Robinett v. CLA Incorporated et al

Filing 15

AGREED PROTECTIVE ORDER Regarding Forensic Examination of th Plaintiff's Computer. Signed by Judge James M. Moody on 2/14/12. (kpr)

Download PDF
IN THE UNITED STATES DISTRICT COURT EASTERN DISTRICT OF ARKANSAS WESTERN DIVISION SIRINA ROBINETT VS. PLAINTIFF NO. 4: ll-CV-670JMM c.L.A. INCORPORATED, d/b/a SUBWAY/PIZZA PRO; ALAN COVINGTON and MICHELLE COVINGTON, each Individually and d/b/a SUBWAY/PIZZA PRO DEFENDANTS AGREED PROTECTIVE ORDER REGARDING FORENSIC EXAMINAITON OF THE PLAINTIFF'S COMPUTER BACKGROUND The Plaintiff, Sirina Robinett, brings the present action against the Defendants, c.L.A. Incorporated, d/b/a Subway/Pizza Pro and Alan Covington and Michelle Covington, individually and d/b/a Subway/Pizza Pro, alleging violations of the Fair Labor Standards Act, 29 U.S.c. § 201, et seq, and the Arkansas Minimum Wage Act. The Defendants employed the Plaintiff in the Defendants' restaurant business, and the Plaintiff contends that the Defendants required her to work off the clock without compensation. This contention forms the basis for the Plaintiffs Complaint. One of the Plaintiffs specific contentions is that the Defendants required her to watch real-time video feeds over the internet from one of the Defendants' restaurants while the Plaintiff was at home and off the clock. The Plaintiff contends that she watched the video on her personal laptop computer (Acer brand id # as5630-6288) (the "computer") and was able to do so because she loaded a 1 program on the computer that was made available for download by the surveillance system vendor for this purpose. The Plaintiff further contends that the viewing software retains information regarding log-in dates, times, and durations of log-in status; there may be other information on the computer as well (such as browser cache files) that the parties may contend is relevant to their claims and defenses (the "data"). The surveillance company has no information regarding the Plaintiff's alleged use of the viewing software. The Plaintiff, through her counsel, represents that the computer can be turned on to display the viewing program icon but that the program is no longer boatable so that the viewing software cannot be accessed. The Defendants want to verify, if possible, the existence of the viewing software on the computer and to determine if the data is recoverable. The Defendants have requested that the Plaintiff make the computer available for forensic imaging of the computer's hard drive, and the Plaintiff has agreed to such an examination at the Defendants' expense. For the foregoing reasons, the parties agree to the entry of this protective order and to the terms stated herein. LEGAL STANDARD - PROTECTIVE ORDER Under Fed R. Civ. Proc. 26(c), the Court may Issue protective orders during discovery, including an order "forbidding the disclosure or discovery," "specifying the terms, including time and place, for the disclosure or discovery," "forbidding inquiry into certain matters, or limiting the scope of disclosure or discovery to certain matters." Fed. R. Civ. P. 26(c). The Supreme Court has interpreted Rule 26(c) as conferring "broad discretion on the trial court to decide when a protective order is appropriate and what degree of protection is required." Seattle Times Co. v. Rhinehart, 467 U.S. 20, 36, 104 S. Ct. 2199 (1984). The data is potentially relevant in this case, and the Defendants are entitled 2 to a fair opportunity to discover the existence and recoverability of the data. The Plaintiff, in turn, is entitled to protection of her personal and confidential information on the computer that is not related to or relevant as evidence to the matters alleged in her Complaint in order to avoid unwarranted disclosure of such information. Therefore, the Court, in consideration of the premises contained herein concludes and orders as follows: 1. A computer forensic expert selected by the Defendants (the "expert") shall execute the confidentiality agreement attached hereto as Exhibit "A" and shall abide by this Protective Order. 2. The Plaintiff shall make the computer available to the expert at its place of business by overnight shipment at the Defendants' expense. The Defendants' undersigned counsel shall provide the shipping address to the Plaintiff's counsel. The expert will return the computer to the Plaintiff's counsel promptly after the hard drive has been imaged and is no longer necessary for recovery of the data. 3. The expert may not remove the computer from its premises. Moreover, only the expert and the expert's employees assigned to this project are authorized by this order to inspect or otherwise handle the computer. Neither the Defendants nor the Defendants' counsel will handle the computer. The expert will maintain all programs, files, images, documents, and information on the computer, including the data ("protected materials") in the strictest confidence and shall maintain a copy of the mirror image of the computer's hard drive and the protected materials until 60 days after the conclusion of this litigation. Upon notice to the expert that the litigation is concluded, the expert shall destroy the mirror images, the protected materials, and the media containing the same, unless the Plaintiff requests that these items be transferred 3 to her, at her expense. 4. Promptly after imaging the computer, the expert shall provide the Defendants' counsel with a report describing the computer and the contents recovered from the hard drive. The Defendants' counsel, but not the Defendants or their employees, may discuss the contents of the recovered hard drive with the expert in order to ascertain if data exists in a recoverable form and, if so, how best to produce the data for use in this litigation. U1timately, the expert shall provide the relevant data to the Defendants' counsel in a reasonably convenient and searchable form along with, to the extent possible, the information showing when any files were created, accessed, copied, or deleted, and the information about the deletion and the contents of deleted files that could not be recovered. 5. The Defendants' counsel shall provide to the Plaintiff's counsel the report described above as well as the recovered data. The Defendants' counsel shall disclose to the Defendants or their employees and agents only that data which counsel stipulate pertains to the present case. If the parties cannot agree on the scope of relevant data, either party may submit the data to the Court for in camera inspection to determine what may and may not be disclosed. The stipulation, if any, is not to be construed as a stipulation of relevance or admissibility of the data, and all such objections are reserved by all parties. 6. After the Defendants' counsel provided the Plaintiff's counsel with the report and data, as described above, the Plaintiff may solicit additional information from the expert regarding the data at her expense. Because the expert is the Defendants' expert and a potential witness for the Defendant, the Plaintiff or the Plaintiffs counsel cannot communicate directly with the expert except with permission of the Defendants' counselor in the presence of the Defendants' counsel. 4 7. In the event that the computer is lost or damaged during transport to or from the expert as a part of this forensic evaluation or is otherwise incapable of forensic examination and recovery, then no party to this action can argue any inference against the other party based upon the loss of the computer or the inability to recover the data. Loss of or damage to the computer during transit or during the forensic examination does not prevent the Plaintiff from testifying as to the contents of the computer or her use of it based on her personal knowledge. The parties agree that the following stipulation can be read to the jury in the event that the computer is lost or damaged in the course of the transportation or examination of the computer, to the extent that the computer will no longer boot to the extent that it did prior to the examination: Ladies and gentlemen of the Jury, the Plaintiff contends that she used her personal laptop computer to perform off-the-clock work for her employer. She contends that she used programs on the computer for this purpose called "Multicam 3.40" and "Remote Viewlog 3.40". Because the computer has been damaged through no fault of either party, it is not available for use here in court. Therefore, the parties stipulated that the programs, "Multi cam 3.40" and "Remote Viewlog 3.40", were on the computer before it was damaged but that the programs were inoperable at the time the computer was damaged. This stipulation is not an admission by the Defendants that the Plaintiff used the computer to perform work and should not be considered by you as evidence that the Plaintiff used the computer for work. The Plaintiff has the burden of proving the amount of work she performed for the Defendants without compensation. 5 Notwithstanding the foregoing stipulation, the Defendants reserve all objections to introduction of evidence about, related to, or recovered from the computer. 8. Notwithstanding the forensic evaluation contemplated by this Agreed Protective Order, the burden remains with the Plaintiff to prove that she used the viewing software and the amount of time she claims to be uncompensated work by the use of the software. Loss of or damage to the computer or the inability to recover data from the computer does not alter the Plaintiff's burden of proof. 9. By initiating this forensic examination of the computer, the Defendants do not waive any contention or argument regarding the Plaintiff's alleged use of the viewing software, including the Plaintiff's contention that the viewing software was not useable at the time the forensic examination was requested by the Defendants or before the computer were damaged in the course of the forensic examination. IT IS SO ORDERED. ~ VVL.o=£3s VV\ esM:Moody United States District Judge Date: 6 _Y'.f--_"_~-----,-/_\_L _____ Agreed: FUQUA CAMPBELL, PA. Attorneys at Law 425 West Capitol Avenue, Suite 400 Little Rock, Arkansas 72201 (501) 374-0200 s for the Defendants I By: David M. Fuqua ArkBar~o. 80048 E-mail: dfuqua@fc-Iav;=yers.com SANFORD LAW FIRM, PLLC ONE FINANCIAL CENTER 650 S SHACKLEFORD STE 400 LITTLE ROCK., Arkansas 72211 PHONE: (SOl) 221-0088 FACSIMILE: (888) 787-2040 ~.4!'!' ., . iX: . / . BY:Jo~rd Ark.B~o.2001037 josh@sanfordlawfirm.com Attorney for the Plaintiff 7 CONFIDENTIALITI AGREEMENT OF THE EXPERT The undersigned individual, described in the Court's protective order as the "expert" states that he has read the order and, in consideration of his being hire for a fee to conduct a forensic examination of the computer agrees: 1. The expert will abide by the terms of the protective order in all of its particulars and agrees to submit himself to the jurisdiction of the Court for purposes of enforcement of the protective order and this confidentiality agreement. 2. The expert will keep the contents of the computer hard drive confidential and will not disclose or discuss the information recovered from the hard drive with anyone except as provided by the terms of the protective order. Name: _ _ _ _ _ _ _ _ _ __ Title: _ _ _ _ _ _ _ _ _ __ Company: _ _ _ _ _ _ _ __ 8

Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.


Why Is My Information Online?