Tag:Local Rule

1
HMS Holdings Corp. v. Arendt, NO. A754/2014, 2015 WL 2403099 (N.Y. Sup. Ct. May 19, 2015)
2
Commonwealth v. Mulgrave, 33 N.E.3d 440 (Mass. July 13, 2015)
3
Farstone Tech., Inc. v. Apple, Inc., No. 8-13-cv-01537-ODW(JEMx), 2014 WL 2865786 (C.D. Cal. June 24, 2014)
4
Culp v. Alabama, CR-13-1039, 2014 WL 6608543 (Ala. Crim. App Nov.21, 2014)
5
Black & Veatch Corp. v. Aspen Ins. (UK) Ltd., No. 12-2350-SAC, 2014 WL 806122 (D. Kan. Feb. 28, 2014)
6
SCR-Tech LLC v. Evonik Energy Servs. LLC, No. 08 CVS 16632 (N.C. Super Ct. Dec. 31, 2014)
7
BancorpSouth Bank v. Kleinpeter Trace, LLC, No. 2013 CA 1396, 2014 WL 4925698 (La. Ct. App. Oct. 1, 2014)
8
TVIIM, LLC v. McAfee, Inc., No. 13-cv-04545-VC (KAW), 2014 WL 5280966 (N.D. Cal. Oct. 15, 2014)
9
PersonalWeb Techs., LLC v. Google Inc., No. C13-01317 EJD (HRL), 2014 WL 4088201 (N.D. Cal. Aug. 19, 2014)
10
Sasol N. Am., Inc. v. Kan. State Inst. for Commercialization, No. 14-mc-218-JWL-KMH, 2014 WL 3894357 (D. Kan. Aug. 8, 2014)

HMS Holdings Corp. v. Arendt, NO. A754/2014, 2015 WL 2403099 (N.Y. Sup. Ct. May 19, 2015)

Key Insight: For one defendant?s repeated use of a cleaning software (?Disk Utility? and its ?Secure Erase Free Space? function) to delete files and loss of a relevant hard drive without an adequate explanation and for another defendant?s loss of relevant ESI, including her intentional deletion of information from the desktop registry and her disposal of her cell phone (which she notably was unaware had been automatically backed up each time it was connected to her computer), ongoing deletion of text messages (on her new phone), and misrepresentations about when the old phone was discarded, the court found that a mandatory adverse inference was warranted and rejected Defendants? argument that the court should decline to employ the adverse inference at the preliminary injunction state, reasoning that the objective of promoting fairness was best served by ?employing an adverse inference at all relevant states of the litigation?; court also ordered defendants to pay Plaintiff?s attorneys fees without seeking reimbursement from their new employer and indicated its intention to forward its decision to the NY Bar in light of one defendant?s status as an attorney

Nature of Case: Misappropriation of trade secrets, breach of “post-employment covenants”

Electronic Data Involved: ESI, hard drive, text messages (iphone)

Commonwealth v. Mulgrave, 33 N.E.3d 440 (Mass. July 13, 2015)

Key Insight: Where murder victim sent text message to son stating that defendant was threatening to kill her and that she was scared and 6 minutes later called 911 to report that defendant was stabbing her, court did not err in allowing text message to son into evidence under the ?spontaneous utterance? exception to the hearsay rule

Nature of Case: Murder

Electronic Data Involved: Text message

Farstone Tech., Inc. v. Apple, Inc., No. 8-13-cv-01537-ODW(JEMx), 2014 WL 2865786 (C.D. Cal. June 24, 2014)

Key Insight: Court adopted plaintiff’s source-code printing provision in its entirety, rejecting as too restrictive defendant’s proposed limitations that parties may print only that source code ?necessary? to prepare court filings and pleadings, noting that the “reasonably necessary” standard had solid foundation in district?s model protective order, and rejecting as arbitrary defendant?s proposed numerical restrictions: 30-page threshold beyond which the source code printing would be presumed to be excessive, and a total cap on source code printing at the greater of 250 pages or 10 percent of the source code; court also adopted in full plaintiff?s proposed language regarding the use of source code for depositions

Nature of Case: Patent infringement

Electronic Data Involved: Source code

Culp v. Alabama, CR-13-1039, 2014 WL 6608543 (Ala. Crim. App Nov.21, 2014)

Key Insight: In his appeal of a domestic violence conviction, Culp claimed that emails between himself and the victim were improperly admitted into evidence and were never properly authenticated under Rule 901(b)(4), Ala. R. Evid.. Alabama?s Rule 901(b)(4), which is identical to the federal version, provides that evidence can be authenticated by ?[d]istinctive characteristics and the like,? including ?[a]ppearance, contents, substance, internal patterns, or other distinctive characteristics, taken in conjunction with circumstances.? The court ruled that the emails were properly authenticated because each email contained Culp?s photograph, a screen name that he used, and many of the emails concluded with Culp?s initials. Additionally, the emails contained drug references that were uniquely used by Culp and the victim.

Nature of Case: Criminal

Electronic Data Involved: Email

Black & Veatch Corp. v. Aspen Ins. (UK) Ltd., No. 12-2350-SAC, 2014 WL 806122 (D. Kan. Feb. 28, 2014)

Key Insight: Court denied in most respects plaintiff’s motion for protective order, finding that plaintiff’s undue burden and expense arguments were unsupported and conclusory; court further denied plaintiff’s alternative proposal to shift some of the uncalculated ESI costs onto defendants as plaintiff failed to show that the disputed ESI production was inaccessible because of undue burden or cost, and because other relevant factors did not weigh in plaintiff’s favor; court further denied plaintiff?s request for a discovery conference or appointment of an ESI master, and ordered the parties to meet and confer regarding the proper method to search custodian hard drives, and suggested the parties consider a clawback provision specifically for ESI harvested after running the parties? respective search terms

Nature of Case: Insurance coverage dispute

Electronic Data Involved: ESI in databases and stored on custodian hard drives

SCR-Tech LLC v. Evonik Energy Servs. LLC, No. 08 CVS 16632 (N.C. Super Ct. Dec. 31, 2014)

Key Insight: Where Plaintiff failed to ensure the preservation of information underlying a highly relevant report regarding the examination of certain Defendants? computers over which the court determined it had ?de facto control? (the underlying information, including copies of the images were in the possession of the third party investigator), the court indicated it was not necessary to make an express finding regarding when litigation was contemplated and reasoned that based on the circumstances, Defendants were ?entitled to the inference? that the information was negligently lost during a time when Plaintiff had the duty to preserve it. Thus, the court found Defendants had presented sufficient evidence of spoliation to trigger Plaintiff?s obligation to rebut it and that Plaintiff had not. As a sanction, the court ordered a permissive adverse inference. Regarding Plaintiff?s request to compel Defendant?s restoration of backup tapes, the court identified the state?s relevant three-part test and ordered that if Plaintiff wanted restoration, it would be required to pay half o f the estimated costs up front, with further allocation to occur following analysis of the results of the search.

Electronic Data Involved: ESI, backup tapes

BancorpSouth Bank v. Kleinpeter Trace, LLC, No. 2013 CA 1396, 2014 WL 4925698 (La. Ct. App. Oct. 1, 2014)

Key Insight: Appellate court concluded that trial court did not err in ordering that adverse inference instruction be given to jury as to contents of particular file where plaintiff had notice that file, which was within plaintiff?s control, was relevant to pending litigation, it attempted to refer to contents of file in support of motion for summary judgment, and plaintiff?s explanation for loss of the file was pretextual and not reasonable; appellate court reversed trial court?s decision to impose ultimate sanction of dismissal because record did not support conclusion that plaintiff willfully or in bad faith failed to comply with trial court?s orders, since dismissal rested on conduct that did not relate to court-ordered discovery and in most instances occurred prior to the first discovery order; appellate court vacated trial court?s award of attorneys? fees in favor of defendant and remanded the matter to the trial court for a determination of reasonable expenses because the basis for the award was unclear and the award appeared to include other fees and costs unrelated to the particular discovery motion for which they were awarded

Nature of Case: Suit to enforce obligations arising out of promissory notes

Electronic Data Involved: ESI, email, spreadsheets

TVIIM, LLC v. McAfee, Inc., No. 13-cv-04545-VC (KAW), 2014 WL 5280966 (N.D. Cal. Oct. 15, 2014)

Key Insight: Magistrate judge granted in part and denied in part plaintiff?s request to compel defendant to produce emails employing particular keywords in Boolean search of five identified custodians, stating that defendant need not run two of the requested searches because they used truncated versions of defendant?s product names — something that was prohibited by the parties? ESI Order barring use of indiscriminate terms, such as the producing company?s name or its product name, unless combined with narrowing search criteria to reduce risk of overproduction; as to third requested search, magistrate judge ordered parties to confer to identify keywords that would remove ?out of office? and other automatic responses from the results, and ordered defendant to produce emails within seven days of parties? agreement

Nature of Case: Patent infringement

Electronic Data Involved: Email

PersonalWeb Techs., LLC v. Google Inc., No. C13-01317 EJD (HRL), 2014 WL 4088201 (N.D. Cal. Aug. 19, 2014)

Key Insight: Among other rulings on the parties? respective discovery motions, the court: (1) denied plaintiff?s request for an order compelling defendants to produce document retention policies and litigation hold notices issued in the case, because litigation hold notice was protected as attorney-client communication and/or work product and burden of producing requested material, however minimal, outweighed its likely benefit; court noted that plaintiff waited over one year to follow up on particular request, relevance of material to case merits was dubious, and timing of motion following court?s finding that plaintiff had committed spoliation by failing to timely file its litigation hold suggested that plaintiff?s motivation was retaliatory; and (2) denying plaintiff?s request for source code and documents related to newest version of accused product, which version was still in development, since discovery into such material would be premature because an incomplete, non-?live? product cannot be evaluated for infringement in patent litigation

Nature of Case: Patent infringement

Electronic Data Involved: ESI, litigation hold notice, source code

Sasol N. Am., Inc. v. Kan. State Inst. for Commercialization, No. 14-mc-218-JWL-KMH, 2014 WL 3894357 (D. Kan. Aug. 8, 2014)

Key Insight: Despite fact that plaintiff served all-encompassing subpoena to third parties without first attempting to access the breadth of information from the defendant, in light of nonparty?s unique relationship with defendant in the underlying Texas litigation, the potential for indemnification, its financial interest in the Texas litigation, and nonparty?s repeated (yet unfulfilled) promises to produce responsive material, court determined it was appropriate for nonparty to bear some burden and that limited production was appropriate; court narrowed relevant timeframe for search and ordered nonparty to use search terms proposed by plaintiff and produce its ESI, including emails, attachments, exhibits and word processing documents, which contain those nine search terms

Nature of Case: Subpoena issued in a patent infringement and trade secret case pending in the Southern District of Texas

Electronic Data Involved: Email

Copyright © 2022, K&L Gates LLP. All Rights Reserved.