Digital Assurance Certification, LLC v. Pendolino
Filing
192
ORDER granting 166 Motion to Compel production of information; granting in part and denying in part 177 Motion to Compel production of information. Signed by Magistrate Judge Thomas B. Smith on 1/10/2019. (Smith, Thomas)
UNITED STATES DISTRICT COURT
MIDDLE DISTRICT OF FLORIDA
ORLANDO DIVISION
DIGITAL ASSURANCE CERTIFICATION,
LLC,
Plaintiff,
v.
Case No: 6:17-cv-72-Orl-41TBS
ALEX PENDOLINO, JR. and LUMESIS,
INC.,
Defendants.
ORDER
This misappropriation of trade secrets case comes before the Court without a
hearing on Defendant Alex Pendolino’s Motion to Compel (Doc. 166) and Plaintiff Digital
Assurance Certification, LLC’s Motion to Compel Defendant Alexander Pendolino and
Defendant Lumesis, Inc. to Grant Access to Electronic Media (Doc. 177).
Background
Plaintiff Digital Assurance Certification, LLC (“DAC”) alleges that before Defendant
Alex Pendolino, Jr. resigned from its employ on October 10, 2017, he inserted a USB
thumb drive, serial number 1019350241088504 (the “Identified USB”) into his DACissued laptop computer (the “Laptop”) and accessed all the information on DAC’s shared
drive (Doc. 90, ¶¶ 2, 65, 80-81). On November 28, 2016, Pendolino started working for
DAC competitor, Defendant Lumesis, Inc. (Doc. 44, ¶ 59; Doc. 172 at 2). Fearing that
Pendolino had stolen and delivered its confidential and trade secret information to
Lumesis, DAC hired computer forensics expert Charles Platt to examine the Laptop (Id.).
Platt made a forensic image of the Laptop’s hard drive which he analyzed (Doc. 5 at 4, ¶¶
4-5). Platt has now opined inter alia, that:
1. The Identified USB was attached to the Laptop at
3:13 PM EDT on October 5, 2016 and 10:59 AM EDT on
October 10, 2016.
2. Both times the Identified USB was attached to the
Laptop Pendolino’s user account was logged into the
computer.
3. The Laptop was in Pendolino’s possession when the
Identified USB was attached on October 5 and October 10,
2016.
4. There is no evidence indicating the use for which the
Identified USB was attached to the Laptop. This is consistent
with the copying of files from the Laptop to the Identified USB.
5. No evidence was found on the four other DAC
computers that allowed the use of a USB storage device. This
indicates that the Identified USB was never attached to those
computers.
6. There were no artifacts indicating USB storage
device activity present, and therefore the Laptop was not used
to access data resident on the Identified USB.
7. The version of Windows in use on the Laptop does
not leave artifacts when a file is copied from it to an attached
USB.
(Doc. 172-2). DAC says Pendolino had no business reason to attach a USB drive to the
Laptop, or to access all information on its shared drive (Doc. 90, ¶¶ 80-81).
In its Second Amended Verified Complaint DAC alleges that Pendolino and
Lumesis violated the Defend Trade Secrets Act of 2016, 18 U.S.C. § 1836 and the Florida
Uniform Trade Secrets Act, FLA. STAT. § 688.001 et seq.; that Pendolino breached his
confidentiality agreement with DAC; 1 and that Lumesis tortuously interfered with DAC’s
relationship with Pendolino (Doc. 90).
Pendolino signed an agreement promising to maintain the confidentiality of DAC’s proprietary
information (Doc. 90-2). He did not sign a non-compete agreement with DAC (Doc. 188 at 4, fn. 3).
1
-2-
Pendolino denies taking any information from DAC by any means at any time
(Doc. 44, ¶ 72). He denies uploading or downloading “any DAC information to the
Lumesis computer or systems by any method—USB, cloud or otherwise …” (Id., ¶ 61).
And, he denies providing “any information to Lumesis, or any of its employees or agents,
regarding DAC’s pricing, customers or prospective customers, or any other information
regarding DAC.” (Id., ¶ 66).
Lumesis’ President and Chief Operating Officer, Timothy J. Stevens has declared
that after investigation he “was able to confirm that there is no reasonable basis to believe
that Pendolino has used or provided any DAC documents, data or information through
any of Lumesis’ electronic networks or systems, or utilized it in the performance of his
work for Lumesis.” (Doc. 41, ¶ 9). Stevens has testified that Lumesis “reviewed
Pendolino’s computer hard drive, recycle bin, email, cloud network storage system and
determined that no DAC materials have been provided by, uploaded or utilized by
Pendolino in the performance of his services for Lumesis.” (Id., ¶ 6). Stevens has also
declared that “Lumesis has found no evidence that Pendolino provided Lumesis with any
documents, data, trade secret or confidential information regarding DAC, its services and
products, pricing or clients, and does not maintain such information on his Lumesis
computer.” (Id., ¶ 8).
DAC argues that Platt’s analysis contradicts Pendolino’s claim that he did not
insert a USB device into the Laptop and download information on October 10, 2016 (Doc.
172 at 2-3). It also disputes Stevens’ testimony that Lumesis performed a complete
forensic examination of Pendolino’s Lumesis’ issued computer (Id., at 5-6). DAC
contends that these alleged misrepresentations are sufficient reason for the Court to deny
Pendolino’s motion to compel (Id.).
-3-
Legal Standards
Parties may obtain discovery regarding any non-privileged matter that is relevant
to any party’s claim or defense. FED. R. CIV. P. 26. “The discovery process is designed to
fully inform the parties of the relevant facts involved in their case.” U.S. v. Pepper’s Steel
& Alloys, Inc., 132 F.R.D. 695, 698 (S.D. Fla. 1990) (citing Hickman v. Taylor, 329 U.S.
495, 501 (1947)). “The overall purpose of discovery under the Federal Rules is to require
the disclosure of all relevant information so that the ultimate resolution of disputed issues
in any civil action may be based on a full and accurate understanding of the true facts,
and therefore embody a fair and just result.” Oliver v. City of Orlando, No. 6:06-cv-1671Orl-31DAB, 2007 WL 3232227, at * 1 (M.D. Fla. Oct. 31, 2007) (citing United States v.
Proctor & Gamble Co., 356 U.S. 677, 682 (1958)).
The party seeking to compel discovery has the burden of showing that the
information sought is relevant to the lawsuit. Moore v. Lender Processing Servs. Inc.,
No. 3:12-CV-205-J, 2013 WL 2447948, at *2 (M.D. Fla. June 5, 2013); Bethea v.
Comcast, No. CIV.A.02-1767 (RWR/JMF), 218 F.R.D. 328, 329-30 (D.D.C. Dec. 3,
2003).
“It is settled that, electronically stored information is discoverable under Rule 34(a)
of the Federal Rules of Civil Procedure. ‘During discovery, the producing party has an
obligation to search available systems for the information demanded.’” Wynmoor
Community Council, Inc. v. QBE Ins. Corp., No. 10-62411-CIV, 280 F.R.D. 681, 685 (S.D.
Fla. Mar. 5, 2012) (quoting McPeek v. Ashcroft, 202 F.R.D. 31, 32 (D.D.C. 2001)).
Rule 34 authorizes the requesting party to “inspect, copy, test, or sample” the
documents, things, and other information that is produced. FED. R. CIV. P. 34(a)(1).
However, “[t]he addition of testing and sampling to Rule 34(a) with regard to documents
-4-
and electronically stored information is not meant to create a routine right of direct access
to a party's electronic information system, although such access might be justified in
some circumstances. Courts should guard against undue intrusiveness resulting from
inspecting or testing such systems.” Advisory Committee Notes 2006 Amendment;
Floeter v. City of Orlando, No. 6:05-cv-4---Orl-22KRS, 2006 WL 1000306 at *3 (M.D. Fla.
April 14, 2006) (Rule 34 permits a party to request documents, but it does not authorize
the requesting party to conduct the actual search.); Powers v. Thomas M. Cooley Law
School, No. 5:05-CV-117, 2006 WL 2711512, at *4 (W.D. Mi. sept. 21, 2006). Still,
“allowing a party direct access to another party’s databases may be warranted in certain
situations, such as showing of non-compliance with discovery rules.” Balfour Beatty Rail,
Inc. v. Vaccarello, No. 3:06-cv-551-J-20MCR, 2007 WL 169628, at *3 (M.D. Fla. Jan. 18,
2007).
Discussion
DAC would have the Court believe that Pendolino’s requests for production, all of
which are discussed below, are not relevant. It argues that once Pendolino denied
inserting the Identified USB into the Laptop and failed to offer an alternative explanation
for how that occurred the only remaining relevant question is whether Pendolino in fact
plugged the Identified USB into the Laptop (Doc. 172 at 15). DAC also contends that
Pendolino’s forensic computer expert, Richard D. Connor, Jr., is on a fishing expedition
“to provide an alternative explanation for the USB’s insertion based on some unspecified
evidence relating to other time periods, other DAC employees, and USB usage
concerning the laptop where such an alternative explanation directly contradicts facts as
presented under oath by Defendant Pendolino himself.” (Id.) (emphasis in original).
Contrary to DAC’s arguments, all the requests for production that are the subject of these
-5-
motions to compel are relevant to the claims and defenses that have been asserted. The
requests are also proportional to the parties’ needs.
Pendolino is asking the Court to compel DAC to comply with the following requests
for production:
Pendolino’s Second Requests for Production:
No. 2: All documents that concern, refer to, or evidence
the use or location of the Identified USB from January 1, 2016,
to present.
No. 3: All documents, including, but not limited to, the
“setupapi.dev.log file,” that concern, refer to, or evidence the
connection of the Identified USB to any computer located at
DAC from January 1, 2016 to present, including, but not
limited to the computers assigned to Paula Stuart, Geeta
Pandit, Justin Hughes, Lisa Olsen and Chris Schiffermiller.
(Doc. 166 at 6-7).
DAC has agreed to produce non-privileged documents in response to these
requests by the deadline for expert disclosures (Doc. 166 at 7). And, although it does not
believe it has any additional documents that are responsive to these requests, DAC is
“willing to have additional forensic tests run to obtain additional forensic information that
would be responsive to [these requests] provided that Pendolino agrees to pay the cost of
obtaining this forensic evidence or provided that Pendolino utilizes his own expert to
conduct the forensic examination necessary to obtain this information under the
supervision of DAC’s forensic expert in this matter.” (Id.).
Pendolino’s Second Requests for Production:
No. 11: All documents not previously produced which
concern, refer to, or evidence any list of inventory or other
record of USBs assigned to, held or used by DAC employees
from January 1, 2013 through December 2016 (by way of
example only, DAC000492).
(Id., at 8).
-6-
DAC objects to this request on the grounds that it is not proportional to the needs
of the case and seeks information that is not relevant or reasonably calculated to lead to
the discovery of admissible evidence (Id.).
Pendolino’s Third Requests for Production:
No. 10: A full forensic copy of the laptop computer used
by Pendolino at DAC (please provide an estimate of the cost
before production).
(Doc. 166 at 5-8).
Originally, DAC said it would be willing to permit Connor to conduct certain preidentified tests on the mirror image of the Laptop under supervision by Platt (Doc. 166 at
6). Later, DAC said it would give Connor access to the mirror image created by Platt on
two conditions. First, consistent with its response, DAC wants to know in advance what
tests Connor intends to conduct, and then the tests must be performed under Platt’s
supervision (Doc. 172 at 7). DAC has proposed that Platt and Connor meet in advance to
agree on the protocol for the examination, including a protocol for when Connor feels that
he needs to go beyond the scope of his original predictions as to how he intends to probe
the Laptop for evidence (Id.). Pendolino argues, for the reasons stated in Connor’s
declaration, that he cannot agree to this condition.
Connor has declared that he is unable to identify all the forensic tests that will be
needed to obtain the information necessary to defend against DAC’s claims (Doc. 167-1,
¶ 19). He explains that he has not evaluated the Laptop, does not know what programs
are installed, how the operating system is configured, how event logging is configured, or
what installed programs may provide activity logs (Id., ¶ 20). Connor also notes that this is
not a case in which he is being asked to run search terms or locate specific files or email
(Id., ¶ 19). Instead, he is being asked to analyze user activity. To do this Connor wants to
-7-
run forensic software on the Laptop to create a timeline of activities so that he can
understand the context in which relevant events occurred (Id., ¶ 21). He wants to examine
the timeline and types of activities on the Laptop before and after Pendolino stopped
working for DAC (Id.). Connor also wants to examine events and actions which may
suggest copying, transfer, deletion or modification of files and when that occurred; the
historical use of USBs on the Laptop; and the history of copying to and deleting files from
the Laptop in the usual course of Pendolino’s employment (Id., ¶ 16). Connor says he
does not know how Platt performed his analysis and is therefore, unable to speculate
about what additional data he could or should review or what areas in which he and Platt
will agree or disagree (Id., ¶ 22). In addition, Connor may attempt to replicate Platt’s
investigation (Id., ¶ 17). Lastly, Connor says there are potential sources of information
that were not identified by Platt which may show relevant user activity on the laptop (Id.,
¶¶ 25, 27).
Even though Pendolino argues that DAC’s requirement of a pre-inspection
protocol is unworkable, he has undercut his argument to some degree by providing the
following list of types of data to be sought and reviewed:
1. USB usage on the Laptop, including, but not limited
to, from October 5 through October 10, 2016.
2. All user activity on the Laptop, including, but not
limited to, what files were accessed and modified, from
October 5 through October 10, 2016.
3. All user activity on the Laptop from October 10, 2016
until the date Platt obtained the image of the Laptop.
4. Pattern/practice, if any, of materials copied to, or
deleted from the Laptop during Pendolino’s employment by
DAC.
5. Files copied to or deleted from the Laptop from
October 5 through October 10, 2016.
-8-
6. Files deleted from the Laptop from October 10, 2016,
through the date Platt obtained the forensic image.
7. The accuracy of Platt’s conclusions stated in his
declaration filed in this action and his expert report dated
September 10, 2018.
8. The basis for and data underlying the summary
timeline attached to Platt’s expert report as Exhibit B.
9. Other user profiles, if any, identified on the Laptop
and when.
10. Information regarding the Identified USB, such as
vendor name, size, etc.
11. Information regarding connection of the Identified
USB to the Laptop.
12. Evidence of access to “every single” document on
the DAC shared file as alleged in the Second Amended
Complaint.
(Doc. 166 at 10).
DAC’s second condition to allowing Connor to inspect a forensic copy of the
Laptop is that Pendolino and Lumesis give DAC “reciprocal access to Defendants’
electronic media, including the mirrored hard drive of the Lumesis desktop issued to
Defendant Pendolino, the Lumesis DIVER Underwriter system, and the three mirrored
USB drives apparently utilized by Defendant Pendolino while at DAC.” (Doc. 172 at 6).
The Court agrees with DAC that “the parties need equal forensic access to the electronic
data to meet each other’s claims and arguments.” (Doc. 172 at 6). However, the Federal
Rules of Civil Procedure do not permit DAC to condition its compliance with Pendolino’s
request for production number 10 on reciprocal access to information in Defendants’
possession or control. If DAC wants information, it needs to propound its own requests for
production.
-9-
Platt has already created and analyzed a mirror image of the Laptop hard drive.
Pursuant to Pendolino’s request number 10 Connor, should have an equal opportunity to
examine, search, test, and analyze the same information that was made available to
Platt. This is particularly the case because the parties are not simply searching for
documents that may be uncovered by a keyword search. They want to know how the
Laptop and Identified USB were used during a specific period of time. To make this
determination both experts need to search the hard drive for traces, remnants, and
residue and then follow those trails, wherever they lead.
While Pendolino is entitled to this discovery, DAC is entitled to the protection of its
confidential and trade secret information and other information that is not relevant to this
case. So that Pendolino has the necessary access to the mirror image of the Laptop hard
drive and DAC’s privacy interest is protected, Pendolino’s request for production number
10 is GRANTED as follows:
(1) Connor shall agree in writing to be bound by the terms of the parties’ Stipulated
Confidentiality Agreement. The Court understands Connor has already signed the
necessary paper. If not, he shall before there is any further action on request number 10.
(2) Within seven days from the rendition of this Order, Connor and Platt shall meet
and confer to discuss the methods Connor will employ to search, test, and analyze the
mirror image of the hard drive. The experts are not required to agree on the
methodologies Connor will utilize and Connor is not limited to the methodologies he
discusses with Platt. But, this process may save time and, if Platt is concerned that
Connor intends to do something inappropriate, he can alert DAC’s lawyers so that they
can bring the concern to the Court. During their meet and confer Platt and Connor shall
- 10 -
agree on the time and place when Connor will be given access to the mirror image of the
hard drive.
(3) On the agreed date, at the agreed location, the mirror image of the hard drive
shall be produced for examination, search, testing, and analysis by Connor. This process
shall continue, day-by-day, until Connor has completed his work. Platt may be present
while Connor performs his work.
(4) All information collected by Connor shall be turned over to Platt for review by
DAC and its attorneys. Within seven days of its receipt of the information collected by
Connor, DAC shall produce a privilege log identifying any of the information it maintains is
privileged or not relevant to this case. That information shall be isolated and preserved,
the remaining information shall be produced to Pendolino’s attorneys and Connor.
(5) Counsel shall meet and confer to resolve any disputes over the information
listed on the privilege log. To the extent they are unable to resolve a dispute, the parties
may motion the Court for a determination.
(6) At the conclusion of the case, the information obtained by Connor shall be
disposed of in the manner prescribed in the parties’ Stipulated Confidentiality Agreement.
If the Agreement does not address disposal of the information, then all copies shall be
delivered to the attorneys representing DAC.
(7) Pursuant to Federal Rule of Evidence 502(d), by engaging in the protocol
established in this Order, the parties shall not be deemed to have waived the attorneyclient privilege, work product protection, or any other privilege or immunity with respect to
such disclosure in this case or in any other federal or state proceeding.
Pendolino’s motion to compel his requests for production numbered 2, 3 and 11 is
also GRANTED. The protocol for request number 10 also applies to requests number 2
- 11 -
and 3. Within ten days from the date of this Order DAC shall produce the information
sought in request number 11.
DAC has motioned the Court to compel Pendolino and Lumesis to comply with the
following requests for production:
DAC’s First Requests for Production to Pendolino:
No. 1: Any computer device (including laptops, desk
computers, and tablets), USB device, cell phone, physical
storage device, or device used to access cloud storage, that
was used to copy, download, or transmit Documents
containing DAC’s Confidential or Trade Secret Information.
No. 2: Any program or service used to store any of
DAC’s Confidential or Trade Secret Information or any
Documents that contain DAC’s Confidential or Trade Secret
Information.
(Doc. 177 at 10).
These requests are premised on DAC’s belief that Pendolino stole its confidential
and trade secret information (Id.). At this point, Pendolino’s denial that he has any of the
requested information is a sufficient response. Platt’s findings do not persuade the Court
that DAC should be permitted to make a forensic examination of Pendolino’s computer
devices, programs and services in hopes of finding information responsive to these
requests. Accordingly, DAC’s motion to compel its requests 1 and 2 directed to Pendolino
is DENIED.
DAC’s First Requests for Production to Lumesis:
No. 7: All computer artifacts for any computer devices
(including laptops, desk computers, and tablets) that Lumesis
gave Pendolino access to or use of, including the Dell XPS
desk top computer, serial number H080KB2, sufficient to show
whether any DAC Documents have resided on, been
transmitted to or from, been stored for any period of time on or
in, or have been deleted from any such computer device, or
any component or part thereof.
- 12 -
(Doc. 177 at 10).
Lumesis responded that it was willing “to provide an image of the hard drive from
Pendolino’s computer to an agreed upon independent third party to perform a search of
artifacts which might be responsive to this request upon commonly accepted terms
provided that the third party does not provide any document or information otherwise
objected to.” (Doc. 177 at 10). In a separate letter, Lumesis then asked DAC for “the
specific protocols and searches it intends to use, and the nature, scope, and breadth of
the investigation it intends to make.” (Doc. 187 at 4-5). Lumesis also wants “to know the
method(s) by which [DAC] intends (and will) protect all unrelated confidential and
proprietary Lumesis business information, other than pursuant to the Stipulated
Confidentiality Agreement …” (Id.). This dispute over process is easily resolved. DAC’s
motion to compel its request number 7 to Lumesis is GRANTED. The parties and their
designated experts shall follow the protocol established for Pendolino’s request number
10.
DAC’s Second Requests for Production to Lumesis:
No. 5: All DAC Documents or DAC-related documents
used in any way in connection with the creation of any
changes to the DIVER presentation format made from January
1, 2016 to and including the date of your responses to these
requests.
(Id.). Lumesis’ responded to this request: “None. No DAC Documents or DAC-related
Documents were used in any way in connection with the creation of any changes to the
DIVER Underwriter Platform, either before or after January 1, 2016.” (Id., at 11). DAC has
not persuaded the Court to authorize a more intrusive search of Lumesis’ records in
hopes of finding information responsive to this request. Therefore, DAC’s motion to
compel its request number 5 is DENIED.
- 13 -
DONE and ORDERED in Orlando, Florida on January 10, 2019.
Copies furnished to Counsel of Record
- 14 -
Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.
Why Is My Information Online?