17.01.2013 Views

Electronic Discovery and Computer Forensics Case List - Kroll Ontrack

Electronic Discovery and Computer Forensics Case List - Kroll Ontrack

Electronic Discovery and Computer Forensics Case List - Kroll Ontrack

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

that were temporarily stored in the cache files but not downloaded onto the defendant’s hard<br />

drives, entitled it to a spoliation inference at trial. The court rejected the plaintiff’s argument <strong>and</strong><br />

accepted the defendant’s summary judgment motion on the issue, holding it impractical for the<br />

defendant to have had the duty to preserve such evidence.<br />

� Cenveo Corp. v. Slater, 2007 WL 442387 (E.D. Pa. Jan. 31, 2007). In a trade secrets<br />

misappropriation case, the parties presented two differing approaches for how electronic data<br />

contained on hard drives in the defendant’s possession would be produced to the plaintiff. The<br />

plaintiff requested that the hard drives be completely imaged <strong>and</strong> given to a third-party expert to<br />

search for relevant information. Under the plaintiff’s approach, the expert would sign a<br />

confidentiality agreement to protect privileged information. The defendant argued, however, that<br />

the parties agree upon search terms <strong>and</strong> the defendant will provide the search results from the<br />

images of the hard drives. Agreeing with the plaintiff’s method, the court ordered a third-party<br />

computer forensics expert to image <strong>and</strong> examine the hard drives. The expert will be chosen by the<br />

plaintiff <strong>and</strong> the actual imaging will take place on the defendant’s premises under the supervision of<br />

an expert chosen by the defendant. Furthermore, the court ordered the expert to provide the<br />

defendant with a report of the documents recovered. The defendant must review the documents for<br />

privileged material <strong>and</strong> thereafter produce relevant documents to the plaintiff.<br />

� In Re the Twenty-Fourth Statewide Investigating Gr<strong>and</strong> Jury, 907 A.2d 505 (Pa. 2006). During<br />

a gr<strong>and</strong> jury investigation, the court reviewed objections to the gr<strong>and</strong> jury’s subpoena requiring a<br />

newspaper publisher to produce four computer workstations <strong>and</strong> two hard drives. The newspaper<br />

eventually produced the four computer workstations pursuant to the subpoena but refused to<br />

produce the two hard drives. The lower court held the newspaper in contempt <strong>and</strong> imposed a<br />

$1,000 per day sanction for failure to comply with the subpoena. The newspaper filed an<br />

emergency application for review of the gr<strong>and</strong> jury’s subpoena with the state supreme court. The<br />

newspaper argued the subpoena’s requirement for the hard drives was overly broad. It further<br />

argued that production of hard drives is much like producing an entire file cabinet filled with files.<br />

Furthermore, the newspaper stated such production would produce a “chilling effect” on many of<br />

the newspaper’s confidential sources for news stories since their identities may be revealed during<br />

the investigation. The state countered by asserting the only information desired was the internet<br />

browsing history of several employees <strong>and</strong> assuring any confidential information would be<br />

safeguarded from disclosure. In vacating the lower court’s sanctions for failure to comply, the state<br />

supreme court held that the state’s “particular method of disclosure is unduly intrusive in the<br />

circumstances presented.” The court agreed with the newspaper’s argument <strong>and</strong> further held that<br />

entire “filing cabinets” cannot be extracted <strong>and</strong> held by the government under the guise of a gr<strong>and</strong><br />

jury subpoena when the result could be the disclosure of confidential information vital to the<br />

newspaper’s business.<br />

� Paramount Pictures Corp. v. Davis, 234 F.R.D. 102 (E.D. Pa. 2005). Alleging the defendant<br />

infringed upon its motion picture copyright, the plaintiff sought a permanent injunction, attorneys’<br />

fees <strong>and</strong> costs, <strong>and</strong> money damages. After uncovering the defendant’s alleged activities by tracing<br />

his Internet protocol address, the plaintiff was granted access to the defendant’s computer <strong>and</strong><br />

hired a <strong>Kroll</strong> <strong>Ontrack</strong> computer forensic expert to conduct an examination. The expert determined<br />

that, after wiping all data off of his hard drive, the defendant reinstalled the operating system just<br />

16 days after the defendant received notice of the lawsuit. As a result, it was impossible to<br />

determine whether the motion picture or related software was on the computer prior to the<br />

investigation. In defending his actions, the defendant claimed he wiped the drive in preparation for<br />

selling it to another individual. The court declared: “This argument does not obviate his duty to<br />

102

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!