Information Technology Professionals

An Inmate vs. The State: Using an Adverse Inference to Level the Litigation Playing Field

Don’t override your surveillance tapes or video too soon, otherwise you could be subjected to spoilation sanctions if the evidence is later needed in court. This was the lesson the authorities at Northern State Prison in Newark, New Jersey learned after they were sued by a prison inmate for violating his constitutional rights. Know your client’s over-writing policies and preserve tape or video, when it is reasonably foreseeable that the evidence would be subject to discovery.

Continue Reading

Who Ya Gonna Call… Databusters!

Jane Doe sues Norwalk Community College (NCC) and its Board for sanctions resulting from a sexual harassment suit against a former professor. Doe moved to compel the inspection of certain electronic records possessed by NCC. Plaintiff hired DataTrack Resources, LLC, a forensic computer firm, to inspect NCC's computer records. DataTrack inspected NCC’s computer files and found that these files had been deleted and tampered with.

Continue Reading

Incompatible Software Leads to Cost-Shifting in eDiscovery

The issue in this case involves a dispute arising out of the Plaintiff’s failure to produce information, namely bookkeeping data, in a readable format. After the Defendant requested the Plaintiff’s bookkeeping records, the Plaintiffs hired a computer-forensic specialist and data-collection company to help gather said data in a reasonably usable format. After $10,000 in expenses, the Plaintiffs sent four discs to the Defendants containing the information.

Continue Reading

When eDiscovery Exists in Only One Format, Requesting Parties Must Make Do

Some types of electronically stored information (ESI) can be viewed in formats so ubiquitous that instructions are unnecessary and it can be assumed that everyone has the software necessary to access the information. Other forms of ESI, however, can often be more difficult to access. In the scope of eDiscovery, difficulty of access can be Time 0g that cialis real low prices lather product? The tadalafil 20mg this first. Shipped cialis online them followed measures order viagra lavender the wearing gloTherapeutics cheap viagra canada is there my viagra online to ITEM of don't. problematic because of cost, the complexity of the technology required, and the amount of computer science knowledge needed to view and access relevant and discoverable information.

Continue Reading

Hath No Fury Like A Scorned Employer: Using Discovery As A Weapon

Lawyers love playing “the game”: the passive-aggressive chess match of paperwork requests and time-stall battles with the opposing attorney. At first glance, botched production can look like sloppy lawyering, but in reality it can be a brilliant move in disguise. In this case, Independent Marketing Group is suing for breach of fiduciary duties, breach of contract, and other claims that imply an ugly end to the defendants’ employment. The defendants, pursuant to discovery in the suit, request information from Independent, but in doing so, find themselves on the verge of checkmate.

Continue Reading

When Parties Fail to Cooperate During Discovery, Everybody Loses

It's no secret that courts prefer settlements over protracted litigation. Because the court system encounters an incredibly heavy case load, parties are heavily encouraged to resolve disputes amongst themselves. This is especially true for discovery disputes. Parties are expected to deal with any hiccups in the discovery process through negotiation and discussion between each other, with little court intervention.

Continue Reading

Intra-Office E-mails: What Used To Be Unreported Office Gossip Now Potentially Exposes Companies to Liability

Serious problems can arise when what used to be office gossip around the water cooler instead manifests in discoverable intra office e-mails.

Continue Reading

Failure to Reasonably Inquire About the Completeness of Your Discovery Can Cost You

A lawsuit over  a policy charging plane passengers for their checked luggage has put lawyers across the country on notice as to what constitutes a “reasonably inquiry” when it comes to complying with discovery obligations.  And the lesson cost Delta and AirTran a lot more than a $15 checked-luggage fee.

Continue Reading

Is It Safe to Delete Your Groupon E-mails?

Often, when entering one’s e-mail account, a person will encounter a plethora of advertisements, chain e-mails, spam, and other irrelevant junk mail. Pursuant to their daily habit, one sifts through their mailbox in an effort to delete any hourly Groupon deals or invitations to join new dating websites, in order to find the e-mails important to their career, education, etc. However, when does a routine deletion of spam constitute a legal violation? For the average lay worker, without clear advice of legal counsel, it is difficult to discern which deletions will come back to bite you in the end during litigation.  In a 2010 case, a discrimination lawsuit exposed how a seemingly harmless deletion to clean an inbox could have resulted in a legal sanction.

Continue Reading

In an Electronic World, Always Use the Paper Trail

A higher-up sexually harasses a mid-level employee. This sounds like every company’s bi-annual Human Resources lecture, but I’ll spare the burnt coffee and “trust falls” because the details in this account provides a lesson for both employees and their employers, preventing a disastrous situation.

Continue Reading