Catagory:Case Summaries

1
Squeo v. The Norwalk Hosp. Assoc., 2010 WL 5573755 (Conn. Super. Ct. Dec. 14, 2010)
2
State v. Berke, 992 A.2d 1290 (Me. 2010)
3
In re Sawstop Cases, 2010 WL 2483316 (D. Mass. June 14, 2010)
4
Partminer Worldwide, Inc. v. Siliconexpert Techs., Inc., 2010 WL 4004164 (D. Colo. Sept. 23, 2010)
5
Dana Ltd. v. American Axle & Mfg. Holdings, Inc., 2010 WL 5394885 (W.D. Wash. Dec. 22, 2010)
6
Fatpipe Networks India Ltd. v. Xroads Networks, Inc., 2010 WL 129790 (D. Utah Jan. 8, 2010)
7
Victor v. R.M. Lawler, 2010 WL 521118 (M.D. Pa. Feb. 9, 2010)
8
Covad Commc?n Co. v. Revonet, Inc., 267 F.R.D. 14(D.D.C. 2010)
9
Shlala v. Catholic Health & Human Servs., 2010 WL 1655869 (N.J. Super. Ct. App. Div. Apr. 23, 2010)(Unpublished)
10
N. Am. Rescue Prods., Inc. v. Bound Tree Med., LLC, 2010 WL 1873291 (S.D. Ohio May 10, 2010)

Squeo v. The Norwalk Hosp. Assoc., 2010 WL 5573755 (Conn. Super. Ct. Dec. 14, 2010)

Key Insight: Where plaintiffs brought claims related to their son?s suicide and objected to defendants? request for production of their computer for forensic examination following their admission that their son had rarely used their computer for purposes of checking his email, the court ruled the order sought by defendants was ?too broad? because it was unlimited as to time or subject matter and because defendants failed to show that anything stored on the computer would actually be relevant to the case

Nature of Case: Claims arising from son’s suicide following discharge from the hospital

Electronic Data Involved: Parent’s computer

State v. Berke, 992 A.2d 1290 (Me. 2010)

Key Insight: Videotape depicting defendant abusing his victims was properly authenticated for admission as evidence pursuant to M.R. Evid. 901 where defendant was repeatedly depicted in the tape, where ?the largely sequential nature of the events depicted? supported the inference that the tape was not tampered with, and where the state introduced testimony from the victim and her family to establish that the victims in the tape were the victims referenced in the indictment

Nature of Case: Criminal indictment for sexual exploitation of a minor and related charges

 

In re Sawstop Cases, 2010 WL 2483316 (D. Mass. June 14, 2010)

Key Insight: Court ordered plaintiffs? production of cartridges containing relevant data (?akin to a ?black box??) that were relied upon by their expert in forming his opinions but found both parties proposed protective measures insufficient and ordered defendants to designate an expert or experts to review the cartridges, restricted access to the cartridges to defendants? expert(s) and counsel and their employees ?whose functions required access to the cartridge or cartridge information?, and ordered that each expert sign an agreement that they would not seek to develop technology similar to that at issue

Electronic Data Involved: Cartridge data “akin to a black box”

Partminer Worldwide, Inc. v. Siliconexpert Techs., Inc., 2010 WL 4004164 (D. Colo. Sept. 23, 2010)

Key Insight: Based upon suspicious timing of the disappearance of ESI, the court inferred that evidence had been destroyed in bad faith by a person who knew that it would ?very well reveal information Defendants did not want revealed? and ordered an adverse inference instruction to the jury at trial, that plaintiff should be permitted to amend its claims to add a claim for exemplary damages based on the adverse inference, that defendants pay plaintiff?s costs and fees, and that defendants make unredacted mirror images of the hard drives of each employee of the corporate defendant at defendants? expense, to be delivered to plaintiff by a date certain; hard drives were covered by a previously entered protective order

Electronic Data Involved: Email, ESI

Dana Ltd. v. American Axle & Mfg. Holdings, Inc., 2010 WL 5394885 (W.D. Wash. Dec. 22, 2010)

Key Insight: Court granted defendant?s motion to clarify the agreed preliminary injunction order where, following entry of the agreement, defendant determined that the broad language addressing preservation created a cost prohibitive obligation that was broader than necessary to protect the plaintiff and agreed to enter an order reflecting defendant?s proposed revision which was more specific regarding what must be preserved

Electronic Data Involved: ESI

Fatpipe Networks India Ltd. v. Xroads Networks, Inc., 2010 WL 129790 (D. Utah Jan. 8, 2010)

Key Insight: Where evidence indicated that defendant had not produced all versions of its relevant source code despite a court order and had been untruthful as to its maintenance of certain records, court granted plaintiff?s motion to vacate its scheduling order and ordered defendant to take specific action, including 1) taking specific measures to ensure preservation of relevant evidence, 2) taking ?all reasonable measures to obtain from third parties?including past or present customers? evidence of its software development and version history, 3) identifying all computers on which anyone had engaged in software development since 2006 and all devices which ?ha[d] at any time contained? data reflecting such activity, and 4) producing all prior or current versions of software and source code for each relevant device, among other things

Nature of Case: Patent infringement

Electronic Data Involved: Source code

Victor v. R.M. Lawler, 2010 WL 521118 (M.D. Pa. Feb. 9, 2010)

Key Insight: Court deferred judgment regarding motion for spoliation sanctions for missing video surveillance tapes of the relevant ?cell extraction? pending defendant?s production of prison policies regarding the proper preservation of such video where the court regarded the ?question of spoliation? to be ?closely intertwined with the issue of whether the defendants followed their own operations procedures in preserving evidence?

Nature of Case: Prisoner’s civil rights lawsuit

Electronic Data Involved: Video surveillance tape

Covad Commc?n Co. v. Revonet, Inc., 267 F.R.D. 14(D.D.C. 2010)

Key Insight: Court declined to compel production of non-email ESI in native format where defendant previously produced the information sought in hard copy, reasoning that native production is not required by the rules and that the documents, previously produced in hard copy, were in a sufficiently usable format absent a showing that the metadata would ?yield an answer that the hard copy will not?; court also recognized obligation to seek ?just, speedy, and inexpensive? adjudication and to limit burdensome discovery where defendant represented significant hardship to re-produce in native format

Nature of Case: Misappropriation and conversion of trade secret information

Electronic Data Involved: ESI

Shlala v. Catholic Health & Human Servs., 2010 WL 1655869 (N.J. Super. Ct. App. Div. Apr. 23, 2010)(Unpublished)

Key Insight: Trial court did not err in dismissing plaintiff?s claim of fraudulent concealment arising from the destruction of the hard drive plaintiff utilized while employed by defendant where plaintiff failed to specifically request the preservation or production of the computer?s contents until three years after he was terminated (despite filing a complaint and requesting discovery) and where plaintiff failed to establish any of the five elements necessary to support an action for fraudulent concealment, including failing to establish defendants? duty to preserve, the materiality of the evidence destroyed, and the inability to obtain the evidence from another source, among other things

Nature of Case: Employment litigation

Electronic Data Involved: ESI on hard drive utilized by plaintiff while employed by defendant

N. Am. Rescue Prods., Inc. v. Bound Tree Med., LLC, 2010 WL 1873291 (S.D. Ohio May 10, 2010)

Key Insight: Addressing several privilege-related issues upon plaintiff?s objections to the magistrate?s order compelling production, court found inadvertently produced email communications resulted in waiver of attorney-client privilege where plaintiffs failed to take reasonable steps to prevent disclosure and to rectify the error upon discovery of the production, noting specifically that plaintiff was aware of the production for a matter of months before taking action only after defendant?s motion to compel

Nature of Case: Misappropriation of trade secrets, false advertising, trademark infringement and related claims

Electronic Data Involved: Privileged emails

Copyright © 2025, K&L Gates LLP. All Rights Reserved.