Court Sets Out Imaging, Recovery and Disclosure Protocols for Imaging of Defendants’ Computer Equipment by Plaintiff’s Computer Forensics Expert
Cenveo Corp. v. Slater, 2007 WL 442387 (E.D. Pa. Jan. 31, 2007)
In this case, plaintiff alleged that its former employees improperly used plaintiff’s computers, confidential information and trade secrets to divert business from plaintiff to defendants. In discovery, the parties disputed how and under what circumstances materials on hard drives in defendants’ possession would be produced to plaintiff. Plaintiff sought to use a mirror or digital imaging method, in which a digital image of the hard drives would be created and turned over to a third party forensic computer expert of plaintiff’s choosing, who would then search the image for relevant information. Plaintiff further proposed that, to avoid any disclosure of privileged information, defendants should provide a privilege log to plaintiff’s third party forensic expert, and that the forensics expert would be bound not to disclose any privileged information provided to him. Defendants, on the other hand, proposed that they create digital image of the hard drives in question and search that image using terms that plaintiff provided and defendants agreed upon. Defendants would then produce the results of the search to plaintiff, save any confidential or privileged information. Read More