Author - eDiscovery Import

1
Murphy v. Target Corp., No. 09cv1436-BEN (WMc), 2011 WL 2728217 (S.D. Cal. July 12, 2011)
2
State v. Pullens, 800 N.W.2d 202 (Neb. 2011)
3
Commonwealth v. Koch, 39 A.3d 996 (Pa. Super. Ct. 2011)
4
People v. Oyerinde, No. 298199, 2011 WL 5964613 (Mich. Ct. App. Nov. 29, 2011)
5
B&B Hardware, Inc. v. Fastenal Co., No. 4:10CV00317 BRW/JTR, 2011 WL 2115546 (E.D. Ark. May 25, 2011)
6
Tomlinson v. El Paso Corp., No. 04-cv-02686-WDM-MEH, 2011 WL 2297661 (D. Colo. June 9, 2011)
7
Uhlig LLC v. Shirley, No. 6:08-cv-01208-JMC, 2011 WL 2728445 (D.S.C. July 13, 2011)
8
Pensacola Firefighters? Relief Pension Fund Board of Trustees v. Merril Lynch Pierce Fenner & Smith, Inc., No. 3:09cv53/MCR/MD, 2011 WL 3512180 (N.D. Fla. July 7, 2011)
9
Mgmt. Compensation Group Lee, Inc. v. Oklahoma State Univ., No. CIV-11-967-D, 2011 WL 5326262 (W.D. Okla. Nov. 3, 2011)
10
Aircraft Fueling Sys., Inc. v. Southwest Airlines Co., No. 08-CV-414-GKF-FHM, 2011 WL 4954250 (N.D. Okla. Oct. 18, 2011)

Murphy v. Target Corp., No. 09cv1436-BEN (WMc), 2011 WL 2728217 (S.D. Cal. July 12, 2011)

Key Insight: Where target indicated the requested discovery would require the expenditure of approximately 146 hours of employees? time and cost $4,360 and also argued that the requested discovery would invade employees? privacy and was minimally relevant, court found that the burden to Target did not outweigh the likely benefit, rejected defendant?s arguments regarding privacy and relevance, and granted plaintiff?s motion to compel

Nature of Case: Employment Litigation

Electronic Data Involved: ESI

State v. Pullens, 800 N.W.2d 202 (Neb. 2011)

Key Insight: Court outlined possible ways to authenticate an email and found that the emails at issue were properly authenticated and admitted where some came from an account bearing the defendant?s name, where many were signed by the defendant, where some contained identifying information, including defendant?s social security number and telephone numbers and other personal facts, and where an investigator recalled that at least two of the email addresses contained in the at-issue emails had been used on the computer of the victim, with whom defendant was staying before her death; per the court, possible ways to authenticate an email include: by ?use of the email address, which many times contains the same of the sender;? by ?[t]he signature or name of the sender or recipient in the body of the email;? by evidence ?that an email is a timely response to an earlier message;? and by presentation of the ?contents of the email and other circumstances? which may show authorship

Nature of Case: Murder

Electronic Data Involved: Emails

Commonwealth v. Koch, 39 A.3d 996 (Pa. Super. Ct. 2011)

Key Insight: Conviction reversed and case remanded where trial court abused its discretion by admitting text messages found on the defendant?s cell phone without providing any evidence to establish that the defendant was the author of the at-issue messages, particularly where several messages referred to the defendant in the third person and ?and thus, were clearly not written by her?; court also found the text messages constituted inadmissible hearsay

Nature of Case: Drug conviction

Electronic Data Involved: Text messages

People v. Oyerinde, No. 298199, 2011 WL 5964613 (Mich. Ct. App. Nov. 29, 2011)

Key Insight: Trial court properly determined that Facebook messages from Defendant to his victim were admissible non-hearsay as party admissions pursuant to MRE 801(d)(2); trial court (in bench trial) indicated that it reviewed Facebook messages from victim to defendant and from victim to her sister to ?provide context? for Defendant and victim?s relationship and, on appeal, appellate court reasoned that ?[r]egardless whether some of the messages should not have been admitted under MRE 803(3), the trial court did not rely on the messages to prove that any events actually occurred; judgment of the trial court was affirmed

Nature of Case: Criminal: First-degree felony murder and carjacking

Electronic Data Involved: Social Media Content (e.g., Facebook)

B&B Hardware, Inc. v. Fastenal Co., No. 4:10CV00317 BRW/JTR, 2011 WL 2115546 (E.D. Ark. May 25, 2011)

Key Insight: Addressing discovery issues ?looming on the horizon? court indicated that there appeared to be no basis to require defendant to forensically image at-issue hard drives and, addressing whether defendant would be required to restore and review backup tapes which it claimed could cost $84,854,704. 90 (a number the court called ?absurdly high? on its face), found that it would be difficult for plaintiff to meet the seven factor test for good cause and that defendant had sufficiently objected to plaintiff?s request such that arguments that the backup tapes were not reasonably accessible had not been waived

Electronic Data Involved: Forensic image of hard drives, backup tapes

Tomlinson v. El Paso Corp., No. 04-cv-02686-WDM-MEH, 2011 WL 2297661 (D. Colo. June 9, 2011)

Key Insight: Court denied request for taxation of costs related to conversion of documents into electronic format for discovery purposes where defendant failed to establish that the conversion costs were ?necessarily incurred in the case preparation?; court denied motion for taxation of costs related to creation of secure database in furtherance of responding to a legitimate discovery request where the court was not authorized to award such costs pursuant to the relevant statute and where it was unaware of authority allowing adjustments to the division of costs based on undue burden, an argument that was available ?during the discovery process?

Electronic Data Involved: Conversion of ESI

Uhlig LLC v. Shirley, No. 6:08-cv-01208-JMC, 2011 WL 2728445 (D.S.C. July 13, 2011)

Key Insight: Court granted motion to modify imaging protocol and, after indicating its belief that ?the use of hash values eliminates the need for search limitations,? ordered a protocol modification that included an order for the expert to search for hash values to identify documents present on more than one specified computer/device

Electronic Data Involved: Contents of personal computer, storage devices

Pensacola Firefighters? Relief Pension Fund Board of Trustees v. Merril Lynch Pierce Fenner & Smith, Inc., No. 3:09cv53/MCR/MD, 2011 WL 3512180 (N.D. Fla. July 7, 2011)

Key Insight: Finding good cause, the court granted intervenors? motion for a protective order prohibiting plaintiff?s discovery of intervenors? privileged emails sent over defendant?s email servers (defendant was found to have waived its privilege as to such communications) where the intervenors were employees of defendant during the pendency of government investigations; had a joint defense agreement with defendant allowing communication for purposes of furthering their defense against the investigations; and held an objectively reasonable belief that their emails would remain confidential, in spite of defendant?s internal email policies warning that they were not, in light of defendant?s general counsel?s endorsement of and participation in such joint defense discussions

Electronic Data Involved: Intervenors’ privileged emails sent over defendant’s servers

Mgmt. Compensation Group Lee, Inc. v. Oklahoma State Univ., No. CIV-11-967-D, 2011 WL 5326262 (W.D. Okla. Nov. 3, 2011)

Key Insight: Where non-party OSU represented that responding to a subpoena seeking 6571 documents would require an expenditure of $1,761.24 and 55 hours of in-house counsel?s time, court found the burden was not so undue as to require protection from compliance and, in so finding, noted OSU?s financial interest in the outcome of the litigation, OSU?s close ties to a party in the case, and the amount in controversy of the underlying litigation (many millions of dollars)

Electronic Data Involved: ESI

Aircraft Fueling Sys., Inc. v. Southwest Airlines Co., No. 08-CV-414-GKF-FHM, 2011 WL 4954250 (N.D. Okla. Oct. 18, 2011)

Key Insight: Magistrate Judge denied motion for spoliation sanctions where plaintiff?s possession of some emails that arguably should have been produced by defendant but were not was ?somewhat probative? but fell short of establishing that other relevant emails were created by defendant and then destroyed; upheld on appeal

Electronic Data Involved: Email

Copyright © 2022, K&L Gates LLP. All Rights Reserved.