Archive - 2008

1
Client and Counsel Jointly and Severally Liable for Monetary Sanctions Based on Inadequate Search for and Untimely Production of ESI; Evidentiary Sanctions Also Recommended
2
Plaintiff’s Reformatting of Hard Drives Sought in Discovery Warrants Adverse Inference Instruction, Not Dismissal
3
Finding that Production of Privileged ESI Effected Waiver, Court Describes Risks of Privilege Review Using Keyword Searches and Offers Guidance on Proper Assertion of Privilege
4
Maryland Law Firm Seeks Guidance on Whether Electronic Transmission of Data to Legal Process Outsourcing Company in India Waives Fourth Amendment Protections
5
SEC Proposes New Way for Investors to Get Financial Information on Companies
6
E-Discovery Problem Solving for Paralegals
7
E-Discovery Compliance Starts with Records Management Plan
8
Court Sets Protocol for Forensic Inspection of Plaintiff’s Computer Systems
9
Microsoft Device Helps Police Pluck Evidence from Cyberscene of Crime
10
Court Reminds Parties of Their Duty to Preserve and Enters Preservation Order

Client and Counsel Jointly and Severally Liable for Monetary Sanctions Based on Inadequate Search for and Untimely Production of ESI; Evidentiary Sanctions Also Recommended

R & R Sails Inc. v. Ins. Co. of Pa., 251 F.R.D. 520 (S.D. Cal. 2008)

After a fire destroyed plaintiff’s manufacturing facility, defendant paid plaintiff for loss of property, but plaintiff claimed that the value of all lost property exceeded the amount paid.  Plaintiff also sought further payment under the insurance contract for loss of income, business interruption and extra expenses.  Plaintiff sued to enforce the contract, and also alleged bad faith in the handling of the claim.

In discovery, plaintiff noted that "conspicuously absent" from defendant’s production of documents were "electronic or handwritten daily activity records/logs which are generally kept with an adjuster’s notes and telephone call records.”   Defendant insisted that the documents did not exist.  During a discovery conference on the matter, the court expressed doubt as to the records’ nonexistence and ordered defendant either to produce the requested documents or submit a sworn declaration that the records did not exist.  Defendant thereafter submitted a sworn declaration from its senior property claims examiner (Lombardo) stating that "[t]here were no daily activity logs or telephone record logs that were created or maintained in connection with plaintiff’s claim."

Read More

Plaintiff’s Reformatting of Hard Drives Sought in Discovery Warrants Adverse Inference Instruction, Not Dismissal

Johnson v. Wells Fargo Home Mortgage, Inc., 2008 WL 2142219 (D. Nev. May 16, 2008)

In this case, plaintiff alleged that defendant erroneously reported two of his real property mortgage loans delinquent to credit reporting agencies.  Plaintiff claimed that defendant foreclosed on one loan and continued to erroneously report both loans delinquent after plaintiff spent nine months making multiple phone calls and sending correspondence, including cancelled checks and loan documents, verifying the loans were current.

Defendant contended that plaintiff’s Fair Credit Reporting Act claim was supported with various letters he drafted on his two laptops and were “the very foundation of his claim.”  Defendant further contended that computer evidence revealed plaintiff may have manufactured the documents to support his claim and then flagrantly reformatted the hard drives on the laptops shortly after defendant informed him that they had been formally requested and were relevant to the case.

Read More

Finding that Production of Privileged ESI Effected Waiver, Court Describes Risks of Privilege Review Using Keyword Searches and Offers Guidance on Proper Assertion of Privilege

Victor Stanley, Inc. v. Creative Pipe, Inc., 250 F.R.D. 251 (D. Md. 2008)

In this case, plaintiff sought a ruling that 165 electronic documents produced by defendants were not privileged because their production occurred under circumstances that waived any privilege or protected status.  The parties had previously agreed to a joint protocol to search and retrieve relevant ESI responsive to plaintiff’s Rule 34 requests.  The protocol contained detailed search and information retrieval instructions, including nearly five pages of keyword/phrase search terms aimed at locating responsive ESI.

In March 2007, defense counsel notified the court that individualized privilege review of the responsive ESI would delay production unnecessarily and cause undue expense.  To address this concern, defendants gave their computer forensics expert a list of keywords to be used to search and retrieve privileged and protected documents from the population of documents that were to be produced to plaintiff, and requested that the court approve a “clawback agreement” fashioned to address the concerns noted in Hopson v. Mayor of Baltimore, 232 F.R.D. 228 (D. Md. 2005).  Later, when the discovery deadline was extended, defense counsel notified the court that defendants would be able to conduct a document-by-document privilege review, thereby making a clawback agreement unnecessary.  Following their privilege review, defendants produced responsive ESI in September 2007.

Read More

Maryland Law Firm Seeks Guidance on Whether Electronic Transmission of Data to Legal Process Outsourcing Company in India Waives Fourth Amendment Protections

The law firm of Newman McIntosh & Hennessey, LLP of Bethesda, Maryland, has filed a federal lawsuit seeking declaratory and injunctive relief in order to gain certainty about whether the electronic transmission of data from the United States to a foreign legal services provider waives Fourth Amendment protection with respect to the data that is electronically transmitted.  The complaint explains the nature of the action as follows:

India-based Acumen Legal Services (India) Pvt., Ltd. (“Acumen India”) has solicited Newman McIntosh & Hennessey, LLP (“NMH”) to provide litigation support services to NMH from its offices in India.  Acumen India is part of a fast-growing industry of Legal Process Outsourcers (“LPO”) that promise lower litigation support costs through outsourcing litigation support services to foreign nationals who live and work overseas.  Acumen India, and other such LPOs (“litigation process outsourcers”), provides its litigation support services through the electronic transmission of documents and other data from U.S.-based law firms to Acumen India’s offices.  In its solicitation of NMH’s business, Acumen India informed NMH that it already provides such litigation support to certain District of Columbia and U.S. based attorneys (herein designated as “John Doe, Esq. and Jane Doe, Esq.”).  On information and belief, John Doe, Esq. and Jane Doe, Esq. are competitors to NMH or are adverse to NMH clients in litigation.

Read More

SEC Proposes New Way for Investors to Get Financial Information on Companies

Proposal Would Set New Electronic Records Management Requirements for U.S. Companies

Yesterday, the Securities and Exchange Commission voted unanimously to formally propose using new technology to get financial information to investors faster, more reliably, and at a lower cost.  The proposed rule would require all U.S. companies to provide financial information using interactive data beginning next year for the largest companies, and within three years for all public companies.

The SEC’s proposed schedule would require companies using U.S. Generally Accepted Accounting Principles with a worldwide public float over $5 billion (approximately the 500 largest companies) to make financial disclosures using interactive data formatted in eXtensible Business Reporting Language (XBRL) for fiscal periods ending in late 2008.  If adopted, the first interactive data provided under the new rules would be made public in early 2009.  The remaining companies using U.S. GAAP would provide this disclosure over the following two years.  Companies using International Financial Reporting Standards as issued by the International Accounting Standards Board would provide this disclosure for fiscal periods ending in late 2010.  The disclosure would be provided as additional exhibits to annual and quarterly reports and registration statements.  Companies also would be required to post this information on their websites.

Read More

E-Discovery Problem Solving for Paralegals

Thursday, May 22, 2008
9 a.m. – 4:30 p.m.
Washington State Convention & Trade Center
800 Convention Place
Seattle , Washington

This intermediate-to-advanced level seminar will provide attendees with practical strategies for handling emerging e-discovery issues.

K&L Gates Seattle partner Julie Anne Halter will speak on several different subjects relating to e-discovery, including the scope of the duty to preserve, litigation holds and related duties, accessible/inaccessible data and cost shifting.

Click here for more information, or to register.

E-Discovery Compliance Starts with Records Management Plan

K&L Gates Pittsburgh partner David R. Cohen’s presentation at the recent RIMS 2008 Conference was highlighted in the May 5th edition of Business Insurance.  At the San Diego event, Mr. Cohen recommended to the insurance industry crowd that companies create an e-discovery team and institute a records management plan.  He also explained how the failure to produce electronic records timely and properly can result in significant penalties for litigants.

Read the complete article online here.

Court Sets Protocol for Forensic Inspection of Plaintiff’s Computer Systems

Ferron v. Search Cactus, L.L.C., 2008 WL 1902499 (S.D. Ohio Apr. 28, 2008)

In this case, plaintiff (a lawyer) brought claims under the Ohio Consumer Sales Practices Act based upon emails he received.  Because only the unsolicited emails plaintiff received would support his claim under the Act, it was necessary for the parties to ascertain which of the emails plaintiff received were unsolicited.  Plaintiff’s computer systems contained the only available documentary evidence that could show the pathways taken by plaintiff to solicit the emails or the absence of those pathways.

Defendants requested an inspection of plaintiff’s computer systems so as to ascertain whether plaintiff’s efforts with respect to receiving the emails and visiting the websites (that were at the heart of the action) constituted a consumer transaction under the OCSPA, or whether plaintiff’s opening of the emails and any attempts to obtain free merchandise were part of a business designed to profit from email litigation

Read More

Microsoft Device Helps Police Pluck Evidence from Cyberscene of Crime

The Seattle Times, April 29, 2008
By Benjamin J. Romano, Seattle Times technology reporter

Microsoft has developed a small plug-in device that investigators can use to quickly extract forensic data from computers that may have been used in crimes.

The COFEE, which stands for Computer Online Forensic Evidence Extractor, is a USB "thumb drive" that was quietly distributed to a handful of law-enforcement agencies last June.  Microsoft General Counsel Brad Smith described its use to the 350 law-enforcement experts attending a company conference Monday.

The device contains 150 commands that can dramatically cut the time it takes to gather digital evidence, which is becoming more important in real-world crime, as well as cybercrime.  It can decrypt passwords and analyze a computer’s Internet activity, as well as data stored in the computer.

It also eliminates the need to seize a computer itself, which typically involves disconnecting from a network, turning off the power and potentially losing data.  Instead, the investigator can scan for evidence on site.

More than 2,000 officers in 15 countries, including Poland, the Philippines, Germany, New Zealand and the United States, are using the device, which Microsoft provides free.

Read the full article here on the Seattle Times website.

Court Reminds Parties of Their Duty to Preserve and Enters Preservation Order

In re Flash Memory Antitrust Litig., 2008 WL 1831668 (N.D. Cal. Apr. 22, 2008)

The court’s order, in its entirety, provides:

All parties and their counsel are reminded of their duty to preserve evidence that may be relevant to this action.  The duty extends to documents, data, and tangible things in the possession, custody and control of the parties to this action, and any employees, agents, contractors, carriers, bailees, or other non-parties who possess materials reasonably anticipated to be subject to discovery in this action.  "Documents, data, and tangible things" shall be interpreted broadly to include writings, records, files, correspondence, reports, memoranda, calendars, diaries, minutes, electronic messages, voice mail, E-mail, telephone message records or logs, computer and network activity logs, hard drives, backup data, removable computer storage media such as tapes, discs and cards, printouts, document image files, Web pages, databases, spreadsheets, software, books, ledgers, journals, orders, invoices, bills, vouchers, check statements, worksheets, summaries, compilations, computations, charts, diagrams, graphic presentations, drawings, films, charts, digital or chemical process photographs, video, phonographic, tape or digital recordings or transcripts thereof, drafts, jottings and notes, studies or drafts of studies or other similar such material. Information that serves to identify, locate, or link such material, such as file inventories, file folders, indices, and metadata, is also included in this definition.  Until the parties reach an agreements on a preservation plan or the Court orders otherwise, each party shall take reasonable steps to preserve all documents, data, and tangible things containing information potentially relevant to the subject mater of this litigation.  In addition, counsel shall exercise all reasonable efforts to identify and notify parties and non-parties of their duties, including employees of corporate or institutional parties, to the extent required by the Federal Rules of Civil Procedure.

Copyright © 2022, K&L Gates LLP. All Rights Reserved.