17.01.2013 Views

Electronic Discovery and Computer Forensics Case List - Kroll Ontrack

Electronic Discovery and Computer Forensics Case List - Kroll Ontrack

Electronic Discovery and Computer Forensics Case List - Kroll Ontrack

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Regarding the defendants’ relevancy <strong>and</strong> volume objections, the court noted the defendants<br />

previously had the opportunity to narrow the search terms <strong>and</strong> provide a list of people that could<br />

help reduce the number of e-mail boxes searched, which they did not take advantage of. The court<br />

therefore refused relief stating, “Defendants must now lie in the bed that they have made.”<br />

� Connor v. Sun Trust Bank, 2008 WL 623027 (N.D.Ga. Mar. 5, 2008). In this litigation alleging<br />

interference <strong>and</strong> retaliation claims under FMLA, the plaintiff filed a motion for sanctions based on<br />

the defendant’s failure to produce a highly relevant e-mail during discovery. The plaintiff located,<br />

through other means, a relevant e-mail that explained her dismissal to other employees. The<br />

defendant moved for summary judgment relying on their 30-day e-mail destruction policy which<br />

automatically deleted e-mails that were thirty days old, unless they were first archived by the user.<br />

The court, un-persuaded by the defendant’s reasoning, granted the plaintiff’s motion for sanctions<br />

<strong>and</strong> issued an adverse jury instruction.<br />

� Arista Records LLC v. Does 1-7, 2008 WL 542709 (M.D.Ga. Feb. 25, 2008). In this copyright<br />

infringement suit, the plaintiffs filed a motion seeking expedited discovery to obtain basic<br />

information about the alleged infringers from the third-party Internet Service Provider. The plaintiffs<br />

sought the name, current <strong>and</strong> permanent address, phone number, e-mail address <strong>and</strong> Media<br />

Access Control address for the individuals linked to the Internet Protocol addresses involved in the<br />

alleged distribution of the copyrighted materials over the peer-to-peer file sharing network at issue.<br />

The court granted the motion based on good cause established by the lack of other means to<br />

obtain the information <strong>and</strong> the prima facia showing of copyright infringement, combined with the<br />

expediency created by the limited retention of user activity logs.<br />

� Petcou v. C.H. Robinson Worldwide, Inc., 2008 WL 542684 (N.D.Ga. Feb. 25, 2008). In this<br />

employment discrimination suit alleging company-wide sexual harassment, the plaintiffs filed a<br />

renewed motion to compel the defendants to produce documents, including e-mails, that were<br />

sexual or of a gender derogatory nature from 1998 through 2006. The defendants claimed the email<br />

was not reasonably accessible due to undue burden <strong>and</strong> cost as it required the restoration of<br />

numerous backup tapes <strong>and</strong> claimed fees of $79,300 for e-mail restoration from a single employee<br />

over a two year period. Agreeing with the defendants, the court found the burden of the request to<br />

outweigh the likely benefit <strong>and</strong> limited the retrieval to two narrow categories of e-mail: (1) undeleted<br />

e-mail of current employees specifically named by the plaintiffs; <strong>and</strong> (2) any relevant e-mails of the<br />

nature cited by the plaintiff of which the defendants were aware of <strong>and</strong> had retained. Additionally,<br />

the court denied the plaintiffs’ request for spoliation sanctions, finding the defendants’ document<br />

destruction policy reasonable.<br />

� Barton v. State, 2007 WL 1775565 (Ga.App. June 21, 2007). In a suit charging the defendant of<br />

knowingly possessing child pornography, the Georgia Court of Appeals reversed the jury trial<br />

conviction based in large part on computer forensic evidence. A computer forensic analyst testified<br />

that computers store information viewed over the internet on the hard drive in temporary internet<br />

cache files <strong>and</strong> that there is nothing the user can do to prevent this. The computer forensic expert<br />

further explained that there is no way to determine if the stored files were affirmatively sought after<br />

by the user or were pop-ups. Additionally, a user is not able to retrieve these files without special<br />

forensic software, which was not present on the defendant’s computer. As knowing possession of<br />

child pornography requires proof of an affirmative step to save or download images to the<br />

computer <strong>and</strong> knowledge of their existence, the defendant did not have the required culpability to<br />

be held guilty of the crime.<br />

� Williams v. Taser Int’l Inc., 2007 WL 1630875 (N.D.Ga. June 4, 2007). In a wrongful death action,<br />

the plaintiffs brought three motions before the court to resolve numerous discovery disputes. The<br />

307

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!