Catagory:Case Summaries

1
Harrison v. Office of the Architect of the Capitol, No. 09-1364 (CKKK), 964 F.Supp.2d 81 (2013), reconsideration denied, 2014 WL 4696814 (D.D.C. Sep. 23, 2014)
2
Tedeschi v. Kason Credit Corp, No. 3:10CV00612 DJS, 2014 WL 1491173 (D. Conn. Apr. 15, 2014)
3
Crissen v. Gupta, No. 2:12-cv-00355-JMS-WGH, 2014 WL 1431653 (S.D. Ind. Apr. 14, 2014)
4
Lemon Juice v. Twitter, Inc., No. 502898/14, 2014 WL 4287049 (N.Y. Sup. Ct. Aug. 29, 2014)
5
Clauss Constr. v. UChicago Argonne, LLC, No. 13 C 5479, 2014 WL 5390665 (N.D. Ill. Oct. 20, 2014)
6
Design Basics, LLC v. Carhart Lumber Co., No. 8:13CV125, 2014 WL 6669844 (D. Neb. Nov. 24, 2014)
7
Memory Lane Inc. v. Classmates Int?l. Inc., No. SACV 11-940-JLS (RNBx), 2014 WL 12617383 (C.D. Cal. Jul. 25, 2014)
8
The Shaw Group Inc. v. Zurich Am. Ins. Co., No. 12-257-JJB-RLB, 2014 WL 4373210 (M.D. La. Sep. 3, 2014)
9
Nat?l Jewish Health v. WebMD Health Servs. Grp., Inc., No. 12-cv-02834-WYD-MJW, 2014 WL 2118585 (D. Colo. May 21, 2014)
10
Court Declines to Preclude “Eyes On” Review for Privilege

Harrison v. Office of the Architect of the Capitol, No. 09-1364 (CKKK), 964 F.Supp.2d 81 (2013), reconsideration denied, 2014 WL 4696814 (D.D.C. Sep. 23, 2014)

Key Insight: Denying defendant’s motion for terminating sanctions for plaintiff’s intentional destruction of digital tape recording device as dismissal would be disproportionate to prejudice to defendant caused by misconduct, court ruled that strong adverse inference was appropriate and, for purposes of resolving the parties’ cross motions for summary judgment, court would assume that the recording device would have revealed the plaintiff was intentionally recording conversations of co-workers without their consent

Nature of Case: Hostile work environment and retaliation claims

Electronic Data Involved: Digital recording device and tape

Tedeschi v. Kason Credit Corp, No. 3:10CV00612 DJS, 2014 WL 1491173 (D. Conn. Apr. 15, 2014)

Key Insight: Court denied plaintiff’s motion for adverse inference based on defendant’s failure to preserve printouts from its computer system, finding that defendant did not have a duty to preserve printouts so long as the electronic files themselves were preserved

Nature of Case: Claims under Fair Debt Collection Practices Act

Electronic Data Involved: Printed fact sheets that showed collection activity maintained on defendant’s computer system

Crissen v. Gupta, No. 2:12-cv-00355-JMS-WGH, 2014 WL 1431653 (S.D. Ind. Apr. 14, 2014)

Key Insight: Court criticized plaintiff for not complying with inadvertent production provision of protective order and ordered plaintiff to delete all copies of the recalled documents and any information gleaned therefrom from its network drive, and further ruled that plaintiff may not use the documents or any work product derived therefrom unless and until it is determined that those documents should have been produced; court further awarded bank its fees and costs in connection with the motion, to be paid by plaintiff’s counsel, because the language of the claw back provision was clear and plaintiff’s counsel not only ignored that language but then took the extra step of reviewing the very documents the bank sought to recall

Nature of Case: Racketeering, fraud, unjust enrichment

Electronic Data Involved: Tax returns, bank documents containing defendants’ personal financial information, and internal bank documents

Lemon Juice v. Twitter, Inc., No. 502898/14, 2014 WL 4287049 (N.Y. Sup. Ct. Aug. 29, 2014)

Key Insight: Where unknown person created Twitter account in plaintiff?s name and in violation of criminal court’s order took photo of child victim in court testifying against her tormentor and posted it to Twitter account, court ruled that plaintiff had met his burden of demonstrating a meritorious claim for intentional infliction of emotional distress and that the discovery sought from Twitter was needed in order to identify who should be named as a defendant, and that anonymous Twitter account creator?s behavior constituted an actionable tort and was not speech covered by First Amendment protection such that anonymity of creator had to yield to plaintiff?s need to redress the actionable wrong perpetrated against him; court directed Twitter to disclose basic subscriber information, records, internet protocol addresses and other similar information sufficient to identify owner of the bogus Twitter account and to preserve certain evidence

Nature of Case: Special proceeding pursuant to CPLR 3102(c) seeking an order directing Twitter to preserve certain evidence and to disclose certain information

Electronic Data Involved: Twitter subscriber information sufficient to identify the individual(s) who owned or operated particular Twitter account and logged into or “tweeted” on the account

Clauss Constr. v. UChicago Argonne, LLC, No. 13 C 5479, 2014 WL 5390665 (N.D. Ill. Oct. 20, 2014)

Key Insight: Where plaintiff discovered numerous boxes of relevant or potentially relevant documents that had not been previously produced, but did not produce them in electronic format with Bates-labeling in accordance with parties’ agreed production protocol and instead provided photographs of the documents and boxes and some incomplete indexes, defendants successfully argued that plaintiff either should have to comply with parties’ agreement and produce material in correct format or nonconforming documents should be excluded; plaintiff chose to have newly discovered documents excluded from evidence; court found that monetary sanctions were appropriate and awarded defendant its attorneys’ fees and expenses incurred in filing the motion and attending hearing

Nature of Case: Breach of contract claims

Electronic Data Involved: Hard copy documents

Design Basics, LLC v. Carhart Lumber Co., No. 8:13CV125, 2014 WL 6669844 (D. Neb. Nov. 24, 2014)

Key Insight: Where court had previously ruled that, absent an order of the court upon a showing of good cause or stipulation by the parties, a party from whom ESI has been requested shall not be required to search for responsive ESI: (a) from more than 10 key custodians, (b) that was created more than five years before the filing of the lawsuit, (c) from sources that are not reasonably accessible without undue burden or cost, or (d) for more than 160 hours, inclusive of time spent identifying potentially responsive ESI, collecting that ESI, searching that ESI and reviewing that ESI for responsiveness, confidentiality and privilege or work product, and plaintiff subsequently moved to compel additional computer imaging, court balanced Rule 26(b)(2)(B) considerations and, acknowledging that defendant had provided both electronic and paper copies of all blueprints, performed plaintiff?s requested search on the email copied from 11 computers, had invested many hours reviewing thousands of documents for privilege and had offered to produce the non-privileged emails to plaintiff?s counsel for his review and had provided suggested deposition dates for defendant?s president, and noting that plaintiff neither reviewed the email nor deposed anyone notwithstanding that case was more then 18 months old, concluded that requested discovery was not reasonable and proportional to the issues raised in the litigation, denied plaintiff?s motion to compel, granted defendant?s motion for protective order, and ordered parties to complete and file an appended Rule 26(f) Report

Nature of Case: Design misappropriation

Electronic Data Involved: Forensic images of every computer or data storage location used by defendant

Memory Lane Inc. v. Classmates Int?l. Inc., No. SACV 11-940-JLS (RNBx), 2014 WL 12617383 (C.D. Cal. Jul. 25, 2014)

Key Insight: Defendant moved for the court to tax costs for e-Discovery tasks including TIFF conversion, native file processing, CD creation, blowbacks and ?Data reduction & filtering? that the clerk had disallowed. The court disallowed costs for data reduction/filtering, native file processing and ?technical time? and allowed costs for Tiff conversion, CD/DVD creation, imaging and blowbacks (costs were reasonable and necessary).

Nature of Case: Taxable costs

Electronic Data Involved: ESI

The Shaw Group Inc. v. Zurich Am. Ins. Co., No. 12-257-JJB-RLB, 2014 WL 4373210 (M.D. La. Sep. 3, 2014)

Key Insight: Where parties? agreed protective order stated that parties would endeavor to agree on search terms to be utilized in the search for responsive ESI, and current discovery dispute centered solely on the reasonableness of the search terms chosen by each party and the willingness of the parties to negotiate reasonable search terms, court rejected defendant?s proposed list of 90 search terms in light of plaintiff?s showing that the broad search would result in undue burden and expense by generating an excess of irrelevant documents, and instead ordered plaintiff to search for responsive documents using plaintiff?s 28 proposed search terms and protocol which the court found reasonable and well-tailored to locate responsive documents; court faulted parties for their lack of diligence in completing discovery within the court?s deadlines, observing: ?In short, both sides chose to do nothing, waiting to see if the other side would blink first. In doing so, they have compromised the deadlines in the court?s scheduling order, the briefing on dispositive motions, and have essentially gambled with the parameters of ESI discovery.?

Nature of Case: Insurance dispute

 

Nat?l Jewish Health v. WebMD Health Servs. Grp., Inc., No. 12-cv-02834-WYD-MJW, 2014 WL 2118585 (D. Colo. May 21, 2014)

Key Insight: Where Plaintiff maintained emails in Enterprise Vault with journaling capabilities (which captures and stores all emails in one place) and all ESI produced was searchable, sortable, paired with relevant metadata and included Concordance load files (and where emails were also produced with their attachments), the special master found the production met the requirements of 34(b)(2)(E)(ii) and was both properly produced in the form in which it was ordinarily maintained and in a reasonably usable form and further found that although 34(b)(2)(E)(i) did not apply to ESI, the production also satisfied the traditional requirement to produce documents (which ESI is not) in the manner in which it is kept in the usual course of business; special master made clear that a custodian need not be an individual and that ?[a] company, through an IT department, can serve as the custodian of electronic files kept on company servers.?

Electronic Data Involved: ESI, email

Court Declines to Preclude “Eyes On” Review for Privilege

Good v. Am. Water Works Co., Inc., No. 2:14-01374, 2014 WL 5486827 (S.D. W. Va. Oct. 29, 2014)

In this case, the parties made an effort to “craft an agreement respecting the handling of attorney-client and work product information inadvertently disclosed,” but disagreed regarding the proper procedure for identifying privileged information.  Defendants sought to “’encourage the incorporation and employment of time-saving computer-assisted privilege review, while Plaintiffs propose[d] that the order limit privilege review to what a computer can accomplish, disallowing linear (aka ‘eyes on’) privilege review altogether.’”  The court agreed with the defendants and entered an order allowing both computer-assisted and linear review, but invited the plaintiffs to file a second motion should the defendants’ methodologies result in unacceptable delays.

Read More

Copyright © 2025, K&L Gates LLP. All Rights Reserved.