Catagory:Case Summaries

1
Harrison v. Office of the Architect of the Capitol, No. 09-1364 (CKKK), 964 F.Supp.2d 81 (2013), reconsideration denied, 2014 WL 4696814 (D.D.C. Sep. 23, 2014)
2
Tedeschi v. Kason Credit Corp, No. 3:10CV00612 DJS, 2014 WL 1491173 (D. Conn. Apr. 15, 2014)
3
Crissen v. Gupta, No. 2:12-cv-00355-JMS-WGH, 2014 WL 1431653 (S.D. Ind. Apr. 14, 2014)
4
Lemon Juice v. Twitter, Inc., No. 502898/14, 2014 WL 4287049 (N.Y. Sup. Ct. Aug. 29, 2014)
5
Clauss Constr. v. UChicago Argonne, LLC, No. 13 C 5479, 2014 WL 5390665 (N.D. Ill. Oct. 20, 2014)
6
Design Basics, LLC v. Carhart Lumber Co., No. 8:13CV125, 2014 WL 6669844 (D. Neb. Nov. 24, 2014)
7
Bradfield v. Mid-Continent Cas. Co., No. 5:13-cf-222-Oc-10PRL, 2014 WL 4626864 (M.D. Fla. Sep. 15, 2014)
8
Am. Gen. Life Ins. Co. v. Vistana Condominium Owners Assoc., No. 2:12-cv-01324-JAD-NJK, 2014 WL 2041950 (D. Nev. May 16, 2014)
9
Domanus v. Lewicki, —F.3d—, 2014 WL 408723 (7th Cir. Feb. 4, 2014)
10
Bailey v. Scoutware, LLC, No. 12-10281, 2014 WL 1118372 (E.D. Mich. Mar. 21, 2014)

Harrison v. Office of the Architect of the Capitol, No. 09-1364 (CKKK), 964 F.Supp.2d 81 (2013), reconsideration denied, 2014 WL 4696814 (D.D.C. Sep. 23, 2014)

Key Insight: Denying defendant’s motion for terminating sanctions for plaintiff’s intentional destruction of digital tape recording device as dismissal would be disproportionate to prejudice to defendant caused by misconduct, court ruled that strong adverse inference was appropriate and, for purposes of resolving the parties’ cross motions for summary judgment, court would assume that the recording device would have revealed the plaintiff was intentionally recording conversations of co-workers without their consent

Nature of Case: Hostile work environment and retaliation claims

Electronic Data Involved: Digital recording device and tape

Tedeschi v. Kason Credit Corp, No. 3:10CV00612 DJS, 2014 WL 1491173 (D. Conn. Apr. 15, 2014)

Key Insight: Court denied plaintiff’s motion for adverse inference based on defendant’s failure to preserve printouts from its computer system, finding that defendant did not have a duty to preserve printouts so long as the electronic files themselves were preserved

Nature of Case: Claims under Fair Debt Collection Practices Act

Electronic Data Involved: Printed fact sheets that showed collection activity maintained on defendant’s computer system

Crissen v. Gupta, No. 2:12-cv-00355-JMS-WGH, 2014 WL 1431653 (S.D. Ind. Apr. 14, 2014)

Key Insight: Court criticized plaintiff for not complying with inadvertent production provision of protective order and ordered plaintiff to delete all copies of the recalled documents and any information gleaned therefrom from its network drive, and further ruled that plaintiff may not use the documents or any work product derived therefrom unless and until it is determined that those documents should have been produced; court further awarded bank its fees and costs in connection with the motion, to be paid by plaintiff’s counsel, because the language of the claw back provision was clear and plaintiff’s counsel not only ignored that language but then took the extra step of reviewing the very documents the bank sought to recall

Nature of Case: Racketeering, fraud, unjust enrichment

Electronic Data Involved: Tax returns, bank documents containing defendants’ personal financial information, and internal bank documents

Lemon Juice v. Twitter, Inc., No. 502898/14, 2014 WL 4287049 (N.Y. Sup. Ct. Aug. 29, 2014)

Key Insight: Where unknown person created Twitter account in plaintiff?s name and in violation of criminal court’s order took photo of child victim in court testifying against her tormentor and posted it to Twitter account, court ruled that plaintiff had met his burden of demonstrating a meritorious claim for intentional infliction of emotional distress and that the discovery sought from Twitter was needed in order to identify who should be named as a defendant, and that anonymous Twitter account creator?s behavior constituted an actionable tort and was not speech covered by First Amendment protection such that anonymity of creator had to yield to plaintiff?s need to redress the actionable wrong perpetrated against him; court directed Twitter to disclose basic subscriber information, records, internet protocol addresses and other similar information sufficient to identify owner of the bogus Twitter account and to preserve certain evidence

Nature of Case: Special proceeding pursuant to CPLR 3102(c) seeking an order directing Twitter to preserve certain evidence and to disclose certain information

Electronic Data Involved: Twitter subscriber information sufficient to identify the individual(s) who owned or operated particular Twitter account and logged into or “tweeted” on the account

Clauss Constr. v. UChicago Argonne, LLC, No. 13 C 5479, 2014 WL 5390665 (N.D. Ill. Oct. 20, 2014)

Key Insight: Where plaintiff discovered numerous boxes of relevant or potentially relevant documents that had not been previously produced, but did not produce them in electronic format with Bates-labeling in accordance with parties’ agreed production protocol and instead provided photographs of the documents and boxes and some incomplete indexes, defendants successfully argued that plaintiff either should have to comply with parties’ agreement and produce material in correct format or nonconforming documents should be excluded; plaintiff chose to have newly discovered documents excluded from evidence; court found that monetary sanctions were appropriate and awarded defendant its attorneys’ fees and expenses incurred in filing the motion and attending hearing

Nature of Case: Breach of contract claims

Electronic Data Involved: Hard copy documents

Design Basics, LLC v. Carhart Lumber Co., No. 8:13CV125, 2014 WL 6669844 (D. Neb. Nov. 24, 2014)

Key Insight: Where court had previously ruled that, absent an order of the court upon a showing of good cause or stipulation by the parties, a party from whom ESI has been requested shall not be required to search for responsive ESI: (a) from more than 10 key custodians, (b) that was created more than five years before the filing of the lawsuit, (c) from sources that are not reasonably accessible without undue burden or cost, or (d) for more than 160 hours, inclusive of time spent identifying potentially responsive ESI, collecting that ESI, searching that ESI and reviewing that ESI for responsiveness, confidentiality and privilege or work product, and plaintiff subsequently moved to compel additional computer imaging, court balanced Rule 26(b)(2)(B) considerations and, acknowledging that defendant had provided both electronic and paper copies of all blueprints, performed plaintiff?s requested search on the email copied from 11 computers, had invested many hours reviewing thousands of documents for privilege and had offered to produce the non-privileged emails to plaintiff?s counsel for his review and had provided suggested deposition dates for defendant?s president, and noting that plaintiff neither reviewed the email nor deposed anyone notwithstanding that case was more then 18 months old, concluded that requested discovery was not reasonable and proportional to the issues raised in the litigation, denied plaintiff?s motion to compel, granted defendant?s motion for protective order, and ordered parties to complete and file an appended Rule 26(f) Report

Nature of Case: Design misappropriation

Electronic Data Involved: Forensic images of every computer or data storage location used by defendant

Bradfield v. Mid-Continent Cas. Co., No. 5:13-cf-222-Oc-10PRL, 2014 WL 4626864 (M.D. Fla. Sep. 15, 2014)

Key Insight: Where plaintiffs? law firm experienced severe power surge that damaged server and firm engaged IT expert who made good faith effort to restore and obtain all data on firm?s computer system, including data responsive to defendant?s document requests, court found that plaintiffs had met their burden of showing that additional ESI was not reasonably accessible because of undue burden or cost, and further determined that circumstances did not warrant forensic examination of firm?s computer system as defendant failed to show good cause for the examination and could not demonstrate that the likely benefit of the discovery sought outweighed the significant burden and expense, considering the importance of the issues at stake and notwithstanding defendant?s offer to bear the financial cost of the forensic examination

Nature of Case: Insurance coverage dispute

 

Am. Gen. Life Ins. Co. v. Vistana Condominium Owners Assoc., No. 2:12-cv-01324-JAD-NJK, 2014 WL 2041950 (D. Nev. May 16, 2014)

Key Insight: Where defendant produced documents as they were received from third parties and with metadata allowing plaintiff to identify the documents by bates range, file path, and document title, court found that the production ?largely complied? with Rule 34 and the obligation to produce documents as kept in the usual course of business and that sanctions were not warranted but also found that the responses created unnecessary obstacles to the plaintiff and ordered defendant to indicate whether the documents it produced were actually responsive, reasoning that plaintiff should not have to ?guess at which requests were responded to and which were not?

Electronic Data Involved: ESI

Domanus v. Lewicki, —F.3d—, 2014 WL 408723 (7th Cir. Feb. 4, 2014)

Key Insight: Circuit court found no abuse of discretion for District Court?s imposition of default judgment (or its prior finding of contempt) – which was a more drastic sanction than was originally imposed by the magistrate judge – where Defendants? discovery behaviors, including failing to produce documents as ordered, avoiding depositions, and failing to preserve potentially relevant ESI (and providing conflicting stores about what happened to the hard drive, including that it had been taken apart and given to a defendant?s children to play with) justified the harsh sanction imposed

Nature of Case: Fraud

Electronic Data Involved: ESI on hard drive (emails), bank records

Bailey v. Scoutware, LLC, No. 12-10281, 2014 WL 1118372 (E.D. Mich. Mar. 21, 2014)

Key Insight: Because defendant was able to examine the subject cell phone with its expert, court ruled that plaintiff should also have the ability to examine the phone to determine if additional relevant text or voicemail messages exist or if there is evidence that text or voicemail messages were deleted, and ordered defendant to produce the current and old cell phones to plaintiff’s expert; court deferred ruling on other requested sanctions as premature and found that neither side was entitled to attorneys’ fees in connection with the motion

Nature of Case: Michigan Whistleblower Protection Act and breach of contract

Electronic Data Involved: Text messages and voicemail messages on cell phone of plaintiff’s former co-worker

Copyright © 2025, K&L Gates LLP. All Rights Reserved.