Tag:Motion for Protective Order

1
Palgut v. City Of Colo. Springs, 2007 WL 1238730 (D. Colo. Apr. 27, 2007)
2
Frees, Inc. v. McMillian, 2007 WL 1308388 (W.D. La. May 1, 2007)
3
Corvello v. New England Gas Co., Inc., 243 F.R.D. 28 (D.R.I. 2007)
4
In re Subpoena to Chronotek Sys., Inc., 2007 WL 2177013 (S.D. Tex. July 27, 2007)
5
Square D Co. v. Scott Elec. Co., 2007 WL 3488809 (W.D. Pa. Nov. 14, 2007)
6
John B. v. Goetz, 2007 WL 4198266 (M.D. Tenn. Nov. 26, 2007)
7
John B. v. Goetz, 2007 WL 4014015 (M.D. Tenn. Nov. 15, 2007)
8
In re ULLICO Inc. Litig., 237 F.R.D. 314 (D.D.C. 2006)
9
Quinby v. WestLB AG, 245 F.R.D. 94 (S.D.N.Y. 2006)
10
Frees, Inc. v. McMillian, 2006 WL 2668843 (E.D. Tenn. Sept. 15, 2006)

Frees, Inc. v. McMillian, 2007 WL 1308388 (W.D. La. May 1, 2007)

Key Insight: District court upheld magistrate judge’s January 22, 2007 memorandum order and related protective order, as such orders were not clearly erroneous or contrary to law

Nature of Case: Design firm sued former vice president under Computer Fraud and Abuse Act

Electronic Data Involved: Former employee’s home computer and new work computer

Corvello v. New England Gas Co., Inc., 243 F.R.D. 28 (D.R.I. 2007)

Key Insight: Court concluded that any privilege that may have attached to documents inadvertently produced on CD was waived, since non-party?s counsel failed to exercise due care when he produced CD without first reviewing it, failed to immediately accept party?s offer to temporarily halt its document review after he was alerted that some of the documents on CD appeared to be internal communications with counsel, and furnished an inadequate privilege log after two-week delay

Nature of Case: Litigation between gas company and landowners

Electronic Data Involved: Privileged documents inadvertently produced on CD

In re Subpoena to Chronotek Sys., Inc., 2007 WL 2177013 (S.D. Tex. July 27, 2007)

Key Insight: Magistrate judge adopted special master’s recommendations regarding motion to compel production of source code, and ordered Chronotek to produce the portions of its source code, if any, that incorporated particular technology subject to an appropriate protective order, or, if source code did not incorporate particular technology at issue, affidavit of knowledgeable person attesting to same

Nature of Case: Patent litigation

Electronic Data Involved: Source code

Square D Co. v. Scott Elec. Co., 2007 WL 3488809 (W.D. Pa. Nov. 14, 2007)

Key Insight: Declining to impose sanctions at this stage of litigation, court reiterated its prior order requiring defendant to submit to a forensic inspection of its computer systems which record its purchases and sales of Square D products and its inventory of such products, with such inspection to be incurred at defendant’s sole expense and cost; court further denied defendant’s motion for protective order for lack of good cause

Nature of Case: Circuit breaker manufacturer alleged that defendants unlawfully imported, distributed, and sold counterfeit Square D products

Electronic Data Involved: Defendant’s computer systems

John B. v. Goetz, 2007 WL 4198266 (M.D. Tenn. Nov. 26, 2007)

Key Insight: Where goal of prior discovery orders authorizing immediate forensic copying of computers of defendants’ 50 key custodians by plaintiff?s expert, escorted by United States Marshall, was to protect against defendants? destruction of responsive information in light of defendants? persistent and contumacious refusals to produce ESI, court denied motion for stay of orders pending appeal, finding that the class?s interests far outweighed any potential harm to defendants in the execution of the orders

Nature of Case: Class action on behalf of 550,000 children seeking to enforce their rights under federal law to various medical services

Electronic Data Involved: Computer systems of defendant Tennessee state agencies

John B. v. Goetz, 2007 WL 4014015 (M.D. Tenn. Nov. 15, 2007)

Key Insight: Ruling on defense motions for clarification, court directed that plaintiffs? expert and court-appointed monitor shall ?forthwith inspect the State?s computer systems and computers of the fifty (50) key custodians that contain information relevant to this action,? that plaintiffs? expert or his designee ?shall make forensic copies of any computer inspected to ensure the preservation of all existing electronically stored information (?ESI?)?; court further ordered that United States Marshall should accompany the plaintiffs? expert to ?ensure that this Order is fully executed.?

Nature of Case: Class action on behalf of 550,000 children seeking to enforce their rights under federal law to various medical services

Electronic Data Involved: Computer systems of defendant Tennessee state agencies

In re ULLICO Inc. Litig., 237 F.R.D. 314 (D.D.C. 2006)

Key Insight: Where court found that ULLICO had in bad faith “grossly abused” the use of the “confidential” designation allowed under parties’ stipulated protective order, court ordered ULLICO to completely re-do its confidentiality designations and also ensure that the documents were correctly identified in parties’ joint discovery database

Nature of Case: ERISA litigation

Electronic Data Involved: Confidential documents, joint discovery database

Quinby v. WestLB AG, 245 F.R.D. 94 (S.D.N.Y. 2006)

Key Insight: Court applied Zubulake factors and granted in part defendant?s motion to shift costs, holding that defendant was entitled to recover 30 percent of the costs of restoring and searching backup tapes for responsive emails of one former employee, stating: “[I]f a party creates its own burden or expense by converting into an inaccessible format data that it should have reasonably foreseen would be discoverable material at a time when it should have anticipated litigation, then it should not be entitled to shift the costs of restoring and searching the data.”

Nature of Case: Gender discrimination

Electronic Data Involved: Email stored on backup tapes

Frees, Inc. v. McMillian, 2006 WL 2668843 (E.D. Tenn. Sept. 15, 2006)

Key Insight: Court narrowed subpoena to defendant’s new employer, setting out “tiered discovery” process: plaintiff was to identify at least one project involving files allegedly removed from disputed laptop; new employer would then search for documents and/or files of the type described that were related to that project and produce them; if any of the produced documents and/or files were shown to be relevant or reasonably calculated to lead to the discovery of admissible evidence, then the parties would proceed to the ?second tier? of discovery and plaintiff could then request documents related to other projects; if no responsive documents could be found with respect to the first identified projects, however, plaintiff would be required to make a sufficient showing to the court as to why discovery should proceed further

Nature of Case: Design firm sued former vice president under Computer Fraud and Abuse Act

Electronic Data Involved: Proprietary business and technological data

Copyright © 2025, K&L Gates LLP. All Rights Reserved.