Catagory:Case Summaries

1
Displaylink Corp. v. Magic Control Tech. Corp., 2008 WL 2915390 (N.D. Cal. July 23, 2008)
2
Montgomery v. eTreppid Techs., LLC., 2008 WL 2277118 (D. Nev. May 29, 2008)
3
Kinexus Representative LLC v. Advent Software, Inc., 2008 WL 4379607 (Del. Ch. Sept. 22, 2008) (Unpublished)
4
Mintel Int?l Group, Ltd. v. Neerghen, 2008 WL 4936745 (N.D. Ill. Nov. 17, 2008)
5
Opperman v. Allstate N.J. Ins. Co., 2008 WL 5071044 (D.N.J. Nov. 24, 2008)
6
Keithley v. Homestore.com, 2008 WL 5234270 (N.D. Cal. Dec. 15, 2008)
7
Llamas v. State, 270 S.W. 3d. 274 (Tex. App. 2008)
8
J&M Assocs., Inc. v. Nat?l Union Fire Ins. Co. of Pittsburgh, Pa., 2008 WL 5102246 (S.D. Cal. Dec. 2, 2008)
9
Ingoglia v. Barnes & Noble Coll. Booksellers, Inc., 852 N.Y.S.2d 337 (N.Y. App. Div. 2008)
10
Maxpower Corp. v. Abraham, 2008 WL 1925138 (W.D. Wis. Apr. 29, 2008)

Displaylink Corp. v. Magic Control Tech. Corp., 2008 WL 2915390 (N.D. Cal. July 23, 2008)

Key Insight: Where requested source code was relevant or reasonably calculated to lead to discovery of admissible evidence and stipulated protective order was in place which addressed confidentiality concerns, court granted plaintiff?s motion to compel production of source code

Nature of Case: Patent infringement

Electronic Data Involved: Source code

Montgomery v. eTreppid Techs., LLC., 2008 WL 2277118 (D. Nev. May 29, 2008)

Key Insight: Where neither party would be able to conclusively prove ownership of disputed technology without analysis of source code, court concluded that documents related to source code and other technology plaintiff claimed as trade secret were ?reasonably calculated to lead to the discovery of admissible evidence? and ordered plaintiff to produce responsive documents and ESI

Nature of Case: Copyright infringement, breach of fiduciary duty, fraud, conversion, breach of contract

Electronic Data Involved: Source code and related technology

Mintel Int?l Group, Ltd. v. Neerghen, 2008 WL 4936745 (N.D. Ill. Nov. 17, 2008)

Key Insight: Court declined to compel compliance with subpoena seeking forensic image of third-party competitor?s computer where third party asserted it had no relevant documents on its computers, where an expert?s search confirmed that assertion and where plaintiff failed to establish third party?s possession of documents sought; regarding plaintiff?s claim that defendant?s search was incomplete where it did not include titles or phrases from documents not included in the complaint, court ordered meet and confer regarding supplemental search terms and for third party to allow forensic expert to conduct search

Nature of Case: Violation of Trade Secrets Act, Computer Fraud Abuse Act and terms of employment contract

Electronic Data Involved: ESI, hard drive

Opperman v. Allstate N.J. Ins. Co., 2008 WL 5071044 (D.N.J. Nov. 24, 2008)

Key Insight: Court granted plaintiffs? request for access to third party?s proprietary software where court determined software and its underlying processes were relevant to plaintiffs? claims and that all less intrusive means to obtain the necessary information had been exhausted; court?s order allowed access to the software by plaintiffs? expert but protected the confidentiality of the information with a protective order that placed limitations on who may access the software and limited the use of the information solely to the litigation

Nature of Case: Challenge to accuracy of insurance company estimates for fire damage

Electronic Data Involved: Proprietary software

Keithley v. Homestore.com, 2008 WL 5234270 (N.D. Cal. Dec. 15, 2008)

Key Insight: Rejecting each of defendant?s objections, court adopted Report and Recommendation of Magistrate Judge imposing monetary sanctions for discovery violations but did not adopt recommendation for adverse inference instruction because summary judgment in favor of defendant rendered issue moot

Nature of Case: Patent infringement

Electronic Data Involved: ESI, source code, document retention policies

Llamas v. State, 270 S.W. 3d. 274 (Tex. App. 2008)

Key Insight: Appellate court found no abuse of discretion in trial court?s decision to admit surveillance footage of armed robbery into record after State provided testimony regarding chain of custody and where officer in charge of transferring data to DVD testified DVD contained exact replica of the original footage

Nature of Case: Capital murder

Electronic Data Involved: Surveillance footage

J&M Assocs., Inc. v. Nat?l Union Fire Ins. Co. of Pittsburgh, Pa., 2008 WL 5102246 (S.D. Cal. Dec. 2, 2008)

Key Insight: Where plaintiff deleted potentially relevant emails despite a duty to preserve, court granted defendants access to plaintiff?s servers to perform electronic recovery of deleted emails; court ordered defendant to retain independent professional to perform recovery at defendants? expense and for recovered emails to be provided directly to plaintiff?s counsel for review and production

Electronic Data Involved: Deleted emails

Ingoglia v. Barnes & Noble Coll. Booksellers, Inc., 852 N.Y.S.2d 337 (N.Y. App. Div. 2008)

Key Insight: Appellate court reversed trial court?s denial of motion to dismiss complaint as sanction for spoliation, and granted motion to dismiss, where defendant’s expert found that numerous files, images, and folders, as well as some history of the plaintiff’s internet usage had been deleted between date defendant demanded inspection of plaintiff’s computer and date of inspection, and evidence showed that defendant suffered severe prejudice

Nature of Case: Defamation

Electronic Data Involved: Files on plaintiff’s home computer

Maxpower Corp. v. Abraham, 2008 WL 1925138 (W.D. Wis. Apr. 29, 2008)

Key Insight: Court denied plaintiffs? motions for preliminary injunction and for sanctions, where evidence that defendants had improperly accessed plaintiffs? computers was weak, evidence from forensic inspection of defendants? laptops was ambiguous, and ?most damning? piece of evidence was one defendant?s use of a drive cleaner on laptop after being served with summons and before laptop could be examined; court found that defendant’s proffered explanation for using the drive cleaner was not ?particularly implausible? and observed that plaintiffs could renew sanctions request if evidence later supported it

Nature of Case: Company asserted various claims against former employees, including misappropriation of trade secrets, intentional interference with prospective business opportunity, breach of loyalty and violation of the Computer Fraud and Abuse Act

Electronic Data Involved: Employer-provided laptops; other ESI

Copyright © 2025, K&L Gates LLP. All Rights Reserved.