17.01.2013 Views

Electronic Discovery and Computer Forensics Case List - Kroll Ontrack

Electronic Discovery and Computer Forensics Case List - Kroll Ontrack

Electronic Discovery and Computer Forensics Case List - Kroll Ontrack

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

<strong>and</strong> found that the records produced matched “perfectly.” Contrary to the defendant’s claim, the<br />

expert explained that it was “highly unlikely” that the data became corrupt as a result of the process<br />

used to copy the data. Rather, the data on the archival media had been manually manipulated.<br />

Based on the expert’s testimony, the court granted judgment in favor of the plaintiff.<br />

� Byrne v. Byrne, 650 N.Y.S.2d 499 (N.Y. Sup. Ct. 1996). In a divorce proceeding, the wife sought<br />

access to her husb<strong>and</strong>’s computer, which husb<strong>and</strong> used for both business <strong>and</strong> personal purposes<br />

even though computer was provided by husb<strong>and</strong>’s employer. The wife was awarded such access<br />

to search the computer for information about the couple’s finances <strong>and</strong> marital assets.<br />

� Anti-Monopoly, Inc. v. Hasbro, Inc., 1995 WL 649934 (S.D.N.Y. Nov. 3, 1995). The court found<br />

that the law is clear that data in computerized form is discoverable even if paper copies of the<br />

information have been produced. The producing party can be required to design a computer<br />

program to extract the data from its computerized business records. But such an order is subject to<br />

the court’s discretion as to the allocation of the costs of designing such a computer program.<br />

� Strauss v. Microsoft Corp., 1995 WL 326492 (S.D.N.Y. June 1, 1995). The court denied<br />

Microsoft’s motion to exclude evidence of offensive e-mails in a hostile work environment lawsuit.<br />

� Santiago v. Miles, 121 F.R.D. 636 (W.D.N.Y. 1988). The court noted that “[a] request for raw<br />

information in computer banks is proper <strong>and</strong> the information is obtainable under the discovery<br />

rules.”<br />

� United States v. IBM, 76 F.R.D. 97 (S.D.N.Y. 1977) Where the defendant was to produce<br />

information to the plaintiff pursuant to prior court orders, but production did not comport with spirit<br />

<strong>and</strong> intent of those orders <strong>and</strong> was highly technical <strong>and</strong> complex in nature, the court determined<br />

that “exceptional conditions” existed, warranting appointment of examiner. The examiner’s duties<br />

included reporting to court as to information that the defendant possessed <strong>and</strong> produced <strong>and</strong><br />

supervising discovery.<br />

Vermont<br />

� In re Boucher, 2007 WL 4246473 (D.Vt. Nov. 29, 2007). In this criminal case, the defendant was<br />

stopped at the customs <strong>and</strong> border station while entering Vermont from Canada. Agents searched<br />

his laptop <strong>and</strong> found what appeared to be images of child pornography. The defendant was<br />

arrested <strong>and</strong> charged with transportation of child pornography. After imagining the defendant’s<br />

hard drive, agents learned they were unable to further access the files on the drive because the<br />

files were encrypted, password protected <strong>and</strong> inaccessible. Thereafter, the government<br />

subpoenaed the defendant <strong>and</strong> directed him to provide all documents that reflected the password.<br />

The defendant moved to quash the subpoena, claiming compliance would violate his Fifth<br />

Amendment right against self-incrimination. The court reiterated the requirements for Fifth<br />

Amendment protection as: a compelled, testimonial communication that is incriminating in nature.<br />

The court determined that a subpoena constitutes compulsion because it requires compliance <strong>and</strong><br />

as the files sought allegedly contained child pornography, entry of the password would therefore be<br />

incriminating. As such, the contentious issue was whether entry of the password constituted a<br />

testimonial communication. The court held that entering a password into a computer communicates<br />

facts that convey the contents of one’s mind, <strong>and</strong> therefore found the act of entering this password<br />

to be testimonial, implicitly demonstrating that the defendant knew the password <strong>and</strong> had access to<br />

the files. The court therefore granted the defendant’s motion to quash the subpoena.<br />

76

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!