Electronic Discovery and Computer Forensics Case List - Kroll Ontrack
Electronic Discovery and Computer Forensics Case List - Kroll Ontrack
Electronic Discovery and Computer Forensics Case List - Kroll Ontrack
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
The court held that the e-mail was protected work product <strong>and</strong> that the defendant did not waive its<br />
immunity by forwarding the document to her daughter.<br />
� Xpedior Credit Trust v. Credit Suisse First Boston, 2003 WL 22283835 (S.D. N.Y. Oct. 2,<br />
2003). The plaintiff moved for an order to compel the defendant to produce certain electronic<br />
documents in connection with the breach of contract action. The defendant countered with a<br />
motion for a protective order requiring the plaintiff to bear half the costs of producing the electronic<br />
documents. The documents at issue reside on optical disks <strong>and</strong> DLT tapes. Applying the Zubulake<br />
seven factor cost shifting test, the court found that cost shifting was not appropriate <strong>and</strong> ordered<br />
the defendant to bear its own costs in producing the electronic data.<br />
� United States v. Rigas, 281 F. Supp. 2d 733 (S.D.N.Y. 2003). The government in a bank fraud,<br />
wire fraud, <strong>and</strong> securities fraud case issued gr<strong>and</strong> jury subpoenas to several executives <strong>and</strong> topemployees<br />
in the company, Adelphia Communications Corporation, being investigated. Adelphia<br />
produced copies of 26 computer hard drives in response to the subpoenas. The Assistant United<br />
States Attorneys assigned to the matter directed their staff to install the hard drives in certain<br />
computer terminals belonging to the United States Attorney’s Office (“USAO”) so that the data<br />
could be reviewed. The staff informed was informed that the hard drives “were evidence” <strong>and</strong><br />
should be installed in such a way as to prevent additions to or deletions from those drives. Shortly<br />
thereafter, the computer consultant hired by defense counsel was permitted to make copies of the<br />
hard drives in question at the main USAO office. In the course of reviewing the images, defense<br />
counsel’s computer expert determined that several USAO confidential files associated with the<br />
case at issue as well as other pending cases were produced during the imaging. The defendants<br />
argued that the Government waived its work product privilege when it voluntarily permitted defense<br />
counsel to copy the hard drives. The Government contended that disclosure of USAO files was<br />
inadvertent <strong>and</strong> therefore did not constitute waiver of the privilege. The court used a four part<br />
balancing test to determine that no waiver of privilege had occurred.<br />
� Keir v. UnumProvident, 2003 WL 21997747 (S.D.N.Y. Aug. 22, 2003). In an ERISA class action<br />
suit, the plaintiffs sought an order from the court directing the defendant to preserve all electronic<br />
evidence relevant to the matter. After noting that the defendant “already had a duty to preserve any<br />
tapes containing e-mails as of the date litigation commenced,” the court ordered the defendant to<br />
preserve all relevant electronic data <strong>and</strong> to specifically preserve six days of e-mail records which<br />
were contained on backup tapes <strong>and</strong> hard drives. Instead of preserving all existing backups, or<br />
conducting a full tape e-mail backup, the defendant’s technical staff decided to implement a special<br />
snapshot backup which would only preserve e-mails on the system as of the day or days the<br />
snapshot was taken. In evaluating the defendant’s conduct with respect to the preservation order,<br />
the court stated that “UnumProvident had ample time in the weeks before the December 27<br />
[preservation] Order was signed to consult with its IT Department <strong>and</strong> with IBM to inform itself<br />
about the technological issues relevant to the preservation of electronic data so that it could bring<br />
accurate information to the negotiations of the preservation order <strong>and</strong> the conferences with the<br />
court in which the December 27 Order was shaped, <strong>and</strong> comply promptly with the Order after it<br />
was issued.” The court found the defendant’s failure to preserve was unintentional <strong>and</strong> criticized<br />
the defendant’s poor compliance with the preservation order. The court recommended that further<br />
action be taken to determine the feasibility of retrieving the lost data <strong>and</strong> the extent of prejudice to<br />
the plaintiffs in order for the court to fashion a remedy for the plaintiffs.<br />
� The Carlton Group v. Tobin, 2003 WL 21782650 (S.D.N.Y. July 31, 2003). The plaintiff, a<br />
financial services company, brought suit against several defendants claiming that the defendants<br />
deleted files from the plaintiff’s computers, conspired to steal confidential <strong>and</strong> proprietary<br />
70