17.01.2013 Views

Electronic Discovery and Computer Forensics Case List - Kroll Ontrack

Electronic Discovery and Computer Forensics Case List - Kroll Ontrack

Electronic Discovery and Computer Forensics Case List - Kroll Ontrack

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

he allegedly sent to the victim. The appellate court held that the victim’s testimony that she had<br />

received <strong>and</strong> printed the e-mails on her computer was sufficient authentication under the rules of<br />

evidence, <strong>and</strong> the court upheld the conviction.<br />

� Harveston v. State, 798 So.2d 638 (Miss. Ct. App. 2001). In a criminal burglary prosecution, the<br />

court refused to allow in computer database print-outs under the State’s business records<br />

exception to the hearsay rule. The court held that the State failed to meet its burden because<br />

“[T]here was no evidence offered as to the means by which the information…was compiled. The<br />

only testimony came from an investigating officer who limited his testimony to the fact that law<br />

enforcement officers routinely make use of such information. [However, t]he reliability of the<br />

information in ‘business records’ is determined by the competence of the compiler of the<br />

information <strong>and</strong> not the extent of the consumer’s reliance on information received from another<br />

source.”<br />

Texas<br />

� Tienda v. State, 358 S.W.3d 633 (Tex. Crim. App. Feb 8, 2012). In this appeal of a murder<br />

conviction, the defendant alleged that various postings from two MySpace accounts registered<br />

under the defendant’s e-mail address were inadmissible because the State could not establish that<br />

he was the author. Extending the basic rationale used to authenticate e-mails, chat room<br />

dialogues <strong>and</strong> text messages, the court looked at whether the MySpace postings were sufficiently<br />

linked “such that a reasonable juror could have found that they were created <strong>and</strong> maintained” by<br />

the defendant. The State pointed to the substance of the postings—which made reference to the<br />

deceased, the defendant’s gang, the shooting, the State’s key witness <strong>and</strong> further contained<br />

numerous photos of the defendant’s unique tattoos—in an attempt to meet this threshold. Affirming<br />

the lower court’s decision, the court found that this circumstantial evidence, taken as a whole,<br />

sufficiently established that the MySpace pages were created <strong>and</strong> maintained by the defendant.<br />

� Gaalla v. Citizens Medical Ctr., 2011 WL 2115670 (S.D. Tex. May 27, 2011). In this discovery<br />

dispute, the plaintiffs sought sanctions, alleging the defendants failed to preserve backup tapes,<br />

take timely snapshots of relevant e-mail accounts <strong>and</strong> deleted e-mails. Citing Zubulake, the court<br />

noted that the duty to preserve generally does not extend to inaccessible backup tapes <strong>and</strong><br />

declined to impose sanctions finding the plaintiffs failed to demonstrate any applicable exception to<br />

this general rule. Further, the plaintiffs failed to present evidence of bad faith, a prerequisite to<br />

severe sanctions in the Fifth Circuit. On the contrary, the court determined the defendants took<br />

reasonable preservation steps by issuing a timely litigation hold, taking multiple "snapshots" of<br />

relevant e-mail accounts <strong>and</strong> preserving available backup tapes. The court ordered the defendants<br />

to institute a "journaling process" to continue preserving all relevant e-mail accounts indefinitely in<br />

addition to the available backup tapes, which the plaintiffs’ forensic expert was given access to<br />

search. Finally, the court ordered the parties to reach a preservation agreement going forward.<br />

� In re Royce Homes, LP, 2011 WL 873428 (Bkrtcy. S.D. Tex. Mar. 11, 2011). In this bankruptcy<br />

litigation, the trustee sought production of documents that a key employee of the debtor company<br />

claimed as privileged. Despite using his work computer <strong>and</strong> company e-mail account for personal<br />

matters, the employee argued that he did not waive attorney-client privilege <strong>and</strong> maintained that<br />

only necessary third parties were privy to his communications. Rejecting this argument, the court<br />

focused on the debtor company’s <strong>Electronic</strong> Communications Policy. The policy stated that nothing<br />

contained on any company electronic system would be considered private <strong>and</strong> permitted limited<br />

personal communications "with the underst<strong>and</strong>ing that personal communications may be<br />

135

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!