Keating et al v. Jastremski et al
Filing
467
ORDER (1) Adopting Special Master's Report and Recommendation, (2) Granting motion for terminating sanctions, and (3) Entering Default (Docs no. 157 , 442 ). Signed by Judge M. James Lorenz on 4/09/2020. (jpp)
1
2
3
4
5
6
7
8
UNITED STATES DISTRICT COURT
9
SOUTHERN DISTRICT OF CALIFORNIA
10
JEREMY L. KEATING ET AL.,
11
12
Plaintiffs,
v.
13
14
JOHN A. JASTREMSKI ET AL.,
15
Defendants.
16
17
CASE NO. 3:15-cv-00057-L-AGS
ORDER (1) ADOPTING SPECIAL
MASTER’S REPORT AND
RECOMMENDATION, (2)
GRANTING MOTION FOR
TERMINATING SANCTIONS, AND
(3) ENTERING DEFAULT
(Docs no. 157, 442)
AND RELATED CROSS-ACTIONS.
18
19
In this action alleging misappropriation of trade secrets, pending before the
20
Court is a motion for terminating sanctions for spoliation of evidence filed by
21
Defendant John A. Jastremski and Defendant/Counterclaimant The Retirement Group,
22
LLC (“TRG”) against Plaintiffs/Counter-Defendants Jeremy Keating, Richard P.
23
Gigliotti and Alexander J. Mele (collectively, “the Keating Group”), as well as
24
Counter-Defendants Securities America, Inc. ("SAI"), Lloyd J. Silvers, Steven Dalton
25
and Ardent Retirement Planning, LLC (“Ardent;” Silvers, Dalton and Ardent are
26
referred to collectively as “the Ardent Group”).1 (Doc. no. 157). The Court appointed
27
28
1
A settlement reached in April 2019 disposed of all claims between the Keating
Group, SAI and Jastremski. (See doc. no. 436 (Klein Decl.) at 2; see also docs. no.
1
1
Hon. Ronald S. Prager (Ret.) as the Special Master pursuant to Rule 53 of the Federal
2
Rules of Civil Procedure to prepare a report and recommendation. (Docs. no. 316,
3
323.) Pending before the Court is TRG’s motion to adopt the Special Master’s report
4
and recommendation (docs. no. 428, 440 (redacted), "Recommendation”) pursuant to
5
Rule 53(f). (Doc. no. 442.) The Ardent Group filed an opposition, and TRG replied.
6
For the reasons that follow, the motion is granted, the Recommendation is adopted,
7
and TRG’s underlying motion for terminating sanctions is granted.
8
I.
BACKGROUND
9
TRG is a registered investment advisor with the Securities and Exchange
10
Commission (“SEC”). Ardent is TRG’s competitor. Through its affiliated investment
11
advisors, TRG provides asset management services to wealthy retirees who receive
12
large lump-sum employer distributions upon retirement. To trade securities on behalf
13
of clients, investment advisors use the services of registered broker dealers. TRG’s
14
broker dealer is First Securities Corporation (“FSC”). Ardent’s broker dealer is SAI.
15
Jastremski owns TRG, while Dalton is the head of Ardent and principal of SAI.
16
Members of the Keating Group and Silvers were TRG’s investment advisors before
17
they transferred to Ardent and SAI.
18
TRG compiles a proprietary data base of prospects and reaches out to them
19
through advertising and seminars. Fewer than five percent (5%) of prospects become
20
TRG’s clients. TRG’s client data base includes extensive personal information to
21
effectively serve the clients’ needs (“Salesforce database”). This information enables
22
TRG’s investment advisors to build client relationships and retain clients. TRG took
23
extensive security measures to keep the Salesforce database confidential. TRG’s
24
employees, including the Keating Group and Silvers, signed agreements with TRG,
25
prohibiting them from using or disclosing confidential information. Furthermore,
26
///
27
28
402, 403, 407, 408.) Accordingly, TRG remains as the moving party and the Ardent
Group members remain as the opposing parties.
2
1
TRG’s privacy policy precluded its employees from taking certain proprietary
2
information when they terminated their employment with TRG.
3
According to TRG, Dalton organized a conspiracy to steal TRG’s proprietary
4
prospect and client information by soliciting Silvers and the members of the Keating
5
Group to transfer to Ardent and SAI and bring this information with them. In 2013,
6
Silvers left TRG to join Dalton and a group of investment advisors who eventually
7
formed Ardent. In October or November 2014, the Keating Group members struck a
8
deal with Ardent’s broker dealer SAI. Although the members of the Keating Group
9
were preparing to leave TRG in the spring of 2015, they were terminated on January
10
10, 2015, when TRG discovered they were connected to suspicious downloads of TRG
11
data. Accordingly, the Keating Group transferred to Ardent and SAI in January 2015.
12
TRG contends that Silvers and the Keating Group surreptitiously downloaded TRG’s
13
proprietary information before their departure and transferred it to Ardent.
14
On January 12, 2015, members of the Keating Group filed this action against
15
Jastremski and TRG. (Doc. no. 1 (“Complaint”).) They sought a declaratory judgment
16
because they feared TRG would sue them for misappropriation of trade secrets and
17
obtain a preliminary injunction against them arising from their departure.2 (Id. at 2, 5,
18
8.) TRG and Jastremski filed a counterclaim against the Keating Group, the Ardent
19
Group, SAI and others for misappropriation of trade secrets and other tort and contract
20
claims. (See docs. no. 24, 106.)
21
After more than two years of litigation, including frequent discovery disputes
22
and motions for sanctions, TRG and Jastremski moved for terminating sanctions
23
contending that the Keating Group, SAI, and the Ardent Group engaged in discovery
24
abuses, lying under oath, and destruction of evidence. The Court appointed the Special
25
Master to prepare a report and recommendation. The Special Master held a six-day
26
27
evidentiary hearing. During the proceedings, the Keating Group and SAI settled and
///
28
2
The complaint was subsequently amended. (See doc. no. 17.)
3
1
were dismissed. (See fn. 1 supra.) Accordingly, only sanctions against the Ardent
2
Group remain at issue.
3
After considering voluminous briefing, evidence, including live testimony, and
4
extensive argument, the Special Master found for TRG. He concluded that members
5
of the Ardent Group “intentionally and maliciously” destroyed evidence
6
(Recommendation at 11), and recommended granting TRG’s motion and striking the
7
Ardent Group’s answers. The Ardent Group objects. (See docs. no. 443, 445, 453.) In
8
the absence of a stipulation to the contrary, de novo standard of review applies to these
9
objections. Fed. R. Civ. Proc. 53(f).
10
II.
11
DISCUSSION
Federal courts have inherent authority to sanction a party who engaged in
12
spoliation of evidence. Leon v. IDX Sys. Corp., 464 F.3d 951, 958 (9th Cir. 2006).
13
Litigants engage in “spoliation of documents as a matter of law only if they had some
14
notice that the documents were potentially relevant to the litigation before they were
15
destroyed.” United States v. Kitsap Physicians Serv., 314 F.3d 995, 1001 (9th Cir.
16
2002).3 “Moreover, because the relevance of destroyed documents cannot be clearly
17
ascertained because the documents no longer exist, a party can hardly assert any
18
presumption of irrelevance as to the destroyed documents.” Leon, 464 F.3d at 959
19
(ellipsis and brackets omitted).
20
Terminating sanctions are warranted when “a party has engaged deliberately in
21
deceptive practices that undermine the integrity of judicial proceedings.” Anheuser-
22
Busch, Inc. v. Natural Beverage Distributors, 69 F.3d 337, 348 (9th Cir. 1995)
23
(dismissal); see also Televideo Sys’s, Inc. v. Heidenthal, 826 F.2d 915 (9th Cir. 1987)
24
(default). The following factors should be considered before imposing the “harsh
25
sanction” of terminating a party’s claims or defenses:
26
(1) the public's interest in expeditious resolution of litigation; (2) the
court's need to manage its dockets; (3) the risk of prejudice to the party
27
28
3
Unless otherwise noted, internal quotation marks, citations, and footnotes are
omitted throughout.
4
1
seeking sanctions; (4) the public policy favoring disposition of cases on
their merits; and (5) the availability of less drastic sanctions.
2
3
While the district court need not make explicit findings regarding each of
these factors, a finding of willfulness, fault, or bad faith is required for
dismissal to be proper. Additionally, the district court must consider less
severe alternatives than outright dismissal.
4
5
6
7
Leon, 464 F.3d at 958; see also Rio Properties, Inc. v. Rio Int’l Interlink, 284 F.3d
8
1007, 1022 (9th Cir. 2002) (applying same factors to sanction of default).
A.
9
Destruction of Evidence
1.
10
The Ardent Group’s Plan to Destroy Evidence
The Special Master found that destruction of evidence was part of a deliberate
11
12
plan in anticipation of litigation. (See, e.g., Recommendation at 10-13.) Upon review
13
of the record, the Court adopts this finding.
In showing that destruction of evidence was a part of the Ardent Group’s plan,
14
15
TRG relies in part on testimony provided by Michael Dalton.4 He testified that in
16
2012, Dalton was actively recruiting TRG staff and financial advisors with the intent to
17
also obtain as much of TRG’s confidential client database as possible. (M. Dalton
18
Decl. at 1-3, 8.)5 He retained M. Dalton as an experienced recruiter. (M. Dalton Decl.
19
at 1; Dalton at 1165, 1240-43, 1246-47.6)
Silvers was a financial advisor at TRG. (Silvers at 1030.) M. Dalton put him in
20
21
touch with other advisors who wanted to start a new firm, which eventually became
22
Ardent. (Silvers at 1031-32.) The purpose of Ardent was to generate leads (prospects
23
24
25
26
27
28
4
To distinguish between Dalton (Steven Dalton), who is a party to this case, and
Michael Dalton, who is not, the Court refers to Michael Dalton as M. Dalton.
M. Dalton’s declaration is found in doc. no 456-1 at 550-62. Page references in
the text above are to the page numbers in the declaration.
5
6
All citations to witnesses by name only are to their testimony in the Special
Master proceedings. Transcripts can be found in docs. no. 404-8 through 404-10
(transcript pages 1-883) and docs. no. 432-1 through 432-3 (transcript pages 8841642.) Page references are to the page numbers in the transcript.
5
1
and clients) for investment advisors at SAI. (Dalton at 1161; see also Dalton at 1158,
2
1164-65, 1171-72.) After Silvers resigned from TRG in May 2013, Dalton encouraged
3
him to recruit other TRG staff and advisors, including the Keating Group. Silvers
4
obliged. (Dalton at 1286-87, 1334-35; see also Silvers at 1030, 1032; M. Dalton Decl.
5
at 4; Dalton at 1204.) Already in July 2013, Silvers was communicating with Keating
6
regarding his departure from TRG. (Silvers at 1102-04). Once the Keating Group
7
started working for Ardent and SAI, Dalton was paid a percentage of their income.
8
(Dalton at 1285.) If the Keating Group members brought more TRG prospect and
9
client information to Ardent than they lawfully could, that inured to the Ardent
10
Group’s benefit. (Dalton at 1293.)
11
M. Dalton, who was present at the formation of Ardent “day in, day out”
12
(Dalton at 1240), testified about several conference calls with Silvers, Dalton and their
13
associates. (M. Dalton Decl. at 2, 4; Dalton at 1301 (M. Dalton was on weekly
14
conference calls).) They recognized already in 2013 that their activities may invite a
15
lawsuit from Jastremski and TRG. (M. Dalton Decl. at 2, 4.) They held regular
16
conference calls discussing recruitment, TRG’s prospect/client database and related
17
topics. (M. Dalton Decl. at 3, 5, 11, 12; see also M. Dalton Dep.7 at 234, 373
18
(conference calls).) The decision to communicate via conference calls as opposed to
19
emails was deliberately made to avoid creating documents which could be used against
20
them in future litigation. (M. Dalton Dep. at 372-73; M. Dalton Decl. at 6.)
21
Once the Keating Group advised Silvers and Dalton in February 2014 of their
22
intent to transfer to Ardent and SAI, they joined in monthly conference calls, which
23
included discussing litigation risk with input from legal counsel. (M. Dalton Decl. at
24
5-6; M. Dalton Dep. at 168-69; Dalton at 1335-37 (referencing potential litigation in
25
April and June 2014); see also Silvers at 1109 (in March 2014, Silvers was arranging
26
for a meeting between Keating and Dalton).) They were certain that TRG and
27
28
Excerpts from M. Dalton’s deposition are found in docs. no 456-1 at 318-362
and 453-2 at 34. Page references in the text above are to the page numbers in the
deposition transcript.
6
7
1
Jastremski would file a lawsuit against them. (M. Dalton Dep. at 169.) A pre-emptive
2
lawsuit against TRG upon the Keating Group’s departure was a part of the transition
3
plan. (M. Dalton Decl. at 7.)
4
The conference calls included discussion of taking detailed, not publicly
5
available client and prospect information from TRG as part of the Keating Group’s
6
transition. (M. Dalton Decl. at 10, 11; M. Dalton Dep. at 249-50, 266-67, 374.) In
7
early 2015, they also discussed destruction of evidence by referring to destroyed
8
documents as “lost” or “unable to locate,” removing links to Ardent’s database, and
9
removing or relocating Google Drive data. (M. Dalton Decl. at 12; see also M. Dalton
10
Dep. at 270-72.) Among other things, Dalton instructed the Keating Group to wipe
11
data from their phones. (M. Dalton Decl. at 12.) The data he was referring to was the
12
data the Keating Group downloaded from the TRG database. (M. Dalton Decl. at 12.)
13
Ardent’s database was stored on zoho.com (“Zoho database”). (Silvers at 1038.)
14
The Zoho database contained different categories of data, including prospects and
15
clients. (Dalton at 1207-08; see Silvers at 1092.) The information surreptitiously
16
downloaded from TRG’s database was loaded into cloud storage accounts, initially
17
Dropbox and Google Drive, before it was uploaded into the Zoho database. 8 (M.
18
Dalton Decl. at 8-11; see also Silvers at 1128 (admitting that Keating’s TRG contract
19
was sent via Dropbox because they didn’t want Jastremski to know); see also Dalton at
20
1299-300 (Mele and his assistant, Tina Abernathy,9 used Google Drive as a cloud drive
21
to transition Mele’s book of business from TRG to Ardent).)10 Data on Google Drive
22
23
24
25
8
Other cloud storage service providers mentioned in this Order are OneDrive and
box.com. Cloud storage can be accessed either by using software or links on the
computer to synchronize the computer with the cloud storage account, or by logging
directly into the cloud storage account using a web browser. (Sevel at 345.) In this
case, data stored in the cloud could also be accessed on zoho.com. (Silvers at 1038.)
26
9
27
10
28
See also infra pp.16, 20.
Mele’s email exchange with Silvers corroborates this. On November 7, 2014,
when Mele had already decided to leave TRG, he wrote they were “building a Google
Drive to address [transition questions].” (Silvers at 1129-30 (referencing TRG Exh.
256).) “TRG Exh.” refers to TRG’s exhibits in the Special Master proceeding. They
are found in docs. no. 404-1 through 404-6.
7
1
was later transferred to OneDrive. (Silvers at 1038.) In their conference calls, Dalton,
2
Silvers, the Keating Group and their associates referenced the use of fictitious email
3
addresses to avoid detection of the surreptitious data transfers from TRG, discussed
4
removal of links to the Zoho and Google Drive accounts, and moving data stored on
5
Google Drive to other cloud storage (M. Dalton Decl. at 11, 12; M. Dalton Dep. at
6
261-62, 269) to avoid “any footprints in the sand” or “popcorn trail” (M. Dalton Dep.
7
at 270-72).
8
The Ardent Group argues that M. Dalton, their former co-conspirator, should not
9
be believed because TRG paid him for his testimony. (Doc. no. 453 (“Ardent Opp’n”)
10
at 9, 10.)11 M. Dalton was a recruiter who worked for TRG and Ardent’s broker dealer
11
SAI. (M. Dalton Decl. at 1, 12.) TRG caught him soliciting TRG staff and advisors,
12
including those he had previously recruited for TRG and for whom TRG had paid him
13
commissions. (M. Dalton Decl. at 12.) His declaration dated December 22, 2016, as
14
well as discovery of all of his electronic devices, were provided in exchange for a
15
release. His deposition was taken thereafter. (M. Dalton Decl. at 13; M. Dalton Dep.;
16
Silvers at 1134-35.)
17
M. Dalton was employed by TRG on a contract basis and was paid a
18
commission when someone he recruited joined the firm. (M. Dalton Dep. at 23.)
19
When he settled with TRG in December 2016, TRG offered him a draw he could use
20
on an as-needed basis.12 (M. Dalton Dep. at 24-25.) Draws are a pre-payment of
21
commission. (M. Dalton Dep. at 24.) He had a right to draw up to $5,000 per month
22
before he earned a commission. (M. Dalton Dep. at 24.) When one of his prospects
23
joined the firm, the draws were deducted from the commission he earned. (M. Dalton
24
///
25
26
27
28
11
Unless otherwise noted, page references to docket entries are to the page
numbers assigned by the Electronic Case Filing System.
12
43.)
M. Dalton had a similar arrangement with Ardent and/or SAI. (Dalton at 12428
1
Dep. at 24.) M. Dalton took the draw for approximately four months and had not yet
2
paid it off at the time of his deposition. (M. Dalton Dep. at 25.)
3
The Court agrees with the Special Master that “use of accomplice testimony . . .
4
is to be carefully scrutinized.” (TR at 1549.)13 With this in mind, the Court reviewed
5
the totality of the evidence presented to the Special Master to determine whether M.
6
Dalton’s testimony is corroborated.
7
The disputed points of M. Dalton’s testimony are corroborated by conference
8
call agendas printed on Ardent letterhead as well as by Dalton’s own email messages.
9
For example, when the Keating Group members were preparing to leave TRG, a
10
December 17, 2014 conference call agenda includes the following items: “Load into
11
databases and cloud before exit;” “Minimize discoverable and subpoenas;” “lawsuit
12
preparation,” and “JK, RG and AM Questions.”14 (TRG Reply Exh. 567.)15 On
13
January 9, 2015, the day before the Keating Group members were fired from TRG for
14
suspicious download activity, Dalton emailed Keating under subject line “Questions” a
15
list including the following, “Details or draft on [sic] resignation letter;” “Do we file
16
for a pre-emptive TRO?” “When do the staff leave? Same time? Before?” “FSC
17
database is not as updated as Sales Force, can we use Sales Force;” “Sales Logix data
18
on phone. Should we wipe the phones? Contacts on phone?” (TRG Reply Exh. 68.)
19
Two months later, the March 9, 2015 conference call agenda lists “Keating doc
20
disposal” as one of the items to discuss. (TRG Reply Exh. 739.) The foregoing
21
exhibits corroborate the crucial points in M. Dalton’s testimony. (See also TR at 1562-
22
63.)
23
///
24
25
26
27
28
References to “TR” are to the transcripts of the Special Master proceedings (see
fn. 6 supra) insofar as they do not reference witness testimony but, for example the
Special Master’s or counsel’s comments. Page references in the text above are to the
page numbers in the transcript.
13
14
JK, RG and AM are initials of the Keating Group members Jeremy Keating,
Richard Gigliotti, Alexander Mele.
15
TRG’s Reply Exhibits are found in doc. no. 456-1.
9
1
The Ardent Group next contends that the December 17, 2014 and March 9, 2015
2
conference call agendas were falsified. (Ardent Opp’n at 13; Silvers at 1073-74, 1098;
3
Dalton at 1310.) This contention is rejected for three reasons. First, although the
4
agendas were introduced at M. Dalton’s deposition on June 14, 2017 (M. Dalton Dep.;
5
Silvers at 1075), the Ardent Group waited for more than a year and a half before
6
raising the issue for the first time in passing in February 2019 (Silvers at 1079; see also
7
TR at 1369 (Special Master, Sayyar)).16 Second, on May 14, 2019, the Ardent Group
8
filed a motion for terminating sanctions against TRG contending that six documents,
9
including the conference call agendas, were falsified. (Doc. no. 410.) Magistrate
10
Judge Andrew G. Schopler entertained voluminous briefing and oral argument. He
11
denied the motion because he found that the Ardent Group did not meet its burden of
12
proof that the documents were falsified. (Doc. no. 441; see also transcript of the
13
ruling, referenced in doc. 441.) The Ardent Group did not object to this ruling. See
14
Fed. R. Civ. Proc. 72. Finally, the conference call agendas are consistent with
15
Dalton’s email discussed above.
16
17
Based on the foregoing, the Court adopts the Special Master’s finding that the
Ardent Group formed a deliberate plan to destroy evidence in anticipation of litigation.
18
2.
19
Deletion of Computer Files
The Special Master further found that the Ardent Group deleted or caused the
20
deletion of extensive electronic evidence, including metadata. (See Recommendation
21
at 9, 11, 13.) Upon review of the record, the Court adopts this finding.
22
The finding is supported by the testimony of TRG’s computer forensic expert
23
Allan Sevel. Sevel and the Keating Group’s computer forensic expert Ashraf Massoud
24
testified in the Special Master proceeding. Sevel forensically imaged and reviewed the
25
electronic devices from the Keating Group and Silvers. Among other things, he looked
26
27
28
16
When Silvers raised the issue again more specifically in the opening statements
and testimony in the Special Master proceedings on April 15, 2019 (see TR 1078,
1083, 1369), Special Master was skeptical of his protestations of falsity. (See, e.g., TR
at 1083-86, see also id. at 1368-69.)
10
1
for information involving cloud storage and file access. Massoud reviewed Sevel’s
2
report and evaluated his images of the computer data.
3
4
On December 26, 2014, before meeting Silvers at Ardent’s offices, Mele
exchanged the following messages with Silvers:
5
Mele:
Silvers:
6
“Gonna bring my laptop (personal) and TRG.”
“Yeah . . . feel free to leave the TRG one”
7
(TRG Reply Ex. 259; see also Mele Dep. at 285.)17 Sevel concluded that over 1,000
8
files were deliberately deleted from Mele’s laptop in one day -- on January 12, 2015,
9
the same day the Keating Group filed this action and two days before the laptop was
10
turned over to Sevel. (TRG Exh. 902 (“Sevel Report”) at 5, Exh. 900 (“Massoud
11
Report”) at 8.) The number of deletions on January 12, 2015, was grossly
12
disproportional to the rate of one to three deletions per day prior to that. (Sevel Report
13
at 5.) Many of the deleted files were TRG-related user files, which cannot be
14
recovered. (Sevel 338, 380-81; see also id. at 340-41, Sevel Report at 5, Massoud at
15
393 (files moved to trash folder).)18
16
With respect to Keating’s laptop, Sevel found that many files had been deleted
17
and could not be recovered. (See also Massoud at 390, 400.)19 Present on the laptop
18
was evidence of LNK files. An LNK file is a shortcut that points to another file at a
19
specific location. (Sevel at 320; Massoud at 389.) LNK files can be used to locate
20
files on the computer or in a cloud storage account such as Google Drive. (Sevel at
21
345-46.) The significance of an LNK file is that it shows information about the
22
///
23
24
25
26
27
28
Excerpts from Mele’s deposition of are found in doc. no 456-1 at 204-14. Page
references in the text above are to the page numbers in the deposition transcript.
17
18
Files are not automatically transferred to the trash folder. A user must transfer
them. (Sevel at 335.)
19
Massoud was tasked with recovering 27 specific files which had been deleted
from Keating’s laptop. Of those, he could only recover two. (Massoud at 390, 400.)
11
1
destination file, such as the date it was created and probably the date it was last
2
modified.20 (Sevel at 348.)
3
Specifically, Keating’s laptop contained LNK files which showed that other files
4
had been there before, but no longer existed and could not be recovered. (Sevel at 322,
5
348.) They also showed he had frequently accessed a Dropbox account. (Sevel at
6
320.) His laptop had a Dropbox file folder. (Sevel at 320.) A Dropbox file folder is
7
created when a user synchronizes his or her computer with a Dropbox account. (Sevel
8
at 320.) The resulting folder contains the files stored in the Dropbox account. (Sevel
9
at 320.) Although numerous LNKs on Keating’s laptop pointed to Dropbox files, his
10
Dropbox file folder was empty. (Sevel at 320-21.) While some of the files were
11
found in other locations on his laptop, others could not be found at all and are not
12
recoverable. (Sevel at 321, 323.)
13
One of the main folders in Keating’s Dropbox folder was named TRG. (Sevel at
14
324, 347.) It listed names of subfolders and files which were no longer present. (Sevel
15
at 324, 347.) One of the unrecoverable files was named
16
“C:\users\Jeremy.Keating\Dropbox\TRG\upload to Salesforce\silver to Keating
17
transfer.” (Sevel at 324.) A file with exactly the same name was found on one of
18
Silvers’ computers. (Sevel at 348-49.) The last time Keating accessed the Dropbox
19
account was November 2014. (Sevel at 321.)
20
Keating’s laptop also showed he accessed a Google Drive account, as evidenced
21
by the presence of LNKs; however, the files the LNKs were pointing to could not be
22
recovered. (Sevel at 322, 324.)
23
The foregoing forensic evidence corroborates M. Dalton’s testimony that prior
24
to filing this action, the Keating Group and the Ardent Group used cloud storage
25
///
26
27
28
20
Although an LNK file does not include the contents of the file it points to
(Massoud at 389), it is significant for the information it can provide about that file, i.e.,
metadata (see Sevel at 348).
12
1
accounts for their transfer of data from TRG to Ardent, and that the evidence of
2
transfer was intentionally destroyed.
3
TRG further claims that destruction of evidence continued after this action was
4
filed. On March 23, 2015, TRG and Jastremski filed a counterclaim which named a
5
number of counter-defendants, including Silvers, Dalton and Ardent. (Doc. no. 24.)
6
On March 26, Matt Nelson, Ardent’s “IT guy” (Nelson Decl. at 2),21 sent the following
7
message to Silvers: “Throw that tower and laptop in your car. I have an extra hard
8
drive you can have if I need to copy any personal files before cleaning them.” (TR at
9
1132.) Although Silvers denies “cleaning” refers to deleting files, when the message is
10
considered in the context of all the evidence, it strongly suggests that files were deleted
11
from Silvers’ computers in anticipation of discovery.
12
Silvers told M. Dalton that the computers used to store the data taken from TRG
13
were destroyed in 2015. (M. Dalton Decl. at 12; M. Dalton Dep. at 302-03.) In the
14
summer-fall of 2015, when this case entered the discovery stage and the Keating
15
Group’s motion for partial summary judgment was being briefed, “[e]veryone was
16
running for cover and destroying evidence that they . . . took any TRG material.” (M.
17
Dalton Dep. at 384.) They wanted to conceal any “footsteps in the sand . . . that could
18
link them back to being a part of taking proprietary information.” (M. Dalton Dep. at
19
20
21
22
23
24
25
26
27
28
Nelson’s declaration, filed in support of the Ardent Group’s opposition, can be
found in doc. no. 453-2 at 63-64. Page numbers in the text above are the page
numbers in his declaration.
21
Nelson was TRG’s “IT guy” before transferring to Ardent in April 2013. (M.
Dalton Dep. at 75; Nelson Decl. at 2.) He was a “data miner” in that he did research to
find client prospects first for TRG and later also for Ardent. (Nelson Decl. at 2;
Silvers at 1035, 1140-41; Dalton at 1245-46.) In 2012, while Nelson was still at TRG,
Dalton paid him for financial advisor data for recruitment purposes. (M. Dalton Dep.
at 76, 376; Nelson Decl. at 2; Dalton at 1246-47.) Later, Dalton enticed him to steal
TRG customer and contact data for [the Keating Group].” (M. Dalton Dep. at 373-74;
M. Dalton Decl. at 6; see also, e.g., Silvers at 1113-14 (“leads” and referencing TRG
Exh. 731).) Although Dalton and Nelson deny that Nelson provided client and
prospect data to Ardent while he still worked for TRG, his own email messages
contradict that statement. (Cf. Nelson Decl. at 2 & Dalton at 1247 with TRG Exh.
731.)
13
1
384.) For example, on August 16, 2015, a message between Dalton and two of his
2
associates states: “FYI, given discovery requests from [Jastremski], we will not be
3
putting [illegible exhibit scan] prospects in Ardent CRM. We do not want any emails,
4
etc linking with Ardent at this point in time.” (TRG Reply Exh. 995.)
5
In the fall of 2016, Silvers wanted “to get out of this case by striking a deal with
6
Mr. Jastremski.” (Silvers at 1046; see also id. at 1135.) Just as with M. Dalton, in
7
exchange for a release, Jastremski wanted access to all of Silvers’ electronic devices
8
and a signed declaration. (Silvers at 1046, 1135.) Silvers agreed to have Sevel
9
duplicate all of his computer devices. (Silvers at 1047.) Although Silvers eventually
10
did not reach a settlement with Jastremski and TRG because he did not want to sign a
11
declaration, Sevel was able to mirror the data stored on Silvers’ electronic devices.
12
(Silvers at 1047-48, 1135-38.)
13
Silvers provided Sevel his HP Envy laptop, two PNY USB flash drives, a travel
14
laptop, and a Lexar 8 gigabyte flash drive. On the whole, Sevel determined that a total
15
of more than 10,000 files were deleted. (See Massoud Report at 4.) Approximately
16
1,712 files were deleted between December 2015 and February 2016. (Sevel at 332.)
17
The great majority of those files are not recoverable. (Sevel at 332.) Massoud
18
concurred insofar as he found at least 50, and possibly more than 100, “hard
19
deletions.” (Massoud at 395-97.) Hard deletions are intentionally made by a user and
20
generally also conceal the fact that the deleted data was ever present on the computer.
21
(Massoud at 396; Sevel at 339.)
22
Silvers’ HP laptop contained several cloud storage folders and some LNKs to
23
Google Drive files; however, approximately 25% of those files were missing. (Sevel
24
at 326, 327.)
25
26
27
28
The data on Silvers’ 32 gigabyte PNY flash drive was wiped and a DBAN
program was installed on it on December 29, 2016, approximately six days before the
drive was provided to Sevel. (Sevel at 327-30, 349, 409-10.) The sole purpose of a
DBAN program is to wipe a computer drive. (Sevel at 327-28, Massoud at 398.)
14
1
Silvers claims that he did not use this program. (Silvers at 1151.) This is contradicted
2
by the fact that the program left traces on Silvers’ flash drive showing that it had been
3
used. (Sevel at 329-30, 409; see also Massoud at 398.) The data that was stored on
4
this drive before is no longer recoverable. (Sevel at 409-10, see also Sevel at 329-30;
5
Massoud at 398.)
6
Silvers’ second PNY flash drive contained a VeraCrypt encryption program,
7
which encrypts an entire device, as opposed to just a selected document or
8
communication. (Sevel at 331.) When Sevel asked Silvers about it, Silvers told him
9
he used it on his travel laptop. (Sevel at 331-32.) However, Silvers had not provided
10
that laptop to Sevel. (Sevel at 331-32.) Silvers produced it after Sevel mentioned this
11
to Jastremski. (Sevel at 332.) Sevel used the VeraCrypt program to decrypt the laptop
12
to be able to review it. (Sevel at 333.) He found that numerous files had been deleted.
13
(Sevel at 333.)
14
15
Finally, Sevel also concluded that approximately 172 files, including user files,
were deleted from Silvers’ Lexar 8 gigabyte flash drive. (Sevel at 332.)
16
In addition to examining Silvers’ electronic devices, Sevel accessed several
17
cloud storage accounts to which Silvers had given him passwords. (Sevel at 333, 354.)
18
He was not able to gain access to Silvers’ Dropbox account, because Silvers said he no
19
longer had access. (Sevel at 333.) He was not able to log on to Silvers’ box.com
20
account, because the password Silvers gave him did not work and Silvers said he no
21
longer had access. (Sevel at 333-34.) Sevel also accessed the Google Drive account
22
associated with Silvers’ email, but it only had files in the “trash” folder, indicating that
23
they had been intentionally deleted. (Sevel at 334-35).22
24
///
25
26
27
22
28
Once data is deleted from a cloud account, the files usually become
unrecoverable after 30 days. (Sevel at 321; Massoud at 401.)
15
1
Sevel’s conclusions after examining electronic devices belonging to Mele,
2
Keating and Silvers support the Special Master’s finding that the Ardent Group
3
destroyed or caused the destruction of electronic evidence, including metadata.
4
3.
Destruction of Employee’s Hard Drive
5
Special Master found that on August 4, 2015, shortly before TRG’s opposition
6
was due to the Keating Group’s summary judgment motion (see docs. no. 42, 50, 51),
7
Dalton and Silvers caused the destruction of office assistant Christina Abernathy’s23
8
hard drive. (Recommendation at 8.) Having reviewed the record, this Court adopts the
9
finding.
10
In the summer of 2015, when Silvers was Ardent’s office manager (Silvers at
11
1033; Dalton at 1192), he supervised Nelson, Ardent’s “IT guy,” and Abernathy, a
12
“caller.” (Nelson Decl. at 2; Silvers at 1034; M. Dalton Dep. at 75.) Abernathy had
13
assisted the Keating Group with their transition to Ardent. (Dalton at 1299; see also
14
TRG Reply Exh. 68 (referencing “CA”); fn. 9 supra.) Nelson had transferred to
15
Ardent from TRG in 2013. (Nelson Decl. at 2; see M. Dalton Dep. at 384; see also
16
fn.21 supra.) As Ardent’s “caller,” Abernathy accessed the Zoho database to obtain
17
prospect and client information, called them, and scheduled them for investment
18
seminars and advisor appointments. (Silvers at 1035; Dalton at 1215; see also Silvers
19
at 1036-37.) At her own request, and unlike other employees, Abernathy was
20
permitted to use her personal laptop to access the database. (Silvers at 1036, 1045.)
21
Silvers claims that Abernathy was often late for work and had a bad “attitude,”
22
which led to his decision to terminate her. (Silvers at 1036; TRG Reply Exh. 758; see
23
also Dalton at 1216.) Silvers and Dalton spoke about “checking” Abernathy’s laptop
24
before terminating her. (Silvers at 1041; Dalton at 1220.) Their explanation was that
25
they wanted to be sure she did not keep confidential client information on her laptop
26
27
after she was precluded from accessing the Zoho database. (Silvers at 1042; Dalton at
1219-20.) Accordingly, Silvers had Nelson “take a look” at Abernathy’s laptop while
28
23
The parties also refer to her as Tina Abernathy.
16
1
she was at lunch and “had him check, you know, basically everything.” (Silvers at
2
1042; see also Dalton at 1220.) Silvers claims he did not see anything on Abernathy’s
3
laptop “that would have been of any concern to [him]” (Silvers at 1044; see also
4
Dalton at 1223), and that when Nelson was done and Abernathy came back from
5
lunch, she continued to work on her laptop (Silvers at 1043, 1119-20). It is
6
undisputed, however, that her hard drive was destroyed and Ardent paid for its
7
replacement.
8
9
The Ardent Group argues that the Special Master erred when he found they
caused the destruction of Abernathy’s hard drive. They claim they had no intention to
10
destroy it and that it was destroyed a few days later by an unrelated power surge. In
11
support of this argument, they point to Sevel’s and Abernathy’s deposition testimony,
12
Nelson’s declaration, and Dalton’s testimony in the Special Master proceeding. The
13
Court finds the Ardent Group’s argument unpersuasive and concurs with the Special
14
Master that their explanations are not credible. (See TR at 1005, 1555, 1565.)
15
16
Immediately before having Nelson check Abernathy’s computer, Dalton and
Silvers exchanged the following text messages:
17
Silvers:
[¶]
Dalton:
18
19
“I think her laptop is here”
“Crack it. Let’s get it done”
20
(TRG Reply Exh. 654.) Sevel was asked whether “crack it” in this message meant “to
21
destroy the information from the laptop.” (Sevel Dep. at 63.)24 He responded he could
22
not tell from looking at the text message, because he did not know what was on
23
Dalton’s mind. (Sevel Dep. at 63.) Accordingly, Sevel’s testimony does not support
24
the Ardent Group’s argument that the Special Master erred.
25
In his declaration Nelson avers that “at no time did I seek to do any damage to
26
[Abernathy’s] computer.” (Nelson Decl. at 2.) This statement is carefully crafted to
27
bear only on Nelson’s state of mind, as he did not seek to do any damage, but stops
28
Excerpts from Sevel’s deposition are found in doc. no. 453-2 at 17-24. Page
references above are to the page numbers in the deposition transcript.
17
24
1
short of asserting that he in fact did not do any damage. It also stops short of bearing
2
on Silvers’ or Dalton’s state of mind. Accordingly, Nelson’s declaration is insufficient
3
to undermine the Special Master’s conclusion.
4
Dalton testified that by “crack it,” he meant “crack it open.” (Dalton at 1221.)
5
He and Silvers had a plan that if Abernathy’s laptop had any personally identifiable
6
information about Ardent’s clients, Silvers should have that information deleted.
7
(Dalton at 1221.) This plan did not involve destroying the laptop. (Dalton at 1221-
8
22.) After Nelson checked the laptop, Silvers called Dalton to let him know, “It’s
9
clean. We’re fine.” (Dalton at 1222.) Dalton’s testimony stops short of asserting that
10
the hard drive was not “cleaned” in some fashion before Silvers informed him that
11
“It’s clean.” He had no way of knowing that, because “[he] wasn’t there,” his office
12
was not at Ardent in San Diego but in Indiana. (Dalton at 1334, 1192)
13
Moreover, Dalton’s testimony is contradicted by M. Dalton, as well as email and
14
text messages strongly suggesting that Abernathy’s hard drive was not destroyed by
15
accident, as claimed by the Ardent Group. (See Silvers at 1043.) According to Silvers,
16
something . . . happened with a bunch of the computers, and Tina’s included.” (Silvers
17
at 1044.) There was “a power surge or what have you . . ..” (Silvers at 1044.)
18
M. Dalton testified that Silvers had told him Abernathy’s computer was
19
intentionally destroyed. (M. Dalton Dep. at 303-04.) Silvers and Dalton gave Nelson
20
“the go ahead” to destroy the hard drive while Abernathy was at lunch “to make it
21
appear as if her computer just stopped working [and] she wouldn’t discover that they
22
were actually on her computer.” (M. Dalton Dep. at 303-04.) Silvers told M. Dalton
23
that Dalton had told him “to make sure there wasn’t any info on Tina Abernathy’s
24
machine which could incriminate them if she returned to TRG.” (M. Dalton Dep. at
25
384.)
26
27
28
As discussed above, the Ardent Group argues that M. Dalton’s testimony should
not be believed. However, as before, his testimony is corroborated. For example, in
an email chain between Silvers and Dalton about Abernathy’s termination, Dalton
18
1
warned Silvers, “Tread lightly. Remember, if she decides to call John [Jastremski] and
2
stir the pot out of revenge, we have issues.” (TRG Reply Exh. 758.)
3
The Ardent Group relies on Silvers’ deposition testimony in an attempt to
4
minimize the significance of this message. (Silvers Dep. at 247-49.)25 Silvers
5
testified:
6
Q
A
Q
7
8
A
9
10
What are the issues?
. . . I don’t know what issues he would have been referring to . . ..
Did you ask and say, “Steve, what are you talking about? What
issues could we possibly have?”
. . . conversations like this, . . . I would leave be because I didn’t
want to get into a whole conversation back and forth about what
may or may not be around, so --
11
12
(Silvers Dep. at 248.) His answers were evasive and did not address the clear
13
implication of Dalton’s message that he was concerned she would provide damaging
14
information to Jastremski.
15
In another attempt to minimize the significance of Dalton’s message, the Ardent
16
Group relies on Abernathy’s testimony that “tread lightly” had nothing to do with TRG
17
or this case. (Abernathy Dep. at 93-94.)26 Her testimony is not persuasive because the
18
Ardent Group has not shown that Abernathy knew what was on Dalton’s mind. It also
19
does not negate the clear implication of Dalton’s message that he was concerned
20
Abernathy may leak information to Jastremski.
21
Dalton testified he was concerned that Abernathy would contact Jastremski and
22
lie to him to create problems for the Ardent Group in this litigation. (Dalton at 1329-
23
31.) His own prior testimony shows, however, that his concern was not that Abernathy
24
may lie, but that she could disclose what she knew about the surreptitious transfer of
25
TRG client information. He admitted that Abernathy assisted Mele in transitioning his
26
27
28
Excerpts from Silvers’ deposition are found in doc. no 456-1 at 296-314. Page
references above are to the page numbers in the deposition transcript.
25
Excerpts from Abernathy’s deposition are found in doc. no. 453-2-1 at 9-15.
Page references above are to the page numbers in the deposition transcript.
26
19
1
book of business to Ardent and potentially could have had some of Mele’s TRG data.
2
(Dalton at 1299-300.) Soon after the transition, he was already concerned with what
3
she knew about the transition activity. For example, in his April 13, 2015 email to
4
Davenport, one of his partners at Ardent, Dalton scolded Davenport for sending an
5
email about the next “WealthMax” prospect solicitation campaign to a list of
6
recipients, including Abernathy. He cautioned,
In the future, ALWAYS blind copy everyone. There are people on that
list, Tina, for example, that should not have contact info on anyone. . . .
Further Jan and Jeremy [Keating] are both either IN litigation, or on the
cusp of it. This email is discoverable. Please email direct instead of
“company blasts.”
7
8
9
10
(TRG Reply Exh. 44 (emph. in orig.); see also Dalton at 1248.) M. Dalton’s testimony
11
that the motive for destroying Abernathy’s computer was fear that she would provide
12
incriminating evidence to Jastremski in the middle this litigation is corroborated by
13
credible evidence.
14
The Ardent Group’s explanation that Abernathy’s hard drive was accidentally
15
destroyed by a power surge is also not credible. The explanation relies on the premise
16
that Abernathy’s hard drive was not destroyed on August 4, when Nelson looked at it,
17
but a few days later. (See Dalton at 1222-23 (laptop reviewed on Tuesday, power
18
surge on Thursday).) This explanation is not credible.
19
20
Nelson checked Abernathy’s computer on Tuesday, August 4, 2015, when the
following text messages were exchanged:
21
Silvers:
[¶]
Dalton:
Silvers:
Dalton:
22
23
24
“I think her laptop is here”
“Crack it. Let’s get it done”
“I need Sam to go to lunch”[27]
“Good call”
25
26
///
27
28
Sam was Abernathy’s roommate. (Silvers at 1120.) Silvers didn’t want Sam to
tell Abernathy that Silvers was looking at her computer. (Silvers at 1120.)
27
20
1
(TRG Reply Exh. 654; see also Dalton at 1220.) On Monday, August 10, 2015,
2
Abernathy sent a message to Mele stating,
3
I haven’t had access to my email in a week. There was a power surge that
fucked everyone’s PC, including my laptop. . . . My laptop just needs a
new hard drive so we will see if [Dalton] will pay for it.
4
5
6
(TRG Exh. 544;28 see also Silvers at 1121.) Approximately a week earlier was August
7
4, when Silvers had Nelson look at Abernathy’s laptop. (Silvers at 1121.)
8
Abernathy’s message to Mele shows that her hard drive was destroyed approximately a
9
week before, when Nelson looked at. This corroborates M. Dalton’s testimony that it
10
was intentionally destroyed.
11
12
Moreover, also on August 10, 2015, after Abernathy’s message to Mele, Silvers
and Dalton had the following text message exchange:
13
Dalton:
14
Silvers:
[¶]
Silvers:
15
16
17
Dalton:
Silvers:
Dalton:
18
19
20
21
“So Tina lives to fight another day. Tomorrow will be her
last.”[29]
“She is going to hit you up for a new hard drive”
“I think she took it to a store and she was due for a free
upgrade to Windows 10”[30]
“OK, so why would she ask me for a new hard drive then?”
“I guess the guy told her that’s what needed to be replaced”
“Hmmmm. If that’s what we have to do, let’s do it. But
from my perspective, he probably diagnosed her computer
based on the fact that I [sic] had failed, and he doesn’t know
the circumstances behind it. . . .”
22
(TRG Reply Exh. 656.) Dalton’s comment at the end of the exchange shows he was
23
concerned Abernathy may have learned from the computer technician at the store that
24
25
26
27
28
TRG’s exhibits filed in the Special Master proceedings are found at docs. no.
404-1 through 404-6.
28
29
Silvers explained that he had to postpone terminating Abernathy because they
had to fix her computer. (Silvers at 1120.)
30
Silvers explained that Abernathy had taken her computer to Best Buy or Office
Depot to have it looked at and called Silvers to let him know what was wrong with it.
(Silvers at 1124.)
21
1
her hard drive was not destroyed by accident. This further corroborates M. Dalton’s
2
testimony that Abernathy’s hard drive was intentionally destroyed.
3
Based on the foregoing, the Court adopts the Special Master’s finding that
4
Silvers and Dalton intentionally caused the destruction of Abernathy’s hard drive to
5
prevent her from providing incriminating evidence to Jastremski and TRG.
6
B.
7
In order to impose terminating sanctions for spoliation of evidence, the court
Knowledge and Intent
8
must find, among other things, that evidence was deliberately destroyed with at least
9
some notice that it may be potentially relevant to litigation. Kitsap Physician Serv.,
10
314 F.3d at 1001; Leon, 464 F.3d at 958-59; Anheuser-Busch, 69 F.3d at 348. Based
11
on the evidence of spoliation discussed above, the Court finds that the Ardent Group
12
intentionally destroyed evidence in anticipation of and during litigation with
13
knowledge that the evidence may be potentially relevant to TRG’s prosecution of its
14
counterclaims against the Ardent Group. To the extent the Ardent Group claims the
15
evidence they destroyed is not relevant, the argument is precluded because their
16
actions render it impossible to determine relevance with any certainty at this time. See
17
Leon, 464 F.3d at 959. The Court also finds that the Ardent Group’s spoliation of
18
evidence was committed in bad faith with the intent to thwart TRG’s presentation of its
19
case and thus undermine the integrity of judicial proceedings. See Anheuser-Busch, 69
20
F.3d at 348.
21
C.
22
Another factor the Court must consider before ordering terminating sanctions is
Prejudice
23
the risk of prejudice to the party seeking sanctions. Leon, 464 F.3d at 958; Rio Int’l
24
Interlink, 284 F.3d 1022. “The prejudice inquiry looks to whether the spoiling party's
25
actions impaired the non-spoiling party's ability to go to trial or threatened to interfere
26
27
28
with the rightful decision of the case.” Leon, 464 F.3d at 959. In this regard,
Due process concerns . . . require that there exist a relationship between
the sanctioned party's misconduct and the matters in controversy such that
22
1
2
the transgression threatens to interfere with the rightful decision of the
case.
3
4
5
Anheuser-Busch, 69 F.3d at 348.
Although TRG does not, and cannot, specifically identify what information was
6
destroyed, it is apparent that the destroyed evidence of surreptitious transfer of
7
information from TRG to Ardent during the Keating Group’s transition was relevant to
8
TRG’s counterclaim for misappropriation of trade secrets. This also establishes a
9
sufficient relationship between the Ardent Group’s destruction of evidence and matters
10
11
in controversy in this action.
Furthermore, “it is appropriate to presume that where documents relevant to the
12
merits of the litigation have been concealed, the deception casts doubt on the
13
concealing party’s case.” Anheuser-Busch, 69 F.3d at 354; see also id. at 355; Kitsap,
14
314 F.3d at 1002 (“adverse inference triggered by actual spoliation”). In this regard,
15
the Ardent Group’s spoliation of evidence impaired TRG’s ability to go to trial and
16
threatened to interfere with the rightful decision of this case.
17
In addition to the destruction of evidence, the docket in this case shows the
18
Ardent Group’s repeated failure to comply with discovery requests and the Magistrate
19
Judge’s discovery orders, repeated failure to timely pay sanctions related to discovery
20
misconduct, and the entry of a contempt order against Ardent related to discovery
21
misconduct. (See TRG Reply Exh. 999A and docket entries referenced therein.) All
22
of the foregoing independently prejudiced TRG’s ability to go to trial by causing
23
extensive and needless delay of the proceedings, causing TRG to incur attorneys’ fees,
24
depriving it of relevant discovery and, ultimately, of probative evidence, thus
25
threatening to interfere with the rightful decision of this case.
26
The Ardent Group argues that TRG is not prejudiced because, for the most part,
27
evidence was not destroyed but merely moved to the cloud or somewhere else in the
28
cloud or somewhere else on the various computers. (See Opp’n at 2-3, 11; see also
23
1
Silvers at 1153.) In essence, this argument implies that litigants can play an endless
2
shell game. If the evidence still exists, as the Ardent Group contends, then its
3
members have had more than two years to produce it pursuant to TRG’s various
4
discovery requests. However, based on the forensic experts’ uncontroverted
5
testimony, much of the electronic data has been irretrievably destroyed. The Ardent
6
Group’s argument is rejected.
7
D.
8
Before imposing terminating a party’s claims or defenses, the Court must also
9
Availability of Less Drastic Sanctions
consider less drastic sanctions. Leon, 464 F.3d at 959; Rio Int’l Interlink, 284 F.3d
10
1022. However, implementing less drastic sanctions or warning a party that
11
terminating sanctions may result does not apply when a party destroys evidence before
12
the court has an opportunity to order less drastic sanctions or issue a warning. Leon,
13
464 F.3d at 960. This is the case with any evidence the Ardent Group destroyed prior
14
to filing this action. Furthermore, the evidence discussed in this Order shows that the
15
spoliation activity during the pendency of this action occurred before the misconduct
16
became apparent. Accordingly, the Court had no opportunity to issue warnings or
17
impose less drastic sanctions for spoliation. (See TRG Reply Exh. 999A (first motion
18
to compel filed Mar. 24, 2017).)
19
Furthermore, since April 28, 2017, when the Magistrate Judge granted TRG’s
20
motion to compel, the Ardent Group has repeatedly flouted discovery rules and orders.
21
On several occasions the Magistrate Judge imposed less drastic sanctions, such as
22
monetary sanctions and contempt to no avail. (See TRG Reply Exh. 999A.) Given the
23
Ardent Group’s deliberate pre-litigation plan to hide evidence by various means
24
including destruction, it is unlikely that any warning or lesser sanctions imposed in this
25
action would have been effective. In light of the record of protracted, deliberate and
26
27
28
egregious misconduct, the Court finds that entering default against Ardent Group
members to be the only appropriate sanction.
///
24
1
The Ardent Group argues that their discovery misconduct is attributable to their
2
former counsel David Hall and they should not suffer the consequences. (Opp’n at 14-
3
15; see also Dalton at 1270-83, 1324-29.) This argument is rejected because clients
4
are bound by the acts of their attorney. Link v. Wabash R. Co., 370 U.S. 626, 633-34
5
(1962). This does not impose “an unjust penalty" on the client. Id. at 633. The client
6
voluntarily chose this attorney as his representative in the action, and he
cannot now avoid the consequences of the acts or omissions of this freely
selected agent. Any other notion would be wholly inconsistent with our
system of representative litigation, in which each party is deemed bound
by the acts of his lawyer-agent . . ..
7
8
9
10
11
Id. at 633-34. Moreover, the Ardent Group has presented no evidence to show that
12
Hall instructed or encouraged them to destroy evidence or approved of it at any time.
13
E.
Remaining Factors
14
Next, the Court considers whether the public’s interest in expeditious resolution
15
of litigation and the Court’s need to manage its dockets favor imposition of terminating
16
sanctions. See Leon, 464 F.3d at 959; Rio Int’l Interlink, 284 F.3d 1022. These factors
17
support terminating sanctions when destruction of evidence “greatly impeded
18
resolution of the case by obscuring the factual predicate of the case and consuming
19
months in sanction-related litigation.” Leon, 464 F.3d at 958 n.5.
20
Based on review of the record, the Court adopts the Special Master’s conclusion
21
that, due to the Ardent Group’s destruction of relevant evidence and stonewalling of
22
discovery requests, this case was bogged down in discovery for years and impossible
23
to move forward to trial. (See Recommendation at 12.)
24
Finally, the “public policy favoring disposition of cases on their merits”
25
generally weighs against terminating sanctions. Leon, 464 F.3d at 960-61. However,
26
standing on its own, it is “not sufficient to outweigh the other four factors.” Leon, 464
27
F.3d at 961. As all other factors support terminating sanctions, the court grants TRG’s
28
motions and overrules the Ardent Group’s objections to the Special Master’s
Recommendation.
25
1
Accordingly, it is ORDERED as follows:
2
1.
3
The Retirement Group, LLC’s motion to adopt the Special Master’s
Recommendation (doc. no. 442) is granted.
4
2.
The Retirement Group, LLC’s motion for terminating sanctions (doc. no.
5
157) is granted as to Lloyd J. Silvers, Steven Dalton and Ardent Retirement Planning,
6
LLC.
7
3.
The Clerk shall strike the answers filed by Lloyd J. Silvers, Steven Dalton
8
and Ardent Retirement Planning, LLC (docs. no. 128, 129) and enter default as to
9
these parties.
10
11
IT IS SO ORDERED.
12
13
Dated: April 9, 2020
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
26
Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.
Why Is My Information Online?