Archive - 2008

1
Court Rejects Cost Shifting Since Moving Party Failed to Meet and Confer in Good Faith; Cost Estimate and Conclusory Characterizations of ESI as “Inaccessible” Insufficient Under Rule 26(b)(2)
2
Status Conference Today in Qualcomm, Inc. v. Broadcom Corp. Regarding Discovery Plan and Further Proceedings
3
Risk and Insurance Management Society 2008 Annual Conference & Exhibition
4
U.S. Courts’ Notice: Invalid Subpoenas
5
Defense Attorneys Sanctioned for Obstructing Forensic Inspection of Defendant’s Computer Servers
6
Court Further Refines Search Protocol, Adds Search Terms and Orders Distinct Conjunctive and Disjunctive Keyword Searches
7
Additional Information Needed Before Court Will Order Production of Email from Backup Sources
8
Party that Sought Metadata Only After Production of Document in .PDF and Paper Formats Not Entitled to Native Production
9
Court Sets Protocol for Forensic Examination of Employment Discrimination Plaintiff’s Home Computers
10
Inadequate Preservation Efforts Necessitate Restoration and Production of Email from Backup Tapes, and Forensic Search of CEO’s Laptop

Court Rejects Cost Shifting Since Moving Party Failed to Meet and Confer in Good Faith; Cost Estimate and Conclusory Characterizations of ESI as “Inaccessible” Insufficient Under Rule 26(b)(2)

Mikron Ind., Inc. v. Hurd Windows & Doors, Inc., 2008 WL 1805727 (W.D. Wash. Apr. 21, 2008)

In this decision, District Judge Robert S. Lasnik denied defendants’ motion for a protective order which asked the court to shift the costs of producing ESI to the plaintiff.  Relying on Fed. R. Civ. P. 26(b)(2), defendants argued that searching through their ESI would generate substantial costs and yield cumulative results.

Finding that defendants failed to discharge their meet and confer obligation in good faith, as required by Fed. R. Civ. P. 26(c), the court denied the motion on that basis.  The court then went on to consider the merits of the motion.  It found that defendants had also failed to demonstrate that plaintiff’s discovery requests were unduly burdensome and/or cumulative, or that the requested ESI was “not reasonably accessible because of undue burden or cost.”  The court explained:

Read More

Status Conference Today in Qualcomm, Inc. v. Broadcom Corp. Regarding Discovery Plan and Further Proceedings

On March 20, 2008, the court convened a status hearing and counsel reported their progress toward developing the CREDO protocol ordered by the court.  The court also conferred with the parties regarding the status of the case in light of Judge Brewster’s March 5, 2008 Order Remanding in Part Order of Magistrate Court re Motion for Sanctions Dated 1/07/08.  Because Judge Brewster vacated the 1/07/08 Sanctions Order to the extent it required the named Responding Attorneys to participate in the CREDO project, the Magistrate Judge observed that only Qualcomm remained responsible for completing the protocol.  Thus, the court ordered Qualcomm to submit a final version of the CREDO protocol by Thursday, April 10, 2008.  (If it was filed by the court’s deadline, the protocol does yet not appear to be publicly available.)

On April 2, 2008, counsel for the Responding Attorneys and Broadcom submitted their Proposed Discovery Plan in preparation for the evidentiary hearing on attorney sanctions ordered by the District Judge. Read More

Risk and Insurance Management Society 2008 Annual Conference & Exhibition

April 27 – May 1, 2008
San Diego Convention Center
111 West Harbor Drive
San Diego, CA 92101
www.visitsandiego.com

K&L Gates partner David R. Cohen will be one of the speakers presenting “An Ounce of Prevention:  Your 12-Step Guide to Avoiding e-Discovery Disasters," on Monday, April 28 from 3:30 to 5:00 p.m.

This session will introduce risk managers, as well as counsel, to the hot topic of e-discovery and discuss concrete steps to reduce risk exposure and costs related to records management and e-discovery.  A series of 5- to 10-minute videotaped vignettes will show scenes from a sample litigation matter involving e-discovery issues.  Relevant information about new rules and case law will be summarized by the panelists and by a federal court judge from one of the videos.  With your input, the scenes will serve as a springboard for an interactive discussion on records management and e-discovery readiness steps.

Additional speakers at this presentation include Michael Lubben of Ryder System, Inc. and Debra Samuel of Alcoa Inc.

Click here for more information about the conference.

U.S. Courts’ Notice: Invalid Subpoenas

The U.S. Courts’ website (www.uscourts.gov) has the following alert:

Reports have been received of bogus e-mail grand jury subpoenas, purportedly sent by a United States District Court.  The e-mails are not a valid communication from a federal court and may contain harmful links.  Recipients are warned not to open any links or download any information relating to this e-mail notice.  The federal Judiciary’s email address is uscourts.gov.  The e-mails in question appear to be sent from a similar address that is not owned and operated by the federal courts.  Law enforcement authorities have been notified.

More information about the e-mail scam may be found in this New Jersey Law Journal article by Mary Pat Gallagher, "Businesses Hit With E-Mail Blast of Virus-Carrying Pseudo-Subpoenas," an excerpt from which follows:

Read More

Defense Attorneys Sanctioned for Obstructing Forensic Inspection of Defendant’s Computer Servers

Sterle v. Elizabeth Arden, Inc., 2008 WL 961216 (D. Conn. Apr. 9, 2008)

In this wrongful termination case, plaintiff sought the production of certain “DSFG Reports” which summarized information regarding the sales performance of employees in relation to their peers, and other key sales information.  Plaintiff knew about the existence of the DSFG Reports because he had received a facsimile of the June 2004 DSFG Report before he was terminated.  The fax was sent anonymously but the fax number was from defendant’s Stamford, Connecticut office.  The June 2004 DSFG Report revealed that plaintiff was leading his division in sales performance.  After nine months of discovery, defendant had produced only four additional DSFG Reports.  In October 2007, plaintiff moved to compel production of the remaining seven DSFG Reports from the year prior to plaintiff’s termination.

The court held a telephone conference to discuss the motion to compel and the whereabouts of the seven remaining DSFG Reports.  During the conference the attorneys maintained their respective positions on the matter:  plaintiff’s attorney believed that the defense attorneys were hiding or had deleted the DSFG Reports, and defense counsel gave assurances that such reports could not be located.  The court proposed that defendant permit a forensic computer consultant to inspect its computers, to which the attorneys agreed.  The court entered an inspection order, which included the following provisions:

Read More

Court Further Refines Search Protocol, Adds Search Terms and Orders Distinct Conjunctive and Disjunctive Keyword Searches

ClearOne Communications, Inc. v. Chiang, 2008 WL 920336 (D. Utah Apr. 1, 2008)

This decision further refines the search protocol to be used to search data from computers used by certain defendants, which were imaged pursuant to two court orders issued in 2007.  The second imaging order sought to establish a protocol for searching the mirror images to identify relevant and responsive documents.  That protocol was refined in a November 5, 2007 order.  The protocol in place required keyword searches by technical experts; review of search result reports by defense counsel for facial claims of privilege; delivery of the reports to plaintiff’s counsel for preliminary assertion of responsiveness; defense counsel’s review for responsiveness and privilege; and delivery of documents and privilege logs.

The parties had agreed on many search terms.  Plaintiff had accepted, with five additions, the search terms proposed by defendants in September 2007.  The issue decided on this motion related to the five additional search terms proposed by plaintiff, and the conjunctive or disjunctive use of the terms in the searches to be conducted.

Read More

Additional Information Needed Before Court Will Order Production of Email from Backup Sources

Baker v. Gerould, 2008 WL 850236 (W.D.N.Y. Mar. 27, 2008)

Plaintiff, an employee in the New York State Department of Environmental Conservation (“DEC”), alleged that defendants failed to promote him to the position of Captain in retaliation for having exercised his constitutional rights.  Plaintiff moved to compel the production of email between and among the parties, challenging the adequacy of defendants’ production.

Following oral argument on the motion, the court directed defendants to submit an affidavit describing the search undertaken to locate the requested emails.  In response, defendants filed an affidavit of the Director of the DEC’s Division of Information Services.  Instead of explaining the steps undertaken to search for the emails, however, the affidavit only described the work that would be entailed in restoring deleted data from backup sources.  Although the director evidently assumed that as a result of the systematic, automatic deletion of unsaved emails generated more than 12 months earlier, any additional responsive emails between the parties were not reasonably accessible, his affidavit did not address what efforts, if any, were employed to search for such emails from accessible sources.  For example, the affidavit did not identify whether any search was undertaken to locate archived or saved emails, which, as he explained, was one method available to users to avoid deletion of emails.

Read More

Party that Sought Metadata Only After Production of Document in .PDF and Paper Formats Not Entitled to Native Production

Autotech Techs. Ltd. P’ship v. Automationdirect.com, Inc., 248 F.R.D. 556 (N.D. Ill. 2008)

In this trademark infringement litigation, defendant sought to compel Autotech to produce an electronic copy of a word processing document entitled “EZTouch File Structure.”  Autotech had already produced the document in both .PDF format on a compact disc and paper format, and had also provided a “Document Modification History” representing a chronological list of all changes made since the “EZTouch File Structure” document was created.  Defendant argued that the  production was not acceptable, because the document existed in its “native format” on a computer at Autotech’s offices in Bettendorf, Iowa.  Defendant wanted the “metadata” — information it claimed was within the electronic version of the document including when the document was created, when it was modified, and when it was designated “confidential.”

Read More

Court Sets Protocol for Forensic Examination of Employment Discrimination Plaintiff’s Home Computers

Coburn v. PN II, Inc., 2008 WL 879746 (D. Nev. Mar. 28, 2008)

In this employment discrimination case, defendants sought a forensic examination of plaintiff’s home computers.  Defendants explained that the inspection would focus on information relating to Coburn’s employment with defendants, the termination of that employment, allegations or claims Coburn was making in this action, and damages resulting from the actions or inactions of defendants.  Plaintiff did not object generally to a “limited, focused” inspection, but opposed the request because defendants had not set forth a protocol or methodology that would protect her against violations of privilege, privacy and confidentiality interests.

The court found that the burden on plaintiff of such an inspection would be minimal.  It noted that defendants sought only a mirror image or “clone copy” of the hard drive or drives in question, and that defendants had agreed to bear the entire cost of the forensic inspection.  The court cited approvingly the protocol adopted in Playboy Enters., Inc. v. Welles, 60 F.Supp.2d 1050, 1054-55 (S.D. Cal.1999), finding that it offered “a suitable approach for protecting Coburn’s communications with her attorney, and her privacy interests as well as the confidentiality interests of her new employer.”

Read More

Inadequate Preservation Efforts Necessitate Restoration and Production of Email from Backup Tapes, and Forensic Search of CEO’s Laptop

Treppel v. Biovail Corp., 2008 WL 866594 (S.D.N.Y. Apr. 2, 2008)

In this case, plaintiff alleged that Biovail Corp., its CEO, general counsel and others engaged in a "smear campaign" that destroyed plaintiff’s career as a securities analyst.  He asserted claims of defamation, tortious interference with prospective economic advantage and civil conspiracy.  In February 2006, as previously summarized here, Magistrate Judge James C. Francis, IV declined to enter a preservation order and ordered defendants to answer a “document retention questionnaire” and produce documents in native format.  In response that order, Biovail proceeded with the search protocol it had previously proposed, using the search terms (i) Treppel, (ii) Jerry, (iii) Bank of America, (iv) Banc of America, (v) BAS, and (vi) BofA.  Biovail searched the individual emails and files of certain key players, as well as the shared file drives of relevant departments.  It conducted the search by accessing certain backup tapes it had preserved, and images of the custodians’ hard drives.

Subsequently, plaintiff requested that Biovail expand its search for electronic documents by adding some 30 search terms and numerous individual custodians to the original search.  Biovail declined on the grounds that plaintiff’s request came too late and was overbroad.  Biovail produced the results of its search in May 2006.  After some additional discovery relating to Biovail’s preservation of electronic data, discovery closed in December 2007.

Plaintiff then moved for an order compelling Biovail to search for additional ESI and imposing sanctions, alleging that the defendants did not adequately preserve evidence.  Defendants opposed both applications, contending that their production was complete and that their steps to preserve evidence were sufficient.

Read More

Copyright © 2022, K&L Gates LLP. All Rights Reserved.