Tagged: Case Summaries

E-Discovery Sanctions May Be Entered and Have Consequences Long After Litigation Concludes

Even after a particular case has concluded, the risk of sanctions arising from e-discovery violations persists. Green v. Blitz U.S.A. was one of many products liability suits alleging injuries resulting from the defendant’s failure to equip its gas can with a “flame arrester.” Over a year after the conclusion of the trial and entry of final judgment in Green, the court entered monetary and non-monetary sanctions against the defendant for its failure to adequately preserve and identify potentially relevant documents. Because the matter had closed, many of the non-monetary sanctions under Rule 37(b)(2) were not available. Accordingly, the court fashioned a creative non-monetary sanction requiring the defendant (1) to provide the sanctions opinion to all plaintiffs in any litigation against the defendant for the prior 2 years; and (2) to file the opinion with any court in any new lawsuit in which the defendant is a party for 5 years following entry of the opinion.

DuPont v. Kolon: A Lesson In How To Avoid Sanctions For Spoliation Of Evidence

Two recent decisions in the same case illustrate that, when it comes to imposing sanctions for spoliation of evidence, what matters is not simply whether you’ve intentionally deleted relevant evidence, but how you go about deleting it, and what the record reflects about your intentions. Although both the plaintiff and the defendant in E.I. du Pont De Nemours and Co. v. Kolon Industries, Inc., Civil Action No. 3:09cv58, demonstrated that the other intentionally destroyed relevant evidence, as is detailed below, the Court sanctioned only defendant Kolon Industries, Inc. (“Kolon”) based on its manifest bad faith (read the decision here). As is discussed in an earlier post on Gibbons’ E-Discovery Law Alert (which you can read here), plaintiff E.I. du Pont de Nemours and Company (“DuPont”) escaped a similar fate based on its demonstrable good faith. In short, this case teaches that the intentional deletion of relevant evidence does not per se lead to sanctions. Rather, the parties’ conduct — or misconduct, as the case may be — must be judged contextually.

Knockout Punch: Claims of Futility & Computer Crashes Not Enough to Prevent Key Word Searches Requested by Former Champ

Sports. Steroids. E-Discovery? Former middleweight champion Shane Mosley asserted claims of defamation against defendant Victor Conte, owner of Bay Area Laboratory Cooperative (BALCO), regarding Conte’s statements that Mosely allegedly used illegal steroids in his championship bout with Oscar De La Hoya. Mosely requested that a computer forensics expert be permitted to conduct key word searches on defendant’s computer hard drives and equipment. Defendant objected, claiming that all relevant documents had been disclosed and that a computer search would be futile. The New York Supreme Court disagreed. Mosley v. Conte, No. 110623/2008, 2010 N.Y. Misc. (Sup. Ct. New York Co. Aug. 17, 2010).

Third Circuit Considers Privacy Interests in Electronically Collected Information and Whether Such Information is Voluntarily Publicized By User of Electronic Communication Devices

In September 2010, the Third Circuit Court of Appeals became the first federal appeals court to rule on the question of whether the government is required to establish probable cause to obtain cell site location information (“CSLI”) from a cell phone provider. See In the Matter of the Application of the U.S. for an Order Directing a Provider of Electronic Communication Service to Disclose Records to the Government, 620 F.3d 304 (3d Cir. 2010). CSLI includes historical information that is collected by cell towers during cell phone calls, which can later be used to render some opinions as to the location of the cell phone during those calls.

Blind CCs and “Replies to All” – An Email Trap for the Unwary Attorney

Some traditional practices from the paper era don’t translate well to the world of e-communication. And some are downright dangerous. Back in the day, attorneys would often “bcc” their clients on correspondence to adversaries, an efficient and relatively safe means of keeping the client apprised. No longer in the age of email, where the ability to instantly respond invites quick, at times reactionary, replies that can easily fall into the wrong hands, with potentially devastating consequences.

You Want Discovery of an Adversary’s Computer? Better Have a Good Reason.

That was the lesson of a recent case out of the New York State Supreme Court, Nassau County, where the court refused to order a forensic examination of a plaintiff’s personal computer hard drive. DeRiggi v. Krischen arose out of the death of a woman during a routine surgical procedure to treat lower back pain. Plaintiffs alleged that her death was the result of perforation of the left common iliac vein by a “Spine Jet HydroDisectomy” system utilized during the procedure. Plaintiffs further alleged, among other things, that the manufacturer of the system misrepresented the risks affiliated with its use, and one of the plaintiffs, the decedent’s husband, testified at deposition that he and his wife visited the manufacturer’s website prior to the surgery and read that the procedure “felt like a bee sting and nothing more.”

Internet File Sharing Constitutes Distribution in Child Porn Case

New Jersey’s Appellate Division recently held in State v. Lyons, __ N.J. Super. __, 2010 N.J. Super. LEXIS 227 (App. Div. Nov. 30, 2010) that Defendant Richard Lyons’ placement of child pornography in a shared online folder constituted an offer and distribution of child pornography in violation of N.J.S.A. 2C:24-4b(5)(a). Lyons’ computers contained videos of children engaged in sexual activities, including one that a detective discovered and downloaded when he accessed a shared folder on Gnutella, a peer-to-peer file sharing network, accessible via LimeWire software program.

“Cached” Web Files May Serve as Evidence in Child Pornography Case

In a prosecution for promoting and possessing computer images of child pornography, a Brooklyn appellate panel upheld the conviction of defendant and determined that temporary files automatically “cached” by an internet browser may serve as evidence of promoting and possessing child pornography. People v. Kent, ___ A.D.3d ___, 2010 N.Y. Slip. Op. 7364, 2010 N.Y. App. Div. LEXIS 7405 (App. Div. 2d Dept. Oct. 12, 2010). The defendant, a professor of public administration at a Dutchess County college, was found guilty of 134 counts of possession of a sexual performance and 2 counts of promotion related to his use of an office computer.