Tag:Motion to Compel

1
E.E.O.C. v. Forge Ind. Staffing, Inc., No. 1:14-mc-00090-SEB-MJD, 2014 WL 6673574 (S.D. Ind. Nov. 24, 2014)
2
Icon-IP Pty Ltd., v. Specialized Bicycle Components, Inc., No. 12-cv-03844-JST (MEJ), 2014 WL 6788182 (N.D. Cal. Dec. 2, 2014)
3
Harrington Enters., Inc. v. Safety-Kleen Sys., Inc., No. 13-00167-CV-W-BP, 2014 WL 12611318 (W.D. Mo. July 11, 2014)
4
AKH Co., Inc. v. Universal Underwriters Ins. Co., No. 13-2003-JAR-KGG, 2014 WL 2760860 (D. Kan. June 18, 2014)
5
Commonwealth v. Gelfgatt, 11 N.E.3d 605 (Mass. 2014)
6
Enargy Power (Shenzhen) Co. v. Xiaolong Wang, No. 13-11348-DJC, 2014 WL 4687542 (D. Mass. Sep. 17, 2014)
7
Clauss Constr. v. UChicago Argonne, LLC, No. 13 C 5479, 2014 WL 5390665 (N.D. Ill. Oct. 20, 2014)
8
A & R Body Specialty & Collision Works, Inc. v. Progressive Cas. Ins. Co., No. 3:07CV929 (WWE), 2014 WL 5859024 (D. Conn. Nov. 10, 2014)
9
EEOC v. SVT, LLC, No. 2:13-CV-245-RLM-PRC, 2014 WL 2177796 (N.D. Ind. May 22, 2014)
10
Oleksy v. Gen. Elec. Co., No. 6 C 1245, 2014 WL 3820352 (N.D. Ill. Aug. 1, 2014)

E.E.O.C. v. Forge Ind. Staffing, Inc., No. 1:14-mc-00090-SEB-MJD, 2014 WL 6673574 (S.D. Ind. Nov. 24, 2014)

Key Insight: Where former employee filed claim with EEOC alleging sexual harassment and retaliation, and EEOC issued a subpoena to employer staffing agency seeking information to determine how long the staffing agency had required applicants to waive statutorily protected statutes of limitations, court declined to enforce the subpoena, finding that the EEOC’s subpoena exceeded its authority in that the information sought went beyond the issues arising out of former employee?s individual charge; court further determined that the burden imposed on the staffing agency far exceeded the minimal relevance of the evidence sought, given that staffing agency processed 130,000 temporary employee applications during the time period covered by the subpoena, applications were not kept in a central repository or electronically, and compliance would require manual review of each employment application maintained in paper format at each of its ten office locations and would disrupt agency’s day-to-day operations

Nature of Case: Motion for enforcement of administrative subpoena issued to staffing agency relating to investigation of former employee’s claim of sexual harrassment and retaliation

Electronic Data Involved: Versions of employment application form used by staffing agency between January 1, 2012 and May 31, 2014, including all pages of and revisions to each form

Icon-IP Pty Ltd., v. Specialized Bicycle Components, Inc., No. 12-cv-03844-JST (MEJ), 2014 WL 6788182 (N.D. Cal. Dec. 2, 2014)

Key Insight: Plaintiff sought to compel Defendant to produce additional documents relevant to their design infringement claims by searching Defendant?s emails and electronic design documents. Defendant argued that this comprehensive search of electronic design documents would be ?overly burdensome, oppressive, and not reasonably calculated to lead to discovery of admissible evidence,? and conducted a reasonable search responsive to Plaintiffs request, but did not explain why and how the comprehensive search would be burdensome. Defendant complied with a stipulation agreeing to specific email search terms and custodians, subject to objections which Plaintiff did not respond to. The court ordered that Plaintiff was entitled to additional discovery of electronic design documents because Defendant did not meet the burden of showing the request was unduly burdensome. However, since Defendant did comply with the stipulation, further email searches were not needed.

Nature of Case: Patent Litigation

Electronic Data Involved: ESI

Harrington Enters., Inc. v. Safety-Kleen Sys., Inc., No. 13-00167-CV-W-BP, 2014 WL 12611318 (W.D. Mo. July 11, 2014)

Key Insight: Court denied motion to compel searches of current and proposed custodians using additional search terms where Plaintiff failed to establish the relevance of the terms or the likelihood they would lead to admissible evidence and where Defendant had already provided discovery regarding the alleged issue, thus rendering the discovery cumulative and duplicative; court also denied motion to add custodians where Plaintiff again failed to establish relevance and where Defendant had shown that the ESI for the requested custodians was not reasonably accessible because it would require restoration of disaster backup tapes and ?substantial time, effort, and cost? to search

Electronic Data Involved: ESI (additional search terms, custodians)

Commonwealth v. Gelfgatt, 11 N.E.3d 605 (Mass. 2014)

Key Insight: Where the facts that would be conveyed by a criminal defendant through his act of decryption of computer files — i.e., his ownership and control of the computers and their contents, knowledge of the act of encryption, and knowledge of the encryption key — are already known to the government and are thus a “foregone conclusion,” compelling the defendant to enter his encryption key does not violate the defendant’s rights under the Fifth Amendment because the defendant is only telling the government what it already knows; accordingly, court reversed trial judge’s denial of government’s motion to compel decryption and remanded the case to the trial court for further proceedings

Nature of Case: Criminal case regarding mortgage fraud scheme

Electronic Data Involved: ESI; encryption key

Enargy Power (Shenzhen) Co. v. Xiaolong Wang, No. 13-11348-DJC, 2014 WL 4687542 (D. Mass. Sep. 17, 2014)

Key Insight: Where defendants maintained hard copy business records that they produced electronically on CD-ROM, but did not make a sufficient showing that documents were produced as they were kept in the usual course of business since defendants provided no details regarding where and how documents were maintained, court ordered defendants to organize and label documents to correspond to the categories of documents requested by plaintiffs; court further ruled that defendants need not ?affirm that their document searches and productions are complete without qualification, or that no additional responsive documents exist,? but directed defendants, once they had completed their search and produced all documents they intended to produce, to confirm their efforts in locating responsive documents were complete and whether they were withholding any documents

Nature of Case: Violations of Computer Fraud & Abuse Act, conversion, misappropriation of trade secrets and breach of fiduciary duty

Electronic Data Involved: Hard copy documents scanned and produced on CD-ROM

Clauss Constr. v. UChicago Argonne, LLC, No. 13 C 5479, 2014 WL 5390665 (N.D. Ill. Oct. 20, 2014)

Key Insight: Where plaintiff discovered numerous boxes of relevant or potentially relevant documents that had not been previously produced, but did not produce them in electronic format with Bates-labeling in accordance with parties’ agreed production protocol and instead provided photographs of the documents and boxes and some incomplete indexes, defendants successfully argued that plaintiff either should have to comply with parties’ agreement and produce material in correct format or nonconforming documents should be excluded; plaintiff chose to have newly discovered documents excluded from evidence; court found that monetary sanctions were appropriate and awarded defendant its attorneys’ fees and expenses incurred in filing the motion and attending hearing

Nature of Case: Breach of contract claims

Electronic Data Involved: Hard copy documents

A & R Body Specialty & Collision Works, Inc. v. Progressive Cas. Ins. Co., No. 3:07CV929 (WWE), 2014 WL 5859024 (D. Conn. Nov. 10, 2014)

Key Insight: Magistrate judge granted plaintiffs? motion for reconsideration, but adhered to its previous ruling denying plaintiffs? request that defendant merge two separate data compilations from two distinct data sources – one from a non-party and the other from defendant – to enable plaintiffs? experts to have a single ?pristine? data set to use in the case, as plaintiffs were not entitled to receive ESI in their preferred format nor were defendants required to create a document for production; however, because it struck the court that it would be in both parties? interests to have the data plaintiffs sought and for both parties? experts to work from the same data set, the court suggested that the parties cooperate in hiring a neutral third party to conduct the comparison, which would provide plaintiffs, to some extent, the data sought while at the same time prevent an attack on the data?s integrity

Nature of Case: Class action brought by auto body companies alleging that defendants violated the Connecticut Unfair Trade Practices Act

Electronic Data Involved: Estimating data from two sources

EEOC v. SVT, LLC, No. 2:13-CV-245-RLM-PRC, 2014 WL 2177796 (N.D. Ind. May 22, 2014)

Key Insight: Where defendant utilized third party?s hiring program to allow applicants to apply online, etc. and had limited access to the system?s data (i.e., limitations on the format and content of reports from the system), the court found that the data that could be regularly accessed by the defendant per its contract with the third party was accessible and subject to production and that data housed by the third party and not readily available to the defendant was ?not reasonably accessible . . . because of both undue burden and cost? and ordered that if the EEOC wanted the inaccessible data, it would have to pay for it

Nature of Case: Employment litigation

Electronic Data Involved: ESI (Kronos)

Oleksy v. Gen. Elec. Co., No. 6 C 1245, 2014 WL 3820352 (N.D. Ill. Aug. 1, 2014)

Key Insight: Where, at time complaint was filed, defendant should have reasonably foreseen that files created by its accused process would be material to the parties’ claims, yet defendant continued to overwrite its files per its standard practice instead of saving the files either manually or automatically, court denied plaintiff’s request for adverse inference instruction but ordered defendant to reconstitute or recreate three complete sequences of old computer code at its own cost

Nature of Case: Patent infringement

Electronic Data Involved: Computer code

Copyright © 2025, K&L Gates LLP. All Rights Reserved.