Olney v. Job.Com, Inc.

Filing 189

ORDER on Defendants' Motions for Sanctions 157 , 158 . Defendants' motion for a spoliation sanction of dismissal is DENIED; Defendants' alternative motion for a spoliation sanction in the form of an adverse jury inference is GRANTED . Defendants' request for monetary sanctions is also GRANTED, and the parties shall submit their billing statements and cost statements in support of their request within 20 days from the date of this order. Order signed by Magistrate Judge Sheila K. Oberto on 10/24/2014. (Timken, A)

Download PDF
1 2 3 4 5 6 7 8 UNITED STATES DISTRICT COURT 9 EASTERN DISTRICT OF CALIFORNIA 10 PETER OLNEY, et al. 11 12 13 14 15 Case No. 1:12-cv-01724-LJO-SKO Plaintiffs, ORDER GRANTING DEFENDANTS' MOTIONS FOR SANCTIONS v. JOB.COM, et al., (Doc. Nos. 157, 158) Defendants. _____________________________________/ 16 17 18 19 I. INTRODUCTION On July 26, 2014, Defendants Job.com, Inc. ("Job.com") and Windy City Call Center, LLC 20 ("Windy City") (collectively, "Defendants") filed motions for sanctions against Plaintiff for 21 spoliation of evidence during the course of discovery. (Docs. 157, 158.) Plaintiff filed briefs in 22 opposition to both motions (Docs. 164, 165), and Defendants filed reply briefs on August 6, 2014. 23 (Docs. 168, 169.) Plaintiff filed objections to each reply brief on August 7, 2014. (Docs. 170, 24 171.) A hearing was held on September 24, 2014; Jason Ibey, Esq., and Robert Hyde, Esq., 25 appeared on behalf of Plaintiff; Hugh McCabe, Esq., Dan Bitterlin, Esq., appeared on behalf of 26 Job.com; Fred Puglisi, Esq., appeared on behalf of Windy City. 27 For the reasons set forth below, Defendants' motions for spoliation sanctions in the form of 28 dismissal is DENIED; Defendants' alternative motion for an adverse jury inference is GRANTED; 1 and Defendants' motion for monetary sanctions is GRANTED. 2 II. BACKGROUND 3 A. Factual Background1 4 On August 12, 2012, Plaintiff registered his resume with a website called "Resume-Now" 5 as part of his efforts to seek new employment. Resume-Now is owned and operated by 6 LiveCareer, Inc. ("LiveCareer"). Registration with Resume-Now generally consists of three steps. 7 First, the registrant is prompted to create or upload a new resume. Second, the registrant is asked 8 for information regarding the job he or she seeks. Third, the registrant is asked to enter and 9 confirm his or her email address. According to Job.com, at this point the registrant also (1) is 10 given an opportunity to review Resume-Now's terms of use and privacy policy; (2) is asked to 11 acknowledge that he or she has read and agrees to the terms of use and privacy policy; and (3) is 12 allowed to uncheck a box that reads: "[R]ecive . . . free information on managing my career." 13 On August 13, 2012, Plaintiff used Resume-Now's resume posting service, a service that is 14 offered only to subscribing members. To initiate the resume posting service, Plaintiff clicked a 15 button labeled: "Post Resume. Instantly post your resume to 90+ job boards." Plaintiff was then 16 directed to the resume posting splash page, where Plaintiff was given the option to choose from 17 various categories of job-search websites where he wished his resume to be posted. Plaintiff chose 18 to post his resume on "General Sites." Upon choosing "General Sites," Plaintiff was directed to a 19 pop-up page displaying a list of additional job sites where his resume would be sent. "Job.com" 20 was one of the websites listed in the pop-up page. 21 As part of this process, Plaintiff was required to provide additional contact information. 22 The website reads: "Enter your mailing address and current phone [number] so that recruiters and 23 potential employers can contact you." Plaintiff entered his cell phone number on this page. 24 Plaintiff was then given another chance to review Resume-Now's terms of use and privacy policy. 25 Plaintiff reviewed the policy and completed the resume posting process by clicking "Post." 26 27 28 1 This background section is taken from the district court's June 19, 2014, order on the third-parties' motions for judgment on the pleadings. (Doc. 146.) 2 1 On August 17, 2012, Plaintiff registered an account with Job.com via Resume-Now's 2 website. The registration process consisted of populating fields on five pages, one of which was 3 the "Profile" page. On the Profile page, Plaintiff's cell phone number was entered in the "Home 4 Phone" field. Job.com asserts that Plaintiff also left a box checked that read "[B]y keeping the box 5 above checked, I'd like to be contacted by phone to discuss educational opportunities to help 6 prepare me for my dream career." Although the box was checked by default, a registrant may 7 uncheck the box if he or she wishes to opt out of the service. Plaintiff claims that he never visited 8 Job.com, never saw the opt-out box, and therefore could not have checked it nor left it unchecked. 9 Job.com forwarded Plaintiff's profile, including his phone number, to a third party, Windy 10 City. Windy City operates the Windy City Call Center, which is used to provide "education leads" 11 to higher learning institutions. Job.com, through Windy City, placed multiple calls a day to 12 Plaintiff on August 17, 2012, through September 4, 2012, for the purpose of selling Job.com and 13 Windy City's or a third party's services. 14 Plaintiff filed this suit on October 19, 2012, on behalf of himself and all other similarly 15 situated individuals. According to the currently operative Second Amended Complaint ("SAC"), 16 Plaintiff seeks statutory damages and injunctive relief against Job.com and Windy City for 17 negligent willful violations of the Telephone Consumer Protection Act ("TCPA"). 18 B. Discovery and Procedural Background 19 1. 20 On October 4, 2013, Job.com deposed Plaintiff and asked him about his job search and Plaintiff's Deposition 21 job-related websites he visited at or around the time he paid to have his information provided to 22 Job.com. Plaintiff was asked to identify the computer he used to perform his job search; Plaintiff 23 indicated his home computer was used. Plaintiff was instructed not to "take any steps to delete 24 any Web browsing history or any information from that computer and we may be requesting 25 access to that through discovery." 26 2. 27 On October 11, 2013, Job.com served Plaintiff with a second set of Request for Production Job.com's Request for Production of Tangible Things 28 of Tangible things which sought production of two items: (1) the cell phone Plaintiff alleges he 3 1 was called on in violation of the TCPA; and (2) the home computer Plaintiff testified at his 2 deposition he used to conduct his job search. Regarding Plaintiff's home computer, Job.com 3 specifically indicated its examination would include "internet history, cookies, and temporary files 4 related to Plaintiff's access and visitation of job-related websites" as well as "local electronic files 5 pertaining to any and all emails related to Plaintiff's job search and access of job-related websites, 6 including any attachments to those emails, and any and all resumes or cover letters." (Doc. 158-7 7 Exhibit B.) On November 19, 2013, Plaintiff objected to Job.com's request for production. The 8 parties engaged in a lengthy meet and confer process, and ultimately requested an informal 9 discovery dispute conference with the Court, which was held on January 9, 2014. 10 3. 11 On January 10, 2014, following an informal telephonic conference with the Court, Plaintiff Court Orders Plaintiff To Produce Computer to Neutral Expert 12 was ordered to turn over his computer and phone to the parties' agreed-upon neutral expert for 13 imaging by no later than January 14, 2014, which was extended by stipulation of the parties to 14 January 17, 2014. (Doc. 97.) Plaintiff's computer was turned over to neutral expert BCT 15 Consulting ("BCT") on Friday, January 17, 2014. The results of BCT's initial investigation were 16 produced on January 21, 2014. (Doc. 158-17, Exhibit L.) 17 4. 18 BCT's report indicated the presence of a computer program called "Winclear" on Plaintiff's Neutral Expert's Reports 19 computer. This program is used to delete internet history, cookies, and web files. On February 20 19, 2014, the parties held a conference with Marshall Moll of BCT and requested further 21 investigation of the Winclear program. On February 21, 2014, Mr. Moll provided further 22 investigation results which revealed the Winclear program was run only once on January 16, 2014, 23 the day before Plaintiff turned over his computer for inspection. (Doc. 158-17, Exhibit L.) 24 Plaintiff informed Job.com that Winclear was not run manually by Plaintiff, but had 25 "popped up" on Plaintiff's computer. The parties again contacted Mr. Moll at BCT to ask him to 26 investigate the issue further in light of Plaintiff's explanation. 27 Mr. Moll responded to the parties on March 3, 2014, indicating it was "very unlikely" that 28 the program ran on its own. Mr. Moll also discovered two additional programs, PC Doctor and 4 1 PC Optimizer Pro, which were run on January 16, 2014, and January 17, 2014. Mr. Moll was 2 asked to prepare a report, which Mr. Moll produced on April 1, 2014. (Doc. 158-20, Exhibit O.) 3 Job.com's and Plaintiff's counsel met and conferred regarding Job.com's request to obtain its own 4 expert to analyze Plaintiff's hard drive, but Plaintiff refused to stipulate to further expert 5 examination of the computer data. 6 5. 7 On May, 1, 2014, the parties appeared again for an informal telephonic discovery dispute Parties Permitted to Hire Experts to Evaluate Plaintiff's Computer Data 8 conference. Following the conference, the Court issued a minute order permitting Job.com to 9 retain its own expert to review a mirror image of Plaintiff's hard drive. (Doc. 124.) 10 6. 11 Job.com retained forensic expert Global Digital Forensics, Inc. ("GDF") to inspect the Job.com's Expert: Global Digital Forensics, Inc. 12 image of Plaintiff's hard drive. On May 30, 2014, GDF provided a formal report of its findings. 13 (Doc. 158-22, Exhibit Q.) GDF concluded that the computer clock setting had been intentionally 14 manipulated to roll the computer date backwards to December 1999. The computer system event 15 log showed four entries confirming the date change was a user-initiated action, not something the 16 system did without intervention. (Doc. 158-22, Exh. Q, p. 5.) GDF also concluded that a program 17 named PC Optimizer Pro was initially installed in November 2012, and re-installed on May 27, 18 2013. The program was set to run on a scheduled basis to destroy and remove data from the 19 computer hard drive. The last time PC Optimizer was run, on January 17, 2014, 2,318 items were 20 "cleaned" off the system. Between December 21, 2012, and December 28, 2013, a total of 15,686 21 files were purged from the system. (Doc. 158-22, Exh. Q, p. 5.) GDF summarized the Windows 22 prefetch data in relevant part as follows: 23 24 25 26 27 28 It is possible to determine the number of times a program has been used, and the last date it was run, by examining the metadata of the prefetch files. Based on the analysis of the extracted metadata [from Plaintiff's hard drive], the PC Optimizer program was run only once, on January 17, 2014. Since we know that the PC Optimizer program was used more than once, evidenced by the recovered log files, the only way the prefetch metadata could display a single use is that the prefetch files were deleted. Additional review of other program files listed in the prefetch folder also indicate single or very few runs. This condition would indicate 5 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 that multiple prefetch files were deleted. Further analysis indicated that in excess of 70 prefetch files were created between January 12, 2014, and January 17, 2014 (see Exhibit #4 A and 4 B). (Doc. 158-22, p. 10.) GDF concluded the Winclear program was run on Plaintiff's computer and detected 12,775 items on January 16, 2014. 7. Plaintiff's Expert: Hansen Legal Technologies, Inc. Upon review of GDF's report, Plaintiff retained Jeffrey Hansen to review GDF's findings and conduct another evaluation of Plaintiff's computer regarding the spoliation issue. (Doc. 15825; 164-5.) a. Date Manipulation Not Caused by Plaintiff Mr. Hansen's report indicates the data on Plaintiff's computer does not reflect that Plaintiff manually attempted to manipulate the date, but that the computer system was "simply synchronizing with the NTP server." Any log entries showing a change in date was momentary and showed only that Windows, Plaintiff's computer operating system, was synchronizing its time with an NTP server. He concluded there was "no possibility that anything other than a synchronization with an NTP server created [the date change] event." (Doc. 164-5, p. 8.) b. PC Optimizer Program Ran Automatically GDP determined that the PC Optimizer program was set to run automatically every two weeks, three times a week, on Tuesday, Thursday, and Saturday at 11 a.m. Mr. Hansen determined that PC Optimizer was actually configured to run every Tuesday, Thursday, and every other Saturday at 11:00 a.m. Nevertheless, the data on the computer indicates the program was last run on Friday, January 17, 2014. Mr. Hansen asserts that when PC Optimizer is scheduled to run and the time it actually runs can vary. For example, Mr. Hansen notes PC Optimizer ran on December 16, 2013, which was a Monday, and not a regularly scheduled scan day. Mr. Hansen states there are many reasons why the scheduled run of PC Optimizer could be delayed, such as the computer being placed in sleep mode at the time of a scheduled run. Mr. Hansen opines there is no evidence to suggest that Plaintiff had any involvement with PC Optimizer being run on a day other than when it was scheduled, and it ran on an unscheduled day because the computer was 28 6 1 sleeping or shut down on the day it was scheduled to run. (Doc. 164-5, p. 12.) 2 3 c. The Effect of Winclear is Disputed The version of Winclear on Plaintiff's computer was an unregistered version, and 4 Winclear's system summary shows that no items were removed on the previous scans. According 5 to GDF, there was a registry in the Windows Operating system that tracked access to files in an 6 area known as "mru" or "Most Recently Used." Within this registry key, there was direct 7 navigation and access to a Winclear log. When the drive was searched, the log was identified in 8 the recycle bin, indicating it had been deleted by the user. Mr. Hansen opines that Plaintiff did not 9 perform the deletion, but that PC Optimizer scanned that file, and the access time of the file was 10 changed. PC Optimizer then sent the file to the recycle bin, and emptied the recycle bin. (Doc. 11 164-5, p. 13.) Mr. Hansen also notes the log shows when the file was created and deleted. The 12 Winclear log file was sent to the recycle bin at 3:43 and 20.716999 seconds, and 0.007999 seconds 13 later the file was deleted. Plaintiff could not have deleted the file, moved it to the recycle bin, and 14 emptied the bin all within 0.00799 seconds. Moreover, PC Optimizer runs using the pmojjo2003 15 account on Plaintiff's computer. Because GDF mistakenly assumed that Plaintiff was the only 16 user of that account, GDF pointed to this user account recorded in the log as additional evidence 17 that Plaintiff was manually directing the deletions of the Winclear scan. In actuality, PC 18 Optimizer also runs under that account. In sum, Mr. Hansen opines that only a software program 19 can access a file, delete it, and navigate to the recycle bin to empty it in 0.007999 seconds; PC 20 Optimizer can perform such a task, and would have done so under Plaintiff's user account 21 pmojjo2003. 22 23 d. Deletion of Files by the Neutral Expert When comparing files deleted from the recycle bin, the MFT entries showed that files were 24 deleted on January 18, 2014, after Plaintiff turned his computer over to BCT. This deletion 25 occurred before a "dd image" was made of the hard drive – i.e., "all forensic examinations done on 26 this drive . . . . , were done on an image in which log files and restore points that are at issue in this 27 case [were] modified, accessed, or deleted while in the custody of the neutral expert." (Doc. 16428 5, p. 18.) Six items were deleted on January 18, 2014. According to Mr. Hansen, the system was 7 1 not turned on after the last entry in the log files of January 17, 2014, yet the drive has time stamps 2 of January 18, 2014, spanning over a four-hour period showing 60 files being created, accessed, 3 modified, or deleted. "This can only be done by booting a computer with a different operating 4 system than what is on the drive and accessing that drive." Mr. Hansen opines that either the 5 neutral expert was not reliable or erased the data purposefully. (Doc. 164-5, p. 20.) 6 7 e. Disc Defragmenter GDP noted that a disc defragmentation utility on Plaintiff's computer was scheduled to run 8 on Wednesdays, but the files show that the disc defragmenter also ran on Friday, January 17, 9 2014. Mr. Hansen inspected the registry key and found there was no history of a scan on 10 Wednesday, January 15, 2014. Mr. Hansen opines the history was deleted by PC Optimizer, and 11 when "Windows Defrag" detected there was no entry of a disc defragmentation on Wednesday, 12 January 15, 2014, it ran the disc defragmentation utility again on Friday, January 17, 2014. (Doc. 13 164-5, p. 21.) 14 15 f. Internet Explorer and USB Devices Although GDF noted that Google Chrome's browser history was regularly purged, Mr. 16 Hansen opines this is not unexpected given that "this is what PC Optimizer Pro does." (Doc. 16417 5, p. 22.) GDF also opined that it was highly unlikely that the end user of the computer did not 18 use Internet Explorer during the past five years. Mr. Hansen responds, however, that Google 19 Chrome browser was installed as the default browser and Internet Explorer would not be used 20 unless the user goes "out of his way to open Internet Explorer." He opines that, given this 21 configuration, Internet Explorer is likely to have never been used (or seldom used) for however 22 long Google Chrome was installed on the computer. 23 GDF also noted that Plaintiff's Android phone was connected to his computer on January 24 15, 2014. Mr. Hansen asserts many users connect their phones to a computer USB port to charge 25 the phone. Although BCT found no email on the phone, Mr. Hansen asserts it failed to use the 26 proper imager to export files from an Android phone. 27 28 8 1 2 g. Conclusion Mr. Hansen concludes that the deleted files mentioned by GDF in its report were not 3 manually deleted by the user of Plaintiff's computer. Mr. Hansen opines Plaintiff is a novice 4 computer user, the neutral expert deleted or modified files which calls into question the integrity 5 of any examination of the hard drive, and the web history and files were automatically deleted by 6 PC Optimizer. (Doc. 164-5, p. 23-24.) 7 8. 8 On July 26, 2014, GDF prepared a supplemental report to rebut the opinion of Mr. Hansen, GDF's Supplemental Report 9 which is summarized below. 10 11 a. Computer Proficiency of Plaintiff GDF disagrees with Mr. Hansen's conclusion that Plaintiff is a novice computer user who 12 did not possess the skill and understanding to use the wiping programs to delete internet history 13 files. GDF notes Plaintiff testified at his deposition he took introductory computer classes in 14 college, he received training on multiple computer programs including SAP and CMMS, both of 15 which GDF maintains require a level of expertise to program that would certainly not be 16 considered novice. (Doc. 164-4, p. 6.) Plaintiff testified he could "spend an hour talking about 17 computer training," and he demonstrated a good understanding of how resumes are processed by 18 computers in the current job market. He also referenced a "Cono system" and correctly described 19 it as a cloud-based server, again indicative of his technical understanding of computer and internet 20 "architecture" which a novice computer user would not grasp. Plaintiff also made two separate 21 purchases for a program called Winclear long before he claims he bought PC Optimizer to deal 22 with "spam." Plaintiff claimed to have been the victim of identity theft, which caused him to be 23 cautious about submitting personal information through a website. In light of this information, 24 GDF opined it was unlikely Plaintiff would purchase, download, and install the PC Optimizer Pro 25 knowing nothing about the program, especially after being an identity-theft victim and previously 26 purchasing Winclear, which had a similar function. 27 28 9 1 2 b. Manipulation of Computer Clock According to GDF, a change in the computer clock raises a red flag for a computer 3 forensic expert. (Doc. 164-4, p. 7.) GDF specifically notes that files were created and deleted on 4 January 18, 2014, the day after Plaintiff turned over his computer to BCT, and attributes this to the 5 general date anomalies that appear on the system. GDF maintains that the time changes were not 6 part of the "normal" Windows time synchronization, as Mr. Hansen opined. The time clock was 7 changed under the user account "pmojjo2003-PC" by a third-party utility, and not the Windows 8 Network Time Protocol ("NTP"). NTP changes to the system are normal and expected. However, 9 the time changes on Plaintiff's computer were unrelated to the Windows NTP service. 10 Specifically, Windows NTP does not change the time backwards, which is what happened here. 11 Instead, it synchronizes the computer time with the Network Time Server selected in the registry. 12 Plaintiff's computer included a program called PC Doctor for Windows, which tests the system 13 and hardware as a health check, and manipulates the computer clock under the user account. This 14 program is a third-party utility and not a normal component of Windows operating system. GDF 15 opines that Mr. Hansen's statement regarding NTP and Epoch time simply does not apply in this 16 case to explain the date anomalies. Further, as it pertains to Mr. Hansen's claim that GDF's time 17 clock was incorrectly set to Eastern Standard Time, GDF uses a commercial program that converts 18 UTC to local file times and is independent of the examiner's system time clock. 19 GDF concludes that the computer clock "provided a number of anomalies on Plaintiff's 20 computer and made its investigation very difficult. GDF is unable to identify why the time and 21 dates are failing. However, when GDF analyzes Plaintiff's computer as a whole, we still opine 22 Plaintiff most likely caused the date discrepancies." (Doc. 164-4, p. 19.) 23 24 c. PC Optimizer's Deletion of Information Despite the date anomalies on Plaintiff's computer, GDF maintains it was able to verify 25 that PC Optimizer was last run at 5:16 a.m. on January 17, 2014, the day the computer was to be 26 turned over to BCT. GDF contends that PC Optimizer was manually configured by Plaintiff to 27 run on a particular schedule, establishing that Plaintiff knew how to use the program and was able 28 to direct the program's scan schedule. The PC Optimizer scan started at 5:16 a.m. and was 10 1 cancelled at 5:21 a.m. by the user, establishing that Plaintiff was interacting with the program and 2 understood its functionality. PC Optimizer deleted 2,318 files on January 17, 2014. 3 4 d. Winclear Plaintiff purchased Winclear in May 2008 and again in August 2009. (Doc. 158-23, p. 12.) 5 The Winclear directory contains 2,000 files that were transferred onto Plaintiff's computer when 6 the program was installed. Thus, GDF concludes that Plaintiff purchased the program, copied it to 7 his computer system, and installed it, contradicting Plaintiff's statement that Winclear simply 8 appeared on his computer. GDF also opines that Winclear is not a program a novice computer 9 user would install. Prominently displayed on Winclear screen is a definition of the program's 10 design: "Winclear is an Internet history eraser that protects your Internet privacy by cleaning up 11 all tracks of your Internet and computer activity." (Doc. 158-23, p. 13.) Although Winclear did 12 not delete any items, there is no explanation why Winclear was run on January 17, 2014. The 13 prefetch data shows that Winclear was installed on January 16, 2014, the scan results were saved 14 to a .txt file, and the file was opened and manually erased. 15 16 e. Windows Prefetch GDF opines that PC Optimizer does not delete files from the prefetch folder. Thus, 17 deletion of the prefetch files would not have been automatically performed by PC Optimizer, as 18 Mr. Hansen claims. Also, the prefetch files show that PC Optimizer ran only once. Because the 19 data on the computer indicates PC Optimizer ran more often, the prefetch folder would only 20 indicate a single use if the prefetch files were deleted. GDF's analysis indicates that in excess of 21 70 prefetch files were created between January 12, 2014, and January 17, 2014. (Doc. 158-23, p. 22 14.) 23 24 f. Restore Points According to GDF, restore points on a computer allow users a choice to roll back to a 25 previous system state. Restore points are created automatically by the Windows operating system 26 every 24 hours. Here, there was only a single restore point on the system directory. According to 27 GDF, the lack of restore points is suspicious. Although Mr. Hansen claims PC Optimizer deleted 28 restore points, GDF maintains there is no evidence of this. Rather, PC Optimizer prompts users to 11 1 create a restore point before making changes to the system. 2 3 g. Disc Defragmenter Defragmenting a drive overwrites deleted data in free space to store data in a contiguous 4 way to speed up access. The end result is that data is overwritten. Whether the program ran 5 automatically or was manually run, it deleted data on the computer. 6 7 h. Internet Explorer Although Mr. Hansen opines that Plaintiff simply did not use Internet Explorer, deleted 8 files contain Internet Explorer records proving the Internet Explorer browser was used, including 9 in January 2014. Mr. Hansen identified 1,982 hits for the key word "job.com." GDF confirms 10 there were relevant entries indicating Plaintiff accessed the Job.com website, but because the data 11 was deleted, there is no record of what he did at that website. 12 13 i. Deletion of Data by BCT GDF reviewed the equipment used by BCT to mirror Plaintiff's hard drive, and confirmed 14 with BCT that it did not delete any data. GDF opines the date discrepancies on Plaintiff's 15 computer are responsible for deletions that allegedly occurred on January 18, 2014. BCT used 16 industry standard technology for the mirror image, and no evidence of wrongdoing on BCT's part 17 has been presented. 18 19 j. Conclusion GDF notes even Mr. Hansen concedes that information was deleted from Plaintiff's 20 computer. The fragments of data recovered show that Plaintiff interacted with Job.com, which is 21 information Defendants claim is relevant to their defenses. The only dispute is whether Plaintiff's 22 conduct in deleting evidence was willful. GDF claims the evidence in its report is quite clear that 23 Plaintiff's actions were willful and deliberate. Moreover, the entire process could have been 24 avoided if Plaintiff had used a competent expert to preserve the system data after being instructed 25 to do so. 26 9. 27 Plaintiff obtained a supplement report from Mr. Hansen to respond to GDF's supplemental Mr. Hansen's Supplemental Report 28 report. (Doc. 164-6.) Mr. Hansen asserts that GDF took Plaintiff's deposition testimony out of 12 1 context, and Plaintiff's training on particular computer software does not establish he has computer 2 programming abilities. Regarding the date irregularities, Mr. Hansen reaffirms his original 3 statement that the system and its programs, not Plaintiff, were responsible for any time-change 4 issues. As to PC Optimizer being reinstalled in May 2013, the program was probably replaced by 5 a new one; even if it was re-installed, this is a very simple process and does not establish that 6 Plaintiff had any exceptional knowledge of the program itself. Regarding PC Optimizer's scan 7 being cancelled on January 17, 2014, users will routinely stop scans when they interfere with the 8 processing speed of the computer. Also, if Plaintiff were truly attempting to delete data, he would 9 not have stopped the scan. Winclear was purchased by Plaintiff in 2008, but Plaintiff allowed his 10 license to expire, rendering the program unregistered. When unregistered, Winclear will run 11 automatically but will not delete data. According to Mr. Hansen, "Winclear did not delete 12 anything long before litigation began and to investigate it further would accomplish nothing." 13 (Doc. 164-6, p. 20.) Neither Winclear nor PC Optimizer is a desirable program for an advanced 14 computer user. 15 Mr. Hansen also contends that the prefetch folder was actually deleted by Windows itself. 16 Windows only allows 128 files in the prefetch folder, and anything beyond that is automatically 17 deleted. As to restore points, because Plaintiff's computer is old, it can only hold a certain number 18 of restore points. The disc defragmentation program was run automatically. Regarding Internet 19 Explorer, Mr. Hansen explains he never stated Plaintiff did not use the browser, but that Plaintiff 20 may simply not have used it in lieu of Google Chrome. Finally, Mr. Hansen reiterates that BCT 21 did delete data on January 18, 2014, as evidenced by "hash values." 22 23 24 10. GDF's Supplemental Report and BCT's Responsive Declaration Will Not Be Considered Job.com and Windy City each attached to their reply briefs a second supplemental report 25 prepared by GDF on August 6, 2014. Plaintiff objects to this supplemental report because it was 26 filed with a reply brief, and Plaintiff was not given an adequate opportunity to respond. 27 The Court declines to consider this supplemental report because it is merely a rebuttal of 28 Mr. Hansen's supplemental report. Rebuttal expert reports are potentially endless in this 13 1 circumstance, and declining to consider the additional expert report attached to the reply brief 2 avoids a Kafkaesque supplemental report problem. The Court also held a two-hour hearing on 3 September 24, 2014, and the parties were given ample time, along with their experts who each 4 appeared telephonically, to respond to any argument or issue raised in the briefs or reports. As 5 such, the supplemental expert report attached to Defendants' reply briefs will not be entertained. 6 BCT filed a statement with the Court refuting Mr. Hansen's allegations that it deleted any 7 data in the mirror imaging of Plaintiff's computer. (Doc. 184.) Neither this statement, nor the 8 declaration attached to Defendants' reply briefs were considered for purposes of this decision. 9 III. 10 PARTIES' ARGUMENTS Job.com and Windy City each filed motions for sanctions, seeking dismissal of Plaintiff's 11 complaint.2 Defendants argue that Plaintiff's conduct in allowing file deletion programs to run on 12 his computer during the course of the litigation after the duty to preserve was triggered amounted 13 to a willful and deliberate destruction of relevant computer data. Defendants assert the destruction 14 of computer data was so substantial, no sanction less than dismissal will address the harm. 15 Alternatively, both Defendants seek an adverse inference jury instruction. Finally, Defendants 16 seek monetary sanctions against Plaintiff for the fees and costs associated with their motions. 17 Plaintiff claims he had no notice that his computer data was relevant to the litigation before 18 his October 2013 deposition. Because he had installed deletion programs on his computer years 19 before the lawsuit and before the duty to preserve was triggered, all data possibly relevant to this 20 litigation was deleted long before his October 2013 deposition. Further, Plaintiff did not make any 21 deliberate attempts to manually delete data on his computer, particularly after the Court ordered 22 production of the hard drive. As no relevant data was destroyed at a time when the duty to 23 preserve was triggered, no sanctions are warranted. Further, even if sanctions were appropriate, 24 the best remedy would be to require Plaintiff to pay to have its expert recover the deleted data. 25 26 27 28 2 The motions are nearly identical; they seek the same relief on the same grounds. As such, the Court considers them in tandem. 14 1 IV. DISCUSSION 2 A. Plaintiff Spoliated Relevant Evidence 3 The duty to preserve arises not only during litigation, but also extends to the period before 4 litigation when a party should reasonably know that evidence may be relevant to anticipated 5 litigation. United States v. Kitsap Physicians Serv., 314 F.3d 995, 1001 (9th Cir. 2002). Once the 6 duty to preserve evidence arises, a party must "suspend any existing policies related to deleting or 7 destroying files and preserve all relevant documents relating to the litigation." In re Napster, Inc. 8 Copyright Litig., 462 F. Supp. 2d 1060, 1070 (N.D. Cal. 2006). Spoliation results from "the 9 destruction or significant alteration of evidence, or failure to preserve property for another's use as 10 evidence in pending or reasonably foreseeable litigation." West v. Goodyear Tire & Rubber Co., 11 167 F.3d 776, 779 (2d Cir. 1999). In addition to showing a party destroyed evidence after the duty 12 to preserve was triggered, it must also be shown that the party acted with a culpable state of mind. 13 In other words, prior to imposing any sanction, the court must make a finding of fault. Therefore, 14 to determine whether spoliation has occurred, the Court must consider (1) when Plaintiff's duty to 15 preserve evidence was triggered; (2) whether relevant evidence was destroyed or altered by 16 Plaintiff after the duty was triggered; and (3) whether Plaintiff acted with a culpable state of mind 17 in destroying or altering relevant evidence. Zubulake v. UBS Warburg LLC, 220 F.R.D. 212, 216 18 (S.D.N.Y. 2003). 19 1. 20 Plaintiff contends he had no basis to reasonably understand or know, before his deposition, Plaintiff had a Duty to Preserve Computer Data By August 2012 21 that any of the data on his computer was even potentially relevant to the litigation. This litigation 22 is about telephone calls under the TCPA, and there was no reason for Plaintiff to understand it 23 would have anything to do with his computer. The earliest any duty to preserve evidence would 24 have arisen was at Plaintiff's deposition on October 4, 2013, when he was instructed by 25 Defendants' counsel to save data on his computer. 26 Defendants argue the phone calls at issue here arise out of Plaintiff's computer job search 27 activities during which he provided his phone number and consented to telephone contact by 28 Defendants. Plaintiff was informed during one of these calls at issue that Job.com had obtained 15 1 his number. According to Defendants, by virtue of Job.com's name, it is obviously an internet 2 company that has something to do with jobs. The link between the calls and Plaintiff's online job 3 search should have been reasonably apparent. At the time he contemplated his lawsuit, Plaintiff 4 should have known his computer job-search activities could be potentially relevant to the 5 litigation. 6 Litigants have an obligation to preserve potentially relevant evidence from the moment that 7 litigation is reasonably anticipated. But a party only engages in spoliation as a matter of law if it 8 had some notice that the evidence was at least potentially relevant to the litigation before it was 9 destroyed. Kitsap Physicians Serv., 314 F.3d at 1001. 10 Plaintiff's assertion that the duty to preserve his computer data did not arise until his 11 October 2013 deposition is unpersuasive. As Defendants note, the calls at issue arise out of 12 Plaintiff's online job search, which was conducted through use of his home computer. When 13 Plaintiff had telephone contact with Windy City in August 2012, he discovered his cellular 14 telephone number was obtained through Job.com, an internet company against whom Plaintiff 15 filed suit approximately 6 weeks later. As Defendant notes, Job.com's name itself indicates it is an 16 internet company and implies it has something to do with jobs. Given that Plaintiff was 17 contemporaneously conducting an online job search, Plaintiff should reasonably have been aware 18 that the phone call arose out of his online job-search activities. While Plaintiff may not have had 19 actual knowledge how data on his computer related to his job search would be used by 20 Defendants, he should have known that his online job search activities on his home computer were 21 at least potentially relevant to the litigation. 22 Moreover, Plaintiff retained experienced class-action counsel with three law firms who 23 should have known his computer could contain potentially relevant information. See Surowiec v. 24 Capital Title Agency, Inc., 790 F. Supp. 2d 997, 1006 (D. Ariz. 2011) ("The preservation 25 obligation runs first to counsel, who has a duty to advise his client of the type of information 26 potentially relevant to the lawsuit and of the necessity of preventing its destruction." (quoting 27 Richard Green (Fine Paintings) v. McClendon, 262 F.R.D. 284, 290 (S.D.N.Y. 2009))). The link 28 between the complained-of phone calls and Plaintiff's online job search was reasonably clear at the 16 1 time Plaintiff contemplated his suit in August 2012.3 Because Plaintiff knew his online job search 2 was conducted on his home computer, he was on notice that his computer may contain potentially 3 relevant evidence in his action against Job.com. 4 Even if the potential relevance of his computer data was not reasonably known at the time 5 the lawsuit was contemplated, the duty to preserve Plaintiff's computer data, particularly anything 6 related to his job-search activities, became apparent in July 2013 when Defendants requested a list 7 of each and every website Plaintiff accessed for purposes of posting his resume. Additionally, 8 Plaintiff was specifically instructed at his October 2013 deposition to preserve data on his 9 computer. Finally, in January 2014, Plaintiff was ordered to turn over his computer for 10 examination for relevant evidence. It is not disputed that Plaintiff had installed Optimizer Pro in 11 November 2012 and this program deleted internet history and files from its installation until the 12 computer was turned over to the parties' neutral expert in January 2014. 13 Although Plaintiff contends he had no reason to make a connection between the litigation 14 and data on his computer in August 2012, as the litigation progressed, Plaintiff was presented with 15 specific indicators that his computer data was relevant to Defendants' defenses. What should have 16 been reasonably known to Plaintiff at the time he contemplated his lawsuit about the relevance of 17 data on his computer bloomed into actual knowledge by his October 2013 deposition. In sum, 18 data on Plaintiff's computer was deleted after the duty to preserve it was triggered in August 2012. 19 The next question is whether any of the destroyed data was relevant. 20 2. 21 Plaintiff argues that, even if the duty to preserve evidence on his computer was triggered as Plaintiff Destroyed Relevant Computer Data 22 early as August 2012, deletion programs on his computer were continuously running and would 23 have deleted relevant information before the duty was triggered. In other words, by the time any 24 duty to preserve attached, all potentially relevant information would already have been deleted. 25 Plaintiff also contends that nothing he did on his computer after the August 2012 phone calls were 26 received could be considered relevant to Job.com's defenses. 27 28 3 Plaintiff stated at his deposition that he consulted with his attorney days after receiving his first telephone calls from Defendants. (Doc. 158-6, Exhibit A, Olney Depo., 174:14-20.) 17 1 Defendants assert Plaintiff's online job search activities, even those searches after the 2 phone calls from Windy City, potentially contain circumstantial evidence as to the scope of 3 Plaintiff's consent to receive phone calls about educational opportunities. Defendants assert that 4 the scope of Plaintiff's consent remains a factual issue in the litigation.4 5 Plaintiff's argument rests on two premises: first, nothing Plaintiff did on his computer after 6 the phone calls with Windy City is relevant to the issue of consent so any deletions after August 7 2012 would not have involved any relevant evidence; and second, even if post-call online activity 8 were relevant to Defendants' defenses, this data was subject to continual deletion by wiping 9 programs installed on the computer and therefore any relevant evidence would have been deleted 10 by the time any duty to preserve arose. 11 Plaintiff's arguments are not persuasive. The parties dispute whether computer data after 12 Plaintiff's phone calls with Windy City could establish the scope of Plaintiff's consent. Plaintiff 13 contends consent under the TCPA cannot be implied and must be given prior to the call. 14 Defendants argue the scope of Plaintiff's consent to the telephone contact by Windy City may be 15 established implicitly and circumstantially by demonstrating Plaintiff's interest in educational 16 opportunities – which was the subject of the calls. Defendants also maintain that that post-call 17 computer data gives rise to an inference regarding Plaintiff's scope of consent. For example, 18 Plaintiff's search for educational opportunities when he agreed to be called is relevant to 19 establishing the scope of his consent to be called about educational opportunities. 20 Notwithstanding the merits of Defendants' scope-of-consent defense, they are entitled to discovery 21 and to present evidence relevant to that defense. Plaintiff is not entitled to pre-judge Defendants' 22 defense as lacking merit and then refuse to provide discovery based on that determination. 23 4 In its order on Job.com's motion for summary judgment, the district court held that an individual may indirectly 24 provide a third party with express consent to be called under the TCPA. (Doc. 122, 9:28-10:1.) The Court determined it was "undisputed that Plaintiff provided his cell phone number to Defendant to be contacted about potential 25 employment opportunities." Defendants argued that Plaintiff's express prior consent to be called about employment 26 27 28 opportunities also extended to being called about educational opportunities when he provided his cell phone number to Resume-Now. Plaintiff asserted that he provided Defendant prior express consent only to discuss employment opportunities, and educational opportunities are different from employment opportunities. The Court determined that "[i]t may be true that potential opportunities that Windy City was offering could have helped Plaintiff's employment prospects; however, it is equally possible that the opportunities were wholly irrelevant to Plaintiff's employment goals. The Court therefore finds that genuine issues of material fact exist as to whether the scope of Plaintiff's express consent extended to Windy City's calls regarding educational opportunities." (Doc. 122, 11:10-15.) 18 1 Moreover, "relevance" as it pertains to discovery is defined broadly. Garneau v. City of 2 Seattle, 147 F.3d 802, 812 (9th Cir. 1998). For discovery purposes, relevance means only that the 3 materials sought are reasonably calculated to lead to the discovery of admissible evidence. See 4 Oppenheimer Fund, Inc. v. Sanders, 437 U.S. 340, 351 (1978). Here, Defendants have a right to 5 present their chosen defenses and to collect discovery relevant to that defense -- they have 6 adequately established the relevance of the data they sought on Plaintiff's computer and its nexus 7 to their defense. Plaintiff's second premise – that all relevant data on his computer before the calls with 8 9 Windy City would necessarily have been deleted long before the duty to preserve the data arose – 10 is also flawed. First, Plaintiff confirmed at the hearing there is no evidence that Winclear was 11 deleting information in 2012. As Plaintiff's expert noted in his reports, Plaintiff purchased 12 Winclear program licenses in 2008 and 2009 which lapsed, and there is no evidence Winclear was 13 actually deleting any data on Plaintiff's computer in any relevant period during 2012.5 Plaintiff 14 did not install Optimizer Pro until November 2012; therefore, even pre-call computer data was still 15 ostensibly in existence at the time the duty to preserve arose. Second, Defendants' expert found 16 some website history data on Plaintiff's computer from July 2012 indicating Plaintiff visited 17 Job.com's website prior to the lawsuit;6 had Plaintiff taken steps to preserve the data at an earlier 18 time, there may have been more content that escaped being wiped from the computer. Plaintiff's 19 argument that all the relevant data was deleted before a duty to preserve was triggered is self20 serving and not corroborated by the data recovered by Defendants' expert. In sum, relevant 21 computer data was destroyed by Plaintiff after a duty to preserve was triggered. 22 3. 23 The Court must next consider Plaintiff's degree of culpability in the destruction of the Plaintiff Acted with A Culpable State of Mind 24 computer data. At a minimum, the culpable state of mind is negligence. Glover v. BIC Corp., 6 25 F.3d 1318, 1329 (9th Cir. 1993) (simple notice of potential relevance to litigation is sufficient to 26 27 28 5 The parties dispute whether an unregistered version of Winclear was run by Plaintiff in January 2014. However, Plaintiff's expert indicates the license for Winclear lapsed after 2009, and the unregistered version of the program was not capable of actually deleting any information. (See Jeff Hansen Report, Doc. 164-6, p. 20.) 6 See Doc. 158-23, p. 17 (ECF pagination); Doc. 158-4, Ozura Decl., ¶ 5. 19 1 impose sanctions for spoliation); see also Unigard Sec. Ins. Co. v. Lakewood Eng'r & Mfg. Corp., 2 982 F.2d 363, 368-69, n.2 (9th Cir. 1992) (negligent destruction of evidence is sufficient to 3 warrant a sanction excluding evidence). 4 A significant portion of the parties' expert reports and briefs is devoted to Plaintiff's degree 5 of culpability in installing the file deletion programs and allowing them to run after the duty to 6 preserve evidence arose. Plaintiff's expert opines that Plaintiff is a novice computer user who had 7 no idea how Winclear or PC Optimizer functioned. Defendants' expert opines that, based on 8 Plaintiff's deposition testimony, he has substantial computer knowledge and the evidence strongly 9 suggests he manually ran PC Optimizer on January 17, 2014 – the day he turned his computer 10 over to BCT – to delete information on his computer, thereby preventing the expert from 11 reviewing it. 12 Plaintiff's conduct meets the minimum culpability threshold in several regards. Plaintiff's 13 installation of PC Optimizer in November 2012 was at least negligent. Even though the duty to 14 preserve computer data, particularly internet data, should have been known to Plaintiff when he 15 contemplated his lawsuit in August 2012, neither he nor his attorneys took any steps to mirror 16 image Plaintiff's hard drive at that time or at any time after the lawsuit was filed in October 2012. 17 Plaintiff installed PC Optimizer in November 2012, only one month after filing his lawsuit. 18 Although Plaintiff's brief indicates he had no idea what PC Optimizer did, and he informed his 19 expert, Mr. Hansen, Plaintiff did not understand the purpose of the program, Plaintiff's declaration 20 carefully avoids any unequivocal statement that he did not know that PC Optimizer was a file21 deletion program. It has not been established that Plaintiff knew that PC Optimizer would delete 22 internet history relevant to the litigation and installed it for that purpose. Plaintiff's deposition 23 testimony indicates, however, that he had enough computer knowledge to understand that PC 24 Optimizer would delete files on his computer. In light of the pending litigation, Plaintiff should 25 have ascertained the precise nature PC Optimizer's deletion function before it was installed. The 26 failure to take steps to do so was negligence. 27 In July 2013, Defendants served discovery requiring Plaintiff to identify all websites where 28 he posted his resume, which further implicated the relevance of Plaintiff's use of his computer 20 1 during his job search as a likely source of potentially relevant evidence to Defendants' defenses. 2 Yet, neither Plaintiff nor his counsel made an attempt to mirror image the hard drive or confirm 3 whether evidence on the computer was being preserved. 4 At Plaintiff's October 2013 deposition, he and his attorneys were expressly directed by 5 Job.com's counsel to preserve internet history on Plaintiff's computer, but no steps were taken to 6 do so. Job.com sought production of Plaintiff's computer data through formal discovery later in 7 October 2013, and even at this point no steps were taken by Plaintiff or the three law firms 8 representing him to either mirror image the computer or ascertain whether data on the computer 9 was being preserved. 10 Finally, Plaintiff was ordered to turn over his computer on January 10, 2014, and again 11 neither Plaintiff nor his counsel took any steps to ascertain whether computer data was being 12 preserved. 13 In sum, Plaintiff was negligent with regard to the installation of PC Optimizer in 14 November 2012 and its routine deletions of data after installation; he was grossly negligent in 15 failing to take any steps whatsoever to preserve his computer data after Defendants' counsel 16 instructed him at his October 2013 deposition to preserve his computer data; and, as discussed 17 below, Plaintiff's failure to preserve evidence after the court ordered production of his computer 18 hard drive constituted willful and deliberate spoliation. 19 4. 20 As Plaintiff destroyed relevant evidence at a time when the duty to preserve had been Conclusion: Spoliation Sanctions are Warranted 21 triggered, and because Plaintiff acted with more than the minimum degree of culpability, sanctions 22 are warranted. The Court next considers an appropriate sanction. 23 B. Form of the Appropriate Sanction 24 Defendants seek terminating sanctions, asserting that Plaintiff's conduct in deleting 25 computer data was purposeful and deliberate. In the alternative, Defendants seek an adverse jury 26 instruction. Defendants also seek monetary sanctions. 27 28 21 1 1. 2 "There are two sources of authority under which a district court can sanction a party who Legal Standard 3 has despoiled evidence: the inherent power of federal courts to levy sanctions in response to 4 abusive litigation practices, and the availability of sanctions under Rule 37 against a party who 5 'fails to obey an order to provide or permit discovery.'" Leon v. IDX Sys. Corp., 464 F.3d 951 (9th 6 Cir. 2006) (quoting Fjelstad v. Am. Honda Motor Co., 762 F.2d 1334, 1337-38 (9th Cir. 1985)). 7 A trial court's discretion in selecting the form of a spoliation sanction is broad, and can 8 range from comparatively minor sanctions, such as awarding attorneys' fees, to more severe 9 sanctions, such as dismissal. The Court's discretion is not unlimited, and it must weigh several 10 factors when deciding what type of sanction should be imposed on a party who despoiled 11 evidence. The remedy crafted should achieve the following: (1) deter parties from engaging in 12 spoliation; (2) place the risk of an erroneous judgment on the party who wrongfully created the 13 risk; and (3) restore the prejudiced party to the same position he would have been absent the 14 wrongful destruction of evidence by the opposing party. Apple Inc. v. Samsung Electronics Co., 15 Ltd., 881 F. Supp. 2d 1132, 1136 (N.D. Cal. 2012) (internal quotation marks and citation omitted), 16 as modified in Apple Inc. v. Samsung Elec. Co., Ltd., 888 F. Supp. 2d 976, 1000 (N.D. Cal. 2012) 17 ("Apple, Inc. II"). 18 Federal courts also have authority to sanction a party who "fails to obey an order to 19 provide or permit discovery" under Federal Rule of Civil Procedure 37(b)(2)(A). Leon v. IDX Sys. 20 Corp., 464 F.3d 951, 958 (9th Cir. 2006). Federal Rule 37 provides that where a party fails to 21 comply with a court order, a court may issue any just order for sanctions, including the following: 22 (1) direct that the matters embraced in the order or other designated facts be taken as established 23 for purposes of the action, as the prevailing party claims; (2) prohibit the disobedient party from 24 supporting or opposing designated claims or defenses, or from introducing designated matters in 25 evidence; (3) striking pleadings in whole or in part; (4) staying further proceedings until the order 26 is obeyed; (5) dismissing the action or proceeding in whole or in part; (6) rendering a default 27 judgment against the disobedient party; or (7) treating as contempt of court the failure to obey any 28 order except an order to submit to a physical or mental examination. Fed. R. Civ. P. 37(b)(2)(A). 22 1 In crafting the appropriate sanction, courts must choose the least onerous sanction 2 corresponding to the willfulness of the destructive actions and the prejudice suffered by the victim. 3 Apple Inc., II, 888 F. Supp. 2d at 992. The remedy should serve "the prophylactic, punitive, and 4 remedial rationales underlying the spoliation doctrine." West, 167 F.3d at 779. 5 2. 6 Defendants argue that dismissal is the appropriate sanction. According to Defendants, the Terminating Sanctions Are Not Warranted 7 five-factor test applied by the Ninth Circuit in Leon favors dismissal. Defendants contend 8 Plaintiff's refusal to produce his computer data required extensive meet and confer efforts that 9 resulted in a discovery production order. Once Plaintiff's computer was produced, it was 10 discovered Plaintiff had deletion programs that had destroyed relevant data. Defendants assert 11 Plaintiff's extended refusal to produce his computer was an attempt to buy more time to purge files 12 from his computer. (Doc. 158-1, 17:14-18.) Defendants also assert severe prejudice resulted from 13 the deletions of data because, as noted by the court in Leon, Defendants have no way to know 14 what might have been stored on Plaintiff's computer and no way of recreating it. Defendants' 15 experts identified thousands of files that were deleted from Plaintiff's computer since the lawsuit 16 was filed. Data from the websites Plaintiff visited during his job search and any materials he may 17 have downloaded are relevant to the issue of consent. Defendants argue a lesser sanction would 18 force them to go to trial with less than complete evidence, would reward Plaintiff for his behavior, 19 and would not deter future litigants. 20 Dismissal or default is an appropriate sanction when "a party has engaged deliberately in 21 deceptive practices that undermine the integrity of the judicial proceedings" because "courts have 22 inherent power to dismiss an action when a party has willfully deceived the court and engaged in 23 conduct utterly inconsistent with the orderly administration of justice." Anheuser-Busch, Inc. v. 24 Nat'l Beverage Distrib., 69 F.3d 337, 348 (9th Cir. 1995). Before imposing this harsh sanction, 25 however, district courts should consider the following factors: "(1) the public's interest in 26 expeditious resolution of litigation; (2) the court's need to manage its dockets; (3) the risk of 27 prejudice to the party seeking sanctions; (4) the public policy favoring disposition of cases on their 28 merits; and (5) the availability of less drastic sanctions." 23 Leon, 464 F.3d at 958 (quoting 1 Anheuser-Busch, 69 F.3d at 348). While the court is not required to make explicit findings 2 regarding each of the factors, dismissal is only proper if a finding of "willfulness, fault, or bad 3 faith" has been found. Anheuser-Busch, 69 F.3d at 348. The district court must also consider less 4 severe alternative sanctions rather than outright dismissal. 5 Here, the interests of expeditious resolution of the litigation have not been thwarted by 6 Plaintiff's conduct. While the file-deletion programs have created a considerable discovery issue, 7 the litigation has not been unnecessarily protracted. Even if this discovery dispute had not arisen, 8 other motions remained pending such that the parties were not ready to move into class discovery 9 sooner. Second, management of the Court's docket has not been disrupted – a trial date has not yet 10 been set and therefore the schedule has not required modification. While the Court has invested 11 significant time and resources into the parties' discovery dispute, it has not unduly impacted what 12 is already a very congested docket. Although the deletions have prejudiced Defendants in 13 presenting a full defense on their scope-of-consent defense, an adverse jury inference is an 14 alternative, less severe sanction that will adequately address Defendants' harm. Leon, 464 F.3d at 15 958 (district court must consider "less severe alternatives" than outright dismissal). Given the 16 existence of a curative and lesser sanction, dismissal is not warranted. 17 3. 18 As an alternative to terminating sanctions, Defendants seek the imposition of an adverse An Adverse Jury Inference is an Appropriate Sanction 19 jury inference instruction. The imposition of an adverse inference sanction is based on evidentiary 20 and policy rationales that seek to deter a party who has notice of an item's potential relevance to 21 the litigation from destroying it. A finding of bad faith is not required – even a finding of simple 22 negligence will suffice to support an adverse inference sanction. Glover, 6 F.3d at 1329. 23 Because an adverse inference sanction may be imposed with the minimum level of 24 culpability for the imposition of sanctions, the elements are the same as the threshold for imposing 25 any spoliation sanction: (1) the spoliating party had an obligation to preserve the evidence; (2) the 26 evidence was destroyed or significantly altered with a culpable state of mind; and (3) the evidence 27 was relevant to the other party's claim in that a reasonable trier of fact could find that it would 28 support that claim. Courts have recognized, however, that adverse inference sanctions are 24 1 nonetheless a harsh remedy. See, e.g., Apple II, 888 F. Supp. 2d at 993-994 (adverse jury 2 inference is a severe sanction that should not be given lightly). If the degree of culpability of the 3 spoliating party is not high, the prejudice to the non-spoliating party generally must be greater to 4 warrant this sanction. See id. at 992 (court should consider both degree of culpability of spoliater 5 and prejudice to non-spoliater in fashioning sanction). 6 a. 7 8 Plaintiff's Duty to Preserve Computer Data Was Triggered in August 2012 As discussed above, the duty to preserve Plaintiff's computer data was triggered when 9 Plaintiff consulted his attorneys regarding his claims in August 2012. Kitsap Physicians Serv., 10 314 F.3d at 1001; Graham v. Teledyne-Continental Motors, 805 F. 2d 1386, 1390 n.9 (9th Cir. 11 1987) (citing Bowmar Instrument Corp. v. Texas Instruments, Inc., 25 Fed. R. Serv. 423, 427 12 (N.D. Ind. 1977) for the proposition that sanctions are appropriate where the spoliating party 13 should have known it would be relevant in future litigation). Due to Job.com's obvious identity as 14 an internet company having to do with employment, Plaintiff's online job search, and information 15 that Job.com was responsible for the phone calls at issue, the link between the litigation and 16 Plaintiff's computer data should have been reasonably known by Plaintiff and his counsel when 17 they contemplated filing suit in August 2012. Plaintiff acted negligently by installing PC 18 Optimizer in November 2012, one month after the complaint was filed, which undisputedly 19 deleted Plaintiff's internet history and other computer data Defendants seek to discover. 20 Moreover, even if the duty to preserve evidence was not triggered in August 2012 or at the 21 time the suit was filed in October 2012, Plaintiff was instructed not to delete his computer data at 22 his deposition in October 2013. Thus, at the very latest, Plaintiff's duty to preserve his computer 23 data attached on that date. 24 25 b. Plaintiff Destroyed Relevant Computer Data Plaintiff confirmed at the hearing on September 24, 2014, that there is no evidence 26 Winclear was deleting data on Plaintiff's computer in 2012. While Plaintiff purchased Winclear 27 licenses in 2008 and 2009, those licenses had lapsed and he apparently had only an unregistered 28 version of Winclear on his computer in 2012, which was not capable of data deletion. PC 25 1 Optimizer was not installed until November 2012, one month after the lawsuit was filed. Thus, 2 Plaintiff's assertion that anything relevant would have been deleted long before the suit was filed is 3 incorrect. 4 Plaintiff disputes the legal merits of Defendants' scope-of-consent defense and whether 5 Plaintiff's internet searches could show the scope of Plaintiff's consent to receive calls about 6 educational opportunities. This dispute as to the merits of Defendants' scope-of-consent defense 7 does not preclude Defendants from conducting discovery in support of their defenses. Defendants 8 cannot be held to a particularly strict standard for showing relevance because the evidence was 9 destroyed by Plaintiff. Defendants contend Plaintiff consented to the calls at issue by providing 10 his phone number to Resume-Now, the nature or scope of the calls to which Plaintiff consented 11 remains a factual issue in dispute. For purposes of consent to Job.com's terms and conditions and 12 opting-in or out of telephone calls, Plaintiff states that he cannot recall visiting Job.com's website, 13 and Job.com can refute Plaintiff's assertion only by examining Plaintiff's computer website history 14 – which has, in large measure, been deleted. Thus, Defendants have articulated how the destroyed 15 evidence would have been helpful to proving their claims and have established its relevance. See 16 Pension Committee of Univ. of Montreal Pension Plan v. Banc of Am. Sec., LLC, 685 F. Supp. 2d 17 456, 467 (S.D.N.Y. 2010) (innocent party must show that the evidence would have been helpful in 18 proving its claims or defenses), abrogated by Chin v. Port Authority of New York & New Jersey, 19 685 F.3d 135 (2d Cir. 2012) (holding agency failure to institute litigation hold regarding certain 20 evidence did not constitute gross negligence per se). 21 Even if the duty to preserve did not arise until October 2013, Plaintiff has failed to show 22 relevant information was not deleted after that time. Plaintiff argues only that PC Optimizer 23 would have deleted any relevant evidence long before that time. Yet, Defendants' experts 24 recovered fragments of internet history from July 2012. Had PC Optimizer been uninstalled as of 25 Plaintiff's October 2013 deposition, it is likely that more relevant evidence would have been 26 preserved. As Plaintiff deleted his computer data, it is impossible for Defendants to prove when 27 and what was deleted. Plaintiff is not entitled to a presumption that the destroyed evidence was 28 not relevant or that anything relevant must have been destroyed during an earlier deletion purge by 26 1 PC Optimizer. Leon, 464 F.3d at 959 ("Moreover, because the relevance of . . . [destroyed] 2 documents cannot be clearly ascertained because the documents no longer exist, a party can hardly 3 assert any presumption of irrelevance as to the destroyed documents." (quoting Alexander v. Nat'l 4 Farmer's Org., 687 F.2d 1173, 1205 (8th Cir. 1982))). 5 6 c. Plaintiff's Spoliation Was Deliberate and Willful While Plaintiff's failure to preserve data prior to being instructed to do so in October 2013 7 was grossly negligent, according to Defendants, Plaintiff took additional measures to delete data 8 after the Court's order to turn over his hard drive for mirror imaging and forensic examination. 9 According to GDF, on January 16, 2014, Plaintiff re-installed a non-registered version of Winclear 10 already existing on his machine; on January 17, 2014, Plaintiff opened the Winclear log, deleted 11 its contents, saved the empty log, deleted the .txt Winclear to the recycle bin, and then emptied the 12 recycle bin. (Doc. 158-3, Carruso Decl. ¶ 14.) GDF also indicates that "an unusual amount of 13 activity" took place on Plaintiff's computer starting on January 10, 2014, regarding deletions of 14 data and reconfiguration of his computer. GDP opines that PC Optimizer was run by the user on 15 January 16, 2014, and deleted 2,318 files before the scan was cancelled, Plaintiff's disk 16 defragmenter was run on January 15, 2014, and January 17, 2014, and Chrome Internet browser 17 history was deleted on January 17, 2014. 18 Plaintiff's degree of culpability is quite high. First, the degree of deletion activity in the 19 week following the Court's order that Plaintiff's computer be turned over to a neutral expert is 20 suspect. A disc defragmentation was performed on January 15, 2014, and again on January 17, 21 2014. The Winclear program was initiated to scan the computer, its scan was deleted, and PC 22 Optimizer ran on an unscheduled date and time. 23 Second, and more importantly, even if PC Optimizer is responsible for the bulk of the 24 deletions, Plaintiff installed that program and willfully allowed it to continue to delete data. 25 Plaintiff's conduct in installing PC Optimizer after the duty to preserve was triggered in August 26 2012 and allowing it to continue to run during the course of the litigation even after he was 27 ordered on January 10, 2014, to turn his computer hard drive over to an expert for imaging was 28 deliberate and willful. The parties' experts understandably dedicate a great portion of their reports 27 1 debating explanations for how the deletions on January 16 and 17, 2014, occurred. But 2 notwithstanding the lengthy explanations, hypotheses, and technical jargon, the following remains 3 undisputed: (1) Plaintiff purchased file deletion programs for his computer – they did not appear 4 by virus; (2) Plaintiff installed both deletion programs; (3) Plaintiff installed PC Optimizer in 5 November 2012 after researching the program; and (4) Plaintiff allowed deletion programs to run 6 on his computer even after being admonished to save his computer data and after the court ordered 7 that his computer be turned over for mirror imaging. Allowing these programs to continue 8 deleting data was deliberate and willful conduct. While it is not conclusive as to Plaintiff's 9 subjective intent, i.e., whether he had a bad-faith intent to disrupt the litigation and prevent 10 Defendants from obtaining relevant evidence, Plaintiff was aware that he was deleting his 11 computer data and was willful and deliberate in failing to uninstall these programs or take any 12 affirmative steps to preserve his computer data. The ostrich did not bury its head in the sand by 13 accident. Although Plaintiff suggests7 he never knew or understood the real function of either of 14 15 these deletion programs, his conduct belies that assertion. Plaintiff purchased two licenses for 16 Winclear in 2008 and 2009; he purchased a license for PC Optimizer in November 2012 after 17 researching the program and took affirmative steps to install these programs on his computer. The 18 Court finds it implausible that Plaintiff would repeatedly purchase licenses for computer data 19 deletion programs of a similar type over a course of years, conduct computer research about PC 20 Optimizer, install these programs, and allow them to run over a large span of time yet not 21 understand what the programs did or how they functioned. Notably, Plaintiff's declaration stops 22 short of an unequivocal statement that he did not know that the programs deleted data. Rather, he 23 states he believed the programs could enhance the performance of his computer and could help 24 with "such things as spam, unwanted programs and damaged/corrupt files." (Doc. 164-10, Olney 25 Decl., ¶¶ 19-20.) 26 In the face of Plaintiff's deposition testimony, Plaintiff's suggestion he did not know these 27 28 7 The Court notes that Plaintiff's opposition briefs and declaration do not actually state that Plaintiff had no idea that Winclear and PC Optimizer delete computer data. Plaintiff's statements in this regard are far more equivocal. 28 1 programs deleted data is even more implausible. Plaintiff testified he took basic computer classes 2 while enrolled in college; after college he had training on "[b]asic programming of multiple 3 different programs, SAP, CMMS," and indicated he could "spend an hour talking about 4 computerized training." (Olney Depo., Doc. 158-6, p. 15:2-25.) Plaintiff explained that SAP and 5 CMMS programs were used by companies to manage finances and goods, as well as track work 6 orders. (Olney Depo., Doc. 158-6, 16:13-19.) Plaintiff also testified he received computer 7 training on internal software programs while employed with Frito Lay. This testimony 8 demonstrates Plaintiff had sufficient computer training to understand and appreciate the nature of 9 Winclear and Optimizer Pro, especially since he purchased, installed, and ran the programs for 10 years on his personal computer. 11 Moreover, Plaintiff took no steps to uninstall these programs after his deposition or after 12 the Court ordered him to produce his computer. In the face of direct commands to preserve his 13 computer data for purposes of the litigation, Plaintiff failed to take any steps to ascertain whether 14 the programs would jeopardize his preservation duties, and instead continued to allow the 15 programs to run and delete data. Even if Plaintiff did not manually initiate the deletions on his 16 computer between January 10, 2014, and January 17, 2014, he is indisputably responsible for the 17 installation of those programs on his computer and allowing them to delete data despite the 18 following: (1) an admonition from opposing counsel, (2) a production request for his computer 19 data, and (3) a court-order requiring that he produce the computer. And, while Plaintiff argues the 20 Court's January 10, 2014, order to produce his computer to a neutral expert does not expressly 21 require him not to use his computer, his duty to preserve the evidence on his computer is implicit. 22 A party's duty to preserve evidence is not necessarily triggered by an express court order or a 23 discovery request – it is triggered by some notice that the information is relevant to a potential 24 claim. See Wm. T. Thompson Co. v. Gen. Nutrition Corp., 593 F. Supp. 1443, 1455 (C.D. Cal. 25 1987). Notwithstanding that the duty to preserve the computer data was triggered long before 26 Plaintiff's deposition, by January 10, 2014, the computer data was the subject of an outstanding 27 discovery request and the subject of discovery production order. Plaintiff's duty to preserve the 28 computer data by January 10, 2014, was unquestionable. Yet, even on the day it was to be 29 1 produced, Plaintiff allowed over 2,000 files to be deleted from his computer. 2 Because fragments of files from 2012 and 2013 have been recovered by Defendants' 3 experts, it is not foregone that all potentially relevant evidence that Defendants seek was 4 necessarily deleted by January 10, 2014, or at any particular time after PC Optimizer was installed. 5 As Defendants note, it is clear that at least some file fragments escaped deletion; there is simply no 6 way to know the extent of what was deleted and when. 7 Plaintiff's negligence in installing PC Optimizer in November 2012 after the duty to 8 preserve was triggered in August 2012 grew to gross negligence by allowing the program to run 9 on his computer after he was expressly admonished to save his computer data at his October 2013 10 deposition. On January 10, 2014, the Court ordered Plaintiff to turn over his computer to a neutral 11 expert, and yet Plaintiff continued to allow PC Optimizer to delete data on his computer until the 12 very day the computer was produced. This conduct was not only deliberate and willful 13 disobedience of a court order, it was also willful and deliberate spoliation of evidence. If Plaintiff 14 was able to research,8 purchase, install, and run the program on his computer, he was most 15 certainly able to uninstall PC Optimizer. Instead of preserving data on his computer, Plaintiff did 16 absolutely nothing and in doing so, deliberately and willfully allowed the destruction of 17 potentially relevant evidence on his computer. 18 Plaintiff also contends that BCT deleted data after the computer was turned over by 19 Plaintiff, calling into question the entire mirror imaging process. In light of the date anomalies 20 noted by GDF, there is little evidence that anything was deleted by BCT in the imaging process. 21 Moreover, there is no dispute that Plaintiff purchased a deletion program, installed it while the 22 litigation was pending, and deliberately allowed it to continue to run up until the day it was 23 required to be turned over to BCT. No deletions by BCT ameliorate Plaintiff's conduct with 24 regard to PC Optimizer, nor is there sufficient evidence of deletion by BCT such that the entire 25 mirror imaging process is suspect. 26 /// 27 28 8 Plaintiff states in his declaration that after his Winclear program expired, he "began researching online for other software programs that could help [him] enhance the performance of [his] computer." (Doc. 164-10, Olney Decl., ¶ 19.) 30 1 2 d. Prejudice to Defendants Defendants argue they were irreparably prejudiced by the deletions. "The prejudice 3 inquiry 'looks to whether the [spoliating party's] actions impaired [the non-spoiling party's] ability 4 to go to trial or threatened to interfere with the rightful decision of the case.'" Leon, 464 F.3d at 5 959 (quoting Kahaluu Constr. Co., 857 F.2d at 604.) "In the Ninth Circuit, spoliation of evidence 6 raises a presumption that the destroyed evidence goes to the merits of the case, and further, that 7 such evidence was adverse to the party that destroyed it." Dong Ah Tire & Rubber Co., Ltd. v. 8 Glasforms, Inc., No. C 06-3359 JF, 2009 WL 1949124, at *10 (N.D. Cal. July 2, 2009) (citing 9 Phoceene Sous-Marine, S.A. v. U.S. Phosmarine, Inc., 682 F.2d 802, 806 (9th Cir. 1982)). If 10 spoliation is shown, the burden of proof logically shifts to the guilty party to show that no 11 prejudice resulted from the spoliation because that party is in a much better position to show what 12 was destroyed and should not be able to benefit from its wrongdoing. Hynix Semiconductor, Inc. 13 v. Rambus Inc., 591 F. Supp.2d 1038, 1060 (N.D. Cal. 2006), rev'd on other grounds, 645 F.3d 14 1336, 1344-47 (Fed. Cir. 2011). 15 Defendants contend that a remaining factual issue in the litigation is whether Plaintiff 16 consented to receive calls about educational opportunities from Defendants. Some of the 17 recovered data on Plaintiff's computer indicates he visited the University of Alabama website in 18 November 2012 and in December 2013 to obtain information about a training certification. 19 Evidence showing Plaintiff was searching for educational opportunities is relevant to the issue of 20 the nature of the calls to which Plaintiff consented. Because Plaintiff destroyed his computer data, 21 Defendants have been deprived of the complete scope of his website searches about educational 22 opportunities. 23 Plaintiff's declaration in support of his opposition to Job.com's motion for summary 24 judgment states he has no recollection of visiting Job.com's website, but some of the recovered 25 data on Plaintiff's computer indicate he viewed a job posting on Job.com's website in July 2012. 26 Had Plaintiff not destroyed his computer data, Defendants would have been able to investigate the 27 extent of Plaintiff's contact with Job.com's website, including the pages he viewed and whether he 28 visited pages that included the opt-out box regarding calls about educational opportunities. 31 1 Moreover, this evidence would also be relevant for purposes of impeachment. This data was 2 contained exclusively on Plaintiff's computer – Job.com has no record of Plaintiff's contact with 3 its website absent some interaction with the site that would generate and submit a form to 4 Job.com. 5 Other websites Plaintiff visited are also relevant because they may have similar consent 6 procedures to Job.com or offer registered users a similar opportunity to receive calls about 7 educational opportunities. If Plaintiff visited these websites, such evidence may be 8 circumstantially relevant to the scope of Plaintiff's consent to be contacted when he interacted with 9 Job.com through Resume-Now. While Plaintiff argues none of this evidence can possibly be 10 relevant to show his prior express consent under the TCPA, this contention is a dispute over the 11 merits of Defendants' defense, not a basis to preclude discovery of evidence relevant to 12 Defendants' chosen defense. 13 Plaintiff's deletion of his computer data has prejudiced Defendants' ability to present a full 14 defense on the scope-of-consent issue, and threatens to interfere with the rightful decision of the 15 case. See Leon, 464 F.3d at 959 (prejudice hinges on whether spoliation impaired the other party's 16 "ability to go to trial or threatened to interfere with the rightful decision of the case"). Plaintiff 17 argues that its expert has indicated it may be possible to recover some of the deleted files, and 18 contends the only reasonable sanction, if one is warranted at all, is to require Plaintiff to pay for 19 the recovery of any relevant files that may be deleted. This, however, does not cure the prejudice 20 suffered by Defendants. Even if some data can be recovered, there is no way to know whether all 21 of it was recovered; similarly, it would remain a mystery whether unrecovered files ever existed or 22 whether the files simply could not be recovered. Such a recovery effort does not guarantee 23 recovery of all files, and does not cure the harm to Defendants. 24 25 e. An Adverse Inference is an Appropriate Sanction As Plaintiff's culpability and Defendants' degree of harm is high, an adverse inference is 26 warranted. An adverse inference jury instruction is a less-harsh sanction that dismissal and 27 because it can adequately address Defendants' harm, it is an appropriate sanction. 28 The adverse instruction itself can take many forms, which can range in degree of 32 1 harshness. See generally Pension Comm., 685 F. Supp. 2d at 470 (S.D.N.Y. 2010). In Pension 2 Committee, the court explained that at its harshest, where a party has acted with bad faith, the jury 3 may be instructed that certain facts are deemed admitted and must be accepted as true. Where a 4 party has spoliated evidence willfully or recklessly, a court may impose a mandatory presumption 5 which can be rebutted. The least harsh instruction permits – but does not require – the jury to 6 presume lost evidence is both relevant and favorable to the innocent party. 7 As discussed above, Plaintiff's degree of culpability grew during the course of the litigation 8 and his failure to preserve data in the face of pending discovery requests and a court order to 9 produce data was willful and deliberate. Because there is no way to ensure that the full extent of 10 the destroyed computer data can be recovered or obtained from another source, only a strongly 11 worded jury inference will adequately address the harm to Defendants. A rebuttable presumption 12 inference will not address evidence Plaintiff chooses to introduce to attempt to rebut the 13 presumption – leaving Defendants in the same position and without the evidence they need to 14 adequately present their scope-of-consent defense. See Leon, 464 F.3d at 960 (affirming district 15 court's finding that fashioning a jury instruction creating a presumption in favor of the non16 spoliating party would leave that party equally helpless to rebut any material that the spoliating 17 party may use to overcome the presumption). The Court orders the jury be instructed as follows: 18 19 20 21 Plaintiff has failed to prevent the destruction of relevant evidence for Defendants' use in this litigation. This is known as the “spoliation of evidence.” I instruct you, as a matter of law, that Plaintiff failed to preserve evidence after his duty to preserve arose. This failure resulted from his failure to perform his discovery obligations. 22 23 24 25 26 27 You shall presume that Defendants have met their burden of proving the following two elements by a preponderance of the evidence: first, that relevant evidence was destroyed by Plaintiff after the duty to preserve arose. Evidence is relevant if it would have clarified a fact at issue in the trial and otherwise would naturally have been introduced into evidence; and second, the lost evidence was favorable to Defendants. Whether this finding is important to you in reaching a verdict in this case is for you 28 33 to decide.9 1 2 C. As Plaintiff spoliated evidence both prior to the Court's January 10, 2014, order and after 3 4 5 6 7 the Court's January 10, 2014, order, the Court is empowered to order monetary sanctions under both its inherent powers as well under Rule 37(b)(2)(C). Plaintiff willfully and deliberately allowed the destruction of computer data on his computer after the Court ordered that it be produced to a neutral expert. Monetary sanctions are warranted under Rule 37(b)(2)(C). Both Defendants are entitled to their reasonable attorney fees. 8 9 10 Monetary Sanctions Are Warranted submitted the fees and costs it incurred in filing its motion for sanctions, Job.com requests that it be permitted to file declarations to support its request for attorneys' fees and costs. V. 11 14 15 triggered, and he did so with a culpable state of mind. In considering the appropriate sanction, the Court finds Plaintiff acted willfully and deliberately, Defendants were severely prejudiced, and only a strongly worded adverse inference will cure the harm suffered. Accordingly, IT IS HEREBY ORDERED that: 16 1. 18 Defendants' motion for a spoliation sanction of dismissal is DENIED; 2. 17 Defendants' alternative motion for a spoliation sanction in the form of an adverse jury inference is GRANTED; 19 3. 20 21 I instruct you, as a matter of law, that Plaintiff failed to preserve evidence after his duty to preserve arose. This failure resulted from his failure to perform his discovery obligations. 23 24 25 27 28 The following adverse inference jury instruction shall be given to the jury: Plaintiff has failed to prevent the destruction of relevant evidence for Defendants' use in this litigation. This is known as the “spoliation of evidence.” 22 26 CONCLUSION AND ORDER Plaintiff spoliated relevant data on his computer after the duty to preserve had been 12 13 While Windy City You shall presume that Defendants have met their burden of proving the following 9 This instruction is modeled after that crafted by U.S. Magistrate Judge Grewal in Apple, Inc., 881 F. Supp. 2d at 1151. The district court modified this instruction upon review. Apple II, 888 F. Supp. 2d 976, 1000 (N.D. Cal. 2012). Here, because of the unrecoverable nature of Plaintiff's complete computer data, this strongly worded inference is necessary to cure the harm suffered by Defendants. A rebuttable presumption would not fully address Defendants' harm and would leave them in much the same position for purposes of presenting evidence at trial. 34 1 2 3 4 5 6 two elements by a preponderance of the evidence: first, that relevant evidence was destroyed by Plaintiff after the duty to preserve arose. Evidence is relevant if it would have clarified a fact at issue in the trial and otherwise would naturally have been introduced into evidence; and second, the lost evidence was favorable to Defendants. Whether this finding is important to you in reaching a verdict in this case is for you to decide. 4. Defendants' request for monetary sanctions is also GRANTED, and the parties shall 7 submit their billing statements and cost statements in support of their request within 8 20 days from the date of this order. 9 10 11 IT IS SO ORDERED. 12 13 Dated: October 24, 2014 /s/ Sheila K. Oberto UNITED STATES MAGISTRATE JUDGE 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 35

Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.


Why Is My Information Online?