17.01.2013 Views

Electronic Discovery and Computer Forensics Case List - Kroll Ontrack

Electronic Discovery and Computer Forensics Case List - Kroll Ontrack

Electronic Discovery and Computer Forensics Case List - Kroll Ontrack

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

equire the non-party to allow the plaintiff, a competitor, to “thumb through an electronic file drawer”<br />

to double-check document review for relevance. However, the court found evidence of an<br />

underst<strong>and</strong>ing that the plaintiff would receive a written vendor report <strong>and</strong> allowed the plaintiff the<br />

option to seek the report at its own expense.<br />

� United States v. Crist, 2008 WL 4682806 (M.D.Pa. Oct. 22, 2008). In this criminal action, the<br />

defendant filed a motion to suppress evidence recovered from his computer, claiming its search<br />

was warrantless, in violation of his Fourth Amendment rights. The defendant did not consent to the<br />

search of his computer; rather he reported it stolen upon learning that it was given away. However,<br />

upon receipt, the forensic examiner hashed the drive then took a forensic image. Then, the<br />

examiner hashed the image, later comparing the hash value to files known to contain pornographic<br />

images. The court determined that subjecting the computer to a hash value analysis constituted a<br />

search, reasoning that instead of the hard drive being analogous to an individual item, it constitutes<br />

multiple items as it is comprised of many platters with multiple data storage units. The court<br />

accordingly granted the defendant’s motion to suppress the evidence obtained from the forensic<br />

search of his computer.<br />

� Law Office of Douglas T. Harris, Esq. v. Philadelphia Waterfront Partners, LP, 2008 WL<br />

4291319 (Pa.Super. Sept. 22, 2008). In this breach of contract case, inter alia, the defendants<br />

appealed the trial court’s order requiring the production of two of the defendants’ “broken”<br />

computers. The defendants argued against production, claiming the computers may contain<br />

privileged documents. In response the plaintiffs argued the defendants previously agreed to<br />

produce the computers at trial. Disagreeing with the defendants, the court held the privilege was<br />

waived as a result of the defendants’ prior agreement to produce the computers.<br />

� Young v. Pleasant Valley Sch. Dist., 2008 WL 2857912 (M.D.Pa. July 21, 2008). In this civil<br />

rights case, the plaintiffs requested production of e-mail stored on backup tapes. The defendants<br />

objected, arguing the request was unduly burdensome <strong>and</strong> unlikely to produce relevant material. In<br />

response to a previous court order, the defendant provided an estimate that the search’s cost<br />

would be a minimum of $10,000. The court analyzed the factors laid out in Fed.R.Civ.P. 26(b)(2)<br />

<strong>and</strong> cited three factors that weighed against requiring production: (1) the burden <strong>and</strong> expense of<br />

the proposed discovery outweighed its likely benefit; (2) the needs of the case limit the usefulness<br />

of the information sought as it could be accessed in a more cost-efficient <strong>and</strong> less burdensome<br />

manner; <strong>and</strong> (3) the resources of the parties involved <strong>and</strong> the amount in controversy were relatively<br />

small. The court also rejected the plaintiffs’ offer to have their own expert search the backup tapes<br />

finding the request unduly burdensome, impractical <strong>and</strong> contrary to the spirit of the Federal Rules,<br />

noting that privacy concerns would undoubtedly require the defendant to closely supervise the<br />

plaintiff’s search thus creating unnecessary costs.<br />

� Square D. Co. v. Scott Elec. Co., 2008 WL 2779067 (W.D.Pa. July 15, 2008). In this intellectual<br />

property litigation, the parties filed cross motions for sanctions based on the execution of a<br />

previous forensic inspection of the defendant’s computer systems. The plaintiff requested a<br />

forensic inspection of the defendant’s remaining computer systems, the removal of imaged data<br />

from the defendants’ premises, <strong>and</strong> for a default judgment sanction. The defendant requested the<br />

plaintiff be required to complete its forensic inspection on the defendant’s premises, that further<br />

inspection of certain computers be prohibited, <strong>and</strong> sanctions for the plaintiff’s intentional disregard<br />

for previous orders. Determining the defendant’s imposition of limitations to be untimely, the court<br />

granted the plaintiff access to the defendant’s computer workstations. However, the court denied<br />

the plaintiff’s motion for default judgment as the defendant’s conduct “falls just shy of conduct<br />

befitting default judgment, i.e., ‘flagrant bad faith’ <strong>and</strong> ‘callous disregard.’” The court ordered the<br />

99

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!