17.01.2013 Views

Electronic Discovery and Computer Forensics Case List - Kroll Ontrack

Electronic Discovery and Computer Forensics Case List - Kroll Ontrack

Electronic Discovery and Computer Forensics Case List - Kroll Ontrack

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

devices that contain relevant electronically stored information. The court held the imaging of the<br />

media primarily for the purpose of preservation was an abuse of discretion, citing the fact that the<br />

record “lacks any evidence that defendants have intentionally destroyed relevant ESI” <strong>and</strong> noting<br />

the significant privacy <strong>and</strong> confidentiality concerns raised by the order.<br />

� John B. v. Goetz, 2007 WL 3012808 (M.D.Tenn. Oct. 10, 2007). In this discovery dispute, the<br />

court granted the plaintiffs’ motion to compel <strong>and</strong> ordered the defendants to provide complete<br />

responses to the plaintiffs’ ESI requests, including all metadata <strong>and</strong> deleted information for any of<br />

the defendants’ key custodians. Additionally, the court ordered the defendants to file certifications<br />

regarding whether ESI was removed from any state computer or personal computer provided by<br />

the state. Any managed care contractors (MCCs) were ordered to respond to ESI requests <strong>and</strong> if<br />

production was found inadequate, the plaintiffs were allowed to renew their motion to compel<br />

further production. Addressing the plaintiffs’ spoliation concerns, the court allowed the plaintiffs’<br />

ESI expert to oversee the defendants’ production <strong>and</strong> inspect whether any changes were made to<br />

the defendants’ computer(s). Finally, the court ordered the defendants to respond as to why they<br />

should not be required to pay all production costs <strong>and</strong> attorney fees as provided in the order.<br />

� Univ. of Pittsburgh v. Townsend, 2007 WL 1002317 (E.D. Tenn. Mar. 30, 2007). In a case where<br />

the plaintiff alleged that the defendants misappropriated the plaintiff’s rights to medical scanning<br />

technology, the defendants moved the court to sanction the plaintiff for spoliation of evidence by<br />

excluding the testimony of the plaintiff’s proposed experts. The defendants alleged that the experts<br />

<strong>and</strong> plaintiff’s counsel destroyed copies of e-mails <strong>and</strong> draft expert reports, to which they were<br />

entitled. The experts stated that they did not retain e-mail from the plaintiff’s counsel because they<br />

were instructed not to do so by the plaintiff’s counsel. The experts stated that they did not have the<br />

prior draft expert reports because they only worked from one copy. The court rejected the<br />

defendants’ argument <strong>and</strong> denied the request for sanctions. It ruled that although a draft an expert<br />

report may be discoverable under the Federal Rules of Civil Procedure, an expert need not<br />

preserve the drafts until the need to retain exists. Here, the experts <strong>and</strong> the plaintiff’s counsel were<br />

not under an obligation to preserve the reports until the defendants subpoenaed records from the<br />

experts. Since the draft reports were destroyed prior to the creation of any obligation to retain, the<br />

court held that the destruction of the draft reports was “not done intentionally, fraudulently, <strong>and</strong> with<br />

‘a desire to suppress the truth,’ <strong>and</strong> therefore, [was] not sanctionable.” However, the court did hold<br />

that it was improper for the plaintiff’s counsel to have instructed or otherwise suggested to the<br />

experts that all e-mails be destroyed, as they were the subject of multiple discovery requests. The<br />

plaintiff’s counsel apologized for the error, <strong>and</strong> the court did not issue sanctions.<br />

� Inventory Locator Serv., LLC v. Partsbase, Inc., 2005 WL 2179185 (W.D.Tenn. Sept. 6, 2005).<br />

The plaintiff alleged the defendant unlawfully accessed the plaintiff’s computerized database, <strong>and</strong><br />

the defendant counterclaimed arguing similar conduct on the part of the plaintiff. In support of its<br />

counterclaims, the defendant offered "Web server logs," purporting to record various unlawful<br />

entries into the defendant’s computer system from an internet protocol ("IP") address assigned to<br />

the plaintiff. The plaintiff sought, inter alia, to exclude the evidence, arguing the logs were<br />

"incredible on their face," appeared to have been altered, had been moved <strong>and</strong> deleted, <strong>and</strong> were<br />

inadmissible hearsay. As evidence that the logs were altered or fabricated, the plaintiff noted a<br />

"cookie anomaly." When a user from a specific IP address logs onto the defendant’s Web site, a<br />

“cookie” containing information such as the IP address from which the user was logging in, would<br />

be created <strong>and</strong> recorded alongside the entry in the server logs. According to the plaintiff, none of<br />

the cookies corresponded with the entries allegedly coming from its IP address. In response, the<br />

defendant submitted the affidavit from a technology services company president who explained the<br />

169

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!