Tag:Motion for Protective Order

1
Fed. Trade Comm’n v. Ameridebt, Inc., 2006 WL 618563 (N.D. Cal. Mar. 13, 2006)
2
Charles O. Bradley Trust v. Zenith Capital LLC, 2006 WL 798991 (N.D. Cal. Mar. 24, 2006)
3
MarketRx, Inc. v. Turner, 2006 WL 851930 (N.J. Super. Ct. Ch. Div. Mar. 31, 2006) (Unpublished)
4
O’Grady v. Superior Court, 44 Cal.Rptr.3d 72 (Cal. Ct. App. 2006)
5
United States ex rel. Parikh v. Premera Blue Cross, 2006 WL 2927700 (W.D. Wash. Oct. 11, 2006)
6
Forterra Sys., Inc. v. Avatar Factory, 2006 WL 2458804 (N.D. Cal. Aug. 22, 2006)
7
Allstate Ins. Co. v. Scroghan, 851 N.E.2d 317 (Ind. Ct. App. 2006)
8
Collaboration Props., Inc. v. Tandberg ASA, 2006 WL 2398766 (N.D. Cal. Mar. 29, 2006)
9
In re ULLICO Inc. Litig., 237 F.R.D. 314 (D.D.C. 2006)
10
Quinby v. WestLB AG, 245 F.R.D. 94 (S.D.N.Y. 2006)

Fed. Trade Comm’n v. Ameridebt, Inc., 2006 WL 618563 (N.D. Cal. Mar. 13, 2006)

Key Insight: Magistrate denied third party’s motion to stay discovery order requiring him to give permission to Google, Inc. to produce emails from his gmail account, where third party failed to establish any likelihood of success on appeal or that the balance of hardships tipped in his favor; court was “skeptical” of third party’s unsubstantiated arguments that the volume of email was large and that attorney review would be unduly costly, and noted that “email could likely be screened efficiently through the use of electronic search terms that the parties agreed upon”

Nature of Case: Allegations of consumer fraud

Electronic Data Involved: Email in third party’s Google email account

Charles O. Bradley Trust v. Zenith Capital LLC, 2006 WL 798991 (N.D. Cal. Mar. 24, 2006)

Key Insight: Finding that requested documents were relevant and properly discoverable, court granted motion to compel production of various financial records, including an electronic copy of party’s Quickbooks files, and ordered that the records be produced under protective order in a form agreed to by the parties

Nature of Case: Securities fraud, unfair business practices, breach of contract

Electronic Data Involved: Electronic copy of Quickbooks files

MarketRx, Inc. v. Turner, 2006 WL 851930 (N.J. Super. Ct. Ch. Div. Mar. 31, 2006) (Unpublished)

Key Insight: Court denied motion to quash as overbroad plaintiff?s subpoena to current employer of defendant which sought, among other things: documents and information describing any type of work that defendant performed, including solicitations and proposals, all documents and communications (including emails) he sent or received, and every computer or electronic equipment and he touched, including all backups, as well as extensive information about current employer’s practices and policies regarding document retention and computer backup; court further granted motion to compel defendant to produce similar information; parties to observe confidentiality order

Nature of Case: Action by employer against former employee based upon non-competition agreement

Electronic Data Involved: Computer and electronic equipment “touched” by former employee; email

O’Grady v. Superior Court, 44 Cal.Rptr.3d 72 (Cal. Ct. App. 2006)

Key Insight: Internet publishers successfully petitioned California appellate court for writ of certiorari directing that subpoenas issued by Apple Computer, Inc. be quashed; trial court erred in denying motion for protective order because, among other reasons, subpoena to email service provider could not be enforced consistent with the plain terms of the federal Stored Communications Act

Nature of Case: Underlying suit involved misappropriation of trade secrets and related claims

Electronic Data Involved: Email containing information regarding sources of trade secret information posted on internet

United States ex rel. Parikh v. Premera Blue Cross, 2006 WL 2927700 (W.D. Wash. Oct. 11, 2006)

Key Insight: Court employed five-factor balancing test to determine that, under totality of circumstances, defendant?s inadvertent disclosure of privileged emails did not effect waiver; court granted defendant?s motion for return of the privileged documents

Nature of Case: Allegations of Medicare fraud and retaliatory discharge

Electronic Data Involved: Privileged emails on CD

Forterra Sys., Inc. v. Avatar Factory, 2006 WL 2458804 (N.D. Cal. Aug. 22, 2006)

Key Insight: Court ordered parties to meet and confer and agree upon appropriate procedures for plaintiff?s expert to view disputed source code in his office in electronic format, and ordered plaintiff to file a declaration from the expert agreeing to be bound by such procedures; parties further ordered to meet and confer and agree upon a procedure by which expert could seek to change the designation of portions of the source code from his eyes only to outside counsel only

Nature of Case: Patent infringement

Electronic Data Involved: Source code

Allstate Ins. Co. v. Scroghan, 851 N.E.2d 317 (Ind. Ct. App. 2006)

Key Insight: Court abused its descretion when it refused to enter protective order addressing Allstate’s production of computer program and manuals, since plaintiff made no showing that discovery under a protective order would be detrimental to his case, and it was shown that discovery without a protective order could be detrimental to Allstate

Nature of Case: Bad faith insurance litigation

Electronic Data Involved: Colossus computer program used by Allstate to evaluate claims

Collaboration Props., Inc. v. Tandberg ASA, 2006 WL 2398766 (N.D. Cal. Mar. 29, 2006)

Key Insight: Court ordered plaintiff to submit amended proposal for protective order governing defendants’ production of source code, to include following items: (1) Defendants to produce a single electronic copy, to be kept either by plaintiff’s attorneys or by plaintiff’s expert; (2) electronic copy to be maintained pursuant to security scheme employed by plaintiff’s expert, as described at oral argument; and (3) Only three hard copies may be made, total

Nature of Case: Patent infringement

Electronic Data Involved: Source code

In re ULLICO Inc. Litig., 237 F.R.D. 314 (D.D.C. 2006)

Key Insight: Where court found that ULLICO had in bad faith “grossly abused” the use of the “confidential” designation allowed under parties’ stipulated protective order, court ordered ULLICO to completely re-do its confidentiality designations and also ensure that the documents were correctly identified in parties’ joint discovery database

Nature of Case: ERISA litigation

Electronic Data Involved: Confidential documents, joint discovery database

Quinby v. WestLB AG, 245 F.R.D. 94 (S.D.N.Y. 2006)

Key Insight: Court applied Zubulake factors and granted in part defendant?s motion to shift costs, holding that defendant was entitled to recover 30 percent of the costs of restoring and searching backup tapes for responsive emails of one former employee, stating: “[I]f a party creates its own burden or expense by converting into an inaccessible format data that it should have reasonably foreseen would be discoverable material at a time when it should have anticipated litigation, then it should not be entitled to shift the costs of restoring and searching the data.”

Nature of Case: Gender discrimination

Electronic Data Involved: Email stored on backup tapes

Copyright © 2022, K&L Gates LLP. All Rights Reserved.