Electronic Discovery Law

Legal issues, news and best practices relating to the discovery of electronically stored information.

1
J.T. Shannon Lumber Co., Inc. v. Gilco Lumber, Inc., 2008 WL 3833216 (N.D. Miss. Aug. 14, 2008)
2
Hightower v. Heritage Acad. of Tulsa, Inc., 2008 WL 2937227 (N.D. Okla. July 29, 2008)
3
Montgomery v. eTreppid Techs., LLC., 2008 WL 2277118 (D. Nev. May 29, 2008)
4
Louis Vuitton Malletier, S.A. v. Akanoc Solutions, Inc., 2008 WL 3200822 (N.D. Cal. Aug. 7, 2008)
5
Lowery v. County of Riley, 2008 WL 3562061 (D. Kan. Aug. 12, 2008)
6
E.E.O.C. v. Beauty Enters., Inc., 2008 WL 3359252 (D. Conn. Aug. 8, 2008)
7
Super Future Equities, Inc. v. Wells Fargo Bank Minn., N.A., 2008 WL 3261095 (N.D. Tex. Aug. 8, 2008)
8
Mon River Towing, Inc. v. Indus. Terminal & Salvage Co., 2008 WL 2412946 (W.D. Pa. June 10, 2008)
9
UMG Recordings, Inc. v. Doe, 2008 WL 2949427 (N.D. Cal. July 30, 2008)
10
Law Offices of Ben C. Martin LLP v. Sweet, 2008 WL 2045477 (N.D. Tex. Mar. 19, 2008)

J.T. Shannon Lumber Co., Inc. v. Gilco Lumber, Inc., 2008 WL 3833216 (N.D. Miss. Aug. 14, 2008)

Key Insight: Granting motion to quash, court found that subpoenas duces tecum served by plaintiff on Microsoft, Google and Yahoo! requesting entire contents of individual defendants’ mailboxes and other information were facially invalid under Stored Communications Act of 1986 and were overly burdensome and oppressive; court found that breadth was so expansive that it resembled a ?fishing expedition,? and that plaintiff had not shown that all information requested was relevant or likely to lead to admissible evidence

Nature of Case: Intentional interference with business relationships, breach of contract, breach of fiduciary duty

Electronic Data Involved: Entire contents of individual defendants’ mailboxes stored on third-party ISPs, details of individuals’ accounts and user connection logs

Hightower v. Heritage Acad. of Tulsa, Inc., 2008 WL 2937227 (N.D. Okla. July 29, 2008)

Key Insight: Observing that defendant had not argued that requested emails were not reasonably accessible and had not otherwise demonstrated that production of emails by four identified individuals on single topic over four-year period was unduly burdensome, court rejected defendant?s overbreadth and burdensome objections and ordered defendant to produce responsive documents

Nature of Case: Employment discrimination, wrongful termination

Electronic Data Involved: Emails sent or received by four members of defendant’s Board of Trustees pertaining to plaintiff and/or her employment

Montgomery v. eTreppid Techs., LLC., 2008 WL 2277118 (D. Nev. May 29, 2008)

Key Insight: Where neither party would be able to conclusively prove ownership of disputed technology without analysis of source code, court concluded that documents related to source code and other technology plaintiff claimed as trade secret were ?reasonably calculated to lead to the discovery of admissible evidence? and ordered plaintiff to produce responsive documents and ESI

Nature of Case: Copyright infringement, breach of fiduciary duty, fraud, conversion, breach of contract

Electronic Data Involved: Source code and related technology

Louis Vuitton Malletier, S.A. v. Akanoc Solutions, Inc., 2008 WL 3200822 (N.D. Cal. Aug. 7, 2008)

Key Insight: District court overruled defendants’ objections to magistrate judge’s order compelling production of certain ESI, rejecting claim that requested discovery was unduly burdensome; although defendants claimed they had more than 1500 servers, court noted that discovery was limited to 67 specific web sites and defendants had offered no evidence to suggest that they could not narrow the number of servers on which responsive content might exist; court ordered parties to meet and confer to agree upon protocol for obtaining the requested discovery

Nature of Case: Contributory and vicarious trademark and copyright infringement claims against internet service providers who host third-party websites on their servers

Electronic Data Involved: Publicly-posted Internet content evidencing offers made of counterfeit Louis Vuitton merchandise and traffic logs evidencing the volume of underlying counterfeit activity, limited to 67 allegedly infringing websites identified by plaintiff

Lowery v. County of Riley, 2008 WL 3562061 (D. Kan. Aug. 12, 2008)

Key Insight: Court denied defendants’ motion to stay all discovery pending resolution of not-yet-filed petition for writ of certiorari to the U.S. Supreme Court, set Rule 16(b) scheduling conference, directed parties to conduct Rule 26(f) planning conference, and instructed parties to familiarize themselves with 2006 e-discovery amendments to FRCP, review ESI guidelines posted on court’s Internet website, and become knowledgeable about their clients’ information management systems and their operation, including how information is stored and retrieved

Nature of Case: Coercion, failure to investigate, fabrication of evidence, and malicious prosecution

Electronic Data Involved: ESI generally

E.E.O.C. v. Beauty Enters., Inc., 2008 WL 3359252 (D. Conn. Aug. 8, 2008)

Key Insight: Where plaintiffs argued that several BEI supervisors had testified they had not been instructed to preserve documents related to case, court agreed that defense counsel?s litigation hold letter was privileged and ordered BEI to disclose date on which letter was sent and names of recipients

Nature of Case: Employment discrimination

Electronic Data Involved: Letter from BEI’s counsel to BEI supervisors advising them to implement a litigation hold

Mon River Towing, Inc. v. Indus. Terminal & Salvage Co., 2008 WL 2412946 (W.D. Pa. June 10, 2008)

Key Insight: Nothing that in its estimation, “‘a print-out of computer data’ is significantly different than the report requested here by Defendant or any ‘analyses’ of documents,” court ruled that Rule 34 does not require responding party to create or generate responsive materials in specific form requested by the moving party; however, to extent that party merely requested computer print-out of information at issue, such print-outs fell within bounds of Rule 34 and should be produced

Nature of Case: Negligence, lost profits and indemnification

Electronic Data Involved: Computer printouts

UMG Recordings, Inc. v. Doe, 2008 WL 2949427 (N.D. Cal. July 30, 2008)

Key Insight: Where plaintiffs made prima facie showing of infringement, there was no other way to identify Doe defendant, and there was risk that ISP would destroy its logs prior to Rule 26(f) conference, court found that need for expedited discovery outweighed prejudice to defendant and granted plaintiffs? motion for leave to take immediate discovery

Nature of Case: Copyright infringement through use of peer-to-peer (“P2P”) networking

Electronic Data Involved: ISP logs; documents and ESI sufficient to identify defendant’s true name, current and permanent addresses and telephone numbers, email addresses, and Media Access Control addresses

Law Offices of Ben C. Martin LLP v. Sweet, 2008 WL 2045477 (N.D. Tex. Mar. 19, 2008)

Key Insight: Where neutral expert could not testify, based on forensic search of Sweet?s computer, that Sweet or someone at his direction had intentionally destroyed subject email, and it appeared that most of expert?s report went beyond scope of his duties as neutral expert and was irrelevant to any issues in case, magistrate judge recommended that plaintiffs? motion for spoliation sanctions be denied and that certain portions of expert?s report be stricken; Report and Recommendation adopted by district court, 2008 WL 2130574 (N.D. Tex. Apr. 23, 2008)

Nature of Case: Dispute over fee owed to Martin and his firm as a result of settlement and verdict in medical malpractice case

Electronic Data Involved: Email sent by Martin via his Blackberry to Sweet confirming the terms of fee arrangement

Copyright © 2022, K&L Gates LLP. All Rights Reserved.