17.01.2013 Views

Electronic Discovery and Computer Forensics Case List - Kroll Ontrack

Electronic Discovery and Computer Forensics Case List - Kroll Ontrack

Electronic Discovery and Computer Forensics Case List - Kroll Ontrack

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

database contained proprietary information, the magistrate required the plaintiff to designate any<br />

extracted data as “Outside Counsel Only” information.<br />

� Williams v. Du Pont, 119 F.R.D. 648 (W.D. Ky. 1987). The discovering party must bear costs of<br />

data production <strong>and</strong> reimburse responding party for a portion of its expense in assembling the<br />

database.<br />

Michigan<br />

� Tompkins v. Detroit Metropolitan Airport, 278 F.R.D. 387 (E.D. Mich. Jan. 2012). In this slip <strong>and</strong><br />

fall case, the defendants sought a court order granting it access to the plaintiff’s entire Facebook<br />

account. Citing McMillen v. Hummingbird Speedway, Inc. <strong>and</strong> Romano v. Steelcase, Inc., the<br />

defendants asserted that nonpublic Facebook postings are generally not protected by any privacy<br />

privilege. Next, the defendants attempted to show that the private portions sought were reasonably<br />

calculated to lead to admissible evidence. The defendants argued that publicly available photos of<br />

the plaintiff st<strong>and</strong>ing at a birthday party in Florida—while holding a small dog—were inconsistent<br />

with her claims of inability to work <strong>and</strong> enjoy life. While the court agreed with defendants that there<br />

is no such thing as a social media privilege, it noted that the defendant “does not have a<br />

generalized right to rummage at will through information that Plaintiff has limited from public view.”<br />

Distinguishing McMillen <strong>and</strong> Romano, the court ruled that the defendant’s preliminary showing was<br />

not enough to show any inconsistency with the plaintiff’s damage claims.<br />

� Nissan N. Am., Inc. v. Johnson Elec. N. Am., Inc., 2011 WL 1002835 (E.D. Mich. Feb. 17,<br />

2011). In this discovery dispute, the plaintiff moved for a protective order in response to the<br />

defendant’s informal request for additional information. Having produced more than 1.79 million<br />

pages of documents during discovery, along with 84,000 pages of documents from its non-party<br />

Japanese parent company, the plaintiff argued the order was necessary to prevent producing its<br />

record retention policies <strong>and</strong> data map, <strong>and</strong> conducting broad system-wide searches along with<br />

searches of systems not readily accessible. Although the court agreed the backup systems were<br />

not readily accessible, it found that the defendant had not requested this information or the systemwide<br />

searches. Instead, the defendant requested the plaintiff’s backup policies, tracking records,<br />

requests for restores <strong>and</strong> confirmation that relevant data sources of 41 employees had been<br />

searched. Regarding the data map, the court noted that counsel must be knowledgeable about<br />

their client’s computer systems <strong>and</strong> ESI at the onset of litigation pursuant to Fed.R.Civ.P.<br />

26(a)(1)(ii); thus, producing this information should not be an undue burden. Accordingly, the court<br />

denied the protective order.<br />

� Whited v. Motorists Mut. Ins. Co., 2010 WL 3862717 (E.D. Mich. Sept. 28, 2010). In this litigation<br />

involving claims for insurance benefits, the defendants moved for dismissal of the plaintiff’s claims<br />

<strong>and</strong> for summary judgment on multiple counterclaims alleging, inter alia, fraud <strong>and</strong> unjust<br />

enrichment. During the “acrimonious” discovery process, substantial allegations that some<br />

documents were falsified led the court to order the plaintiff to surrender all computers for forensic<br />

examination. Although the court warned the plaintiff that her conduct was perilously close to<br />

willfulness <strong>and</strong> bad faith <strong>and</strong> forbade anyone from using the computers, the forensic examination<br />

revealed evidence of extensive tampering including the replacement of a hard drive, deletion of<br />

1,300 files <strong>and</strong> backdating of dozens of documents. Upon review of this evidence, the court found<br />

the plaintiff’s inherently suspect explanations strained credulity <strong>and</strong> undermined her claims of good<br />

faith. Noting that the intentional deletion of files alone was sufficient to support a finding of<br />

149

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!