Williams v. American College of Education et al

Filing 235

MEMORANDUM Opinion and Order written by the Honorable Gary Feinerman on 9/16/2019.Mailed notice.(jlj, )

Download PDF
UNITED STATES DISTRICT COURT FOR THE NORTHERN DISTRICT OF ILLINOIS EASTERN DIVISION TRIANO WILLIAMS, Plaintiff/Counter-Defendant, vs. AMERICAN COLLEGE OF EDUCATION, INC., Defendant/Counter-Plaintiff. ) ) ) ) ) ) ) ) ) 16 C 11746 Judge Gary Feinerman MEMORANDUM OPINION AND ORDER Triano Williams brought this suit against his former employer, American College of Education, Inc. (“ACE”), under 42 U.S.C. § 1981, Titles VI and VII of the Civil Rights Act of 1964, 42 U.S.C. §§ 2000d et seq., 2000e et seq., and state law, alleging that he was discriminated against and ultimately terminated due to his race and in retaliation for complaining about discrimination. Doc. 8. ACE counterclaimed, alleging theft under Indiana law. Doc. 29. Williams then filed an amended complaint, adding allegations that ACE defamed him by publishing false allegations that he locked ACE out of its Google email account after his termination. Doc. 59. ACE moves under Civil Rule 37(e) and the court’s inherent authority for sanctions against Williams for spoliation of evidence, charging that he intentionally destroyed electronically stored information by installing a new operating system on his ACE-issued laptop, rendering unrecoverable potentially relevant files. Docs. 90, 189. Williams denies ACE’s charge, contending that he kept a second ACE-issued laptop at ACE’s Indianapolis office, and theorizing that ACE used that laptop—or a combination of his two laptops—to fabricate evidence of the alleged spoliation. Doc. 215 at 12-15. The court held an evidentiary hearing and 1 entertained oral argument. Docs. 208, 210-215. Having heard, reviewed, and carefully considered the evidence, the court finds that Williams destroyed files on his laptop by installing a new operating system and committed perjury in denying that he had done so, and therefore grants ACE’s sanctions motion, dismisses Williams’s claims, and relinquishes its jurisdiction over ACE’s counterclaim. Background Williams worked in ACE’s Information Technology (“IT”) department from 2007 through February 2016. Doc. 124-2 at ¶ 6. He was a systems administrator from 2013 through 2016. Id. at ¶ 8. From 2011 until his termination, Williams worked remotely from his home in Riverdale, Illinois. Id. at ¶¶ 10-11; Doc. 214 at 4. On February 12, 2016, ACE told Williams that it was relocating all IT employees to its Indianapolis headquarters and that he would no longer be permitted to work remotely from home. Doc. 124-2 at ¶ 12; Doc. 212 at 68-69, 169; Doc. 124-4. Williams alleges that he was subjected to discriminatory treatment due to his race over the course of his employment and that ACE forced him to choose between relocating and leaving his job due to his race and in retaliation for his prior complaints about discrimination. Doc. 59 at ¶¶ 43-52. The most salient of those complaints were set forth in a letter (the parties call it the “ACE Culture Letter”) that Williams sent to supervisors expressing his concerns that “[t]he culture of [ACE] has become very toxic … and seems to affect only the African American demographic of our college.” Doc. 124-3; Doc. 59 at ¶ 14. The letter is dated February 11, 2016—the day before ACE announced on February 12 that all IT employees had to relocate to Indianapolis—but the parties dispute whether Williams in fact prepared and sent it before February 12. 2 A. Williams’s Knowledge of His Preservation Obligations On February 29, 2016, ACE told Williams that it was placing him on a leave of absence and that he should no longer report to work. Doc. 124-2 at ¶ 21. Williams’s attorney sent ACE a letter that day, informing it of Williams’s intent to bring this suit. Doc. 89 at 10-11. ACE’s counsel responded on March 10, 2016, stating: The College asks that you remind Mr. Williams that he has affirmative obligations to preserve any and all electronic and paper documents that are relevant to his claims, his separation and his employment with the College. This not only includes preserving his company property without destruction, but also any personal email, text messages or other forms of communication that he has had with other current or former College employees. We trust Mr. Williams has and will continue to comply with [h]is preservation obligations. Id. at 13-14. B. Williams’s Home Laptop On February 29, 2016, the day Williams was placed on a leave of absence, ACE cut off his access to its network by changing his password and disabling his account. Doc. 212 at 54, 69, 175; Doc. 214 at 4; Doc. 124-2 at ¶¶ 21, 42. Although Williams’s network access was disabled, he still could have logged into the ACE-issued laptop he kept at home by using either his previous password—because the computer was no longer on ACE’s network, it would not have received the update invalidating that password—or the local administrator credentials. Doc. 212 at 70-71; Doc. 214 at 4-5. According to James Aldridge, ACE’s vice president of technology, ACE could not have remotely accessed Williams’s laptop after it was removed from the network. Doc. 212 at 57, 70. On April 21, 2016, KK Byland, ACE’s vice president of human resources, sent Williams a FedEx box so that he could return his ACE-issued laptop to ACE. Doc. 89 at p. 2, ¶ 5. Aldridge testified that on May 10, 2016, a receptionist delivered to his office a sealed FedEx box 3 from Williams containing the laptop. Doc. 212 at 80-81. IT managers Steven Carey and Rick Gehring were in Aldridge’s office at the time. Ibid. Aldridge testified that he laid out the contents of the box—the laptop and a few pieces of bubble wrap—and photographed them. Id. at 81; Doc. 178-3 at 16. (Williams testified that he also sent back his power cord and keycard, neither of which appears in the photograph. Doc. 214 at 23-24; Doc. 178-3 at 16.) Aldridge did not photograph the bottom of the laptop, where the service tag (Dell’s version of a serial number) was located. Doc. 212 at 118-119; Doc. 214 at 60. Aldridge then opened the laptop and turned it on, at which point he realized that it “was no longer on [ACE’s] domain and that the screen was cracked.” Doc. 212 at 81. After Aldridge told Byland that he had received the laptop, she gave him a chain of custody form. Id. at 82. Aldridge filled out the form and then locked both the form and the laptop in his desk, using a key on his keychain. Id. at 82-84. The chain of custody form identifies the laptop as a “DELL Latitude E7450 wrapped in bubble wrap in a large Fedex box” with a “[v]isibly damaged screen,” but does not note its service tag. Doc. 178-3 at 11. Williams testified that ACE’s IT department, including Aldridge, typically identified devices by their service and asset tags. Doc. 214 at 181. According to Aldridge, ACE’s “standard procedure” when receiving a former employee’s laptop was to gather the files from the laptop and provide them to the employee’s supervisor, who then reviewed the files to determine whether any should be kept. Doc. 212 at 84. IT then “wipe[d] [the] computer and put a fresh image on it … for the next user.” Ibid. IT was unable to perform this procedure on Williams’s laptop because a new operating system had been installed. Id. at 84-85. 4 Aldridge gave the laptop to Jacob Carey on May 12, 2016—a transfer he recorded on the chain of custody form, Def. Ex. 9 at 1; Doc. 178-3 at 11; Doc. 124-14 at 6—who used a bootable operating system to access the computer in search of “any additional files on the laptop that [ACE] could preserve.” Doc. 212 at 84-85. Jacob Carey accessed the laptop, changed the local administrator password, and logged in. Id. at 85. Upon doing so, he discovered that the laptop had been loaded with a new copy of the Windows 7 operating system and that “no files from … Williams were present on the laptop.” Ibid. Jacob Carey then returned the laptop to Aldridge, who kept it locked in his desk drawer until, upon leaving ACE in January 2017, he gave it to Steven Carey. Id. at 87; Doc. 178-3 at 11. In his responses to ACE’s requests for production, Williams repeatedly stated that the requested documents could be found on the laptop that he returned to ACE. Doc. 89 at 22, 3637. For example, Williams responded to ACE’s request to produce “[a]ll documents that refer or relate in any way to your employment with [ACE], including but not limited to, time records, policies, procedures, and personnel documents” by stating: “These documents were maintained electronically and were accessed via my laptop which was returned.” Id. at p. 22, ¶ 1. Williams gave a similar response—“Documents that may have been contained on my laptop are now unavailable.”—to ACE’s requests for “[d]ocuments relating to any communications, including but not limited to e-mails and text messages,” between Williams and Rommel Haynes, Dr. Linetta Durand, Amber Ying, or “any person not employed by [ACE] regarding the allegations in the Complaint.” Id. at pp. 36-37, ¶¶ 60-63. And Williams gave that same response to ACE’s request for documents “reflecting [his] job duties and responsibilities while he was employed by [ACE]” and documents related to his attempts to obtain employment after he left ACE. Id. at p. 37, ¶¶ 65-66. 5 C. D4/Evans’s Forensic Analysis ACE sent Williams’s laptop to John Evans, a computer forensics expert with the firm D4, LLC, to perform a forensic analysis. Doc. 214 at 29-31; Doc. 89 at 94. D4 received the laptop and ACE’s chain of custody form in July 2017. Doc. 214 at 31. Evans testified that the laptop received by D4 matched the description on the chain of custody form. Ibid. The shipping label identified the sender as Steven Carey, as did the form. Doc. 178-2 at 7, 13. Evans testified that D4 never received any other computers from ACE, and that D4 examined only one laptop: a Dell Latitude E7450 with service tag CXF4M32 received from ACE. Doc. 214 at 31-32, 41. Byland testified that the laptop Williams returned to ACE was the one that ACE sent to Evans and that she had no reason to believe that anyone had altered or tampered with it. Doc. 212 at 177. Evans performed a forensic examination on the laptop and found that the operating system had been reinstalled on March 28, 2016. Doc. 214 at 32. Evans added that the previous operating system had been installed on June 1, 2015. Id. at 42. Evans testified that reinstallation requires human intervention in the form of “affirmative actions to click through screens to set up the new operating system.” Id. at 37. In Evans’s experience, reinstalling an operating system is a common method of deleting information from a computer. Ibid. He explained that when an operating system is reinstalled, files that were deleted before the reinstallation can be overwritten, making them unrecoverable. Id. at 32. Evans found evidence that the reinstallation of the operating system on Williams’s laptop had that effect. Id. at 33. Specifically, he found “evidence of at least 20 files that were opened prior to the reinstallation”—and thus “were present on the hard drive at that time”—but that “no longer exist[ed] on the device” when he examined it. Ibid. Evans testified that he was unable to recover any autosaved Google login information or any email communications other than those 6 saved in Outlook (and therefore available independently through Outlook). Id. at 32-33, 46. When Evans received the laptop, it did not appear to be associated with any domain or physical network. Id. at 35. According to Evans, reinstalling the operating system moves the previous operating system and user profiles—which Evans described as “a collection of documents related to logins on that computer”—to a “windows.old” folder. Id. at 34. Evans found six user profiles that pre-dated the reinstallation: “Administrator,” which accessed the device from June 2015 through March 2016; “Jose.Rubio,” which accessed the device in July 2015; “Triano.Williams,” which accessed the device from August 2015 through January 2016; “Triano.Williams.ACE,” which accessed the device from January through February 2016; and two profiles with no activity (“Default” and “Public”). Id. at 34-36, 48; Doc. 89 at 95. From August 2015 through February 2016, the only profiles with any activity were “Triano.Williams” and “Triano.Williams.ACE.” Doc. 214 at 36. The only profiles present after the operating system reinstallation were “ACE,” “Default,” “Public,” and an “Administrator” profile deleted shortly after the reinstallation. Id. at 37; Doc. 89 at 95. Evans found evidence of activity on the previous operating system on March 4, March 9, and March 28, 2016. Doc. 214 at 34. That activity included opening about twenty files on March 28, 2016, the date of the reinstallation. Id. Because none of those files were present on the laptop after the reinstallation, Evans concluded that they had been deleted before the reinstallation. Id. at 34-35. Evans was able to determine the names of the deleted files but not their contents, id. at 66-67, and observed that the names of files do not necessarily match their contents, id. at 82-83. Evans also found that USB devices were connected to the laptop on February 29 and March 3, 2016. Id. at 36. Evans did not find any documents or activity from 7 after the reinstallation. Id. at 37. Evans found the TeamViewer application (a mechanism for obtaining remote access to a computer) and the logs it generated when used, but he did not find any evidence of TeamViewer activity after February 1, 2016, nor did he find any other evidence of remote access in connection with the March 28, 2016 reinstallation. Id. at 36, 44; Doc. 178-2 at 4. Evans testified that as far as he knows, it is not possible to reinstall an operating system remotely. Doc. 214 at 76. If it were possible to do so, Evans would expect the process to leave behind evidence, but he did not find any. Id. at 79. Evans recovered more than 10,000 deleted items, which he opined were recoverable only through forensic means. Id. at 41. Evans opined that all the items were deleted from the laptop he examined. Ibid. He added that “it is impossible to tell what information was overwritten, and therefore no longer recoverable, as a result of the” reinstallation. Doc. 178-2 at 3. Evans looked for evidence of tampering beginning on May 10, 2016—when ACE received the laptop from Williams—but found none. Doc. 214 at 38. Evans found nothing on the laptop that was altered after May 12, 2016, when Jacob Carey used a boot disk to start the computer and reset the password. Id. at 37, 47; Doc. 178-3 at 18-19. Evans found two files consistent with the activity that Jacob Carey described, both dated May 12, 2016. Doc. 178-2 at 5, 19-21. Evans testified that he would expect to find evidence of doctoring if someone had tried to make a laptop look like someone else was using it. Doc. 214 at 38. D. Protek/Glud’s Forensic Analysis Williams hired Protek International, Inc. to analyze a copy of the forensic image that D4 had made of his laptop. Doc. 169-2 at 1. Like Evans, Protek found that the “active operating system” was installed March 28, 2016, likely by way of reinstalling Windows, as evidenced by the presence of the “Windows.old” folder. Id. at 2. Protek found a few dozen emails to or from Williams’s personal accounts. Ibid.; Doc. 169-1 at ¶ 9. (Evans testified that Protek’s finding 8 those emails is not inconsistent with his conclusion that there were no recoverable emails because Evans searched for locally saved emails, not for emails available in Outlook. Doc. 214 at 46; Doc. 178-2 at 5.) Protek did not find the two files that Jacob Carey said he renamed— “Utilman.exe” to “Utilman.exe.old,” and “cmd.exe” to “Utilman.exe”—while attempting to access the laptop with a boot disk, but Protek did find evidence that a program file named “Utilman.exe” was last run on May 10, 2016. Doc. 169-2 at 3. Protek found “[s]everal versions of spreadsheets tracking ACE computer assets.” Ibid. Protek also examined “ShellBag” and “UserAssist” artifacts, which can provide information about user activity. Ibid. Protek determined that the ShellBag data, which “help[] track the views, sizes and positions of a folder when displayed on a monitor screen” and thus offer “insight into the folder/browsing history of a user,” provided “evidence of network access to resources attributable to Higher Education Holdings”—ACE’s holding company—from June 3, 2015 through January 6, 2016. Ibid. Protek also determined that the UserAssist artifacts, which record “programs executed by a user account,” showed activity on the same profiles and in the same time periods as Evans had found. Compare ibid., with Doc. 214 at 34-36, 48, and Doc. 89 at 95. At the evidentiary hearing, Williams asked Evans whether a spreadsheet Protek prepared of the UserAssist data, Pl. Exs. 12, 22; Doc. 169-2, contained evidence of remote access to Williams’s laptop on March 28, 2016. Doc. 214 at 84-87. Evans opined that even assuming that the UserAssist spreadsheet was accurate, it showed only that a program named “Remote Desktop Connection” was run on the laptop after the reinstallation, not that the laptop was in fact accessed remotely from another device. Doc. 214 at 87-89. (Although Plaintiff’s Exhibit 22 was 9 not separately admitted at the evidentiary hearing, it is a reproduction of Exhibit D to Protek’s report, Doc. 169-2; Pl. Ex. 12, which Williams filed in its native (Excel) format on a USB drive.) Todd Glud, Protek’s director and senior consultant for electronic discovery and computer forensics, opined that ACE’s chain of custody form was deficient because it did not “record any unique identifying information,” such as a service tag, that would distinguish Williams’s laptop “from other laptops of the same make and model.” Doc. 169-1 at ¶¶ 1, 6. (ACE’s motion to strike Glud’s opinions about the chain of custody form, Doc. 163, is denied as moot because those opinions do not affect the outcome of ACE’s spoliation motion.) Glud also opined that one of the inventory spreadsheets on the forensic image of Williams’s laptop indicated that “two Dell Latitude E6430 laptop computers” were at some point assigned to Williams, both with service tags different from the tag on the E7450 laptop that D4 analyzed. Doc. 169-1 at ¶ 8. Williams averred in a declaration that the laptop he returned to ACE from his home and the laptop he used at the Indianapolis office (of which more in a moment) were E7450s. Doc. 180-15 at ¶¶ 8, 3132. Evans prepared a supplemental report in response to Protek’s findings and Williams’s declaration. Doc. 178-2 at 2. Evans opined that Protek’s findings were largely consistent with his own. Id. at 4-5. Evans agreed with Glud that the inventory documents referred to two E6430 laptops, but found that none of the documents referred to the service tag of the laptop that D4 imaged. Id. at 5. Ultimately, Evans opined that Protek’s findings were “consistent with D4’s conclusion that the reinstallation of the operating system may have caused the permanent deletion of … potentially relevant information.” Id. at 6. Given the lack of evidence of remote access and the affirmative steps required to accomplish reinstallation, Evans opined that “the 10 reinstallation of the operating system, creation of the ACE user account, and deletion of the administrator user account were completed locally on March 28, 2016.” Ibid. E. Williams’s Denials of Having Installed a New Operating System At his deposition, in his declaration, and at the evidentiary hearing, Williams denied having installed a new operating system on his laptop before returning it to ACE. Doc. 89 at 86 (p. 156, ll. 17-19); Doc. 180-15 at ¶ 4; Doc. 214 at 147. At the evidentiary hearing, Williams also denied having deleted any documents “pertaining to this litigation.” Doc. 214 at 172. Williams admitted that, before returning the laptop, he deleted personal files like “pictures of [his] daughter and family activities and things like that” and possibly “a couple of court [child] custody document things.” Id. at 132, 172. Williams testified that if he had wanted to delete information from the laptop, he would have reimaged it or “done a shred.” Id. at 147-148. Evans acknowledged that there are more effective ways to delete data from a laptop than reinstalling the operating system, such as physically destroying the hard drive or using a tool designed to wipe a hard drive. Id. at 69-70. Evans did not find any evidence that those methods were used on the laptop. Id. at 70. Williams also testified that while the reinstalled operating system was set to Pacific time, he “always” sets up computers with Central time. Id. at 148 (“It’s automatic with me.”). Moreover, Williams testified that his laptop contained “no documents regarding [racial] discrimination” at ACE because he discussed his concerns with coworkers only in person, on the phone, or through instant messaging. Ibid. When presented at the evidentiary hearing with the laptop that Aldridge identified as the one he received from Williams, Doc. 212 at 81-82, and that Evans identified as the one he received from ACE, Doc. 214 at 30-31, Williams said that he was not sure whether that laptop was in fact the one he returned to ACE, but that he did not think it was, id. at 169-170. Williams 11 explained that although the laptop was the same model as the one he returned, it had an asset tag that either was not on the laptop he returned or was in a different location, and that it had neither the webcam cover that he put on “just about every one of [his] laptops that ever had a web cam on it” nor the “stickiness” that removing the webcam cover would have left behind. Ibid. F. ACE’s Network and IT Migration ACE used an “image”—which Aldridge described as “a picture of an operating system, its applications and configuration,” “kind of like an initial print” that can be “replicate[d] … over and over again”—to standardize how employee laptops were configured. Doc 212 at 62. Aldridge testified that the only image in use during his time at ACE (from November 2015 through January 2017, id. at 57) was one created by Jose Rubio. Id. at 63-64. Rubio worked for ACE’s sister company, Academic Partnerships, to which ACE originally contracted its IT functions. Id. at 49, 63. Edward McGory, vice president of information technology at Higher Education Holdings (as noted, ACE’s holding company), testified that because Rubio created the image, his profile appeared on any computer configured using that image unless the profile was manually deleted. Id. at 191. Accordingly, McGory explained, the appearance of Rubio’s profile on a laptop does not necessarily mean that Rubio accessed the device. Ibid. ACE began taking over its IT functions from Academic Partnerships in 2015 and completed the migration sometime in 2016. Id. at 49-51. Aldridge testified that, as part of the migration, ACE created a new image in mid-2016. Id. at 102-103. He testified that Jacob Carey created the new ACE image and that he was not aware of Williams ever creating a new image. Id. at 102-103, 106. Williams and his coworker Haynes, by contrast, testified that Williams created a new image after the migration. Doc. 214 at 104, 140. Williams testified that he did so by July or August 2015, when he first received the laptop he kept at home, and therefore that Rubio’s profile was never on that device. Id. at 140-141. 12 Whenever a user logged in to one of ACE’s computers for the first time, the computer created for that user a “profile,” which is a folder holding “that person’s documents, settings, those sorts of things.” Doc. 212 at 63, 190. In December 2015, ACE switched from the Higher Education Holdings domain to its own domain as part of the migration of IT functions away from Academic Partnerships. Id. at 50, 64. Whenever a user logged in to an ACE computer for the first time after the domain change, the computer created a new profile under the new ACE domain. Id. at 64, 190. IT then moved the user’s files and settings to the new profile, and the old profile remained on the computer unless it was manually deleted. Id. at 64, 190-191. Aldridge testified that both before and after the domain change, Rubio’s profile appeared on the laptops that had been configured with the image Rubio created. Id. at 104-105. Williams testified that his profile would have appeared on several ACE laptops because he logged in while performing repairs on those devices. Doc. 214 at 12-13. McGory testified that Windows login credentials could not have been autosaved on an ACE-issued laptop such that anyone with physical access to the device could log in, and that IT administrators could change but not view a user’s network password. Doc. 212 at 181, 186-187. According to McGory, any ACE employee could access any laptop connected to the ACE network using that employee’s own credentials. Doc. 212 at 187. An employee who logged into another user’s laptop would gain access to the applications on the device, and a profile would be created on the laptop for that employee, but the employee would not be able to access other users’ profiles. Ibid. Accessing information that a user saved locally on a given device would thus require both the physical device and the user’s credentials. Id. at 188. G. The Second Laptop Williams testified that, in addition to the ACE-issued laptop he kept at home and sent back to ACE, he had a second laptop that he used when working at ACE’s Indianapolis office. 13 Doc. 214 at 8. Williams testified that he used the Indianapolis laptop to remotely access the ACE laptop he kept at home. Id. at 142; Doc. 132-10 at ¶ 21. Williams testified that the Indianapolis laptop “was one of the ones [he] let people use” as spares when their assigned laptops were being repaired. Doc. 214 at 8. He testified that although he loaned that laptop to others, “it wasn’t a loaner to [him],” but rather was “the computer that [he] had previous to” the one he kept at home and that was “still assigned” to him. Id. at 10. Williams did not put his name on the Indianapolis laptop. Id. at 16. The last time Williams worked from the Indianapolis office was in November or December 2015. Id. at 16-17. According to Shawntel Landry, ACE’s president, it was ACE policy to assign each employee only one laptop. Doc. 212 at 20. Aldridge and Byland testified that they were not aware of anyone being assigned two laptops at the same time. Id. at 88, 140-141. The IT department sometimes maintained a stock of loaner computers in the Indianapolis office. Id. at 43-44, 99, 158. Haynes testified that the loaners were kept along with other spare equipment in a service closet or server room. Doc. 214 at 101. Aldridge testified that the loaners were given out as spares to employees whose assigned laptops were being repaired. Doc. 212 at 99. Byland testified that she first learned in Fall 2018, nearly two years into this litigation, that Williams claimed to have been assigned more than one laptop. Id. at 141-142. ACE searched without success for additional laptops that had been assigned to Williams. Id. at 142. Byland testified that because she did not know in 2016 that Williams had used any other devices, the only device she preserved for discovery was the laptop he returned in May 2016. Ibid. Williams acknowledged that he did not disclose the existence of his second laptop during discovery, explaining that he “didn’t think about that computer” until he saw that Evans had found Rubio’s profile on the laptop sent to D4—a profile that Williams thought would not have 14 appeared on the laptop he returned to ACE. Doc. 214 at 8-9. When asked at his deposition, “Do you have any other computers in addition to that laptop computer that you returned to ACE?”, Williams testified, “I have my personal computer” and did not mention any second ACE-issued computer in Indianapolis. Def. Ex. 16; Doc. 214 at 186. At the evidentiary hearing, Williams gave this explanation for why he testified at his deposition that he had only one ACE-issued computer, the one he used at home and returned to ACE: I didn’t think about any other devices at that point because I didn’t use it on a regular basis. So, when we were talking about what was going on at the time, I was only thinking about the one that I currently had at home that I sent back. …. My personal computer had nothing to do with ACE, so when I said I had my personal computer, that’s what I said. And as I just stated, I wasn’t thinking about the second laptop that I left in Indiana. Doc. 214 at 185-186. Williams testified that, in addition to the Pacific time zone setting and the presence of Rubio’s profile on the laptop that D4/Evans examined, ShellBag artifacts he understood to have been found on the forensic image of that laptop and included in Protek’s report led him to think that the imaged laptop was not the one he returned, which in turn reminded him about the Indianapolis laptop. Doc. 214 at 158-159. Specifically, Williams interpreted the ShellBag data to indicate that Gehring and Dan Holstein had used the imaged laptop, reasoning that the data reflected that someone had accessed their network folders and Williams did not have access to those folders. Id. at 159-160. (Williams’s testimony was offered only to explain what made him think that the imaged laptop was not the one he had returned, and not for the truth of his interpretation of the ShellBag data. Id. at 157-158.) Williams testified that he reviewed the ShellBag data when he reviewed Protek’s November 13, 2018 report, id. at 149-151; Doc. 169-2, 15 about three months after he first averred in an August 6, 2018 declaration that he had a second laptop that was kept in Indianapolis, Doc. 124-2 at ¶¶ 43-45. Evans testified that ShellBag is “a forensic artifact that is related to windows that are open and preset on a Windows computer, and where those folders may point.” Doc. 214 at 72. Evans opined that ShellBag entries “evidence the location of folders that were accessed” but do not provide information about who accessed the folders. Id. at 72-74. According to Evans, ShellBag entries mentioning Gehring and Holstein indicated that someone using the laptop accessed network folders associated with Gehring and Holstein, and not that they personally used the laptop. Id. at 72-75. Williams testified that, in his experience, it is “pretty easy” to remove and replace a laptop’s physical screen, even for somebody without a technical background. Id. at 182. Williams estimated that it would take an experienced person about fifteen minutes with a small Phillips head screwdriver, while an inexperienced person working from a how-to video might need thirty minutes to an hour. Ibid. Aldridge testified that he never altered any device to make it look like it was Williams’s laptop, never used Williams’s credentials to log into any device, never sent emails or instant messages from Williams’s laptop, and never downloaded a new operating system onto Williams’s laptop. Doc. 212 at 89. Aldridge also testified that he was not aware of Williams ever using multiple devices in the Indianapolis office or of anyone else having access to the laptop Williams returned to ACE other than the people on the chain of custody form. Id. at 8990. Byland testified that she never removed Williams’s laptop from Aldridge’s drawer, accessed it with Williams’s credentials, altered the laptop in any way before sending it to Evans, altered any other device to make it look like it belonged to Williams, instructed anyone else to alter a 16 device, directed anyone to send any other computers to Evans, or directed anyone to add files to the laptop Williams returned. Id. at 147-148. When, after leaving ACE, Williams received phone calls from ACE employees who said that he was appearing as available on Skype for Business, he reported the problem to Byland. Id. at 172-173; Doc. 214 at 175-176. Byland referred the issue to Aldridge, Doc. 212 at 173-174, who told her that Williams’s Skype for Business account was disabled the day he left ACE and that his network access was cut off, Doc. 214 at 210-212; Def. Ex. 18. Williams testified that this issue arose after he returned his laptop, Doc. 214 at 176, but in fact he emailed Byland about it on March 10, 2016, Pl. Ex. 26, well before he returned the laptop in May 2016. H. Remote Access As noted, Williams maintains that he did not reinstall the operating system on his home laptop; instead, he suggests someone at ACE remotely accessed that laptop and performed the reinstallation. Doc. 215 at 15. ACE’s IT team used TeamViewer, a program that allowed IT employees providing technical support to remotely access a user’s desktop. Doc. 212 at 64-65. Aldridge testified that two people are required to initiate a TeamViewer session: the user seeking support must provide a session ID and password, and the IT employee must remotely enter those credentials to complete the connection. Id. at 65 (“Without [the credentials], you can’t just remote desktop in to anybody’s computer at will.”). Aldridge testified that TeamViewer generates a new password for each session, and that he had never seen it configured so that the password would stay the same across sessions. Id. at 107. McGory testified that TeamViewer cannot be used to remotely access a device unless the device is powered on and connected to the internet and the TeamViewer application is running. Id. at 188-189. 17 Haynes testified that when one laptop is used to remotely access another, the second laptop’s files are not transferred to the first laptop unless the user manually moves a file from one computer to the other. Doc. 214 at 119. Williams testified that he set up TeamViewer on his home laptop so that the password would stay the same each session, allowing him to connect to that laptop from his second laptop in Indianapolis so long as the one at home was turned on and had TeamViewer installed. Id. at 9. Evans opined that it could have been possible to remotely access Williams’s laptop without his cooperation. Id. at 77. I. ACE’s Google Account and Williams’s Deletion of Emails ACE had a student email account hosted by Google. Doc. 212 at 20. In May 2016, ACE began receiving complaints from students who said that they were locked out of their individual email accounts. Doc. 212 at 21, 53. ACE discovered that it was locked out of the account and that Williams was still listed as the administrator. Id. at 21. At some point after Williams returned his laptop to ACE, Aldridge asked him for help accessing the Google account. Doc. 214 at 6-7. Williams told Aldridge that his administrator password was autosaved on the returned laptop and that he would be willing to help if Aldridge sent the laptop back to him. Doc. 212 at 115. Williams testified that he did not know the password. Doc. 214 at 133. Aldridge did not return the laptop to Williams because “[t]here was no data on the computer for [Williams] to retrieve at that time.” Doc. 212 at 115. Williams testified that his Google credentials were also autosaved on the laptop he kept in the Indianapolis office. Doc. 214 at 5. Williams further testified that he did not tell Aldridge about the laptop in Indianapolis because he “didn’t think about it.” Id. at 7-8. ACE believed, based on records from Google, that the recovery email address for its Google account was “trianoaw09@live.com,” Williams’s personal email address. Doc. 212 at 18 24; Doc. 214 at 197. In a February 21, 2018 letter responding to ACE’s concerns with Williams’s discovery responses, his counsel stated that Williams “has not saved emails back to 2007 as he has them on auto delete every 30-90 days and in addition, [he] cleans out his emails on a regular basis. Also, [Williams] does not retain text messages as it affects the storage and function of his phone.” Doc. 89 at 80-81. J. The ACE Culture Letter Byland testified that she received the ACE Culture Letter—which, as noted, was dated February 11, 2016—on February 23, 2016, eleven days after the February 12, 2016 team meeting in which ACE asked all its IT employees to relocate to Indianapolis. Doc. 212 at 169. Williams, however, testified that he sent the letter shortly before ACE told him about the relocation. Doc. 214 at 128. Neither Evans nor Protek found the ACE Culture Letter on Williams’s laptop, except for the copy Williams attached to an email (whose date is not apparent from the record) that he sent to Aldridge, Byland, and Landry. Doc. 89 at 96; Doc. 169-2 at 2-3. Discussion ACE seeks sanctions for Williams’s alleged spoliation—reinstalling his ACE-issued laptop’s operating system and thereby rendering unrecoverable the files that had been deleted before the reinstallation—under Rule 37(e) and the court’s inherent authority. Rule 37(e) permits sanctions “[i]f electronically stored information that should have been preserved in the anticipation or conduct of litigation is lost because a party failed to take reasonable steps to preserve it, and it cannot be restored or replaced through additional discovery.” Fed. R. Civ. P. 37(e). If the court “find[s] prejudice to another party from loss of the information,” it “may order measures no greater than necessary to cure the prejudice.” Fed. R. Civ. P. 37(e)(1). However, if the court “find[s] that the party [responsible for not preserving the information] acted with the intent to deprive another party of the information’s use in the litigation,” it may: 19 “(A) presume that the lost information was unfavorable to the party; (B) instruct the jury that it may or must presume the information was unfavorable to the party; or (C) dismiss the action or enter a default judgment.” Fed. R. Civ. P. 37(e)(2). Aside from its Rule 37 authority, the court has the inherent “ability to fashion an appropriate sanction for conduct which abuses the judicial process.” Chambers v. NASCO, Inc., 501 U.S. 32, 44-45 (1991); see also Roadway Express, Inc. v. Piper, 447 U.S. 752, 765 (1980) (describing the “well-acknowledged inherent power of a court to levy sanctions in response to abusive litigation practices”) (internal quotation marks omitted). “Sanctions imposed pursuant to the district court’s inherent power are appropriate where a party has willfully abused the judicial process or otherwise conducted litigation in bad faith.” Tucker v. Williams, 682 F.3d 654, 66162 (7th Cir. 2012); see also Ramirez v. T & H Lemont, Inc., 845 F.3d 772, 776 (7th Cir. 2016) (same). That power is “permissibly exercised not merely to remedy prejudice to a party, but also to reprimand the offender and to deter future parties from trampling upon the integrity of the court.” Salmeron v. Enter. Recovery Sys., Inc., 579 F.3d 787, 797 (7th Cir. 2009) (internal quotation marks omitted). “Because of their very potency, inherent powers must be exercised with restraint and discretion.” Chambers, 501 U.S. at 44; see also Mach v. Will Cnty. Sheriff, 580 F.3d 495, 502 (7th Cir. 2009) (“A district court should be cautious when exercising such inherent authority.”). The inherent power should be used “sparingly, to punish misconduct (1) occurring in the litigation itself, not in the events giving rise to the litigation … , and (2) not adequately dealt with by other rules.” Zapata Hermanos Sucesores, S.A. v. Hearthside Baking Co., 313 F.3d 385, 391 (7th Cir. 2002); see also Chambers, 501 U.S. at 50 (“[W]hen there is bad-faith conduct in the course of litigation that could be adequately sanctioned under the Rules, the court ordinarily 20 should rely on the Rules rather than the inherent power.”); United States v. Rogers Cartage Co., 794 F.3d 854, 863 (7th Cir. 2015) (declining to affirm the district court’s sanctions order on the basis of the court’s inherent authority because “Rule 11 was adequate for the court’s purposes”). “But if in the informed discretion of the court, neither [a] statute nor the Rules are up to the task, the court may safely rely on its inherent power.” Chambers, 501 U.S. at 50. The inherent authority is properly exercised where “conduct sanctionable under the Rules was intertwined within conduct that only the inherent power could address,” as “requiring a court first to apply Rules and statutes containing sanctioning provisions to discrete occurrences before invoking inherent power to address remaining instances of sanctionable conduct would serve only to foster extensive and needless satellite litigation, which is contrary to the aim of the Rules themselves.” Id. at 51. Accordingly, “the inherent power of a court can be invoked even if procedural rules exist which sanction the same conduct.” Id. at 49; see also Mach, 580 F.3d at 502. “[O]utright dismissal … is a particularly severe sanction, yet is within the court’s discretion” under its inherent authority. Chambers, 501 U.S. at 45. The court may invoke its inherent authority to “dismiss a case for discovery violations or bad faith conduct in litigation,” Greviskes v. Univs. Research Ass’n, 417 F.3d 752, 758 (7th Cir. 2005), so long as dismissal is “proportionate to the gravity of the offense,” Montano v. City of Chicago, 535 F.3d 558, 563 (7th Cir. 2008). Significant here, “[a]s a fraud on the court, perjury may warrant the sanction of dismissal.” Id. at 564. The Seventh Circuit does “not require a district court to measure the impact on the litigation of a wrongdoer’s willful misconduct before it issues a dismissal sanction,” Salmeron, 579 F.3d at 797, but still the court must “find that the responsible party acted or failed to act with a degree of culpability that exceeds simple inadvertence or mistake before it may choose dismissal as a sanction for discovery violations,” Ramirez, 845 F.3d at 776. 21 “In civil cases, the facts underlying a district court’s decision to dismiss the suit or enter a default judgment as a sanction under Rule 37 or the court’s inherent authority need only be established by a preponderance of the evidence.” Id. at 781. Williams concedes that he had a duty to preserve the files on the ACE-issued laptop he kept at home. Doc. 124 at 16, 22. And Williams does not dispute that the forensic image created by Evans shows that someone reinstalled the operating system on the laptop Evans examined, rendering unrecoverable many files that had been deleted from the laptop before the reinstallation. But Williams offers two theories as support for the proposition that he did not reinstall the operating system: (1) Evans examined a laptop different from the one Williams returned to ACE; and/or (2) someone else reinstalled the operating system on the laptop Evans examined and tried to frame Williams for the resulting spoliation. Doc. 215 at 12-17. I. Williams’s Willful Spoliation of Evidence To prevail under Rule 37(e)(2) or the court’s inherent authority, ACE must show by a preponderance of the evidence that Williams engaged in spoliation with the requisite intent. The evidence here more than meets that standard. A. Spoliation ACE’s version of events is supported by the record, and it proceeds as follows. Williams returned his ACE-issued laptop to ACE in May 2016. Doc. 214 at 5. Aldridge credibly testified that he received the laptop, turned it on, and discovered that the screen was damaged and the laptop was no longer on ACE’s domain. Doc. 212 at 80-81. Aldridge gave the laptop to Jacob Carey, and Carey discovered that the operating system had been reinstalled and that he could not find any of Williams’s files. Id. at 84-85. Aldridge credibly testified that he then kept the laptop locked in his desk drawer until he left ACE in January 2017, at which point he gave it to Steven Carey. Id. at 87. Steven Carey sent the laptop to D4 in July 2017. Doc. 178-2 at 7, 13; Doc. 214 22 at 31. Evans credibly testified that the laptop D4 received from ACE matched the description on the chain of custody form and that it was the only device for which he prepared a forensic image. Doc. 214 at 31-32, 41. Protek conducted its analysis using the forensic image that Evans had created. Doc. 1692 at 1. Both Evans and Protek found that the laptop’s operating system was reinstalled on March 28, 2016—while the laptop was in Williams’s possession. Doc. 214 at 32; Doc. 169-2 at 2. Evans found (and Protek did not dispute) that at least twenty files had been opened before the reinstallation but no longer existed on the laptop, indicating that they had been deleted before the reinstallation and then overwritten and rendered unrecoverable by the reinstallation. Doc. 214 at 32-33. Evans opined (and Protek again did not dispute) that the reinstallation required human intervention and was performed locally. Id. at 37; Doc. 178-2 at 6. Evans further opined that reinstalling an operating system is a common method of wiping information from a computer because it can cause the permanent destruction of data deleted prior to the reinstallation. Doc. 214 at 32-33, 37; Doc. 178-2 at 6. In sum, the record amply supports the conclusion that on March 28, 2016, when the laptop was in Williams’s custody at his home, and after he had informed ACE of his intent to sue and been reminded of his preservation obligations, Doc. 89 at 10-11, 13-14, he deleted files and then reinstalled the operating system, thus wiping those files from the laptop. Williams’s denial of having reinstalled the operating system is not credible. In the face of the evidence just discussed, believing Williams’s denial would require embracing one of his two theories, both of which amount to convoluted conspiracies that the record does not support. First, Williams submits that, more than a month before he returned his laptop to ACE, ACE rigged a second laptop to make it appear to be Williams’s and reinstalled that laptop’s operating 23 system to make it look like he performed the reinstallation; that after Williams returned his laptop, ACE switched the laptops’ screens, putting the returned laptop’s damaged screen on the rigged second laptop; and that ACE then sent the rigged laptop to D4 for a forensic analysis. Doc. 215 at 12-17. Second, Williams submits that ACE remotely accessed his laptop more than a month before he returned it to ACE; reinstalled its operating system (which may or may not have been possible to do remotely); and then sent the returned laptop to D4 for forensic analysis, adding some data (perhaps from his Indianapolis laptop) along the way. Ibid. The court finds credible the testimony from ACE witnesses denying that they did these things, and also finds credible Evans’s testimony that the forensic evidence renders implausible Williams’s theories. As to the second ACE-issued laptop that Williams says he used in Indianapolis, the court finds that regardless how many laptops were formally assigned to Williams, compare Doc. 214 at 8 (Williams testifying that he had two), with Doc. 212 at 20, 88, 140-141 (Aldridge, Byland, and Landry testifying that, as far as they knew, nobody had more than the one laptop permitted by ACE policy), he used other laptops when he worked in the Indianapolis office, including at least one of the IT department’s loaners, Doc. 214 at 8. But the court’s siding with Williams on that factual dispute ultimately gets him nowhere. To the extent Williams argues that the data no longer accessible on his home laptop was available to ACE all along because the data also was on the laptop he used in Indianapolis—and therefore that the destruction of that data on his home laptop was harmless because that data remained on the Indianapolis laptop—his argument fails for two separate and independent reasons. First, there is no evidence that any laptop in Indianapolis had on it the data that was deleted from Williams’s home laptop. Rather, the only evidence of record, which is both uncontradicted and credible, is that Williams’s remotely accessing his home laptop from 24 Indianapolis would not automatically have copied any files to the Indianapolis laptop. Doc. 214 at 119. Second, there is no evidence that ACE knew that Williams had saved relevant information on any laptop other than his home laptop. The court credits Byland’s uncontradicted testimony that: (1) ACE knew only about the laptop Williams kept at home and therefore preserved only that device; and (2) by the time ACE learned in Fall 2018, nearly two years after this case began, about the alleged second laptop, its search for additional laptops was fruitless. Doc. 212 at 142. Thus, even if data deleted from Williams’s home laptop also resided on his Indianapolis laptop, his failure for nearly two years to reveal in discovery the very straightforward and highly pertinent fact that he had an Indianapolis laptop deprived ACE of the opportunity to retrieve that data. ACE’s lack of knowledge that Williams used other laptops in Indianapolis also undercuts—and is all but fatal to—his theory that ACE substituted an Indianapolis laptop for his home laptop when it sent the device to D4 for analysis. If ACE did not know that there was a second laptop until Fall 2018, it could not have reinstalled the operating system on that laptop in March 2016, waited until Williams returned his home laptop that May, swapped the screens, planted the files associated with Jacob Carey’s attempt to access the laptop, and then sent the second laptop to D4 in July 2017. And even if ACE were lying about its lack of knowledge—or had planted not only the evidence just described, but also the trail of Williams’s activity dating back to August 2015, the date of the first recorded activity by the “Triano.Williams” profile, Doc. 89 at 95; Doc. 214 at 35—framing Williams in this way would have required an incredible degree of clairvoyance. Or if not clairvoyance, the technical skill to backdate its activity without leaving a forensic trace, a possibility that finds no support in the record. 25 To support his switched laptop theory, Williams points to what he believes are three suspicious circumstances: (1) the failure to record the laptop’s service tag on ACE’s chain of custody form; (2) the ShellBag data indicating that someone used the laptop to access Gehring’s and Holstein’s network folders; and (3) the presence of Rubio’s profile. None of that evidence makes Williams’s theory even remotely plausible. As to the first suspicious circumstance, ACE’s documentation of the chain of custody was imperfect, to say the least. Much confusion could have been avoided had Aldridge photographed the service tag and recorded it on the chain of custody form. But Aldridge’s and Evans’s testimony were highly credible and support the conclusion that the laptop that ACE sent to Evans for analysis was the one that Aldridge received from Williams. As to the second suspicious circumstance, Williams is correct that the ShellBag data suggests that someone accessed Gehring’s and Holstein’s network folders. Doc. 214 at 72-75. That data does not, however, speak to who accessed the folders, and it is thus too thin a thread on which to hang a finding that the laptop Evans analyzed was not Williams’s home laptop but rather a loaner that Gehring and Holstein had used. That is particularly so given the uncontradicted evidence that the laptop automatically saved the profiles of any ACE users who logged into it, and neither Gehring’s nor Holstein’s profiles were found on the laptop—which means that neither of them used the laptop analyzed by Evans. Doc. 212 at 63, 187, 190; Doc. 214 at 12-13; Doc. 89 at 95. The only explanation supported by the record, then, is that Williams—as a systems administrator whose duties frequently included providing technical support—had used the laptop to access Gehring’s and Holstein’s network folders. Williams’s testimony to the contrary is therefore not credible. 26 As to the third suspicious circumstance, the presence of Rubio’s profile does not move the needle in favor of Williams’s theory. The parties offered conflicting and inconclusive testimony as to when ACE switched from the image Rubio created to a new image, as to who made the new image, and as to whether the new image contained Rubio’s profile. That said, the sum of the profiles on the forensic image cuts strongly against Williams’s theory that the image was taken of a laptop that, as he described it, “was one of the ones [he] let people use” as a loaner. Doc. 214 at 8. Because each laptop automatically saved the profile of any user who logged in, Doc. 212 at 63, 187, 190; Doc. 214 at 12-13, the absence of anyone’s profile other than Rubio’s and Williams’s strongly suggests that the imaged laptop was the one Williams kept at home, and not one that (by his own admission) he lent to others in the Indianapolis office. That leaves Williams’s remote installation theory. Nothing in the record suggests that it is even possible to reinstall an operating system remotely. Even if it were possible, Evans found no evidence of a remote reinstallation, Doc. 214 at 79, and Protek did not contradict that finding. ACE’s ordinary method of remote access—TeamViewer—generated logs, but Evans found no logs indicating a connection to Williams’s home laptop after February 1, 2016. Id. at 36, 44; Doc. 178-2 at 4. The only evidence Williams identifies to support his theory is Protek’s UserAssist spreadsheet. Pl. Ex. 22. But Protek’s report discusses that data without mentioning evidence of remote access, Doc. 169-2 at 3, and Evans credibly opined that the entry referring to “Remote Desktop Connection” meant only that a program with that name was run on the laptop after the reinstallation, Doc. 214 at 87-89. In sum, the record overwhelmingly supports ACE’s version of events and is inconsistent with Williams’s version(s). The court therefore finds that Williams intentionally reinstalled the operating system on his ACE-issued laptop, resulting in the wiping and destruction of potentially 27 relevant information (the files he deleted before the reinstallation) “that should have been preserved in the anticipation or conduct of litigation.” Fed. R. Civ. P. 37(e). ACE further contends that Williams should be sanctioned for failing to suspend the auto-delete function on his email accounts, Doc. 86 at 2, but ACE did not press that theory in its closing argument at the evidentiary hearing, Doc. 215, and there is no need to address it because, as discussed below, Williams’s spoliation of the laptop’s data and his perjured testimony warrant dismissal on their own. B. Willfulness ACE also proved by a preponderance of the evidence that Williams’s spoliation was willful—in other words, not only that his reinstallation of the operating system on his ACEissued laptop was intentional, but also that he knew that the reinstallation would destroy relevant data. As noted, Evans credibly testified that reinstalling an operating system requires affirmative user intervention and is thus not something that happens by accident, and that reinstalling an operating system is a common method of deleting information from a computer. Doc. 214 at 37. Given Williams’s experience as an IT professional, he must have known that reinstalling the operating system had the potential to overwrite—and thus render unrecoverable—previously deleted files. Indeed, nothing in the record suggests that reinstalling the operating system on a laptop Williams was about to return to ACE, his then-former employer, would have served any purpose other than destroying evidence. Granted, there are more reliable and effective methods of destroying data on a laptop, such as physically destroying a hard drive or using professional tools to wipe data. But nothing in the record suggests that those alternative methods were comparable in terms of cost and likelihood of detection, which makes it unclear whether a person in Williams’s situation who wanted to destroy evidence would have chosen them. The existence of those alternatives thus 28 does not outweigh the evidence that Williams performed the reinstallation and that his aim was to destroy evidence. Viewing the record as a whole, ACE has proved by far more than a preponderance of the evidence that Williams reinstalled the operating system “with the intent to deprive [ACE] of the [destroyed] information’s use in the litigation.” Fed. R. Civ. P. 37(e)(2). Further aggravating matters is that because Williams intentionally reinstalled the operating system, he must have known that he did so, which means that he repeatedly lied when he denied having done so at his deposition, Doc. 89 at 86 (p. 156, ll. 17-19), in his declaration, Doc. 180-15 at ¶ 4, and in his testimony at the evidentiary hearing, Doc. 214 at 147. Williams’s false deposition, declaration, and hearing testimony amounts to perjury. “In the federal criminal context, perjury is defined as false testimony concerning a material matter with the willful intent to provide false testimony, rather than as a result of confusion, mistake, or faulty memory.” Montano, 535 F.3d at 565 (internal quotation marks omitted). Williams’s testimony satisfies each element of this offense: “false testimony,” “willful intent,” and “materiality.” United States v. Savage, 505 F.3d 754, 763 (7th Cir. 2007). The first and second elements necessarily follow from the finding that Williams intentionally reinstalled the operating system. Williams gave false testimony when he swore at his deposition, in a written declaration, and again at the evidentiary hearing that he did not reinstall the operating system, and he did so willfully because he was the person who performed the reinstallation. Under no imaginable circumstances would Williams have reinstalled the operating system, forgotten that he had done so, and then innocently offered an alternative theory in which ACE used the second computer (about which he had also “forgotten” until nearly two years into the litigation) to fabricate evidence of his misconduct. 29 As to the third element, Williams’s false testimony concerned a “material matter” in this litigation. Montano, 535 F.3d at 564. “[F]alse testimony is material if it is designed to substantially affect the outcome of the case.” United States v. Galbraith, 200 F.3d 1006, 1014 (7th Cir. 2000) (internal quotation marks omitted). Because “a lie influencing a pretrial issue will, in an attenuated sense, influence the ultimate outcome of the case itself, … a falsehood told at a pretrial hearing is material if it is calculated to substantially affect the issue under determination at that hearing.” United States v. DeLeon, 603 F.3d 397, 403 (7th Cir. 2010) (internal quotation marks omitted); see also United States v. Sanantonio, 735 F. App’x 891, 892 (7th Cir. 2018) (“A lie calculated to influence a pretrial issue is material because it will influence the outcome of the case.”). Williams’s false denial goes to the heart of the issue presented by ACE’s sanctions motion, and given that ACE is requesting dismissal as a sanction, the motion plainly had the potential to determine the “ultimate outcome of the case itself.” DeLeon, 603 F.3d at 403. His false testimony therefore was material to the present motion. And as discussed below, because it cannot be determined which files Williams wiped from his laptop, yet because it is presumed that the wiped files were detrimental to his case, his false testimony almost certainly is material to the merits of his claims. II. The Appropriate Sanction ACE submits that the appropriate sanction is to dismiss Williams’s claims and to order him to pay its reasonable attorney fees and costs associated with investigating his misconduct and litigating its sanction motion. Doc. 86 at 19. Williams responds that dismissal is inappropriate because (1) he did not engage in any spoliation, and (2) there is no “record of delay or contumacious conduct,” prior sanctions, willfulness, bad faith, or fault. Doc. 124 at 15, 25 (quoting Domanus v. Lewicki, 742 F.3d 290, 301 (7th Cir. 2014)). Both arguments fail because, as shown above, Williams intentionally destroyed evidence and then repeatedly lied about it 30 under oath. Viewed as a whole, the record amply demonstrates that Williams “acted … with a degree of culpability that exceeds simple inadvertence or mistake,” making dismissal an available sanction under both Rule 37(e)(2) (as to his destruction of data from his laptop) and the court’s inherent authority (as to his perjury). Ramirez, 845 F.3d at 776. Because Williams does not request a less severe sanction, he has forfeited any argument that dismissal is not the appropriate response under these circumstances. See G & S Holdings LLC v. Cont’l Cas. Co., 697 F.3d 534, 538 (7th Cir. 2012) (“We have repeatedly held that a party waives an argument by failing to make it before the district court.”); Alioto v. Town of Lisbon, 651 F.3d 715, 721 (7th Cir. 2011) (“We apply [the forfeiture] rule where a party fails to develop arguments related to a discrete issue … .”); see also King v. Ford Motor Co., 872 F.3d 833, 838 (7th Cir. 2017) (affirming the district court’s striking a declaration as a discovery sanction where the plaintiff “did not propose any alternatives to the district court”). Even setting aside forfeiture, dismissal is the appropriate sanction. Recognizing that “the sanction of dismissal with prejudice must be infrequently resorted to,” the court has carefully considered whether a less serious sanction would be appropriate. See Long v. Steepro, 213 F.3d 983, 986 (7th Cir. 2000). The court also has evaluated Williams’s conduct in the context of the litigation as a whole to ensure that the “penalty [is] proportionate to the wrong.” Ridge Chrysler Jeep, LLC v. DaimlerChrysler Fin. Servs. Ams. LLC, 516 F.3d 623, 626 (7th Cir. 2008). Having done so, the court finds that Williams’s conduct warrants dismissal of his claims. For starters, “[p]erjury committed in the course of legal proceedings is a fraud on the court,” Allen v. Chicago Transit Auth., 317 F.3d 696, 703 (7th Cir. 2003), that itself “may warrant the sanction of dismissal” under the court’s inherent authority, Montano, 535 F.3d at 564. See Rivera v. Drake, 767 F.3d 685, 686 (7th Cir. 2014) (“[P]erjury is among the worst 31 kinds of misconduct.”). Williams also destroyed evidence “with the intent to deprive [ACE] of the [destroyed] information’s use in the litigation,” Fed. R. Civ. P. 37(e), and threw up a smokescreen of farfetched conspiracy theories in an effort to evade consequences for that misconduct. The result of that misconduct is a situation in which alternative sanctions—such as jury instructions and presumptions that the deleted information was unfavorable to Williams— cannot cure the prejudice to ACE because it is impossible to determine the full extent of the spoliation. Evans credibly opined that there is no way to know how many files Williams rendered unrecoverable by deleting files and then reinstalling the operating system, much less what those files contained. Doc. 178-2 at 3. The frequency with which Williams’s discovery responses directed ACE to the laptop he returned, combined with the commonsense assumption, built into Rule 37(e)(2), that parties who engage in intentional spoliation have something to hide, suggests that some of what Williams destroyed would have damaged his case. Were it possible to pin the spoliation down to specific disputes—such as the timing of the creation and delivery of the ACE Culture Letter, for if the (now-lost) data showed that Williams created or delivered it after ACE announced that all IT staff would have to relocate to Indianapolis, his retaliation claim, which alleges that ACE forced him to move to Indianapolis in retaliation for sending the letter, would be mortally wounded—the prejudice to ACE could be cured by resolving those disputes in its favor. See Fed. R. Civ. P. 37(e)(2) (authorizing the court, upon finding that a party committed intentional spoliation of electronically stored information, to “presume that the lost information was unfavorable to the party” and to “instruct the jury that it may or must presume the information was unfavorable to the party”). But because there is no way to determine what data Williams destroyed and to which issues the data were relevant, there is no way to approximate the presumably unfavorable effect of that information, and thus no way 32 to craft instructions or presumptions that would eliminate—or even substantially mitigate—the prejudice to ACE. See Leon v. IDX Sys. Corp., 464 F.3d 951, 960-61 (9th Cir. 2006) (affirming the district court’s dismissal of the plaintiff’s claims as a spoliation sanction where “any number of the [deleted] files could have been relevant to [the defendant’s] claims or defenses” and it was “impossible to identify which files and how they might have been used”). Although “the interests of justice are best served by resolving cases on their merits,” Long, 213 F.3d at 986, Williams’s intentional spoliation obfuscated the true merits of this case to the point where doing so is no longer a viable option, see Leon, 464 F.3d at 960-61. That said, even if a sanction short of dismissal could cure the prejudice to ACE, dismissal of Williams’s claims would still be the sanction “proportionate to the wrong.” Ridge Chrysler Jeep, 516 F.3d at 626. Although Rule 37(e)(1) authorizes only “measures no greater than necessary to cure the prejudice” resulting from a party’s failure to take reasonable steps to preserve electronically stored information, Rule 37(e)(2) authorizes “further sanctions,” including dismissal, where the party “acted with the intent to deprive another party of the information’s use in the litigation.” Barbera v. Pearson Educ., Inc., 906 F.3d 621, 627-28 (7th Cir. 2018) (internal quotation marks omitted). Likewise, “a district court’s inherent power to sanction for violations of the judicial process is permissibly exercised not merely to remedy prejudice to a party, but also to reprimand the offender and to deter future parties from trampling upon the integrity of the court.” Salmeron, 579 F.3d at 797 (internal quotation marks omitted). Williams’s misconduct in destroying evidence was serious on its own. His attempt at a coverup—by committing perjury and generating a smokescreen of conspiracy theories to distract from the truth, and perhaps even to stick ACE with a default judgment, which he had the gall to request, Doc. 215 at 20-21—aggravated the situation still further. Although his efforts ultimately 33 failed, that failure came only after ACE was put to the time and expense of hiring a forensic expert, of researching and drafting its sanctions motion and extensive briefs, and of preparing for and participating in a two-day evidentiary hearing. See Salmeron, 579 F.3d at 797 (“[W]e do not require a district court to measure the impact on the litigation of a wrongdoer’s willful misconduct before it issues a dismissal sanction.”) (citation omitted). Taken as a whole, Williams’s misconduct was extraordinarily serious and warrants an equally serious response. Dismissing his claims enables the court to “remedy prejudice” to ACE, to “reprimand” Williams, and to “deter future parties from trampling upon the integrity of the court.” Ibid. (internal quotation mark omitted). An award of attorney fees and costs is warranted as well. See Chambers, 501 U.S. at 46 (“[I]f a court finds that fraud has been practiced upon it, or that the very temple of justice has been defiled, it may assess attorney’s fees against the responsible party, as it may when a party shows bad faith by delaying or disrupting the litigation … .”) (citation and internal quotation marks omitted); Leon, 464 F.3d at 955, 958-61 (affirming a dismissal sanction and attorney fee award where the district court determined the plaintiff employee “despoiled evidence by deleting 2,200 files from his [employer]-issued laptop computer during the pendency of the litigation”). III. ACE’s State Law Counterclaim Dismissing Williams’s claims leaves only ACE’s counterclaim for theft under Indiana law. Given that the parties are not diverse, Doc. 66 at ¶¶ 1-2, ACE correctly premises jurisdiction over its counterclaim on the supplemental jurisdiction, 28 U.S.C. § 1367(a). Doc. 29 at p. 31, ¶ 2. Section 1367(c)(3) provides that “[t]he district courts may decline to exercise supplemental jurisdiction over a claim under subsection (a) if … the district court has dismissed all claims over which it has original jurisdiction.” 28 U.S.C. § 1367(c)(3). “As a general matter, when all federal claims have been dismissed prior to trial, the federal court should relinquish 34 jurisdiction over the remaining pend[e]nt state claims.” Williams v. Rodriguez, 509 F.3d 392, 404 (7th Cir. 2007); see also Dietchweiler ex rel. Dietchweiler v. Lucas, 827 F.3d 622, 631 (7th Cir. 2016) (same). The general rule has three exceptions: “when the [refiling] of the state claims is barred by the statute of limitations; where substantial judicial resources have already been expended on the state claims; and when it is clearly apparent how the state claim is to be decided.” Williams, 509 F.3d at 404; see also RWJ Mgmt. Co. v. BP Prods. N. Am., Inc., 672 F.3d 476, 480 (7th Cir. 2012). None of the exceptions apply here. First, if this court relinquishes supplemental jurisdiction over ACE’s state law counterclaim, Indiana law would give ACE three years to refile it in state court. See Artis v. District of Columbia, 138 S. Ct. 594, 606 (2018) (citing Ind. Code § 34-11-8-1); Hemenway v. Peabody Coal Co., 159 F.3d 255, 266 (7th Cir. 1998) (same). Second, substantial federal judicial resources have not yet been committed to the counterclaim. See Davis v. Cook Cnty., 534 F.3d 650, 654 (7th Cir. 2008) (“[T]he district court disposed of the federal claims on summary judgment, and so ‘substantial judicial resources’ have not yet been committed to the case.”). And third, it is not clearly apparent how the counterclaim will be resolved. Given all this, relinquishing jurisdiction over the counterclaim is the appropriate course under § 1367(c)(3). See Dietchweiler, 827 F.3d at 631; RWJ Mgmt. Co., 672 F.3d at 47982. Conclusion ACE’s sanctions motion is granted. Williams’s claims are dismissed with prejudice, and Williams must pay the reasonable attorney fees and costs that ACE incurred in connection with uncovering Williams’s misconduct and litigating the sanctions motion. By September 30, 2019, ACE shall file a memorandum, with invoices and any other pertinent evidentiary support, 35 establishing its fees and costs. Williams has until October 21, 2019 to respond, and ACE may reply by November 4, 2019. ACE’s motion to strike is denied as moot. The court exercises its discretion under 28 U.S.C. § 1367(c)(3) to relinquish its supplemental jurisdiction over ACE’s state law counterclaim. September 16, 2019 ____________________________________ United States District Judge 36

Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.


Why Is My Information Online?