Archive - 2011

1
Upcoming Event: Cyber Threats, Forensic Investigation and Legal Tools – Cautions and Countermeasures
2
Defendants’ “Completely Ineffective” Review Procedure and Failure to Rectify the Inadvertent Disclosure in a Timely Way Results in Finding of Waiver
3
Court Declines to Excuse Production where Party’s Negligent Failure to Preserve Rendered Data “Less Accessible”
4
Upcoming Events
5
For Key Employees’ Bad Faith, Intentional Spoliation, Court Imposes Adverse Inference and Monetary Sanctions
6
Timing is Still Everything: Motion for Spoliation Sanctions Denied as Untimely
7
Foreign Applicant’s Request for Secret Access to Foreign Debtor’s Emails “Manifestly Contrary” to U.S. Public Policy
8
Court Upholds Sanctions against “International Man of Mystery” citing Affirmative Actions to Destroy Relevant Documents in Unallocated Space
9
For e-Discovery Efforts “Wholly Devoid of Competence” and for Spoliation, Court Orders Sanctions and Prohibits Indemnification from Insurer
10
Court Rejects Refusal to Issue Litigation Hold Before 26(f) Conference, Orders Litigation Hold on All Evidence Reasonably Related to Pending Litigation

Upcoming Event: Cyber Threats, Forensic Investigation and Legal Tools – Cautions and Countermeasures

September 13, 2011
8:30 – 9:00 a.m. Check in and breakfast; 9:00 a.m. – 11:00 a.m. Program EST

K&L Gates Center
210 Sixth Avenue
Pittsburgh, PA 15222

Presenters: Thomas J. Smith, David A. Bateman, Daniel R. Miller

Please join us for a CLE presentation focused on the intersection of law and cyber-sleuthing, examining classic and newly emerging web-based attacks and the legal and forensic tools to combat them.  Learn about the evolving legal and technical landscapes regarding cyber threats, as well as resources available to protect against and prosecute rogue online activity, from members of the K&L Gates Cyber Security and e-Discovery and Analysis Technology (e-DAT) Groups.

Topics will include:

  • Recognizing and responding to ever-evolving cyber threats to business
  • Combining cyberforensic investigation and civil litigation tools to unmask and prosecute cyber-villains
  • Developing effective protections and policies for the use of web properties and portable devices to limit losses Considering the relationship between cyber security and e-discovery and records management issues  

Program registration is complimentary.  Click HERE to register.

Defendants’ “Completely Ineffective” Review Procedure and Failure to Rectify the Inadvertent Disclosure in a Timely Way Results in Finding of Waiver

Thorncreek Apartments III, LLC v. Vill. of Park Forest, Nos. 8 C 1225, 08-C-0869, 08-C-4303, 2011 WL 3489828 (N.D. Ill. Aug. 9, 2011)

The court held that privilege was waived as to inadvertently produced documents where defendants failed to take reasonable steps to prevent disclosure and failed to rectify the error in a timely way.  In so finding, the court cited defendants’ failure to conduct a final check before production, the failure of the process to protect any privilege (all privileged documents were produced), the nine months between production and discovery of the disclosure, and the failure to timely produce a privilege log, among other things.

Read More

Court Declines to Excuse Production where Party’s Negligent Failure to Preserve Rendered Data “Less Accessible”

United States v. Universal Health Servs., Inc., No. 1:07cv000054, 2011 WL 3426046 (W.D. Va. Aug. 5, 2011)

Here, the Commonwealth sought to avoid producing allegedly inaccessible information.  The court declined to excuse production, reasoning in part that it was the Commonwealth’s own “negligent failure to take steps to adequately preserve information” which rendered the information "less accessible."  Instead, the court indicated that it would order the backup tapes and forensic images be produced to defendants “for use by a commercial vendor” to retrieve the information “in a format usable by the Commonwealth” and that defendants would bear the costs, subject to a motion seeking reimbursement.

Read More

Upcoming Events

Social Media Law (Sponsored by Law Seminars International)

September 8-9
Renaissance Seattle Hotel
Seattle, WA

During this two-day event, K&L Gates Partner Todd Nunn will participate in the presentation of “The Next New Hot Button Issue: Site Operator Responsibilities Arising from Use of Social Media as a Tool for Solving Street and Other Traditional Crimes,” a discussion of how law enforcement has moved beyond looking for criminal behavior in social media sites to using social medial as a tool for tracking down conventional criminals, and site operator responsibilities for preserving evidence.  Specifically, Todd will discuss obligations to avoid spoliation of evidence and the implications for data retention policies and user rights and preparing your staff to respond appropriately to subpoenas.

For more information, or to register for this event, click here.

eDiscovery for Oil and Gas (IQPC)

September 26-27
The Omni Houston Galleria Hotel
Houston, TX

K&L Gates Partner Todd Nunn will kick off this conference by leading the first Breakfast Workshop entitled “E-Discovery Case Law Developments and the Realities of an EPA Investigation” on Monday morning (September 26th), starting at 7AM.  Participants in this workshop will learn about the latest case law; what documents should be retained at all stages of an investigation; what, if any limits there are to e-discovery requirements in government investigations; and the latest strategies to overcome today’s e-discovery document retention challenges.  This workshop may be booked separately, if desired.

For more information, or to register for this workshop or to attend the entire conference, click here.

For Key Employees’ Bad Faith, Intentional Spoliation, Court Imposes Adverse Inference and Monetary Sanctions

E.I. Du Pont De Nemours & Co. v. Kolon Indus., Inc., No. 3:09cv58, 2011 WL 2966862 (E.D. Va. July 21, 2011)

The court found that defendant breached its preservation duty when key employees intentionally deleted ESI in bad faith.  Acknowledging Kolon’s (insufficient) attempts to place a litigation hold, the court declined to impose default judgment, but ordered sanctions in the form of attorneys’ fees, expenses and costs related to the motion, and an adverse inference instruction.  In so doing, the court rejected arguments that plaintiff suffered no prejudice and that because many of the files were recovered, there was no spoliation.

Read More

Timing is Still Everything: Motion for Spoliation Sanctions Denied as Untimely

Am. Nat’l Prop. & Cas. Co. v. Campbell Ins., Inc., No. 3:08-cv-00604, 2011 WL 3021399 (M.D. Tenn. July 22, 2011)

In this case, the court denied plaintiff’s Motion for Sanctions for Spoliation of Evidence as untimely, citing the facts that it had been 14 months since the alleged spoliation was discovered, that discovery had already closed, and that trial was weeks away.  In reaching its conclusion, the court relied heavily on the summary of the law regarding the timeliness of spoliation motions laid out by the court in Goodman v. Praxair Servs., Inc., 632 F. Supp. 2d 494 (D. Md. 2009).

Read More

Foreign Applicant’s Request for Secret Access to Foreign Debtor’s Emails “Manifestly Contrary” to U.S. Public Policy

In re Toft, No. 11-11049 (ALG), 2011 WL 3023544 (Bankr. S.D.N.Y. July 22, 2011)

In this case, a foreign applicant, Dr. Martin Prager, sought recognition and enforcement of a German court’s “Mail Interception Order” which authorized Prager, as insolvency administrator, to intercept the debtor’s postal and electronic mail.  The court, following its determination that there was a sufficient basis to exercise jurisdiction, denied the application upon finding that the relief requested was manifestly contrary to U.S. public policy.

Read More

Court Upholds Sanctions against “International Man of Mystery” citing Affirmative Actions to Destroy Relevant Documents in Unallocated Space

Genger v. TR Investors, LLC, No. 592,2010, 2011 WL 2802832 (Del. July 18, 2011)

As previously summarized on this blog (here), the Delaware Court of Chancery ordered sanctions against the defendant for wiping the unallocated space on his company’s computer system, despite a court order prohibiting such destruction.  On appeal, the Delaware Supreme Court upheld the sanctions, citing the defendant’s intentional, affirmative actions to destroy documents, and clarified that it did not “read the Court of Chancery’s Spoliation Opinion to hold that as a matter of routine document retention procedures, a computer hard drive’s unallocated free space must always be preserved.”

Read More

For e-Discovery Efforts “Wholly Devoid of Competence” and for Spoliation, Court Orders Sanctions and Prohibits Indemnification from Insurer

PIC Group, Inc. v. LandCoast Insulation, Inc., No. 1:09-CV-662-KS-MTP, 2011 WL 2669144 (S.D. Miss. July 7, 2011)

A Special Master determined that defendant’s discovery failures were largely the result of a “callous and careless attitude” rather than a “craven effort to hide or destroy information”, save one instance of intentional deletion by defendant’s Manager of Legal Affairs.  Adopting in part the Special Master’s recommendations, the court ordered sanctions, including production of the non-privileged contents of the manager’s hard drive and payment of plaintiff’s attorney’s costs and fees, with the condition that payment be rendered by defendant, not its insurance company.

Read More

Court Rejects Refusal to Issue Litigation Hold Before 26(f) Conference, Orders Litigation Hold on All Evidence Reasonably Related to Pending Litigation

Haraburda v. Arcelor Mittal USA, Inc., No. 2:11 cv 93, 2011 WL 2600756 (N.D. Ind. June 28, 2011)

In this case, plaintiff came to believe, based on defendant’s comments and refusal to issue a litigation hold, that relevant evidence would be destroyed.  Accordingly, plaintiff moved for an Order to Preserve Evidence.  Following consideration of the relevant factors and upon rejecting defendant’s arguments that plaintiff’s motion was improper prior to the parties’ Rule 26(f) conference, the court granted the motion and ordered defendant to implement a litigation hold on information that may reasonably be related to the pending litigation.

Read More

Copyright © 2022, K&L Gates LLP. All Rights Reserved.