Post Process

Everything to do with E-discovery & ESI

Hard drive inspection requests during discovery

Posted by rjbiii on November 13, 2007

Law.com brings us an article on the protocols adopted by courts with respect to inspecting a party’s hard drive during discovery. As frequent readers of this page know, document production is typically left up to each party in a dispute. Thus, allowing one party (or its forenisc expert) to inspect another’s computer represents a bit of a departure from traditional practice:

As a federal district court judge recently observed, a computer itself is not evidence in most cases, but merely the instrument for creating evidence (like a typewriter) or the means of storing it (like a file cabinet).

Accordingly, today’s litigants routinely seek access to opponent’s computer hard drive to search for discoverable evidence, especially when the opposing party may not be forthcoming about deleted or transferred files.

Hard drive inspections, therefore, are likely to occur when one party is seen to be less than forthcoming with its productions than their obligations require.

Generally speaking, courts allow imaging of an opponent’s computer hard drive in situations involving an adversary’s unsatisfactory document production or a finding that a hard drive search would yield deleted items. For example, in Playboy Enters. v. Welles, 60 F.Supp.2d at 1050, rev’d on other grounds, Playboy Enters. v. Welles, 279 F.3d 796 (9th Cir. 2002), a trademark infringement case, the plaintiff’s discovery request included permission to have access to the defendant’s hard drive for the purpose of recovering deleted e-mails that allegedly were systematically erased after litigation commenced and that may have been highly relevant. In granting the defendant’s request, the court found that the need for the requested information outweighed the burden to the defendant. Some courts will issue discovery orders for expedited discovery at the outset of litigation when the subject matter of the dispute involves trade secrets or other sensitive information that can be easily erased or destroyed.

The article notes that often third party vendors are used to accomplish the inspection to prevent the perception (real or imagined) of the presence of bias or abuse in the process. The article also mentions that even when allowing these inspections, protections courts often establish protections against undue burdens or disclosure of privileged or private data. Remember in our last post, the court in Lakeside School set up a screening process so that an employee’s privileged “web based” e-mails were not disclosed to the school, despite the fact that the school owned the hard drive at issue, and the employee had signed an agreement allowing the school to inspect the computer.

Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

 
%d bloggers like this: