Tag:Local Rule

1
Butler v. State of Texas, —S.W.3d—, 2015 WL 1816933 (Tex. Crim. App. Apr. 22, 2015)
2
HMS Holdings Corp. v. Arendt, NO. A754/2014, 2015 WL 2403099 (N.Y. Sup. Ct. May 19, 2015)
3
Knoderer v. State Farm Lloyds, No. 06-13-00027-CV, 2014 WL 4699136 (Tex. App. Sep. 19, 2014)
4
Del Gallo v. City of New York, 997 N.Y.S.2d 98 (Table) (N.Y. Sup. Ct.2014)
5
McNabb v. City of Overland Park, No. 12-CV-2331 CM/TJJ, 2014 WL 1493124 (D. Kan. Apr. 16, 2014)
6
FDIC v. Bowden, No. CV413-245, 2014 WL 2548137 (S.D. Ga. June 6, 2014)
7
Farstone Tech., Inc. v. Apple, Inc., No. 8-13-cv-01537-ODW(JEMx), 2014 WL 2865786 (C.D. Cal. June 24, 2014)
8
Culp v. Alabama, CR-13-1039, 2014 WL 6608543 (Ala. Crim. App Nov.21, 2014)
9
Black & Veatch Corp. v. Aspen Ins. (UK) Ltd., No. 12-2350-SAC, 2014 WL 806122 (D. Kan. Feb. 28, 2014)
10
SCR-Tech LLC v. Evonik Energy Servs. LLC, No. 08 CVS 16632 (N.C. Super Ct. Dec. 31, 2014)

Butler v. State of Texas, —S.W.3d—, 2015 WL 1816933 (Tex. Crim. App. Apr. 22, 2015)

Key Insight: Highest criminal court in Texas reversed the judgment of the court of appeals that had overturned defendant?s conviction upon concluding that the trial court ?had acted within its discretion? in concluding that the state met its threshold burden of authentication sufficient to admit defendant?s text messages to the victim where authentication can be satisfied by direct or circumstantial evidence and where the victim testified that she knew the messages were from defendant because: he had called from that number in the past, ?the context of the text messages convinced her that the messages were from him,? and ?he actually called her from that same phone number during the course of that very text message exchange?

Nature of Case: Criminal: Kidnapping, assault and related crimes

Electronic Data Involved: Text messages from Defendant to the victim

HMS Holdings Corp. v. Arendt, NO. A754/2014, 2015 WL 2403099 (N.Y. Sup. Ct. May 19, 2015)

Key Insight: For one defendant?s repeated use of a cleaning software (?Disk Utility? and its ?Secure Erase Free Space? function) to delete files and loss of a relevant hard drive without an adequate explanation and for another defendant?s loss of relevant ESI, including her intentional deletion of information from the desktop registry and her disposal of her cell phone (which she notably was unaware had been automatically backed up each time it was connected to her computer), ongoing deletion of text messages (on her new phone), and misrepresentations about when the old phone was discarded, the court found that a mandatory adverse inference was warranted and rejected Defendants? argument that the court should decline to employ the adverse inference at the preliminary injunction state, reasoning that the objective of promoting fairness was best served by ?employing an adverse inference at all relevant states of the litigation?; court also ordered defendants to pay Plaintiff?s attorneys fees without seeking reimbursement from their new employer and indicated its intention to forward its decision to the NY Bar in light of one defendant?s status as an attorney

Nature of Case: Misappropriation of trade secrets, breach of “post-employment covenants”

Electronic Data Involved: ESI, hard drive, text messages (iphone)

Del Gallo v. City of New York, 997 N.Y.S.2d 98 (Table) (N.Y. Sup. Ct.2014)

Key Insight: Addressing request for discovery of Plaintiff?s social media contents, specifically LinkedIn, court indicated that ?[t]o warrant such discovery, ?defendants must establish a factual predicate for their request by identifying relevant information in plaintiff?s [social media] account — that is, information that contradicts or conflicts with plaintiff?s alleged restrictions, disabilities, and losses, and other claims?? and, although it acknowledged that Defendants could obtain information pertinent to Plaintiff?s communications with recruiters related to job offers and related inquiries, indicated that Defendants had not shown that they were entitled to Plaintiff?s communications with former colleagues about her condition or to the other materials on LinkedIn

Nature of Case: Wrongful death and personal injuries resulting from falling tree limb

Electronic Data Involved: Social Media Contents (e.g., LinkedIn)

McNabb v. City of Overland Park, No. 12-CV-2331 CM/TJJ, 2014 WL 1493124 (D. Kan. Apr. 16, 2014)

Key Insight: Court denied motion to compel defendant to produce additional 10,189 responsive emails where plaintiff did not identify any specific discovery request for which she sought to compel production, or any specific objection thereto that she claimed to be invalid, and defendant had already produced five categories of emails totaling over 36,000 documents; court advised that plaintiff must present something more than mere speculation that search of 14 custodians’ email files using 35 proposed search terms was likely to reveal additional responsive emails, and further noted that, on its face, search term list was overly broad and likely to capture many emails having nothing to do with issues in case

Nature of Case: Sexual discrimination, harassment, hostile work environment and retaliation claims

Electronic Data Involved: Email

Farstone Tech., Inc. v. Apple, Inc., No. 8-13-cv-01537-ODW(JEMx), 2014 WL 2865786 (C.D. Cal. June 24, 2014)

Key Insight: Court adopted plaintiff’s source-code printing provision in its entirety, rejecting as too restrictive defendant’s proposed limitations that parties may print only that source code ?necessary? to prepare court filings and pleadings, noting that the “reasonably necessary” standard had solid foundation in district?s model protective order, and rejecting as arbitrary defendant?s proposed numerical restrictions: 30-page threshold beyond which the source code printing would be presumed to be excessive, and a total cap on source code printing at the greater of 250 pages or 10 percent of the source code; court also adopted in full plaintiff?s proposed language regarding the use of source code for depositions

Nature of Case: Patent infringement

Electronic Data Involved: Source code

Culp v. Alabama, CR-13-1039, 2014 WL 6608543 (Ala. Crim. App Nov.21, 2014)

Key Insight: In his appeal of a domestic violence conviction, Culp claimed that emails between himself and the victim were improperly admitted into evidence and were never properly authenticated under Rule 901(b)(4), Ala. R. Evid.. Alabama?s Rule 901(b)(4), which is identical to the federal version, provides that evidence can be authenticated by ?[d]istinctive characteristics and the like,? including ?[a]ppearance, contents, substance, internal patterns, or other distinctive characteristics, taken in conjunction with circumstances.? The court ruled that the emails were properly authenticated because each email contained Culp?s photograph, a screen name that he used, and many of the emails concluded with Culp?s initials. Additionally, the emails contained drug references that were uniquely used by Culp and the victim.

Nature of Case: Criminal

Electronic Data Involved: Email

Black & Veatch Corp. v. Aspen Ins. (UK) Ltd., No. 12-2350-SAC, 2014 WL 806122 (D. Kan. Feb. 28, 2014)

Key Insight: Court denied in most respects plaintiff’s motion for protective order, finding that plaintiff’s undue burden and expense arguments were unsupported and conclusory; court further denied plaintiff’s alternative proposal to shift some of the uncalculated ESI costs onto defendants as plaintiff failed to show that the disputed ESI production was inaccessible because of undue burden or cost, and because other relevant factors did not weigh in plaintiff’s favor; court further denied plaintiff?s request for a discovery conference or appointment of an ESI master, and ordered the parties to meet and confer regarding the proper method to search custodian hard drives, and suggested the parties consider a clawback provision specifically for ESI harvested after running the parties? respective search terms

Nature of Case: Insurance coverage dispute

Electronic Data Involved: ESI in databases and stored on custodian hard drives

SCR-Tech LLC v. Evonik Energy Servs. LLC, No. 08 CVS 16632 (N.C. Super Ct. Dec. 31, 2014)

Key Insight: Where Plaintiff failed to ensure the preservation of information underlying a highly relevant report regarding the examination of certain Defendants? computers over which the court determined it had ?de facto control? (the underlying information, including copies of the images were in the possession of the third party investigator), the court indicated it was not necessary to make an express finding regarding when litigation was contemplated and reasoned that based on the circumstances, Defendants were ?entitled to the inference? that the information was negligently lost during a time when Plaintiff had the duty to preserve it. Thus, the court found Defendants had presented sufficient evidence of spoliation to trigger Plaintiff?s obligation to rebut it and that Plaintiff had not. As a sanction, the court ordered a permissive adverse inference. Regarding Plaintiff?s request to compel Defendant?s restoration of backup tapes, the court identified the state?s relevant three-part test and ordered that if Plaintiff wanted restoration, it would be required to pay half o f the estimated costs up front, with further allocation to occur following analysis of the results of the search.

Electronic Data Involved: ESI, backup tapes

Copyright © 2025, K&L Gates LLP. All Rights Reserved.