Electronic Discovery and Computer Forensics Case List - Kroll Ontrack
Electronic Discovery and Computer Forensics Case List - Kroll Ontrack
Electronic Discovery and Computer Forensics Case List - Kroll Ontrack
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
destruction of evidence indicating a desire to suppress the truth, not the prospect of litigation. The<br />
court found that there was no proof that the plaintiff aimed to suppress the discoverable evidence.<br />
As to the discovery violations, the court found that the district court’s refusal was also proper since<br />
the plaintiff’s discovery answers were responsive <strong>and</strong> the defendants were not prejudiced by the<br />
untimely disclosure of the data’s existence.<br />
� United States v. Ray, 428 F.3d 1172 (8th Cir. 2005). The defendant appealed an extortion<br />
conviction relating to an attempt to extort $2.5 million from a company by sending e-mails<br />
threatening to exploit a breach in the company’s computer security. Arguing insufficiency of the<br />
evidence, the defendant contended the government had not established who actually sent the emails.<br />
During the government’s investigation, a computer forensic expert had examined the<br />
defendant’s hard drive <strong>and</strong> found three threatening e-mails <strong>and</strong> other incriminating evidence. The<br />
expert testified the e-mails <strong>and</strong> documents were created by someone typing on the computer. The<br />
expert also stated that someone had logged onto the Internet from the computer using the screen<br />
name <strong>and</strong> password used to send the e-mails. Further, the expert found no evidence of remote<br />
access or hacking into the computer. Based on this evidence, as well as the defendant’s admission<br />
he logged onto his computer <strong>and</strong> the Internet several times a day, the appellate court upheld the<br />
conviction.<br />
� United States v. Bach, 310 F.3d 1063 (8th Cir. 2002). In a criminal prosecution for possession of<br />
child pornography, Yahoo! technicians retrieved, pursuant to a search warrant, all information from<br />
the defendant’s e-mail account. The lower court ruled that the seizure of the e-mails by Yahoo! was<br />
unlawful because police were not present when the defendant’s e-mail account was searched.<br />
Reversing the lower court’s opinion, the appellate court held that Yahoo!’s search of the<br />
defendant’s e-mails without a police officer present was reasonable under the Fourth Amendment<br />
<strong>and</strong> did not violate the defendant’s privacy rights.<br />
Arkansas<br />
� Helmert v. Butterball, LLC, 2010 WL 2179180 (E.D.Ark. May 27, 2010). In this employment<br />
litigation, the plaintiffs alleged the defendant’s production response was inadequate based on its<br />
failure to conduct a meaningful search of electronic information. The defendant argued the<br />
plaintiffs’ request was overbroad, addressed information that was not reasonably accessible <strong>and</strong><br />
would require privilege determinations. Addressing one of the four search term categories, the<br />
court determined it was narrowly tailored except for the terms that would require an electronic<br />
search of e-mails for “one term within the same sentence as another term,” since the plaintiff<br />
offered no evidence that the search could be performed electronically. The court found the second<br />
category of terms to be duplicative <strong>and</strong> unnecessary, but held the third <strong>and</strong> fourth term categories<br />
were appropriately constructed. Next, the court narrowed the custodian list to include only the<br />
employees who were likely to possess relevant information <strong>and</strong> denied the proposed search of<br />
backup tapes, finding the information not reasonably accessible. The court also ordered a search<br />
of hard drives, laptops <strong>and</strong> personal e-mail accounts of two custodians for the identified search<br />
terms. Finally, the court denied the defendant’s request for cost-shifting as it had not ordered the<br />
restoration <strong>and</strong> search of backup tapes.<br />
� B & B Hardware, Inc. v. Fastenal Co., 2011 WL 2115546 (E.D. Ark. May 25, 2011). In this<br />
discovery dispute, the plaintiff sought to compel production <strong>and</strong> requested a hearing to determine<br />
what the defendant had done to meet its obligation to produce responsive ESI, forensically image<br />
hard drives <strong>and</strong> conduct a search of 1,182 backup tapes (estimated to cost $84,854,704.90).<br />
199