Catagory:Case Summaries

1
C.T. v. Liberal Sch. Dist., 2007 WL 1536806 (D. Kan. May 24, 2007)
2
In re Tri-State Armored Servs., Inc., 366 B.R. 326 (D.N.J. 2007)
3
John B. v. Goetz, 2007 WL 4198266 (M.D. Tenn. Nov. 26, 2007)
4
Benton v. Dlorah, Inc., 2007 WL 3231431 (D. Kan. Oct. 30, 2007)
5
Escobar v. City of Houston, 2007 WL 2900581 (S.D. Tex. Sept. 29, 2007)
6
Tilton v. McGraw-Hill Cos., Inc., 2007 WL 3229157 (W.D. Wash. Oct. 30, 2007)
7
Flying J Inc. v. TA Operating Corp., 2007 WL 2220581 (D. Utah July 30, 2007)
8
Albertson v. Albertson, 73 Va. Cir. 94, 2007 WL 6013036 (Va. Cir. Ct. 2007)
9
Polycom, Inc. v. Codian Ltd., 2007 WL 194588 (E.D. Tex. Jan. 22, 2007)
10
ACS Consultant Co., Inc. v. Williams, 2007 WL 674608 (E.D. Mich. Mar. 5, 2007)

C.T. v. Liberal Sch. Dist., 2007 WL 1536806 (D. Kan. May 24, 2007)

Key Insight: Denying motion to compel plaintiff to produce documents listed on privilege log, court nonetheless found log inadequate and ordered plaintiff to submit an amended privilege log and, further, to identify whether or not each email listed is a ?string? or ?strand? email and, if so, to list each email within a strand as a separate entry in the privilege log

Nature of Case: Allegations of sexual abuse and harassment

Electronic Data Involved: Email

In re Tri-State Armored Servs., Inc., 366 B.R. 326 (D.N.J. 2007)

Key Insight: District Court affirmed Bankruptcy Court’s ruling dismissing trustee’s claim for spoliation of evidence since the trustee failed to establish the fifth element of the claim

Nature of Case: Insurer brought adversary proceeding against Chapter 7 trustee

Electronic Data Involved: Email

John B. v. Goetz, 2007 WL 4198266 (M.D. Tenn. Nov. 26, 2007)

Key Insight: Where goal of prior discovery orders authorizing immediate forensic copying of computers of defendants’ 50 key custodians by plaintiff?s expert, escorted by United States Marshall, was to protect against defendants? destruction of responsive information in light of defendants? persistent and contumacious refusals to produce ESI, court denied motion for stay of orders pending appeal, finding that the class?s interests far outweighed any potential harm to defendants in the execution of the orders

Nature of Case: Class action on behalf of 550,000 children seeking to enforce their rights under federal law to various medical services

Electronic Data Involved: Computer systems of defendant Tennessee state agencies

Benton v. Dlorah, Inc., 2007 WL 3231431 (D. Kan. Oct. 30, 2007)

Key Insight: Magistrate judge ordered plaintiff to produce responsive emails, and if emails had been deleted, to produce for inspection her computer hard drive from which those emails were sent to allow defendants to use services of computer forensic specialist, if necessary, to retrieve them; request for sanctions denied without prejudice to a further request for a ?negative inference instruction? to be determined by trial judge

Nature of Case: Employment discrimination

Electronic Data Involved: Deleted email, hard drive of plaintiff’s personal computer

Escobar v. City of Houston, 2007 WL 2900581 (S.D. Tex. Sept. 29, 2007)

Key Insight: Adverse-inference instruction not warranted where there was no showing that relevant electronic communications were destroyed or that destruction occurred in bad faith; officers involved in the shooting were not likely to have used email to communicate about the event in the day after it occurred, and, under HPD’s document retention and destruction policy, electronic communications records were routinely destroyed within ninety days

Nature of Case: Wrongful death action based on shooting death of 14-year-old boy by police officer

Electronic Data Involved: Records of Houston Police Department electronic communications in the 24 hours after victim’s death

Tilton v. McGraw-Hill Cos., Inc., 2007 WL 3229157 (W.D. Wash. Oct. 30, 2007)

Key Insight: Where defendants had not shown that plaintiff’s initial disclosures or discovery responses were incomplete or incorrect and parties were not subject to any court order requiring them to produce documents created after the discovery deadline, and applicable legal authority was scant and fairly debatable, court declined to decide whether plaintiff was required to produce emails created after the close of discovery and ruled that plaintiff?s conduct was not sanctionable

Nature of Case: Plaintiff sued publisher alleging breach of a promise to keep his name and employer confidential

Electronic Data Involved: Email created after close of discovery

Flying J Inc. v. TA Operating Corp., 2007 WL 2220581 (D. Utah July 30, 2007)

Key Insight: Where defendant objected that requests for production of certain financial data sought to force them to create documents that did not exist, but did not assert that requested data was not readily accessible, and plaintiffs argued that they sought production of already-existing data (whether or not such data was stored in electronic form), court found that requests sought relevant information and ordered defendant ?to produce already-existing data, whether in raw or synthesized form,? responsive to the requests

Nature of Case: Antitrust litigation

Electronic Data Involved: Financial and sales data

Albertson v. Albertson, 73 Va. Cir. 94, 2007 WL 6013036 (Va. Cir. Ct. 2007)

Key Insight: Where issuance of a court order granting defendant the authority to access plaintiff?s password protected files already in defendant?s possession did not require plaintiff to perform a testimonial act, court held plaintiff?s assertion of Fifth amendment right did not bar court from granting defendant?s motion

Nature of Case: Divorce

Electronic Data Involved: Password protected computer files

Polycom, Inc. v. Codian Ltd., 2007 WL 194588 (E.D. Tex. Jan. 22, 2007)

Key Insight: Court denied motion to compel production of defendants’ source code in native format to be maintained in confidence at Los Angeles office of plaintiffs’ counsel in light of security concerns and technical support issues raised by defendants, and since defendants had already produced an electronic version of the source code and plaintiffs’ consultants had been inspecting the code for several months at defense counsel’s Palo Alto office; court rejected plaintiff’s argument that current system intruded on plaintiff’s work product

Nature of Case: Patent infringement

Electronic Data Involved: Source code

ACS Consultant Co., Inc. v. Williams, 2007 WL 674608 (E.D. Mich. Mar. 5, 2007)

Key Insight: Court quashed subpoena issued by plaintiff directing YAHOO! Inc. to produce all emails sent or received by individual defendant during specific time period in light of privacy and privilege concerns, but advised that plaintiff could obtain a new subpoena that was limited in scope

Nature of Case: Breach of employment agreement and wrongful termination

Electronic Data Involved: Email

Copyright © 2022, K&L Gates LLP. All Rights Reserved.