17.01.2013 Views

Electronic Discovery and Computer Forensics Case List - Kroll Ontrack

Electronic Discovery and Computer Forensics Case List - Kroll Ontrack

Electronic Discovery and Computer Forensics Case List - Kroll Ontrack

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

incident, her attorney’s letter complaining about her treatment <strong>and</strong> a court order to preserve the<br />

video recording all put the police department on notice of imminent litigation such that they should<br />

have preserved the entire recording. Objecting, the defendants asserted that preserving only part<br />

of the recording complied with routine procedure, the plaintiff failed to demonstrate prejudice from<br />

the loss, the uncopied segment would have been automatically overwritten by the time the<br />

defendants received notice to preserve it <strong>and</strong> they did not act in bad faith. Finding sufficient<br />

evidence to constitute a fact question, the court ordered the question of bad faith be submitted to<br />

the jury <strong>and</strong> included a permissive adverse inference instruction.<br />

� MHC Investment Comp. v. Racom Corp., 209 F.R.D. 431 (S.D. Iowa 2002). The Iowa court<br />

mentioned without further comment that e-mails were made available during discovery confirming<br />

the general discoverability of e-mail evidence.<br />

Minnesota<br />

� Escamilla v. SMS Holdings Corp., 2011 WL 5025254 (D. Minn. Oct. 21, 2011).<br />

In this sexual battery <strong>and</strong> harassment litigation, the defendants—a former employer <strong>and</strong><br />

supervisor—objected to a magistrate judge’s order to produce a personal laptop for forensic<br />

review, search backup tapes for deleted e-mails <strong>and</strong> pay the associated costs. Specifically,<br />

defendants object that reinstalling the operating system on the supervisor’s personal computer at a<br />

technician’s recommendation was not done intentionally or in bad faith <strong>and</strong> that the court<br />

compelled discovery based solely on a forensics expert’s "speculation" that reinstallation was done<br />

to "hide or destroy relevant information." Additionally, the defendants argued that the court did not<br />

properly conduct a proportionality analysis by considering the prejudice suffered by the plaintiff.<br />

Finally, the defendants argued that data on the employer’s backup tapes was not reasonably<br />

accessible <strong>and</strong> would constitute an undue burden. The court overruled the objections related to the<br />

personal laptop, finding the timing of the reinstallation—which was done two weeks after the<br />

plaintiff’s motion to compel—highly suspect <strong>and</strong> further noted that the prejudice suffered could only<br />

be determined by allowing a forensics expert to review the laptop. With regard to searching<br />

employer’s backup tapes, the court overruled the defendants’ objection, finding that the cost<br />

estimate from a single vendor was "wildly overstated" <strong>and</strong> further found that increased costs were<br />

a result of the defendants failure to preserve data at the outset of litigation. However, the court<br />

found that searching the backup tapes for deleted data was technically impossible <strong>and</strong> ordered the<br />

defendants to search the backup tapes only for live data.<br />

� In re Hecker, 2010 WL 654151 (Bkrtcy.D.Minn. Feb. 23, 2010). In this ancillary bankruptcy<br />

proceeding, the plaintiff requested default judgment sanctions, alleging the defendant repeatedly<br />

failed to produce privilege logs <strong>and</strong> responsive ESI, <strong>and</strong> engaged in offensive discovery despite<br />

court orders prohibiting those actions. The defendant argued he was unable to produce large<br />

amounts of the requested ESI since the documents were located on his computers <strong>and</strong> servers<br />

that were in government custody. First, the court noted that the majority of information requested<br />

remained in the defendant’s possession, since the government made forensic images of the data.<br />

Next, the court detailed the “shocking” behavior of the defendant <strong>and</strong> his counsel throughout the<br />

discovery process, which included belated <strong>and</strong> incomplete productions, violation of court orders,<br />

<strong>and</strong> delivery of an external hard drive containing 1.1 million scrambled files <strong>and</strong> folders. Based on<br />

this behavior, the court determined the defendant acted in bad faith <strong>and</strong> willfully abused the<br />

discovery process. Due to the court’s certainty that no court order would secure the defendant’s<br />

201

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!