Catagory:Case Summaries

1
Crissen v. Gupta, No. 2:12-cv-00355-JMS-WGH, 2014 WL 1431653 (S.D. Ind. Apr. 14, 2014)
2
Lemon Juice v. Twitter, Inc., No. 502898/14, 2014 WL 4287049 (N.Y. Sup. Ct. Aug. 29, 2014)
3
Clauss Constr. v. UChicago Argonne, LLC, No. 13 C 5479, 2014 WL 5390665 (N.D. Ill. Oct. 20, 2014)
4
Design Basics, LLC v. Carhart Lumber Co., No. 8:13CV125, 2014 WL 6669844 (D. Neb. Nov. 24, 2014)
5
Memory Lane Inc. v. Classmates Int?l. Inc., No. SACV 11-940-JLS (RNBx), 2014 WL 12617383 (C.D. Cal. Jul. 25, 2014)
6
The Shaw Group Inc. v. Zurich Am. Ins. Co., No. 12-257-JJB-RLB, 2014 WL 4373210 (M.D. La. Sep. 3, 2014)
7
Nat?l Jewish Health v. WebMD Health Servs. Grp., Inc., No. 12-cv-02834-WYD-MJW, 2014 WL 2118585 (D. Colo. May 21, 2014)
8
Domanus v. Lewicki, —F.3d—, 2014 WL 408723 (7th Cir. Feb. 4, 2014)
9
Bailey v. Scoutware, LLC, No. 12-10281, 2014 WL 1118372 (E.D. Mich. Mar. 21, 2014)
10
Oros & Busch Application Techs., Inc. v. Terra Renewal Servs., Inc., No. 4:12CV00959 ERW, 2014 WL 897405 (E.D. Mo. Mar. 6, 2014)

Crissen v. Gupta, No. 2:12-cv-00355-JMS-WGH, 2014 WL 1431653 (S.D. Ind. Apr. 14, 2014)

Key Insight: Court criticized plaintiff for not complying with inadvertent production provision of protective order and ordered plaintiff to delete all copies of the recalled documents and any information gleaned therefrom from its network drive, and further ruled that plaintiff may not use the documents or any work product derived therefrom unless and until it is determined that those documents should have been produced; court further awarded bank its fees and costs in connection with the motion, to be paid by plaintiff’s counsel, because the language of the claw back provision was clear and plaintiff’s counsel not only ignored that language but then took the extra step of reviewing the very documents the bank sought to recall

Nature of Case: Racketeering, fraud, unjust enrichment

Electronic Data Involved: Tax returns, bank documents containing defendants’ personal financial information, and internal bank documents

Lemon Juice v. Twitter, Inc., No. 502898/14, 2014 WL 4287049 (N.Y. Sup. Ct. Aug. 29, 2014)

Key Insight: Where unknown person created Twitter account in plaintiff?s name and in violation of criminal court’s order took photo of child victim in court testifying against her tormentor and posted it to Twitter account, court ruled that plaintiff had met his burden of demonstrating a meritorious claim for intentional infliction of emotional distress and that the discovery sought from Twitter was needed in order to identify who should be named as a defendant, and that anonymous Twitter account creator?s behavior constituted an actionable tort and was not speech covered by First Amendment protection such that anonymity of creator had to yield to plaintiff?s need to redress the actionable wrong perpetrated against him; court directed Twitter to disclose basic subscriber information, records, internet protocol addresses and other similar information sufficient to identify owner of the bogus Twitter account and to preserve certain evidence

Nature of Case: Special proceeding pursuant to CPLR 3102(c) seeking an order directing Twitter to preserve certain evidence and to disclose certain information

Electronic Data Involved: Twitter subscriber information sufficient to identify the individual(s) who owned or operated particular Twitter account and logged into or “tweeted” on the account

Clauss Constr. v. UChicago Argonne, LLC, No. 13 C 5479, 2014 WL 5390665 (N.D. Ill. Oct. 20, 2014)

Key Insight: Where plaintiff discovered numerous boxes of relevant or potentially relevant documents that had not been previously produced, but did not produce them in electronic format with Bates-labeling in accordance with parties’ agreed production protocol and instead provided photographs of the documents and boxes and some incomplete indexes, defendants successfully argued that plaintiff either should have to comply with parties’ agreement and produce material in correct format or nonconforming documents should be excluded; plaintiff chose to have newly discovered documents excluded from evidence; court found that monetary sanctions were appropriate and awarded defendant its attorneys’ fees and expenses incurred in filing the motion and attending hearing

Nature of Case: Breach of contract claims

Electronic Data Involved: Hard copy documents

Design Basics, LLC v. Carhart Lumber Co., No. 8:13CV125, 2014 WL 6669844 (D. Neb. Nov. 24, 2014)

Key Insight: Where court had previously ruled that, absent an order of the court upon a showing of good cause or stipulation by the parties, a party from whom ESI has been requested shall not be required to search for responsive ESI: (a) from more than 10 key custodians, (b) that was created more than five years before the filing of the lawsuit, (c) from sources that are not reasonably accessible without undue burden or cost, or (d) for more than 160 hours, inclusive of time spent identifying potentially responsive ESI, collecting that ESI, searching that ESI and reviewing that ESI for responsiveness, confidentiality and privilege or work product, and plaintiff subsequently moved to compel additional computer imaging, court balanced Rule 26(b)(2)(B) considerations and, acknowledging that defendant had provided both electronic and paper copies of all blueprints, performed plaintiff?s requested search on the email copied from 11 computers, had invested many hours reviewing thousands of documents for privilege and had offered to produce the non-privileged emails to plaintiff?s counsel for his review and had provided suggested deposition dates for defendant?s president, and noting that plaintiff neither reviewed the email nor deposed anyone notwithstanding that case was more then 18 months old, concluded that requested discovery was not reasonable and proportional to the issues raised in the litigation, denied plaintiff?s motion to compel, granted defendant?s motion for protective order, and ordered parties to complete and file an appended Rule 26(f) Report

Nature of Case: Design misappropriation

Electronic Data Involved: Forensic images of every computer or data storage location used by defendant

Memory Lane Inc. v. Classmates Int?l. Inc., No. SACV 11-940-JLS (RNBx), 2014 WL 12617383 (C.D. Cal. Jul. 25, 2014)

Key Insight: Defendant moved for the court to tax costs for e-Discovery tasks including TIFF conversion, native file processing, CD creation, blowbacks and ?Data reduction & filtering? that the clerk had disallowed. The court disallowed costs for data reduction/filtering, native file processing and ?technical time? and allowed costs for Tiff conversion, CD/DVD creation, imaging and blowbacks (costs were reasonable and necessary).

Nature of Case: Taxable costs

Electronic Data Involved: ESI

The Shaw Group Inc. v. Zurich Am. Ins. Co., No. 12-257-JJB-RLB, 2014 WL 4373210 (M.D. La. Sep. 3, 2014)

Key Insight: Where parties? agreed protective order stated that parties would endeavor to agree on search terms to be utilized in the search for responsive ESI, and current discovery dispute centered solely on the reasonableness of the search terms chosen by each party and the willingness of the parties to negotiate reasonable search terms, court rejected defendant?s proposed list of 90 search terms in light of plaintiff?s showing that the broad search would result in undue burden and expense by generating an excess of irrelevant documents, and instead ordered plaintiff to search for responsive documents using plaintiff?s 28 proposed search terms and protocol which the court found reasonable and well-tailored to locate responsive documents; court faulted parties for their lack of diligence in completing discovery within the court?s deadlines, observing: ?In short, both sides chose to do nothing, waiting to see if the other side would blink first. In doing so, they have compromised the deadlines in the court?s scheduling order, the briefing on dispositive motions, and have essentially gambled with the parameters of ESI discovery.?

Nature of Case: Insurance dispute

 

Nat?l Jewish Health v. WebMD Health Servs. Grp., Inc., No. 12-cv-02834-WYD-MJW, 2014 WL 2118585 (D. Colo. May 21, 2014)

Key Insight: Where Plaintiff maintained emails in Enterprise Vault with journaling capabilities (which captures and stores all emails in one place) and all ESI produced was searchable, sortable, paired with relevant metadata and included Concordance load files (and where emails were also produced with their attachments), the special master found the production met the requirements of 34(b)(2)(E)(ii) and was both properly produced in the form in which it was ordinarily maintained and in a reasonably usable form and further found that although 34(b)(2)(E)(i) did not apply to ESI, the production also satisfied the traditional requirement to produce documents (which ESI is not) in the manner in which it is kept in the usual course of business; special master made clear that a custodian need not be an individual and that ?[a] company, through an IT department, can serve as the custodian of electronic files kept on company servers.?

Electronic Data Involved: ESI, email

Domanus v. Lewicki, —F.3d—, 2014 WL 408723 (7th Cir. Feb. 4, 2014)

Key Insight: Circuit court found no abuse of discretion for District Court?s imposition of default judgment (or its prior finding of contempt) – which was a more drastic sanction than was originally imposed by the magistrate judge – where Defendants? discovery behaviors, including failing to produce documents as ordered, avoiding depositions, and failing to preserve potentially relevant ESI (and providing conflicting stores about what happened to the hard drive, including that it had been taken apart and given to a defendant?s children to play with) justified the harsh sanction imposed

Nature of Case: Fraud

Electronic Data Involved: ESI on hard drive (emails), bank records

Bailey v. Scoutware, LLC, No. 12-10281, 2014 WL 1118372 (E.D. Mich. Mar. 21, 2014)

Key Insight: Because defendant was able to examine the subject cell phone with its expert, court ruled that plaintiff should also have the ability to examine the phone to determine if additional relevant text or voicemail messages exist or if there is evidence that text or voicemail messages were deleted, and ordered defendant to produce the current and old cell phones to plaintiff’s expert; court deferred ruling on other requested sanctions as premature and found that neither side was entitled to attorneys’ fees in connection with the motion

Nature of Case: Michigan Whistleblower Protection Act and breach of contract

Electronic Data Involved: Text messages and voicemail messages on cell phone of plaintiff’s former co-worker

Oros & Busch Application Techs., Inc. v. Terra Renewal Servs., Inc., No. 4:12CV00959 ERW, 2014 WL 897405 (E.D. Mo. Mar. 6, 2014)

Key Insight: Court denied defendant’s motion for sanctions with leave to re-file later, where record did not show conduct by plaintiff to destroy or conceal evidence in an effort to suppress the truth, and record did not support the requisite finding of prejudice to defendant; court further denied plaintiff’s motion to strike counterclaims that were based on plaintiff?s alleged destruction of ESI, since it could not be said that the counterclaims could not succeed under any circumstances

Nature of Case: Tortious interference with contract, civil conspiracy

Electronic Data Involved: ESI stored on former employee’s laptop and external hard drive

Copyright © 2022, K&L Gates LLP. All Rights Reserved.