Tag:Motion for Protective Order

1
Allstate Ins. Co. v. Scroghan, 851 N.E.2d 317 (Ind. Ct. App. 2006)
2
Collaboration Props., Inc. v. Tandberg ASA, 2006 WL 2398766 (N.D. Cal. Mar. 29, 2006)
3
In re ULLICO Inc. Litig., 237 F.R.D. 314 (D.D.C. 2006)
4
Quinby v. WestLB AG, 245 F.R.D. 94 (S.D.N.Y. 2006)
5
Frees, Inc. v. McMillian, 2006 WL 2668843 (E.D. Tenn. Sept. 15, 2006)
6
S.E.C. v. Brady, 2006 WL 3301865 (N.D. Tex. Oct. 16, 2006)
7
Advante Int’l Corp. v. Mintel Learning Tech., 2006 WL 3371576 (N.D. Cal. Nov. 21, 2006)
8
Marshall & Swift, L.P. v. Crawford & Co., 2006 WL 319262 (N.D. Ga. Feb. 9, 2006)
9
Friedman v. Superior Court, 2006 WL 2497981 (Cal. Ct. App. Aug. 29, 2006) (Not Officially Published)
10
Fed. Trade Comm’n v. Ameridebt, Inc., 2006 WL 618563 (N.D. Cal. Mar. 13, 2006)

Allstate Ins. Co. v. Scroghan, 851 N.E.2d 317 (Ind. Ct. App. 2006)

Key Insight: Court abused its descretion when it refused to enter protective order addressing Allstate’s production of computer program and manuals, since plaintiff made no showing that discovery under a protective order would be detrimental to his case, and it was shown that discovery without a protective order could be detrimental to Allstate

Nature of Case: Bad faith insurance litigation

Electronic Data Involved: Colossus computer program used by Allstate to evaluate claims

Collaboration Props., Inc. v. Tandberg ASA, 2006 WL 2398766 (N.D. Cal. Mar. 29, 2006)

Key Insight: Court ordered plaintiff to submit amended proposal for protective order governing defendants’ production of source code, to include following items: (1) Defendants to produce a single electronic copy, to be kept either by plaintiff’s attorneys or by plaintiff’s expert; (2) electronic copy to be maintained pursuant to security scheme employed by plaintiff’s expert, as described at oral argument; and (3) Only three hard copies may be made, total

Nature of Case: Patent infringement

Electronic Data Involved: Source code

In re ULLICO Inc. Litig., 237 F.R.D. 314 (D.D.C. 2006)

Key Insight: Where court found that ULLICO had in bad faith “grossly abused” the use of the “confidential” designation allowed under parties’ stipulated protective order, court ordered ULLICO to completely re-do its confidentiality designations and also ensure that the documents were correctly identified in parties’ joint discovery database

Nature of Case: ERISA litigation

Electronic Data Involved: Confidential documents, joint discovery database

Quinby v. WestLB AG, 245 F.R.D. 94 (S.D.N.Y. 2006)

Key Insight: Court applied Zubulake factors and granted in part defendant?s motion to shift costs, holding that defendant was entitled to recover 30 percent of the costs of restoring and searching backup tapes for responsive emails of one former employee, stating: “[I]f a party creates its own burden or expense by converting into an inaccessible format data that it should have reasonably foreseen would be discoverable material at a time when it should have anticipated litigation, then it should not be entitled to shift the costs of restoring and searching the data.”

Nature of Case: Gender discrimination

Electronic Data Involved: Email stored on backup tapes

Frees, Inc. v. McMillian, 2006 WL 2668843 (E.D. Tenn. Sept. 15, 2006)

Key Insight: Court narrowed subpoena to defendant’s new employer, setting out “tiered discovery” process: plaintiff was to identify at least one project involving files allegedly removed from disputed laptop; new employer would then search for documents and/or files of the type described that were related to that project and produce them; if any of the produced documents and/or files were shown to be relevant or reasonably calculated to lead to the discovery of admissible evidence, then the parties would proceed to the ?second tier? of discovery and plaintiff could then request documents related to other projects; if no responsive documents could be found with respect to the first identified projects, however, plaintiff would be required to make a sufficient showing to the court as to why discovery should proceed further

Nature of Case: Design firm sued former vice president under Computer Fraud and Abuse Act

Electronic Data Involved: Proprietary business and technological data

S.E.C. v. Brady, 2006 WL 3301865 (N.D. Tex. Oct. 16, 2006)

Key Insight: Court sustained objection to portion of defendant’s subpoena based on undue burden, where potentially responsive electronic data was estimated to be 32,222,000 pages and there were over 226 boxes of hard copy documents, and vast majority of responsive documents were in the possession of the SEC and had either already been produced by the SEC to Brady, or would shortly be produced

Nature of Case: Securities litigation

Electronic Data Involved: Email and electronic data

Advante Int’l Corp. v. Mintel Learning Tech., 2006 WL 3371576 (N.D. Cal. Nov. 21, 2006)

Key Insight: Where defendant demonstrated that serious questions existed both as to the reliability and the completeness of materials produced in discovery by plaintiff, including the possible alteration of email, court concluded that forensic examination of defendant’s hard drives was warranted; court ordered counsel for the parties to meet and confer regarding a protocol for the imaging and subsequent production of responsive documents

Nature of Case: Misappropriation of trade secrets

Electronic Data Involved: Hard drives; email

Marshall & Swift, L.P. v. Crawford & Co., 2006 WL 319262 (N.D. Ga. Feb. 9, 2006)

Key Insight: Court granted defendant’s motion for reconsideration and clarification of order extending discovery cut off, confirming that defendant would be allowed to engage in limited discovery in order to rebut plaintiff’s evidence of software usage documented in plaintiff’s spreadsheets, and to explore the source data for entries on the spreadsheets

Nature of Case: Plaintiff sought damages stemming from defendant’s use of plaintiff’s claims software

Electronic Data Involved: Spreadsheet

Friedman v. Superior Court, 2006 WL 2497981 (Cal. Ct. App. Aug. 29, 2006) (Not Officially Published)

Key Insight: Finding requests for production too broad and not reasonably particularized, appellate court concluded that trial court had erred in, among other things, not adequately resolving the question of how burdensome compliance with production requests would have proven to nonparties, where nonparties? counsel opined that it would take 5,260 hours to review email, at cost of $1,393,900, and requesting party?s expert estimated only 10 hours for such review; appellate court granted writ and vacated trial court’s orders

Nature of Case: Nonparties sought writ of mandate overturning trial court’s orders granting motion to compel depositions and production of documents pursuant to subpoenas

Electronic Data Involved: Email

Fed. Trade Comm’n v. Ameridebt, Inc., 2006 WL 618563 (N.D. Cal. Mar. 13, 2006)

Key Insight: Magistrate denied third party’s motion to stay discovery order requiring him to give permission to Google, Inc. to produce emails from his gmail account, where third party failed to establish any likelihood of success on appeal or that the balance of hardships tipped in his favor; court was “skeptical” of third party’s unsubstantiated arguments that the volume of email was large and that attorney review would be unduly costly, and noted that “email could likely be screened efficiently through the use of electronic search terms that the parties agreed upon”

Nature of Case: Allegations of consumer fraud

Electronic Data Involved: Email in third party’s Google email account

Copyright © 2022, K&L Gates LLP. All Rights Reserved.