Catagory:Case Summaries

1
Lifetouch Nat?l School Studios, Inc. v. Moss-Williams, No. C10-05297, 2013 WL 11235928 (N.D. Cal. Oct. 15, 2013)
2
Ubiquiti Networks, Inc. v. Kozumi USA Corp., No. 12-cv-2582 CW (JSC), 2013 WL 1767960 (N.D. Cal. Apr. 15, 2013)
3
Avoid “Discovery About Discovery” with Cooperation
4
Criminal Defendant Entitled to Production of Metadata Related to Police Report
5
Court Orders Imaging to Ensure Preservation of Self-Proclaimed Hacker’s ESI
6
No Sanctions for Spoliation of Emails in Former Officers’ Personal Accounts Absent Evidence of Bad Faith or Prejudice
7
Court Concludes that “at least in the Seventh Circuit,” the Duty to Preserve is Triggered “when a litigant knew or should have known that litigation was imminent” as Opposed to “Reasonably Foreseeable”
8
E.D. Michigan Approves Model Order Relating to the Discovery of Electronically Stored Information & a Meet and Confer Checklist for Pilot Use
9
Court Declines to Compel Response to “Ultra-Broad” Request for Passwords and User Names or Allow “Exhaustive Forensic Examination” of Computers
10
Magistrate Judge Declines to Presume Prejudice, Recommends Denial of Motion for Sanctions

Lifetouch Nat?l School Studios, Inc. v. Moss-Williams, No. C10-05297, 2013 WL 11235928 (N.D. Cal. Oct. 15, 2013)

Key Insight: Where a former employee (defendant) admitted prior possession of a thumb drive containing Plaintiff?s data (her prior employer) and that she had connected the thumb drive to her new employer?s computers (who is also a defendant) but where she claimed that she had not transferred any of Plaintiff?s information, that she could not recall the computer she connected to, and that she destroyed the drive before her duty to preserve arose, court reasoned that there was a ?sufficient nexus between the defendant?s computers and the alleged misappropriation of trade secrets to warrant forensic imaging of the computers? (over 60 in number) but, applying the cost-shifting analysis from Zubulake v. UBS Warburg LLC 217 FRD 309 (SDNY 2003), found that in light of the ?broad scope of the request, the cost of production, the resource disparity of the parties? and defendant?s repeated assertion that the information did not exist, cost shifting was appropriate; court indicated it ?may reconsider? cost allocation if the expert determined that information from the thumb drive was transferred to defendant?s computer

Nature of Case: Trade secrets

Electronic Data Involved: ESI of former employer

Ubiquiti Networks, Inc. v. Kozumi USA Corp., No. 12-cv-2582 CW (JSC), 2013 WL 1767960 (N.D. Cal. Apr. 15, 2013)

Key Insight: Court found Plaintiff had failed to meet its burden of demonstrating that Kozumi had control over non-party consultant?s emails absent any evidence that defendants could legally compel the non-party to produce the requested documents

Electronic Data Involved: Emails

Avoid “Discovery About Discovery” with Cooperation

Ruiz-Bueno, III v. Scott, No. 2:12-cv-0809, 2013 WL 6055402 (S.D. Ohio Nov. 15, 2013)

In this case, Plaintiffs moved to compel answers to their questions about Defendants’ efforts to respond to Plaintiffs’ discovery requests, including what procedures were undertaken to search for responsive electronically stored information.  Defendants objected, arguing that such information was not within the scope of discovery.  Following its discussion of whether “discovery about discovery [is] ever permissible” (it is), the court turned to the circumstances of this case and ordered Defendants to respond.  In its analysis, the court spent significant time extolling the virtues of cooperation.

Read More

Criminal Defendant Entitled to Production of Metadata Related to Police Report

United States v. Tutt, No. 13-cr-20396, 2013 WL 5707791 (E.D. Mich. Oct. 21, 2013)

In this case, the court granted in part Defendant’s Motion for Issuance of a Subpoena Duces Tecum seeking production of the arresting officers’ personnel files and disciplinary records as well as the metadata associated with an arresting officer’s police report.  Defendant sought to examine the metadata to confirm the alleged time that the report was written in light of the officer’s claim that he overheard the defendant making incriminating statements to the suspect in the adjoining cell while the officer “simultaneously” drafted his report and memorialized those alleged comments.  Defendant denied ever making the statements.

Read More

Court Orders Imaging to Ensure Preservation of Self-Proclaimed Hacker’s ESI

Battelle Energy Alliance, LLC v. Southfork Sec., Inc., No. 4:13-cv-00442-BLW, 2013 WL 5637747 (D. Idaho Oct. 15, 2013); Battelle Energy Alliance, LLC v. Southfork Sec., Inc., — F. Supp. 2d —, 2013 WL 5818559 (D. Idaho Oct. 29, 2013)

Plaintiff sought an ex parte temporary restraining order requiring Defendants to disable their website and remove information related to allegedly infringing software and also sought to create a forensic image of one defendant’s hard drive(s) to ensure preservation.  The court granted Plaintiff’s application, relying in part on Defendants’ self-identification as hackers.  Upon learning the at-issue source code had already been released, however, the court denied Plaintiff’s motion for a preliminary injunction and partially dissolved the TRO, but continued to retain images of the hard drives.

Read More

No Sanctions for Spoliation of Emails in Former Officers’ Personal Accounts Absent Evidence of Bad Faith or Prejudice

Puerto Rico Tel. Co., Inc. v. San Juan Cable, LLC, No. 11-2135 (GAG/BJM), 2013 WL 5533711 (D.P.R. Oct. 7, 2013)

Plaintiff alleged that the defendant failed to preserve relevant emails from the personal accounts of three former officers (the CEO, General Manager, and Senior Vice President) and sought an adverse inference instruction.  While the court agreed that Defendant’s failure to locate certain emails was a breach of the duty to preserve and constituted spoliation, no sanctions were imposed absent evidence of bad faith or a demonstration of prejudice.

Read More

Court Concludes that “at least in the Seventh Circuit,” the Duty to Preserve is Triggered “when a litigant knew or should have known that litigation was imminent” as Opposed to “Reasonably Foreseeable”

In re Pradaxa (Dabigatran Etexilate) Prods. Liab. Litig., MDL No. 2385, 2013 WL 5377164 (S.D. Ill. Sept. 25, 2013)

In this case, the court found that the duty to preserve arose after the at-issue information was destroyed in accordance with Defendant’s document retention policies and that an adverse inference was not warranted.  Considering the proper standard to employ when assessing when the duty to preserve is triggered, the court concluded that “the duty to preserve is triggered only when a litigant knew or should have known that litigation was imminent (at least in the Seventh Circuit).”

Read More

E.D. Michigan Approves Model Order Relating to the Discovery of Electronically Stored Information & a Meet and Confer Checklist for Pilot Use

The judges of the United States District Court for the Eastern District of Michigan have announced the approval, “on a pilot period basis,” of a Model Order Relating to the Discovery of Electronically Stored Information and a Rule 26(f) meet and confer checklist.  “It is within the judicial officer’s discretion whether these materials may be used.”

The Model Order sets forth a series of principles which address a myriad of issues including cooperation, proportionality, the duty to meet and confer, preservation, the identification of electronically stored information (ESI) and format of production, among others.  The checklist sets forth a series of potential topics to be discussed at the parties’ meet and confer.

Read More

Court Declines to Compel Response to “Ultra-Broad” Request for Passwords and User Names or Allow “Exhaustive Forensic Examination” of Computers

NOLA Spice Designs, LLC v. Haydel Enters., Inc., No. 12-2515, 2013 WL 3974535 (E.D. La. Aug. 2, 2013)

In this trademark infringement case, Defendant sought to compel Plaintiff and its principal (a third-party defendant) to produce “passwords and user names to all online web sites related to the issues in this litigation” and to compel Plaintiff and its principal to “submit their computers to an exhaustive forensic examination.”  Because the request for passwords and user names was “ultra-broad” and would allow Defendant to “roam freely through all manner of personal and financial data” and because Defendant “failed sufficiently to justify the broad forensic computer examination it request[ed],” the court denied the motion.

Read More

Magistrate Judge Declines to Presume Prejudice, Recommends Denial of Motion for Sanctions

Herrmann v. Rain Link, Inc., No. 11-1123-RDR, 2013 WL 4028759 (D. Kan. Aug. 7, 2013)

Plaintiff sought sanctions for Defendants’ allegedly intentional spoliation of evidence and argued that prejudice could be presumed.  The Magistrate Judge declined to do so and also found that Defendants’ spoliation was merely negligent.  Thus, absent a showing of actual prejudice, the Magistrate Judge recommended that Plaintiff’s motion be denied.

Read More

Copyright © 2025, K&L Gates LLP. All Rights Reserved.