Electronic Discovery and Computer Forensics Case List - Kroll Ontrack
Electronic Discovery and Computer Forensics Case List - Kroll Ontrack
Electronic Discovery and Computer Forensics Case List - Kroll Ontrack
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
the defendants continued to destroy documents for several months, including relevant e-mails from<br />
at least eleven company supervisors <strong>and</strong> officers. In addition, the defendants failed to notify the<br />
court about the situation until four months after they found out about it. Finding that a significant<br />
number of e-mails had been permanently destroyed, the court declared that “it is astounding that<br />
employees at the highest corporate level in Philip Morris, with significant responsibilities pertaining<br />
to issues in this lawsuit, failed to follow [the] Order…which, if followed, would have ensured the<br />
preservation of those e-mails which have been irretrievably lost.” Granting the government’s motion<br />
for sanctions, the court stated that it will preclude the defendants from calling a key employee, who<br />
failed to follow the retention policy, as a fact or expert witness at trial. The court also ordered the<br />
defendants to pay costs relating to the spoliation as well as $2,750,000 in monetary sanctions. See<br />
also United States v. Philip Morris USA Inc., 223 F.R.D. 1 (D.D.C. 2004).<br />
� Arista Records, Inc. v. Sakfield Holding Co. S.L., 314 F.Supp.2d 27 (D.D.C. 2004). In a<br />
copyright infringement suit, the court issued an order compelling the defendant to produce<br />
computer servers, which hosted the defendant’s web site <strong>and</strong> contained records of its users. When<br />
the plaintiffs’ computer expert inspected the servers, he discovered that the vast majority of that<br />
information had been intentionally destroyed after the defendant learned that litigation was<br />
imminent. The expert found that the defendant ran a program, designed to erase electronically<br />
stored information, more than 50 times from a remote location in an attempt to delete all electronic<br />
data from the servers. In spite of the defendant’s attempts, the expert recovered a small amount of<br />
data to support the plaintiffs’ claims. Although the defendant attempted to attack the plaintiffs’<br />
methodologies for extrapolating the number of users <strong>and</strong> downloads, the court indicated that the<br />
defendant was “in a poor position to attack plaintiffs’ evidence,” noting that “[d]estruction of<br />
evidence raises the presumption that disclosure of the materials would be damaging.” The court<br />
decided not to issue sanctions but instead encouraged the plaintiffs to move for appropriate<br />
sanctions as the case progressed.<br />
� In re Lorazepam <strong>and</strong> Clorazepate Antitrust Litig. v. Mylan Lab., Inc., 300 F. Supp. 2d 43<br />
(D.D.C. 2004). In a class action antitrust lawsuit, the plaintiff sought to compel discovery of<br />
electronic documents. The defendant objected to the request arguing that the documents had<br />
already been produced. The plaintiff responded, claiming that the unindexed document “dump”<br />
produced on CD-ROM did not meet the defendant’s obligation to match documents with discovery<br />
requests as closely as possible. The court required the plaintiff to take the CD-ROM’s to a<br />
computer forensic or electronic discovery expert before the court would require the defendant to<br />
index the information. The e-evidence expert was to ascertain whether the electronic information<br />
could be read <strong>and</strong> searched by commercially available software or converted to a format in which it<br />
could be done.<br />
� Bethea v. Comcast, 218 F.R.D. 328 (D.D.C. 2003). Former employee sought to compel the<br />
defendant to allow her to inspect their computer systems to determine whether the defendant<br />
possessed any additional documents that had not yet been produced in discovery. The defendant<br />
argued that the plaintiff should not be allowed to inspect its computers because the defendant had<br />
already produced all unprivileged documents in response to the plaintiff’s discovery requests.<br />
Additionally, the defendant claimed that the plaintiff did not show that relevant material existed on<br />
the computer systems or that the defendant was unlawfully withholding documents. Ruling in favor<br />
of the defendant, the court noted that the plaintiff did not show that the documents she sought<br />
actually existed or that the defendant unlawfully failed to produce them. The court further declared<br />
that mere suspicion that another party failed to respond to document requests was not enough to<br />
justify court-ordered inspection of the defendant’s computer systems.<br />
15