Tagged: Destruction

How a Case Can Crash and Burn: Why a Litigant Should Not Set Afire a Computer After It Crashes (Preservation 101) 0

How a Case Can Crash and Burn: Why a Litigant Should Not Set Afire a Computer After It Crashes (Preservation 101)

In Evans v. Mobile County Health Department, 2012 U.S. Dist. LEXIS 8530 (S.D. Ala. Jan. 24, 2012) , a magistrate judge sitting in the Southern District of Alabama (Southern Division) was recently faced with the question of whether plaintiff’s intentional burning of a personal computer, which contained discoverable ESI, was worthy of an imposition of sanctions.The defendant, Mobile County Health Department, filed motions to compel discovery and to impose sanctions stemming from plaintiff’s alleged spoliation of critical information and repeated failures to produce discoverable documents and ESI. Based upon the facts and arguments presented to the magistrate, most notably plaintiff Evans’ admission that she destroyed and replaced her personal computer, the Court granted defendant’s motions.

New York Appellate Court Refuses to Amend Confidentiality Order to Address Runaway Data Issue 0

New York Appellate Court Refuses to Amend Confidentiality Order to Address Runaway Data Issue

Confidentiality agreements and protective orders are a commonplace, yet indispensable, feature of modern commercial litigation. These agreements are typically the end result of a series of negotiations between counsel specifically designed to balance the seemingly incompatible objectives of ensuring ready access to vital evidence and ensuring that sensitive information, such as trade secrets, remains carefully shrouded from the public eye and industry competitors. The importance of ensuring that sensitive information remains confidential vis-à-vis the world at large during a lawsuit cannot be overstated. Confidentiality agreements often provide detailed provisions addressing who may access information and how information may be used. Once the litigation has concluded, parties are often faced with the sometimes challenging task of ensuring that all confidential information is either returned to the producing party or destroyed. Without proper planning, it may be difficult to put the proverbial genie back into the bottle.