Tag:Inspection

1
Dawe v. Corrections, USA, 2009 WL 3233883 (E.D. Colo. Oct. 1, 2009)
2
Loius Vuitton Malletier, S.A., v. Akanoc Solutions, Inc., 2009 WL 1312898 (N.D. Cal. May 12, 2009)
3
Covad Commc?ns Co. v. Revonet, Inc., 258 F.R.D. 5 (D.D.C. 2009)
4
Sony BMG Music Entertainment v. Tenebaum, , 2009 WL 1651338 (D.R.I. June 10, 2009)
5
Tumbling v. Merced Irrigation Dist., 2009 WL 2136112 (E.D. Cal. July 14, 2009)
6
State v. Bowser, 2009 WL 2308068 (Wis. Ct. App. July 30, 2009)
7
SEC v. Strauss, 2009 WL 3459204 (S.D.N.Y. Oct. 28, 2009)
8
Bryant v. Gardner, 587 F. Supp. 2d 951 (N.D. Ill. 2008)
9
Ford Motor Co. v. Hall-Edwards, 997 So.2d 1148 (Fla. Dist. Ct. App. 2008)
10
Am. Express Co. v. Goetz, 515 F.3d 156 (2nd Cir. 2008)

Dawe v. Corrections, USA, 2009 WL 3233883 (E.D. Colo. Oct. 1, 2009)

Key Insight: Citing a ?pervasive? level of ?distrust that permeates this litigation? and plaintiff?s ?adamant refusal to permit even a limited inspection? and citing defendants? representations that additional, relevant information remained on the laptop and that the laptop had been ?forensically cleaned,? court granted defendants? motion to compel inspection of plaintiff?s laptop but ordered defendants to bear the cost – if inspection revealed relevant information was withheld, court invited a motion to shift some or all of the costs to plaintiff(s)

Electronic Data Involved: ESI, laptop

Loius Vuitton Malletier, S.A., v. Akanoc Solutions, Inc., 2009 WL 1312898 (N.D. Cal. May 12, 2009)

Key Insight: Where plaintiff?s initial investigation into publicly posted Internet content evidencing offers for counterfeit products revealed that several previously identified addresses belonged to the same individual and where plaintiff identified additional potentially infringing sites, court granted plaintiff?s motion to modify the court ordered inspection protocol to allow investigation beyond the 67 websites previously identified; court rejected defendants? argument that modification should be denied as burdensome where plaintiff was to bear the cost of the searching and rejected defendants privacy concerns in light of expert?s articulated methodology for pinpointing only potentially relevant material

Nature of Case: Trademark and copyright infringement

Electronic Data Involved: Website Content

Covad Commc?ns Co. v. Revonet, Inc., 258 F.R.D. 5 (D.D.C. 2009)

Key Insight: Where parties failed to reach agreement regarding inspection protocol for defendant?s relevant database, court stepped in and ordered plaintiff?s expert to image relevant servers and PCs and to search those systems for relevant documents; having generally declined to order searching of defendant?s exchange servers absent more than conclusory assertions of a deficient production, court found compelling justification for a comparative search of certain exchange servers where, in light of a previous server crash and subsequent restoration of the content, questions arose regarding the identification of all responsive emails

Nature of Case: Misappropriation and conversion of trade secret information

Electronic Data Involved: Database, emails, ESI

Sony BMG Music Entertainment v. Tenebaum, , 2009 WL 1651338 (D.R.I. June 10, 2009)

Key Insight: Court denied plaintiffs? motion to compel compliance with third party subpoena to allow access to the hard drive of the parents of defendant accused of copyright infringement in a music downloading case where parents were not parties to the action and where the computer was purchased after defendant moved out and thus plaintiffs failed to establish likelihood of the discovery of relevant information sufficient to warrant intrusion into parents? privacy

Nature of Case: Copyright infringement

Electronic Data Involved: Hard drive belonging to third party

Tumbling v. Merced Irrigation Dist., 2009 WL 2136112 (E.D. Cal. July 14, 2009)

Key Insight: Citing Fed. R. Civ. P. 26(b)(2)(c)(i) and (ii), court denied defendant?s motion to compel production of plaintiff?s hard drive where defendant admitted that it had not yet exhausted less intrusive or burdensome means of discovering the information sought

Nature of Case: Employment discrimination

Electronic Data Involved: Hard drive

State v. Bowser, 2009 WL 2308068 (Wis. Ct. App. July 30, 2009)

Key Insight: Trial court did not abuse discretion by denying defendant?s motion for a copy of the hard drive containing incriminating child pornography and granting State?s motion for a protective order requiring defendant?s forensic expert to conduct examination of the hard drive pursuant to Department of Justice protocol which required the examination be undertaken at government offices under strict guidelines intended to prevent further dissemination of the images

Nature of Case: Possession of child pornography

Electronic Data Involved: Hard drive

SEC v. Strauss, 2009 WL 3459204 (S.D.N.Y. Oct. 28, 2009)

Key Insight: Court found SEC had control of Delloitte & Touche database for purposes of Rule 34 analysis where SEC had both the practical ability and legal right to obtain the working papers contained therein but declined to compel SEC to grant access to defendant where he could obtain independent access to the database himself (by subpoena) and where the access requested would result in ?significant burdens? to SEC, including limiting its own access and interfering with the ability to view files

Nature of Case: Enforcement action for accounting fraud

Electronic Data Involved: Access to database

Bryant v. Gardner, 587 F. Supp. 2d 951 (N.D. Ill. 2008)

Key Insight: Where defendants failed to preserve laptop by continued use and by running defragmentation program, court imposed sanction of fees and costs and precluded defendants from making particular arguments that became unverifiable as result of failure to preserve; where forensic examination revealed creation of false evidence on laptop, court ordered accused defendant to show cause why matter should not be referred for prosecution

Nature of Case: Wrongful termination, discrimination

Electronic Data Involved: Laptop

Ford Motor Co. v. Hall-Edwards, 997 So.2d 1148 (Fla. Dist. Ct. App. 2008)

Key Insight: Where trial court granted plaintiff access to all defendant?s databases, including an exclusively privileged database, based upon an unproven assumption regarding ease of production and upon defendant?s violation of a prior court order by failing to provide sufficient information regarding its search efforts, appellate court quashed order noting that defendant?s violations were correctable and non-prejudicial and thus could not justify invasion of the attorney-client privilege or work product

Nature of Case: Personal injury

Electronic Data Involved: Database

Copyright © 2022, K&L Gates LLP. All Rights Reserved.