17.01.2013 Views

Electronic Discovery and Computer Forensics Case List - Kroll Ontrack

Electronic Discovery and Computer Forensics Case List - Kroll Ontrack

Electronic Discovery and Computer Forensics Case List - Kroll Ontrack

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

defendant plainly manifested an expectation that his e-mails would remain private given the<br />

sensitive <strong>and</strong> “sometimes damning substance” of the e-mails, viewing it as highly unlikely the<br />

defendant expected the e-mails to be made public as people “seldom unfurl their dirty laundry in<br />

plain view.” Next, the court determined that it would defy common sense to treat e-mails differently<br />

than more traditional forms of communication <strong>and</strong> found that neither the possibility nor the right of<br />

access by the Internet Service Provider (ISP) is decisive to the issue of privacy expectations.<br />

Based on these conclusions, the court held the government may not compel an ISP to turn over emails<br />

without obtaining a warrant first. However, the court ultimately found the government relied in<br />

good faith on the Stored Communications Act in obtaining the e-mails <strong>and</strong> determined the<br />

exclusionary rule does not apply. Turning to the “prodigious” volume of discovery that consisted of<br />

millions of pages, the court disagreed with the defendants’ arguments, noting in particular that<br />

Fed.R.Crim.P. 16 is silent on what form discovery must take.<br />

� State v. Rivera, 2010 WL 339811 (Ohio App. 12 Dist. Feb. 1, 2010). In this action involving the<br />

Stored Communications Act (SCA), the defendant appealed his conviction, arguing text <strong>and</strong> picture<br />

messages obtained from his cell phone provider should have been suppressed. The defendant<br />

also argued the trial court erred in not denying the SCA as unconstitutional. Denying the<br />

defendant’s argument regarding the constitutionality of the SCA, the court found the detective<br />

violated the SCA by not providing notice to the defendant as required. However, the SCA does not<br />

include exclusion as a remedy, <strong>and</strong> thus the exclusionary rule was inapplicable. Addressing the<br />

suppression argument, the court deferred to the trial court’s determination of probable cause <strong>and</strong><br />

found that based on the facts <strong>and</strong> circumstances, there was a substantial probability that evidence<br />

of criminal activity would have been found through other locations <strong>and</strong> media. Thus, the court<br />

denied the defendant’s appeal <strong>and</strong> affirmed the trial court’s ruling.<br />

� Enquip Tech. Group, Inc. v. Tycon Technoglass, S.R.L., 2010 WL 53151 (Ohio App. 2 Dist.<br />

Jan. 8, 2010). In this complex international business litigation, the defendants appealed an order of<br />

the trial court that held the European Union Data Protection Directive 95/46/EC (“Directive”) did not<br />

limit discovery. The defendants argued that the trial court’s ruling was a clear error, <strong>and</strong> that the<br />

exception provided in Article 26(1)(d), which permits the transfer of data when necessary to<br />

establish, exercise or defend legal claims, was inapplicable. In response, the plaintiffs claimed that<br />

the defendants failed to meet the burden required to obtain a protective order because no effort<br />

was made to demonstrate the relevance of the Directive to any of the plaintiffs’ specific discovery<br />

requests. Agreeing with the plaintiffs, the appellate court affirmed the trial court’s ruling. In support<br />

of its opinion, the appellate court cited the trial court’s reasoning that the defendants subjected<br />

themselves to Ohio law by doing business there <strong>and</strong> that no reason existed to preclude response<br />

to discovery requests under the Ohio Rules of Civil Procedure.<br />

� Cornwell v. N. Ohio Surgical Ctr., Ltd., 2009 WL 5174172 (Ohio App. 6 Dist. Dec. 31, 2009). In<br />

this wrongful death litigation, the defendants appealed the trial court’s ruling allowing the plaintiff’s<br />

forensic expert to create a mirror image of the defendants’ hard drives. The defendants asserted<br />

such intrusive access was not authorized under Fed.R.Civ.P. 34 <strong>and</strong> would violate prohibitions<br />

against the disclosure of confidential medical information. In affirming the trial court’s order, the<br />

appellate court dismissed the confidentiality argument, relying on testimony of the plaintiff’s expert<br />

explaining that viewing confidential information was not necessary to the forensic imaging process.<br />

The court also discarded the defendants’ Rule 34 argument, noting that the circumstances<br />

surrounding the case gave rise to an inference of improper conduct on part of the defendants. In<br />

further support of the trial court’s decision, the court noted the direct relationship between the<br />

159

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!