17.01.2013 Views

Electronic Discovery and Computer Forensics Case List - Kroll Ontrack

Electronic Discovery and Computer Forensics Case List - Kroll Ontrack

Electronic Discovery and Computer Forensics Case List - Kroll Ontrack

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

eversed <strong>and</strong> rem<strong>and</strong>ed, stating the jury’s decision was “clearly wrong <strong>and</strong> unjust” <strong>and</strong> contradicted<br />

the great weight of the evidence.<br />

� BASF Fina Petrochemicals Ltd. Partnership v. H.B. Zachry Co., 168 S.W.3d 867 (Tex. Ct. App.<br />

2004). In a breach of contract action, the defendants subpoenaed electronic data from a non-party.<br />

The non-party responded by producing 30,000 e-mails <strong>and</strong> attachments, 70 megabytes of e-mail<br />

data, 8,000 spreadsheets, <strong>and</strong> hard copy documents. The non-party requested legal fees <strong>and</strong><br />

costs from the defendants for collecting, reviewing <strong>and</strong> producing this data based on a state statute<br />

requiring a party to reimburse a non-party for reasonable production costs. The non-party argued<br />

the costs <strong>and</strong> attorneys’ fees were an “undue burden or expense” they suffered as a result of<br />

responding to the defendants’ subpoena. The trial court awarded the non-party production costs<br />

but denied attorneys’ fees, on the grounds that the statute excluded attorney fee awards. On<br />

appeal, the appellate court affirmed <strong>and</strong> held the statute did not include attorney’s fees as part of<br />

production costs <strong>and</strong> the attorneys’ fees were not an “undue burden or expense,” absent a showing<br />

that the requesting party did not take “reasonable steps” to limit the scope of discovery.<br />

� Propath Services, LLP v. Ameripath, Inc., 2004 WL 2389214 (N.D.Tex. Oct. 21, 2004). Alleging<br />

the defendants violated a non-compete employment contract, the plaintiffs sought a preliminary<br />

injunction against the defendants. The court had previously issued a temporary restraining order<br />

prohibiting the defendants from using confidential information, deleting relevant e-mails or<br />

documents, <strong>and</strong> accessing the plaintiffs’ e-mail system. Among the items at issue were electronic<br />

marketing materials <strong>and</strong> a confidential client list. The defendant argued that the marketing<br />

materials – including PowerPoint slides – were not confidential since they were presented in public<br />

settings. While the court concluded that the PowerPoint presentations were not confidential, it<br />

nonetheless prohibited the defendants from having unrestricted access based on the plaintiffs’ right<br />

to protect their proprietary data. The court ordered the defendants to refrain from using any<br />

PowerPoint slides produced or modified during the defendants’ employment. Regarding the<br />

confidential client list, the court found that one of the defendants accessed the client list while<br />

simultaneously burning CDs <strong>and</strong> sending e-mails that may have contained confidential information.<br />

Based on these findings, the court ordered the defendants to refrain from deleting or modifying any<br />

documents, e-mails or computer drives that contained information about the plaintiff’s business.<br />

The court further ordered the defendants to separate these materials from the rest of their files <strong>and</strong><br />

to store them in a confidential file.<br />

� Positive Software Solutions, Inc. v. New Century Mortgage Corp., 337 F.Supp.2d 862<br />

(N.D.Tex. 2004). In a copyright infringement suit, the plaintiff filed a contempt motion against the<br />

defendants for violating a preliminary injunction <strong>and</strong> protective order. In response, the defendants<br />

also moved for a contempt motion <strong>and</strong> sought to affirm an arbitration award in their favor. In<br />

reference to the protective order, the defendants represented they would cease using <strong>and</strong> destroy<br />

all copies of the plaintiff’s proprietary software. Defense counsel asserted that it would keep<br />

backup tapes <strong>and</strong> forensic copies of the software in a temperature-controlled, secure facility.<br />

Despite the order, however, the defendants continued to use the software <strong>and</strong> inadvertently<br />

produced a document to the plaintiff detailing their analysis of the database schema of the<br />

software. The defendants also restored seven or eight backup forensic copies of the software to<br />

use during its unauthorized analysis. The court noted that the protective order did not specifically<br />

address the defendants’ conduct because the defendants had represented such prohibition would<br />

be unnecessary. The court stated that the defendant “thus created a loophole, <strong>and</strong> then covertly<br />

took advantage of it.” The court held “with considerable reluctance” that the protective order was<br />

144

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!