17.01.2013 Views

Electronic Discovery and Computer Forensics Case List - Kroll Ontrack

Electronic Discovery and Computer Forensics Case List - Kroll Ontrack

Electronic Discovery and Computer Forensics Case List - Kroll Ontrack

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

employee’s files from her computer <strong>and</strong> they were merely duplicative of already produced<br />

documents. The court, despite finding that the defendant breached its duty to preserve evidence,<br />

refused to order sanctions, as there was no showing that the breach caused relevant documents<br />

<strong>and</strong> information to be destroyed. With regard to the plaintiff’s inadequate search claims, the court<br />

ordered the defendant to assure the plaintiff that all employees’ documents <strong>and</strong> computer files had<br />

been produced. The court also ordered the defendant to produce an identical copy of the memory<br />

stick used to save the key employee’s documents to ensure that all information had actually been<br />

produced.<br />

� Heartl<strong>and</strong> Surgical Specialty Hosp., LLC v. Midwest Div., Inc., 2007 WL 625809 (D. Kan. Feb.<br />

23, 2007). In this discovery dispute in an antitrust litigation, the defendant moved the court to order<br />

the plaintiff to supplement its privilege logs according to the parties’ pre-trial electronic discovery<br />

protocol. The agreed upon protocol defined the scope of discoverable electronic information <strong>and</strong><br />

provided for specific procedures if any electronic documents were withheld from discovery based<br />

on privilege. The defendant argued that the plaintiff did not follow the agreed upon protocol when<br />

submitting its privilege log because it did not list sufficient information on the log in order to enable<br />

the defendant to properly identify whether the plaintiff’s withheld documents were in fact privileged.<br />

The defendant further argued that the plaintiff’s privilege log did not meet the st<strong>and</strong>ards as set by<br />

local caselaw <strong>and</strong> the Federal Rules of Civil Procedure. The plaintiff argued that it did comply with<br />

the privilege log <strong>and</strong> that the defendant itself did not comply with the agreed upon electronic<br />

discovery protocol <strong>and</strong> therefore cannot be punished. The court held that some of the plaintiff’s<br />

submissions were insufficient according to the parties’ protocol agreement <strong>and</strong> that the privilege<br />

log must be supplemented in some areas. The court refused to order sanctions for the privilege log<br />

insufficiencies.<br />

� Thompson v. Jiffy Lube Int’l, Inc., 2007 WL 608343 (D. Kan. Feb. 22, 2007). In this class action<br />

suit, the defendant filed for sanctions against the plaintiffs for spoliation of important documents<br />

<strong>and</strong> information. The plaintiffs, under an order to produce witness names, addresses <strong>and</strong> phone<br />

numbers, claimed that the information was lost when the hard drive possessed by its’ counsel<br />

crashed <strong>and</strong> the information was not backed up for retrieval. The plaintiffs argued that it did not<br />

intentionally or negligently destroy any witness information <strong>and</strong> that they attempted to salvage the<br />

data stored on the hard drive but concluded that reconstructing the data would be too time<br />

consuming <strong>and</strong> burdensome. The defendant argued that the plaintiffs had a duty to preserve the<br />

information in a manner that would have prevented loss <strong>and</strong>, at a minimum, preserved the data in a<br />

backup system. The court declined to issue sanctions against the plaintiffs stating that the<br />

“plaintiffs’ failure to utilize a backup system for counsel’s computer is troubling” but sanctions were<br />

inappropriate because the issues for trial had not yet been established. The court noted that “the<br />

issue of spoliation may be revisited by motion after the issues in the case are better defined.” The<br />

court did, however, allow the defendant to issue written deposition questions to plaintiffs’ counsel to<br />

determine the extent of the lost data.<br />

� G.D. v. Monarch Plastic Surgery, P.A., 2007 WL 201154 (D. Kan. Jan. 24, 2007). The plaintiffs in<br />

this case brought a claim of wrongful disclosure of medical information against the defendant<br />

medical provider. The plaintiffs’ medical information was inadvertently disclosed when a computer<br />

was placed on the curb for trash disposal. The computer was obtained by a passerby who<br />

subsequently had the hard drive repaired. Once the computer was in working condition, it was<br />

discovered that the computer contained confidential medical information of several of the<br />

defendant’s patients. The plaintiffs filed a motion to compel the production of the computer <strong>and</strong> all<br />

information contained on its hard drive. The defendant objected to the motion stating that it was an<br />

274

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!