court determined that the risk of inadvertent disclosure<br />

was high <strong>and</strong> that “[s]uch a provision will permit the parties to conduct <strong>and</strong> respond to discovery in<br />

an expeditious manner, without the need for time-consuming <strong>and</strong> costly pre-production privilege<br />

reviews” – an outcome the court deemed consistent with the intent behind the recent privilege<br />

waiver amendments <strong>and</strong> rules.<br />

� Cherrington Asia Ltd. v. A & L Underground, Inc., 2010 WL 126190 (D.Kan. Jan. 8, 2010). In<br />

this discovery dispute, the plaintiffs sought monetary sanctions for costs incurred as a result of the<br />

defendants’ alleged discovery violations, which included a “document dump” of the computer hard<br />

drive, <strong>and</strong> a failure to adequately prepare witnesses <strong>and</strong> produce requested financial records. The<br />

defendants argued that the computer hard drive was produced in the format maintained in the<br />

normal course of business <strong>and</strong> that, upon court instruction, a search engine was loaded to allow<br />

the plaintiffs to search the hard drive. Despite finding the defendants’ cooperation efforts<br />

unacceptable, the court denied the plaintiffs’ motion in relation to the “document dump” as untimely<br />

since the plaintiffs were aware of the defendants’ actions fifteen months prior to filing the motion.<br />

269


However, the court found the plaintiffs’ arguments regarding the other violations compelling <strong>and</strong><br />

awarded $26,382.99 in costs.<br />

� Spieker v. Quest Cherokee, LLC, 2009 WL 2168892 (D. Kan. July 21, 2009). In this dispute over<br />

royalty payments, the plaintiffs renewed their motion to compel production of electronically stored<br />

information, addressing relevance, cost <strong>and</strong> accessibility. Previously the court recommended the<br />

parties consider conducting searches using the defendant’s software <strong>and</strong> in-house IT staff <strong>and</strong><br />

Rule 502 to minimize expenses of a detailed privileged review. The defendant argued the software<br />

was untested <strong>and</strong> that in-house IT staff had no experience producing ESI. Addressing relevance,<br />

the court determined the plaintiffs’ arguments demonstrated that the requested ESI was relevant to<br />

class certification issues <strong>and</strong> that the defendant failed to timely oppose the requested discovery.<br />

Finding the defendant’s arguments regarding the court’s previous recommendations unpersuasive,<br />

the court noted it was not aware of any case where a party was excused from producing discovery<br />

because it had not been previously asked to do so. The court also found the defendant’s estimate<br />

of $250,000 for a privilege review "greatly exaggerated" <strong>and</strong> found the defendant failed to prove<br />

the data were not reasonably accessible. Finally, the court held the defendant did not show the<br />

discovery was duplicative or that the information could be more efficiently obtained through<br />

depositions, <strong>and</strong> therefore granted the plaintiffs’ motion to compel.<br />

� Robert v. Board of County Comm’rs of Brown County, Kan., 2009 WL 1362530 (D.Kan. May<br />

14, 2009). In this employment litigation, the plaintiff moved to compel production of a single e-mail.<br />

The plaintiff argued the court should order a forensic search for the e-mail by an outside expert at<br />

the defendants’ expense. The defendants had offered to allow the plaintiff to conduct a forensic<br />

search at her own expensive but the plaintiff rebuffed the offer, citing insufficient resources. The<br />

defendants asserted they had been unable to recover the e-mail <strong>and</strong> additional searches were<br />

futile because the hard drive had been irreparably damaged. The court denied the motion <strong>and</strong><br />

refused to shift the costs, finding no evidence of bad faith by the defendants. The court further<br />

rejected the plaintiff’s alternative request that the defendants contact their e-mail provider to<br />

acquire the message, reasoning the defendants are only obligated to produce documents in their<br />

possession or control.<br />

� Patterson v. Goodyear Tire & Rubber Co., 2009 WL 1107740 (D.Kan. Apr. 23, 2009). In this<br />

employment litigation, the plaintiff sought production of various electronic employee records <strong>and</strong><br />

policies, <strong>and</strong> an adverse inference instruction alleging spoliation of attendance records. The<br />

defendant argued electronic copies no longer existed due to the routine document deletion every<br />

12 months, but that all records were preserved <strong>and</strong> produced in hard copy. Denying the motion to<br />

compel as untimely, the court noted "both parties neglected the issue of ESI from the outset of this<br />

litigation" in violation of their obligations under Rule 26 of Kansas’ Guidelines for <strong>Discovery</strong> of<br />

<strong>Electronic</strong>ally Stored Information. Because many of the documents sought were contained on<br />

backup tapes, if available at all, the court was hesitant to intervene at the late time, but ordered the<br />

defendant to search two backup tapes pursuant to its offer to do so. The court denied the adverse<br />

inference instruction request, determining there was no evidence the attendance records were<br />

intentionally destroyed given the defendant’s routine deletion system.<br />

� White v. Gracel<strong>and</strong> Coll. Ctr. for Prof’l Dev. & Lifelong Learning, Inc., 2009 WL 722056<br />

(D.Kan. Mar. 18, 2009). In this ongoing wrongful termination litigation, the plaintiff sought reproduction<br />

of electronic <strong>and</strong> native copies of e-mails with attachments, the mailboxes that sent or<br />

received the e-mails, <strong>and</strong> mirror images of hard drives that created or modified the attachments.<br />

The defendants opposed the motion arguing they substantially fulfilled their discovery obligations<br />

<strong>and</strong> that further production was overbroad <strong>and</strong> irrelevant. Finding native <strong>and</strong> electronic copies of<br />

270


the e-mails <strong>and</strong> attachments to be relevant in explaining the discrepancies in creation dates<br />

identified by the plaintiff’s computer forensic expert, the court ordered their production. The court<br />

also ordered production of Outlook mailboxes following a conference between the parties <strong>and</strong> their<br />

experts to agree on a production process. Finally, the court allowed access to the hard drives<br />

related to two e-mails, but ordered the parties to confer regarding the location of information<br />

relating to the third e-mail’s creation.<br />

� Spieker v. Quest Cherokee, 2008 WL 4758604 (D.Kan. Oct. 30, 2008). In this lawsuit seeking<br />

class action certification, the plaintiffs filed a motion to compel production of electronically stored<br />

information (ESI). The defendant argued undue burden <strong>and</strong> provided evidence that the estimated<br />

cost of production, including collection, processing, reviewing <strong>and</strong> copying costs, would be<br />

$375,000, while the plaintiffs’ claims were worth $100,000 or less. Determining the plaintiffs failed<br />

to explain the relevancy of the disputed ESI in relation to class certification, the court denied the<br />

plaintiffs’ motion without prejudice. As the plaintiffs were granted leave to re-file its motion to<br />

compel, the court went on to address several additional issues raised by the parties. Ultimately the<br />

court instructed the parties to discuss Fed.R.Evid. 502 in future production <strong>and</strong> cost discussions,<br />

noting that Rule 502 was enacted “to reduce the costs of exhaustive privilege reviews of ESI.”<br />

� White v. Gracel<strong>and</strong> Coll. Ctr. for Prof’l Dev. & Lifelong Learning, Inc., 2008 WL 3271924 (D.<br />

Kan. Aug. 7, 2008). In this wrongful termination litigation, the plaintiff moved to compel the<br />

defendants to provide complete information on its document retention policy <strong>and</strong> how it may have<br />

affected relevant electronically stored information. The defendants argued that providing such<br />

information would be overly broad <strong>and</strong> unduly burdensome, <strong>and</strong> that such information was<br />

irrelevant, proprietary <strong>and</strong> confidential. Determining the defendants had provided a sufficient<br />

response to the discovery request via expert affidavit establishing an adequate search of the<br />

electronic systems, the court denied the motion to compel. The plaintiff also sought reproduction of<br />

certain electronic documents in native format, claiming that production of ESI in paper format was<br />

contrary to the “reasonably usable” requirement of Fed.R.Civ.P. 34. The defendants argued that<br />

converting the e-mails <strong>and</strong> attachments to PDF, then printing them <strong>and</strong> producing the printouts<br />

constituted a reasonably usable form since the plaintiff failed to request a particular format.<br />

Disagreeing with the defendants, the court held that the conversion of electronic documents to<br />

paper did not satisfy the requirements under Fed.R.Civ.P. 34, <strong>and</strong> accordingly granted the<br />

plaintiff’s motion to compel production in native format. The court also noted that this dispute could<br />

have been avoided had the parties adequately discussed production format during the<br />

Fed.R.Civ.P. 26(f) conference as required by Guideline 4(f) of the United States District Court for<br />

the District of Kansas’ Guidelines for <strong>Discovery</strong> of <strong>Electronic</strong>ally Stored Information.<br />

� Dean v. New Werner Holding Co. Inc., 2008 WL 2560707 (D.Kan. June 26, 2008). In this product<br />

liability litigation, the plaintiff filed two motions to compel production <strong>and</strong> sought sanctions. The<br />

plaintiff argued that the defendant failed to produce complete initial disclosures in response to the<br />

interrogatories <strong>and</strong> production requests, including a failure to produce any electronic data, digital<br />

media or metadata. The defendant claimed that the interrogatory requests were overbroad <strong>and</strong><br />

unduly burdensome, <strong>and</strong> that both the interrogatory requests <strong>and</strong> production requests sought<br />

information not under its control. The defendant also represented to the court that it intended to<br />

produce relevant electronically stored information (ESI) in its possession, but gave no anticipated<br />

production date. Disagreeing in part with the defendant, the court determined the information<br />

sought in the production requests was under the control of the defendant, but provided limitations<br />

to some of the plaintiff’s interrogatory requests. The court also noted that the defendant already<br />

had nearly six months to review <strong>and</strong> accumulate its ESI, <strong>and</strong> ordered production within 30 days.<br />

271


The court declined to issue sanctions for attorneys’ fees or reasonable expenses incurred by the<br />

plaintiff in bringing these two motions, finding sanctions unwarranted.<br />

� Thompson v. Assurant Employee Benefits, 2008 WL 373711 (D.Kan. Feb. 8, 2008). In this<br />

case, the defendants failed to produce initial disclosures within the deadline established by the<br />

scheduling order. The plaintiff followed up with a letter <strong>and</strong> a phone call <strong>and</strong> when both were<br />

unanswered, he filed a motion to compel <strong>and</strong> a subsequent motion seeking reimbursement of fees<br />

<strong>and</strong> expenses associated with the original motion to compel. The defendants claimed an “innocent,<br />

internal miscommunication” between the partner <strong>and</strong> associate resulted in the missed production<br />

deadline <strong>and</strong> argued against the imposition of sanctions. The court determined the plaintiff<br />

expended unnecessary resources in the effort to secure production from the defendants <strong>and</strong> was<br />

therefore entitled to reimbursement of fees <strong>and</strong> expenses in the amount of $580.<br />

� Benton v. Dlorah, Inc., 2007 WL 3231431 (D.Kan. Oct. 30, 2007). In this employment<br />

discrimination suit, the defendants moved to compel the plaintiff to produce documents responsive<br />

to their requests for production <strong>and</strong> the hard drive of the plaintiff’s personal computer. The<br />

defendants also sought sanctions for the plaintiff’s failure to provide complete responses <strong>and</strong><br />

alleged destruction of evidence. The defendants argued that the plaintiff admittedly deleted <strong>and</strong><br />

failed to produce relevant e-mail communications with her husb<strong>and</strong> <strong>and</strong> students. Further, the<br />

plaintiff used her personal computer to send <strong>and</strong> delete hundreds of responsive e-mails, therefore,<br />

entitling the defendants to the plaintiff’s personal computer hard drive for retrieval of the deleted emails.<br />

The plaintiff objected, claiming the hard drive contained personal, privileged information<br />

beyond the scope of discovery. The court ordered the plaintiff to produce her personal computer for<br />

inspection by a forensic specialist, limited in scope to topics responsive to the production requests,<br />

<strong>and</strong> ordered the plaintiff to pay $1,000 in sanctions to reimburse the defendants for costs<br />

associated with filing of this motion.<br />

� MGPIngredients, Inc. v. Mars, Inc., 2007 WL 3010343 (D.Kan. Oct. 15, 2007). In this suit alleging<br />

patent infringement <strong>and</strong> misappropriation of trade secrets inter alia, the plaintiff moved the court to<br />

compel the defendant to identify particular documents responsive to each request for production,<br />

rather than merely producing documents in the format in which they are kept in the usual course of<br />

business. The court denied the motion, relying on Fed.R.Civ.P. 34(b) which requires a responsive<br />

party to produce documents either in the manner in which they are kept in the usual course of<br />

business or to organize <strong>and</strong> label the documents to correspond to each request. As the parties<br />

failed to agree in advance to an alternative manner or production per Rule 34(b), the court refused<br />

to order a different form of production.<br />

� Benton v. Dlorah, Inc., 2007 WL 2225946 (D.Kan. August 1, 2007). In this case alleging<br />

employment discrimination on the basis of gender, the defendants motioned the court to compel<br />

the plaintiff to produce the hard drive of her personal home computer <strong>and</strong> further requested an<br />

order prohibiting the plaintiff from destroying email <strong>and</strong> other relevant evidence. In support of these<br />

requests, the defendants claim that the plaintiff had only produced a h<strong>and</strong>ful of email for a time<br />

period spanning several months. The plaintiff argued that she already produced all relevant<br />

materials <strong>and</strong> refused to produce the computer for investigation by a computer forensic expert. The<br />

court denied the motion <strong>and</strong> declined to assume the plaintiff was lying or had been discredited in<br />

her discovery responses.<br />

� Oxford House, Inc. v. City of Topeka, 2007 WL 1246200 (D. Kan. Apr. 27, 2007). In this case,<br />

the plaintiffs brought suit against the defendant for denying several conditional housing permits.<br />

The plaintiffs brought a motion to compel the defendant to comply with several discovery requests<br />

<strong>and</strong> produce all electronically stored information (ESI), including e-mail <strong>and</strong> instant messages,<br />

272


elating to any ex parte communications regarding the denial of the plaintiffs’ permits. The<br />

defendant contended that all requested ESI was automatically deleted <strong>and</strong> overwritten by the<br />

defendant’s archiving system on its disaster back-up tapes. The plaintiffs disputed the defendant’s<br />

contention <strong>and</strong> argued that even if the disputed ESI was deleted, the defendant still had a duty to<br />

preserve the potential evidence <strong>and</strong> argued that the defendant should be sanctioned for failure to<br />

preserve the data. The court found that the defendant fulfilled its discovery obligations <strong>and</strong><br />

adequately explained the non-existence of any ESI requested by the plaintiff. The defendant<br />

provided several affidavits from witnesses stating there was no ESI to produce to the plaintiffs.<br />

Furthermore, the court found the failure to preserve the e-mail evidence was reasonable since the<br />

duty to preserve the documents <strong>and</strong> the likelihood of litigation did not arise until well after the<br />

documents were overwritten on the back-up tapes. Moreover, the court used a cost-benefit<br />

balancing test called the “marginal utility test” to find that the production of the requested ESI would<br />

be unduly burdensome <strong>and</strong> costly since the “likelihood of retrieving these electronic<br />

communications is low <strong>and</strong> the cost high.”<br />

� Heartl<strong>and</strong> Surgical Specialty Hosp., LLC v. Midwest Div., Inc., 2007 WL 1054279 (D. Kan. Apr.<br />

9, 2007). In this antitrust litigation, the defendant filed a motion to compel the plaintiff to produce a<br />

Rule 30(b)(6) witness who could testify about the specific produces <strong>and</strong> practices relating to the<br />

organization’s h<strong>and</strong>ling of electronic data. The defendant also requested an award of costs<br />

incurred in bringing the motion <strong>and</strong> taking the additional deposition. The plaintiff provided its Chief<br />

Executive Officer for the deposition; however, during the deposition it was apparent that the CEO<br />

was unprepared or did not have the requisite knowledge to adequately answer the questions about<br />

the plaintiff’s computer systems <strong>and</strong> electronic discovery practices. The plaintiff argued that the<br />

topics of the deposition were overly broad <strong>and</strong> that it did not have enough time to prepare for the<br />

extensive deposition. Finding that it was the plaintiff’s “choice to use a designee without substantial<br />

personal knowledge of the noticed topics, <strong>and</strong> the fact that [the CEO] required extensive education<br />

about the noticed topics is a burden that must be borne by [the plaintiff] alone,” the court ordered<br />

an additional deposition about the unanswered electronic data topics. The court refused to award<br />

costs or sanctions because the parties did not discuss the narrow issue of compliance with Rule<br />

30(b)(6) during the initial meet <strong>and</strong> confer conference.<br />

� Bolton v. Sprint/United Mgmt. Co., 2007 WL 756644 (D. Kan. Mar. 8, 2007). In an employment<br />

discrimination suit brought by employees terminated in a reduction-in-force, the plaintiffs compelled<br />

the defendant to produce certain electronic documents, such as databases <strong>and</strong> spreadsheets,<br />

related to the terminated employees. The defendants argued that the requests were irrelevant,<br />

overly broad, <strong>and</strong> unduly burdensome. In addition, the defendants opposed the plaintiffs’ dem<strong>and</strong><br />

for information in a native format with corresponding metadata, claiming that a native production<br />

would be difficult <strong>and</strong> time-consuming <strong>and</strong> would reveal privileged information. The court granted<br />

some of the plaintiffs’ document requests stating that the benefit of the information outweighed the<br />

defendants’ burden, but denied other document requests as overly broad. For the document<br />

requests that were granted, the court stated that the plaintiffs’ requests should be produced “in the<br />

form in which it is currently maintained, but in electronic format to the extent possible.”<br />

� School-Link Techs., Inc. v. Applied Res., Inc., 2007 WL 677647 (D. Kan. Feb. 28, 2007). In a<br />

contract dispute, the plaintiff sought sanctions against the defendant for its failure to implement a<br />

litigation hold to preserve relevant documents in the custody of one of its key employees <strong>and</strong> for its<br />

failure to adequately search for <strong>and</strong> gather responsive discovery documents. The key employee<br />

testified that she was never contacted by the defendant to search for relevant documents but that<br />

she searched her own computers under her own accord. The defendant eventually produced the<br />

273


employee’s files from her computer <strong>and</strong> they were merely duplicative of already produced<br />

documents. The court, despite finding that the defendant breached its duty to preserve evidence,<br />

refused to order sanctions, as there was no showing that the breach caused relevant documents<br />

<strong>and</strong> information to be destroyed. With regard to the plaintiff’s inadequate search claims, the court<br />

ordered the defendant to assure the plaintiff that all employees’ documents <strong>and</strong> computer files had<br />

been produced. The court also ordered the defendant to produce an identical copy of the memory<br />

stick used to save the key employee’s documents to ensure that all information had actually been<br />

produced.<br />

� Heartl<strong>and</strong> Surgical Specialty Hosp., LLC v. Midwest Div., Inc., 2007 WL 625809 (D. Kan. Feb.<br />

23, 2007). In this discovery dispute in an antitrust litigation, the defendant moved the court to order<br />

the plaintiff to supplement its privilege logs according to the parties’ pre-trial electronic discovery<br />

protocol. The agreed upon protocol defined the scope of discoverable electronic information <strong>and</strong><br />

provided for specific procedures if any electronic documents were withheld from discovery based<br />

on privilege. The defendant argued that the plaintiff did not follow the agreed upon protocol when<br />

submitting its privilege log because it did not list sufficient information on the log in order to enable<br />

the defendant to properly identify whether the plaintiff’s withheld documents were in fact privileged.<br />

The defendant further argued that the plaintiff’s privilege log did not meet the st<strong>and</strong>ards as set by<br />

local caselaw <strong>and</strong> the Federal Rules of Civil Procedure. The plaintiff argued that it did comply with<br />

the privilege log <strong>and</strong> that the defendant itself did not comply with the agreed upon electronic<br />

discovery protocol <strong>and</strong> therefore cannot be punished. The court held that some of the plaintiff’s<br />

submissions were insufficient according to the parties’ protocol agreement <strong>and</strong> that the privilege<br />

log must be supplemented in some areas. The court refused to order sanctions for the privilege log<br />

insufficiencies.<br />

� Thompson v. Jiffy Lube Int’l, Inc., 2007 WL 608343 (D. Kan. Feb. 22, 2007). In this class action<br />

suit, the defendant filed for sanctions against the plaintiffs for spoliation of important documents<br />

<strong>and</strong> information. The plaintiffs, under an order to produce witness names, addresses <strong>and</strong> phone<br />

numbers, claimed that the information was lost when the hard drive possessed by its’ counsel<br />

crashed <strong>and</strong> the information was not backed up for retrieval. The plaintiffs argued that it did not<br />

intentionally or negligently destroy any witness information <strong>and</strong> that they attempted to salvage the<br />

data stored on the hard drive but concluded that reconstructing the data would be too time<br />

consuming <strong>and</strong> burdensome. The defendant argued that the plaintiffs had a duty to preserve the<br />

information in a manner that would have prevented loss <strong>and</strong>, at a minimum, preserved the data in a<br />

backup system. The court declined to issue sanctions against the plaintiffs stating that the<br />

“plaintiffs’ failure to utilize a backup system for counsel’s computer is troubling” but sanctions were<br />

inappropriate because the issues for trial had not yet been established. The court noted that “the<br />

issue of spoliation may be revisited by motion after the issues in the case are better defined.” The<br />

court did, however, allow the defendant to issue written deposition questions to plaintiffs’ counsel to<br />

determine the extent of the lost data.<br />

� G.D. v. Monarch Plastic Surgery, P.A., 2007 WL 201154 (D. Kan. Jan. 24, 2007). The plaintiffs in<br />

this case brought a claim of wrongful disclosure of medical information against the defendant<br />

medical provider. The plaintiffs’ medical information was inadvertently disclosed when a computer<br />

was placed on the curb for trash disposal. The computer was obtained by a passerby who<br />

subsequently had the hard drive repaired. Once the computer was in working condition, it was<br />

discovered that the computer contained confidential medical information of several of the<br />

defendant’s patients. The plaintiffs filed a motion to compel the production of the computer <strong>and</strong> all<br />

information contained on its hard drive. The defendant objected to the motion stating that it was an<br />

274


“unadulterated fishing expedition” <strong>and</strong> that the plaintiffs’ request was meant to “simply ‘troll’ the<br />

‘electronic pond’ to eliminate any skepticism regarding production.” The court disagreed with the<br />

defendant’s objections <strong>and</strong> granted production of the computer hard drive with some limitations. It<br />

ordered an interdependent computer forensics expert to image the hard drive <strong>and</strong> provide a report<br />

to each party of the information contained on therein. The defendant was to provide the plaintiffs<br />

with information on the computer concerning any of the plaintiffs, however the court held that any<br />

other confidential information about non-party patients <strong>and</strong> employees was irrelevant <strong>and</strong> beyond<br />

the scope of plaintiffs’ claims. The parties were ordered to submit a protective order concerning<br />

any confidential information discovered on the hard drive. Furthermore, the parties were ordered to<br />

share the cost of the hard drive imaging <strong>and</strong> examination.<br />

� Williams v. Sprint/United Mgmt. Co., No. 03-2200 (D. Kan. Jan. 23, 2007). On rem<strong>and</strong> from the<br />

district court judge, the magistrate issued an order explaining his reasons for denying sanctions<br />

against the defendant for failure to produce documents in their native format. In this employment<br />

discrimination claim, the plaintiffs filed a motion for sanctions against the defendant for failure to<br />

produce several spreadsheets which were originally produced in hard copy. The plaintiffs argued<br />

that the Federal Rules of Civil Procedure compelled the defendant to produce documents in their<br />

native format despite an earlier agreement between the parties stating that the parties could<br />

produce documents in a non-native .tiff format. The defendant argued that they attempted, in good<br />

faith, to produce the spreadsheets in a native format as quickly as possible <strong>and</strong> did not delay<br />

production of the documents in order to gain a tactical advantage. The magistrate judge agreed<br />

with the defendant <strong>and</strong> held that there was no evidence of bad faith on part of the defendant<br />

because it gave reasonable explanations as to any delay <strong>and</strong> impossibility of producing native<br />

format documents. Further, the court found that the unique circumstances of the discovery disputes<br />

demonstrate that there was no bad faith. The court also held that any duplicative production of<br />

documents occurred only as a result of the plaintiffs’ multiple discovery requests <strong>and</strong> not as an<br />

intentional tactic by the defendant used to confuse or frustrate the plaintiffs.<br />

� Apsley v. Boeing Co., 2007 WL 163201 (D. Kan. Jan. 18, 2007). In an age discrimination class<br />

action, the plaintiffs moved to compel the defendant to produce e-mails relevant to the claims. The<br />

requested e-mails covered a five year period <strong>and</strong> several hundred employees. The plaintiffs<br />

provided search terms to the defendant to reduce the amount of relevant emails. The defendant<br />

argued that a production of five years of e-mails from several hundred employees would be unduly<br />

burdensome <strong>and</strong> costly. In some situations, the defendant argued, an e-mail search of one<br />

employee could take one person as long as an entire day to perform the search. The plaintiffs<br />

argued, however, that the benefits to the plaintiffs would be outweighed by the burden to<br />

defendant. The court found that it could not make a decision on burden versus benefit <strong>and</strong><br />

requested additional information from the parties. The requested information included how the<br />

search would be conducted, the search terms, specific employees’ e-mail to be searched, who<br />

should bear the production costs, <strong>and</strong> other balancing questions.<br />

� Williams v. Sprint/United Mgmt. Co., 2006 WL 3691604 (D. Kan. Dec. 12, 2006). In an<br />

employment termination case, the plaintiffs moved the court for native file production of e-mails<br />

which had been previously produced by the defendant in a hardcopy format. In the original<br />

production, the e-mails had spreadsheets that were detached <strong>and</strong> provided as separate documents<br />

in their native, electronic format. The plaintiff claimed that without the native e-mail, the plaintiff was<br />

forced to match the hardcopy e-mails with the corresponding electronic spreadsheet attachment<br />

using a correlation table created by the defendant, which caused the plaintiff to incur more time<br />

<strong>and</strong> cost. The defendant argued that the parties agreed during pre-trial conferences that any<br />

275


electronic discovery would be produced as TIFF images <strong>and</strong> not in a native file format.<br />

Furthermore, producing native e-mail files would increase the risk of privileged information being<br />

disclosed since native files cannot be redacted. The court reasoned that the prior production of emails<br />

was not a deliberate attempt by the defendant but the result of an agreement between the<br />

parties. The court held the plaintiffs failed to give an adequate reason to compel the native e-mail<br />

production <strong>and</strong> denied their motions to produce native e-mails. See also Williams v. Sprint/United<br />

Mgmt. Co., 2006 WL 1867478 (D. Kan. July 1, 2006).<br />

� Thompson v. Jiffy Lube Int’l, 2006 WL 3388502 (D. Kan. Nov. 21, 2006). In a fraudulent sales<br />

practices case, plaintiffs’ requested e-mail from over 450 managers of the defendant’s vehicle<br />

service stores. The plaintiffs provided several search terms to narrow the relevant e-mail search<br />

<strong>and</strong> stated that production would “only” cost the defendant $600,000. The court denied the motion<br />

because production of every manager’s e-mail with common search terms would be too<br />

burdensome <strong>and</strong> too costly for the defendant. Some of the search terms included words such as:<br />

services, customers <strong>and</strong> dollars. Although the motion was denied the court hinted that e-mail could<br />

be compelled if the plaintiffs narrowed the scope of the inquiry.<br />

� Semsroth v. City of Wichita, 2006 WL 3913444 (D. Kan. Nov. 15, 2006). In a gender<br />

discrimination case, the defendant brought a cost-sharing motion for discovery costs associated<br />

with producing e-mail from 117 employees, as requested by the plaintiff. The e-mail was only<br />

stored on disaster relief backup tapes. The defendant had already spent $20,000 in producing<br />

electronic documents from their backup tapes <strong>and</strong> would have to purchase additional software to<br />

produce the remaining e-mail. The plaintiff argued that the defendant should incur all of the costs<br />

because they chose to store the e-mail in an inaccessible format. The court held that the defendant<br />

should incur all of the discovery costs. It noted that the costs already incurred are irrelevant to a<br />

cost-shifting analysis because “the majority of those expenses do not directly relate to the<br />

restoration <strong>and</strong> search of the backup tape.” Furthermore, the court noted its power under the<br />

amendments to the Federal Rules of Civil Procedure to rule on discovery that was overly broad.<br />

The court ordered the plaintiff to reduce the number of e-mail accounts to 50 employees instead of<br />

117, <strong>and</strong> it also removed several generic search terms from defendant’s list of search terms <strong>and</strong><br />

reduced the total number to 10 specific terms.<br />

� Johnson v. Kraft Foods, 2006 WL 3302684 (D. Kan. Nov. 14, 2006). The plaintiffs motioned the<br />

court to compel the defendant to produce electronic data, including electronic databases, regarding<br />

its employees. The defendant objected generally to several discovery requests made by the<br />

plaintiffs, claiming that the discovery requests where overbroad, duplicative, <strong>and</strong> vague. Notably,<br />

the defendant objected to the plaintiffs’ definitions of electronic discovery terms (such as “electronic<br />

database” <strong>and</strong> “personnel related data”) as vague <strong>and</strong> ambiguous despite the fact that the<br />

plaintiffs’ provided detailed definitions of each term. The defendant argued that the different<br />

attorneys examining the scope <strong>and</strong> adequacy of the requests will view the electronic data terms<br />

differently <strong>and</strong> produce inconsistent discovery results. The court overruled the defendant’s<br />

objections <strong>and</strong> identified several credible sources to access an accurate legal definition of<br />

electronic discovery terms, including the Kansas electronic discovery guideline practices, the<br />

Sedona Conference guidelines, <strong>and</strong> caselaw.<br />

� Williams v. Sprint/United Mgmt. Co., 2006 WL 1867478 (D. Kan. July 1, 2006). The court<br />

conducted an in camera review of 65 documents inadvertently disclosed by the defendant to the<br />

plaintiffs. The court found the documents -- spreadsheets containing statistical information -- were<br />

created at the request of the defendant’s attorneys for the purpose of obtaining legal advice, <strong>and</strong><br />

were protected by attorney-client privilege. In reaching its conclusion, the court considered several<br />

276


e-mails establishing the documents had been e-mailed directly to the defendant’s counsel. In ruling<br />

the privilege had not been waived by the defendant’s inadvertent disclosure, the court analyzed<br />

five factors: (1) the reasonableness of the precautions taken to prevent inadvertent disclosure; (2)<br />

the time taken to rectify the error; (3) the scope of discovery; (4) the extent of disclosure; <strong>and</strong> (5)<br />

the overriding issue of fairness. To prevent inadvertent disclosure, the defendant converted the<br />

documents into TIFF images, allowed attorneys to review them on a computer screen, <strong>and</strong><br />

implemented document production software to label “privileged” documents for inclusion within the<br />

privilege log. Citing the Advisory Committee’s comments to the proposed amendments to FRCP<br />

Rule 26(f), the court considered the added volume, expense <strong>and</strong> time required to sift through<br />

electronically stored information in determining that the defendant’s efforts to prevent disclosure<br />

were reasonable. In addition, since the defendant had immediately taken steps to secure the return<br />

of the spreadsheets after learning the documents had been inadvertently disclosed, the court ruled<br />

the privilege not waived <strong>and</strong> ordered the documents be returned to the defendant.<br />

� Cardenas v. Dorel Juvenile Group, Inc., 2006 WL 1537394 (D. Kan. June 1, 2006). In this<br />

product-liability case, the plaintiffs sought sanctions under FRCP Rule 37 against the defendant for<br />

providing false responses to discovery requests, failing to supplement discovery requests, failing to<br />

comply with a court order compelling discovery <strong>and</strong> for withholding a crucial document damaging to<br />

the defendant’s case. The plaintiffs first learned that the defendant had failed to provide a key<br />

document when they examined communications contained in an internal email, produced in<br />

response to other discovery requests. Although the defendant produced the document after the<br />

plaintiffs specifically requested it be turned over, the plaintiffs asserted they were unfairly<br />

prejudiced by the document’s untimely production. The plaintiffs moved the court to prohibit the<br />

defendant from asserting affirmative defenses, in effect granting a default judgment, or<br />

alternatively, to issue adverse inference jury instructions against the defendant. However, the court<br />

found the sanctions requested by the plaintiff to be unwarranted, as the defendants had not<br />

withheld the key document willfully or in bad faith. Still, the court observed, “parties cannot be<br />

permitted to jeopardize the integrity of the discovery process by engaging in halfhearted <strong>and</strong><br />

ineffective efforts to identify <strong>and</strong> produce relevant documents.” Finding that the defendant’s<br />

counsel were under obligation to review all documents in their possession to determine the<br />

existence of other potentially relevant undisclosed documents, the court awarded the plaintiff<br />

reasonable attorney’s fees <strong>and</strong> expenses incurred as a result the defendant’s noncompliance <strong>and</strong><br />

untimely production.<br />

� Thompson v. Jiffy Lube Int’l, Inc., 2006 WL 1174040 (D. Kan. May 1, 2006). In a class action<br />

consumer protection lawsuit, the defendant objected to a request for electronic documents<br />

including “any <strong>and</strong> all information related to e-mail.” The defendant claimed the request was<br />

overbroad <strong>and</strong> unduly burdensome since it would cost approximately $10 million to produce the<br />

documents in TIFF format. Countering, the plaintiffs asserted the defendant could first produce the<br />

documents in “native PST format” <strong>and</strong> then print the documents “without any additional cost.”<br />

Declining to rule on the issue of costs, the magistrate judge ordered the parties to confer <strong>and</strong> agree<br />

upon a data sampling protocol <strong>and</strong>/or production format. If the parties could not agree, a hearing<br />

would be held to determine production scope <strong>and</strong> cost-shifting. The magistrate also found the<br />

plaintiff’s request for e-mail overly broad <strong>and</strong> stated, “[t]he mere suspicion that a document<br />

containing relevant evidence might be located in defendant’s computer files does not justify the<br />

production of all e-mail communications or computer records . . . requests must be reasonably<br />

tailored to secure the production of documents relevant to the issues in this lawsuit.”<br />

277


� Balboa Threadworks, Inc. v. Stucky, 2006 WL 763668 (D. Kan. Mar. 24, 2006). Alleging<br />

copyright infringement, the plaintiffs sought to mirror image the hard drives of the defendants’<br />

business <strong>and</strong> personal computers. The defendants objected to the mirror imaging of any<br />

computers not related to the business, claiming the plaintiffs failed to demonstrate how collecting<br />

information on these computers would be calculated to lead to the discovery of admissible<br />

evidence. In response, the plaintiffs contended that any of the defendants’ computers could have<br />

been used to download the copyrighted patterns at issue; thus, all of the computers should be<br />

mirror imaged in order to preserve any relevant information. The Court found it reasonable to<br />

conclude relevant evidence could be found on any of the defendant’s computers, noting a personal<br />

computer was used to draft a document related to the alleged infringement. Thus, the Court<br />

ordered “all of Defendants’ computers <strong>and</strong> peripheral equipment, such as ZIP Drives, shall be<br />

made available for mirror imaging, at Plaintiffs’ expense, in accordance with the protocol previously<br />

agreed to by the parties.”<br />

� Bergersen v. Shelter Mut. Ins. Co., 2006 WL 334675 (D. Kan. Feb. 14, 2006). Alleging wrongful<br />

termination from employment, the plaintiff moved to compel production of documents previously<br />

scanned onto three CDs <strong>and</strong> produced by the defendants. Stating this production was not “kept in<br />

any perceivable sequential order,” the plaintiff claimed it did not comply with the “usual course of<br />

business” Fed.R.Civ.P. 34(b) requirement. Agreeing with the plaintiff, the court found it “clear that<br />

the documents produced by [the defendants] were not produced ‘as they are kept in the usual<br />

course of business’.” According to the court, the production was problematic as “a receiving party<br />

may not be able to determine which specific images comprise a single document or attachments to<br />

a document since there are no staples which bind together the scanned images as they would hard<br />

copies in a file.” The court noted other courts had required a producing party to label, organize or<br />

index electronic documents to make them usable by a requesting party. Methods referenced by the<br />

court included (1) noting which documents were produced from electronic files <strong>and</strong> which were<br />

scanned from hard-copy files, (2) maintaining multi-page documents as a unit, <strong>and</strong> (3) providing<br />

source information to identify document custodians. Nevertheless, the court denied the plaintiff’s<br />

motion based on the plaintiff’s failure to file the motion in a timely manner.<br />

� Williams v. Sprint/United Mgmt Co., 230 F.R.D. 640 (D. Kan. 2005). In an employment case<br />

involving allegations of age discrimination, the plaintiffs requested native production of Microsoft<br />

Excel spreadsheets so they would be able to determine if the documents “had any actual other<br />

columns or types of information available on a spreadsheet.” After receiving the spreadsheets from<br />

the defendant, the plaintiffs claimed the defendant “scrubbed” the spreadsheet files to remove<br />

metadata without producing a log of the information scrubbed. The plaintiffs also asserted the<br />

defendant locked cells <strong>and</strong> data on the spreadsheets, thus preventing the plaintiffs from accessing<br />

those cells. The defendant admitted it had scrubbed metadata <strong>and</strong> locked certain cells but argued<br />

the plaintiffs never requested production of the metadata <strong>and</strong> claimed the metadata was irrelevant<br />

<strong>and</strong> contained privileged information. The court gave the defendant seven days to show why it<br />

should not produce electronic Microsoft Excel spreadsheets in native format <strong>and</strong> why it should not<br />

be sanctioned for its behavior. The defendant declared its actions were made in good faith,<br />

designed to prevent the plaintiffs from discovering information the Magistrate ruled undiscoverable,<br />

<strong>and</strong> maintained data integrity. Although the court did not sanction the defendant, it ordered the<br />

defendant to produce the spreadsheets’ metadata <strong>and</strong> to produce "unlocked" versions of those<br />

spreadsheets. The court held, “when a party is ordered to produce electronic documents as they<br />

are maintained in the ordinary course of business, the producing party should produce the<br />

electronic documents with their metadata intact, unless that party timely objects to production of<br />

278


metadata, the parties agree that the metadata should not be produced, or the producing party<br />

requests a protective order.”<br />

� United States v. The Boeing Co., 2005 WL 2105972 (D. Kan. Aug 31, 2005). The plaintiffs<br />

alleged the defendants concealed information <strong>and</strong> submitted false claims for payment relating to<br />

aircraft <strong>and</strong> parts delivered to the government. Claiming the defendants had attempted to "sweep<br />

evidence under the rug," the plaintiffs sought a preservation order, requiring the defendants to<br />

“preserve documents, physical evidence, <strong>and</strong> electronic (computer-based) evidence for discovery<br />

<strong>and</strong> trial.” The plaintiffs further claimed the defendants’ past conduct demonstrated a genuine<br />

concern they might destroy relevant documents. In reply, the defendants stated they had already<br />

taken appropriate steps to preserve relevant evidence within days of being notified of the lawsuit.<br />

The court found the plaintiffs failed to show that any evidence would be lost or destroyed absent a<br />

preservation order. In refusing to grant the preservation order, the court declared the defendants<br />

demonstrated they had the capability to preserve the evidence at issue. The court also issued an<br />

Initial Order Regarding Planning <strong>and</strong> Scheduling <strong>and</strong> stated, “the parties have a duty under Rule<br />

26(f) to meet <strong>and</strong> develop a discovery plan, including arrangements for electronic discovery in<br />

accordance with this court’s <strong>Electronic</strong> <strong>Discovery</strong> Guidelines.”<br />

� United States v. Kaufman, 2005 WL 2087759 (D.Kan. Aug. 25, 2005). In a case involving an<br />

indictment for health care fraud, civil rights violations <strong>and</strong> other charges, the defendants sought<br />

dismissal of the indictment or, alternatively, recusal of the prosecutors based on their alleged<br />

knowledge of privileged material. The government, who had seized the defendants’ computer <strong>and</strong><br />

searched it pursuant to a valid warrant, admitted some potentially privileged letters between the<br />

defendants <strong>and</strong> its counsel were present on the computer. The government claimed the computer<br />

search was performed by a computer forensic lab. After the lab transferred the data from the<br />

computer hard drive to a CD, a Department of Justice attorney not associated with the prosecution,<br />

created a DVD of the computer’s contents with potentially privileged materials redacted. The<br />

attorney also printed hard copies of the potentially privileged material <strong>and</strong> turned them over to<br />

defense counsel. Despite these precautions, the defendants argued the government possessed<br />

un-redacted copies of the DVD, providing it with unfettered access to the potentially privileged<br />

information. The court determined that “even if some of those documents were privileged, <strong>and</strong><br />

even if the prosecutors had read some of them, neither the ‘draconian’ remedy of dismissal, nor the<br />

slightly less drastic remedy of recusing the prosecutors, would be appropriate under the facts of<br />

this case.” The court also set forth a detailed protocol for the defendants to review the evidence for<br />

privileged material.<br />

� Evolution, Inc. v. The Suntrust Bank, 2004 WL 2278559 (D. Kan. Sept. 29, 2004). In an action<br />

for copyright infringement, breach of contract, <strong>and</strong> misappropriation of trade secrets, the plaintiff<br />

accused the defendants of not producing source code, object code, <strong>and</strong> application databases in<br />

response to a production request. The defendants argued that the plaintiff should have retained an<br />

expert to assist with accessing the code. The court appointed a special master to assist with the<br />

technical aspects of the discovery dispute. In allocating fees <strong>and</strong> expenses, the special master<br />

recommended that the defendant pay 80 percent of his fees because “the majority of the time<br />

spent on this matter [is] directly attributable to defendants’ representations <strong>and</strong> lack of<br />

cooperation.” The special master recommended that the parties evenly split other expenses. Both<br />

parties objected to this fee splitting recommendation. While the court agreed with the special<br />

master’s findings regarding the defendant’s lack of cooperation, the court ordered the defendant to<br />

pay 70 percent of the fees <strong>and</strong> the plaintiff to pay 30 percent. The court ordered the parties to split<br />

the other expenses evenly.<br />

279


� Super Film of Am., Inc. v. UCB Films, Inc., 219 F.R.D. 649 (D. Kan. 2004). In a collection action,<br />

the defendant moved to compel the plaintiff to produce electronic data including e-mail,<br />

spreadsheets, <strong>and</strong> databases. The plaintiff argued that it could not be compelled to produce the<br />

documents because it did not have control of the documents as required by FRCP Rule 34(a). The<br />

court determined that under Rule 34(a), the plaintiff possessed the requisite control because the<br />

plaintiff had “the right, authority, or ability to obtain the requested document.” The plaintiff further<br />

contended that it had produced all electronic documents off of its two computer systems that were<br />

within its “knowledge <strong>and</strong> expertise” <strong>and</strong> offered to allow the defendant’s technicians to inspect the<br />

computers. The defendant rejected this offer stating that it would unreasonably shift the discovery<br />

burden <strong>and</strong> expense to the defendant. The court agreed with the defendant, noting that “the court<br />

cannot relieve a party of its discovery obligations based simply on that party’s unsupported<br />

assertion that such obligations are unduly burdensome.” The court further found that the plaintiff<br />

did not make the required showing that complying with the defendant’s request would unduly<br />

burden the plaintiff in terms of time, money, <strong>and</strong> procedure. Thus, the court ordered the plaintiff to<br />

produce the electronic documents within 30 days.<br />

� Zhou v. Pittsburgh State Univ., 2003 WL 1905988 (D.Kan. Feb. 5, 2003). In an employment<br />

discrimination suit, the plaintiff sought to compel the defendant to produce computer generated<br />

documents (instead of typewritten documents compiled by h<strong>and</strong> already produced) reflecting the<br />

salaries of the defendant’s faculty. Relying on the Advisory Committee Notes to F.R.C.P. 34, the<br />

court stated, “[T]he disclosing party must take reasonable steps to ensure that it discloses any<br />

back-up copies of files or archival tapes that will provide information about any ‘deleted’ electronic<br />

data.” The court granted the plaintiff’s motion to compel <strong>and</strong> ordered the defendant to disclose all<br />

data compilations, computerized data <strong>and</strong> other electronically-recorded information reflecting the<br />

salaries of the defendant’s faculty. The court further ordered the parties to preserve evidence that<br />

they know, or should know, is relevant to the ongoing litigation, including preservation of all data<br />

compilations, computerized data <strong>and</strong> other electronically-recorded information.<br />

� Kleiner v. Burns, 2000 WL 1909470 (D. Kan. Dec. 15, 2000). The court ordered the defendant<br />

Yahoo! to disclose all electronic data compilations in its possession, custody, <strong>and</strong> control that are<br />

relevant to disputed facts. The court also ordered parties to preserve evidence that they know, or<br />

should know, is relevant to the ongoing litigation, including preservation of all data compilations,<br />

computerized data <strong>and</strong> other electronically-recorded information.<br />

� Hoffman v. United Telecomms., Inc., 117 F.R.D. 436 (D. Kan. 1987). In an interrogatory, the<br />

plaintiff requested specific information concerning a computer file containing information regarding<br />

possible employment discrimination. The court denied requesting party’s motion to compel finding<br />

that since the data would reveal the defendant’s discovery plan, the information was protected by<br />

the work-product doctrine.<br />

New Mexico<br />

� Radian Asset Assurance, Inc. v. College of the Christian Brothers of New Mexico, 2010 WL<br />

4928866 (D. N.M. Oct. 22, 2010). In this litigation, the plaintiff objected to a proposed court order<br />

that would require the defendants to produce e-mails <strong>and</strong> other ESI from backup tapes subject to a<br />

clawback agreement, claiming the defendants should be required to search its own ESI <strong>and</strong><br />

produce responsive documents – not shift the burden <strong>and</strong> cost to the plaintiff to do so. Disagreeing<br />

with the plaintiff’s arguments, the court determined the backup tapes were not reasonably<br />

accessible <strong>and</strong> found there to be good cause to issue a protective order due to the significant<br />

280


expense in restoring <strong>and</strong> searching the tapes in light of their largely irrelevant content. Thus, the<br />

court ordered the defendants to produce copies of all ESI from the backup tapes for the plaintiff to<br />

review, dismissing the plaintiff’s arguments that this constituted a document dump. The court also<br />

ordered the defendants to produce user logs for 135 hard drives to determine which one (if any)<br />

belonged to a particular defendant. Both the production of the backup tapes <strong>and</strong> hard drive were<br />

subject to a Fed.R.Civ.P. 502(d) order.<br />

Oklahoma<br />

� Calixto v. Watson Bowman Acme Corp., 2009 WL 3823390 (S.D. Fla. Nov. 16, 2009). In this<br />

tortious interference of a contract suit, the plaintiff alleged the defendant "spoliated electronic<br />

documents in the face of ongoing litigation." As such, the plaintiff sought an order requiring the<br />

defendant to obtain <strong>and</strong> fund a restoration <strong>and</strong> search of its 37 backup tapes. The defendant<br />

argued the backup tapes were not reasonably accessible <strong>and</strong> that no further relevant evidence<br />

existed on the tapes as a litigation hold was in effect. Finding the plaintiff failed to establish a<br />

reasonable expectation that the benefit of restoring the backup tapes would outweigh the burden,<br />

the court declined to impose the significant costs to restore, search <strong>and</strong> review the tapes on the<br />

defendant. The court also declined to impose sanctions because no bad faith existed regarding the<br />

defendant’s IT employee’s deletion of an e-mail box as part of a regular practice. However, the<br />

court concluded one of the backup tapes may contain discoverable records because it was unclear<br />

when the e-mail box deletion occurred <strong>and</strong> ordered the tape’s restoration <strong>and</strong> search.<br />

� Joseph Oat Holdings, Inc. v. RCM Digesters, Inc., 2009 WL 3334868 (D.N.J. Oct. 14, 2009). In<br />

this business dispute, the defendants alleged the plaintiffs copied the defendants’ computer files in<br />

violation of the <strong>Computer</strong> Data Access <strong>and</strong> Fraud Act (CDAFA). Prior to the joint venture<br />

termination, the plaintiffs’ computers were connected to the defendants’ server via a virtual private<br />

network. After the joint venture ceased, the plaintiffs copied approximately 152,000 documents,<br />

including proprietary business information, contained on the defendants’ server in an act the court<br />

labeled "brazen <strong>and</strong> surreptitious." The plaintiffs claimed the defendants knew access to the joint<br />

system existed, were concerned the defendants would destroy relevant information on the network<br />

<strong>and</strong> that the defendants’ litigation hold letter required them to preserve all documents within their<br />

possession or control. Finding the plaintiffs’ "cl<strong>and</strong>estine copying of computer files" was not<br />

performed purely for e-discovery purposes, the court determined the copying of files created after<br />

the joint venture dissolved was a clear violation of the CDAFA. Accordingly, the court granted the<br />

defendants’ motion for partial summary judgment.<br />

� United States v. Haymond, 2009 WL 3029592 (N.D. Okla. Sept. 16, 2009). In this criminal case,<br />

the defendant renewed his request for access to unlawful images allegedly contained on his<br />

computer that were seized by the government. The defendant argued the hard drive was "stripped"<br />

of metadata prior to the mirror image creation, which prevented him from preparing a forensic<br />

defense. The defendant also requested redacted copies of the images to support subpoenas to the<br />

Web sites where the images originated. Relying upon the defendant’s expert’s testimony that he<br />

was "99.99-percent sure" no metadata would be located, the court found no basis for the<br />

defendant’s claim that metadata had been "stripped." The court further ordered the defendant to<br />

identify the images with embedded Web site information in advance of trial, at which point the<br />

government is to prepare redacted images for the defendant’s use in conjunction with the<br />

subpoenas.<br />

281


� Pinstripe, Inc. v. Manpower, Inc., 2009 WL 2252131 (N.D. Okla. July 29, 2009). In this litigation,<br />

the plaintiff sought default judgment or adverse inference sanctions claiming the defendants failed<br />

to preserve <strong>and</strong> destroyed relevant documents, <strong>and</strong> also sought punitive monetary sanctions. The<br />

defendants’ attorneys drafted a litigation hold, which the defendants failed to issue, <strong>and</strong><br />

subsequently hired an outside vendor to recover deleted e-mails after the defendants’ internal<br />

information technology (IT) department failed to recover the documents. Finding the defendants’<br />

local counsel had little to do with discovery responses, <strong>and</strong> that the other firm drafted the litigation<br />

hold policy <strong>and</strong> made efforts to confirm client compliance, the court declined to sanction the<br />

attorneys. Addressing the defendants’ conduct, the court held that while the defendants failed to<br />

meet preservation obligations by failing to issue the litigation hold, the conduct was not intentional<br />

<strong>and</strong> therefore did not warrant imposition of a default judgment or an adverse inference. However,<br />

the court determined some sanctions were appropriate <strong>and</strong> awarded future deposition costs,<br />

excluding attorneys’ fees, to the plaintiff. Additionally, if the plaintiff discovered a specific, relevant<br />

e-mail had not been produced, it would be allowed to petition the court for further relief. Finally, the<br />

defendants were ordered to pay $2,500 to the Tulsa County Bar Association to fund a seminar on<br />

litigation holds <strong>and</strong> preservation of electronic data.<br />

� Barnett v. Simmons, 2008 WL 4853360 (Okla. Nov. 10, 2008). In this breach of contract case, the<br />

trial court required willfulness for the imposition of sanctions <strong>and</strong> the plaintiffs appealed. The Court<br />

of Civil Appeals affirmed the trial court’s ruling, but rem<strong>and</strong>ed for consideration of whether<br />

sanctions could be imposed for mere negligence. Both sides petitioned for writs of certiorari. In the<br />

underlying dispute, the plaintiff sought unpaid royalties on an oil lease <strong>and</strong> the defendant filed a<br />

motion to compel production of certain files on the plaintiff’s computer. Defendant’s motion to<br />

compel was granted by the trial court. Subsequently, the plaintiff enlisted the help of several<br />

computer experts to remove alleged viruses, neglecting to mention that the hard drive was the<br />

subject of a court order. During the expert analysis, several files were deleted as a result of the use<br />

of numerous data wiping programs. Citing Oklahoma’s discovery code §3237(B)(2) (which mirrors<br />

Fed.R.Civ.Pro. 37(b)(2) <strong>and</strong> authorizes sanctions for the failure to comply with a court order) the<br />

Court held that the trial court erred as a matter of law in determining that sanctions could be<br />

imposed only upon a showing of willful conduct. The Court determined that willfulness is relevant to<br />

the severity of sanctions imposed, but not to whether sanctions should be imposed. Accordingly,<br />

the Court reversed <strong>and</strong> rem<strong>and</strong>ed for reconsideration of the defendants’ motion for sanctions.<br />

� Oldenkamp v. United Am. Ins. Co., 2008 WL 4682226 (N.D.Okla. Oct. 21, 2008). In this case<br />

involving the payment of health insurance benefits, the plaintiffs filed a motion to compel discovery<br />

responses or an adverse inference for spoliation. The plaintiffs claimed responsive documents<br />

were not produced, <strong>and</strong> that the defendants either destroyed or failed to preserve these documents<br />

after notice of litigation. The plaintiffs sought recordings of telephone conversations, e-mails <strong>and</strong><br />

internal company communication reports. Arguing a litigation hold was in place, the defendant<br />

claimed all e-mails were produced <strong>and</strong> no records were destroyed. Noting a party cannot be<br />

ordered to produce documents which do not exist, combined with the defendant’s assertion under<br />

oath that all responsive documents were produced, the court denied the motion to compel. The<br />

court also denied sanctions finding the plaintiffs failed to produce evidence of intentional<br />

destruction.<br />

� The Ponca Tribe of Indians of Okla. v. Continental Carbon Co., 2006 WL 2927878 (W.D. Okla.<br />

Oct. 11, 2006). In a tort action, the plaintiffs filed several motions requesting the production of<br />

various electronic documents. After the defendant’s initial production of documents, the plaintiffs<br />

filed motions to: compel mirror images of various databases; produce native file formats of e-mails;<br />

282


<strong>and</strong> create a more organized <strong>and</strong> underst<strong>and</strong>able database of electronic documents already<br />

produced. The defendant argued the cost of providing a mirror image database to the plaintiff<br />

would exceed $10,000. The court found the large cost of production did not outweigh the plaintiffs’<br />

interest in having the documents. The court noted, however, the parties could negotiate production<br />

of the database without the court’s assistance if the plaintiffs desired to pay the costs associated<br />

with obtaining the data. In arguing for the native production of e-mails, the plaintiffs claimed the<br />

defendant merely provided “pictures” of the requested e-mails <strong>and</strong> did not provide them in an easily<br />

searchable format. The court found the plaintiffs’ discovery requests did not specifically ask for the<br />

e-mails in a particular format. The defendant provided documents as asked for in the discovery<br />

requests. Lastly, the plaintiffs argued the production of e-mails <strong>and</strong> other documents were<br />

“produced as single page documents with no consideration of the organization.” The plaintiffs<br />

requested the electronic documents be provided in an “un-shuffled” manner <strong>and</strong> produced in a<br />

more easily readable method. Refusing to place such a burden on the defendant, the court ruled<br />

the production followed accepted industry practices <strong>and</strong> the plaintiffs possessed the capabilities to<br />

organize the produced documents.<br />

� Farmers Ins. Co. v. Peterson, 81 P.3d 659 (Okla. 2003). In a discovery dispute, the district court<br />

ordered the defendant to search insurance claim files for the years 2000, 2001, <strong>and</strong> 2002 <strong>and</strong><br />

produce documents containing complaints from Oklahoma insureds on medical payment claims.<br />

The defendant insurer claimed the request was unduly burdensome because to comply, it would<br />

have to manually examine 600,000 closed paper files <strong>and</strong> 3,300-3,400 electronic files. The<br />

defendant estimated the average examination time per file at 30 minutes. On appeal from the<br />

district court order, the Oklahoma Supreme Court noted that the expenditure of time <strong>and</strong> money to<br />

conduct the search in accordance with the plaintiff’s request would be unduly burdensome on the<br />

defendant. However, the court was hesitant to excuse the defendant from meeting the plaintiff’s<br />

discovery dem<strong>and</strong>s noting that the defendants “unilateral decision on how it stores information<br />

cannot, by itself, be a sufficient reason for placing discoverable matter outside the scope of<br />

discovery.” The court ordered the defendant to use a statistical sampling technique that will meet<br />

the trial court’s “muster for integrity of the process <strong>and</strong> protect both litigants from distortive effects”<br />

to produce discovery.<br />

� York v. Hartford Underwriters Ins. Co., 2002 WL 31465306 (N.D.Okla. Nov. 4, 2002). In a case<br />

alleging bad faith in processing an insurance claim, the defendant opposed the plaintiff’s 30(b)(6)<br />

deposition request on the subject of the defendant’s use of a claims adjusting software program<br />

called “Colossus.” The court found that the defendant failed to demonstrate that the “Colossus”<br />

program was proprietary or confidential <strong>and</strong> ordered that the plaintiff should be given the<br />

opportunity to discover what data was inputted into "Colossus" concerning her claim. The court<br />

also ordered the defendant to provide a Rule 30(b)(6) witness to testify to the use of the “Colossus”<br />

program. Granting part of the defendant’s motion for a protective order, the court held that the<br />

nature <strong>and</strong> extent of the defendant’s use of "Colossus" may be confidential <strong>and</strong> entitled to<br />

protection from third parties.<br />

� United States v. Koch Ind., 197 F.R.D. 463 (N.D. Okla. 1998). The plaintiffs claimed that the<br />

defendant thwarted discovery attempts by destroying backup computer tapes <strong>and</strong> files. The court<br />

found that the defendant failed in its duty to preserve evidence that it should have known was<br />

relevant. The court allowed the plaintiffs to inform jury that computer tapes <strong>and</strong> files were<br />

destroyed but did not allow negative inference.<br />

Utah<br />

283


� Brigham Young Univ. v. Pfizer, Inc., 2012 WL 1302288 (D.Utah April 16, 2012). In this patent<br />

litigation, the plaintiffs filed a fourth motion for sanctions against the defendants for alleged<br />

discovery misconduct. Specifically, the plaintiffs argued that the defendants implemented<br />

“unreasonable” records management practices <strong>and</strong> that they lost or destroyed critical documents in<br />

violation of their duty to preserve. Additionally, the plaintiffs argued that the defendants had not<br />

altered their conduct following a 2009 court order that imposed $850,000 in sanctions for the<br />

defendants’ negligent discovery conduct that “closely approach[ed] a finding of bad faith.” With<br />

regard to the defendants’ records management policies, the court found that changes in control of<br />

documents over ten years old was the “natural result of business transactions,” <strong>and</strong> failed to see<br />

any attempts by the defendants to confound discovery. With regard to the defendants’ duty to<br />

preserve, the court was not persuaded by the plaintiffs’ argument that defendants’ were<br />

“sensitized” by earlier industry lawsuits— which would impose an overbroad duty to preserve that<br />

would make it “difficult for the [c]ourt to imagine how a party could ever dispose of information . . .<br />

because of the potential for some distantly related litigation that may arise years into the future.” As<br />

such, the court denied the entire motion, finding that although the defendants’ discovery conduct<br />

was less than commendable at times, their overall conduct did not rise to a level warranting any of<br />

the severe sanctions requested.<br />

� Philips Elecs. N. Am. Corp. v. BC Tech., 2011 WL 677462 (D. Utah Feb. 16, 2011). In this<br />

intellectual property litigation, the defendant objected to the magistrate judge’s recommendation<br />

that the court strike the defendant’s answer, dismiss its counterclaims, enter a default judgment<br />

<strong>and</strong> refer the case to the U.S. Attorney’s Office for investigation <strong>and</strong> criminal prosecution. Although<br />

conceding that it engaged in discovery violations, the defendant argued it merely followed its<br />

counsel’s advice, was not responsible for the actions of its employees <strong>and</strong> had largely remedied<br />

any prejudice arising from the spoliation. Adopting the recommendation in full, the court found the<br />

defendant’s destruction of at least 17,800 relevant documents, attempted cover-up of electronic<br />

deletions after a third court order <strong>and</strong> misrepresentations while under oath were prejudicial <strong>and</strong><br />

interfered with the judicial process. In addition, the court determined the company was liable for the<br />

actions of the employees – largely upper management <strong>and</strong> executives – who destroyed evidence<br />

as a "company cannot act or have a mental state by itself." Finally, the court held both attorney<br />

fees <strong>and</strong> terminating sanctions were appropriate given the egregious nature of the discovery<br />

abuses <strong>and</strong> upheld the referral to the U.S. Attorney’s Office for perjury investigation.<br />

� Daynight, LLC v. Mobilight, Inc., 2011 WL 241084 (Utah App. Jan. 27, 2011). In this intellectual<br />

property dispute, the plaintiff <strong>and</strong> third-party defendants appealed the district court’s decision to<br />

grant default judgment as a sanction for ESI spoliation. Rejecting the argument that the sanction<br />

was excessive <strong>and</strong> unduly harsh, the court noted that Rule 37(g) of the Utah Rules of Civil<br />

Procedure concerns discovery violations greater than simple discovery abuse (as opposed to Rule<br />

37(b)(2)) <strong>and</strong> “does not require a finding of ‘willfulness, bad faith, fault or persistent dilatory tactics’<br />

or the violation of court orders before a court may sanction a party.” Moreover, the court noted that<br />

even if such culpability was required, the appellants willfully <strong>and</strong> in bad faith destroyed ESI, as<br />

evidenced by a video wherein the appellants’ employees spoke of their destruction of potentially<br />

harmful evidence. In addition, the employees committed such actions as “throwing the laptop off a<br />

building; running over the laptop with a vehicle; <strong>and</strong> stating ‘[If] this gets us into trouble, I hope<br />

we’re prison buddies.’” Finding this behavior demonstrated bad faith <strong>and</strong> a general disregard for<br />

the judicial process, the court affirmed the default judgment <strong>and</strong> award of attorneys’ fees <strong>and</strong> costs.<br />

284


� Phillip M. Adams & Assoc., LLC v. Winbond Elecs. Corp., 2010 WL 3767318 (D. Utah Sept. 16,<br />

2010). In this ongoing intellectual property litigation, the plaintiff objected to the magistrate judge’s<br />

denial of terminating sanctions as moot. The plaintiff sought spoliation sanctions alleging the<br />

defendant deleted several documents when it switched over to a new server. In light of the<br />

defendant’s claim that it “has always had a reasonable document retention system,” the plaintiff<br />

argued it was suspicious that only some e-mails were deleted. The defendant also disputed that a<br />

duty to preserve ESI existed <strong>and</strong> further argued that its lack of patent litigation experience rendered<br />

it unaware of any such duty. Rejecting the defendant’s arguments as unconvincing <strong>and</strong> lacking<br />

merit, the court found the defendant had a duty to preserve <strong>and</strong> was on notice of a potential for<br />

litigation based on a well-publicized statement in a large class action lawsuit that affected the<br />

industry as a whole, in addition to a letter the defendant received notifying it of potential liability.<br />

Finding sufficient evidence of a duty to preserve <strong>and</strong> spoliation, the court permitted the plaintiff to<br />

present evidence on these matters to the jury <strong>and</strong> imposed a permissive adverse inference<br />

instruction sanction.<br />

� Phillip M. Adams & Assoc., L.L.C. v. Winbond Elec. Corp., 2010 WL 2977228 (D. Utah July 21,<br />

2010). Previously in this intellectual property litigation, the magistrate judge granted the plaintiff’s<br />

motion for sanctions in part <strong>and</strong> ordered both parties to produce documents for a determination of<br />

the degree of prejudice to the plaintiff. Examining the plaintiff’s evidence of prejudice, the court<br />

found that the produced materials did not prove the defendant destroyed documents noting “[t]he<br />

fact that evidence is not present does not mean it was spoliated.” Moving to the defendant, who<br />

failed to preserve <strong>and</strong> produce its original source code as ordered, the court found this failure again<br />

highlighted the lack of an information retention policy. The court nevertheless found the evidentiary<br />

value of the developer’s comments from the original source code to be mere speculation – not the<br />

proverbial “smoking gun” as claimed by the plaintiff. Declining to issue terminating sanctions, the<br />

court opted to allow the jury to consider the plaintiff’s arguments regarding why the original source<br />

code should be available <strong>and</strong> draw their inferences.<br />

� Phillip M. Adams & Assocs., LLC v. Fujitsu Ltd., 2010 WL 1901776 (D.Utah May 10, 2010). In<br />

this intellectual property litigation, one of the defendants sought reproduction of documents <strong>and</strong> emails<br />

in native format, documents from the plaintiff’s previous computers <strong>and</strong> documents from prior<br />

litigation. The plaintiff argued that it never agreed to produce documents in native format, <strong>and</strong> that<br />

producing documents from the old computers would be unduly burdensome <strong>and</strong> costly. Addressing<br />

the first production dispute, the court ordered the plaintiff to reproduce the documents relevant to<br />

one production request natively as it failed to object to the format specification. However, no format<br />

specification was made in the defendant’s second request. As such, the court determined the<br />

plaintiff’s production of documents per the ordinary course of business was sufficient, <strong>and</strong> that the<br />

burden of reorganizing <strong>and</strong> labeling the production would likely outweigh the benefit. Turning to the<br />

computer issue, the court ordered the plaintiff to produce an inventory of previous computers<br />

containing data described in the defendant’s request to determine if the created archives for these<br />

systems were adequate. Finally, the court ordered the plaintiff to search documents related to a<br />

prior litigation matter, producing any document that is responsive, but not privileged.<br />

� AccessData Corp. v. Alste Tech. GMBH, 2010 WL 318477 (D.Utah Jan. 21, 2010). In this<br />

international breach of contract action, the plaintiff, a U.S. company, requested a reproduction of<br />

previously produced discovery in native format. The defendant, a German company, argued that<br />

compliance with the discovery requests would violate the German Data Protection Act (GDPA),<br />

subjecting the company to civil <strong>and</strong> criminal penalties under a German blocking statute. The<br />

defendant also claimed that its previous electronic production was in a “readily usable form” <strong>and</strong><br />

285


eproduction would be unnecessarily burdensome. Reviewing the GDPA, the court found nothing<br />

that barred discovery of personal information provided customer consent was obtained, <strong>and</strong> even if<br />

disclosure was prohibited under the GDPA, the U.S. Supreme Court has held that blocking statutes<br />

do not deprive U.S. courts of the power to compel production from a foreign party subject to its<br />

jurisdiction. See Societe Nationale Industrielle Aerospatiale v. United States District Court, 482<br />

U.S. 522 (1987). Addressing the production format dispute, the court determined that scanned PDF<br />

images are not readily usable as required by Fed.R.Civ.P. 26(b)(2)(E)(ii) <strong>and</strong> ordered the<br />

defendant to reproduce the requested documents in native form or in an electronically generated<br />

PDF format.<br />

� Flying J Inc. v. Pilot Travel Ctrs. LLC, 2009 WL 1834998 (D. Utah June 25, 2009). In this<br />

litigation, the defendants filed a motion to compel production of the plaintiffs’ credit card transaction<br />

database <strong>and</strong> e-mails responsive to 28 new search terms. While the plaintiffs were initially willing to<br />

comply with the transaction database request, they conditioned production seeking a comparable<br />

database from the defendants <strong>and</strong> restriction of database use from other cases where the plaintiffs<br />

are not a party. Denying the plaintiffs’ arguments, the court determined the production of a<br />

comparable database <strong>and</strong> restricting the plaintiffs’ database were not issues for the court to<br />

determine in the present motion. The court also found the plaintiffs’ claims that production would be<br />

overly burdensome unpersuasive, determining the database to be relevant <strong>and</strong> accessible.<br />

Regarding the additional search terms request, the court again found the plaintiffs’ arguments<br />

unpersuasive, holding that the defendants’ request was timely made <strong>and</strong> was not overly<br />

burdensome as the terms were likely to produce relevant material. However, the court ordered the<br />

defendants to justify each of the chosen additional terms.<br />

� Phillip M. Adams & Assocs., LLC v. Dell, Inc., 2009 WL 910801 (D.Utah Mar. 30, 2009). In this<br />

patent infringement litigation, the plaintiff inferred that spoliation occurred based on the defendants’<br />

non-production of certain relevant evidence <strong>and</strong> sought sanctions. The defendants explained that<br />

the e-mail servers were not designed for archival purposes <strong>and</strong> that employees should locally<br />

preserve e-mails of long term value (as determined by each individual employee). Agreeing that<br />

the defendants should possess far more evidence than was produced, the court considered when<br />

the defendants’ preservation duty arose. The court determined the duty arose around 1999/2000<br />

based on the litigation environment surrounding the specific subject matter of this patent dispute,<br />

not in February 2005 when the defendants learned that the plaintiff may bring a lawsuit. The court<br />

also denied application of the safe harbor provision, citing an e-discovery expert’s declaration that<br />

failed to state the destruction was a result of a "routine, good-faith operation." Finally, the court<br />

found that the defendants’ "[irresponsible data retention] practices invite the abuse of others" <strong>and</strong><br />

that prejudice may be considerable. However, the court decided that appropriate sanctions could<br />

not be determined until after discovery closed <strong>and</strong> ordered the parties to provide further briefing on<br />

the prejudice suffered.<br />

� ClearOne Commc’ns, Inc. v. Chiang, 2008 WL 920336 (D.Utah April 1, 2008). In this trade secret<br />

litigation, the plaintiff moved for entry of a search protocol order establishing guidelines for<br />

searching mirror images <strong>and</strong> identifying relevant <strong>and</strong> responsive documents. Previously the plaintiff<br />

accepted search terms proposed by the defendants with five additions, but disputes arose over the<br />

conjunctive or disjunctive use of the terms. The defendants argued it was reasonable to search<br />

conjunctively (i.e., require connectors between the search terms) in order to narrow the results to<br />

relevant subjects. Analyzing the advantages <strong>and</strong> disadvantages of both search techniques, the<br />

court ordered “license” terms to be searched disjunctively <strong>and</strong> “name” terms to be searched<br />

conjunctively.<br />

286


� ClearOne Communications, Inc. v. Chiang, 2008 WL 704228 (D.Utah Mar. 10, 2008). In this<br />

litigation involving trade secret misappropriation, the plaintiff filed a motion for sanctions alleging<br />

the defendants misrepresented material facts during discovery <strong>and</strong> withheld a “smoking gun” email.<br />

The defendants claimed the misrepresentation was merely a misunderst<strong>and</strong>ing by their<br />

Fed.R.Civ.P. 30(b)(6) witness, who spoke English only as his third language. Further, the<br />

defendants argued they were not in possession of the e-mail in question as their computer system<br />

was not programmed to save sent e-mails. Suspicious of the defendants’ computer system but<br />

unable to locate the e-mail in question, the court found the defendant’s actions sanctionable. The<br />

court was unwilling to enter default judgment as it had not previously issued a warning <strong>and</strong> instead<br />

issued an adverse jury instruction relating to the misrepresentation of the 30(b)(6) witness, allowing<br />

the jury to consider the misrepresentation when determining the witness’ credibility.<br />

� United States v. Bhownath, 2007 WL 2570199 (D.Utah Aug. 31, 2007). In a criminal software<br />

piracy investigation, federal agents obtained <strong>and</strong> executed a warrant to search all computer<br />

systems in the defendant’s home. The defendant argued the warrant was impermissibly overbroad<br />

<strong>and</strong> moved to suppress evidence obtained in the search. Disagreeing with the defendant’s position<br />

that the agents’ keyword searches of his computer files were the digital equivalent of "rummaging,"<br />

the court denied the motion. The court reasoned that if agents were not allowed access to all files<br />

on a computer to search for files <strong>and</strong> folders relating to a case, any defendant would be able to<br />

hide evidence of illegal conduct in unlikely places on a computer.<br />

� Hentsch Henchoz & Cie v. Gubbay, 97 P.3d 1283 (Utah 2004). Arguing that a forum selection<br />

clause made venue in a Utah court improper, the defendants sought to dismiss a case arising from<br />

investment fraud accusations. After a series of hearings, the district court determined the forum<br />

selection clause was unfair <strong>and</strong> should be disregarded. The court ordered the defendants to<br />

comply with the plaintiff’s outst<strong>and</strong>ing discovery requests. Contrary to the district court’s discovery<br />

orders, the defendants shipped all of their documents, records, <strong>and</strong> computer hard drives from<br />

Utah to Spain. The plaintiff then moved for summary judgment on three of its claims, <strong>and</strong> the<br />

district court granted the motion entering a $24.73 million judgment against the defendants. The<br />

defendants appealed, again claiming the suit should have been dismissed pursuant to the forum<br />

selection clause. Arguing for dismissal of the appeal, the plaintiff contended the defendants<br />

“repeatedly <strong>and</strong> willfully disobeyed [the district court’s] orders… [<strong>and</strong>] destroyed evidence.” In<br />

response, the defendants declared they did not willfully disobey discovery orders, but that they<br />

“simply declined to participate substantively in the proceedings.” Rejecting the defendants’<br />

argument, the appellate court stated the defendants were obligated to comply with the court’s<br />

discovery orders, even if they were erroneous. The appellate court gave the defendants 30 days to<br />

comply with the discovery orders, indicating that any further noncompliance by the defendants<br />

would result in dismissal of the defendants’ appeal.<br />

� United States v. Tucker, 150 F. Supp. 2d 1263 (D. Utah 2001). The defendant was found guilty of<br />

knowing possession of child pornography. The conviction was largely supported by computer<br />

forensic evidence found in the form of deleted Internet cache files that were saved to the<br />

defendant’s hard drive when he viewed the various websites. See also United States v. Tucker,<br />

305 F.3d 1193 10th Cir. 2002).<br />

� Caldera, Inc. v. Microsoft Corp., 72 F. Supp. 2d 1295 (D. Utah 1999). A federal district court<br />

found that a series of intra-company e-mails offered “direct evidence” that the corporation was<br />

actively trying to destroy a competitor.<br />

� Procter & Gamble Co. v. Haugen, 179 F.R.D. 622 (D.Utah 1998), rev’d on other grounds, 222<br />

F.3d 1262 (10th Cir. 2000). In an unfair competition case, the defendant moved for sanctions<br />

287


against the plaintiff, alleging that the plaintiff violated its duty to preserve relevant e-mail<br />

communications of five key employees identified by the plaintiff as containing relevant information.<br />

Finding a sanctionable breach of the plaintiff’s discovery duties, the court sanctioned the plaintiff<br />

$10,000 --$2,000 for each of the five custodians. In addition, the plaintiff objected to an order<br />

limiting the scope of a keyword search that the plaintiff desired to conduct on the defendant’s<br />

electronic databases. The court held that the keyword searching limitation prevented discovery of<br />

information relevant to the plaintiff’s claims. The plaintiff was allowed to submit a list of 25<br />

keywords given that the proposed terms were not so extensive as to render general commercial or<br />

competitive information.<br />

� Bills v. Kennecott Corp., 108 F.R.D. 459 (C.D. Utah 1985). The court denied the defendant’s<br />

motion requiring plaintiffs to pay the cost the defendant incurred in producing a printout of<br />

computer data that plaintiffs sought through discovery. The court based its holding on that the<br />

amount of money involved was not excessive or inordinate, that the relative expense <strong>and</strong> burden in<br />

obtaining the data would have been substantially greater for the plaintiffs as compared with the<br />

defendant, that the amount of money required to obtain the data as set forth by the defendant<br />

would have been a substantial burden to the plaintiffs, <strong>and</strong> that the defendant was benefited to<br />

some degree by producing the data.<br />

Eleventh Circuit – State <strong>and</strong> Federal <strong>Case</strong>s<br />

� Harbuck v. Teets, 152 Fed.Appx. 846 (11th Cir. 2005). In an employment discrimination lawsuit,<br />

the plaintiff appealed a district court’s grant of summary judgment in favor of the defendant. The<br />

plaintiff argued the district court erred in involving the district court’s own computer personnel in<br />

discovery <strong>and</strong> in finding the defendant had fully produced all discoverable electronic data. During<br />

the discovery process, the plaintiff filed a motion to compel discovery on the grounds that the<br />

defendant deleted e-mails <strong>and</strong> destroyed documents. In response, the court ordered both parties to<br />

submit their copies of data to the court’s information technology (“IT”) personnel to see if the<br />

material could be retrieved. The court’s personnel successfully retrieved the information, <strong>and</strong> the<br />

court closed discovery without requiring the defendant to take further action. The court also granted<br />

summary judgment declaring it had no reason to believe the defendant was concealing data or<br />

harassing the plaintiff during discovery. In affirming the district court’s decision, the appellate court<br />

noted the district court did not abuse its discretion in having the IT personnel evaluate the data as<br />

the IT personnel was acting as a neutral party on behalf of the court. Finding no reason existed to<br />

believe the defendant was hiding information, the court also rejected the plaintiff’s contention that<br />

all electronic documents found in discovery were not fully produced.<br />

� In re Ford Motor Company, 345 F.3d 1315 (11th Cir. 2003). The plaintiff brought claims against<br />

Ford Motor Company alleging that the seatbelt buckle of her automobile, which unlatched during<br />

an accident, was defectively designed. After serving several document requests, the plaintiff filed a<br />

motion to compel seeking direct access to Ford’s electronic databases to conduct searches for<br />

claims related to unlatching seatbelt buckles. These databases recorded all customer contacts with<br />

Ford, as well as all records of dealers <strong>and</strong> personnel, among other things. The trial court granted<br />

the plaintiff’s motion to compel. Ford appealed, filing petition for a writ of m<strong>and</strong>amus. The appellate<br />

court held that the plaintiff was not entitled to direct, unlimited access to Ford’s computer<br />

databases, stating that without constraints, the lower court’s order granted the plaintiff access to<br />

information that would not be discoverable without Ford first having had an opportunity to object.<br />

288


� Wright v. AmSouth Bancorp, 320 F.3d 1198 (11th Cir. 2003). In an age discrimination suit, the<br />

plaintiff sought discovery of computer disks <strong>and</strong> tapes containing “all word processing files created,<br />

modified <strong>and</strong>/or accessed” by five of the defendant’s employees spanning a two <strong>and</strong> a half year<br />

period. The court denied the plaintiff’s motion to compel because his request was overly broad <strong>and</strong><br />

unduly burdensome <strong>and</strong> made no reasonable showing of relevance.<br />

Alabama<br />

� Evans v. Mobile County Health Department, 2012 WL 206141 (S.D. Ala. Jan. 24, 2012). In this<br />

reverse racial discrimination case, the plaintiff was deposed regarding ESI stored on her personal<br />

computer. The plaintiff admitted that she forwarded racially insensitive materials from her work<br />

computer to her personal computer, <strong>and</strong> that she had not produced relevant emails from her<br />

personal computer. Despite this frank testimony, the plaintiff failed to reveal that she had already<br />

burned her personal computer in her yard. After several fruitless discovery requests for ESI from<br />

the plaintiff’s personal computer, the defendant filed a motion to compel. At an evidentiary hearing<br />

<strong>and</strong> contrary to her affidavit, the plaintiff claimed that her computer crashed during discovery <strong>and</strong>,<br />

fearing identity theft, burned her computer in her yard. The court reprim<strong>and</strong>ed the plaintiff, stating,<br />

“[t]he fact that Evans destroyed her computer, instead of preserving same or transferring the<br />

information on that computer to a new computer, is unfathomable given that she was in the middle<br />

of pursuing this lawsuit <strong>and</strong> she had on her home computer items crucial to her suit.” In sum, the<br />

court gave little credence to the plaintiff’s evidentiary testimony, given her “whirling dervish” nature.<br />

Granting the defendant’s motion to compel, the court dem<strong>and</strong>ed that the plaintiff allow the<br />

defendant’s IT experts to examine ESI on her new computer <strong>and</strong> ordered her to pay attorney’s fees<br />

for the motion.<br />

� ANZ Advanced Tech., LLC v. Bush Hog, LLC, 2010 WL 3699917 (S.D. Ala. Sept. 9, 2010). In<br />

this contract litigation, the plaintiffs moved to modify a court order requiring two of its executives to<br />

produce hard drives or other data storage devices for forensic analysis. The plaintiffs claimed<br />

Indian authorities denied permission for production, rendering them unable to comply with the<br />

order. Upon review of the documents submitted by the plaintiffs to support its asserted claims <strong>and</strong><br />

efforts, the court found the plaintiffs had not followed the ordered protocol in requesting permission<br />

<strong>and</strong> determined that the proffered evidence did not establish that Indian law prohibited compliance.<br />

Addressing a document the plaintiffs admittedly altered, the plaintiffs claimed it did not contain<br />

substantive information <strong>and</strong> requested a reevaluation of whether the alteration casted doubt over<br />

production authenticity. Finding no credible evidence to rebut the original conclusion, as well as the<br />

discovery of two more critical document fabrications, the court denied the motion, ordered the<br />

immediate production of the requested hard drives for forensic examination <strong>and</strong> stayed<br />

consideration of the defendant’s motion to show cause why the case should not be dismissed.<br />

� Hope for Families & Cmty. Serv., Inc. v. Warren, 2008 WL 2074425 (M.D. Ala. May 15, 2008). In<br />

this gaming regulation dispute, the plaintiffs filed a motion to compel production. The defendants<br />

provided numerous defenses to the plaintiffs’ motion, claiming the documents <strong>and</strong> electronic<br />

information were protected by attorney-client privilege; the request sought trade secret <strong>and</strong><br />

competitive information; the documents sought were not relevant; <strong>and</strong> the request was overbroad<br />

<strong>and</strong> unduly burdensome. Granting in part the plaintiffs’ motion to compel, the court ordered<br />

production of specified requested documents finding the documents to be relevant. The court<br />

referenced a previously entered protective order to ease the defendants’ fears regarding a potential<br />

289


exposure of trade secrets. Additionally, the court stated that a future review will be completed to<br />

determine attorney client privilege issues.<br />

� Ex parte Vulcan Materials Co., 2008 WL 1838309 (Ala. April 25, 2008). In this breach of contract<br />

litigation, the defendant sought review of an order regarding permissible post-trial discovery in<br />

response to a punitive damages award. The defendant claimed the trial court exceeded its<br />

discretion in denying the motion for a protective order regarding production of e-mail circulated<br />

within the company. Specifically, the defendant claimed because the e-mail sought was created<br />

after the case was filed, it was not relevant to the issue of punitive damages <strong>and</strong> protected by work<br />

product doctrine. Relying upon Ex parte Cooper Tire & Rubber Co., So.2d (Ala.2007) <strong>and</strong> the<br />

Fed.R.Civ.P. 26(b)(2)(B), the court directed the trial court to reconsider the defendant’s motion for<br />

a protective order.<br />

� Peacock v. Merrill, 2008 WL 176375 (S.D.Ala. Jan. 17, 2008). In this litigation, the defendants<br />

sought production of electronic tax information, <strong>and</strong> the plaintiff claimed the motion was moot,<br />

arguing she had already fully produced responsive documents. The defendants sought an exact<br />

replica of a floppy disk to determine if the plaintiff fully complied with the discovery request. Relying<br />

on FRCP 34(b)(i)-(iii), the court ordered production of disk files in native electronic format to ensure<br />

access to all metadata, determining that the date stamps of many of the documents were relevant .<br />

� United States v. King, No. 07-11808 (M.D.Ala. Dec. 14, 2007). In this appeal of a conviction for<br />

transportation of child pornography, the defendant, a civilian contractor at a United States Air Force<br />

base, sought a motion to suppress evidence obtained from his computer hard drive as violating of<br />

his fourth amendment right to be free from unreasonable search <strong>and</strong> seizure. The government<br />

obtained evidence from the defendant’s hard drive via a “shared” drive by an airman searching for<br />

music files. Upon discovery of the pornographic images, the airman notified a computer specialist<br />

who accessed the drive in the same manner. Subsequently, the specialist notified an investigator<br />

who obtained a search warrant <strong>and</strong> seized the defendant’s computer. Determining that data saved<br />

on a hard drive connected to a network belongs to a network administrator, the court held that the<br />

defendant had no legitimate expectation of privacy for files located <strong>and</strong> accessible via a shared<br />

network drive, <strong>and</strong> therefore denied the defendant’s motion to suppress.<br />

� Braxton v. Farmer’s Ins. Group, 209 F.R.D. 651 (N.D.Ala. 2002). In a class action brought under<br />

the Fair Credit Reporting Act, the plaintiffs sought e-mails from non-party individual insurance<br />

agents of the defendant’s insurance company. The defendant objected, claiming that enforcement<br />

of the subpoena would subject the agents to an undue burden. The court refused to require the<br />

non-party insurance agents to engage in the task of “combing through their e-mail files <strong>and</strong> other<br />

records in search of the documents sought by the plaintiff.” The court ordered the defendant to<br />

locate <strong>and</strong> produce relevant e-mails, newsletters, <strong>and</strong> other correspondence that it sent to its<br />

agents.<br />

� Ex Parte Wal-mart, Inc., 809 So.2d 818 (Ala. 2001). In a personal injury case, the plaintiff sought<br />

discovery of Wal-mart’s electronic database containing customer incident reports <strong>and</strong> employee<br />

accident review forms. The appellate court held that discovery order should have been restricted to<br />

falling-merch<strong>and</strong>ise incidents with geographic <strong>and</strong> temporal limits set forth by the trial court.<br />

Florida<br />

� Indep. Mktg. Group, Inc. v. Keen, 2012 WL 207032 (M.D. Fla. Jan. 24, 2012). In this discovery<br />

dispute, the defendant brought a motion to compel the production of ESI in a reasonably usable<br />

format after the plaintiff produced PDFs that compiled hundreds of documents without any<br />

290


metadata or searchable text. Following production, the defendant identified issues with the<br />

document format, to which the plaintiff stated problems with the initial vendor <strong>and</strong> noted they would<br />

quickly process <strong>and</strong> produce documents with a new vendor. Shortly thereafter, the plaintiffs<br />

refused to produce ESI in a different format because the $10,000 production cost was “prohibitive.”<br />

Reviewing the facts, the court found that the plaintiffs appeared to have printed relevant ESI off<br />

their server <strong>and</strong> scanned them back to PDF files. Although the parties did not agree to a specific<br />

production format, the court found the plaintiff’s method in violation of Fed.R.Civ.P. 34’s<br />

requirement that parties produce files as “ordinarily maintained” <strong>and</strong> “reasonably accessible” to the<br />

opposition. In response to the plaintiff’s cost argument, the court found that the requested files—<br />

which were readily available on the plaintiff’s server—were reasonable accessible <strong>and</strong> did not<br />

present an undue burden per Fed.R.Civ.P. 26(b)(2)(B). Accordingly, the court granted the<br />

defendant’s motion to compel <strong>and</strong> warned the plaintiffs that future discovery violations might<br />

warrant sanctions.<br />

� SPM Resorts v. Diamond Resorts Mgmt., Inc., 2011 WL 2650893 (Fla. App. 5 Dist. July 8,<br />

2011). In this business litigation, the plaintiff (who is the defendant in the underlying case) sought<br />

certiorari review of a circuit court decision ordering it to pay $20,000 – <strong>and</strong> potentially more in the<br />

future – to conduct computer searches to comply with the defendant’s (the plaintiff in the underlying<br />

case) discovery request. The plaintiff argued the court order was unreasonable <strong>and</strong> unduly<br />

burdensome, <strong>and</strong> marked a departure from the "essential requirements of the law." Agreeing with<br />

the plaintiff’s arguments, the court believed ordering the plaintiff to split the costs associated with<br />

engaging a computer expert to inspect its computer systems was unreasonable. Further, the court<br />

noted that "placing a substantial financial burden on a party relating to the production of its<br />

adversary’s document request does nothing more than require a party to fund its adversary’s<br />

litigation" which is not permitted by the Rules of Civil Procedure. Accordingly, the court granted the<br />

plaintiff’s request <strong>and</strong> quashed the trial court’s order.<br />

� Point Blank Solutions, Inc. v. Toyobo Am., Inc., 2011 WL 1456029 (S.D. Fla. Apr. 5, 2011). In<br />

this products liability litigation, the plaintiffs sought ESI spoliation sanctions contending the<br />

defendants were under a general duty to preserve due to a separate government investigation <strong>and</strong><br />

other reasonably foreseeable industry-wide litigation. Denying they acted in bad faith or that any<br />

grounds for sanctions existed, the defendants claimed they had “no inkling” the plaintiffs would<br />

pursue litigation <strong>and</strong> further argued there was no jurisdictional support for an industry-wide<br />

anticipation of litigation theory. Agreeing with the defendants, the court found the preservation duty<br />

was owed only to other parties <strong>and</strong> refused to "establish some type of free-floating or shifting duty"<br />

which they could latch onto. Further, the court asserted it would not simply assume destruction<br />

based on the number of e-mails already in the plaintiffs’ possession <strong>and</strong> noted that the plaintiffs<br />

had virtually all of the documents in their possession via other means. Finding no evidence of bad<br />

faith – a requirement for the imposition of an adverse inference in the Eleventh Circuit – the court<br />

held there was no basis for sanctions <strong>and</strong> denied the motion.<br />

� Seven Seas Cruises S. DE R.L. v. V. Ships Leisure SAM, No. 1:09-cv-23411-UU (S.D. Fla. Feb.<br />

19, 2011). In this breach of contract dispute, the plaintiffs requested sanctions <strong>and</strong> production,<br />

alleging the defendants intentionally <strong>and</strong> continuously failed to produce all responsive ESI. The<br />

defendants conceded not all relevant ESI was produced, noting that "in hindsight, an E-discovery<br />

consultant/vendor should have been retained." However, the defendants argued that they had<br />

agreed to re-run recent searches, that they would run searches on additional custodians identified<br />

by the plaintiffs <strong>and</strong> that the plaintiffs had access to much of the information via copies of<br />

correspondence between the parties. Noting that much of the dispute could have been significantly<br />

291


narrowed if not totally avoided through a pre-trial conference, the court agreed the defendants’<br />

searches were wholly inadequate <strong>and</strong> found their failure inexcusable. Accordingly, due to their<br />

repeated failure to conduct full <strong>and</strong> complete ESI searches, <strong>and</strong> the failure to retain a consultant to<br />

conduct such searches, the court ordered the defendants to utilize a third party vendor <strong>and</strong> pay the<br />

associated attorney fees <strong>and</strong> costs. The court declined to recommend default judgment, finding a<br />

lack of bad faith <strong>and</strong> no non-speculative evidence of prejudice.<br />

� Fed. Trade Comm’n v. First Universal Lending, LLC, 2011 WL 673879 (S.D. Fla. Feb. 17,<br />

2011). In this Federal Trade Commission (FTC) investigation, the defendants sought to enjoin the<br />

prosecution, alleging they were unable to mount a defense due to the FTC’s bad faith spoliation of<br />

the defendants’ computer systems. After seizing the defendants’ business, the FTC employed a<br />

third party to forensically image computers for use in its prosecution; however, the defendants did<br />

not inform the FTC about numerous servers. Believing all computers were imaged, the courtappointed<br />

receiver ordered all computers owned by the defendants to be wiped before being sold.<br />

Rejecting the defendants’ argument that this loss was catastrophic to the case, the court<br />

determined that relevant information was available in hard copy <strong>and</strong> was stored via a third party<br />

cloud computing service. In denying the bad faith spoliation claim, the court also noted that the<br />

destruction was carried out by the defendants themselves <strong>and</strong> that the FTC did not have an<br />

obligation to preserve the evidence. Although acknowledging the loss presented additional<br />

challenges in mounting a case <strong>and</strong> defense, the court found the obstacles were not insurmountable<br />

<strong>and</strong> denied the motion.<br />

� In re Fontainebleau Las Vegas Contract Litig., 2011 WL 65760 (S.D. Fla. Jan. 7, 2011). In this<br />

bankruptcy litigation, the defendant claimed the third party waived privilege by producing three<br />

servers in response to a subpoena <strong>and</strong> court orders without conducting a review for either privilege<br />

or responsiveness. Seeking to use the information but avoid any adverse consequences, the<br />

defendant offered to “eat” the cost of searching the massive document dump of approximately 800<br />

GB <strong>and</strong> 600,000 documents for relevant materials in exchange for the right to review <strong>and</strong> use the<br />

data free of the obligation to appraise or return any privileged documents. Reviewing the third<br />

party’s conduct, the court found that its failure to conduct any meaningful privilege review prior to<br />

production constituted voluntary disclosure <strong>and</strong> resulted in a complete waiver of applicable<br />

privileges. Noting that more than two months after production the third party had not flagged even<br />

one document as privileged, the court rejected its “belatedly <strong>and</strong> casually proffered” objections as<br />

“too little, too late.” Accordingly, the court granted the defendant full use of these documents during<br />

pretrial preparations of the case, but ordered it to timely advise the third party of any facially<br />

privileged information it encountered upon review.<br />

� Moore, II v. Sh<strong>and</strong>s Jacksonville Med. Ctr., Inc., 2010 WL 5137417 (M.D. Fla. Dec. 10, 2010). In<br />

this employment discrimination litigation, the plaintiffs moved to compel discovery responses<br />

including the reproduction of video surveillance footage. The defendants initially produced DVDs<br />

containing the responsive footage; however, the plaintiffs were allegedly unable to view the content<br />

without access to a particular type of media software. When informed by the defendants that the<br />

necessary software was freely available on the Internet, the plaintiffs claimed they were “insulted”<br />

<strong>and</strong> that accessing the program was not feasible <strong>and</strong> would cause undue hardship. Arguing the<br />

“DVDs were rigged,” the plaintiffs sought reproduction. An unsympathetic court noted the plaintiffs<br />

failed to specify the format prior to production <strong>and</strong> did not attempt to confer in good faith to resolve<br />

the issue before seeking relief. Accordingly, the court denied the plaintiffs’ motion as it related to<br />

reproduction of the surveillance footage, but ordered production of additional responsive video<br />

footage.<br />

292


� In re Fontainebleau Las Vegas Contract Litig., 2010 WL 4281808 (S.D. Fla. Oct. 25, 2010). In<br />

this discovery dispute, the producing party sought entry of a confidentiality order, arguing it would<br />

be impossible for the producing party’s attorney to review all of the documents before the deadline.<br />

Disagreeing, the court recalled counsel’s earlier assurance that running a privilege review on the email<br />

server with agreed-upon search terms would take less than a day <strong>and</strong> found no explanation<br />

“why an attorney would need to personally examine ‘hundreds of thous<strong>and</strong>s of documents’” since<br />

the producing party previously represented that its e-discovery vendor was prepared to do exactly<br />

that. Further, the court found that the producing party’s proposal, which would place the burden on<br />

the requesting parties to return all of the documents copied off the servers, would risk disclosing<br />

attorney work product. Denying the confidentiality order request, the court noted the producing<br />

party may seek an extension of production deadlines via a verified motion if more time is needed to<br />

produce the privilege log.<br />

� Leor Exploration & Prod., LLC v. Aguiar, 2010 WL 3782195 (S.D. Fla. Sept. 28, 2010). In this<br />

consolidated commercial litigation, the plaintiffs sought sanctions <strong>and</strong> contempt, alleging the<br />

defendant violated court orders against witness tampering <strong>and</strong> hacked into the e-mail account of a<br />

principal plaintiff to gain a litigation advantage. The plaintiff charged that the e-mail account<br />

contained over 45,000 e-mails, including hundreds of attorney-client privileged communications, a<br />

compilation of which the defendant forwarded to his counsel <strong>and</strong> others. Introducing numerous<br />

factual, procedural <strong>and</strong> legal arguments, the defendant contended that the hacking was “spoofed,”<br />

the plaintiff tried to “goad” the defendant by filing frivolous lawsuits <strong>and</strong>, that “there is nothing wrong<br />

with wanting to win [the] lawsuit.” Disturbed by the defendant’s “win-at-all-costs mentality,” the<br />

court found the defendant gained an unfair advantage by obtaining unauthorized access to the email<br />

<strong>and</strong> acted in bad faith, despite having a mental illness. Thus, the court affirmed <strong>and</strong> adopted<br />

the magistrate’s report <strong>and</strong> recommendation, striking the defendant’s pleadings at an alleged value<br />

of $1 billion. Satisfied that this sanction was both necessary <strong>and</strong> sufficient, the court declined to<br />

award attorneys’ fees <strong>and</strong> costs.<br />

� Managed Care Solutions, Inc. v. Essent Healthcare, Inc., 2010 WL 3368654 (S.D. Fla. Aug. 23,<br />

2010). In this breach of contract litigation, the plaintiff sought sanctions based on the defendant’s<br />

alleged spoliation of e-mails <strong>and</strong> other documents. While the court agreed the defendant violated<br />

its duty to preserve by failing to timely issue a litigation hold, it found the defendant’s duty arose<br />

over one year later than alleged by the plaintiff. Although a number of e-mails <strong>and</strong> attachments<br />

were negligently destroyed during this time under a routine document destruction policy, the court<br />

underscored that "[n]egligence…is not tantamount to bad faith," which is required for a default<br />

judgment or adverse inference instruction. Furthermore, the court found the plaintiff obtained<br />

sufficient evidence from deposition testimony <strong>and</strong> documents received from third parties, <strong>and</strong><br />

thereby failed to demonstrate that the spoliated evidence was crucial to establishing its claim.<br />

Citing the plaintiff’s failure to satisfy the necessary elements, <strong>and</strong> noting that monetary sanctions<br />

<strong>and</strong> targeted discovery had previously been awarded, the court denied the motion for additional<br />

sanctions.<br />

� Bray & Gillespie Mgmt., LLC v. Lexington Ins. Co., 2010 WL 55595 (M.D.Fla. Jan. 5, 2010). In<br />

this ongoing insurance litigation, the district court considered the defendant’s motion for sanctions<br />

<strong>and</strong> reviewed the magistrate judge’s previous recommendation of dismissal sanctions <strong>and</strong><br />

reimbursement of costs. See Bray & Gillespie Mgmt. LLC v. Lexington Ins. Co., 2009 WL 2407754<br />

(M.D. Fla. Aug. 3, 2009). The plaintiffs claimed they were unaware of an automatic function of the<br />

business’s computerized accounts management system that archived records after six months.<br />

Citing the plaintiffs’ duty of preservation, failure to consult its software provider to attempt to<br />

293


etrieve the archived documents, <strong>and</strong> the minimal effort <strong>and</strong> expense required for retrieval, the<br />

court denied the plaintiffs’ request to be allowed to cure the production defect without sanctions.<br />

The court also noted the court orders were “clear, unambiguous <strong>and</strong> frequent” <strong>and</strong> that the<br />

plaintiffs’ willful, bad faith actions “evidenced a pattern of inexcusable disregard for the authority of<br />

[the] court.” Thus, the court found dismissal of the claims arising from or related to the documents<br />

appropriate <strong>and</strong> ordered the plaintiffs to pay the defendant $75,000 in expenses <strong>and</strong> costs.<br />

� Chick-Fil-A <strong>and</strong> CFA-NC Townridge Square, LLC v. ExxonMobil Corp., 2009 WL 3763032<br />

(S.D. Fla. Nov. 10, 2009). In this environmental litigation, the plaintiffs sought production of all work<br />

product-protected documents related to the subject matter of a privileged memor<strong>and</strong>um that the<br />

defendant voluntarily produced. Following the court’s determination that the defendant’s intentional,<br />

voluntary disclosure to the plaintiffs waived the work product protection, the defendants argued that<br />

the waiver’s scope should be limited to the information actually disclosed. Turning to Fed.R.Evid.<br />

502(a), the court determined that disclosure of work product results in a subject matter waiver only<br />

if the additional materials "ought in fairness to be considered together" with the memor<strong>and</strong>um.<br />

Finding a subject matter waiver to be warranted, the court relied on federal case law, interpreting<br />

Rule 502(a) to determine that subject matter waiver was limited to fact work product. Therefore, the<br />

court granted the plaintiffs’ motion in this respect <strong>and</strong> ordered the defendant to produce fact work<br />

product materials.<br />

� Swofford v. Eslinger, 2009 WL 3818593 (M.D. Fla. Sept. 28, 2009). In this §1983 claim asserting<br />

excessive force, the plaintiffs sought sanctions, alleging the defendants destroyed key evidence,<br />

including a laptop <strong>and</strong> e-mails. Despite receiving preservation notices from the plaintiffs, the<br />

defendants’ in-house counsel only forwarded a copy of the letters to senior-level employees (who<br />

did not ensure other employees complied with the defendants’ preservation obligations) <strong>and</strong> failed<br />

to issue a litigation hold. Citing Zubulake V, the court found that it is insufficient for in-house<br />

counsel to simply notify employees of preservation notices, but rather counsel "must take<br />

affirmative steps to monitor compliance" to ensure preservation. Finding sanctions appropriate for<br />

the preservation failures, the court issued an adverse inference sanction for the laptop wiping <strong>and</strong><br />

deletion of e-mails. The court also awarded attorneys’ fees <strong>and</strong> costs to the plaintiffs, holding the<br />

defendants <strong>and</strong> in-house counsel jointly <strong>and</strong> severally liable.<br />

� Leor Exploration & Prod. LLC v. Aguiar, 2009 WL 3097207 (S.D. Fla. Sept. 23, 2009). In this<br />

business litigation, the plaintiffs objected to the special master’s ruling regarding two exhibits – both<br />

e-mails – in which the first was classified as attorney-client privileged <strong>and</strong> the second as protected<br />

work product. Discussing the first exhibit, the court found there was no reasonable expectation of<br />

privacy because the e-mail was sent by the defendant (a former employee of the plaintiffs) through<br />

the plaintiffs’ server. The plaintiffs’ employee h<strong>and</strong>book stated that all electronic communications<br />

were owned by the plaintiffs <strong>and</strong> that no expectation of privacy existed. Thus, the court overruled<br />

the special master’s report <strong>and</strong> found no attorney-client privilege existed with the first exhibit. The<br />

court also granted the plaintiffs’ objection regarding the second exhibit because it was not prepared<br />

in anticipation of litigation <strong>and</strong> could not therefore be protected work product.<br />

� Se. Mech. Servs., Inc., v. Brody, 2009 WL 2883057 (M.D. Fla. Aug. 31, 2009). In this ongoing<br />

computer fraud <strong>and</strong> abuse litigation, the plaintiff requested sanctions alleging the laptops <strong>and</strong><br />

BlackBerry smartphones belonging to the defendants were wiped of data. The defendants argued<br />

that all evidence was preserved on the servers <strong>and</strong> that e-mails were produced in hard copy from<br />

the servers. Relying on explanations provided by computer forensics experts that the "wiped" state<br />

of the BlackBerry smartphones was attributed to intentional <strong>and</strong> deliberate actions, the court<br />

disagreed with the defendants’ arguments <strong>and</strong> held that sanctions were appropriate. Given the<br />

294


nature of the destroyed evidence, including personal e-mails, telephone records, text messages<br />

<strong>and</strong> calendar entries, the court determined the evidence was likely unfavorable to the defendants<br />

<strong>and</strong> therefore issued an adverse inference instruction.<br />

� Bray & Gillespie Mgmt. LLC v. Lexington Ins. Co., 2009 WL 2407754 (M.D. Fla. Aug. 3, 2009).<br />

In this ongoing insurance litigation, the defendants sought dismissal sanctions or preclusion of<br />

evidence pertaining to a key business interruption loss claim. The defendants argued the plaintiffs’<br />

violation of three court orders to compel production, misrepresentations that discovery was<br />

complete <strong>and</strong> production of 188 pages of key documents after the close of discovery warranted<br />

sanctions. In opposition, the plaintiffs argued they had no reason to know the production was<br />

incomplete. Finding that none of the court’s previous efforts were effective to defer the plaintiffs<br />

from "continuing their pattern of stubborn defiance," the magistrate judge determined severe<br />

sanctions were warranted. In cataloging the plaintiffs’ discovery failures, the magistrate judge noted<br />

that "no reasonable person could conclude" the plaintiffs’ failure to timely produce documents was<br />

justified <strong>and</strong> that the plaintiffs’ conduct was intended to deceive <strong>and</strong> prevent discovery. The<br />

magistrate judge also discussed the attorneys’ role in the discovery misconduct, noting lawyers<br />

owe a duty of c<strong>and</strong>or to the court <strong>and</strong> a duty to deal honestly <strong>and</strong> fairly with opposing counsel.<br />

Accordingly, the magistrate judge granted the motion for preclusion sanctions <strong>and</strong> determined the<br />

plaintiffs <strong>and</strong> counsel were jointly <strong>and</strong> severally responsible for the defendants’ expenses <strong>and</strong><br />

costs.<br />

� Se. Mech. Servs., Inc., v. Brody, 2009 WL 2242395 (M.D. Fla. July 24, 2009). In this computer<br />

fraud <strong>and</strong> abuse litigation, the defendants sought adverse inference <strong>and</strong> preclusion sanctions<br />

striking allegations in the plaintiff’s complaint <strong>and</strong> barring plaintiff testimony regarding alleged<br />

spoliation by the defendants for the plaintiff’s failure to issue a litigation hold <strong>and</strong> subsequent<br />

destruction of data. The defendants contended the only evidence related to the plaintiff’s claim that<br />

the defendants improperly deleted data was lost because the plaintiff did not put a litigation hold<br />

into place to halt the automatic overwriting of its backup tapes. The plaintiff argued sanctions were<br />

inappropriate because the defendants’ request came too late to preserve the relevant data from<br />

automatic overwriting <strong>and</strong> its failure to implement a litigation hold was not in bad faith. The court<br />

found that the plaintiff had a duty to preserve evidence <strong>and</strong> should have initiated a litigation hold<br />

that would suspend the routine overwriting of its backup tapes at the time it sent the defendants a<br />

dem<strong>and</strong> letter. Despite the finding of spoliation, the court denied the defendants’ motion to impose<br />

sanctions against the plaintiff because it found the plaintiff did not act in bad faith <strong>and</strong> the<br />

defendants failed to show that any "crucial evidence" existed on the destroyed backup tapes.<br />

� Kilpatrick v. Breg, Inc., 2009 WL 1764829 (S.D. Fla. June 22, 2009). In this medical tort action,<br />

the plaintiff moved to compel discovery, asserting that recently discovered e-mails <strong>and</strong> purported<br />

irregularities in the defendant’s production warranted additional discovery. The defendant argued<br />

that any additional e-mails were in backup storage <strong>and</strong> not reasonably accessible. While the court<br />

recognized that there may be responsive documents that had not been produced, it questioned the<br />

relevance of the potential evidence <strong>and</strong> noted that the “eleventh hour” timing of the request – two<br />

weeks before trial – made it impossible to complete the searches before the start of trial <strong>and</strong> might<br />

interfere with the defendant’s trial preparations. Accordingly, the court granted the plaintiff limited<br />

discovery, holding the plaintiff may hire an outside vendor at its own expense to search at most five<br />

of the defendant’s backup tapes; the search would contain a limited number of search terms; the<br />

search would include the e-mail records of seven key employees; <strong>and</strong> the results would be subject<br />

to a confidentiality agreement.<br />

295


� Feig v. Apple Org., Inc., 2009 WL 1515506 (S.D.Fla. May 29, 2009). In this wrongful termination<br />

litigation, the plaintiff sought production of the defendant’s communications, including e-mails to<br />

<strong>and</strong> from the plaintiff. The defendant claimed that production of employee e-mails referencing the<br />

plaintiff was burdensome <strong>and</strong> would produce irrelevant documents. The defendant also argued that<br />

its server was shut down when it went out of business <strong>and</strong> that if the employee e-mail accounts<br />

were recreated, they would be impossible to search by keyword. Rejecting the defendant’s<br />

irrelevancy argument, the court found that e-mails sent by the plaintiff’s co-workers could be<br />

reasonably calculated to lead to admissible evidence. Thus, the court ordered an electronic search<br />

of the defendant’s server data. The court noted that if a keyword search proved impossible, the<br />

defendant could seek a protective order provided it had support from a computer forensic expert.<br />

� Bank of Mongolia v. M & P Global Fin. Servs., Inc., 2009 WL 117312 (S.D.Fla. Apr. 24, 2009).<br />

In this RICO action, the plaintiff sought a production response from the defendants after a previous<br />

motion to compel proved fruitless. The plaintiff also requested sanctions in the form of direct<br />

access to the defendants’ computer hardware <strong>and</strong> electronic information. Finding the defendants<br />

failed to present a sufficient reason for the discovery inadequacies, the court determined an<br />

independent computer expert should be appointed to retrieve deleted responsive files from the<br />

defendants’ computers. The court ordered the plaintiff to submit search terms <strong>and</strong> bear the expert’s<br />

costs unless future evidence of discovery misconduct necessitated cost allocation to the<br />

defendants, but awarded attorneys’ fees to the plaintiff. The court also afforded the defendants the<br />

right to review the search terms <strong>and</strong> determine privilege <strong>and</strong> responsiveness.<br />

� Cont’l Group, Inc. v. KW Prop. Mgmt., LLC, 2009 WL 1098461 (S.D.Fla. Apr. 22, 2009). In this<br />

<strong>Computer</strong> Fraud <strong>and</strong> Abuse Act litigation, the plaintiff claimed a former employee downloaded<br />

proprietary information prior to leaving the company. Among the plaintiff’s numerous motions was<br />

its request for an adverse inference sanction. The plaintiff alleged that the computer files were<br />

taken with the intention to use the information in the former employee’s new employment, they<br />

were accessed after notice of litigation <strong>and</strong> the related metadata was destroyed. Finding the<br />

plaintiff failed to demonstrate bad faith on the part of the former employee, the court denied the<br />

adverse inference request noting the conduct did not rise to the requisite level for a finding of<br />

evidence spoliation.<br />

� Preferred Care Partners Holding Corp. v. Humana, Inc., 2009 WL 982460 (S.D.Fla. Apr. 9,<br />

2009). In this litigation alleging a confidentiality agreement breach, the plaintiffs sought sanctions<br />

based on the defendant’s "document dump" of 10,000 documents two months after the close of<br />

discovery <strong>and</strong> deletion of documents pursuant to a "print <strong>and</strong> purge" directive from defense<br />

counsel. Finding the defendant clearly failed to carry out its discovery obligations by acting in a<br />

grossly negligent manner, the court imposed sanctions. First, the court ordered further depositions<br />

regarding several categories of documents at cost to the defendant. The court then ordered<br />

additional limited discovery in relation to several document categories. According to the court,<br />

these sanctions were intended to compensate the plaintiffs as well as to punish <strong>and</strong> deter any<br />

further breaches of discovery obligations. The court also determined the defendant’s counsel’s<br />

decision to print <strong>and</strong> purge electronic documents without consulting opposing counsel or the court<br />

was an exercise in bad judgment constituting a breach of the defendant’s duty to preserve.<br />

Accordingly, the court ordered that the plaintiffs shall be permitted to conduct a forensic<br />

examination of the defendant’s electronic data backup system to verify all e-mails were produced.<br />

In addition, the court ordered that the plaintiffs shall be permitted to conduct a forensic examination<br />

to ensure the reduction of the 60,000 data set to 35 documents (produced in a supplemental<br />

production) was appropriate. Finally, the court determined default judgment sanctions were not<br />

296


appropriate because the plaintiffs failed to demonstrate severe prejudice <strong>and</strong> the defendant did not<br />

act in bad faith.<br />

� Bray & Gillespie Mgmt. LLC v. Lexington Ins. Co., 2009 WL 546429 (M.D.Fla. Mar. 4, 2009). In<br />

this ongoing insurance dispute, the defendants sought production of electronically stored<br />

information in native format with metadata <strong>and</strong> sanctions for alleged non-compliance with<br />

Fed.R.Civ.P. 34 <strong>and</strong> a prior court order. Prior to this fifth discovery order, the plaintiffs produced the<br />

requested evidence as TIFF images without metadata despite the defendants’ original production<br />

request that explicitly sought native format with metadata. In May 2008, an attorney for the plaintiffs<br />

concocted a false explanation for how the ESI was collected; however, days before a hearing,<br />

plaintiffs’ counsel disclosed that the documents had been converted into TIFF images using a<br />

program that selectively excluded metadata. After the defendants provided expert testimony<br />

regarding the production, the plaintiffs’ counsel admitted metadata existed. Based on several more<br />

examples of gamesmanship, the court found that if the plaintiffs (<strong>and</strong> their counsel) believed the<br />

production format was substantially justified, they would not have concealed information <strong>and</strong> made<br />

material misrepresentations. The court ordered the plaintiffs to bear all costs related to the<br />

production of a copy of its database (excluding privileged information), which included purchasing<br />

any necessary software <strong>and</strong> hiring professionals. Additionally, the court sanctioned a lead plaintiff<br />

attorney, ordering him to pay reasonable attorneys’ fees, costs <strong>and</strong> expenses incurred by the<br />

defendants <strong>and</strong> ordered another plaintiff attorney to show cause why he should not be personally<br />

sanctioned. The law firm was also found responsible for the discovery misconduct <strong>and</strong> was "jointly<br />

<strong>and</strong> severally liable" with the lead attorney to pay the defendants’ expenses.<br />

� Cont’l Group, Inc. v. KW Prop. Mgmt., LLC, 2009 WL 425945 (S.D.Fla. Feb. 20, 2009). In this<br />

litigation, the plaintiff filed a motion to compel production <strong>and</strong> discovery compliance. Noting the<br />

parties were unable to cooperate regarding the imaging of the portable devices, the court provided<br />

further direction. The court set out the following procedure: the plaintiff would image the<br />

defendants’ portable electronic devices <strong>and</strong> the defendants would conduct a privilege search <strong>and</strong><br />

create a privilege log. The court advised that the plaintiff’s possession of any privileged information<br />

did not constitute a waiver.<br />

� Bray & Gillespie Mgmt. LLC v. Lexington Ins. Co., 2009 WL 71678 (M.D.Fla. Jan. 8, 2009). In<br />

this insurance litigation, the defendants objected to the special master’s recommendation that the<br />

court deny a “blanket” finding of privilege or waiver <strong>and</strong> that any privileged documents produced in<br />

response to a court order for expedited production would not constitute a waiver. The special<br />

master determined the plaintiffs clearly established intent to protect privileged documents by taking<br />

appropriate measures prior to the production. Additionally, the special master concluded the<br />

opposition’s “first look” at potentially privileged documents was punishment enough for any<br />

transgressions in the plaintiffs’ document management. Describing the order as a “narrow ruling,”<br />

the court denied the defendants’ objection. The court reserved the right to consider the question of<br />

waiver, if necessary, in response to an appropriate motion after the court determines if the plaintiffs<br />

have established privilege.<br />

� Armor Screen Corp. v. Storm Catcher, Inc., 2008 WL 5262707 (S.D.Fla. Dec. 17, 2008). In this<br />

patent litigation, the defendants moved to compel production of consumer survey data relied upon<br />

in expert reports. The defendants requested hard copy printouts including all metadata that was<br />

previously produced in an allegedly “unusable” electronic .sav file format. The plaintiff opposed the<br />

motion, asserting that it produced all of its experts’ survey data in the same format in which it was<br />

reviewed <strong>and</strong> analyzed, <strong>and</strong> that such files can be easily accessed with any st<strong>and</strong>ard statistical<br />

computer package. Finding the plaintiff’s production complied with Fed.R.Civ.P. 34(b)(2)(E)’s<br />

297


equirement that data be produced in a reasonably accessible format, the court denied the<br />

defendants’ motion as the defendants provided no materials to demonstrate that their rebuttal<br />

experts were unable to access or review the data.<br />

� Klayman v. Freedom’s Watch, Inc., 2008 WL 5111293 (S.D.Fla. Dec. 4, 2008). In this litigation,<br />

the defendants moved the court to tax the costs of their electronic discovery collection to the<br />

plaintiff. The defendants requested the plaintiff pay the $150,000 they spent for expenses incurred<br />

in hiring an outside firm to collect their electronic documents, including travel expenses. Applying<br />

28 USC §1920, which provides for the taxation of costs for “fees for exemplification <strong>and</strong> copies of<br />

papers necessarily obtained for use in the case,” the court denied the motion. The court refused to<br />

tax costs not specifically authorized by the statute, such as the hourly costs of collection at issue<br />

here.<br />

� Goodbys Creek, LLC v. Arch Ins. Co., 2008 WL 4279693 (M.D.Fla. Sept. 15, 2008). In this<br />

breach of contract litigation, the plaintiff sought production of documents that it alleged were<br />

relevant to prove its claim that the defendant violated its duty of good faith <strong>and</strong> fair dealing (the<br />

defendant was the surety for the party that previously entered into a contract with the plaintiff). The<br />

plaintiff requested: all documents <strong>and</strong> electronic documents that reflect all communications<br />

between the defendant <strong>and</strong> the third party; documents that reflect the defendant’s knowledge of the<br />

third party’s insolvency <strong>and</strong> inability to perform; <strong>and</strong> reproduction of documents in their native form<br />

that were previously produced in a TIFF format. The court denied the first request as overbroad,<br />

but granted the second request, finding the sought-after information to be relevant. Despite the<br />

plaintiff’s failure to specify a production format, the court determined the defendant did not comply<br />

with the Advisory Committee Note to Fed.R.Civ.P. 34 when it chose to produce TIFF images. The<br />

court ordered the defendant to reproduce documents in either their native format, another<br />

comparably searchable format or to supply the plaintiff with software for searching the TIFF<br />

images.<br />

� Infinite Energy, Inc. v. Thai Heng Chang, 2008 WL 4098329 (N.D.Fla. Aug. 29, 2008). In this<br />

trade secret litigation, the plaintiff filed a motion to compel production of relevant e-mail <strong>and</strong> sought<br />

sanctions for defendant’s untruthful representations regarding the e-mail account. The defendant<br />

argued he did not identify the particular Yahoo! account because he could not produce e-mails<br />

from it, claiming they were deleted as a result of his deactivation of the account. Frustrated by the<br />

defendant’s lack of evidence of destruction, the court ordered the defendant to immediately attempt<br />

to obtain <strong>and</strong> produce e-mails from the Yahoo! account. The court also awarded sanctions against<br />

the defendant, but stayed the determination of which sanctions to impose until a later date.<br />

� St. Cyr v. Flying J, Inc., 2008 WL 2097611 (M.D. Fla. May 16, 2008). In this negligence litigation,<br />

the plaintiff filed a motion to prevent the defendant from using the plaintiff’s work-product<br />

correspondences to his expert. Previously, the plaintiff’s expert furnished a four-page letter <strong>and</strong> an<br />

e-mail authored by the plaintiff’s counsel to the defendant in paper format. The defendant argued<br />

that this voluntary disclosure waived work-product protection, <strong>and</strong> also argued that Fed.R.Civ.P.<br />

26(b)(5)(B) applies only within the context of electronically stored documents. The court disagreed,<br />

holding that Fed.R.Civ.P. 26(b)(5)(B) applies to both paper <strong>and</strong> electronic documents. However,<br />

the court held that Fed.R.Civ.P. 26(b)(5)(B) merely provides a procedure for addressing the issue<br />

of waiver <strong>and</strong> “the voluntary disclosure of a work product document into the h<strong>and</strong>s of the adversary<br />

results in a waiver of the privilege.”<br />

� Coleman (Parent) Holdings, Inc. v. Morgan Stanley & Co., Inc., 2007 WL 4336316 (Fla. Dec.<br />

12, 2007). In this underlying fraud case, a jury originally awarded the plaintiff $1.58 billion due to<br />

the defendant’s willful destruction of e-mail <strong>and</strong> failure to comply with the court’s production order.<br />

298


The award stemmed from the court’s jury instruction sanction which made the jury aware of the<br />

defendant’s attempt to “thwart” e-mail discovery. The defendant appealed <strong>and</strong> the state appellate<br />

court reversed the award in favor of the defendant based on the plaintiff’s failure to prove<br />

compensatory damages. The plaintiff appealed <strong>and</strong> the Florida Supreme Court denied the petition<br />

for review. See also Morgan Stanley & Co., Inc. v. Coleman (Parent) Holdings, Inc., 2007 WL<br />

837221 (Fla. App. 4th Dist. Mar. 21, 2007); Coleman (Parent) Holdings, Inc. v. Morgan Stanley &<br />

Co., Inc., 2005 WL 679071 (Fla. Cir. Ct. Mar. 1, 2005).<br />

� U & I Corp. v. Advanced Med. Design, Inc., 2007 WL 4181900 (M.D.Fla. Nov. 26, 2007). In this<br />

breach of contract case, the defendant filed a second motion to compel <strong>and</strong> sought sanctions for<br />

insufficient compliance with the first motion to compel, claiming the plaintiff failed to produce<br />

numerous 2004 e-mail attachments, relevant correspondence <strong>and</strong> certain critical documents<br />

identified by Bates number. The plaintiff countered with a motion for a protective order, arguing that<br />

the request was unduly burdensome as the parties already exchanged over six thous<strong>and</strong> pages.<br />

The court was not persuaded by the plaintiff’s vague assertion <strong>and</strong> denied the motion for the<br />

protective order. The defendant also subpoenaed similar documents from a non-party who sought<br />

to squash the subpoena, claiming undue burden. The court was again not persuaded by the lack of<br />

detail provided as to the efforts required to comply <strong>and</strong> upheld the subpoena. Before ruling on the<br />

issue of sanctions, the court ordered the plaintiff to submit an affidavit from its corporate<br />

representative detailing the cause of the missing information <strong>and</strong> efforts undertaken to retrieve it.<br />

� Lockheed Martin Corp. v. L-3 Communications Corp., 2007 WL 3171299 (M.D.Fla. Oct. 25,<br />

2007). In this case, the defendant moved to impose sanctions for spoliation <strong>and</strong> discovery abuses<br />

against the plaintiff or in the alternative, to reopen discovery. The plaintiff claimed that an employee<br />

deleted relevant e-mail <strong>and</strong> therefore they could not produce e-mails responsive to the discovery<br />

requests. The employee claimed to have not received the litigation hold notice. The employee also<br />

claimed he deleted some e-mail in his inbox to clean it up but was unable to recall the subject<br />

matter of the deleted e-mails. The plaintiff then conducted a forensic search of the employee’s hard<br />

drive <strong>and</strong> produced responsive e-mails not earlier produced. The court therefore denied the motion<br />

as the defendant failed to establish two elements of a spoliation claim, 1) the deleted e-mail was<br />

relevant to the litigation <strong>and</strong> 2) that it had not been already produced.<br />

� In re Seroquel Prod. Liab. Litig., 2007 WL 2412946 (M.D.Fla. Aug. 21, 2007). In this multidistrict<br />

product liability litigation, the plaintiffs motioned the court to impose sanctions on the defendant for<br />

failing to timely comply with discovery obligations. The plaintiffs pointed to numerous instances<br />

where the defendant failed to produce documents in an accessible or useable format, in addition to<br />

missing numerous deadlines. While the court found two of those instances to be excusably<br />

negligent, the other behavior warranted sanctions. The court was extremely displeased with the<br />

defendant’s failure to discuss keyword search terms with the plaintiffs, failure to include page<br />

breaks between documents it did produce, failure to produce usable single-page tiff documents,<br />

omission of attachments <strong>and</strong> relevant emails, <strong>and</strong> purposeful sluggishness in making an effective<br />

production. The court stayed the determination of which sanctions to impose to allow the plaintiffs<br />

an opportunity to present evidence as to their damages or prejudice.<br />

� Wells v. Xpedx, 2007 WL 1200955 (M.D. Fla. Apr. 23, 2007). In this employment discrimination<br />

suit, the plaintiff sought production of e-mail from seven of the defendant’s employees. The plaintiff<br />

also submitted that the defendant implemented a new e-mail deletion policy where e-mails were<br />

deleted within 90 days of creation, unless designated for retention. Accordingly, the plaintiff sought<br />

permission from the court to take the deposition of the defendant’s IT representative to determine if<br />

the defendant had any of the requested e-mail <strong>and</strong> if the defendant destroyed any relevant<br />

299


evidence. In response, the defendant argued that it had produced all relevant email <strong>and</strong> that a<br />

deposition to inquire about its email deletion policy would be redundant <strong>and</strong> unnecessary. Although<br />

the court deferred ruling on the motion to compel the e-mail, the court granted the plaintiff<br />

permission to depose the defendant’s representative. The court referred to the committee notes of<br />

Fed. R. Civ. P. 34, which states that “[d]eleted emails are, in most cases, not irretrievably lost.” The<br />

court held the record was insufficient to determine whether the defendant produced all responsive<br />

documents to the plaintiff’s requests <strong>and</strong> whether responsive documents exist elsewhere in the<br />

defendant’s records which may be accessed electronically. The court also noted the defendant did<br />

not provide adequate information regarding its e-mail deletion policy which further warranted<br />

granting the plaintiff’s deposition request. The court also ordered that after the deposition, the<br />

parties should confer in good faith <strong>and</strong> if a resolution concerning the e-mail discovery requests<br />

cannot be reached, the plaintiff should notify the court.<br />

� Morgan Stanley & Co., Inc. v. Coleman (Parent) Holdings, Inc., 2007 WL 837221 (Fla. App. 4th<br />

Dist. Mar. 21, 2007). In this l<strong>and</strong>mark electronic discovery case, the Florida state appellate court<br />

reversed the $1.58 billion judgment against Morgan Stanley in the litigation brought by Coleman<br />

(Parent) Holdings. The court reversed the judgment upon the grounds that the plaintiff failed to<br />

prove compensatory damages. The plaintiff did not establish the actual value of the stock on the<br />

date of the merger, <strong>and</strong> the court held that the jury must not speculate as to the stock value. The<br />

court did not reach a decision on whether the trial court improperly entered a partial default against<br />

Morgan Stanley as a sanction for discovery misconduct since the sale of stock decision was<br />

dispositive of the case. The court reversed both the compensatory <strong>and</strong> punitive damage awards<br />

<strong>and</strong> rem<strong>and</strong>ed the case to enter judgment for Morgan Stanley. The dissent firmly stated that the<br />

lower court’s issuance of e-discovery sanctions was legal error by the court <strong>and</strong> the jury is best<br />

equipped to award punitive damages.<br />

� Qantum Comm. Corp. v. Star Broad., Inc., 2007 WL 445307 (S.D. Fla. Feb. 9, 2007). The<br />

plaintiff brought an action against the sellers of a radio station, alleging breach of the purchase<br />

agreement <strong>and</strong> seeking specific performance. The plaintiff filed a motion for sanctions <strong>and</strong> default<br />

judgment based on the defendant’s failure to produce key "smoking-gun" documents during<br />

discovery. Specifically, the plaintiff noted an instance where the defendant produced an e-mail<br />

without the corresponding attachment. The defendant stated in deposition testimony that the<br />

attachment was withheld because it was not relevant to the suit. The plaintiff obtained the “smoking<br />

gun” e-mail <strong>and</strong> attachment, which directly contradicted the defendant’s testimony, from a thirdparty.<br />

The defendant argued that it did not delete e-mail in bad faith but rather as part of an<br />

ongoing business practice to purge e-mail due to the limited amount of computer storage space.<br />

Furthermore, the defendant claimed that he did not have the e-mail <strong>and</strong> attachment prior to his<br />

deposition to refresh his memory <strong>and</strong> all testimony was given to the best of his un-refreshed<br />

memory. The court ordered monetary sanctions <strong>and</strong> default judgment against the defendant<br />

because of the discovery misconduct <strong>and</strong> other bad faith actions. The court held that the withheld<br />

e-mails prejudiced the plaintiff since it “hampered the ability of plaintiff to present its claim on the<br />

central issue of this case.” A later hearing was scheduled to determine the amount of costs <strong>and</strong><br />

specific performance damages.<br />

� Floeter v. City of Orl<strong>and</strong>o, 2007 WL 486633 (M.D. Fla. Feb. 9, 2007). In case involving a sexual<br />

harassment claim, inter alia, the plaintiff filed a motion for sanctions against the defendant for<br />

destruction of evidence. The plaintiff requested various e-mail documents from the defendant;<br />

however, the hard drives in the defendant’s possession had been previously replaced <strong>and</strong> sold as<br />

new computers were purchased for employees. The backup tapes containing the relevant e-mails<br />

300


were also overwritten per department policy. The plaintiff argued in favor of sanctions because the<br />

defendant ignored its duty to preserve data when litigation was reasonably foreseeable. The<br />

defendant argued that its duty to preserve e-mail or hard drive data did not occur until the<br />

discovery requests were served <strong>and</strong> any prior destruction was done in accordance with good faith<br />

procedures. The magistrate ruled that sanctions were not appropriate against the defendant. It held<br />

that the duty to preserve the hard drives may have arisen when the complaint was served but<br />

failure to follow the duty was immaterial since the missing documents were not crucial to the<br />

plaintiff’s case. The documents were not crucial because other evidence existed which<br />

demonstrated the same information as would have been found in the deleted e-mails. Furthermore,<br />

the court determined that the destruction by the defendant was not performed in bad faith because<br />

of the pre-existing procedures to overwrite data on its backup tapes <strong>and</strong> hard drives.<br />

� In re Seroquel Prods. Liab. Litig., 2007 WL 219989 (M.D. Fla. Jan. 26, 2007). In a multi-district<br />

litigation matter, the court issued a discovery order addressing several issues related to<br />

electronically stored documents. First, the court set forth the party’s document collection <strong>and</strong><br />

production obligations <strong>and</strong> ordered that all documents be produced in a TIFF format <strong>and</strong> have<br />

Bates numbering. Additionally, specific metadata fields for the documents were to be produced if<br />

practicable to the parties. The court also addressed costs <strong>and</strong> held that each party shall bear its<br />

own costs for the production of accessible data. Inaccessible data <strong>and</strong> data contained in databases<br />

were only to be produced after consultation between the parties.<br />

� Balfour Beatty Rail, Inc. v. Vaccarello, 2007 WL 169628 (M.D. Fla. Jan. 18, 2007). In a suit<br />

alleging that the defendants conspired to compete <strong>and</strong> steal information from their former<br />

employer, the plaintiff brought a motion requesting the defendants produce any hard drives used in<br />

connection with their competing business. The defendants argued the request was overly broad<br />

<strong>and</strong> that confidential information, not relevant to the lawsuit, would be disclosed to the plaintiff. The<br />

plaintiff argued a confidentiality agreement would protect any potential confidential information from<br />

being used <strong>and</strong> that the hard drives should be produced. The court denied the plaintiff’s motion<br />

because there was no indication as to specific information the plaintiff sought to gain from the hard<br />

drive data, only that the entire hard was requested. The court further stated the plaintiff did not<br />

argue that the defendants failed to produce any information necessitating the production of the<br />

hard drives. To allow the plaintiffs access to the defendant’s entire hard drive without limits as to<br />

the information to be obtained would “permit Plaintiff to engage in a fishing expedition.”<br />

� Optowave Co. v. Nikitin, 2006 WL 3231422 (M.D. Fla. Nov. 7, 2006). In a contract dispute, the<br />

plaintiff alleges that the defendant deleted relevant e-mails with bad faith. The e-mails were saved<br />

on the hard drives of several workplace computers <strong>and</strong> contained evidence relevant to the contract<br />

dispute. After litigation started the defendant reformatted the company server using an outside<br />

consultant who erased several relevant e-mails. Evidence also showed that several e-mails in a<br />

key employees’ “sent box” were deleted. The court determined that the loss of evidence could have<br />

only come about through the intentional acts of the defendant. The court ordered adverse jury<br />

instructions at trial as a sanction for intentional spoliation of evidence.<br />

� Omega Patents, LLC v. Fortin Auto Radio, Inc., 2006 WL 2038534 (M.D. Fla. July 19, 2006). In<br />

this suit filed to enforce a patent infringement settlement agreement, the court granted the plaintiff’s<br />

motion for Rule 37 sanctions against the defendant for failing to comply with the court’s order to<br />

produce responsive documents. In seeking sanctions, the plaintiff argued the defendant’s<br />

production efforts were “sparse at best,” having received only a limited number of financial<br />

documents <strong>and</strong> no e-mail. While admitting to only producing five e-mails during the initial<br />

disclosure, the defendant maintained it had since provided the plaintiff with 2,000 pages of<br />

301


electronic documents from its e-mail system. The defendant argued the documents had been<br />

obtained after a detailed <strong>and</strong> exhaustive keyword search resulting in over 17,000 potentially<br />

relevant documents which had to be “organized, compiled, reviewed, Bates stamped <strong>and</strong><br />

converted into the appropriate format.” However, the defendant failed to provide sworn affidavits<br />

supporting its assertion that the delay in production was necessary to avoid undue burden <strong>and</strong><br />

expense. The court found the defendant’s argument without substantial justification, <strong>and</strong> issued a<br />

sanction in the amount of $1,500 against the defendant as a reminder for parties <strong>and</strong> their counsel<br />

to cooperate when conducting litigation.<br />

� Floeter v. City of Orl<strong>and</strong>o, 2006 WL 1000306 (M.D. Fla. Apr. 14, 2006). In a sexual harassment<br />

case, the plaintiff requested, inter alia, production of e-mails <strong>and</strong> a computer printout of e-mails<br />

containing sexually explicit or pornographic materials. The plaintiff also sought to inspect computer<br />

hard drives of the defendant, his former employer. Objecting, the defendant claimed searching for<br />

this information would be unduly burdensome. The district court granted the plaintiff’s requests in<br />

part, limiting production to all relevant e-mails contained on the computer of a specified individual.<br />

In addressing the plaintiff’s request to inspect the defendant’s hard drives, the court concluded the<br />

plaintiff failed to demonstrate that the defendant had withheld relevant documents stored on the<br />

computers in question. The court observed that Fed.R.Civ.P. 34 permits a party to request<br />

documents but “does not give the requesting party the right to conduct the actual search.”<br />

� Martin v. Northwestern Mut. Life Ins. Co., 2006 WL 148991 (M.D. Fla. Jan. 19, 2006). The<br />

defendant sought to dismiss a disability benefits lawsuit on the grounds that the plaintiff, a former<br />

trial lawyer, failed to meet his discovery obligations. During discovery, the defendant suspected the<br />

plaintiff failed to produce all requested information. Upon subpoenaing the plaintiff’s employee <strong>and</strong><br />

fiancée, the defendant received electronic documents the plaintiff previously claimed did not exist.<br />

The plaintiff claimed the omission was innocent <strong>and</strong> stated he had directed his accountant to<br />

gather the requested documents <strong>and</strong> give the defendant “everything.” According to the plaintiff, the<br />

accountant either failed to underst<strong>and</strong> the scope of the dem<strong>and</strong> or the obligations it imposed. In<br />

addressing the dispute, the court declared the plaintiff’s claim “that he is so computer illiterate that<br />

he could not comply with production is frankly ludicrous.” The court asserted the plaintiff, as an<br />

attorney, should have understood his obligations <strong>and</strong> should not have relied on his accountant to<br />

fulfill his duties. Although declining to dismiss the case, the court directed the plaintiff to reimburse<br />

the defendant its reasonable expenses, including attorney’s fees.<br />

� AutoNation, Inc. v. Hatfield, 2006 WL 60547 (Fla.Cir.Ct. Jan. 4, 2006). In a case involving a trade<br />

secret theft action, the plaintiff sought, <strong>and</strong> the court issued, an injunction against the defendant.<br />

The injunction required the defendant to return hard copy files, electronic files, computer disks <strong>and</strong><br />

other computer storage media relating to the plaintiff’s business. In addition, the court ordered a<br />

third party to make her personal computer available to the plaintiff for forensic examination by an<br />

expert. The expert was to determine whether the plaintiff’s material existed on the computer <strong>and</strong> if<br />

e-mails the defendant had sent to the third party’s address were forwarded, altered or used. The<br />

court permitted the expert to copy any of the plaintiff’s material on the computer <strong>and</strong> then delete all<br />

such material from the computer. Finally, the court authorized the defendant <strong>and</strong> the third party to<br />

have an independent forensic expert in attendance at the inspection.<br />

� Menke v. Broward County Sch. Bd., 916 So.2d 8 (Fla. Ct. App. 2005). Alleging a teacher<br />

exchanged sexually explicit e-mails with students <strong>and</strong> made derogatory comments about school<br />

staff, a school board sought to compel production of all computers in the teacher’s household.<br />

Additionally, the Board sought to have its own computer expert search the computers in the<br />

expert’s laboratory for the alleged messages between the teacher <strong>and</strong> students. Objecting to the<br />

302


order, the teacher declared the production would violate his right against self-incrimination, his right<br />

of privacy, <strong>and</strong> would disclose privileged communications. An administrative law judge ordered<br />

production of the computers <strong>and</strong> sought to protect the teacher’s right by allowing the teacher to<br />

have his own expert present at the inspection <strong>and</strong> by requiring the Board’s expert “not to retain,<br />

provide, or discuss with counsel for the Board the existence of any communications which might be<br />

deemed privileged.” In quashing the order, the court declared it was overbroad <strong>and</strong> would allow “an<br />

agent of the Board carte blanche authorization to examine the hard drives it will duplicate from the<br />

computers [the teacher] has been ordered to produce, combing through every byte, every word,<br />

every sentence, every data fragment, <strong>and</strong> every document, including those that are privileged or<br />

that may be part of privileged communications, looking for ‘any data’ that may evidence<br />

communication between [the teacher] <strong>and</strong> his accusers."<br />

� Coleman (Parent) Holdings, Inc. v. Morgan Stanley & Co., Inc., 2005 WL 679071 (Fla. Cir. Ct.<br />

Mar. 1, 2005). In a suit alleging a fraudulent sale of stock, the plaintiff filed a motion for an adverse<br />

inference instruction against the defendant for destroying e-mails <strong>and</strong> failing to comply with a court<br />

order to compel e-mail discovery. Despite an SEC regulation requiring e-mail retention for two<br />

years, the defendant continued its practice of overwriting e-mails every 12 months. Based on this,<br />

the court ordered the defendant to produce backup tapes, review e-mails, conduct searches,<br />

produce responsive e-mails <strong>and</strong> a privilege log, <strong>and</strong> certify compliance with the order. The<br />

defendant issued the compliance certification in spite of having more than 1,400 backup tapes<br />

containing data not yet processed or produced. Throughout the discovery process, the defendant<br />

overwrote e-mails, failed to notify <strong>and</strong> timely process hundreds of DLT <strong>and</strong> 8mm tapes, <strong>and</strong> failed<br />

to produce e-mails <strong>and</strong> attachments. The court found the plaintiff did not receive relevant e-mail<br />

due to the defendant’s discovery tactics <strong>and</strong> granted the motion for an adverse inference<br />

instruction noting “[t]he conclusion is inescapable that [the defendant] sought to thwart discovery.”<br />

The court ordered the defendant to continue complying with the earlier discovery order <strong>and</strong> to pay<br />

costs associated with the plaintiff’s motion. The court also noted the defendant “gave no thought to<br />

using an outside contractor to expedite the process of completing the discovery, though it had<br />

certified completion months earlier; it lacked the technological capacity to upload <strong>and</strong> search the<br />

data at that time, <strong>and</strong> would not attain that capacity for months.” See also Coleman (Parent)<br />

Holdings, Inc. v. Morgan Stanley & Co., Inc., 2005 WL 674885 (Fla. Cir. Ct. Mar. 23, 2005);<br />

Coleman (Parent) Holdings, Inc. v. Morgan Stanley & Co., Inc., No. CA 03-5045 AI (Fla. Cir. Ct.<br />

Jun. 23, 2005)(awarding prejudgment interest of $207 million).<br />

� Four Seasons Hotels <strong>and</strong> Resorts v. Consorcio Barr, 267 F. Supp. 2d 1268 (S.D.Fla. 2003),<br />

aff’d in part <strong>and</strong> rev’d in part, 138 Fed.Appx. 297 (11th Cir. 2005). The plaintiff brought an action<br />

against the defendant licensee alleging, among other things, violations of the <strong>Computer</strong> Fraud <strong>and</strong><br />

Abuse Act, <strong>Electronic</strong> Communications Privacy Act, <strong>and</strong> Uniform Trade Secrets Act. A computer<br />

forensic investigation revealed that the defendant accessed the plaintiff’s computer network,<br />

downloaded confidential data onto backup tapes, fabricated electronic evidence, <strong>and</strong> deleted files<br />

<strong>and</strong> overwrote data prior to his computer being turned over for inspection to the plaintiff. The court<br />

held that the defendant acquired the plaintiff’s confidential customer information through improper<br />

means, namely, by theft <strong>and</strong> by espionage through electronic means. The court issued a judgment<br />

for the plaintiff <strong>and</strong> ordered monetary damages, among other relief.<br />

� Southern Diagnostic Assoc. v. Bencosme, 833 So.2d 801 (Fla. Dist. Ct. App. 2002). The<br />

appellate court quashed an order against Southern Diagnostic, a non-party in an insurance suit<br />

brought by Bencosme, compelling discovery of certain contents of its computer system. The<br />

appellate court held that that trial court’s order was overly broad, setting no parameters or<br />

303


limitations on the inspection of Southern Diagnostic’s computer system <strong>and</strong> make no account that<br />

the computer system contained confidential <strong>and</strong> privileged information. The appellate court<br />

directed the trial court to craft a narrowly tailored order that accomplishes the purposes of the<br />

discovery requests <strong>and</strong> provides for confidentiality.<br />

� Bowe v. State, 785 So.2d 531 (Fla. Dist. Ct. App. 2001). “An e-mail ‘statement’ sent to another is<br />

always subject to the limitations of the hearsay rule.”<br />

� Strasser v. Yalamanchi, 669 So.2d 1142 (Fla. Dist. Ct. App. 1996). The court ruled that the trial<br />

court’s discovery order should be quashed because (1) unrestricted access to the defendant’s<br />

entire computer system was overly broad <strong>and</strong> would pose a threat to confidential records <strong>and</strong> (2)<br />

there was little evidence that the purged documents could be retrieved.<br />

� Carbon Dioxide Indus. Antitrust Litig., 155 F.R.D. 209 (M.D. Fla. 1993). “[D]epositions to<br />

identify how data is maintained <strong>and</strong> to determine what hardware <strong>and</strong> software is necessary to<br />

access the information are preliminary depositions necessary to proceed with merits discovery.”<br />

Georgia<br />

� Stanfill v. Talton, 2012 WL 1035385 (M.D.Ga. Mar. 29, 2012). In this discovery dispute, the<br />

plaintiff sought an adverse inference sanction stemming from the defendants detention center’s<br />

failure to preserve video recordings relevant to plaintiff’s allegations of excessive force resulting in<br />

the death of an inmate. The defendants contended that their conduct—failing to make copies of<br />

video recordings before the recordings were automatically overwritten (ordinarily a two to three<br />

month window)—was not sanctionable. They argued that they could not have reasonably<br />

anticipated litigation at the time of deletion. Alternatively, the defendants argued that they lacked<br />

requisite bad faith culpability. Applying federal law, the court reasoned that while the excessive<br />

force incident was immediately subject to independent review by the state investigation bureau,<br />

that alone was not enough to trigger a duty to preserve the tapes for a claim filed over two years<br />

after the death of the inmate. Further, the court found that even if the defendants owed a duty to<br />

preserve to this particular plaintiff, the defendants’ failure to copy the video recordings only<br />

amounted to negligence. Therefore, there was insufficient evidence to warrant an adverse<br />

inference sanction.<br />

� In re Delta/AirTran Baggage Fee Antitrust Litig., 2012 WL 360509 (N.D. Ga. Feb. 3, 2012). In<br />

this antitrust case, the plaintiffs moved for sanctions for the defendant’s alleged failure to make a<br />

reasonable inquiry before certifying responses to discovery requests. Despite the defense<br />

counsel’s repeated, “forceful” assurances that they had fully complied with production requests, the<br />

defendant discovered <strong>and</strong> produced 60,000 pages of missing responsive documents. The<br />

documents were located in backup tapes found in an evidence locker controlled by IT <strong>and</strong> hard<br />

drives that were not uploaded into the defendant’s search platform. Although the defendant<br />

remedied its mistake <strong>and</strong> the data sources were devoid of any “smoking gun” documents, the court<br />

found that the defendant’s lackluster communication with IT, empty reassurances of a seamless<br />

production <strong>and</strong> failure to correct false statements fell short of the certification requirements under<br />

Fed.R.Civ.P. 26(g). The court also noted that the defendant’s late discovery was sanctionable<br />

under Fed.R.Civ.P. 37(c)(1) <strong>and</strong> Fed.R.Civ.P. 26(e) (collectively requiring timely supplementation).<br />

The court cited the same general lack of diligence by the defendant <strong>and</strong> awarded reasonable<br />

attorney fees resulting from the delay.<br />

� Sitton v. Print Direction, Inc., 2011 WL 4469712 (Ga. App. Sept. 28, 2011). In this privacy rights<br />

dispute, the plaintiff appealed the trial court’s determination that the defendant-employer’s<br />

304


investigation of the plaintiff’s computer for evidence of involvement with a competing business did<br />

not constitute an invasion of privacy. The defendant conducted its investigation by entering the<br />

plaintiff’s office, moving the computer’s mouse, clicking on the e-mail listing which appeared on the<br />

screen <strong>and</strong> printing e-mails related to a competing job after catching wind the plaintiff had been<br />

improperly competing with the defendant’s business. Notably, the e-mails were on a separate email<br />

address on the plaintiff’s personal computer that he used for work with the defendant <strong>and</strong> his<br />

own personal use over the company’s systems. Addressing the plaintiff’s arguments, the court<br />

determined the defendant’s conduct did not constitute an “unreasonable intrusion” or “surveillance”<br />

under OCGA § 16-9-93, which addresses computer theft, trespass <strong>and</strong> invasion of privacy. Further,<br />

the court cited the defendant’s computer usage policy (noting it was not limited to only work-issued<br />

technology) <strong>and</strong> the employee manual which clearly stated that communications transmitted over<br />

the company’s systems should not be regarded as “private or confidential,” <strong>and</strong> affirmed the trial<br />

court’s ruling.<br />

� CBT Flint Partners, LLC v. Return Path, Inc., 2011 WL 3487023 (C.A.Fed. (Ga.) Aug. 10, 2011).<br />

Previously in this patent infringement litigation, the Northern District of Georgia court granted<br />

summary judgment of invalidity regarding the patent dispute. In addition, the district court<br />

determined $268,311.22 in costs related to e-discovery were properly taxable. See CBT Flint<br />

Partners, LLC v. Return Path, Inc., 2009 WL 5159761 (N.D. Ga. Dec. 30, 2009). On appeal, the<br />

Court of Appeals overturned the root issue in the underlying patent litigation, vacated the ruling<br />

regarding costs as the defendant was no longer the prevailing party <strong>and</strong> rem<strong>and</strong>ed to the district<br />

court for further proceedings.<br />

� In re Delta/AirTran Baggage Fee Antitrust Litig., 2011 WL 915322 (N.D. Ga. Feb. 22, 2011). In<br />

this antitrust litigation, the plaintiffs sought spoliation sanctions alleging the defendant failed to<br />

suspend the automatic deletion procedures of its e-mail <strong>and</strong> backup tapes. Although the defendant<br />

issued a written litigation hold to 22 custodians after being served a Civil Investigative Dem<strong>and</strong><br />

(CID) from the Department of Justice (DOJ), the plaintiffs argued the defendant failed to apply this<br />

hold to its e-mail servers <strong>and</strong> backup tapes for three months. Reviewing the elements necessary to<br />

support a spoliation claim, the court found the defendant’s preservation obligation upon receipt of<br />

the CID extended only to the DOJ <strong>and</strong> that it was not expected to anticipate the filing of a civil suit<br />

three months later. Refusing to substitute speculation for actual proof, the court determined that<br />

even if a duty to preserve had existed, the plaintiffs failed to demonstrate any evidence of<br />

prejudice. Finally, the court found the defendant’s actions constituted at most negligence <strong>and</strong> not<br />

the bad faith conduct required to support spoliation sanctions in the Eleventh Circuit. Accordingly,<br />

the court denied the motion for sanctions.<br />

� Autry Petroleum Co. v. BP Prods. N. Am., Inc., 2010 WL 3239010 (M.D. Ga. Aug. 16, 2010). In<br />

this contract dispute, the plaintiffs moved to review taxation of costs by the clerk following<br />

affirmation of summary judgment on appeal. The plaintiffs contended that both parties agreed to<br />

bear their own expenses for e-discovery, objecting to taxation of certain costs as unauthorized <strong>and</strong><br />

unnecessary. Finding the parties never entered into a cost allocation agreement as alleged, the<br />

court addressed the plaintiffs’ objections <strong>and</strong> found expenses relating to preparation of the<br />

defendant’s privilege log, costs for hard copy prints of electronic images, e-discovery costs postdating<br />

the defendant’s final production <strong>and</strong> costs incurred in transferring data to a different<br />

electronic format for document review to be necessary <strong>and</strong> properly taxable. Based on these <strong>and</strong><br />

non-electronic discovery findings, the court adjusted the final recovery to the amount of<br />

$147,967.74.<br />

305


� Edelen v. Campbell Soup Co., 2010 WL 774186 (N.D.Ga. Mar. 2, 2010). In this race <strong>and</strong> gender<br />

discrimination litigation, the plaintiff filed several objections to a magistrate judge’s discovery order<br />

which denied the plaintiff’s motion for sanctions <strong>and</strong> directed the plaintiff pay the defendants<br />

attorneys’ fees associated with the defendants’ previous motion to narrow the scope of ESI<br />

discovery requests. The plaintiff argued for sanctions alleging the defendants excessively<br />

designated documents as confidential, voluntarily produced privileged documents <strong>and</strong> failed to<br />

meet <strong>and</strong> confer with the plaintiff. Regarding the plaintiff’s ESI discovery request, the defendants<br />

claimed the plaintiff’s proposal spanned a three year period <strong>and</strong> would produce 474,456<br />

documents for one year alone since it encompassed 50 custodians <strong>and</strong> more than 55 search<br />

terms. Adopting the magistrate’s discovery recommendations in full, the court dismissed the<br />

plaintiff’s sanctions claims <strong>and</strong> noted the plaintiff repeatedly failed to comply with court’s orders to<br />

narrow the scope of the ESI production requests. Thus, the court found the magistrate’s<br />

recommendation, which awarded attorneys’ fees based on the plaintiff’s noncompliant behavior in<br />

the discovery process, to be reasonable.<br />

� CBT Flint Partners, LLC v. Return Path, Inc., 2009 WL 5159761 (N.D. Ga. Dec. 30, 2009). In<br />

this patent infringement action, the defendants filed a motion to tax the costs associated with using<br />

an e-discovery vendor to aid in the production of 1.4 million electronic documents <strong>and</strong> six versions<br />

of source code. Objecting, the plaintiff argued that fees associated with the collection of documents<br />

for production are not taxable under 28 U.S.C. § 1920. Although noting that a judicial division of<br />

opinion exists as to whether U.S.C § 1920 allows recovery, the court cited the highly technical<br />

nature <strong>and</strong> necessity of e-discovery services in the electronic age to overrule the plaintiff’s<br />

objection <strong>and</strong> hold the $268,311.22 in costs to be recoverable. In supporting its finding, the court<br />

reasoned that the "[t]axation of these costs will encourage litigants to exercise restraint in<br />

burdening the opposing party with the huge cost of unlimited dem<strong>and</strong>s for electronic discovery."<br />

� Kipperman v. Onex Corp., 2009 WL 1473708 (N.D.Ga. May 27, 2009). In this constructive<br />

transfer <strong>and</strong> fraud case, the plaintiff sought sanctions in the form of a default judgment against the<br />

defendant for discovery abuses. The plaintiff asserted that the defendant repeatedly defied court<br />

orders, unilaterally narrowed the scope of restoration <strong>and</strong> production of court-ordered backup<br />

tapes, unilaterally redacted court-ordered produced documents to the point that such documents<br />

became unusable <strong>and</strong> misrepresented to the court the likely relevance of e-mails sought. The<br />

defendants maintained that their redactions were in compliance with the court’s orders <strong>and</strong> insisted<br />

that the broad discovery requested by the plaintiff would likely be fruitless. The court agreed with<br />

the plaintiffs that the defendant had blatantly disregarded court orders by making<br />

misrepresentations during discovery <strong>and</strong> stated it was deeply disturbed by the defendant’s<br />

discovery conduct in what it regarded as "a textbook case of discovery abuse." However, the court<br />

declined to order default sanctions, citing novel issues of liability <strong>and</strong> noting that granting a default<br />

judgment in this case might be a grant of the largest default judgment sought in United States<br />

history. The court alternatively awarded $1,022,700 in monetary sanctions against the defendant to<br />

be paid to the plaintiff.<br />

� Kipperman v. Onex Corp., 2008 WL 4372005 (N.D.Ga. Sept. 19, 2008). In this litigation, the<br />

defendants sought relief from having to review <strong>and</strong> produce all results from an e-mail search on the<br />

defendants’ backup tapes, arguing that the broad search terms resulted in thous<strong>and</strong>s of irrelevant<br />

hits. The defendant asked to be excused from producing (1) irrelevant documents, (2) documents<br />

responsive to one specific transaction, <strong>and</strong> (3) documents captured from the e-mail boxes of one<br />

specific subsidiary company. Finding the documents referred to in the second <strong>and</strong> third objections<br />

were “highly unlikely” to garner relevant information, the court granted the requested relief.<br />

306


Regarding the defendants’ relevancy <strong>and</strong> volume objections, the court noted the defendants<br />

previously had the opportunity to narrow the search terms <strong>and</strong> provide a list of people that could<br />

help reduce the number of e-mail boxes searched, which they did not take advantage of. The court<br />

therefore refused relief stating, “Defendants must now lie in the bed that they have made.”<br />

� Connor v. Sun Trust Bank, 2008 WL 623027 (N.D.Ga. Mar. 5, 2008). In this litigation alleging<br />

interference <strong>and</strong> retaliation claims under FMLA, the plaintiff filed a motion for sanctions based on<br />

the defendant’s failure to produce a highly relevant e-mail during discovery. The plaintiff located,<br />

through other means, a relevant e-mail that explained her dismissal to other employees. The<br />

defendant moved for summary judgment relying on their 30-day e-mail destruction policy which<br />

automatically deleted e-mails that were thirty days old, unless they were first archived by the user.<br />

The court, un-persuaded by the defendant’s reasoning, granted the plaintiff’s motion for sanctions<br />

<strong>and</strong> issued an adverse jury instruction.<br />

� Arista Records LLC v. Does 1-7, 2008 WL 542709 (M.D.Ga. Feb. 25, 2008). In this copyright<br />

infringement suit, the plaintiffs filed a motion seeking expedited discovery to obtain basic<br />

information about the alleged infringers from the third-party Internet Service Provider. The plaintiffs<br />

sought the name, current <strong>and</strong> permanent address, phone number, e-mail address <strong>and</strong> Media<br />

Access Control address for the individuals linked to the Internet Protocol addresses involved in the<br />

alleged distribution of the copyrighted materials over the peer-to-peer file sharing network at issue.<br />

The court granted the motion based on good cause established by the lack of other means to<br />

obtain the information <strong>and</strong> the prima facia showing of copyright infringement, combined with the<br />

expediency created by the limited retention of user activity logs.<br />

� Petcou v. C.H. Robinson Worldwide, Inc., 2008 WL 542684 (N.D.Ga. Feb. 25, 2008). In this<br />

employment discrimination suit alleging company-wide sexual harassment, the plaintiffs filed a<br />

renewed motion to compel the defendants to produce documents, including e-mails, that were<br />

sexual or of a gender derogatory nature from 1998 through 2006. The defendants claimed the email<br />

was not reasonably accessible due to undue burden <strong>and</strong> cost as it required the restoration of<br />

numerous backup tapes <strong>and</strong> claimed fees of $79,300 for e-mail restoration from a single employee<br />

over a two year period. Agreeing with the defendants, the court found the burden of the request to<br />

outweigh the likely benefit <strong>and</strong> limited the retrieval to two narrow categories of e-mail: (1) undeleted<br />

e-mail of current employees specifically named by the plaintiffs; <strong>and</strong> (2) any relevant e-mails of the<br />

nature cited by the plaintiff of which the defendants were aware of <strong>and</strong> had retained. Additionally,<br />

the court denied the plaintiffs’ request for spoliation sanctions, finding the defendants’ document<br />

destruction policy reasonable.<br />

� Barton v. State, 2007 WL 1775565 (Ga.App. June 21, 2007). In a suit charging the defendant of<br />

knowingly possessing child pornography, the Georgia Court of Appeals reversed the jury trial<br />

conviction based in large part on computer forensic evidence. A computer forensic analyst testified<br />

that computers store information viewed over the internet on the hard drive in temporary internet<br />

cache files <strong>and</strong> that there is nothing the user can do to prevent this. The computer forensic expert<br />

further explained that there is no way to determine if the stored files were affirmatively sought after<br />

by the user or were pop-ups. Additionally, a user is not able to retrieve these files without special<br />

forensic software, which was not present on the defendant’s computer. As knowing possession of<br />

child pornography requires proof of an affirmative step to save or download images to the<br />

computer <strong>and</strong> knowledge of their existence, the defendant did not have the required culpability to<br />

be held guilty of the crime.<br />

� Williams v. Taser Int’l Inc., 2007 WL 1630875 (N.D.Ga. June 4, 2007). In a wrongful death action,<br />

the plaintiffs brought three motions before the court to resolve numerous discovery disputes. The<br />

307


parties disagreed about the manner in which the searches for responsive documents contained<br />

within the defendants’ electronic databases were to be performed, specifically focusing on the<br />

timing of production, the specific search terms to be used, <strong>and</strong> the extent to which the plaintiffs<br />

would be allowed to participate in the search process. The plaintiffs requested that they be<br />

permitted to actively participate in the search process at the defendants’ facility. The defendants<br />

opposed this request <strong>and</strong> stated if the search terms can be agreed upon in advance via email, the<br />

defendant will locate the documents, conduct a privilege review, <strong>and</strong> produce responsive<br />

documents. Finding both proposals deficient, the court, being frustrated with the delay <strong>and</strong> inability<br />

of the parties to reach an agreement, entered an extensive discovery protocol <strong>and</strong> ordered the<br />

defendants to use a specified list of keyword search terms. The court also ordered a protocol to be<br />

followed regarding inadvertent disclosure of privileged information <strong>and</strong> set a deadline for<br />

completion of discovery.<br />

� Georgia Dept. of Agric. v. Griffin Indus., 2007 WL 805795 (Ga. App. Mar. 19, 2007). In this case<br />

the Georgia Department of Agriculture appealed a court order granting the requestor access to emails<br />

stored on disaster recovery back-up tapes under the Georgia Open Records Act. The<br />

appellate court found the Department had not been afforded proper notice to defend its position<br />

regarding several key issues including the costs <strong>and</strong> burdens of production, the proper allocation of<br />

costs between the parties <strong>and</strong> whether the e-mails were “open source records” under the Act. The<br />

appellate court reversed the order <strong>and</strong> rem<strong>and</strong>ed the issue to the trial court.<br />

� Gibson v. Ford Motor Co., 2007 WL 41954 (N.D. Ga. Jan. 4, 2007). In a product liability case, the<br />

plaintiff motioned the court to compel the defendant to produce a copy of its litigation hold notice as<br />

part of discovery. The litigation hold notice had a list of the documents the defendant wanted its<br />

employees to preserve for the pending litigation. The court ordered the document did not have to<br />

be produced to the plaintiff since it was closely related to attorney-work product material. The court<br />

noted that litigation holds are often over inclusive <strong>and</strong> the documents on the notice often do not<br />

bear any relevance to the actual litigation. The court also cautioned that compelled production of<br />

this notice would encourage other companies from not issuing litigation hold notices under fear of<br />

possible disclosure <strong>and</strong> adverse consequences.<br />

� Frey v. Gainey Transp. Servs., Inc., 2006 WL 2443787 (N.D. Ga. Aug. 22, 2006). The plaintiff in<br />

a personal injury suit filed a motion for sanctions against defendant for failing to preserve satellite<br />

tracking information despite plaintiff’s preservation letter to defendant before litigation started. The<br />

plaintiff’s attorney sent defendant a 15-page letter 10 days after his client’s accident dem<strong>and</strong>ing<br />

that defendant preserve certain evidence despite the fact that litigation had not started. Plaintiff<br />

claims that defendant failed to preserve electronic satellite information that tracks the location of<br />

defendant’s drivers. The information is automatically deleted 90 days after it is saved on a server,<br />

<strong>and</strong> the requested information was deleted in the normal course of business. The court held that<br />

sanctions should not be issued because plaintiff was not prejudiced by lacking the evidence <strong>and</strong><br />

that defendant did not destroy the evidence with “bad faith” even though it received plaintiff’s letter.<br />

The court stated that it is “difficult to allow a potential plaintiff to make an end run around the<br />

Federal Rules of Civil Procedure by filing a preemptive ‘spoliation’ letter.”<br />

� Dikeman v. Stearns, 2002 WL 203766 (Ga. Ct. App. Feb. 11, 2002). Where law firm sued a client<br />

to collect unpaid legal bills, client then requested production of a wide range of information,<br />

including: calendars, a timekeeping computer database, a full <strong>and</strong> complete copy of the law firm’s<br />

hard drive, copies of all bills sent, <strong>and</strong> all documents or notes reflecting communications within the<br />

firm. The court upheld the trial court’s finding that these discovery requests were overbroad,<br />

oppressive, annoying, <strong>and</strong> required undue burden <strong>and</strong> expense.<br />

308


� ABC Home Health Servs. v. IBM Corp., 158 F.R.D. 180 (S.D. Ga. 1994). In action for breach of<br />

contract, the court sanctioned IBM for destroying computer files in anticipation of litigation.<br />

� Easley, McCaleb & Assoc., Inc. v. Perry, No. E-2663 (Ga. Super. Ct. July 13, 1994). The court<br />

ordered that deleted files on the defendant’s computer hard drive are discoverable, <strong>and</strong> the<br />

plaintiff’s expert must be allowed to retrieve all recoverable files. The court issued an order<br />

detailing the protocol for reviewing the electronic data.<br />

Other Jurisdictions<br />

Court of International Trade<br />

� Heveafil Sdn. Bhd. v. United States, 2001 WL 194986 (Ct. Int’l Trade Feb 27, 2001). In an action<br />

challenging a U.S. Department of Commerce administrative review of an “antidumping order”, the<br />

court determined that the plaintiff failed to act to the best of its ability where six months after<br />

receiving notice about maintaining its source documents, it deleted relevant data from its computer<br />

system. The court found that the plaintiff “did not cooperate to the best of its ability because after<br />

receiving notice from [the Department of Commerce], it knew or should have known to maintain<br />

th[is] source document.”<br />

� Torrington Co., v. United States, 786 F. Supp. 1027 (Ct. Int’l Trade 1992). The plaintiff requested<br />

access to confidential materials contained on a computer tape. The plaintiff also requested hard<br />

copies of the data. The court refused to order the defendant to create the computer tapes from<br />

scratch where the plaintiff had already received the documents in paper form. In reaching its<br />

decision, the court stated, “Where the burden, cost <strong>and</strong> time required to produce the tapes is<br />

virtually equal on both parties, then the burden of producing the tapes falls on the party requesting<br />

the information.”<br />

� Timken Co. v. United States, 659 F. Supp 239 (Ct. Int’l Trade 1987). The court ordered<br />

production of data stored on computer tape even though it had been previously produced in a<br />

paper format.<br />

� Daewoo Elecs. Co. v. United States, 650 F. Supp. 1003 (Ct. Int’l Trade 1986) rev’d on other<br />

grounds 6 F.3d 1511 (Fed. Cir. 1993). The court rejected the government’s narrow discovery<br />

position, stating that disclosure orders should be construed liberally <strong>and</strong> should not be impeded by<br />

technical objections. The court further explained, “[I]t would be a dangerous development in the law<br />

if new techniques for easing the use of information become a hindrance to discovery of disclosure<br />

in litigation.”<br />

Federal Claims Court<br />

� Pitney Bowes Gov’t Solutions, Inc. v. United States, 2010 WL 3278402 (Fed. Cl. Aug. 19,<br />

2010). In this government contract award protest, the plaintiff sought sanctions alleging the<br />

contracting officer for the Department of Justice spoliated evidence by inappropriately ordering the<br />

destruction of the evaluation data used in the bidding process. Although the information was<br />

successfully recovered from backup tapes, the plaintiff maintained the government deserved<br />

sanctions for the order given to destroy the documents. The plaintiff also challenged the veracity of<br />

the recovered data, claiming that an analysis of the metadata revealed the documents were not the<br />

same documents the contracting officer destroyed. Denying the request for sanctions, the court<br />

held there is no question of spoliation when "backup tapes have been retained <strong>and</strong> can be<br />

309


provided in discovery," <strong>and</strong> further rejected the challenge to the documents’ veracity as meritless,<br />

finding the discrepancy in authorship was accounted for by the bidding review process.<br />

� United Med. Supply Co. Inc., v. United States, 2007 WL 1952680 (Fed.Cl. June 27, 2007). In<br />

this contract dispute, the plaintiff sought spoliation sanctions based on the defendant’s failure to<br />

preserve <strong>and</strong> produce relevant evidence. The defendant argued that as it acted in good faith, albeit<br />

negligently, the court was precluded from imposing such sanctions. For over four years, the<br />

defendant had neglected to contact the proper custodians to notify them of the litigation, let alone<br />

inform them of the preservation requirement. The court held that an injured party need not<br />

demonstrate bad faith in order for the court to impose spoliation sanctions, as the spoliation<br />

doctrine was not designed solely to punish those who consciously destroy documents, but also to<br />

address the manifest unfairness in the loss of relevant information. Therefore, based on the<br />

defendant’s reckless disregard of its preservation duty, the court ordered a two facet sanction.<br />

First, the defendant was prohibited from cross-examining the plaintiff’s expert regarding gaps in the<br />

record. Second, the defendant was ordered to reimburse the plaintiff for any additional discovery<br />

related costs because of the defendant’s malfeasance <strong>and</strong> misrepresentations as well as costs<br />

incurred with this motion.<br />

� AAB Joint Venture v. United States, 2007 WL 646157 (Fed. Cl. Feb. 28, 2007). In this<br />

construction litigation case, the plaintiff moved to compel discovery of e-mails from the defendant.<br />

The defendant listed several individuals who were known to have generated e-mail related to the<br />

subject matter of the litigation. However, the defendant produced e-mail from only a few of the<br />

individuals, <strong>and</strong> the production from those individuals revealed insufficiency <strong>and</strong> gaps in the<br />

production. The defendant argued that it produced thous<strong>and</strong>s of e-mails already <strong>and</strong> that further<br />

production required restoration of back-up tapes that would cost between $85,000 <strong>and</strong> $150,000.<br />

The defendant further argued that many of the e-mails were protected as privileged<br />

communications. The plaintiff argued the defendant had a duty to preserve e-mail <strong>and</strong> costs should<br />

not have any bearing on whether the documents should be produced. The court agreed with the<br />

plaintiff <strong>and</strong> ruled that the defendant’s production of e-mails was far from adequate. The court<br />

further ruled that cost is only one factor in ordering a motion to compel <strong>and</strong> that the court “cannot<br />

relieve Defendant of its duty to produce those documents merely because Defendant has chosen a<br />

means to preserve the evidence which makes ultimate production of relevant documents<br />

expensive.” As such, the defendant was ordered to restore a portion of its back-up tapes from time<br />

periods specified by the plaintiff <strong>and</strong> was ordered to bear the costs of the initial sampling. Any<br />

further production <strong>and</strong> cost allocation would be determined by the sample production.<br />

� United Medical Supply Co. v. United States, 73 Fed.Cl. 35 (Fed. Cl. 2006). The Federal Claims<br />

Court reviewed a motion requesting an order comm<strong>and</strong>ing a government entity to preserve<br />

documents. The plaintiff claimed an order was necessary to preserve documents since evidence<br />

revealed that the government allowed several boxes of relevant documents stored in warehouses<br />

to be destroyed. The court noted that it need not issue a preservation order to prevent spoliation<br />

since most parties underst<strong>and</strong> the obligation to preserve relevant evidence. However, the court<br />

found that the risk of future document destruction was high <strong>and</strong> steps to prevent the possible<br />

destruction would not be overly broad or burdensome on the government, therefore, granting the<br />

preservation order. Although the destruction of documents involved paper documents stored in a<br />

warehouse, the court extended the preservation order to include all electronic documents, including<br />

computer hard drives <strong>and</strong> servers.<br />

� The Pueblo of Laguna v. United States, 60 Fed. Cl. 133 (Fed. Cl. 2004). The plaintiff, who<br />

alleged that the government mismanaged Indian tribe trust funds <strong>and</strong> other properties, moved for a<br />

310


document preservation order. The requested order would require the government to index<br />

electronic documents <strong>and</strong> would allow the plaintiff limited inspection of the documents. The<br />

government contended that the proposed order was unnecessary <strong>and</strong> overly burdensome, in part<br />

because document retention policies were already in place at the government agencies likely to be<br />

implicated in the suit. The court held that the plaintiff was required to demonstrate “that absent a<br />

court order, there is significant risk that relevant evidence will be lost or destroyed.” Additionally,<br />

the plaintiff “must show that the particular steps to be adopted will be effective, but not overbroad.”<br />

The plaintiff was able to produce evidence that the government had lost <strong>and</strong> destroyed documents<br />

in the past, including electronic records containing potentially relevant information. Based on this<br />

evidence, the court ordered the government to preserve all documents, including electronic<br />

information, e-mail, <strong>and</strong> metadata that contained relevant information or that might lead to the<br />

discovery of relevant information. The court further required the government to index all the<br />

documents <strong>and</strong> to report any documents that were destroyed. The court indicated that the<br />

possibility of sanctions “which the case law suggests may be severe…provides the<br />

incentive…needed to effectuate this preservation plan.”<br />

� Renda Marine v. United States, 58 Fed.Cl. 57 (Fed. Cl. 2003). In a government contract suit, a<br />

dispute arose regarding both parties’ duties to preserve evidence. Specifically, the plaintiff moved<br />

the court to compel access to the defendant’s hard drives, backup tapes, <strong>and</strong> e-mail systems,<br />

alleging that the defendant did not search any hard drives or backup tapes in preparing its<br />

response to the plaintiff’s document production requests. The defendant denied these allegations.<br />

The plaintiff further alleged that the defendant routinely deleted e-mail even after commencement<br />

of the suit <strong>and</strong> moved the court to sanction the defendant for such spoliation of evidence. The court<br />

held that, upon notice that litigation might occur, the defendant had a legal obligation to preserve<br />

evidence related to the plaintiff’s claim. The court directed the defendant to produce, at its<br />

expense, backup tapes created after such notice <strong>and</strong> to provide the plaintiff with access to the<br />

requested hard drive. The court further ordered the defendant to produce backup tapes pre-dating<br />

notice of the suit at the plaintiff’s expense. In a subsequent decision, Renda Marine v. United<br />

States, 62 Fed. Cl. 371 (Fed. Cl. 2004), the court determined e-mails sent to <strong>and</strong> from an attorney<br />

in the defendant’s general counsel office were privileged even after they were forwarded to nonattorneys<br />

in the agency.<br />

United States Air Force Court of Criminal Appeals<br />

� United States v. Sanchez, 59 M.J. 566 (A.F. Ct. Crim. App. 2003), aff’d in part <strong>and</strong> rev’d in part,<br />

60 M.J. 329 (A.F. Ct. Crim. App. 2004), aff’d by 61 M.J. 330 (U.S. Ct. App. A.F. 2005). A federal<br />

appellate military judge determined that the government produced sufficient evidence to prove that<br />

the defendant knowingly possessed child pornography images stored in his computer’s temporary<br />

Internet files. After making a mirror image of the computer’s hard drive, investigators used a<br />

software program called "Carve This" to uncover remnants of files that were overwritten or deleted<br />

from the hard drive. The program found that the presence of the images on the hard drive was<br />

consistent with someone viewing them on the Internet <strong>and</strong> the images then being automatically<br />

saved to the hard drive by the web browser. Combining this with evidence of the defendant’s<br />

subscriptions to nude teen websites, the court determined that the evidence supported the<br />

allegation that the defendant knowingly possessed the pornographic images.<br />

United States Tax Court<br />

311


� Hambarian v. C.I.R., 118 T.C. 35 (U.S. Tax Ct. June 13, 2002). For use in connection with a<br />

criminal tax proceeding, the defendants’ attorney created searchable, electronic databases<br />

containing documents turned over by the Prosecutor during discovery. The Respondent, in the civil<br />

tax proceeding at bar, sought a motion to compel discovery of these electronic document<br />

databases from the Petitioners/defendants. The court stated that “As the Petitioner failed to make<br />

the requisite showing of how the disclosure of the documents selected would reveal the defense<br />

attorney’s mental impressions of the case, the requested documents <strong>and</strong> computerized electronic<br />

media are not protected by the work product doctrine.”<br />

Virgin Isl<strong>and</strong>s<br />

� Richards v. Legislature of the Virgin Isl<strong>and</strong>s, 2009 WL 174959 (D.Virgin Isl<strong>and</strong>s Jan. 9, 2009).<br />

In this tort <strong>and</strong> civil rights litigation, the defendants sought the return of privileged information<br />

inadvertently produced. The plaintiffs argued the attorney-client privilege was waived when the<br />

documents were produced. Agreeing with the plaintiff, the court denied the motion as the<br />

defendants did not review the documents prior to production.<br />

� Bright v. United Corp., 2008 WL 2971769 (V.I. July 22, 2008). In this slip <strong>and</strong> fall case, the<br />

plaintiff appealed the trial court’s grant of summary judgment in favor of the defendant. The trial<br />

court held that the plaintiff failed to provide any evidence that the defendant had constructive<br />

knowledge of the liquid spill which allegedly caused the plaintiff to fall. The plaintiff argued she was<br />

entitled to a spoliation inference based on the defendant store manager’s decision to preserve the<br />

digital surveillance video of the actual fall but not the footage immediately prior to or subsequent to<br />

the fall. The defendant countered that the plaintiff was not entitled to a spoliation inference because<br />

the evidentiary destruction was a matter of routine practice <strong>and</strong> was devoid of fraudulent intent.<br />

After noting the store manager’s, “conscious <strong>and</strong> intentional choice not to review or retain the<br />

recorded footage,” the court determined that the defendant “both intentionally <strong>and</strong> fraudulently<br />

destroyed relevant evidence.” The court also stated that the manager’s failure to retain the footage<br />

“shocks the conscience of the court <strong>and</strong> creates a presumption of fraud.” Accordingly, the court<br />

granted a spoliation inference against the defendant for the purpose of summary judgment, but<br />

noted that whether a jury would actually draw a spoliation inference was a matter left for trial <strong>and</strong><br />

rem<strong>and</strong>ed the case.<br />

Other Countries<br />

Engl<strong>and</strong><br />

� Digicel v. Cable & Wireless PLC, [2008] EWHC 2522 (CH) (23 October 2008). In this breach of<br />

statutory duty litigation, the Claimants (plaintiffs) applied (moved) for restoration of back-up tapes<br />

<strong>and</strong> the use of additional search terms. Previously, the law of the multiple jurisdictions in which the<br />

Claimants <strong>and</strong> Defendants conducted business changed to increase competition by statutorily<br />

requiring surrender of Defendant’s exclusive telecommunication licenses, giving rise to the<br />

Claimants allegation of deliberate delay <strong>and</strong> damages. During initial disclosures, the Defendants<br />

unilaterally declined to restore or search back-up tapes <strong>and</strong> chose 10 search terms with 6 similar<br />

stem words, for which it was criticized by the Claimants. Balancing Paragraph 2A of Part 31<br />

Practice Decision calling for early discussion of issues with Rule 31.7 requiring a “reasonable<br />

312


search,” the court ordered the Defendant to restore backup tapes of relevant employees’ e-mail<br />

<strong>and</strong> employ a select few additional search terms that were requested by the Claimant. The court<br />

noted that, “the rules do not require that no stone should be left unturned,” but was unwilling to<br />

allow one party to unilaterally decide which searches should be conducted.<br />

This document is neither designed nor intended to provide legal or other professional<br />

advice but is intended merely to be a starting point for research <strong>and</strong> information on the<br />

subject of electronic evidence. While every attempt has been made to ensure accuracy of<br />

this information, no responsibility can be accepted for errors or omissions. Recipients of<br />

information or services provided by <strong>Kroll</strong> <strong>Ontrack</strong> shall maintain full, professional, <strong>and</strong><br />

direct responsibility to their clients for any information or services rendered by <strong>Kroll</strong><br />

<strong>Ontrack</strong>.<br />

For more information on electronic discovery, paper discovery <strong>and</strong> computer<br />

forensics, contact<br />

<strong>Kroll</strong> <strong>Ontrack</strong>, Inc.<br />

1-800-347-6105<br />

313

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!