17.01.2013 Views

Electronic Discovery and Computer Forensics Case List - Kroll Ontrack

Electronic Discovery and Computer Forensics Case List - Kroll Ontrack

Electronic Discovery and Computer Forensics Case List - Kroll Ontrack

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

destruction of evidence indicating a desire to suppress the truth, not the prospect of litigation. The<br />

court found that there was no proof that the plaintiff aimed to suppress the discoverable evidence.<br />

As to the discovery violations, the court found that the district court’s refusal was also proper since<br />

the plaintiff’s discovery answers were responsive <strong>and</strong> the defendants were not prejudiced by the<br />

untimely disclosure of the data’s existence.<br />

� United States v. Ray, 428 F.3d 1172 (8th Cir. 2005). The defendant appealed an extortion<br />

conviction relating to an attempt to extort $2.5 million from a company by sending e-mails<br />

threatening to exploit a breach in the company’s computer security. Arguing insufficiency of the<br />

evidence, the defendant contended the government had not established who actually sent the emails.<br />

During the government’s investigation, a computer forensic expert had examined the<br />

defendant’s hard drive <strong>and</strong> found three threatening e-mails <strong>and</strong> other incriminating evidence. The<br />

expert testified the e-mails <strong>and</strong> documents were created by someone typing on the computer. The<br />

expert also stated that someone had logged onto the Internet from the computer using the screen<br />

name <strong>and</strong> password used to send the e-mails. Further, the expert found no evidence of remote<br />

access or hacking into the computer. Based on this evidence, as well as the defendant’s admission<br />

he logged onto his computer <strong>and</strong> the Internet several times a day, the appellate court upheld the<br />

conviction.<br />

� United States v. Bach, 310 F.3d 1063 (8th Cir. 2002). In a criminal prosecution for possession of<br />

child pornography, Yahoo! technicians retrieved, pursuant to a search warrant, all information from<br />

the defendant’s e-mail account. The lower court ruled that the seizure of the e-mails by Yahoo! was<br />

unlawful because police were not present when the defendant’s e-mail account was searched.<br />

Reversing the lower court’s opinion, the appellate court held that Yahoo!’s search of the<br />

defendant’s e-mails without a police officer present was reasonable under the Fourth Amendment<br />

<strong>and</strong> did not violate the defendant’s privacy rights.<br />

Arkansas<br />

� Helmert v. Butterball, LLC, 2010 WL 2179180 (E.D.Ark. May 27, 2010). In this employment<br />

litigation, the plaintiffs alleged the defendant’s production response was inadequate based on its<br />

failure to conduct a meaningful search of electronic information. The defendant argued the<br />

plaintiffs’ request was overbroad, addressed information that was not reasonably accessible <strong>and</strong><br />

would require privilege determinations. Addressing one of the four search term categories, the<br />

court determined it was narrowly tailored except for the terms that would require an electronic<br />

search of e-mails for “one term within the same sentence as another term,” since the plaintiff<br />

offered no evidence that the search could be performed electronically. The court found the second<br />

category of terms to be duplicative <strong>and</strong> unnecessary, but held the third <strong>and</strong> fourth term categories<br />

were appropriately constructed. Next, the court narrowed the custodian list to include only the<br />

employees who were likely to possess relevant information <strong>and</strong> denied the proposed search of<br />

backup tapes, finding the information not reasonably accessible. The court also ordered a search<br />

of hard drives, laptops <strong>and</strong> personal e-mail accounts of two custodians for the identified search<br />

terms. Finally, the court denied the defendant’s request for cost-shifting as it had not ordered the<br />

restoration <strong>and</strong> search of backup tapes.<br />

� B & B Hardware, Inc. v. Fastenal Co., 2011 WL 2115546 (E.D. Ark. May 25, 2011). In this<br />

discovery dispute, the plaintiff sought to compel production <strong>and</strong> requested a hearing to determine<br />

what the defendant had done to meet its obligation to produce responsive ESI, forensically image<br />

hard drives <strong>and</strong> conduct a search of 1,182 backup tapes (estimated to cost $84,854,704.90).<br />

199

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!