17.01.2013 Views

Electronic Discovery and Computer Forensics Case List - Kroll Ontrack

Electronic Discovery and Computer Forensics Case List - Kroll Ontrack

Electronic Discovery and Computer Forensics Case List - Kroll Ontrack

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

interceptions must occur contemporaneously with transmission. The court further held that the emails<br />

did not fall within that requirement because they “were stored on, <strong>and</strong> recovered from, the<br />

hard drive of the family computer” rather than intercepted at the time of transmission.<br />

� Commissioner v. Ward, 580 S.E.2d 432 (N.C. App. 2003). In this matter, the plaintiffs <strong>and</strong> the<br />

defendants engaged in a long <strong>and</strong> complex discovery battle relating to the protocols for discovery<br />

of both paper <strong>and</strong> electronic documents stored off-site by the defendants. Upon the plaintiffs’ first<br />

motion to compel, the court ordered the defendants to permit the plaintiffs to examine, review <strong>and</strong><br />

copy stored documents <strong>and</strong> make a good faith search for other documents, including all electronic<br />

data on DAT tapes, for inspection <strong>and</strong> review by the plaintiffs. When the defendants failed to<br />

cooperate, the plaintiffs sought a second motion to compel. Prior to the hearing on this second<br />

motion, the parties entered into a consent order which included provisions allowing the plaintiffs to<br />

examine, inspect <strong>and</strong> copy “all information stored in computers, computer hard drives, removable<br />

electronic data storage media, diskettes, magnetic tapes, CD ROMs, zip discs <strong>and</strong> jazz discs” <strong>and</strong><br />

requiring the defendants to produce all backup data <strong>and</strong> describe in writing the process used to<br />

access the data. Again the defendants failed to comply with the consent order in providing the<br />

required electronic information. The plaintiffs then made its third motion to compel <strong>and</strong> sought<br />

sanctions. Finding that the defendants had intentionally <strong>and</strong> willfully refused to comply with<br />

discovery, the trial court sanctioned the defendants by ordering them to produce, at their cost,<br />

copies of the backup tape data. The appellate court affirmed the sanctions.<br />

� DeLoach v. Philip Morris Co., 206 F.R.D. 568 (M.D.N.C. 2002). The plaintiffs sought discovery<br />

sanctions alleging that the defendant’s expert report relied on computerized transaction data that<br />

was deliberately withheld from the plaintiffs during discovery. The discovery request at issue<br />

sought "[a]ll summary documents (including electronic data) relating to your leaf tobacco bids,<br />

purchases, or price paid, including but not limited to the entire Tobinet database in electronic form,<br />

but excluding individual transaction documents such as purchase orders <strong>and</strong> invoices." The<br />

plaintiffs were only provided the database data after the defendant’s expert report was issued (in<br />

which the defendant’s expert relied heavily on this other computerized data). The court held that<br />

the withholding of the data resulted in unfairness to the plaintiffs <strong>and</strong> allowed the plaintiffs to<br />

respond to the report <strong>and</strong> provided no opportunity for the defendant to reply.<br />

� Burroughs v. Barr Lab., Inc., 143 F.R.D. 611 (E.D.N.C. 1992), vacated in part on other grounds<br />

40 F.3d 1223 (Fed. Cir. 1994). The court held that the attorney work product privilege applied to<br />

printed results of computerized database searches.<br />

South Carolina<br />

� Uhlig LLC v. Shirley, 2011 WL 2728445 (D.S.C. July 13, 2011). In this discovery dispute, the<br />

plaintiff moved to impose sanctions <strong>and</strong> modify the forensic examination protocol for the<br />

defendants’ computers <strong>and</strong> peripheral devices. The parties had agreed to the protocol following<br />

numerous interventions by a magistrate judge; however, disputes continued to arise after forensic<br />

experts conducted searches <strong>and</strong> the plaintiffs sought to broaden the scope of discovery. Finding<br />

the plaintiff presented sufficient evidence that the broader scope of e-discovery was warranted, the<br />

court lifted the protocol’s date restrictions <strong>and</strong> agreed that running hash value comparisons<br />

eliminated any need to limit search terms. Finally, the court declined to impose sanctions against<br />

the defendants, who were simply opposing the plaintiffs’ efforts to modify <strong>and</strong> extend a previously<br />

agreed upon discovery protocol.<br />

110

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!