17.01.2013 Views

Electronic Discovery and Computer Forensics Case List - Kroll Ontrack

Electronic Discovery and Computer Forensics Case List - Kroll Ontrack

Electronic Discovery and Computer Forensics Case List - Kroll Ontrack

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

documents included an inaccurate billing statement <strong>and</strong> five letters pertaining to “future” meetings.<br />

A computer forensics investigation of the defendant’s computer revealed that the letters were<br />

actually created after the “future” meetings were set to occur. In addition, the billing statement was<br />

created within an hour of the letters. The trial court held that this evidence was insufficient to show<br />

that the defendant created the documents after he found out about the audit. On appeal, the<br />

government argued that because that the defendant’s fellow director knew about the audit the day<br />

before the defendant created the documents, a fact finder could reasonably infer that the defendant<br />

created the backdated letters in response to the audit. Determining that the evidence supported the<br />

government’s argument, the appellate court reversed the trial court’s decision <strong>and</strong> declared that a<br />

reasonable person could conclude that the defendant was aware of the audit when he created the<br />

backdated documents.<br />

� People v. Dominguez, 2004 WL 1068809 (Cal. Ct. App. May 13, 2004). In a child pornography<br />

prosecution case, the State examined the defendant’s computer for illegal material. The<br />

prosecution’s computer forensic expert recovered 45 child pornography images, deleted from the<br />

computer’s active memory, <strong>and</strong> 20 deleted “favorites folders,” which marked prior visits to child<br />

pornography Web sites. The expert also testified that he discovered child pornography “cookie<br />

files,” files designed to make return visits to a Web site faster. In response, the defendant noted,<br />

inter alia, that, because the evidence was located in his computer’s inactive memory <strong>and</strong> could not<br />

be recovered without the use of specialized computer programs, it was insufficient evidence to<br />

support the conviction. In rejecting the defendant’s argument, the court declared that “[t]he fact that<br />

the evidence of that possession was the result of a forensic examination of the inactive memory of<br />

his computer is meaningless.” As such, the court determined that the evidence supported the<br />

defendant’s conviction for possession of child pornography.<br />

� In re Verisign, Inc. Sec. Litig., 2004 WL 2445243 (N.D. Cal. Mar. 10, 2004). In a class action<br />

securities lawsuit, the plaintiffs sought to compel production of electronic documents in electronic<br />

form. The magistrate judge granted the order, specifically stating that a tiff document production<br />

was insufficient <strong>and</strong> ordered the defendants to produce the documents in a searchable electronic<br />

format – such as a native .pst format – that included metadata. The defendants objected to the<br />

magistrate’s order, arguing that production in native format rather than in tiff format was contrary to<br />

Fed.R.Civ.P. 34. The district court judge rejected this argument <strong>and</strong> declared the Rules “required<br />

[the defendants] to produce responsive electronic documents in their native .pst format if that is<br />

how they were stored in Defendants’ usual course of business.”<br />

� OpenTV v. Libertate Technologies, 219 F.R.D. 474 (N.D.Cal. 2003). The plaintiff requested that<br />

the defendant produce copies of its source code for various products at issue in the litigation. The<br />

defendant objected to the request, claiming that producing this data would be overly burdensome,<br />

but offered to make the source code data available for review at its facilities. The plaintiff rejected<br />

this offer, claiming that it inappropriately shifted the costs of production to the requesting party as<br />

the code must be extracted at its expense. Relying on the analysis set forth in Zubulake cases, the<br />

court found that the source code data was stored in an inaccessible format for purposes of<br />

discovery. The court used the Zubulake seven factor balancing test to determine that the parties<br />

should split the costs of extracting the data equally, with the defendant bearing the copying costs<br />

once the data has been extracted.<br />

� Dodge, Warren, & Peters Ins. Servs. v. Riley, 130 Cal. Rptr. 2d 385 (Cal. Ct. App. 2003). Prior to<br />

termination of their employment, the defendants copied <strong>and</strong> took with them volumes of<br />

computerized data maintained in the plaintiff’s files <strong>and</strong> storage media. The plaintiff sued the<br />

defendants alleging claims of misappropriation of trade secrets, unfair business practices, breach<br />

249

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!