Electronic Discovery and Computer Forensics Case List - Kroll Ontrack
Electronic Discovery and Computer Forensics Case List - Kroll Ontrack
Electronic Discovery and Computer Forensics Case List - Kroll Ontrack
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
Regarding the defendants’ relevancy <strong>and</strong> volume objections, the court noted the defendants<br />
previously had the opportunity to narrow the search terms <strong>and</strong> provide a list of people that could<br />
help reduce the number of e-mail boxes searched, which they did not take advantage of. The court<br />
therefore refused relief stating, “Defendants must now lie in the bed that they have made.”<br />
� Connor v. Sun Trust Bank, 2008 WL 623027 (N.D.Ga. Mar. 5, 2008). In this litigation alleging<br />
interference <strong>and</strong> retaliation claims under FMLA, the plaintiff filed a motion for sanctions based on<br />
the defendant’s failure to produce a highly relevant e-mail during discovery. The plaintiff located,<br />
through other means, a relevant e-mail that explained her dismissal to other employees. The<br />
defendant moved for summary judgment relying on their 30-day e-mail destruction policy which<br />
automatically deleted e-mails that were thirty days old, unless they were first archived by the user.<br />
The court, un-persuaded by the defendant’s reasoning, granted the plaintiff’s motion for sanctions<br />
<strong>and</strong> issued an adverse jury instruction.<br />
� Arista Records LLC v. Does 1-7, 2008 WL 542709 (M.D.Ga. Feb. 25, 2008). In this copyright<br />
infringement suit, the plaintiffs filed a motion seeking expedited discovery to obtain basic<br />
information about the alleged infringers from the third-party Internet Service Provider. The plaintiffs<br />
sought the name, current <strong>and</strong> permanent address, phone number, e-mail address <strong>and</strong> Media<br />
Access Control address for the individuals linked to the Internet Protocol addresses involved in the<br />
alleged distribution of the copyrighted materials over the peer-to-peer file sharing network at issue.<br />
The court granted the motion based on good cause established by the lack of other means to<br />
obtain the information <strong>and</strong> the prima facia showing of copyright infringement, combined with the<br />
expediency created by the limited retention of user activity logs.<br />
� Petcou v. C.H. Robinson Worldwide, Inc., 2008 WL 542684 (N.D.Ga. Feb. 25, 2008). In this<br />
employment discrimination suit alleging company-wide sexual harassment, the plaintiffs filed a<br />
renewed motion to compel the defendants to produce documents, including e-mails, that were<br />
sexual or of a gender derogatory nature from 1998 through 2006. The defendants claimed the email<br />
was not reasonably accessible due to undue burden <strong>and</strong> cost as it required the restoration of<br />
numerous backup tapes <strong>and</strong> claimed fees of $79,300 for e-mail restoration from a single employee<br />
over a two year period. Agreeing with the defendants, the court found the burden of the request to<br />
outweigh the likely benefit <strong>and</strong> limited the retrieval to two narrow categories of e-mail: (1) undeleted<br />
e-mail of current employees specifically named by the plaintiffs; <strong>and</strong> (2) any relevant e-mails of the<br />
nature cited by the plaintiff of which the defendants were aware of <strong>and</strong> had retained. Additionally,<br />
the court denied the plaintiffs’ request for spoliation sanctions, finding the defendants’ document<br />
destruction policy reasonable.<br />
� Barton v. State, 2007 WL 1775565 (Ga.App. June 21, 2007). In a suit charging the defendant of<br />
knowingly possessing child pornography, the Georgia Court of Appeals reversed the jury trial<br />
conviction based in large part on computer forensic evidence. A computer forensic analyst testified<br />
that computers store information viewed over the internet on the hard drive in temporary internet<br />
cache files <strong>and</strong> that there is nothing the user can do to prevent this. The computer forensic expert<br />
further explained that there is no way to determine if the stored files were affirmatively sought after<br />
by the user or were pop-ups. Additionally, a user is not able to retrieve these files without special<br />
forensic software, which was not present on the defendant’s computer. As knowing possession of<br />
child pornography requires proof of an affirmative step to save or download images to the<br />
computer <strong>and</strong> knowledge of their existence, the defendant did not have the required culpability to<br />
be held guilty of the crime.<br />
� Williams v. Taser Int’l Inc., 2007 WL 1630875 (N.D.Ga. June 4, 2007). In a wrongful death action,<br />
the plaintiffs brought three motions before the court to resolve numerous discovery disputes. The<br />
307