17.01.2013 Views

Electronic Discovery and Computer Forensics Case List - Kroll Ontrack

Electronic Discovery and Computer Forensics Case List - Kroll Ontrack

Electronic Discovery and Computer Forensics Case List - Kroll Ontrack

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

cost <strong>and</strong> time considerations required to complete this work. The plaintiff argued the affidavits were<br />

“incomplete, misleading <strong>and</strong> contain ‘outright false statements’ because they improperly focused<br />

on back-up tapes <strong>and</strong>…[failed to address] the costs of searching <strong>and</strong> contents of the Database <strong>and</strong><br />

archives that <strong>Kroll</strong> [<strong>Ontrack</strong>] maintains containing WestLB e-mails” from past e-discovery projects.<br />

Rejecting this argument, the court declared the defendant correctly focused on the backup tapes<br />

as “they were the most complete source for the e-mails.” In refusing to award sanctions, the court<br />

stated, “the fact that defendant is producing e-mails from the most complete, but most expensive,<br />

source is compelling evidence of defendant’s honesty <strong>and</strong> good faith.” See also Quinby v.<br />

WestLB AG, 2006 WL 59521 (S.D.N.Y. Jan. 11, 2006)(order granting motion to quash two<br />

subpoenas seeking “all e-mails sent to or received by plaintiff’s personal e-mail account during the<br />

period from October 2002 throughout July 2004, other than e-mails between plaintiff <strong>and</strong> her<br />

current <strong>and</strong> former counsel.”)<br />

� In re Natural Gas Commodity Litigation, 2005 WL 3036505 (S.D.N.Y. Nov. 14, 2005) decision<br />

set aside in part by 235 F.R.D. 241 (S.D.N.Y. Apr 18, 2006). In a lawsuit relating to natural gas<br />

price fixing, the plaintiffs sought to compel production of published trade data from two non-parties.<br />

The non-parties objected arguing, inter alia, that producing the information would be unduly<br />

burdensome. The court found the subpoena was not unduly burdensome with respect to one of the<br />

non-parties, <strong>and</strong> noted the non-party had already produced redacted <strong>and</strong> un-redacted electronic<br />

versions of requested spreadsheets to the government in connection with a criminal matter. The<br />

court stated, “While those spreadsheets themselves will not satisfy plaintiffs’ subpoenas here, they<br />

do show the [non-party] can produce this information in electronic format <strong>and</strong> still redact<br />

information about companies other than the target sources. . . .” The court also pointed out that the<br />

non-party had an outside document management firm overseeing the production <strong>and</strong> that the<br />

plaintiff agreed to pay for associated costs. The other non-party claimed some of the historical data<br />

sought was located on “old” <strong>and</strong> “antiquated individual computers.” In addressing this issue, the<br />

court required the parties to use a sampling protocol, “perhaps searching one of the ‘old’<br />

computers, with leave to re-visit the burden vs. utility question based on information from that<br />

process.”<br />

� Tilberg v. Next Mgmt. Co., 2005 WL 2759860 (S.D.N.Y. Oct. 24, 2005). During discovery, the<br />

court ordered the defendants to give the plaintiff’s computer forensic expert access to two e-mail<br />

servers <strong>and</strong> ordered the parties to split costs. However, when the forensic expert began his<br />

examination, he was unable to access the defendants’ second server. The defendants claimed this<br />

was the result of a system crash. After the discovery deadline passed, the plaintiff again sought<br />

access to the second server as well as permission to search the defendants’ central non-e-mail<br />

server <strong>and</strong> two specific employees’ desktop computers. The defendants submitted an affidavit from<br />

its information technology personnel indicating the computer system did not contain relevant<br />

documents. However, the plaintiff’s expert “found 187 occurrences of the word ‘Tilberg’ in ‘active<br />

space,’ which could have been found with st<strong>and</strong>ard search tools, <strong>and</strong> 97 occurrences of ‘Tilberg’ in<br />

deleted files.” The plaintiff declared the defendants should have produced these files without the<br />

need for a forensic search. Additionally, the plaintiff presented documents obtained from third<br />

parties that further proved relevant documents existed despite the defendant’s contrary claims.<br />

Finding the defendants “either inadvertently or deliberately delayed <strong>and</strong> obstructed discovery in this<br />

case,” the court ordered the defendants to provide the expert with access to the second e-mail<br />

server, the central server, <strong>and</strong> the two desktop computers. See also Tilberg v. Next Mgmt Co.,<br />

2005 WL 3543701 (S.D.N.Y. Dec. 28, 2005)(addressing the issue of privileged e-mails uncovered<br />

in the search).<br />

59

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!