Author - kgates

1
Court Declines to Impose Sanctions Against Qualcomm Attorneys Absent Evidence of Bad Faith
2
Court Orders Forensic Examination of Plaintiff’s Computers Absent Denial that “Responsive Emails May have Existed at One Point”
3
Court Rules Communications with Attorney Using Work Computer are Protected as Privileged
4
Upcoming Events
5
New York State Unified Court System Report Makes Recommendations for Improved Handling of E-Discovery
6
Despite Malaysian Blocking Statute, Court Compels Third Party’s Production of Foreign Banking Information Pursuant to Subpoena
7
Citing First Amendment, Court Denies Motion to Compel Production of Information Sufficient to Identify Anonymous Discussion Board Users
8
Do You Comply with the New Massachusetts Information Security Regulation?
9
Plan Ahead: Proposed Amendments to Rule 26 Would Extend Work-Product Protection
10
Court Provides Detailed Analysis of Law of Spoliation, Orders Adverse Inference Instruction, Monetary Sanctions for Intentional Spoliation of ESI

Court Declines to Impose Sanctions Against Qualcomm Attorneys Absent Evidence of Bad Faith

Qualcomm Inc. v. Broadcom Corp., No. 05cv1958-B (BLM) (S.D. Cal. Apr. 2, 2010)

Apparently bringing an end to one of the best known e-discovery sagas since the 2006 amendments to the Federal Rules, United States Magistrate Judge Barbara Major has declined to impose sanctions against the previously sanctioned Qualcomm attorneys absent evidence of bad faith.

On January 7, 2008, Magistrate Judge Major issued an order granting in part defendant’s motion for sanctions upon finding that the plaintiff, Qualcomm, intentionally withheld thousands of documents and that six attorneys “had assisted Qualcomm in withholding the critical documents by failing to conduct a reasonable inquiry into the adequacy of Qualcomm’s document production and by ignoring warning signs, which indicated that the document search was not thorough and that Qualcomm’s documents production was not complete.”  The sanctioned attorneys objected.  Thereafter, U.S. District Court Judge Rudi Brewster determined that the sanctioned attorneys “had a right to defend themselves” and “should not be prevented from defending their conduct by the attorney-client privilege of Qualcomm and its employees and representatives.”  Finding the self-defense exception to the attorney-client privilege applicable, the court lifted the sanctions and remanded the case to the Magistrate Judge for additional consideration. A ccordingly, between March 2008 and the present, the previously sanctioned attorneys undertook significant efforts to defend their actions.  As a result of those efforts, Magistrate Judge Major has now declined to impose sanctions: 

Read More

Court Orders Forensic Examination of Plaintiff’s Computers Absent Denial that “Responsive Emails May have Existed at One Point”

Adhi v. Twp. of W. Pikeland, 2010 WL 1047894 (E.D. Pa. Mar. 16, 2010)

In this zoning dispute, defendant moved to enforce a prior order of the court and, essentially, compel more complete responses to discovery, including the production of electronically stored information (“ESI”), specifically emails.  Plaintiff indicated that even if responsive emails had existed, they were deleted in the ordinary course of business.  Accepting defendant’s assertions that “the mere deletion of an email does not make it lost forever”, however, the court ordered plaintiff to allow defendant’s “e-Discovery expert” to inspect plaintiff’s computers to determine if any responsive information was still contained on the hard drives or the servers.  In so ordering, the court reasoned that this would “allow Defendant to conduct discovery on information to which it is entitled without burdening Plaintiff with the expense of hiring a discovery expert.”

Read More

Court Rules Communications with Attorney Using Work Computer are Protected as Privileged

Stengart v. Loving Care Agency, Inc., 2010 WL 1189458 (N.J. Mar. 30, 2010)

In this employment litigation, the Supreme Court of New Jersey addressed whether employees have a reasonable expectation of privacy as to attorney-client privileged emails sent and received on a work computer.  The court held that under the circumstances presented, the employee/plaintiff did have a reasonable expectation of privacy as to emails with her attorney.  Additionally, the court remanded the case to the trial court to determine what, if any, sanctions should be imposed upon defense counsel for reading and utilizing the emails at issue, despite indications that they were protected as privileged.

Read More

Upcoming Events

Pennsylvania Bar Association: Internet Law Update

April 12, 2010
8:30 AM – 3:45 PM
PBI Professional Development Conference Center
Heinz 57 Center
339 Sixth Ave., Floor 7
Pittsburgh, PA

At this CLE addressing legal issues that arise through business and personal use of the Internet, K&L Gates Partner David Cohen will present a discussion of electronic discovery, including the most recent case law and technology that is impacting electronic discovery.

Click here to learn more and to register.

Read More

New York State Unified Court System Report Makes Recommendations for Improved Handling of E-Discovery

In New York, Chief Judge Jonathan Lippman and Chief Administrative Judge Ann Pfau released a report recommending improvements for how electronic discovery is handled in New York State Courts.  The report, based on “extensive research and interviews with experts in electronic discovery”, addresses the problems of electronic discovery, including cost and delay, and provides several recommendations on how "the courts  can manage e-discovery in a more expert, efficient and cost-effective manner within the framework of existing law."

Read More

Despite Malaysian Blocking Statute, Court Compels Third Party’s Production of Foreign Banking Information Pursuant to Subpoena

Gucci Amer., Inc. v. Curveal Fashion, 2010 WL 808639 (S.D.N.Y. Mar. 8, 2010)

Plaintiff sought to compel the production of documents and information regarding defendants’ Malaysian bank accounts pursuant to a subpoena served on United Overseas Bank’s New York Agency (“UOB NY”).  UOB NY was not a party to the underlying action, nor was its parent company. Despite substantial evidence that production of the requested information was prohibited by Malaysian law and that violation of the law could subject a person to civil and criminal penalties, the court concluded that compliance with the subpoena was warranted and ordered UOB NY to produce the information within two weeks.

Read More

Citing First Amendment, Court Denies Motion to Compel Production of Information Sufficient to Identify Anonymous Discussion Board Users

McVicker v. King, 2010 WL 786275 (W.D. Pa. Mar. 3, 2010)

In this suit arising from claims of unlawful and discriminatory termination, plaintiff, a former employee of the Borough, sought to compel a third-party owner of an internet discussion board to produce information sufficient to identify anonymous authors of certain, relevant posts.  Plaintiff argued the identities of the posters may be relevant to impeach defendants’ testimony regarding when the determination to terminate plaintiff was first discussed.  Citing First Amendment considerations, the court denied plaintiff’s motion to compel.

Read More

Do You Comply with the New Massachusetts Information Security Regulation?

By Bruce H. Nielson, K&L Gates Partner, Washington D.C.

What Does the Regulation Require?

Every business that “owns or licenses personal information” about a Massachusetts resident must “develop, implement, and maintain” a comprehensive written information security program (WISP).  “Owns or licenses” is defined as “receives, stores, maintains, processes, or otherwise has access to personal information in connection with the provision of goods or services or in connection with employment.”  “Personal information” (PI) means first name (or initial) and last name combined with a Social Security number, driver’s license or state-issued ID card number, or financial account or credit or debit card number (with or without any required password, security or access code, or personal identification number).

The WISP must contain administrative, technical and physical safeguards for PI that are “appropriate to (a) the size, scope and type of business . . .; (b) the amount of resources available . . .; (c) the amount of stored data; and (d) the need for security and confidentiality” of the PI. 

Read More

Plan Ahead: Proposed Amendments to Rule 26 Would Extend Work-Product Protection

One of the great things about the current rule-making process is the ability to see change on the horizon and adapt accordingly.  This year, absent any unforeseen objection or delay, Rule 26 will be amended to extend the scope of the work-product doctrine to encompass draft expert reports and most communications between experts and counsel.  Currently, the proposed amendment (and all proposed rule amendments, for that matter) is being considered by the Supreme Court.  Pursuant to statute, the Court must transmit prescribed amendments to Congress by May 1st.  Thereafter, absent legislation to reject, modify, or defer the rules, the prescribed amendments will take effect as a matter of law on December 1st.

Read More

Court Provides Detailed Analysis of Law of Spoliation, Orders Adverse Inference Instruction, Monetary Sanctions for Intentional Spoliation of ESI

Rimkus Consulting Group, Inc. v. Cammarata, 688 F. Supp. 2d 598 (S.D. Tex. 2010)

For intentional spoliation, the court declined to order terminating sanctions but ordered an adverse inference instruction and for defendants to pay plaintiff’s attorneys fees and costs.

In this litigation arising from accusations of misappropriation of trade secrets, violation of non-compete agreements, and related claims, plaintiff accused defendants of spoliating relevant evidence, including electronically stored information (“ESI”).  The court found that defendants had indeed participated in intentional spoliation of evidence, including failing to preserve relevant ESI, manually deleting ESI, and destroying or giving away laptops containing relevant ESI, among other things.  The court nonetheless declined to grant plaintiff’s request for terminating sanctions because plaintiff was unable to show a sufficiently high degree of resulting prejudice.  Specifically, the court found that because defendants had produced a large volume of evidence despite their spoliation of other ESI, because plaintiff had obtained some of the deleted evidence from other sources, and because evidence revealed that some of the deleted records would have been favorable to defendants, the resulting prejudice was “far from irreparable” – the necessary showing to justify terminating sanctions:  “The sanction of dismissal or default judgment is appropriate only if the spoliation or destruction of evidence resulted in “irreparable prejudice” and no lesser sanction would suffice.” [Citation omitted.]

Read More

Copyright © 2022, K&L Gates LLP. All Rights Reserved.