Tag:Inspection

1
Townsend v. Ohio Dept. of Transp., No. 11AP-672, 2012 WL 2467047 (Ohio Ct. App. June 28, 2012)
2
Pouncil v. Branch Law Firm, No. 10-1314-JTM-DJW, 2012 WL 777500 (D. Kan. Mar. 7, 2012)
3
Point 4 Data Corp. v. Tri-State Surgical Supply & Equip., Ltd., No. 11-CV-726 (CBA), 2012 WL 3705001 (E.D.N.Y. Aug. 27, 2012)
4
Tucker v. Amer. Int?l Group, Inc., No. 3:09-CV-1499 (CSH), 2012 WL 902930 (D. Conn. Mar. 15, 2012)
5
Chen v. New Trend Apparel, No. 11 Civ. 324 (GBD) (MHD), 2012 WL 4784855 (S.D.N.Y. Oct. 2, 2012)
6
In re Jordan, —S.W.3d—, 2012 WL 1098275 (Tex. Ct. App. Apr. 3, 2012)
7
Crop Data Mgmt. Sys., Inc. v. Software Solutions Integrated LLC, No. 2:11-cv-01437 LKK KJN, 2012 WL 2571201 (E.D. Cal. July 2, 2012)
8
Bourne v. Arruda, No. 10-cv-393-LM, 2012 WL 1570831 (D.N.H. May 3, 2012)
9
Rudolph v. Beacon Indep. Living, LLC, No. 3:11-CV-617-FDW-DSC, 2012 WL 2804114 (W.D.N.C. July 10, 2012)
10
M-I LLC v. Stelly, No. H-09-1552, 2015 WL 12896025 (S.D. Tex. Nov. 21, 2011)

Townsend v. Ohio Dept. of Transp., No. 11AP-672, 2012 WL 2467047 (Ohio Ct. App. June 28, 2012)

Key Insight: Trial court abused its discretion in denying motion to conduct forensic analysis of defendant?s email and electronic data systems where defendant?s employee admitted to sending a highly relevant email that was never produced and where defendant failed to establish that production ?would incur undue burden or expense?; court?s analysis included consideration of whether deleted emails were discoverable (yes) and the need for a protocol to protect the producing party?s privilege, confidential information

Nature of Case: Personal injury resulting from auto accident

Electronic Data Involved: Email

Pouncil v. Branch Law Firm, No. 10-1314-JTM-DJW, 2012 WL 777500 (D. Kan. Mar. 7, 2012)

Key Insight: Where evidence indicated that defendant?s responses to discovery were incomplete, court ordered defendant to ?proceed with the forensic search of their computer systems using protocols agreed upon by the parties? but declined to compel defendant to bear the cost of the examination until final costs were known; defendant was also ordered to institute a litigation hold where defendant?s deposition testimony established that none had previously been issued

Nature of Case: Malpractice

Electronic Data Involved: ESI

Point 4 Data Corp. v. Tri-State Surgical Supply & Equip., Ltd., No. 11-CV-726 (CBA), 2012 WL 3705001 (E.D.N.Y. Aug. 27, 2012)

Key Insight: Where, seeking data related to the number of times and when defendant logged onto plaintiff?s accounting system, defendant paid for an expert to restore damaged media but found no responsive data thereon and where plaintiff thereafter sought access to the damaged media to conduct its own search, the court indicated it would not allow a fishing expedition, but that if plaintiff wanted to bear the costs of duplicating defendant?s restoration and search efforts, it could retain a neutral third-party expert to do so, limited to a search of specifically identified folders; as to an inoperable drive that the parties previously agreed would be considered inaccessible, court would allow plaintiff to pay for neutral third party?s examination to perform a limited review; court declined to compel affidavit from defendant indicating specific steps to locate and preserve relevant data

Electronic Data Involved: Hard drive and copies of same

Tucker v. Amer. Int?l Group, Inc., No. 3:09-CV-1499 (CSH), 2012 WL 902930 (D. Conn. Mar. 15, 2012)

Key Insight: Court denied plaintiff?s motion to compel inspection of third party?s electronic records where the subpoenas seeking access was overly broad, where the existence of additional responsive information was speculative, where the information sought was cumulative of information obtained elsewhere, and where conducting the requested search would result in a significant burden to a non-party

Nature of Case: Action to recover damages from former employer’s insurers

Electronic Data Involved: ESI

Chen v. New Trend Apparel, No. 11 Civ. 324 (GBD) (MHD), 2012 WL 4784855 (S.D.N.Y. Oct. 2, 2012)

Key Insight: Court denied motion to compel inspection of defendants? computers reasoning that such inspections are granted only under limited circumstances ?when there is reason to believe that a litigant has tampered with the computer or hidden relevant materials despite demand for them in the course of the lawsuit or when the possession or use of the computer is an element of the parties’ claims or defenses? and further reasoning that movants made no showing to justify their request, particularly where certain information they sought had already been provided

Electronic Data Involved: Hard drives

In re Jordan, —S.W.3d—, 2012 WL 1098275 (Tex. Ct. App. Apr. 3, 2012)

Key Insight: Court conditionally granted writ of mandamus upon finding that In re Weekley Homes was controlling and that the lower court had abused its discretion by not following the procedures elaborated therein, including that the party who was granted access to relator?s computer (through a forensic examiner) failed to explain its search methodology or its expert’s credentials and that there was no evidence that the court considered a protective order

Nature of Case: Hostile work environment

Electronic Data Involved: Personal computer

Crop Data Mgmt. Sys., Inc. v. Software Solutions Integrated LLC, No. 2:11-cv-01437 LKK KJN, 2012 WL 2571201 (E.D. Cal. July 2, 2012)

Key Insight: Court denied plaintiff?s motion to compel ?complete forensic imaging and an open ended computer inspection of all of defendants ?electronically stored information?? where the court found the request was overly broad in scope and unduly burdensome and costly in light of the time and cost of the necessary privilege reviews by defendants and other expenses associated with the business interruption of such inspections, where ?plaintiff ha[d] not reasonably attempted to obtain the information it [sought] short of the proposed, burdensome computer investigation,? and where it was ?highly improbable? that the parties could complete the inspection by the close of discovery

Electronic Data Involved: Forensic inspection of computers and servers

Bourne v. Arruda, No. 10-cv-393-LM, 2012 WL 1570831 (D.N.H. May 3, 2012)

Key Insight: Court denied plaintiff?s motion for access to defendants? computers and other electronic storage devices (at defendants? expense) where plaintiff?s allegations of incomplete discovery and spoliation were merely speculative and were insufficient to justify his request

Nature of Case: Defamation

Electronic Data Involved: Computers, electronic storage devices

Rudolph v. Beacon Indep. Living, LLC, No. 3:11-CV-617-FDW-DSC, 2012 WL 2804114 (W.D.N.C. July 10, 2012)

Key Insight: Where it was undisputed that Defendant instructed a non-party witness to delete relevant emails on his computer and that the non-party complied, court granted in part plaintiff?s motion for sanctions and ordered that defendant and the non-party preserve all ESI going forward, that defendant and the non-party submit their computers for forensic examination to recover deleted emails and to gather native format versions of information previously produced ?as fixed images,? that defendant pay the cost of the forensic examinations, and that defendant bear plaintiffs? attorneys costs and fees for preparing the underlying motion

Electronic Data Involved: Emails, ESI

M-I LLC v. Stelly, No. H-09-1552, 2015 WL 12896025 (S.D. Tex. Nov. 21, 2011)

Key Insight: Court ordered forensic inspection of Defendant?s computers where Plaintiff presented evidence that an individual defendant had transferred confidential information to USB devices and Plaintiff suspected it had then been transferred to Defendant?s computer systems and where Plaintiff produced evidence of Defendant?s practice of deleting documents; court ordered inspection undertaken by an independent expert

Electronic Data Involved: Contents of computers

Copyright © 2022, K&L Gates LLP. All Rights Reserved.