17.01.2013 Views

Electronic Discovery and Computer Forensics Case List - Kroll Ontrack

Electronic Discovery and Computer Forensics Case List - Kroll Ontrack

Electronic Discovery and Computer Forensics Case List - Kroll Ontrack

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

order, the teacher declared the production would violate his right against self-incrimination, his right<br />

of privacy, <strong>and</strong> would disclose privileged communications. An administrative law judge ordered<br />

production of the computers <strong>and</strong> sought to protect the teacher’s right by allowing the teacher to<br />

have his own expert present at the inspection <strong>and</strong> by requiring the Board’s expert “not to retain,<br />

provide, or discuss with counsel for the Board the existence of any communications which might be<br />

deemed privileged.” In quashing the order, the court declared it was overbroad <strong>and</strong> would allow “an<br />

agent of the Board carte blanche authorization to examine the hard drives it will duplicate from the<br />

computers [the teacher] has been ordered to produce, combing through every byte, every word,<br />

every sentence, every data fragment, <strong>and</strong> every document, including those that are privileged or<br />

that may be part of privileged communications, looking for ‘any data’ that may evidence<br />

communication between [the teacher] <strong>and</strong> his accusers."<br />

� Coleman (Parent) Holdings, Inc. v. Morgan Stanley & Co., Inc., 2005 WL 679071 (Fla. Cir. Ct.<br />

Mar. 1, 2005). In a suit alleging a fraudulent sale of stock, the plaintiff filed a motion for an adverse<br />

inference instruction against the defendant for destroying e-mails <strong>and</strong> failing to comply with a court<br />

order to compel e-mail discovery. Despite an SEC regulation requiring e-mail retention for two<br />

years, the defendant continued its practice of overwriting e-mails every 12 months. Based on this,<br />

the court ordered the defendant to produce backup tapes, review e-mails, conduct searches,<br />

produce responsive e-mails <strong>and</strong> a privilege log, <strong>and</strong> certify compliance with the order. The<br />

defendant issued the compliance certification in spite of having more than 1,400 backup tapes<br />

containing data not yet processed or produced. Throughout the discovery process, the defendant<br />

overwrote e-mails, failed to notify <strong>and</strong> timely process hundreds of DLT <strong>and</strong> 8mm tapes, <strong>and</strong> failed<br />

to produce e-mails <strong>and</strong> attachments. The court found the plaintiff did not receive relevant e-mail<br />

due to the defendant’s discovery tactics <strong>and</strong> granted the motion for an adverse inference<br />

instruction noting “[t]he conclusion is inescapable that [the defendant] sought to thwart discovery.”<br />

The court ordered the defendant to continue complying with the earlier discovery order <strong>and</strong> to pay<br />

costs associated with the plaintiff’s motion. The court also noted the defendant “gave no thought to<br />

using an outside contractor to expedite the process of completing the discovery, though it had<br />

certified completion months earlier; it lacked the technological capacity to upload <strong>and</strong> search the<br />

data at that time, <strong>and</strong> would not attain that capacity for months.” See also Coleman (Parent)<br />

Holdings, Inc. v. Morgan Stanley & Co., Inc., 2005 WL 674885 (Fla. Cir. Ct. Mar. 23, 2005);<br />

Coleman (Parent) Holdings, Inc. v. Morgan Stanley & Co., Inc., No. CA 03-5045 AI (Fla. Cir. Ct.<br />

Jun. 23, 2005)(awarding prejudgment interest of $207 million).<br />

� Four Seasons Hotels <strong>and</strong> Resorts v. Consorcio Barr, 267 F. Supp. 2d 1268 (S.D.Fla. 2003),<br />

aff’d in part <strong>and</strong> rev’d in part, 138 Fed.Appx. 297 (11th Cir. 2005). The plaintiff brought an action<br />

against the defendant licensee alleging, among other things, violations of the <strong>Computer</strong> Fraud <strong>and</strong><br />

Abuse Act, <strong>Electronic</strong> Communications Privacy Act, <strong>and</strong> Uniform Trade Secrets Act. A computer<br />

forensic investigation revealed that the defendant accessed the plaintiff’s computer network,<br />

downloaded confidential data onto backup tapes, fabricated electronic evidence, <strong>and</strong> deleted files<br />

<strong>and</strong> overwrote data prior to his computer being turned over for inspection to the plaintiff. The court<br />

held that the defendant acquired the plaintiff’s confidential customer information through improper<br />

means, namely, by theft <strong>and</strong> by espionage through electronic means. The court issued a judgment<br />

for the plaintiff <strong>and</strong> ordered monetary damages, among other relief.<br />

� Southern Diagnostic Assoc. v. Bencosme, 833 So.2d 801 (Fla. Dist. Ct. App. 2002). The<br />

appellate court quashed an order against Southern Diagnostic, a non-party in an insurance suit<br />

brought by Bencosme, compelling discovery of certain contents of its computer system. The<br />

appellate court held that that trial court’s order was overly broad, setting no parameters or<br />

303

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!