Electronic Discovery Law

Legal issues, news and best practices relating to the discovery of electronically stored information.

1
Court Sets Protocol for Forensic Examination of Employment Discrimination Plaintiff’s Home Computers
2
Inadequate Preservation Efforts Necessitate Restoration and Production of Email from Backup Tapes, and Forensic Search of CEO’s Laptop
3
The Sedona Conference® Commentary on ESI Evidence & Admissibility
4
Court Declines to Issue Advisory Opinion as to What Actions State Must Take to Properly Preserve Documents for Potential Suit
5
Avoiding E-Discovery Pitfalls
6
Court Sets Protocol for Production and Review of Text Messages
7
Court Approves Retention of Independent Technology Expert to Build, Maintain and Operate Discovery Database to Ensure Consistency, Reliability and Accessibility of Information
8
4th Annual Life Sciences Counsel Guide to Document Management, E-Discovery, and Litigation Readiness
9
Federal Court Allows Plaintiff to Amend Complaint to Assert State Law Spoliation Cause of Action Based on Defendant’s Failure to Implement Litigation Hold
10
Magistrate Judge Orders Expedited Forensic Imaging of Defendants’ Computers

Court Sets Protocol for Forensic Examination of Employment Discrimination Plaintiff’s Home Computers

Coburn v. PN II, Inc., 2008 WL 879746 (D. Nev. Mar. 28, 2008)

In this employment discrimination case, defendants sought a forensic examination of plaintiff’s home computers.  Defendants explained that the inspection would focus on information relating to Coburn’s employment with defendants, the termination of that employment, allegations or claims Coburn was making in this action, and damages resulting from the actions or inactions of defendants.  Plaintiff did not object generally to a “limited, focused” inspection, but opposed the request because defendants had not set forth a protocol or methodology that would protect her against violations of privilege, privacy and confidentiality interests.

The court found that the burden on plaintiff of such an inspection would be minimal.  It noted that defendants sought only a mirror image or “clone copy” of the hard drive or drives in question, and that defendants had agreed to bear the entire cost of the forensic inspection.  The court cited approvingly the protocol adopted in Playboy Enters., Inc. v. Welles, 60 F.Supp.2d 1050, 1054-55 (S.D. Cal.1999), finding that it offered “a suitable approach for protecting Coburn’s communications with her attorney, and her privacy interests as well as the confidentiality interests of her new employer.”

Read More

Inadequate Preservation Efforts Necessitate Restoration and Production of Email from Backup Tapes, and Forensic Search of CEO’s Laptop

Treppel v. Biovail Corp., 2008 WL 866594 (S.D.N.Y. Apr. 2, 2008)

In this case, plaintiff alleged that Biovail Corp., its CEO, general counsel and others engaged in a "smear campaign" that destroyed plaintiff’s career as a securities analyst.  He asserted claims of defamation, tortious interference with prospective economic advantage and civil conspiracy.  In February 2006, as previously summarized here, Magistrate Judge James C. Francis, IV declined to enter a preservation order and ordered defendants to answer a “document retention questionnaire” and produce documents in native format.  In response that order, Biovail proceeded with the search protocol it had previously proposed, using the search terms (i) Treppel, (ii) Jerry, (iii) Bank of America, (iv) Banc of America, (v) BAS, and (vi) BofA.  Biovail searched the individual emails and files of certain key players, as well as the shared file drives of relevant departments.  It conducted the search by accessing certain backup tapes it had preserved, and images of the custodians’ hard drives.

Subsequently, plaintiff requested that Biovail expand its search for electronic documents by adding some 30 search terms and numerous individual custodians to the original search.  Biovail declined on the grounds that plaintiff’s request came too late and was overbroad.  Biovail produced the results of its search in May 2006.  After some additional discovery relating to Biovail’s preservation of electronic data, discovery closed in December 2007.

Plaintiff then moved for an order compelling Biovail to search for additional ESI and imposing sanctions, alleging that the defendants did not adequately preserve evidence.  Defendants opposed both applications, contending that their production was complete and that their steps to preserve evidence were sufficient.

Read More

Court Declines to Issue Advisory Opinion as to What Actions State Must Take to Properly Preserve Documents for Potential Suit

Texas v. City of Frisco, 2008 WL 828055 (E.D. Tex. Mar. 27, 2008)

In this case, the State of Texas sought a declaratory judgment and the court’s protection from a general litigation hold request, initiated by a letter sent by the City of Frisco.  The letter asked the Texas Department of Transportation to generally preserve all electronic data associated with a particular highway toll project, and referred to potential litigation regarding the environmental evaluation of the toll project.  The State speculated that the City would likely bring suit pursuant to the National Environmental Policy Act and the Administrative Procedures Act; however, at the time the complaint was filed, no claims had been brought.  Thus, the State asked the court to enter a declaratory judgment ruling that the City’s preservation letter "violates the Federal Rules of Civil Procedure and is contrary to rules governing a NEPA/APA claim in federal court."  The request for declaratory relief was the sole count made against the City of Frisco in the complaint.

The City of Frisco moved to dismiss, arguing that the State failed to plead the elements of any viable claim and was essentially asking the court for an advisory opinion concerning what action it must take to properly preserve those documents subject to the litigation hold.  The court agreed, and dismissed the complaint.  The court’s analysis is set out below:

Read More

Avoiding E-Discovery Pitfalls

By K&L Gates partner David R. Cohen

This article appears in the March 2008 edition of BizTech Magazine, and begins:

If you’re not currently involved in litigation or an investigation and won’t be in the future, then e-discovery isn’t something your business needs to concern itself with.  The rub is that it’s often impossible to predict whether your business will be involved in a lawsuit or investigatory action.

Fortunately, the recent amendments to the Federal Rules of Civil Procedure do not impose any requirements on companies outside of the litigation process.  And because small and midsize businesses are less likely to be involved in litigation, they are at less risk.  However, if your business and IT departments aren’t prepared and you suddenly find yourself involved in a lawsuit, it may be too late to take the appropriate action.  Here are three best-practice steps that IT departments should keep in mind with regard to e-discovery and electronically stored information . . .

View the full article online, or as a .pdf here

Court Sets Protocol for Production and Review of Text Messages

Flagg v. City of Detroit, 2008 WL 787061 (E.D. Mich. Mar. 20, 2008)

Plaintiff in this case is the minor son of a murder victim, whose murder remains unsolved.  The complaint alleges that the defendants engaged in a laxity in investigation, deliberately ignored and actively concealed material evidence, and deprived the plaintiff of an opportunity to bring a wrongful death suit against the murderer.

In a separate order on March 20, 2008, the court denied defendants’ motion to quash subpoenas to SkyTel for the production of certain text messages.  The court found that the plaintiff was entitled to pursue the production of certain text messages sent or received by specified officials or employees of the City of Detroit (some of whom were also named as individual defendants in the suit) during specified time frames, using text messaging devices supplied by SkyTel.  The court observed that the relevance (and hence discoverability) of the text messages necessarily turned upon the content of the communications.  Thus, it was essential to establish a procedure for the review of the content of each such communication.  Moreover, because a communication might be relevant, but not subject to discovery, e.g., protected by a privilege, the court stated that the procedure must be capable of addressing such issues and objections to production.

Accordingly, the court issued this order establishing a protocol for review and production of text messages, and assigning two magistrate judges to perform the review.
 

Read More

Court Approves Retention of Independent Technology Expert to Build, Maintain and Operate Discovery Database to Ensure Consistency, Reliability and Accessibility of Information

In re World Trade Ctr. Disaster Site Litig., 2008 WL 793578 (S.D.N.Y. Mar. 24, 2008)

This litigation concerns claims relating to respiratory injuries suffered by rescue and clean-up workers as a result of exposure to toxins and other contaminants in the aftermath of the September 11, 2001 terrorist attacks.  Approximately 10,000 cases are before the court.

In this decision, the court approved the Special Masters’ recommendation that Technology Concepts & Design, Inc. ("TCDI") be retained to build, maintain and operate a database, to store the “Core Discovery” that the parties had begun to produce, and will continue to produce, pursuant to the court’s “Core Discovery Order" of November 27, 2007.  The court explained that the “Core Discovery” will create a substantial amount of information, including insurance data from scores of contractors and subcontractors, and basic details concerning each plaintiff’s claim.  The court continued:

Read More

4th Annual Life Sciences Counsel Guide to Document Management, E-Discovery, and Litigation Readiness

Monday & Tuesday, March 31 & April 1, 2008
Doubletree Metropolitan Hotel
569 Lexington Avenue
New York, NY 10022

K&L Gates partner David R. Cohen is a co-chair of this informative two-day conference.  He and K&L Gates partner Martha J. Dawson will be among those presenting and participating on panels, offering practical advice on records management, e-discovery and litigation readiness issues relevant to the life sciences industry.  Click here for additional information, or to register.

Program Overview:

The life sciences industry is particularly vulnerable to the inherent risk that arises out of improper management of electronic documents and e-discovery.  Taking into consideration the numerous regulatory and compliance requirements of the industry, the voluminous amount of electronic information that is consistently created and stored, and the pervasive litigation that surrounds the life sciences industry, companies must adopt proactive document management and e-discovery policies they can strategically implement and effectively enforce across the company.

Read More

Federal Court Allows Plaintiff to Amend Complaint to Assert State Law Spoliation Cause of Action Based on Defendant’s Failure to Implement Litigation Hold

Ed Schmidt Pontiac-GMC Truck, Inc. v. DaimlerChrysler Motors Co., LLC, 538 F. Supp. 2d 1032 (N.D. Ohio 2008)

In this case, an automobile dealer brought suit alleging that DaimlerChrysler had breached a settlement agreement when it refused to grant the dealer a Chrysler franchise.  During the two years of discovery that followed, Schmidt alleged that DaimlerChrysler knowingly and intentionally destroyed relevant evidence.  Specifically, Schmidt alleged that DaimlerChrysler failed to implement a litigation hold to prevent the destruction of evidence after the complaint was filed in October 2004, and replaced or altered certain employees’ hard drives days before Schmidt made forensic images of the drives as part of its discovery process.  Further, Schmidt alleged that DaimlerChrysler attempted to hide the extent and significance of its misconduct.  As a result, Schmidt sought to add a spoliation of evidence claim to the litigation.

The court observed that, under Ohio law, the elements for a spoliation of evidence cause of action are:

1) … pending or probable litigation involving the plaintiff; 2) knowledge on the part of the defendant that the litigation exists or is probable; 3) willful destruction of the evidence by the defendant designed to disrupt the plaintiff’s case; 4) disruption of the plaintiff’s case; and 5) damages proximately caused by the defendant’s actions.

Read More

Magistrate Judge Orders Expedited Forensic Imaging of Defendants’ Computers

Xpel Techs. Corp. v. Am. Filter Film Distribs., 2008 WL 744837 (W.D. Tex. Mar. 17, 2008)

In this brief order, the magistrate judge granted plaintiff’s motion for expedited computer forensic imaging, finding that good cause had been established.  The magistrate judge ruled that the costs of the forensic imaging would be borne by the plaintiff, and articulated a number of protocols for the parties to follow:

  • Computer forensic analysis will be performed by Digitalworks, located at 13333 N. Central Expy., Ste. 201, Dallas, Texas 75243 (the "Forensic Examiner").
  • All Forensic Examiners utilized must agree in writing to be bound by the terms of this Order prior to the commencement of their services.
  • Within two days of this Order or at such other time agreed to by the parties, defendants shall make its Computer(s), Server(s), and any other electronic storage devices located at Defendants’ place of business at 1385 Westpark Way, Euless, Texas, including but not limited to Brett Wassell’s laptop, which may be located at a different location, available to the Forensic Examiner to make mirror images of those devices as set out below:
     

Read More

Copyright © 2022, K&L Gates LLP. All Rights Reserved.