17.01.2013 Views

Electronic Discovery and Computer Forensics Case List - Kroll Ontrack

Electronic Discovery and Computer Forensics Case List - Kroll Ontrack

Electronic Discovery and Computer Forensics Case List - Kroll Ontrack

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

equally all costs associated with hiring a computer forensics expert to inspect the laptop.<br />

Additionally, the defendant was required to buy a new laptop for the plaintiff.<br />

� United States v. Triumph Capital Group, 211 F.R.D. 31 (D.Conn. 2002). In order to prevent<br />

spoliation of evidence in a public corporation case, the government sought <strong>and</strong> obtained a search<br />

warrant to search <strong>and</strong> seize a laptop computer at issue. The warrant did not limit the search to any<br />

particular area of the hard drive. However, it did limit the government to search for <strong>and</strong> seize only<br />

certain evidence relating specifically to the charges <strong>and</strong> to follow detailed protocols to avoid<br />

revealing any privileged information. So that the data would not be altered, the government made<br />

mirror images of the hard drive <strong>and</strong> then proceeded with the computer forensic investigation. The<br />

defendants argued that this mirroring amounted to a search <strong>and</strong> seizure of the entire hard drive<br />

<strong>and</strong> moved to suppress all evidence from the laptop. The court determined that although the<br />

search warrant limited the scope of the information that investigators could search for, technical<br />

realities required the government to make complete mirror images of the hard drive. Furthermore,<br />

the court ruled that copying a file does not necessarily constitute seizure of that file <strong>and</strong> that<br />

examining a file more than once does not constitute multiple searches under the Fourth<br />

Amendment.<br />

� Hayes v. Compass Group USA, Inc., 202 F.R.D. 363 (D. Conn 2001). The plaintiff in an age<br />

discrimination action requested information on similar claims filed against the defendant. The<br />

defendant advised the court of the burden <strong>and</strong> expense involved with such a request given that<br />

some of the data was stored in a non-searchable computer format. The court ordered the<br />

defendant to manually search the unsearchable computer data <strong>and</strong> to produce all information for<br />

which it had computer search capabilities.<br />

� SKW Real Estate Ltd. v. Gallicchio, 716 A.2d 903 (Conn. App. Ct. 1998). A computer-generated<br />

document is admissible in a foreclosure action, pursuant to the business records exception to the<br />

hearsay rule.<br />

� Scovish v. Upjohn Co., 1995 WL 731755 (Conn. Super. Ct. Nov. 22, 1995). The court found that<br />

database was within attorney work-product, but that the plaintiff had substantial need of the<br />

information in the database <strong>and</strong> undue hardship would result if it was not produced. The court<br />

ordered the defendant to produce the database after removing any portions that contain subjective<br />

thoughts <strong>and</strong> opinions.<br />

New York<br />

� People v. Harris, 2011NY080152 (NY Crim. Ct. New York Co. June 30, 2012). In this criminal<br />

matter arising out of the Occupy Wall Street protests, the court reviewed Twitter’s motion to quash<br />

a subpoena, which ordered the production of tweets <strong>and</strong> pertinent metadata from a user’s account.<br />

The threshold determination required an assessment of whether the criminal defendant or the third<br />

party respondent (Twitter) had st<strong>and</strong>ing to quash the subpoena. In line with the court’s previous<br />

ruling on this matter, the court pointed to Twitter’s terms <strong>and</strong> policy, holding that Twitter—not the<br />

criminal defendant—had st<strong>and</strong>ing to challenge the subpoena. Addressing Twitter’s contention that<br />

responding to numerous subpoenas would result in an undue burden (<strong>and</strong> thus barred by the<br />

SCA), the court held that because all third party respondents bear this burden, the argument<br />

“cannot be used to create st<strong>and</strong>ing for a defendant where none exists.” Further, the court noted<br />

that “it does not take much to search <strong>and</strong> provide the data to the court.” The court found that<br />

Twitter’s services fall within the statutory definition of both an <strong>Electronic</strong> Communication Service<br />

(ECS) (generally, a communication service) <strong>and</strong> a Remote Communication Service (RCS)<br />

31

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!