Electronic Discovery and Computer Forensics Case List - Kroll Ontrack
Electronic Discovery and Computer Forensics Case List - Kroll Ontrack
Electronic Discovery and Computer Forensics Case List - Kroll Ontrack
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
he allegedly sent to the victim. The appellate court held that the victim’s testimony that she had<br />
received <strong>and</strong> printed the e-mails on her computer was sufficient authentication under the rules of<br />
evidence, <strong>and</strong> the court upheld the conviction.<br />
� Harveston v. State, 798 So.2d 638 (Miss. Ct. App. 2001). In a criminal burglary prosecution, the<br />
court refused to allow in computer database print-outs under the State’s business records<br />
exception to the hearsay rule. The court held that the State failed to meet its burden because<br />
“[T]here was no evidence offered as to the means by which the information…was compiled. The<br />
only testimony came from an investigating officer who limited his testimony to the fact that law<br />
enforcement officers routinely make use of such information. [However, t]he reliability of the<br />
information in ‘business records’ is determined by the competence of the compiler of the<br />
information <strong>and</strong> not the extent of the consumer’s reliance on information received from another<br />
source.”<br />
Texas<br />
� Tienda v. State, 358 S.W.3d 633 (Tex. Crim. App. Feb 8, 2012). In this appeal of a murder<br />
conviction, the defendant alleged that various postings from two MySpace accounts registered<br />
under the defendant’s e-mail address were inadmissible because the State could not establish that<br />
he was the author. Extending the basic rationale used to authenticate e-mails, chat room<br />
dialogues <strong>and</strong> text messages, the court looked at whether the MySpace postings were sufficiently<br />
linked “such that a reasonable juror could have found that they were created <strong>and</strong> maintained” by<br />
the defendant. The State pointed to the substance of the postings—which made reference to the<br />
deceased, the defendant’s gang, the shooting, the State’s key witness <strong>and</strong> further contained<br />
numerous photos of the defendant’s unique tattoos—in an attempt to meet this threshold. Affirming<br />
the lower court’s decision, the court found that this circumstantial evidence, taken as a whole,<br />
sufficiently established that the MySpace pages were created <strong>and</strong> maintained by the defendant.<br />
� Gaalla v. Citizens Medical Ctr., 2011 WL 2115670 (S.D. Tex. May 27, 2011). In this discovery<br />
dispute, the plaintiffs sought sanctions, alleging the defendants failed to preserve backup tapes,<br />
take timely snapshots of relevant e-mail accounts <strong>and</strong> deleted e-mails. Citing Zubulake, the court<br />
noted that the duty to preserve generally does not extend to inaccessible backup tapes <strong>and</strong><br />
declined to impose sanctions finding the plaintiffs failed to demonstrate any applicable exception to<br />
this general rule. Further, the plaintiffs failed to present evidence of bad faith, a prerequisite to<br />
severe sanctions in the Fifth Circuit. On the contrary, the court determined the defendants took<br />
reasonable preservation steps by issuing a timely litigation hold, taking multiple "snapshots" of<br />
relevant e-mail accounts <strong>and</strong> preserving available backup tapes. The court ordered the defendants<br />
to institute a "journaling process" to continue preserving all relevant e-mail accounts indefinitely in<br />
addition to the available backup tapes, which the plaintiffs’ forensic expert was given access to<br />
search. Finally, the court ordered the parties to reach a preservation agreement going forward.<br />
� In re Royce Homes, LP, 2011 WL 873428 (Bkrtcy. S.D. Tex. Mar. 11, 2011). In this bankruptcy<br />
litigation, the trustee sought production of documents that a key employee of the debtor company<br />
claimed as privileged. Despite using his work computer <strong>and</strong> company e-mail account for personal<br />
matters, the employee argued that he did not waive attorney-client privilege <strong>and</strong> maintained that<br />
only necessary third parties were privy to his communications. Rejecting this argument, the court<br />
focused on the debtor company’s <strong>Electronic</strong> Communications Policy. The policy stated that nothing<br />
contained on any company electronic system would be considered private <strong>and</strong> permitted limited<br />
personal communications "with the underst<strong>and</strong>ing that personal communications may be<br />
135