Catagory:Case Summaries

1
AKH Co., Inc. v. Universal Underwriters Ins. Co., No. 13-2003-JAR-KGG, 2014 WL 2760860 (D. Kan. June 18, 2014)
2
Ogden v. All-State Career School, No. 2:13cv406, 2014 WL 1646934 (W.D. Pa. Apr. 23, 2014)
3
Wis. Resources Protection Council v. Flambeau Mining Co., No. 11-cv-45-bbc, 2014 WL 3810884 (W.D. Wis. Aug. 1, 2014)
4
Gloucester Twp. Hous. Auth. V. Franklin Square Assocs., No. 12-0953 (RMB/AMD), 2014 WL 3974168 (D.N.J. Aug. 12, 2014)
5
Siggers v. Campbell, No. 07-12495, 2014 WL 4978648 (E.D. Mich. Mar. 25, 2014)
6
Miller v. Experian Info. Solutions, Inc., No. 3:13-cv-90, 2014 WL 5513477 (S.D. Ohio Oct. 31, 2014)
7
Flagstar Bank, FSB v. Walker, No. 05-13-00724-CV, 2014 WL 6065713 (Tex. App. Nov. 14, 2014)
8
Life Plans Inc. v. Security Life of Denver Ins. Co., No. 11 C 8449, 2014 WL 2879881 (N.D. Ill. June 25, 2014)
9
State Farm Mut. Auto. Ins. Co. v. Physiomatrix, Inc., No. 12-cv-11500, 2015 WL 1029540 (E.D. Mich. Mar. 3, 2014)
10
Castillon v. Corrections Corp. of Am., No. 1:12-cv-005590EJL, 2014 WL 517505 (D. Idaho Feb. 7, 2014)

Ogden v. All-State Career School, No. 2:13cv406, 2014 WL 1646934 (W.D. Pa. Apr. 23, 2014)

Key Insight: Court observed that ordering plaintiff to permit access to or produce complete copies of his social networking accounts would permit defendant to cast too wide a net and sanction an inquiry into scores of quasi-personal information that would be irrelevant and non-discoverable, and stated: ?Defendant is no more entitled to such unfettered access to plaintiff’s personal email and social networking communications than it is to rummage through the desk drawers and closets in plaintiff’s home”; court ruled that defendant was only entitled to limited discovery of plaintiff’s communications, and set out particular steps that plaintiff must take to comply with defendant?s requests

Nature of Case: Hostile work environment and disparate treatment based on reverse gender discrimination and retaliation claims

Electronic Data Involved: Electronic communications made or affirmatively acknowledged by plaintiff on any social networking website (e.g., Twitter, Facebook, MySpace) during the period of alleged harassment

Wis. Resources Protection Council v. Flambeau Mining Co., No. 11-cv-45-bbc, 2014 WL 3810884 (W.D. Wis. Aug. 1, 2014)

Key Insight: Court overruled plaintiffs? objection to clerk?s ruling on defendant?s bill of costs to the extent it awarded defendant taxable costs associated with retrieving computer information, noting that defendant sought reimbursement of only the costs incurred in the extraction endeavor — not for help in reviewing the documents; finding the request reasonable, the court observed: “Plaintiffs asked Defendant for 20 years of information from defendant?s mine site in Ladysmith, Wisconsin. Given the nature of the information storage over this period of time, it was reasonable, if not essential, for defendant to employ an expert third-party forensic expert to extract the information.?

Nature of Case: Environmental damage to the Flambeau River

Electronic Data Involved: 20 years of information

Gloucester Twp. Hous. Auth. V. Franklin Square Assocs., No. 12-0953 (RMB/AMD), 2014 WL 3974168 (D.N.J. Aug. 12, 2014)

Key Insight: Court evaluated five factors to determine that defendant’s inadvertent disclosure waived the attorney-client privilege, where defendant did not describe the precautions taken, if any, to prevent the disclosure of privileged information, but instead relied on the purportedly voluminous nature of the production, the disputed letters set forth communications between attorney and client concerning clearly privileged, substantive information relating to the litigation, the letters were produced in the litigation on two separate occasions, and defense counsel waited over three months after the letters’ production before attempting to rectify the disclosures and only discovered the inadvertent disclosure while preparing for a deposition

Nature of Case: Breach of contract

Electronic Data Involved: Privileged letters

Siggers v. Campbell, No. 07-12495, 2014 WL 4978648 (E.D. Mich. Mar. 25, 2014)

Key Insight: Notwithstanding that litigation hold was not put into place until more than four years after complaint was filed, court denied plaintiff?s motion for spoliation sanctions where there was no evidence that defendant deleted any documents or evidence, or acted with an intent to conceal or destroy evidence, there was no evidence that defendant routinely exchanged email correspondence about plaintiff with others, and the vigorous work of plaintiff?s appointed counsel led to only one responsive email being produced; plaintiff would be allowed to question defendant at trial about her failure to timely impose a litigation hold and about other matters related to plaintiff?s assertion that she must have had relevant email communications that no longer exist

Nature of Case: Pro se prisoner civil rights claims

Electronic Data Involved: Emails

Miller v. Experian Info. Solutions, Inc., No. 3:13-cv-90, 2014 WL 5513477 (S.D. Ohio Oct. 31, 2014)

Key Insight: Noting that parties have no duty to create documents simply to comply with another party’s discovery request, court denied plaintiff’s motion seeking spoliation sanctions based on defendant’s alleged failure to preserve copies of plaintiff’s credit reports, as defendant provided third parties with only unformatted electronic data which the third party would then aggregate and format according to its needs — it did not create any hard copy documents in connection with the process; as such, defendant could not be sanctioned for failing to preserve documents it neither created nor possessed

Nature of Case: Fair Credit Reporting Act case

Electronic Data Involved: Copies of credit reports defendant provided to third parties during pendency of lawsuit

Flagstar Bank, FSB v. Walker, No. 05-13-00724-CV, 2014 WL 6065713 (Tex. App. Nov. 14, 2014)

Key Insight: Trial court did not abuse its discretion in denying plaintiff’s request for adverse inference instruction as sanction for defendant?s inability to produce additional communications – which defendant had explained were not available because defendant had replaced its servers and had not backed-up the data – because there was no proof that defendant intentionally concealed evidence or that the spoliation irreparably deprived plaintiff of any meaningful ability to present its claims

Nature of Case: Claims arising from misappropriation of over $8 million in load proceeds designated to fund a series of residential loan transactions

Electronic Data Involved: Email

Life Plans Inc. v. Security Life of Denver Ins. Co., No. 11 C 8449, 2014 WL 2879881 (N.D. Ill. June 25, 2014)

Key Insight: Court denied request for costs of ?preparing electronic data to be converted to TIFF format? including ?data loading, data processing, and de-duplication and culling?; regarding OCR costs, the court acknowledged that there is ?less uniformity? about the issue of recovery and awarded costs for converting ESI into a ?readable format? (TIFF Conversion) – the equivalent of ?making copies? under 1920(4) – but denied costs for making that document searchable (OCR), noting that the requesting party had not ?shown why OCR was necessary to the production?

Electronic Data Involved: ESI Taxable costs

State Farm Mut. Auto. Ins. Co. v. Physiomatrix, Inc., No. 12-cv-11500, 2015 WL 1029540 (E.D. Mich. Mar. 3, 2014)

Key Insight: Court found an individual defendant had control over deleted emails in an account located on a Comcast server and that the deletion of the emails was not ?merely coincidental to the winding-down of the business operations? of Defendant but rather was intentional, ?to prevent the discovery of the evidence therein?; reasoning that Plaintiff was not prevent from proving its most crucial allegations, the court declined to impose ?case-terminating? sanctions, but did order monetary sanctions against the individual defendant who controlled the emails and that Defendants? would bear the cost of a forensic search of their computers; notably, the inspection would apply to all defendants? computers, despite the court?s finding that one individual defendant had no control over the deleted emails and could not be held responsible for the deletion where the court explained (in footnote) that the non-spoliating defendant?s email account (used by his clinic) was registered to the spoliating defendant and where the non-spoliating defendant testified that he had not conducted a proper search of his computers

Electronic Data Involved: Emails on third party (Cloud) server

Castillon v. Corrections Corp. of Am., No. 1:12-cv-005590EJL, 2014 WL 517505 (D. Idaho Feb. 7, 2014)

Key Insight: Where defendant produced data from timekeeping system in searchable .PDF format and provided attestation from the vice president of technology and chief information officer that that .PDF was the ?only, built-in, reasonably accessible data format? and that producing in the requested format would require Defendant to undertake the ?lengthy and daunting? task of writing a script and where Plaintiffs did not specify the format of production in their request, the court declined to compel re-production of the at-issue data, but noted that if Plaintiffs were willing to pay for the expense of writing a script, ?they may approach Defendant with such a request.?

Nature of Case: Prisoners’ civil rights

Electronic Data Involved: Data from timekeeping system

Copyright © 2025, K&L Gates LLP. All Rights Reserved.