Catagory:Case Summaries

1
Cognate Bioservices, Inc. v. Smith, Civil No. WDQ-13-1797, 2014 WL 988857 (D. Md. Mar. 12, 2014)
2
Cheng v. Lake Forest Assocs., No. CBD-13-1365, 2014 WL 2964082 (D. Md. June 30, 2014)
3
Emery v. Harris, No. 1:10-cv-01947-JLT (PC), 2014 WL 710957 (E.D. Cal. Feb. 21, 2014)
4
In re Text Messaging Antitrust Litig., 46 F. Supp. 2d 788 (N.D. Ill. 2014)
5
AKH Co., Inc. v. Universal Underwriters Ins. Co., No. 13-2003-JAR-KGG, 2014 WL 2760860 (D. Kan. June 18, 2014)
6
Ogden v. All-State Career School, No. 2:13cv406, 2014 WL 1646934 (W.D. Pa. Apr. 23, 2014)
7
Wis. Resources Protection Council v. Flambeau Mining Co., No. 11-cv-45-bbc, 2014 WL 3810884 (W.D. Wis. Aug. 1, 2014)
8
Gloucester Twp. Hous. Auth. V. Franklin Square Assocs., No. 12-0953 (RMB/AMD), 2014 WL 3974168 (D.N.J. Aug. 12, 2014)
9
Siggers v. Campbell, No. 07-12495, 2014 WL 4978648 (E.D. Mich. Mar. 25, 2014)
10
People v. Chabcery, No. ST-14-CR-0000073, 2014 WL 5396166 (V.I. Super. Oct. 22, 2014)

Cognate Bioservices, Inc. v. Smith, Civil No. WDQ-13-1797, 2014 WL 988857 (D. Md. Mar. 12, 2014)

Key Insight: Court denied motion for an order to preserve evidence, finding that defendant had complied with his duty to preserve — he gave opposing party notice that the laptop he used in connection with his employment at competitor would be returned after his resignation, provided the name and address of the person in possession of the laptop, and made efforts to ensure that relevant information on the laptop was not deleted

Nature of Case: Employer sued former employee and his new consulting firm for violations of Computer Fraud and Abuse Act, misappropriations of products, misappropriations of trade secrets

Electronic Data Involved: Laptop, computer passwords to former employer’s virtual private network and server computers

Cheng v. Lake Forest Assocs., No. CBD-13-1365, 2014 WL 2964082 (D. Md. June 30, 2014)

Key Insight: Court reasoned that ?[c]aselaw demonstrates that a contractual relationship between two parties, which privies one party to access documents or information physically possessed by the other, can be sufficient to establish the requisite control necessary to compel production of a discovery-related document[]? and found that defendant had such control over video surveillance footage in the possession of a third party and granted Plaintiff?s motion to compel

Nature of Case: Personal injury (Slip & fall)

Electronic Data Involved: video surveillance

Emery v. Harris, No. 1:10-cv-01947-JLT (PC), 2014 WL 710957 (E.D. Cal. Feb. 21, 2014)

Key Insight: Court denied plaintiff’s motion for spoliation sanctions because it was untimely and because plaintiff did not establish that defendant had control over the subject videotape or that defendant was on notice that litigation would ensue before the videotape was taped over

Nature of Case: Excessive use of force claims brought by pro se state prisoner

Electronic Data Involved: Videotape of prison yard area where altercation took place

In re Text Messaging Antitrust Litig., 46 F. Supp. 2d 788 (N.D. Ill. 2014)

Key Insight: Court declined to impose sanctions against wireless carrier for employee’s deletion of particular email that referenced collusion, notwithstanding that deletion was intentional and done for the purpose of concealing the contents of the email, because record did not reflect that author of deleted email was in a position to have knowledge of or participate in any collusion between the wireless carriers, and thus plaintiffs could not show that missing email would have been adverse to wireless carrier

Nature of Case: Class action

Electronic Data Involved: Emails

Ogden v. All-State Career School, No. 2:13cv406, 2014 WL 1646934 (W.D. Pa. Apr. 23, 2014)

Key Insight: Court observed that ordering plaintiff to permit access to or produce complete copies of his social networking accounts would permit defendant to cast too wide a net and sanction an inquiry into scores of quasi-personal information that would be irrelevant and non-discoverable, and stated: ?Defendant is no more entitled to such unfettered access to plaintiff’s personal email and social networking communications than it is to rummage through the desk drawers and closets in plaintiff’s home”; court ruled that defendant was only entitled to limited discovery of plaintiff’s communications, and set out particular steps that plaintiff must take to comply with defendant?s requests

Nature of Case: Hostile work environment and disparate treatment based on reverse gender discrimination and retaliation claims

Electronic Data Involved: Electronic communications made or affirmatively acknowledged by plaintiff on any social networking website (e.g., Twitter, Facebook, MySpace) during the period of alleged harassment

Wis. Resources Protection Council v. Flambeau Mining Co., No. 11-cv-45-bbc, 2014 WL 3810884 (W.D. Wis. Aug. 1, 2014)

Key Insight: Court overruled plaintiffs? objection to clerk?s ruling on defendant?s bill of costs to the extent it awarded defendant taxable costs associated with retrieving computer information, noting that defendant sought reimbursement of only the costs incurred in the extraction endeavor — not for help in reviewing the documents; finding the request reasonable, the court observed: “Plaintiffs asked Defendant for 20 years of information from defendant?s mine site in Ladysmith, Wisconsin. Given the nature of the information storage over this period of time, it was reasonable, if not essential, for defendant to employ an expert third-party forensic expert to extract the information.?

Nature of Case: Environmental damage to the Flambeau River

Electronic Data Involved: 20 years of information

Gloucester Twp. Hous. Auth. V. Franklin Square Assocs., No. 12-0953 (RMB/AMD), 2014 WL 3974168 (D.N.J. Aug. 12, 2014)

Key Insight: Court evaluated five factors to determine that defendant’s inadvertent disclosure waived the attorney-client privilege, where defendant did not describe the precautions taken, if any, to prevent the disclosure of privileged information, but instead relied on the purportedly voluminous nature of the production, the disputed letters set forth communications between attorney and client concerning clearly privileged, substantive information relating to the litigation, the letters were produced in the litigation on two separate occasions, and defense counsel waited over three months after the letters’ production before attempting to rectify the disclosures and only discovered the inadvertent disclosure while preparing for a deposition

Nature of Case: Breach of contract

Electronic Data Involved: Privileged letters

Siggers v. Campbell, No. 07-12495, 2014 WL 4978648 (E.D. Mich. Mar. 25, 2014)

Key Insight: Notwithstanding that litigation hold was not put into place until more than four years after complaint was filed, court denied plaintiff?s motion for spoliation sanctions where there was no evidence that defendant deleted any documents or evidence, or acted with an intent to conceal or destroy evidence, there was no evidence that defendant routinely exchanged email correspondence about plaintiff with others, and the vigorous work of plaintiff?s appointed counsel led to only one responsive email being produced; plaintiff would be allowed to question defendant at trial about her failure to timely impose a litigation hold and about other matters related to plaintiff?s assertion that she must have had relevant email communications that no longer exist

Nature of Case: Pro se prisoner civil rights claims

Electronic Data Involved: Emails

People v. Chabcery, No. ST-14-CR-0000073, 2014 WL 5396166 (V.I. Super. Oct. 22, 2014)

Key Insight: Stating that the Federal Rules of Evidence provide that the originality of ESI is determined by whether the printout accurately reflects the information that it purports to show, not the location where the information is stored, court found that printout of message log retrieved from an electronic memory card constituted an original writing under FRE 1002, and denied criminal defendant’s motion in limine to exclude such evidence

Nature of Case: Criminal case on charges of rape and unlawful conduct

Electronic Data Involved: Information stored on memory card

Copyright © 2025, K&L Gates LLP. All Rights Reserved.