17.01.2013 Views

Electronic Discovery and Computer Forensics Case List - Kroll Ontrack

Electronic Discovery and Computer Forensics Case List - Kroll Ontrack

Electronic Discovery and Computer Forensics Case List - Kroll Ontrack

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

document preservation order. The requested order would require the government to index<br />

electronic documents <strong>and</strong> would allow the plaintiff limited inspection of the documents. The<br />

government contended that the proposed order was unnecessary <strong>and</strong> overly burdensome, in part<br />

because document retention policies were already in place at the government agencies likely to be<br />

implicated in the suit. The court held that the plaintiff was required to demonstrate “that absent a<br />

court order, there is significant risk that relevant evidence will be lost or destroyed.” Additionally,<br />

the plaintiff “must show that the particular steps to be adopted will be effective, but not overbroad.”<br />

The plaintiff was able to produce evidence that the government had lost <strong>and</strong> destroyed documents<br />

in the past, including electronic records containing potentially relevant information. Based on this<br />

evidence, the court ordered the government to preserve all documents, including electronic<br />

information, e-mail, <strong>and</strong> metadata that contained relevant information or that might lead to the<br />

discovery of relevant information. The court further required the government to index all the<br />

documents <strong>and</strong> to report any documents that were destroyed. The court indicated that the<br />

possibility of sanctions “which the case law suggests may be severe…provides the<br />

incentive…needed to effectuate this preservation plan.”<br />

� Renda Marine v. United States, 58 Fed.Cl. 57 (Fed. Cl. 2003). In a government contract suit, a<br />

dispute arose regarding both parties’ duties to preserve evidence. Specifically, the plaintiff moved<br />

the court to compel access to the defendant’s hard drives, backup tapes, <strong>and</strong> e-mail systems,<br />

alleging that the defendant did not search any hard drives or backup tapes in preparing its<br />

response to the plaintiff’s document production requests. The defendant denied these allegations.<br />

The plaintiff further alleged that the defendant routinely deleted e-mail even after commencement<br />

of the suit <strong>and</strong> moved the court to sanction the defendant for such spoliation of evidence. The court<br />

held that, upon notice that litigation might occur, the defendant had a legal obligation to preserve<br />

evidence related to the plaintiff’s claim. The court directed the defendant to produce, at its<br />

expense, backup tapes created after such notice <strong>and</strong> to provide the plaintiff with access to the<br />

requested hard drive. The court further ordered the defendant to produce backup tapes pre-dating<br />

notice of the suit at the plaintiff’s expense. In a subsequent decision, Renda Marine v. United<br />

States, 62 Fed. Cl. 371 (Fed. Cl. 2004), the court determined e-mails sent to <strong>and</strong> from an attorney<br />

in the defendant’s general counsel office were privileged even after they were forwarded to nonattorneys<br />

in the agency.<br />

United States Air Force Court of Criminal Appeals<br />

� United States v. Sanchez, 59 M.J. 566 (A.F. Ct. Crim. App. 2003), aff’d in part <strong>and</strong> rev’d in part,<br />

60 M.J. 329 (A.F. Ct. Crim. App. 2004), aff’d by 61 M.J. 330 (U.S. Ct. App. A.F. 2005). A federal<br />

appellate military judge determined that the government produced sufficient evidence to prove that<br />

the defendant knowingly possessed child pornography images stored in his computer’s temporary<br />

Internet files. After making a mirror image of the computer’s hard drive, investigators used a<br />

software program called "Carve This" to uncover remnants of files that were overwritten or deleted<br />

from the hard drive. The program found that the presence of the images on the hard drive was<br />

consistent with someone viewing them on the Internet <strong>and</strong> the images then being automatically<br />

saved to the hard drive by the web browser. Combining this with evidence of the defendant’s<br />

subscriptions to nude teen websites, the court determined that the evidence supported the<br />

allegation that the defendant knowingly possessed the pornographic images.<br />

United States Tax Court<br />

311

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!