Electronic Discovery and Computer Forensics Case List - Kroll Ontrack
Electronic Discovery and Computer Forensics Case List - Kroll Ontrack
Electronic Discovery and Computer Forensics Case List - Kroll Ontrack
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
cost <strong>and</strong> time considerations required to complete this work. The plaintiff argued the affidavits were<br />
“incomplete, misleading <strong>and</strong> contain ‘outright false statements’ because they improperly focused<br />
on back-up tapes <strong>and</strong>…[failed to address] the costs of searching <strong>and</strong> contents of the Database <strong>and</strong><br />
archives that <strong>Kroll</strong> [<strong>Ontrack</strong>] maintains containing WestLB e-mails” from past e-discovery projects.<br />
Rejecting this argument, the court declared the defendant correctly focused on the backup tapes<br />
as “they were the most complete source for the e-mails.” In refusing to award sanctions, the court<br />
stated, “the fact that defendant is producing e-mails from the most complete, but most expensive,<br />
source is compelling evidence of defendant’s honesty <strong>and</strong> good faith.” See also Quinby v.<br />
WestLB AG, 2006 WL 59521 (S.D.N.Y. Jan. 11, 2006)(order granting motion to quash two<br />
subpoenas seeking “all e-mails sent to or received by plaintiff’s personal e-mail account during the<br />
period from October 2002 throughout July 2004, other than e-mails between plaintiff <strong>and</strong> her<br />
current <strong>and</strong> former counsel.”)<br />
� In re Natural Gas Commodity Litigation, 2005 WL 3036505 (S.D.N.Y. Nov. 14, 2005) decision<br />
set aside in part by 235 F.R.D. 241 (S.D.N.Y. Apr 18, 2006). In a lawsuit relating to natural gas<br />
price fixing, the plaintiffs sought to compel production of published trade data from two non-parties.<br />
The non-parties objected arguing, inter alia, that producing the information would be unduly<br />
burdensome. The court found the subpoena was not unduly burdensome with respect to one of the<br />
non-parties, <strong>and</strong> noted the non-party had already produced redacted <strong>and</strong> un-redacted electronic<br />
versions of requested spreadsheets to the government in connection with a criminal matter. The<br />
court stated, “While those spreadsheets themselves will not satisfy plaintiffs’ subpoenas here, they<br />
do show the [non-party] can produce this information in electronic format <strong>and</strong> still redact<br />
information about companies other than the target sources. . . .” The court also pointed out that the<br />
non-party had an outside document management firm overseeing the production <strong>and</strong> that the<br />
plaintiff agreed to pay for associated costs. The other non-party claimed some of the historical data<br />
sought was located on “old” <strong>and</strong> “antiquated individual computers.” In addressing this issue, the<br />
court required the parties to use a sampling protocol, “perhaps searching one of the ‘old’<br />
computers, with leave to re-visit the burden vs. utility question based on information from that<br />
process.”<br />
� Tilberg v. Next Mgmt. Co., 2005 WL 2759860 (S.D.N.Y. Oct. 24, 2005). During discovery, the<br />
court ordered the defendants to give the plaintiff’s computer forensic expert access to two e-mail<br />
servers <strong>and</strong> ordered the parties to split costs. However, when the forensic expert began his<br />
examination, he was unable to access the defendants’ second server. The defendants claimed this<br />
was the result of a system crash. After the discovery deadline passed, the plaintiff again sought<br />
access to the second server as well as permission to search the defendants’ central non-e-mail<br />
server <strong>and</strong> two specific employees’ desktop computers. The defendants submitted an affidavit from<br />
its information technology personnel indicating the computer system did not contain relevant<br />
documents. However, the plaintiff’s expert “found 187 occurrences of the word ‘Tilberg’ in ‘active<br />
space,’ which could have been found with st<strong>and</strong>ard search tools, <strong>and</strong> 97 occurrences of ‘Tilberg’ in<br />
deleted files.” The plaintiff declared the defendants should have produced these files without the<br />
need for a forensic search. Additionally, the plaintiff presented documents obtained from third<br />
parties that further proved relevant documents existed despite the defendant’s contrary claims.<br />
Finding the defendants “either inadvertently or deliberately delayed <strong>and</strong> obstructed discovery in this<br />
case,” the court ordered the defendants to provide the expert with access to the second e-mail<br />
server, the central server, <strong>and</strong> the two desktop computers. See also Tilberg v. Next Mgmt Co.,<br />
2005 WL 3543701 (S.D.N.Y. Dec. 28, 2005)(addressing the issue of privileged e-mails uncovered<br />
in the search).<br />
59