17.01.2013 Views

Electronic Discovery and Computer Forensics Case List - Kroll Ontrack

Electronic Discovery and Computer Forensics Case List - Kroll Ontrack

Electronic Discovery and Computer Forensics Case List - Kroll Ontrack

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

spoliation. Through forensic analysis, the defendants’ computer forensic expert established that the<br />

plaintiff reformatted both laptops shortly after a production request for the hard drives, <strong>and</strong> also<br />

found two documents containing metadata suggesting the plaintiff created the documents one year<br />

later than claimed. Opposing the motion, the plaintiff claimed the hard drives were wiped <strong>and</strong><br />

reformatted for maintenance purposes due to virus infections. The court ordered an adverse jury<br />

instruction creating a presumption in favor of the defendants finding the plaintiff acted willfully; was<br />

on notice that information contained on the hard drives was potentially relevant to litigation; <strong>and</strong> did<br />

not produce backup files despite numerous requests. The court reasoned that the harsh sanction<br />

of dismissal was not appropriate because the evidence secured by the defendants’ computer<br />

forensic expert, combined with the adverse jury instruction, did not render it “helpless to rebut any<br />

material that [the] plaintiff might use to overcome the presumption” at trial.<br />

� Coburn v. PN II, Inc., 2008 WL 879746 (D.Nev. Mar. 28, 2008). In this gender discrimination<br />

claim, the defendants filed a motion to compel the plaintiff to provide supplemental answers to<br />

interrogatories <strong>and</strong> requests for the production of documents. Specifically, the defendants sought a<br />

forensic examination of the plaintiff’s home computers, <strong>and</strong> the plaintiff opposed the request as<br />

potentially violating her privilege, privacy <strong>and</strong> confidentiality interests. Finding the burden of<br />

compliance to be minimal, the court set out a protocol for appointing a computer specialist to<br />

conduct the examination, whose cost was payable by the defendants. The protocol contemplated<br />

agreement of the parties, whereby access to protected information would not result in waiver of the<br />

attorney-client privilege. Additionally, the parties were ordered to agree to a time <strong>and</strong> date for<br />

collection whereby the plaintiff’s attorney would maintain the sole copy of the mirror image of the<br />

computers.<br />

� LVRC Holdings, LLC v. Brekka, 2007 WL 2891565 (D.Nev. Sept. 28, 2007). In this trade secret<br />

misappropriations suit, the defendant moved the court for summary judgment, claiming the plaintiff<br />

had not established an issue of material fact <strong>and</strong> they were entitled to judgment as a matter of law.<br />

To prevail on a claim based on the <strong>Computer</strong> Fraud <strong>and</strong> Abuse Act, the plaintiff must establish<br />

access to a protected computer without authorization. In this instance, the plaintiff’s computer<br />

forensic expert testified that the defendant’s personal computer had been used to access the<br />

plaintiff’s secured Web site, but was unable to testify as to when the access took place. Because<br />

the plaintiff did not present facts indicating that the date of access was after termination, the court<br />

granted the defendant’s summary judgment motion.<br />

� Koninklijke Philips Elec. N.V. v. KXD Tech., Inc., 2007 WL 879683 (D. Nev. Mar. 20, 2007). In a<br />

discovery dispute, the plaintiff filed an emergency motion with the court to clarify its discovery order<br />

with respect to the defendants’ production of documents. The plaintiff anticipated less than<br />

adequate discovery responses from the defendants in responding to the court’s order. The plaintiff<br />

also expressed concern that the defendants not be permitted to simply produce an unorganized<br />

body of electronic or paper records which the plaintiff would then be required to search through to<br />

locate documents responsive to particular requests. The defendants claimed that they did not have<br />

to produce the electronic data because during the plaintiff’s original seizure of documents, several<br />

hard drives <strong>and</strong> servers belonging to the defendants were damaged <strong>and</strong> many documents were<br />

lost. The court did not find the defendants’ arguments credible; instead, the court noted that the<br />

defendants had not produced any evidence to show that the hard drives were damaged <strong>and</strong> that<br />

no information could be gleaned from the drives. The court further cautioned that it could order a<br />

computer forensics examination of the alleged damaged drives to determine if the defendants were<br />

truthful <strong>and</strong> to establish if any discoverable information was retrievable. Furthermore, the court<br />

255

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!