17.01.2013 Views

Electronic Discovery and Computer Forensics Case List - Kroll Ontrack

Electronic Discovery and Computer Forensics Case List - Kroll Ontrack

Electronic Discovery and Computer Forensics Case List - Kroll Ontrack

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

the defendants continued to destroy documents for several months, including relevant e-mails from<br />

at least eleven company supervisors <strong>and</strong> officers. In addition, the defendants failed to notify the<br />

court about the situation until four months after they found out about it. Finding that a significant<br />

number of e-mails had been permanently destroyed, the court declared that “it is astounding that<br />

employees at the highest corporate level in Philip Morris, with significant responsibilities pertaining<br />

to issues in this lawsuit, failed to follow [the] Order…which, if followed, would have ensured the<br />

preservation of those e-mails which have been irretrievably lost.” Granting the government’s motion<br />

for sanctions, the court stated that it will preclude the defendants from calling a key employee, who<br />

failed to follow the retention policy, as a fact or expert witness at trial. The court also ordered the<br />

defendants to pay costs relating to the spoliation as well as $2,750,000 in monetary sanctions. See<br />

also United States v. Philip Morris USA Inc., 223 F.R.D. 1 (D.D.C. 2004).<br />

� Arista Records, Inc. v. Sakfield Holding Co. S.L., 314 F.Supp.2d 27 (D.D.C. 2004). In a<br />

copyright infringement suit, the court issued an order compelling the defendant to produce<br />

computer servers, which hosted the defendant’s web site <strong>and</strong> contained records of its users. When<br />

the plaintiffs’ computer expert inspected the servers, he discovered that the vast majority of that<br />

information had been intentionally destroyed after the defendant learned that litigation was<br />

imminent. The expert found that the defendant ran a program, designed to erase electronically<br />

stored information, more than 50 times from a remote location in an attempt to delete all electronic<br />

data from the servers. In spite of the defendant’s attempts, the expert recovered a small amount of<br />

data to support the plaintiffs’ claims. Although the defendant attempted to attack the plaintiffs’<br />

methodologies for extrapolating the number of users <strong>and</strong> downloads, the court indicated that the<br />

defendant was “in a poor position to attack plaintiffs’ evidence,” noting that “[d]estruction of<br />

evidence raises the presumption that disclosure of the materials would be damaging.” The court<br />

decided not to issue sanctions but instead encouraged the plaintiffs to move for appropriate<br />

sanctions as the case progressed.<br />

� In re Lorazepam <strong>and</strong> Clorazepate Antitrust Litig. v. Mylan Lab., Inc., 300 F. Supp. 2d 43<br />

(D.D.C. 2004). In a class action antitrust lawsuit, the plaintiff sought to compel discovery of<br />

electronic documents. The defendant objected to the request arguing that the documents had<br />

already been produced. The plaintiff responded, claiming that the unindexed document “dump”<br />

produced on CD-ROM did not meet the defendant’s obligation to match documents with discovery<br />

requests as closely as possible. The court required the plaintiff to take the CD-ROM’s to a<br />

computer forensic or electronic discovery expert before the court would require the defendant to<br />

index the information. The e-evidence expert was to ascertain whether the electronic information<br />

could be read <strong>and</strong> searched by commercially available software or converted to a format in which it<br />

could be done.<br />

� Bethea v. Comcast, 218 F.R.D. 328 (D.D.C. 2003). Former employee sought to compel the<br />

defendant to allow her to inspect their computer systems to determine whether the defendant<br />

possessed any additional documents that had not yet been produced in discovery. The defendant<br />

argued that the plaintiff should not be allowed to inspect its computers because the defendant had<br />

already produced all unprivileged documents in response to the plaintiff’s discovery requests.<br />

Additionally, the defendant claimed that the plaintiff did not show that relevant material existed on<br />

the computer systems or that the defendant was unlawfully withholding documents. Ruling in favor<br />

of the defendant, the court noted that the plaintiff did not show that the documents she sought<br />

actually existed or that the defendant unlawfully failed to produce them. The court further declared<br />

that mere suspicion that another party failed to respond to document requests was not enough to<br />

justify court-ordered inspection of the defendant’s computer systems.<br />

15

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!