Tag:Privilege or Work Product Protections

1
Laethem Equip. Co. v. Deere & Co., 2009 WL 4069279 (E.D. Mich. Nov. 23, 2009)
2
Am. Family Mut. Ins. Co. v. Gustafson, 2009 WL 641297 (D. Colo. Mar. 10, 2009)
3
In Re Nat?l Century Fin. Enters., Inc. Fin. Inv. Litig., 2009 WL 2169174 (S.D. Ohio July 16, 2009)
4
Comrie v. Ipsco, 2009 WL 4403364 (N.D. Ill. Nov. 30, 2009)
5
Schuler v. Invensys Bldg. Sys., Inc., 2009 WL 425821 (E.D. Wis. Feb. 20, 2009)
6
Rohm and Hass, Co. v. Dow Chem., Co., 2009 WL 537195 (Del. Ch. Feb. 26, 2009) (Unpublished)
7
Ford Motor Co. v. U.S., 2009 WL 2176657 (E.D. Mich. July 21, 2009)
8
In re McKesson Governmental Entities Average Wholesale Price Litig., 2009 WL 3706898 (N.D. Cal. Nov. 4, 2009)
9
United States v. Hatfield, 2009 WL 3806300 (E.D.N.Y. Nov. 13, 2009)
10
Continental Group, Inc. v. KW Prop. Mgmt., 2009 WL 425945 (S.D. Fla. Feb. 20, 2009)

Laethem Equip. Co. v. Deere & Co., 2009 WL 4069279 (E.D. Mich. Nov. 23, 2009)

Key Insight: Where upon the court?s order to produced any privileged documents not properly and timely logged plaintiff produced only certain documents and redacted others, and where plaintiff explained that the withheld and redacted documents were duplicates of documents previously determined to be privileged by the court, court denied defendant?s motion to compel and stated: ?Where a written communication is found to be protected by the attorney-client privilege, an identical copy of that document, when challenged, ought to yield the same result, despite a different indexing number for the copy. To treat identical copies of the same document differently based solely on the numerical designation in a data log elevates form over substance in the worst way.?

Nature of Case: Breach of contract, statutory violations, tortious interference

Electronic Data Involved: Privileged materials

Am. Family Mut. Ins. Co. v. Gustafson, 2009 WL 641297 (D. Colo. Mar. 10, 2009)

Key Insight: Court ordered specific protocol for search of mirror images of defendant?s hard drive allowing defendant to first remove privileged and irrelevant material and create a detailed privilege log and then to produce the redacted drive to plaintiff; upon receipt of redacted drive, plaintiff was ordered to confer with defendant to establish search terms and to use those terms to identify potentially relevant information on the drive; where plaintiffs accessed information later claimed to be privileged, court would resolve dispute and privilege would not be waived

Nature of Case: Violation of Computer Fraud Abuse Act, Colorado Consumer Protection Act, misappropriation of trade secrets, breach of contract, interference with contractual obligations

Electronic Data Involved: ESI, hard drive

In Re Nat?l Century Fin. Enters., Inc. Fin. Inv. Litig., 2009 WL 2169174 (S.D. Ohio July 16, 2009)

Key Insight: Court granted in part and denied in part a motion for sanctions based on multiple plaintiffs? alleged delay and spoliation, including a failure to preserve relevant evidence, and ordered sanctions including excluding certain plaintiffs from affirmatively using late produced documents and allowing the moving party to proffer evidence at trial that it believed would give rise to an adverse inference and entitle it to an adverse jury instruction

Nature of Case: Consolidated actions arising from the collapse of National Century Financial Enterprises, Inc.

Electronic Data Involved: ESI

Comrie v. Ipsco, 2009 WL 4403364 (N.D. Ill. Nov. 30, 2009)

Key Insight: Where defendants claimed a privileged email was inadvertently produced and thus protected from waiver but failed to support their assertion with facts, court ruled defendants failed to meet their burden of proving that the disclosure was inadvertent or that they took reasonable steps to prevent such disclosure and that privilege was therefore waived; court also found that the email fell within the fiduciary exception to privilege

Nature of Case: Claims brought pursuant to Employee Retirement Income Security Act (ERISA)

Electronic Data Involved: Privileged email

Schuler v. Invensys Bldg. Sys., Inc., 2009 WL 425821 (E.D. Wis. Feb. 20, 2009)

Key Insight: Finding emails or portions of emails withheld were subject to protection by the attorney-client privilege or work product doctrine, court denied plaintiff?s motion to compel their production; court?s reasoning included discussion of the propriety of withholding email headers and held that redaction of email headers was proper where such headers provided information including: ?the topic of discussion between certain people, the identities of those people, and the time at which the discussion took place.?

Electronic Data Involved: Emails

Rohm and Hass, Co. v. Dow Chem., Co., 2009 WL 537195 (Del. Ch. Feb. 26, 2009) (Unpublished)

Key Insight: Chancellor denied motion to compel production of Litigation Support Model program designed to assist defendant in settlement analysis where program was prepared in anticipation of litigation and where plaintiff failed to establish necessary showing of substantial need or the inability to obtain the substantial equivalent elsewhere; recognizing sensitive nature of Enterprise Model program used for corporate decision making and strategy, court denied defendants motion for a protective order but ordered plaintiffs to limit disclosure of that material to essential persons and ordered experts to certify their understanding of the limitations of the information?s use and their obligation of confidentiality prior to viewing the information

Nature of Case: Breach of contract

Electronic Data Involved: Dynamic program models

Ford Motor Co. v. U.S., 2009 WL 2176657 (E.D. Mich. July 21, 2009)

Key Insight: Court granted in part and denied in part plaintiff?s motion to compel the government to produce documents in nine categories, including compelling the government to provide declarations outlining its search methodology and efforts and finding that the government need not attempt to recover emails that had been overwritten because of undue burden and costs, among other things; court rejected government argument that it had not produced a privilege loge because ?producing such a log would defeat [its] unduly burdensome objections? and ordered an ?adequately detailed privilege log for the responsive documents that it withholds from production?

Nature of Case: Action to recover interest accrued on overpayments of corporate income tax

Electronic Data Involved: ESI

In re McKesson Governmental Entities Average Wholesale Price Litig., 2009 WL 3706898 (N.D. Cal. Nov. 4, 2009)

Key Insight: Where government agency objected to defendants? subpoena for the production of documents previously produced in a separate litigation on grounds of undue burden and cost based on the assertion that it needed to re-review all documents prior to production because some documents were subject to the deliberative process privilege and others were highly confidential, court held that the privilege had been waived by the agency?s failure to object in its initial response and by the production in separate litigation, ordered the documents produced under the POD ?Confidential, For Outside Attorney Eyes Only? and ordered defendants to bear the costs ?of copying and producing the documents in electronic form?

Nature of Case: Allegations that defendants artificially increased the published price of prescription drugs

Electronic Data Involved: ESI previously produced in separate litigation and maintained in database by third party

United States v. Hatfield, 2009 WL 3806300 (E.D.N.Y. Nov. 13, 2009)

Key Insight: Addressing a number of attorney-client privilege and work product issues, the court considered whether documents stored on defendant?s company?s computer remained privileged and, noting the case-by-case nature of the assessment, considered five factors, including whether the company maintained a policy banning personal use, whether the company monitored employees? computer use or email, and how the company interpreted its own policy, and determined that defendant had not waived privilege as to documents stored on his own hard drive or that of a person with whom he maintained a joint defense agreement

Nature of Case: Criminal charges arising from alleged fraudulent schemes by CEO to defraud shareholders

Electronic Data Involved: Privileged emails stored on company computer

Continental Group, Inc. v. KW Prop. Mgmt., 2009 WL 425945 (S.D. Fla. Feb. 20, 2009)

Key Insight: Where parties failed to establish filtering protocol to segregate privileged materials from portable devices because of a disagreement as to the meaning of the court?s prior order, court ordered production of images of defendant?s portable devices to plaintiff prior to performing a privilege review but held that such production would not result in waiver and indicated its belief that no prejudice to defendant?s would result, despite acknowledgement that plaintiff would have ?a few days to view the images which may contain privileged material? prior to defendants identification of privileged material

Electronic Data Involved: Privileged ESI on portable devices

Copyright © 2025, K&L Gates LLP. All Rights Reserved.