17.01.2013 Views

Electronic Discovery and Computer Forensics Case List - Kroll Ontrack

Electronic Discovery and Computer Forensics Case List - Kroll Ontrack

Electronic Discovery and Computer Forensics Case List - Kroll Ontrack

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

portions of the e-mail were not protected by the attorney-client privilege. Finding a lack of appellate<br />

jurisdiction under the collateral order doctrine because the privileged information had already been<br />

disclosed, the court dismissed the appeal. The court noted that while the disclosure of the e-mail<br />

was unfortunate, “the chicken has already flown the coop – the alleged harm from disclosure has<br />

already occurred.”<br />

� Quon v. Arch Wireless Operating Co., Inc., 529 F.3d 892 (9th Cir. 2008). In this case, the<br />

plaintiffs appealed the district court’s ruling, claiming the defendants violated the Stored<br />

Communications Act (“SCA”) <strong>and</strong> their Fourth Amendment rights by producing plaintiff’s text<br />

messages to the police department. The police department claimed it sought the plaintiffs’ text<br />

message transcripts to determine if the usage overages the plaintiffs incurred were due to personal<br />

messages. Categorizing the defendant service provider as an “electronic communication service”<br />

(ECS) that knowingly provided transcripts of the text messages to the defendant City who was<br />

merely a “subscriber” <strong>and</strong> not “an addressee or intended recipient of such communication,” the<br />

court determined the defendant violated the SCA <strong>and</strong> rem<strong>and</strong>ed the case to the district court. The<br />

court also agreed with the plaintiffs that the search violated the Fourth Amendment, finding that the<br />

plaintiffs had a reasonable expectation of privacy in the text messages stored on the service<br />

provider’s network <strong>and</strong> that the search was conducted unreasonably <strong>and</strong> intrusively.<br />

� United States v. Giberson, 527 F.3d 882 (9th Cir. 2008). In this criminal conviction appeal, the<br />

appellant argued that the trial court erred in denying his motion to suppress incriminating evidence<br />

found on his computer. The computer was seized via a search warrant for documents <strong>and</strong> records<br />

relating to child support obligation failures, <strong>and</strong> was forensically searched under a warrant for<br />

evidence of fraudulent activities. The appellant argued that the general principle that a search<br />

warrant for materials authorizes the search of objects that may contain those materials should not<br />

apply to computers because computers contain an enormous volume of data, likely contain<br />

irrelevant personal data, <strong>and</strong> likely contain First Amendment-protected data. Also, the appellant<br />

argued that the forensic search of his computer should have been limited to files likely to contain<br />

documents relevant to the search warrant’s purpose. Finding the appellant’s technology-based<br />

arguments to be unpersuasive, the court held that a search warrant describing a document<br />

reasonably likely to be contained on a computer authorizes the seizure of that computer. The court<br />

also cited precedent which reasoned that a forensic search methodology limited to certain files is<br />

unreasonable since computer records are extremely susceptible to tampering, hiding or<br />

destruction. Subsequently, the court upheld the trial court’s decision not to suppress the computer<br />

evidence <strong>and</strong> the appellant’s conviction.<br />

� Leon v. IDX Sys. Corp., 464 F.3d 951 (9th Cir. 2006). In a discrimination suit based on an ADA<br />

claim, the plaintiff appealed sanctions against him for evidence spoliation involving the deletion of<br />

2,200 files from his work-issued laptop. The defendant’s computer forensic expert determined the<br />

plaintiff intentionally wiped the laptop’s hard drive before turning it over to defendant for<br />

examination. The plaintiff admitted to running a program designed to delete any files from the<br />

unallocated space on his hard drive but argued that the deletion was only performed to protect his<br />

privacy interests. The court, however, stated the plaintiff had “ample notice” to preserve any<br />

relevant evidence <strong>and</strong> “the files he destroyed were not merely ‘private’ <strong>and</strong> were potentially<br />

relevant to the litigation at h<strong>and</strong>.” The appellate court determined that the district court did not<br />

abuse its discretion when determining that the plaintiff acted in bad faith in destroying electronic<br />

files <strong>and</strong> that defendant was prejudiced because of such destruction. The court agreed further that<br />

lesser sanctions would not be useful since any attempts to rectify the harm done by plaintiff would<br />

be “futile.” Therefore, dismissal was proper.<br />

217

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!