Archive - November 2007

1
International Institute for Conflict Prevention and Resolution Presents “E-Discovery Orientation and Training For Neutrals”
2
David R. Cohen to Speak at Pennsylvania Bar Institute E-Discovery CLE
3
Court Orders Defendant Tennessee State Agencies to Produce Responsive ESI, Including All Metadata and Deleted Information; Potentially Shifts Costs to Defendants as Sanction for Failure to Implement Effective Litigation Hold and Other Discovery Miscues
4
Email Communications Between Physician and His Attorney Exchanged Over Hospital’s Email System Not Protected by Attorney-Client Privilege or Work Product Doctrine
5
Public Policy Dictates that Web-Based Privileged Emails Be Protected, Notwithstanding Employer’s Right to Inspect Laptop Contents under Email Policy
6
Defendants Granted Opportunity to Review and Object to Proposed Search Terms and Parameters Before Searches are Executed on Mirror Images of Defendants’ Hard Drives

International Institute for Conflict Prevention and Resolution Presents “E-Discovery Orientation and Training For Neutrals”

Thursday, November 15, 2007
9:15 a.m. – 5:30 p.m.

Kaye Scholer LLP
425 Park Avenue
New York, NY

K&L Gates partner David R. Cohen is among the faculty who will speak at this informative program.

A copy of the agenda is available here.

Click here to register.

David R. Cohen to Speak at Pennsylvania Bar Institute E-Discovery CLE

E-Discovery
Friday, November 16, 2007
9 a.m. – 4:30 p.m.

Koppers Building, Ninth Floor
436 Seventh Avenue
Pittsburgh, PA

This program, sponsored by the Pennsylvania Bar Institute, will explore current and future discovery rules and their impact on e-discovery; impart techniques technologists employ to find electronic information; describe the types of information available for discovery and the formats in which one can obtain electronic documents, and describe how cost-shifting can impact expenses.

K&L Gates Partner David R. Cohen will speak at the 10:05 a.m. session on the topic of collecting and processing electronically stored information.

Click here for more information about the program.

Court Orders Defendant Tennessee State Agencies to Produce Responsive ESI, Including All Metadata and Deleted Information; Potentially Shifts Costs to Defendants as Sanction for Failure to Implement Effective Litigation Hold and Other Discovery Miscues

John B. v. Goetz, 2007 WL 3012808 (M.D. Tenn. Oct. 10, 2007)

This case is a class action on behalf of roughly 550,000 children who are entitled under federal law to medical services that include early and periodic screenings for their physical well being, including their dental and behavioral health needs, along with any necessary follow-up medical services.  Through this action, plaintiffs seek to enforce their rights to such services under various federal statutes.  Defendants in the case include Tennessee state officials who are in charge of the state programs for these services.  To assist it in providing these services, the State enters into contracts with a number of Managed Care Contractors (“MCCs”).  The MCCs are not parties in the suit.

Contemporaneous with the filing of the complaint, plaintiffs requested class certification and the parties agreed to entry of a Consent Decree to remedy plaintiff’s complaints and to certify the class.  Lengthy and complex proceedings followed, including several show cause and contempt hearings.

In the latter half of 2006 and in early 2007, the court held a series of hearings and conferences on the parties’ discovery disputes, and ordered the production of certain electronically stored information (“ESI”) from the defendants.  The court also held that the MCCs’ responsive records and ESI were within the possession, custody, and control of defendants, and required the defendants to obtain such information from the MCCs and produce it as well. Read More

Email Communications Between Physician and His Attorney Exchanged Over Hospital’s Email System Not Protected by Attorney-Client Privilege or Work Product Doctrine

Scott v. Beth Israel Med. Center Inc., 2007 WL 3053351 (N.Y. Sup. Ct. Oct. 17, 2007)

Plaintiff is a physician who sued for breach of contract based upon his termination from defendant hospital (“BI”).  Under the contract at issue, BI agreed to pay Dr. Scott $14 million in severance pay if he was terminated without cause.  BI asserted that Dr. Scott was terminated for cause, while Dr. Scott believed he was terminated without cause and without receiving any severance pay.

In August 2005, BI’s counsel wrote Dr. Scott’s counsel stating that BI was in possession of email correspondence between Dr. Scott and his counsel pertaining to Dr. Scott’s dispute with BI, as well as emails written between Dr. Scott and another attorney regarding a separate dispute.  The letter stated that, although no one at BI had read the emails yet, BI believed that any potential privilege attached to the communications had been waived by use of BI’s email system.  Dr. Scott’s counsel responded, asserting that the emails were privileged communications for which there had been no waiver, and requesting their immediate return.  BI refused to return the emails, and the parties called the judge’s court attorney, who instructed BI to provide copies of the emails to Dr. Scott, place copies of the documents into a sealed envelope and bar anyone from reviewing the emails pending a decision by the court.  Thereafter, Dr. Scott filed a motion for a protective order seeking the return of the emails.
Read More

Public Policy Dictates that Web-Based Privileged Emails Be Protected, Notwithstanding Employer’s Right to Inspect Laptop Contents under Email Policy

Sims v. Lakeside School, 2007 WL 2745367 (W.D. Wash. Sept. 20, 2007)

In this employment discrimination case, defendant Lakeside sought an order from the court allowing the review of a hard drive image of a laptop computer furnished to plaintiff while he was employed at Lakeside.  After plaintiff’s counsel raised an objection to the imaging of the hard drive, Lakeside agreed not to review its contents, and the parties attempted to resolve the issue on their own.  When the parties were unable to reach agreement, Lakeside moved to compel the review of the image.

The court granted the motion in part, and denied it in part.  The court found that the plaintiff had no reasonable expectation of privacy in the contents of the laptop that was furnished by Lakeside, including emails he sent and received on his Lakeside email account.  However, the court ruled that web-based emails generated by plaintiff, and any material he created to communicate with his attorney and his spouse, were protected under the attorney-client privilege and the marital communications privilege.

The court explained that Lakeside’s employee manual was “unequivocally clear” in stating that user accounts were the property of Lakeside School, and that they were to be used for academic and administrative purposes only.  “Furthermore, where an employer indicates that it can inspect laptops that it furnished for use of its employees, the employee does not have a reasonable expectation of privacy over the employer-furnished laptop.”  There was no dispute that plaintiff received a copy of this policy and signed an acknowledgment that he read and reviewed the policy.  Consequently, the court held that plaintiff was on notice that he did not possess a reasonable expectation of privacy in the contents of his laptop, or in the emails he sent and received using Lakeside’s accounts.

The court viewed web-based emails differently:
Read More

Defendants Granted Opportunity to Review and Object to Proposed Search Terms and Parameters Before Searches are Executed on Mirror Images of Defendants’ Hard Drives

Verigy US, Inc. v. Mayder, 2007 WL 3144577 (N.D. Cal. Oct. 24, 2007) (Not for Citation)

In this misappropriation of trade secrets case, plaintiff had been granted leave to conduct some expedited discovery prior to the court’s hearing on plaintiff’s motion for preliminary injunction.  In addition, defendants had been ordered to preserve all evidence, including all information contained on their computer hard drives.

In this order, the court resolved plaintiff’s expedited motion to compel certain defendants to produce “bit-for-bit copies (i.e., mirror images) of all hard drives.”  The parties disagreed about how such inspection and production should proceed, and submitted differing proposed discovery protocols for the court to consider.

The court noted that, for the most part, the parties’ protocols were virtually identical, and it appeared that defendants had adopted many of plaintiff’s proposed provisions verbatim.  The main point of contention was whether defendants should be permitted an opportunity to review and object to any searches that plaintiff may wish to have the third party expert conduct.  Defendants proposed a two-tier protocol which (a) would permit discovery in areas that defendants deemed presumptively relevant; and (b) would allow plaintiff to request that the expert conduct other searches, subject to an opportunity by defendant to review and object to the proposed search requests.  Defendants expressed concern that plaintiff would propound unduly burdensome or otherwise abusive searches beyond the scope of permissible discovery under Rule 26:

At the motion hearing, it was suggested, somewhat facetiously, that Verigy might attempt to request a search for all documents with the letter "A." Indeed, documents submitted on supplemental briefing indicate that Verigy apparently has previously requested a search for all documents containing the letter "V" – a request which strikes this court as being patently overbroad.

Read More

Copyright © 2022, K&L Gates LLP. All Rights Reserved.