Electronic Discovery and Computer Forensics Case List - Kroll Ontrack
Electronic Discovery and Computer Forensics Case List - Kroll Ontrack
Electronic Discovery and Computer Forensics Case List - Kroll Ontrack
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
expense in restoring <strong>and</strong> searching the tapes in light of their largely irrelevant content. Thus, the<br />
court ordered the defendants to produce copies of all ESI from the backup tapes for the plaintiff to<br />
review, dismissing the plaintiff’s arguments that this constituted a document dump. The court also<br />
ordered the defendants to produce user logs for 135 hard drives to determine which one (if any)<br />
belonged to a particular defendant. Both the production of the backup tapes <strong>and</strong> hard drive were<br />
subject to a Fed.R.Civ.P. 502(d) order.<br />
Oklahoma<br />
� Calixto v. Watson Bowman Acme Corp., 2009 WL 3823390 (S.D. Fla. Nov. 16, 2009). In this<br />
tortious interference of a contract suit, the plaintiff alleged the defendant "spoliated electronic<br />
documents in the face of ongoing litigation." As such, the plaintiff sought an order requiring the<br />
defendant to obtain <strong>and</strong> fund a restoration <strong>and</strong> search of its 37 backup tapes. The defendant<br />
argued the backup tapes were not reasonably accessible <strong>and</strong> that no further relevant evidence<br />
existed on the tapes as a litigation hold was in effect. Finding the plaintiff failed to establish a<br />
reasonable expectation that the benefit of restoring the backup tapes would outweigh the burden,<br />
the court declined to impose the significant costs to restore, search <strong>and</strong> review the tapes on the<br />
defendant. The court also declined to impose sanctions because no bad faith existed regarding the<br />
defendant’s IT employee’s deletion of an e-mail box as part of a regular practice. However, the<br />
court concluded one of the backup tapes may contain discoverable records because it was unclear<br />
when the e-mail box deletion occurred <strong>and</strong> ordered the tape’s restoration <strong>and</strong> search.<br />
� Joseph Oat Holdings, Inc. v. RCM Digesters, Inc., 2009 WL 3334868 (D.N.J. Oct. 14, 2009). In<br />
this business dispute, the defendants alleged the plaintiffs copied the defendants’ computer files in<br />
violation of the <strong>Computer</strong> Data Access <strong>and</strong> Fraud Act (CDAFA). Prior to the joint venture<br />
termination, the plaintiffs’ computers were connected to the defendants’ server via a virtual private<br />
network. After the joint venture ceased, the plaintiffs copied approximately 152,000 documents,<br />
including proprietary business information, contained on the defendants’ server in an act the court<br />
labeled "brazen <strong>and</strong> surreptitious." The plaintiffs claimed the defendants knew access to the joint<br />
system existed, were concerned the defendants would destroy relevant information on the network<br />
<strong>and</strong> that the defendants’ litigation hold letter required them to preserve all documents within their<br />
possession or control. Finding the plaintiffs’ "cl<strong>and</strong>estine copying of computer files" was not<br />
performed purely for e-discovery purposes, the court determined the copying of files created after<br />
the joint venture dissolved was a clear violation of the CDAFA. Accordingly, the court granted the<br />
defendants’ motion for partial summary judgment.<br />
� United States v. Haymond, 2009 WL 3029592 (N.D. Okla. Sept. 16, 2009). In this criminal case,<br />
the defendant renewed his request for access to unlawful images allegedly contained on his<br />
computer that were seized by the government. The defendant argued the hard drive was "stripped"<br />
of metadata prior to the mirror image creation, which prevented him from preparing a forensic<br />
defense. The defendant also requested redacted copies of the images to support subpoenas to the<br />
Web sites where the images originated. Relying upon the defendant’s expert’s testimony that he<br />
was "99.99-percent sure" no metadata would be located, the court found no basis for the<br />
defendant’s claim that metadata had been "stripped." The court further ordered the defendant to<br />
identify the images with embedded Web site information in advance of trial, at which point the<br />
government is to prepare redacted images for the defendant’s use in conjunction with the<br />
subpoenas.<br />
281