Electronic Discovery and Computer Forensics Case List - Kroll Ontrack
Electronic Discovery and Computer Forensics Case List - Kroll Ontrack
Electronic Discovery and Computer Forensics Case List - Kroll Ontrack
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
documents included an inaccurate billing statement <strong>and</strong> five letters pertaining to “future” meetings.<br />
A computer forensics investigation of the defendant’s computer revealed that the letters were<br />
actually created after the “future” meetings were set to occur. In addition, the billing statement was<br />
created within an hour of the letters. The trial court held that this evidence was insufficient to show<br />
that the defendant created the documents after he found out about the audit. On appeal, the<br />
government argued that because that the defendant’s fellow director knew about the audit the day<br />
before the defendant created the documents, a fact finder could reasonably infer that the defendant<br />
created the backdated letters in response to the audit. Determining that the evidence supported the<br />
government’s argument, the appellate court reversed the trial court’s decision <strong>and</strong> declared that a<br />
reasonable person could conclude that the defendant was aware of the audit when he created the<br />
backdated documents.<br />
� People v. Dominguez, 2004 WL 1068809 (Cal. Ct. App. May 13, 2004). In a child pornography<br />
prosecution case, the State examined the defendant’s computer for illegal material. The<br />
prosecution’s computer forensic expert recovered 45 child pornography images, deleted from the<br />
computer’s active memory, <strong>and</strong> 20 deleted “favorites folders,” which marked prior visits to child<br />
pornography Web sites. The expert also testified that he discovered child pornography “cookie<br />
files,” files designed to make return visits to a Web site faster. In response, the defendant noted,<br />
inter alia, that, because the evidence was located in his computer’s inactive memory <strong>and</strong> could not<br />
be recovered without the use of specialized computer programs, it was insufficient evidence to<br />
support the conviction. In rejecting the defendant’s argument, the court declared that “[t]he fact that<br />
the evidence of that possession was the result of a forensic examination of the inactive memory of<br />
his computer is meaningless.” As such, the court determined that the evidence supported the<br />
defendant’s conviction for possession of child pornography.<br />
� In re Verisign, Inc. Sec. Litig., 2004 WL 2445243 (N.D. Cal. Mar. 10, 2004). In a class action<br />
securities lawsuit, the plaintiffs sought to compel production of electronic documents in electronic<br />
form. The magistrate judge granted the order, specifically stating that a tiff document production<br />
was insufficient <strong>and</strong> ordered the defendants to produce the documents in a searchable electronic<br />
format – such as a native .pst format – that included metadata. The defendants objected to the<br />
magistrate’s order, arguing that production in native format rather than in tiff format was contrary to<br />
Fed.R.Civ.P. 34. The district court judge rejected this argument <strong>and</strong> declared the Rules “required<br />
[the defendants] to produce responsive electronic documents in their native .pst format if that is<br />
how they were stored in Defendants’ usual course of business.”<br />
� OpenTV v. Libertate Technologies, 219 F.R.D. 474 (N.D.Cal. 2003). The plaintiff requested that<br />
the defendant produce copies of its source code for various products at issue in the litigation. The<br />
defendant objected to the request, claiming that producing this data would be overly burdensome,<br />
but offered to make the source code data available for review at its facilities. The plaintiff rejected<br />
this offer, claiming that it inappropriately shifted the costs of production to the requesting party as<br />
the code must be extracted at its expense. Relying on the analysis set forth in Zubulake cases, the<br />
court found that the source code data was stored in an inaccessible format for purposes of<br />
discovery. The court used the Zubulake seven factor balancing test to determine that the parties<br />
should split the costs of extracting the data equally, with the defendant bearing the copying costs<br />
once the data has been extracted.<br />
� Dodge, Warren, & Peters Ins. Servs. v. Riley, 130 Cal. Rptr. 2d 385 (Cal. Ct. App. 2003). Prior to<br />
termination of their employment, the defendants copied <strong>and</strong> took with them volumes of<br />
computerized data maintained in the plaintiff’s files <strong>and</strong> storage media. The plaintiff sued the<br />
defendants alleging claims of misappropriation of trade secrets, unfair business practices, breach<br />
249