Electronic Discovery and Computer Forensics Case List - Kroll Ontrack
Electronic Discovery and Computer Forensics Case List - Kroll Ontrack
Electronic Discovery and Computer Forensics Case List - Kroll Ontrack
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
employee’s files from her computer <strong>and</strong> they were merely duplicative of already produced<br />
documents. The court, despite finding that the defendant breached its duty to preserve evidence,<br />
refused to order sanctions, as there was no showing that the breach caused relevant documents<br />
<strong>and</strong> information to be destroyed. With regard to the plaintiff’s inadequate search claims, the court<br />
ordered the defendant to assure the plaintiff that all employees’ documents <strong>and</strong> computer files had<br />
been produced. The court also ordered the defendant to produce an identical copy of the memory<br />
stick used to save the key employee’s documents to ensure that all information had actually been<br />
produced.<br />
� Heartl<strong>and</strong> Surgical Specialty Hosp., LLC v. Midwest Div., Inc., 2007 WL 625809 (D. Kan. Feb.<br />
23, 2007). In this discovery dispute in an antitrust litigation, the defendant moved the court to order<br />
the plaintiff to supplement its privilege logs according to the parties’ pre-trial electronic discovery<br />
protocol. The agreed upon protocol defined the scope of discoverable electronic information <strong>and</strong><br />
provided for specific procedures if any electronic documents were withheld from discovery based<br />
on privilege. The defendant argued that the plaintiff did not follow the agreed upon protocol when<br />
submitting its privilege log because it did not list sufficient information on the log in order to enable<br />
the defendant to properly identify whether the plaintiff’s withheld documents were in fact privileged.<br />
The defendant further argued that the plaintiff’s privilege log did not meet the st<strong>and</strong>ards as set by<br />
local caselaw <strong>and</strong> the Federal Rules of Civil Procedure. The plaintiff argued that it did comply with<br />
the privilege log <strong>and</strong> that the defendant itself did not comply with the agreed upon electronic<br />
discovery protocol <strong>and</strong> therefore cannot be punished. The court held that some of the plaintiff’s<br />
submissions were insufficient according to the parties’ protocol agreement <strong>and</strong> that the privilege<br />
log must be supplemented in some areas. The court refused to order sanctions for the privilege log<br />
insufficiencies.<br />
� Thompson v. Jiffy Lube Int’l, Inc., 2007 WL 608343 (D. Kan. Feb. 22, 2007). In this class action<br />
suit, the defendant filed for sanctions against the plaintiffs for spoliation of important documents<br />
<strong>and</strong> information. The plaintiffs, under an order to produce witness names, addresses <strong>and</strong> phone<br />
numbers, claimed that the information was lost when the hard drive possessed by its’ counsel<br />
crashed <strong>and</strong> the information was not backed up for retrieval. The plaintiffs argued that it did not<br />
intentionally or negligently destroy any witness information <strong>and</strong> that they attempted to salvage the<br />
data stored on the hard drive but concluded that reconstructing the data would be too time<br />
consuming <strong>and</strong> burdensome. The defendant argued that the plaintiffs had a duty to preserve the<br />
information in a manner that would have prevented loss <strong>and</strong>, at a minimum, preserved the data in a<br />
backup system. The court declined to issue sanctions against the plaintiffs stating that the<br />
“plaintiffs’ failure to utilize a backup system for counsel’s computer is troubling” but sanctions were<br />
inappropriate because the issues for trial had not yet been established. The court noted that “the<br />
issue of spoliation may be revisited by motion after the issues in the case are better defined.” The<br />
court did, however, allow the defendant to issue written deposition questions to plaintiffs’ counsel to<br />
determine the extent of the lost data.<br />
� G.D. v. Monarch Plastic Surgery, P.A., 2007 WL 201154 (D. Kan. Jan. 24, 2007). The plaintiffs in<br />
this case brought a claim of wrongful disclosure of medical information against the defendant<br />
medical provider. The plaintiffs’ medical information was inadvertently disclosed when a computer<br />
was placed on the curb for trash disposal. The computer was obtained by a passerby who<br />
subsequently had the hard drive repaired. Once the computer was in working condition, it was<br />
discovered that the computer contained confidential medical information of several of the<br />
defendant’s patients. The plaintiffs filed a motion to compel the production of the computer <strong>and</strong> all<br />
information contained on its hard drive. The defendant objected to the motion stating that it was an<br />
274