17.01.2013 Views

Electronic Discovery and Computer Forensics Case List - Kroll Ontrack

Electronic Discovery and Computer Forensics Case List - Kroll Ontrack

Electronic Discovery and Computer Forensics Case List - Kroll Ontrack

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

expense in restoring <strong>and</strong> searching the tapes in light of their largely irrelevant content. Thus, the<br />

court ordered the defendants to produce copies of all ESI from the backup tapes for the plaintiff to<br />

review, dismissing the plaintiff’s arguments that this constituted a document dump. The court also<br />

ordered the defendants to produce user logs for 135 hard drives to determine which one (if any)<br />

belonged to a particular defendant. Both the production of the backup tapes <strong>and</strong> hard drive were<br />

subject to a Fed.R.Civ.P. 502(d) order.<br />

Oklahoma<br />

� Calixto v. Watson Bowman Acme Corp., 2009 WL 3823390 (S.D. Fla. Nov. 16, 2009). In this<br />

tortious interference of a contract suit, the plaintiff alleged the defendant "spoliated electronic<br />

documents in the face of ongoing litigation." As such, the plaintiff sought an order requiring the<br />

defendant to obtain <strong>and</strong> fund a restoration <strong>and</strong> search of its 37 backup tapes. The defendant<br />

argued the backup tapes were not reasonably accessible <strong>and</strong> that no further relevant evidence<br />

existed on the tapes as a litigation hold was in effect. Finding the plaintiff failed to establish a<br />

reasonable expectation that the benefit of restoring the backup tapes would outweigh the burden,<br />

the court declined to impose the significant costs to restore, search <strong>and</strong> review the tapes on the<br />

defendant. The court also declined to impose sanctions because no bad faith existed regarding the<br />

defendant’s IT employee’s deletion of an e-mail box as part of a regular practice. However, the<br />

court concluded one of the backup tapes may contain discoverable records because it was unclear<br />

when the e-mail box deletion occurred <strong>and</strong> ordered the tape’s restoration <strong>and</strong> search.<br />

� Joseph Oat Holdings, Inc. v. RCM Digesters, Inc., 2009 WL 3334868 (D.N.J. Oct. 14, 2009). In<br />

this business dispute, the defendants alleged the plaintiffs copied the defendants’ computer files in<br />

violation of the <strong>Computer</strong> Data Access <strong>and</strong> Fraud Act (CDAFA). Prior to the joint venture<br />

termination, the plaintiffs’ computers were connected to the defendants’ server via a virtual private<br />

network. After the joint venture ceased, the plaintiffs copied approximately 152,000 documents,<br />

including proprietary business information, contained on the defendants’ server in an act the court<br />

labeled "brazen <strong>and</strong> surreptitious." The plaintiffs claimed the defendants knew access to the joint<br />

system existed, were concerned the defendants would destroy relevant information on the network<br />

<strong>and</strong> that the defendants’ litigation hold letter required them to preserve all documents within their<br />

possession or control. Finding the plaintiffs’ "cl<strong>and</strong>estine copying of computer files" was not<br />

performed purely for e-discovery purposes, the court determined the copying of files created after<br />

the joint venture dissolved was a clear violation of the CDAFA. Accordingly, the court granted the<br />

defendants’ motion for partial summary judgment.<br />

� United States v. Haymond, 2009 WL 3029592 (N.D. Okla. Sept. 16, 2009). In this criminal case,<br />

the defendant renewed his request for access to unlawful images allegedly contained on his<br />

computer that were seized by the government. The defendant argued the hard drive was "stripped"<br />

of metadata prior to the mirror image creation, which prevented him from preparing a forensic<br />

defense. The defendant also requested redacted copies of the images to support subpoenas to the<br />

Web sites where the images originated. Relying upon the defendant’s expert’s testimony that he<br />

was "99.99-percent sure" no metadata would be located, the court found no basis for the<br />

defendant’s claim that metadata had been "stripped." The court further ordered the defendant to<br />

identify the images with embedded Web site information in advance of trial, at which point the<br />

government is to prepare redacted images for the defendant’s use in conjunction with the<br />

subpoenas.<br />

281

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!