Electronic Discovery and Computer Forensics Case List - Kroll Ontrack
Electronic Discovery and Computer Forensics Case List - Kroll Ontrack
Electronic Discovery and Computer Forensics Case List - Kroll Ontrack
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
portions of the e-mail were not protected by the attorney-client privilege. Finding a lack of appellate<br />
jurisdiction under the collateral order doctrine because the privileged information had already been<br />
disclosed, the court dismissed the appeal. The court noted that while the disclosure of the e-mail<br />
was unfortunate, “the chicken has already flown the coop – the alleged harm from disclosure has<br />
already occurred.”<br />
� Quon v. Arch Wireless Operating Co., Inc., 529 F.3d 892 (9th Cir. 2008). In this case, the<br />
plaintiffs appealed the district court’s ruling, claiming the defendants violated the Stored<br />
Communications Act (“SCA”) <strong>and</strong> their Fourth Amendment rights by producing plaintiff’s text<br />
messages to the police department. The police department claimed it sought the plaintiffs’ text<br />
message transcripts to determine if the usage overages the plaintiffs incurred were due to personal<br />
messages. Categorizing the defendant service provider as an “electronic communication service”<br />
(ECS) that knowingly provided transcripts of the text messages to the defendant City who was<br />
merely a “subscriber” <strong>and</strong> not “an addressee or intended recipient of such communication,” the<br />
court determined the defendant violated the SCA <strong>and</strong> rem<strong>and</strong>ed the case to the district court. The<br />
court also agreed with the plaintiffs that the search violated the Fourth Amendment, finding that the<br />
plaintiffs had a reasonable expectation of privacy in the text messages stored on the service<br />
provider’s network <strong>and</strong> that the search was conducted unreasonably <strong>and</strong> intrusively.<br />
� United States v. Giberson, 527 F.3d 882 (9th Cir. 2008). In this criminal conviction appeal, the<br />
appellant argued that the trial court erred in denying his motion to suppress incriminating evidence<br />
found on his computer. The computer was seized via a search warrant for documents <strong>and</strong> records<br />
relating to child support obligation failures, <strong>and</strong> was forensically searched under a warrant for<br />
evidence of fraudulent activities. The appellant argued that the general principle that a search<br />
warrant for materials authorizes the search of objects that may contain those materials should not<br />
apply to computers because computers contain an enormous volume of data, likely contain<br />
irrelevant personal data, <strong>and</strong> likely contain First Amendment-protected data. Also, the appellant<br />
argued that the forensic search of his computer should have been limited to files likely to contain<br />
documents relevant to the search warrant’s purpose. Finding the appellant’s technology-based<br />
arguments to be unpersuasive, the court held that a search warrant describing a document<br />
reasonably likely to be contained on a computer authorizes the seizure of that computer. The court<br />
also cited precedent which reasoned that a forensic search methodology limited to certain files is<br />
unreasonable since computer records are extremely susceptible to tampering, hiding or<br />
destruction. Subsequently, the court upheld the trial court’s decision not to suppress the computer<br />
evidence <strong>and</strong> the appellant’s conviction.<br />
� Leon v. IDX Sys. Corp., 464 F.3d 951 (9th Cir. 2006). In a discrimination suit based on an ADA<br />
claim, the plaintiff appealed sanctions against him for evidence spoliation involving the deletion of<br />
2,200 files from his work-issued laptop. The defendant’s computer forensic expert determined the<br />
plaintiff intentionally wiped the laptop’s hard drive before turning it over to defendant for<br />
examination. The plaintiff admitted to running a program designed to delete any files from the<br />
unallocated space on his hard drive but argued that the deletion was only performed to protect his<br />
privacy interests. The court, however, stated the plaintiff had “ample notice” to preserve any<br />
relevant evidence <strong>and</strong> “the files he destroyed were not merely ‘private’ <strong>and</strong> were potentially<br />
relevant to the litigation at h<strong>and</strong>.” The appellate court determined that the district court did not<br />
abuse its discretion when determining that the plaintiff acted in bad faith in destroying electronic<br />
files <strong>and</strong> that defendant was prejudiced because of such destruction. The court agreed further that<br />
lesser sanctions would not be useful since any attempts to rectify the harm done by plaintiff would<br />
be “futile.” Therefore, dismissal was proper.<br />
217