Electronic Discovery and Computer Forensics Case List - Kroll Ontrack
Electronic Discovery and Computer Forensics Case List - Kroll Ontrack
Electronic Discovery and Computer Forensics Case List - Kroll Ontrack
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
equire the non-party to allow the plaintiff, a competitor, to “thumb through an electronic file drawer”<br />
to double-check document review for relevance. However, the court found evidence of an<br />
underst<strong>and</strong>ing that the plaintiff would receive a written vendor report <strong>and</strong> allowed the plaintiff the<br />
option to seek the report at its own expense.<br />
� United States v. Crist, 2008 WL 4682806 (M.D.Pa. Oct. 22, 2008). In this criminal action, the<br />
defendant filed a motion to suppress evidence recovered from his computer, claiming its search<br />
was warrantless, in violation of his Fourth Amendment rights. The defendant did not consent to the<br />
search of his computer; rather he reported it stolen upon learning that it was given away. However,<br />
upon receipt, the forensic examiner hashed the drive then took a forensic image. Then, the<br />
examiner hashed the image, later comparing the hash value to files known to contain pornographic<br />
images. The court determined that subjecting the computer to a hash value analysis constituted a<br />
search, reasoning that instead of the hard drive being analogous to an individual item, it constitutes<br />
multiple items as it is comprised of many platters with multiple data storage units. The court<br />
accordingly granted the defendant’s motion to suppress the evidence obtained from the forensic<br />
search of his computer.<br />
� Law Office of Douglas T. Harris, Esq. v. Philadelphia Waterfront Partners, LP, 2008 WL<br />
4291319 (Pa.Super. Sept. 22, 2008). In this breach of contract case, inter alia, the defendants<br />
appealed the trial court’s order requiring the production of two of the defendants’ “broken”<br />
computers. The defendants argued against production, claiming the computers may contain<br />
privileged documents. In response the plaintiffs argued the defendants previously agreed to<br />
produce the computers at trial. Disagreeing with the defendants, the court held the privilege was<br />
waived as a result of the defendants’ prior agreement to produce the computers.<br />
� Young v. Pleasant Valley Sch. Dist., 2008 WL 2857912 (M.D.Pa. July 21, 2008). In this civil<br />
rights case, the plaintiffs requested production of e-mail stored on backup tapes. The defendants<br />
objected, arguing the request was unduly burdensome <strong>and</strong> unlikely to produce relevant material. In<br />
response to a previous court order, the defendant provided an estimate that the search’s cost<br />
would be a minimum of $10,000. The court analyzed the factors laid out in Fed.R.Civ.P. 26(b)(2)<br />
<strong>and</strong> cited three factors that weighed against requiring production: (1) the burden <strong>and</strong> expense of<br />
the proposed discovery outweighed its likely benefit; (2) the needs of the case limit the usefulness<br />
of the information sought as it could be accessed in a more cost-efficient <strong>and</strong> less burdensome<br />
manner; <strong>and</strong> (3) the resources of the parties involved <strong>and</strong> the amount in controversy were relatively<br />
small. The court also rejected the plaintiffs’ offer to have their own expert search the backup tapes<br />
finding the request unduly burdensome, impractical <strong>and</strong> contrary to the spirit of the Federal Rules,<br />
noting that privacy concerns would undoubtedly require the defendant to closely supervise the<br />
plaintiff’s search thus creating unnecessary costs.<br />
� Square D. Co. v. Scott Elec. Co., 2008 WL 2779067 (W.D.Pa. July 15, 2008). In this intellectual<br />
property litigation, the parties filed cross motions for sanctions based on the execution of a<br />
previous forensic inspection of the defendant’s computer systems. The plaintiff requested a<br />
forensic inspection of the defendant’s remaining computer systems, the removal of imaged data<br />
from the defendants’ premises, <strong>and</strong> for a default judgment sanction. The defendant requested the<br />
plaintiff be required to complete its forensic inspection on the defendant’s premises, that further<br />
inspection of certain computers be prohibited, <strong>and</strong> sanctions for the plaintiff’s intentional disregard<br />
for previous orders. Determining the defendant’s imposition of limitations to be untimely, the court<br />
granted the plaintiff access to the defendant’s computer workstations. However, the court denied<br />
the plaintiff’s motion for default judgment as the defendant’s conduct “falls just shy of conduct<br />
befitting default judgment, i.e., ‘flagrant bad faith’ <strong>and</strong> ‘callous disregard.’” The court ordered the<br />
99