17.01.2013 Views

Electronic Discovery and Computer Forensics Case List - Kroll Ontrack

Electronic Discovery and Computer Forensics Case List - Kroll Ontrack

Electronic Discovery and Computer Forensics Case List - Kroll Ontrack

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

� U.S. v. Ziegler, 456 F.3d 1138 (9th Cir. 2006). In an appeal from Montana district court, defendant<br />

claimed that child pornography <strong>and</strong> other information found on his workplace computer was<br />

protected as private information under the 4th Amendment. Plaintiff argued that a workplace<br />

computer is much like a locked desk drawer in an office <strong>and</strong> that a similar expectation of privacy<br />

should follow. However, the government argued that no employee can possibly have an<br />

expectation of privacy when the computer <strong>and</strong> internet access is paid for by the employer <strong>and</strong><br />

when there is an entire company department dedicated to monitoring employee’s internet use. The<br />

court held that the defendant could not have an objective expectation of privacy since his employer<br />

published <strong>and</strong> practiced a computer monitoring policy. The court noted that the defendant’s<br />

personal password protection did not increase privacy expectations. Furthermore, the court stated<br />

that if the employer did not have a properly practiced policy in place, than an objective expectation<br />

of privacy may have existed for defendant. However, the court concluded “[s]ocial norms suggest<br />

that employees are not entitled to privacy in the use of workplace computers.”<br />

� Barton v. United States, 2005 WL 1355481 (9th Cir. June 9, 2005). In a suit relating to an<br />

antidepressant drug, the trial court denied the plaintiff’s writ of m<strong>and</strong>amus to prevent disclosure of<br />

answers to a law firm questionnaire completed online by prospective clients. The trial court’s<br />

decision rested on a disclaimer on the bottom of the questionnaire that stated filling out the<br />

questionnaire "does not constitute a request for legal advice <strong>and</strong> that I am not forming an attorney<br />

client relationship by submitting this information." On appeal, the court reversed the trial court’s<br />

decision <strong>and</strong> determined the questionnaire answers were submitted in the course of prospective<br />

attorney-client relationship <strong>and</strong> were thus confidential <strong>and</strong> protected by the attorney-client privilege.<br />

� United States v. Gordon, 393 F.3d 1044 (9th Cir. 2004). After discovering missing stock shares,<br />

an employer suspected embezzlement <strong>and</strong> requested the defendant’s laptop computer for<br />

examination. The employer specifically told the defendant not to delete anything from the hard<br />

drive. A computer forensic analysis revealed the defendant attempted to overwrite files on the<br />

computer by running “Evidence Eliminator,” a software wiping program, at least five times the night<br />

before he turned over the computer. The defendant was convicted of embezzlement <strong>and</strong> ordered<br />

to pay restitution, including reimbursing the employer for a portion of the investigation costs. On<br />

appeal, the defendant argued the trial court should not have awarded the employer investigation<br />

costs, including the costs of the forensic examination. The appellate court rejected this argument<br />

<strong>and</strong> affirmed the district court’s award, noting the defendant “purposefully covered his tracks as he<br />

concealed his numerous acts of wrongdoing from [his employer] over a period of years. As the<br />

victim, [the employer] cannot be faulted for making a concerted effort to pick up his trail <strong>and</strong> identify<br />

all the assets he took amid everything he worked on.”<br />

� Theofel v. Farey Jones, 341 F.3d 978 (9th Cir. 2003), amended by, 359 F.3d 1066 (9th Cir.<br />

2004), cert. denied, 125 S. Ct. 48 (2004). Seeking e-mail discovery, a party in a commercial<br />

litigation issued a third party subpoena on the opposing party’s Internet Service Provider (ISP).<br />

Instead of limiting the scope of the subpoena to particular subject matters, custodians, or time<br />

periods, the subpoena sought all e-mail to or from the opposing party. The ISP substantially<br />

complied, but when the opposing party learned of the subpoena, it moved to quash. The court<br />

severely criticized the subpoenaing party for its overbroad subpoena <strong>and</strong> issued $9,000 in<br />

sanctions. The employees of the subpoenaed party then brought a new civil suit against the<br />

subpoenaing party <strong>and</strong> its attorney under the Stored Communications Act, the Wiretap Act <strong>and</strong> the<br />

<strong>Computer</strong> Fraud <strong>and</strong> Abuse Act. The trial court granted a motion to dismiss the new suit, finding<br />

that no claim was stated. The Ninth Circuit reversed <strong>and</strong> reinstated the civil suit, holding that an<br />

overbroad subpoena is not valid especially when directed against a third party that may not have<br />

218

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!