Skip to content

Menu

Greenberg Traurig, LLP logo
HomeAboutContributorsContact
Search
Close

eDiscovery Watch

Electronic Everything: ESI, eDiscovery, and eLaw

Forensic Examination of Computers in Discovery Requires Showing of Improper Conduct or Good Cause

Programming code abstract technology background of software developer and Computer script
By Kathryn C. Cole on January 31, 2023
Posted in Forensic Examinations

“Forensic examinations of computers and cell phones are generally considered a drastic discovery measure” because they are intrusive in nature. Stewart v First Transit Inc., Civ No. 18-3768, (ED PA Sept 3, 2019). Indeed, the inspecting or testing of electronic information systems implicate issues of confidentiality and privacy (see, e.g., Rule 34(a) Advisory Committee Note to 2006 Amendment [“[t]he addition of testing …to rule 34(a) with regard to … [ESI] is not meant to create a routine right of direct access to a parties electronic information system, although such access might be justified in some circumstances.  Courts should guard again undue intrusiveness resulting from inspecting…such systems.”]).  And so, before a motion for forensic testing is granted, a Court must be convinced there has been some “improper conduct” on the part of the responding party or other “good cause to order computer imaging … or similar forensic examinations.”  Case law has shown that “improper conduct” or “good cause” justifying forensic imaging includes, for example when there are “discrepancies or inconsistencies in the responding party’s discovery responses” (Schreiber v Friedman, No. 15-cv-6861 [EDNY August 15, 2017]) or here a “litigant has tampered with the computer or hidden relevant materials that are the subject of Court orders” (id. [collecting cases]).

Against this backdrop, it comes as no surprise that the Magistrate Judge for the Eastern District of New York denied Defendant AmGuard Insurance Company’s motion to compel plaintiff to produce – for forensic examination – the cell phone that recorded videos plaintiff already produced in discovery (Aminov v. Berkshire Hathaway Guard Insurance Cos., et. al., [21-cv-479 [DG][SJB]).  Indeed, Magistrate Judge Bulsara concluded the motion was based upon layers of “a series of speculation upon a series of flawed assumptions and misguided understandings” and lacked any justification to support a forensic examination.  Am Guard’s sole basis for demanding a forensic examination was its own counsel’s analysis, using a free web-based metadata tool, Metadata2Go, wherein counsel believed the metadata for the produced videos had been altered.  Curiously, Defendant did not assert anything about the tool’s reliability; rather, Defendant’s assumptions on predicated upon “the less-than-unequivocal statement produced by the website” when used to analyze the Plaintiff’s video: “Metadata could have been changed or deleted in the past.” According to the Court, “this is hardly the kind of analysis or support that provides a reasonable basis either to conclude that there was an alteration of metadata or to warrant forensic examinations.”

In addition to the “uncertainty” in the Metadata2Go statement, which is a disclaimer generated for every file uploaded to the website as a means of liability protection for the company, the Court concluded, “the tool itself is not one designed to show alteration of metadata, but instead one that determines whether metadata exists.” Meaning, the tool allows one to understand or access metadata stored in one’s files; it does not allow one to infer metadata has been altered or deleted.  Finally, the Court determined the experts with whom Defendant consulted failed to offer any opinion that plaintiff’s files have missing or altered data.  And so, “there is no evidence of spoliation or alteration,” and therefore “no cause to require forensic examination of the cell phone or the speculation that additional metadata may exist or …was altered.”

The Aminov opinion is a good reminder that unlimited examination of phones or other electronic information systems is not often granted.  Indeed, parties seeking such access must provide sufficient justification to overcome the consideration confidentiality and privacy issues attendant to those devices especially where, as here, the underlying data has been produced already.  And, as the decisional law makes plain, the “sufficient justification” needed to secure such assess is substantially more than conclusory assertions, assumptions or speculation.  Rather, to prevail on a motion for a forensic examination, one must demonstrate “specific, concrete evidence of concealment, destruction of evidence, or failure to preserve documents and information.” (Sophia & Chloe, Inc., v. Brighton Collectibles Inc., No. 12cv2472 [SD Cal September 13, 2013])

Tags: eastern district of ny, forensic, metadata
Print:
Email this postTweet this postLike this postShare this post on LinkedIn
Photo of Kathryn C. Cole Kathryn C. Cole

Kathryn C. Cole represents large and small businesses, financial institutions, and individuals in virtually all aspects of federal and state court commercial litigation, arbitration and mediation, and before federal agencies and regulatory bodies. In addition to advising on electronic data and cyber-related issues…

Kathryn C. Cole represents large and small businesses, financial institutions, and individuals in virtually all aspects of federal and state court commercial litigation, arbitration and mediation, and before federal agencies and regulatory bodies. In addition to advising on electronic data and cyber-related issues, Katy has considerable experience in all areas of complex litigation including contract claims, product liability claims, tort claims, consumer class-action claims and securities class-action claims.

Read more about Kathryn C. ColeKaty's Linkedin Profile
Show more Show less

Stay Connected

RSS Facebook LinkedIn Twitter

Subscribe By Email

Topics

Blog Authors Show/Hide

  • Janis Clements
  • Philip H. Cohen
  • Kathryn C. Cole
  • Greenberg Traurig, LLP
  • Jeffrey W. Greene
  • Greenberg Traurig, LLP
  • Greenberg Traurig, LLP
  • Greenberg Traurig, LLP
  • Gary Lombardo
  • John C. Molluzzo
  • Daniell K. Newman
  • Jessica A. Ryan
  • Jenna Scancarello
  • Grace Stewart
  • LexBlog Success Team
  • Beth K. Toberman
GT LAW BLOGS

Archives

Recent Upates

  • One District Court Observes There are Five Fundamental Steps When Dealing with eDiscovery
  • “Cataclysmic” Discovery Failures Result in Monetary Sanctions Imposed on Both Counsel and Defendant
  • Lawyers Have a Duty of Competency When Handling and Producing Electronically Stored Information
  • Forensic Examination of Computers in Discovery Requires Showing of Improper Conduct or Good Cause
  • What is Document Processing? And What Factors Should You Consider When Processing Documents?

About

Greenberg Traurig’s eDiscovery & eRetention Practice helps companies understand what information is within their control and how to manage information to reduce litigation risk.

Read More....

eDiscovery Watch

Greenberg Traurig, LLP logo
RSS Facebook LinkedIn Twitter
Privacy PolicyDisclaimer

About Greenberg Traurig

Greenberg Traurig, LLP has more than 2650 attorneys in 44 locations in the United States, Europe, Latin America, Asia, and the Middle East. The firm is a 2022 BTI “Highly Recommended Law Firm” for superior client service and is consistently among the top firms on the Am Law Global 100 and NLJ 250. Greenberg Traurig is Mansfield Rule 5.0 Certified Plus by The Diversity Lab and is recognized for powering its U.S. offices with 100% renewable energy as certified by the Center for Resource Solutions Green-e® Energy as a member of the U.S. EPA’s Green Partnership Program. The firm is known for its philanthropic giving, innovation, diversity, and pro bono. Web: www.gtlaw.com.

Copyright © 2023, Greenberg Traurig, LLP. All Rights Reserved.
Law blog design & platform by LexBlog LexBlog Logo