Tag:Third Party Discovery

1
Whatman, Inc. v. Davin, 2009 WL 3698390 (D.S.C. Nov. 3, 2009)
2
United States v. Cinergy, Corp., 2009 WL 6327414 (S.D. Ind. Nov. 10, 2009)
3
Whitlow v. Martin, 2009 WL 3381013 (C.D. Ill. Oct. 15, 2009)
4
Dassault Systemes, S.A. v. Childress, 2009 WL 3602084 (E.D. Mich. Oct. 27, 2009)
5
Goshawk Dedicated Ltd. v. Am. Viatical Servs., LLC, 2008 WL 2901864 (N.D. Ga. July 23, 2008)
6
In re Rosenthal, 2008 WL 983702 (S.D. Tex. Mar. 28, 2008)
7
UMG Recordings, Inc. v. Doe, 2008 WL 2949427 (N.D. Cal. July 30, 2008)
8
J.T. Shannon Lumber Co., Inc. v. Gilco Lumber, Inc., 2008 WL 3833216 (N.D. Miss. Aug. 14, 2008)
9
Arista Records, LLC v. Does 1-12, 2008 WL 4133874 (E.D. Cal. Sept. 4, 2008)
10
digEcor, Inc. v. e.Digital Corp., 2008 WL 4335539 (D. Utah Sept. 16, 2008)

Whatman, Inc. v. Davin, 2009 WL 3698390 (D.S.C. Nov. 3, 2009)

Key Insight: Court granted Motion to Quash where the court determined that the subpoena was unduly burdensome on the non-party and that ?the discovery sought can be obtained from more reasonable discovery methods, namely pursuit of full responses by the defendants to interrogatories and requests for production along with additional or supplemental examination of the defendants? electronically stored documents?

Nature of Case: Misappropriation of trade secrets, unfair competition, etc.

Electronic Data Involved: ESI

United States v. Cinergy, Corp., 2009 WL 6327414 (S.D. Ind. Nov. 10, 2009)

Key Insight: Inadvertent production of privileged material by third party pursuant to subpoena waived defendants? privilege protection where third party?s disclosure was found to be tantamount to defendant?s disclosure because of the nature of their relationship and where defense counsel failed to take any steps to prevent the production of privileged materials despite being asked specifically if privilege issues were implicated in the production (to which he answered ?no?) and despite the low volume of materials produced; court noted that although there was no legal obligation for defendants to conduct a post-production review, ?had [they] done so, they might well have noticed the email at issue before Plaintiffs did, and the result in this case might have been different.?

Electronic Data Involved: Privileged email

Whitlow v. Martin, 2009 WL 3381013 (C.D. Ill. Oct. 15, 2009)

Key Insight: Where third-party presented evidence that responding to subpoena would require searching hundreds of locations, would require the restoration of back up tapes, and would take ?over two years to accomplish and cost hundreds of thousands of dollars,? court modified subpoena to narrow scope of the request, but ordered production of relevant documents, ?even if they [were] not reasonably accessible?

Nature of Case: Allegations of wrongful termination in furtherance of political scheme

Electronic Data Involved: ESI

Dassault Systemes, S.A. v. Childress, 2009 WL 3602084 (E.D. Mich. Oct. 27, 2009)

Key Insight: Court granted leave to serve subpoena to procure computers and documents seized from the defendant despite finding that the items were procured through the coercive powers of the grand jury (and thus subject to stricter showing to compel their discovery) where plaintiff showed the evidence would be otherwise available through civil discovery and where the court could not conceive how such access would reveal anything about the nature, direction or scope of the grand jury?s inquiry

Nature of Case: Copyright and trademark infringement

Electronic Data Involved: Computers

In re Rosenthal, 2008 WL 983702 (S.D. Tex. Mar. 28, 2008)

Key Insight: Finding that District Attorney?s admitted deletion of more than 2,500 emails sought by subpoena constituted ?unexcused, egregious conduct,? court found him in contempt of court and imposed $18,900 in sanctions (representing attorneys? fees); court further found that actions of attorney representing DA in the proceedings were ?unprincipled and dilatory, at best, constituting a deliberate indifference to the Court’s Orders and subpoena,? held him in contempt of court, and ordered that $5,000 of the $18,900 in sanctions awarded against DA was jointly and severally awarded against his attorney

Nature of Case: Civil rights suit against Harris County, Texas, the Harris County Sheriff and several Harris County deputies

Electronic Data Involved: Deleted emails of the District Attorney of Harris County, Texas

UMG Recordings, Inc. v. Doe, 2008 WL 2949427 (N.D. Cal. July 30, 2008)

Key Insight: Where plaintiffs made prima facie showing of infringement, there was no other way to identify Doe defendant, and there was risk that ISP would destroy its logs prior to Rule 26(f) conference, court found that need for expedited discovery outweighed prejudice to defendant and granted plaintiffs? motion for leave to take immediate discovery

Nature of Case: Copyright infringement through use of peer-to-peer (“P2P”) networking

Electronic Data Involved: ISP logs; documents and ESI sufficient to identify defendant’s true name, current and permanent addresses and telephone numbers, email addresses, and Media Access Control addresses

J.T. Shannon Lumber Co., Inc. v. Gilco Lumber, Inc., 2008 WL 3833216 (N.D. Miss. Aug. 14, 2008)

Key Insight: Granting motion to quash, court found that subpoenas duces tecum served by plaintiff on Microsoft, Google and Yahoo! requesting entire contents of individual defendants’ mailboxes and other information were facially invalid under Stored Communications Act of 1986 and were overly burdensome and oppressive; court found that breadth was so expansive that it resembled a ?fishing expedition,? and that plaintiff had not shown that all information requested was relevant or likely to lead to admissible evidence

Nature of Case: Intentional interference with business relationships, breach of contract, breach of fiduciary duty

Electronic Data Involved: Entire contents of individual defendants’ mailboxes stored on third-party ISPs, details of individuals’ accounts and user connection logs

Arista Records, LLC v. Does 1-12, 2008 WL 4133874 (E.D. Cal. Sept. 4, 2008)

Key Insight: Good cause existed to grant plaintiffs’ application for expedited discovery prior to Rule 26(f) conference given possibility that ISP may destroy information that could identify Doe defendants, discovery request was narrowly tailored and would substantially contribute to moving case forward, and defendants could not be identified without requested information; to protect any privacy rights or first amendment protections of Doe defendants, court set out procedure for ISP to first contact subscribers prior to releasing their information and set deadlines for any motions to quash

Nature of Case: Copyright infringement

Electronic Data Involved: Names and contact information for ISP subscribers

digEcor, Inc. v. e.Digital Corp., 2008 WL 4335539 (D. Utah Sept. 16, 2008)

Key Insight: Where defendant?s subpoenas to plaintiff?s suppliers and customers were overly broad and requested information from too broad a time period, court noted that ?[d]iscovery requests directed to an opponent’s customers are to be approached with caution, even more than is advised in most discovery directed to third-parties,? and ordered that numerous requests be modified or narrowed in scope; court further noted that protective order could sufficiently protect confidential information sought from suppliers

Nature of Case: Breach of contract litigation concerning digital video player intellectual property

Electronic Data Involved: Email, source code, object code, executable code and other ESI

Copyright © 2025, K&L Gates LLP. All Rights Reserved.