Peter Kiewit Sons', Inc. v. Wall Street Equity Group, Inc. et al
Filing
263
MEMORANDUM AND ORDER regarding pending motions: 1) Plaintiff's motion for leave to file a reply brief, (filing no. 255 ), is granted and the court reviewed and considered the proposed reply brief, (filing no. 255 -1), as well as Defendants ' responsive brief, (filing no. 256 ).2) Defendants' motion to amend its answer, (filing no. 179 ), is denied.3) Defendants' motion for a protective order, (filing no. 158 ), is granted in part and denied in part as set fort h in the body of this Memorandum and Order. A protective order shall be entered separately by this court.4) Plaintiff's motion for sanctions, (filing no. 135 ), is granted in part and denied in part as stated. The pretrial conference and trial are continued pending further order of the court. A telephonic status conference before the undersigned magistrate judge will be held on September 5, 2012 at 10:00 a.m. (CDT) to discuss further case progression. Counsel for plain tiff shall place or arrange the call. IT IS FURTHER HEREBY RECOMMENDED to the Honorable John M. Gerrard that an adverse jury instruction be given at trial, with the jury instructed as follows: You may, but are not required to, assume that information stored on the discarded server [Server 1] would have been adverse, harmful, or detrimental to the defendants' claims and defenses. Ordered by Magistrate Judge Cheryl R. Zwart. (JAB)
IN THE UNITED STATES DISTRICT COURT
FOR THE DISTRICT OF NEBRASKA
PETER KIEWIT SONS’, INC.,
Plaintiff,
v.
WALL STREET EQUITY GROUP,
INC., WALL STREET GROUP OF
COMPANIES, INC., SHEPHERD
FRIEDMAN, and STEVEN S. WEST,
Defendants.
)
)
)
)
)
)
)
)
)
)
)
)
)
8:10CV365
FINDINGS, RECOMMENDATION
AND ORDER
This matter is before the court on Defendants’ motion for protective order, (filing no.
158), Defendants’ motion for leave to amend their amended answer, (filing no. 179), and
Plaintiff’s motion for sanctions, (filing no. 135).
For the reasons set forth below,
Defendants’ motion for protective order is granted in part and denied in part, Defendants’
motion to amend is denied, and Plaintiff’s motion for sanctions is granted in part and denied
in part.
FACTUAL BACKGROUND
This case involves claims by Plaintiff Peter Kiewit Sons’, Inc. (“Kiewit”) against
Defendants Wall Street Equity Group, Inc. (“WSE”“), Wall Street Group of Companies, Inc.
(“WSG”), Shepherd Friedman (“Friedman”), and Steven West (“West”)(collectively
“Defendants”) for the alleged violation of various aspects of federal and state trademark law,
unfair competition, and commercial misrepresentation. Filing No. 1.
Plaintiff is a construction and mining company with its principal place of business
in Omaha, Nebraska. Defendants are in the mergers and acquisitions business and assist
with introducing potential buyers to clients who are interested in selling their business. As
part of this process, Defendants require their clients to pay Defendants for a valuation of
their businesses. Defendants’ quoted fees for the valuations ranged from $19,000 to
$22,000 in one instance, (filing no. 11, p. 5), and from $20,000 to $30,000 on a second
occasion, (filing no. 11, p. 10).
Plaintiff alleges the Defendants have misused the service mark “Kiewit,” U.S. Service
Mark Registration No. 2569239 (the “Kiewit Mark” or the “Service Mark”), in Defendants’
attempts to solicit clients. Specifically, Kiewit contends Defendants have improperly used
the Kiewit Mark by “falsely representing an association with and/or authorization from
Kiewit to Defendants’ customers and potential customers.” Filing No. 1, ¶9. Plaintiff
concurrently filed a motion for a temporary restraining order in order to prevent Defendants
from using the Kiewit Mark in connection with any representations Defendants were making
to clients or potential clients, or otherwise representing that Defendants were associated with
Kiewit. Filing No. 7, ¶¶1 & 2.
In support of its motion for a temporary restraining order and preliminary injunction,
Kiewit submitted copies of two letters between Defendants (or a representative of
Defendants) and third parties in which Defendants, or representatives thereof, suggested
Kiewit as a potential buyer of the potential client’s business. Filing No. 11. For instance,
a letter dated April 23, 2010 to Hladky Construction Corp. signed by Defendant Steven West
stated he had enclosed “[b]ackground on buyer, Kiewit” and indicated he would “seek out
2 additional buyers to create competition for Kiewit.”1 Filing No. 11, pp. 4-5. Plaintiff
1
A similar letter from WSG, dated June 25, 2008, addressed to Waterfront Marine
Construction and signed by Shepherd Friedman, was also submitted as evidence. Filing No. 11, p.9.
2
alleges it was not aware the name “Kiewit” was being used in this capacity and asserts this
conduct was unauthorized and amounts to a misuse of the Kiewit Mark. Defendants did not
oppose the motion for a TRO,2 and the TRO and preliminary injunction were ordered by the
Honorable Laurie Smith Camp on October 4, 2010. Filing No. 17.
Defendants filed an answer to the Complaint denying Plaintiff’s allegations and
alleging three affirmative defenses: 1) Plaintiff did not establish a right to an accounting; 2)
Plaintiff’s claims are barred by the doctrine of unclean hands; and 3) Plaintiff suffered no
damages or failed to mitigate damages. Filing No. 28, ¶¶ 40-42. The parties completed their
Rule 26(f) planning report on December 6, 2010. Filing No. 36. The final progression order
was entered on December 14, 2010. Filing No. 38.
On February 2, 2011, Defendants moved for Rule 11 sanctions against Kiewit and
its counsel, asserting the claims lacked any factual or legal basis.3 (Filing No. 39). The
motion was denied. Filing No. 49.
The parties commenced written discovery and depositions in February of 2011 with
only minor skirmishes between the parties.4 On August 1, 2011, Kiewit filed a notice of
2
Defendants did not concede any wrongdoing; they simply agreed not to use the Kiewit
name in additional correspondence to potential clients.
3
Defendants filed their motion for sanctions before the expiration of any of the major
discovery deadlines, including the deadline for mandatory disclosures. As the court noted in its
memorandum and order, dated April 18, 2011, (filing no. 49), Defendants essentially attempted to
argue a dispositive motion under the guise of a Rule 11 motion for sanctions.
4
For example, the discovery deadlines were extended due to the parties’ inability to agree
on certain deposition dates. Filing No. 59.
3
intent to serve a Subpoena Duces Tecum on Arthur Bertke. Filing No. 73. Mr. Bertke is the
landlord of the building where the corporate defendants’ offices are located and Defendants’
records are kept. Bertke also provided certain computer services for Defendants, such as
data recovery, registering domain names, and server storage. Filing No. 137, Ex. A. The
subpoena commanded Bertke to produce the following documents and electronically stored
information:
[C]opies of any and all computer electronically stored information, including,
but not limited to, all backup data and/or tapes regarding accounts receivable,
money paid for business valuations, financial statements, and any
correspondence referencing [Kiewit] or the word “Kiewit” for Wall Street
Equity Group, Inc., Wall Street Group of Companies, Inc., Shepherd
Friedman and Steven S. West for the time period from January 1, 2008 to the
present time.
Filing No. 73, p. 3. Defendants objected to Plaintiff’s intent to serve the subpoena on
Bertke. Filing No. 78.
On September 9, 2011, Kiewit filed a motion for an order authorizing service of a
Subpoena Duces Tecum to Bertke. Filing No. 87. Kiewit asserted that Bertke maintained
back-up files of Defendants’ electronic business records. Kiewit claimed Defendants failed
to provide complete answers to Plaintiff’s discovery requests, and stated it believed
Defendants’ electronic files likely contained documents responsive to Plaintiff’s discovery
requests. Filing No. 88. In support of its motion, Plaintiff filed an affidavit of Tara Bethel,
a former employee of defendant WSE. Bethel swore that she “observed at least one-hundred
(100) instances in which a WSE employee would represent to a prospective client-business
owner that Peter Kiewit Sons’, Inc. was a ready, willing, and interested buyer of the
prospective client-business owner’s business.”
Filing No. 119-1, ¶ 8.
She stated
Defendants drafted proposals for clients and saved the proposals in computer files named
4
“Carla” and “Carlita,” (filing no. 119-1, ¶7), and Mr. Bertke maintained Defendants’
electronic files. Filing No. 119-1, ¶¶ 5-7.
On October 7, 2012 Defendants objected to the issuance of the subpoena on Bertke,
arguing that Bertke did not have access to or maintain a copy of the electronic files created
by Defendants. Filing No. 117; Filing No. 117-12, West Aff. ¶3 (dated October 7, 2011);
Filing No. 117-13, West Aff. ¶32 (dated October 7, 2011); Filing No. 117, p. 18.
Defendants further denied that Bertke possessed a back-up copy of WSE’s and WSG’s
business records. Filling No. 117-12, West Aff. ¶ 3; Filing No. 117-13, West Aff. ¶32
Filing No. 117, p. 18. Defendants also moved to strike the affidavit of Tara Bethel asserting
it was “full of blatant misrepresentations.” Filing No. 121, Verified Motion to Strike
Affidavit, ¶4. Defendants filed two affidavits from employees who stated Bethel was not
in the same office as the company telemarketers and that during the time Bethel worked for
WSE, “the name ‘Kiewit’ was never mentioned in the office where Bethel worked, verbally
or in writing.” Filing Nos. 121-3, ¶¶ 4-5; 121-4, ¶¶ 4-5. A third affidavit, submitted by
West stated: “During the time Bethel worked for WSE, the name ‘Kiewit’ was mentioned
by me and only on the one occasion I spoke to Mike Hdladky of Hdlaky Construction in
April 2010.” Filing No. 121-5, ¶5.
On September 28, 2011, the plaintiff filed a Motion to Compel, (filing no. 105), and
a Motion for Leave to File an Amended Complaint. Filing No. 101. Plaintiff’s motion to
amend sought leave to raise allegations to pierce the corporate veils of WSG and WSE, and
to hold Friedman and West personally liable to the Plaintiff. The Motion to Compel sought
a court order directing Defendants to supplement their discovery responses related to
Defendants’ business transactions and valuations, finances, and records containing the term
“Kiewit.” Filing No. 105.
5
Defendants objected to the motion to compel and argued strenuously that most of
Plaintiff’s discovery requests amounted to a “fishing expedition” and that it did not possess
any documents containing the word Kiewit. Defendants further asserted that many of the
documents, such as its customer lists and financial documents, were protected by
confidentiality and, if produced, would severely damage the business. Defendants submitted
the following evidence in opposition to the motion to compel:
•
Affidavit of Pamella Romano stating that she “searched the computers of the
defendants . . . [and] [t]he word ‘Kiewit’ does not appear anywhere in the
computers . . . .” Filing No. 115-3, ¶¶ 2-3.
•
Affidavit of Defendant Steve West, dated October 7, 2011, swearing to the
following:
--
Defendants’ “standard practice” has been not to “save documents
concerning potential clients unless they actually become clients.” Filing
No. 115-16, ¶ 22.
--
Defendants have not ‘failed and refused’ to produce documents as to
the name of ‘Kiewit’; there simply are none. Filing No. 115-16, ¶ 31.
--
WSE’s landlord [Bertke] does not have and does not maintain a copy
of electronic files created by Defendants. Filing No. 115-16, ¶ 32.
--
[T]here exist no files referencing Plaintiff. Filing No. 115-16, ¶ 33.
--
To review all records at WSE’s place of business, in order to locate any
which name or refer to Plaintiff, of which there are none, would cause
undue burden or expense. Filing No. 115-16, ¶ 38.
--
Defendants have fully and honestly responded to every notice of
deposition and discovery request. Filing No. 115-16, ¶ 45.
A hearing was conducted on the pending motions on October 12, 2011 and the
undersigned heard argument on the motions to amend the pleadings, the motion to issue a
6
subpoena, the motion to strike the affidavit of Tara Bethel, and the motion to compel. With
regard to the motion to strike, Defendants’ counsel argued passionately and unequivocally
that Tara Bethel was “a documented liar.” Filing No. 124, Audio File at 48:00 - 50:00.
Counsel further offered as “an officer of the court” to attest that “almost everything in
[Bethel’s affidavit]” is a “lie.”5 Filing No. 124, Audio File at 48:00 - 50:00. Specifically,
defense counsel argued that Kiewit was using the affidavit to try and get records from Bertke
that “he does not have” and that Kiewit was never mentioned while Bethel was working for
Defendants. Id.
The undersigned granted the plaintiff’s motion to amend beyond the motion deadline
because the facts underlying Plaintiff’s claim to pierce the corporate veil were not known,
and could not reasonably have been discovered prior to deposing Defendants’ corporate
representatives. See Filing No. 124, Audio File at 26:30 - 28:40. Therefore, Plaintiff had
exercised due diligence and good cause existed for permitting the complaint to be amended
beyond the deadline set by the court’s scheduling order. Id.
For the reasons stated on the record during the hearing, and in the court’s
memorandum and order filed thereafter, the court granted the plaintiff’s motion to issue a
subpoena, granted in part and denied in part the motion to compel, and denied the motion
to strike the affidavit of Tara Bethel. Filing No. 128. The court determined Defendants’
essentially non-existent document retention policy rendered them an unreliable source of
discovery thereby “open[ing] avenues of third party discovery which would have been
5
The undersigned warned defense counsel that she appeared to be testifying as a witness
regarding Ms. Bethel’s credibility (character for truthfulness or untruthfulness), and that doing so
would likely disqualify her from continuing to serve as counsel for the defendants. Filing No. 124,
Audio File at 1:31:00 - 1:34:00.
7
closed had the defendant retained documents consistent with standard business practices .
. . .” Filing No. 128, p. 12. The court ordered Defendants to respond to the majority of the
disputed interrogatories and requests for production. The memorandum and order was filed
on October 25, 2011.
On November 3, 2011, Plaintiff moved for sanctions, alleging Defendants were
playing a “shell game” with the electronically stored documents requested in the Bertke
subpoena. Filing No. 135. The Plaintiff alleged:
•
Prior to October 24, 2008, Bertke maintained computer files for West which
were which were kept in a separate server room (“Server Room”) controlled
by Bertke. Filing No. 137, Ex. B, ¶¶ 7, 9-10. From October 24, 2008 until
September 20, 2010, West maintained servers located in his own office to
store electronic files. Filing No. 137, Ex. B, Bertke Aff. ¶ 9.
•
On or about September 20, 2010, a server was purchased and installed in the
Server Room and all of “the historical electronic data and files stored on
West’s previous server was transferred onto the new server (“Server 1") in the
Server Room. Filing No. 137, Ex. B, Bertke Aff. ¶ 10.
•
In July of 2011, West directed Bertke to move Server 1 back to West’s office.
Filing No. 137, Ex. B, Bertke Aff. ¶ 11.
•
On August 1, 2011, Plaintiff filed a Notice of its Intention to Serve Subpoena
Duces Tecum on Bertke. Filing No. 73.
•
In August of 2011, West instructed Bertke to install another server (“Server
2") to be maintained in Bertke’s server room. “Some of the electronic files”
were copied from Server 1 to Server 2. Filing No. 137, Ex. B, Bertke Aff. ¶
12.
•
In early September 2011, West provided Bertke with an external hard drive
containing copies of Defendants’ electronic files. Filing No. 137, Ex. B,
Bertke Aff. ¶ 13.
8
•
On October 5, 2011, West directed Bertke to move Server 2 to West’s office.
Filing No. 137, Ex. B, Bertke Aff. ¶ 12.
•
On October 14, 2011, West instructed Bertke to copy the external hard drive
West gave Bertke in early September 2011 onto an additional external hard
drive. Filing No. 137, Ex. B, Bertke Aff. ¶ 13. Bertke did so and kept both
of the external hard drives in a locked cabinet in his office. Filing No. 137,
Ex. B, Bertke Aff. ¶ 13.
•
The order granting leave to issue the subpoena on Bertke was issued on
October 25, 2011. Filing No. 128.
•
On Wednesday, October 26, 2011, West instructed Bertke to return to West
the two external hard drives containing West’s business records. Bertke
returned those hard drives on October 27, 2011. Filing No. 137, Ex. B,
Bertke Aff. ¶ 12.
•
On October 28, 2011, Bertke received the subpoena issued by Plaintiff. Filing
No. 137, Ex. B, Bertke Affidavit ¶ 15. But by that time, Bertke had handed
the hard drives to West. Therefore, Bertke informed Plaintiff’s counsel that
he no longer possessed any of the electronic data and could not respond to the
subpoena.
Plaintiff asserted West’s actions were a deliberate attempt to deprive it of
discoverable information and were conducted in bad faith.
A hearing was held on the
matter on November 8, 2011. Defendant West was instructed to bring the external harddrives to the hearing. In anticipation of the hearing, Defendants submitted affidavits from
West and Bertke alleging the following:
•
On October 26, 2011, West observed the door to Mr. Bertke’s office was
open. Believing Bertke to be out of town and out of concern that the external
hard drives might be stolen, West asked Bertke to return the external hard
drives to West. Filing No. 139-1, West Aff. ¶¶ 4-10; Filing 139-2, Bertke Aff.
•
West had an “independent third party back up [Defendants’] entire computer”
on November 3, 2011. Filing No. 139-1, West Aff. ¶11.
9
•
West had “no knowledge” Plaintiff would be serving a subpoena on Bertke
on October 28, 2011. Filing No. 139-1, ¶ 14.
•
West’s actions were intended to preserve and protect the electronic
information. Filing No. 139-1, ¶ 15.
•
Bertke has provided computer support and has periodically housed
Defendants’ servers since their business relationship began in 1996. Filing
No. 139-2, Bertke Aff.
A hearing was held on the matter on November 8, 2011, with several witnesses
giving testimony, including Bertke, West, and Romano. With leave of the court, defense
counsel, and the witnesses from Florida, participated in the hearing from the videoteleconference (VTC) facility located in the United States District Courthouse in Fort
Lauderdale, Florida. Defendants brought three external hard drives to the hearing; two black
and one blue. West testified that the black hard drives were the drives Bertke created at
West’s request, and the blue hard drive was the one made by the “independent third party”
on November 3, 2011. West admitted that his previous affidavit statement that Bertke did
not have access to electronic copies of Defendants’ business records, (filing no. 115-16, ¶32)
was not accurate. Filing No. 207, 48:13-21. West further testified that when he asked Bertke
on October 26, 2011 to return the external hard drives in Bertke’s possession, West was
“aware that in general there was substantial discussion about discovery” but he was not
“completely” aware that the court had entered an order on October 25, 2011 granting
Kiewit’s motion to issue a subpoena on Bertke. Filing No. 207, 45:22 - 46:4.
Romano testified that she was assigned the task of searching Defendants’ computers
for the term “Kiewit.” When asked about her ability to perform this work, she explained that
she had graduated from high school and was two credits short of receiving an associate’s
degree in business management, (filing no. 207, 86:1-2), but she had no professional training
10
with computers and is not a “computer expert.” Filing No. 207, 91:25-92:2 & 95:9-14.
Bertke had shown her how to perform a key word search from her work station on the
“whole network” using the term “Kiewit,” but she did not search the hard drives on any of
the individual work stations. Filing No. 207, 88:3-11. She testified her word search
returned only two documents, neither of which were the types of solicitation materials or
letters for which Plaintiff was searching. Filing No. 207, 92:14-22.
A ruling on Plaintiff’s motion for discovery sanctions6 was delayed until Defendants
submitted their computer equipment (including Server 27 and the external hard drives) for
forensic examination. Since the defendants had participated in the hearing by VTC, at the
close of the hearing, defense counsel was ordered to take possession of the three external
drives and secure them as an officer of the court for delivery to the plaintiff. The
undersigned ordered Defendants to make its computer equipment available to be examined
by Continuum Worldwide by November 16, 2011.
6
At the November 8, 2011 hearing Defendants’ counsel contended that motion for sanctions
could have been avoided altogether if Plaintiff’s counsel had merely called her once it was
discovered West had asked Bertke to give him the hard drives. Filing No. 207, 113:2-5. Given the
attorneys’ inability to agree on the simplest tasks in the case, the extraordinary number of discovery
motions and briefs filed to date, and the nature and tone of defense counsel’s communications when
speaking to Plaintiff’s counsel and the undersigned judge during prior and lengthy motion hearings,
the court finds defense counsel’s assertion that a simple phone call would have rendered the motion
unnecessary to be extremely dubious.
7
Defendants moved to clarify the order, specifying that they only were in possession of one
server – Server 2 – explaining that Server 1 had “crashed” “some months ago” and was then
“discarded.” Filing No. 152. The court instructed Defendants to produce any servers or devices
which contained electronic data. Filing No. 153. The court did not, at that time, comment on the
propriety (or lack thereof) of Defendants disposal of the “crashed” server. Id.
11
On November 10, 2011, Plaintiff filed an emergency motion to make the server, hard
drives, and other computer equipment available for examination on Friday, November 11,
2011. Defense counsel was leaving the United States for at least two weeks beginning
November 12, 2011, and the plaintiff wanted possession of the external hard drives and
Defendants’ servers imaged8 without having to wait for defense counsel to return from that
trip. The court granted Plaintiff’s motion. Filing No. 160.
Continuum Worldwide representative Rick Clyde traveled to Florida on November
11, 2011 and commenced imaging Server 2 at Defendants’ offices. Filing No. 182-3, Clyde
Aff. ¶ 4. Server 1 was not available for imaging; West had thrown it in a trash dumpster,
without the approval of Kiewit’s counsel or the court, sometime between August 20, 2011
and November 11, 2012. Filing No. 239, 97:24-99:13. One of Defendants’ employees,
Richard Calabria, was present while Clyde imaged Server 2. Filing No. 182-3, ¶ 9. Clyde
was also given three external hard-drives by Bertke which Clyde transported to Nebraska
for imaging. Filing No. 182-3, Clyde Aff. ¶ 11.
Clyde completed the server imaging and returned to Omaha to begin searching for
any documents that contained the word “Kiewit.” At the court’s order, Plaintiff submitted
a supplement to its motion for sanctions providing a preliminary report from Continuum.
Filing No. 182-1. The report contained a finding that the keyword search of “Kiewit”
8
, Because it would have been impractical for Defendants to ship their server to Nebraska for
examination, a forensic examiner was sent to Florida to image the Server 2. “To image a hard drive
is to make an identical copy of the hard drive, including empty sectors.” See The Sedona Conference
Glossary: E-Discovery & Digital Information Management (3d Ed. 2010).
12
returned 3,771 files, of which 181 were carved files.9 Filing No. 182-1, p. 2. As to whether
information had been intentionally removed or destroyed, the report stated the following:
An analysis of the equipment examined did not show intentional removal of
files or entries containing the word “Kiewit.” However, the equipment
provided contained only copies of files originating on another server. The
server on which the files were generated was not presented at the time of
acquisition, therefore, it is unknown whether any files containing the word
“Kiewit” were removed.
Filing No. 182-1, p. 2
The undersigned ordered a hearing on Plaintiff’s motion for discovery sanctions.
Filing No. 184. The hearing was held on January 30, 2012, and upon Defendants’ motion,
was reopened for additional evidence and argument on March 9, 2012.10 Clyde provided
testimony regarding his search of the documents found on Defendants’ computer equipment.
Clyde testified that he was at Defendants’ offices from 12:30 p.m. on November 11, 2011
until 5:00 a.m. on November 12, 2011 to conduct the imaging of Server 2. Filing No. 239,
20:9-10. Upon returning to Omaha, Clyde made duplicates of the hard drives which, due
to the volume of data they contained, took approximately 6 days. Filing No. 239, 23:9-13.
9
According to the report “[d]ata carving is the process of extracting a collection of data from
a larger data set. Data carving techniques frequently occur during a digital investigation when the
unallocated file system space is analyzed to extract files.” Filing No. 182-1, p. 2
10
In addition to the motion for sanctions, the parties presented arguments regarding
Defendants’ motions for a protective order and to amend their amended answer. The Defendants’
motions are discussed infra.
13
The information was then made into a “working copy” and indexed.11 The indexing process
took almost three weeks. Filing No. 239, 25:14-16.
Clyde testified that the search produced 3,771 files containing the term “Kiewit.”12
Filing No. 239, 28:15-21. Clyde was able to identify some letters and emails containing the
word “Kiewit” which had not previously been produced. These included letters to third
parties that were very similar in content to the letters sent to Hdlaky Construction Corp. and
Waterfront Marine Construction that prompted this lawsuit. But at least one document that
11
Clyde described the process of indexing as follows:
The processing and indexing, it goes through the whole image which is an
exact duplicate of everything that’s on the servers or drives. It goes into
deleted space, unallocated space. And it opens up containers that are zip
files, e-mail type repositories, opens them up and extracts out all the
documents. Then it breaks – each documents, it breaks out and takes every
single word out of that document and creates an index of where those words
can be found in documents.
Filing No. 239, 24:19-25:2.
12
Defendants printed out boxes of documents which, on their faces, do not contain the word
“Kiewit.” See exhibit 105. Defense counsel offered these documents into evidence to prove the
number of instances of the word “Kiewit,” as reported by Continuum, was greatly exaggerated.
Clyde testified that Continuum’s search looked for the term “Kiewit” in not only the visible text, but
also the metadata of the documents. Filing No. 239, 49:6-17. “Metadata is generally not reproduced
in full form when a document is printed to paper.” See The Sedona Conference Glossary: EDiscovery & Digital Information Management (3d Ed. 2010).
14
had previously been produced in the litigation was not found during Clyde’s extensive
search of the three hard drives and Server 2.13 Filing No. 239, 45:22-24.
At the hearings held on January 30 and March 9, 2012, West testified:
•
His initial representations to the court--that the Defendants only used Kiewit’s name
in two instances--were false. Filing No. 239, 95:14-18 & 97:2-4.
•
West never asked Bertke to conduct a search of his electronic files even though
Bertke had maintained Defendants’ computer files “for many years.” Filing No. 239,
97:13-23. Instead, West asked Romano, “the most [computer] literate person
[Defendants] had” to conduct a search of the electronic files. Filing No. 239, 159:2224.
•
West discarded Server 1 after it “crashed” in August of 2011, without having it
examined by anyone else, including a computer expert. Filing No. 239, 98:14-99:20.
•
After receiving notice of Plaintiff’s motion for sanctions, Defendants hired a
“separate expert” to make copies of their electronic data. Filing No. 239, 161:6-9.
•
When presented with a list of businesses to which Defendants had sold valuations,
a copy of which had been provided to Plaintiff by one of Defendants’ former
employees, West testified he did not know such a list existed.14 Filing No. 239,
13
One of the letters that the Continuum investigation did not find was the letter to Randy
Sutton of Waterfront Marine Construction. See n. 1, supra; see also Plaintiff’s Ex. 18; Filing No.
11, p. 9.
14
The list in question came from Defendants’ former employee, Humberto Garcia.
Defendants object to the use of the list claiming it contains trade secret information and was stolen
by Garcia. Garcia’s former supervisor acknowledges that he provided Garcia with the list of
company receipts to determine what commission Garcia might be owed, but Garcia was required to
return the list. Filing No. 236-1, ¶7. If Garcia misappropriated the list, Defendants may have a
claim against Garcia in Florida. However, the fact remains – at the 30(b)(6) deposition, Defendants’
15
110:6-8. During a prior 30(b)(6) deposition, West, as the corporate defendants’
designated witness, had also testified that no such list existed. Filing No. 248-7,
34:3-9. However, he later testified that list was provided by Defendants to their
former employee in a different lawsuit–clearly indicating that such lists were created
by, or were in the possession of, Defendants at some point in time.
•
Of the companies identified in communications discovered as a result of the forensic
examination of Defendants’ computer equipment, some had paid Defendants for
valuations of their companies. Defendants solicited these clients by presenting Kiewit
as a potential buyer for their respective companies. Filing No. 239, 133:21-25.
•
Defendants produced all of the responsive hard copies of documents in their
possession. Filing No. 239, 141:12-16.
•
Defendants send out 10,000 letters a week and its telemarketers make 1- to 2,000
phone calls a day to solicit business. Filing No. 239, 154:13-18.
•
Server 1 experienced a “fried motherboard” and all of the information from Server
1 was transferred to hard drives that were subsequently transferred to Plaintiff. Filing
No. 239, 178:13-179:14. West never identified who allegedly examined the server
to conclude the motherboard was “fried,” or who allegedly transferred all data on
Server 1 to another drive. All testimony of record indicates West was not able to
perform these investigations and functions.
•
Information from January 1, 2011 and after was transferred to Server 2. Filing No.
239, 180:6-10.
Defendant Shepherd Friedman also appeared at the January 30, 2012 hearing and
provided the following testimony:
representative, West, testified no such list existed. The court has allowed the list into evidence for
the sole purpose of confirming that the list exists and contains information responsive to Plaintiff’s
discovery requests. West confirmed, to the best of his knowledge, that the lists from 2009 and 2010
appeared to be accurate. Filing No. 239, 112:12-19 & 116:2-7.
16
•
A file named “Carlita” was maintained by one of Defendants’ “associates” to send
out emails, and it contained copies of “various communications and correspondence”
but it was nothing Friedman worked with directly. Filing No. 239, 189:4-9.
•
To the best of his belief, “once a contact was established with a potential client,
information would be sent to them through the Carlita file. This would include
background on a potential buyer . . .” Filing No. 239, 191:7-11.
•
The “Carla” file “had records or allegedly had records of virtually every client
[Defendants] had ever had any successful contact with.” Filing No. 239, 192:16-18.
•
It was “quite possible” Defendants’ telemarketers maintained a list of companies that
were already being actively pursued and were not to receive further contact from the
telemarketers. Filing No. 239, 198:2-200:2.
•
Defendants “kept lists of folks who paid [Defendants] monies to value their company
in the hopes that they would sell them.” Filing No. 239, 207:2-5.
•
Individual “producers” kept their own records. Financial information was kept on
the computer or in hard copies. Filing No. 239, 214:17-18.
On March 9, 2012, the final hearing on the pending motions, testimony from Richard
Calabria, president of Defendant WSE, was elicited. Mr. Calabria testified:
•
Calabria began working for Defendant WSE on February 21, 2011 as a part-time
accountant and is currently the president of WSE. Filing No. 259, 6:11-14.
•
When he commenced his accounting duties for WSE, he began to use the
Quickbooks accounting program to keep track of receivables and income, but the
prior bookkeeper did not record that information. Filing No. 259, 64: 8-18.
•
No employee of Defendants had the knowledge or skill to perform the type of search
Continuum performed. Filing No. 259, 21:19-22.
•
An outside vendor was brought in to back-up Defendants’ computer files. The
outside vendor was not called to testify. Filing No. 259, 27:17-28:2.
17
•
Calabria is concerned that Defendants’ clients will be harmed if Plaintiff is allowed
to contact those clients. Filing No. 259, 42:8-19.
•
Calabria does not know whether any of Defendants’ employees were required to
surrender their files to determine if they contained documents responsive to the
plaintiff’s discovery. Filing No. 259, 100:10-12.
•
Defendants use an accounting program called “Quickbooks.” The program could
produce a list of clients who paid fees to Defendants. Filing No. 259, 65:13-22.
The parties submitted additional briefs after the hearing and the matter is now fully
submitted.15
ANALYSIS
Before the court are three separate motions: (1) Defendants’ motion to amend its
complaint; (2) Defendants’ motion for a protective order; and (3) Plaintiff’s motion for
sanctions.
Motion to Amend
Once the time for amending a pleading as a matter of course has expired, a pleading
may be amended only if the opposing party provides written consent or with leave of the
court. Fed. R. Civ. P. 15(a)(2).
15
Plaintiff’s motion for leave to file a reply brief, (filing no. 255), is granted and the court
reviewed and considered the proposed reply brief, (filing no. 255-1), as well as Defendants’
responsive brief, (filing no. 256).
18
In general, courts are encouraged to allow amendments liberally. See Shen v. Leo A.
Daly Co., 222 F.3d 472, 478 (8th Cir. 2000). However, “[i]f a party file[s] for leave to
amend outside of the court’s scheduling order, the party must show cause to modify the
schedule.” Sherman v. Winco Fireworks, Inc., 532 F.3d 709, 716 (8th Cir. 2008)(quoting
Popoalii v. Corr. Med. Servs., 512 F.3d 488, 497 (8th Cir. 2008). Indeed, the “good cause”
requirement found in Fed. R. Civ. P. 16(b) for amending pleadings after the expiration of
the scheduling deadline for doing so has passed “is not optional.” Id. at 716. “The primary
measure of good cause is the movant's diligence in attempting to meet the order's
requirements.” Id. at 716-17 (quoting Rahn v. Hawkins, 464 F.3d 813, 822 (8th Cir.2006).
The Defendants’ initial answer was filed on November 12, 2010. Filing No. 28. The
deadline for filing amendments to pleadings was February 11, 2011. Defendants filed a
motion to amend their answer on August 29, 2011. The Plaintiff filed a motion to amend
its complaint on September 28, 2011. After extensive briefing and oral argument, the
undersigned granted Plaintiff’s motion to amend16 and denied as moot Defendants’ motion
to amend. Filing No. 123. Defendants filed their amended answer in response to the
amended complaint on October 30, 2011.
Defendants requested leave to amend their amended answer on December 12, 2011.
Defendants seek to add the following affirmative defenses: (1) Defendants’ alleged use of
the term “Kiewit” did not constitute trademark use and (2) Defendants’ alleged use of the
Service Mark constitutes nominative fair use. Filing No. 181-4.
16
The undersigned conducted an analysis under Fed. R. Civ. P. 16(b) and specifically found
good cause existed for Plaintiff’s request for leave to amend. Filing No. 124 at Audio File 26:3028:40.
19
In an attempt to meet their burden of proving good cause exists, Defendants argue
that a brief filed by Plaintiff in regard to a motion for protective order “brought into sharp
and imminent focus Plaintiff’s claim of a need and a right to contact Defendants’ clients
without court approval or oversight.” Filing No. 180, ¶ 11. Further, “[d]iscussions with
others in the industry . . . caused Defendants to consult trademark counsel, to determine
whether they could now support trademark defenses.” Filing No. 180, ¶ 14. Defendants
allege that it was not until December 8, 2011 that “Defendants’ learned from trademark
counsel that they indeed now have the basis necessary to allege additional affirmative
defenses against Plaintiff’s claims, in the context of Plaintiff’s demands to contact
Defendants’ client without any oversight. . . .” Filing No. 180, ¶15. Finally, Defendants
argue their attempts to gain information regarding Plaintiff’s intellectual property claims
were thwarted by Plaintiff during discovery. Filing No. 180.
From its inception, this law suit has centered on Plaintiff’s allegations that
Defendants violated federal and state law addressing intellectual property, including claims
under the Lanham Act for trademark infringement, unfair competition and false
representation. See Filing No. 1, ¶¶ 13-39. Plaintiffs further detailed the factual basis for
their trademark claims in the Rule 26(f) Report and in response to Defendants’ First Set of
Interrogatories. Filing No. 36.
Simply put, Defendants have been on notice from the
moment they were served with the complaint that Plaintiff’s primary claims alleged
violations of federal and state trademark law.
Defendants’ two alleged justifications for waiting almost a year after the deadline to
amend their answer are unpersuasive. Defendants first assert that the issue was not brought
into “sharp and imminent” focus until Plaintiff professed its desire to contact Defendants’
20
clients without court supervision.17 Having been provided multiple opportunities to brief
the matter, to present evidence, and to provide oral argument, Defendants have failed to
provide any connection between Plaintiff’s allegedly sudden revelation of intent to contact
Defendants or former clients and the proposed additional affirmative defenses. Case law
provided by Defendants addressed the merits of the proposed affirmative defenses, but did
not explain why they could not have been asserted until Defendants allegedly first learned
of Plaintiffs’ discovery intentions. Indeed, the court can find no reason why Plaintiff’s
desire to conduct discovery on Defendants’ clients or former clients would suddenly
motivate the Defendants to assert affirmative defenses against the primary claims in this law
suit.
Moreover, even if there was some connection between Plaintiff’s discovery plan and
the affirmative defenses, at the October 12, 2011 hearing, Defendants stated their concern
with Plaintiff contacting Defendants’ clients, (see Filing No. 124, Audio File at 52:05 to
52:25), providing clear evidence Defendants were aware of Plaintiff’s plan of discovery.
By October 31, 2011 Defendants’ were certainly aware of the possibility of Plaintiff
contacting current and former clients and could have moved to add the proposed affirmative
defenses to their answer that day.
Defendants also assert that Plaintiff has stonewalled Defendants’ discovery attempts
to receive information regarding Plaintiff’s trademark claims. However, when pressed by
this court to explain what information they could have received in discovery that would have
sparked them into action earlier, Defendants can point to none. To the contrary, the Plaintiff
17
Of course, as is discussed infra, the Defendant is actually concerned about the level of
court supervision. This is an active lawsuit and none of the parties’ discovery actions are undertaken
without oversight of the court.
21
described the conduct that led to the filing of this suit in their discovery answers. See Filing
No. 186-5, p. 3, Answer to Interrogatory No. 5. If Defendants believed Plaintiff was not
being forthcoming in discovery, Defendants could have sought court intervention through
a motion to compel. They did not, thus their claims that Plaintiff’s objections to discovery
prevented Defendants from obtaining the information necessary to raise the proposed
affirmative defenses rings hollow.
More likely the key to Defendants’ delay in amending its answer can be found in their
brief in support of their motion to amend – “[d]iscussions with others in the industry . . .
caused Defendants to consult trademark counsel, to determine whether they could now
support trademark defenses.” Filing No. 180, ¶ 14. Waiting to contact an attorney with
expertise in the subject area of the litigation does not constitute good cause for seeking to
amend a pleading after the deadline has passed. Accordingly, Defendants’ motion for leave
to amend is denied.
Motion for Protective Order
A court will enter an order protecting a party from certain types of discovery only
upon a showing of good cause. See Fed. R. Civ. P. 26(c). The party seeking the protective
order bears the burden of demonstrating the existence of good cause for entering such an
order. See Miscellaneous Docket Matter No. 1 v. Miscellaneous Docket Matter No. 2, 197
F.3d 922, 926 (8th Cir. 1999). A showing of “good cause” requires “a particular and
specific demonstration of fact, as distinguished from . . . conclusory statements.” Gulf Oil
Co. v. Bernard, 452 U.S. 89, 102 n. 16 (1981) (quoting 8 C. Wright & A. Miller, Federal
Practice and Procedure § 2035, p. 265 (1970)); Miscellaneous Docket Matter, 197 F.3d at
926. Thus, the parties seeking protection must show that specific prejudice or harm will
result if no protective order is granted. See Frideres v. Schiltz, 150 F.R.D. 153, 156
22
(S.D.Iowa 1993). A determination of whether “good cause” for a protective order exists
“must also include a consideration of the relative hardship to the non-moving party should
the protective order be granted.” General Dynamics Corp. v. Selb Mfg. Co., 481 F.2d 1204,
1212 (8th Cir. 1973) (citing United States v. Kordel, 397 U.S. 1, 4-5 (1970)). The court has
broad discretion in determining whether a protective order is warranted and the degree of
protection required. Roberts v. Shawnee Mission Ford, Inc., 352 F.3d 358, 362 (8th Cir.
2003).
Plaintiff has stated it has no objection to the entry of a protective order, however the
parties disagree over the amount of protection necessary. At the heart of the dispute is
whether, and to what degree, Plaintiff should be allowed to contact Defendants’ current or
former clients. Plaintiff argues that it should be able to contact Defendants’ clients and
former clients in an effort to determine whether Defendants used the Kiewit Mark to solicit
business and what, if any, representations Defendants made regarding their relationship with
Kiewit. Defendants have strenuously argued that any contact with their current or former
clients will cause Defendants’ business to suffer “irreparable harm” because any such
contact would violate confidentiality agreements Defendant entered into with their clients.
Defendants seek not only a protective order, but a court-controlled procedure for Plaintiff’s
contacts with Defendants’ current or former clients wherein all correspondence with
Defendants’ clients would be conducted in writing. See Filing No. 158, ¶¶ 22-23 & Filing
No. 177, pp. 15-16.
It is true that courts are often reluctant to allow direct contact with litigants’ clients
or customers in lawsuits involving intellectual property disputes. In general, these courts
are concerned with the impact such contacts may have on the litigants’ businesses, such as
when the parties are “fierce competitors” and the information sought could be gained by
23
other means. See Joy Technologies, Inc. v. Flakt, Inc., 772 F.Supp. 842, 849 (D. Del. 1991).
Kiewit must first demonstrate the information it seeks from Defendants’ clients is
relevant and necessary.18 In re Remington Arms Co., Inc., 952 F.2d 1029, 1032 (8th Cir.
1991). Kiewit has represented that it intends to ask Defendants’ past and current clients to
what extent, if any, Defendants represented Kiewit was an interested or potential buyer of
the clients’ businesses. Kiewit seeks information regarding written correspondence and any
other communications Defendants had with their clients regarding Kiewit’s role in a
potential sale.
In the Memorandum and Order regarding the initial discovery dispute in this case, the
court noted that Defendants were an unreliable source of information because of their
document retention19 policies. Filing No. 128, p. 11-13.
18
After many discovery disputes
For the purposes of this motion, Plaintiff assumes that the identities of Defendants’ clients
constitute trade secret information; thus, the court will not address that issue.
19
It may be more appropriate to refer to Defendants’ policies as document “destruction”
policies rather than “retention” policies since, according to Defendants, they kept very little
correspondence with clients, including paperwork on completed transactions (as evidenced by the
fact Defendants could produce few, if any, documents pertaining to Kiewit’s completed transaction
with Jett Industries, which Defendants facilitated). Filing Nos. 106-3 & 106-7. But there were,
literally, terabytes of documentary information on Defendants’ remaining server and its external hard
drives, and client correspondence was located within this repository–leaving the court to wonder
what the Defendants’ actual policies were and are with respect to keeping documents. The court
need not answer that question because irrespective of any policies they may have for retaining
documents, the Defendants have proven to be an untrustworthy source for searching and disclosing
such documents in discovery.
24
and reams worth of discovery motions, briefs and other filings, the court’s initial impression
has been reinforced, not allayed. Defendants are simply not a reliable source of information.
At the heart of the matter is what representations, if any, Defendants made to their
clients regarding Kiewit’s interest in buying the clients’ respective businesses. Initially,
Defendants stated the Kiewit name was invoked only twice in communications with
potential clients, and those contacts did not result in a business valuation or a completed
sale.
During his deposition, Hdlaky (one of the recipients of the correspondence
Defendants initially acknowledged) stated that during follow-up communications with
Defendants, they reiterated Kiewit’s interest in purchasing his company. Defendants deny
this assertion.
A forensic examination has been done: Defendants’ initial assertion regarding the
number of times it referenced Kiewit to a potential buyer was patently false. Additional
contacts with other potential clients discussing Kiewit as a potential buyer were discovered.
At least four of those clients paid Defendants for a business valuation. Filing No. 239,
133:21-25.
Defendants continue to attempt to use client confidentiality as a means of preventing
Plaintiff from discovering relevant information. They argue Plaintiff has not asserted it has
any damages in this case. However, in Lanham Act cases, successful plaintiffs are entitled
to a defendant’s profits for misuse of a service mark. 15 U.S.C. § 117(a). Without speaking
directly to Defendants’ clients regarding any written and verbal communications, Plaintiff
has no reliable means of discovering exactly what, if any, representations were made to the
clients beyond what appears in the limited written communications that have been produced.
Plaintiff has met its burden of showing the information sought is relevant and necessary to
its case.
25
Under In re Remmington, the court must balance the injury Defendants will suffer
against Kiewit’s need for the information. Defendants argue their business will be
essentially ruined, and they offered the testimony of no fewer than four experts to discuss
the importance of confidentiality in the field of mergers and acquisitions. Having reviewed
the testimony of each expert, the court has no doubt confidentiality is viewed as essential in
the field of mergers and acquisitions. However, even the experts were not able to offer
anything more than speculation as to what impact, if any, Plaintiff’s discreet contacts with
clients or former clients may have.
More importantly, Defendants share the majority of the responsibility for whatever
peril they face if Plaintiff contacts Defendants’ clients. Defendants’ lack of records
retention, its disorganized method of storing the documents they do keep, and its lack of
candor with the Plaintiff and this court during the discovery process convinces me that
Plaintiff must contact Defendants’ clients to reliably obtain relevant discovery. For example,
this court previously ordered Defendants to produce “every record . . . showing the number
of appraisal and/or business valuation [Defendants] have sold since 2008" and identifying
the number of appraisals and valuations sold since 2008 and the fee collected for each one
of the appraisals or valuations sold. Filing No. 128. In response to the court’s order,
Defendants submitted a hodgepodge of documents including deposit slips and redacted bank
statements that are barely decipherable and offer little in the way of identifying the number
of valuations sold since 2008. Had Defendants maintained or produced anything resembling
complete and accurate records in an organized fashion, and had they been honest and
forthright in the discovery process from the beginning, other discovery options might have
been available for determining whether, and to what extent, Defendants profited from using
the Kiewit name. At a minimum, Kiewit could have reviewed correspondence and contracts
26
without first contacting the clients. Based on that information, Kiewit, and this court, could
have better decided to what extent Kiewit would be allowed to contact Defendants’ clients.
But that option is not available. This court has no confidence that Defendants have
fully met their discovery obligations or will fully respond to Plaintiff’s discovery requests.
The court will enter a protective order, but will not require the restrictions proposed by
Defendants. Plaintiff will be allowed to contact Defendants’ former and current clients,
subject to the following restrictions as tailored for this case:
1)
Plaintiff may contact any of Defendants’ clients or potential clients which
were identified from the Continuum forensic examination as having received
solicitation information from the Defendants which included the word
“Kiewit.”
2)
In addition,
a.
b.
Plaintiff may contact any of the businesses identified by the Plaintiff
as engaged primarily in the construction and/or mining business and
that have paid Defendants for a business valuation, appraisal, or
profile.
c.
20
Defendants shall provide Plaintiff with a listing of businesses or
entities that purchased a business valuation, appraisal, or business
profile from Defendants since January 1, 2008. Plaintiff shall identify
any businesses on that list that are primarily engaged in the
construction and/or mining business.20
Before contacting any specific business(es), the Plaintiff shall notify
the Defendants of its intent to contact the business regarding the
This information should be readily accessible; Defendant West testified that Defendants
used Standard Industrial Classification codes to identify the nature of the business of potential
clients. Filing No. 259, 118:2-6. Moreover, the Defendants are required to retain income tax
records–which should include 1099s or other income records for the years in question.
27
matters in this lawsuit. If Defendants have a record of which
individual or individuals they corresponded with at the target
businesses, Defendants shall provide, in writing, the contact
information to Plaintiff within one week of receiving the Plaintiff’s
notice.
d.
To the extent possible, Plaintiff shall initiate contact with the
individual or individuals at the target businesses which Defendants
identified as the contact person. If Defendant is unable to identify a
specific contact person, Plaintiff may contact the president or owner
(past and/or present) of the company or entity.
This method of discovery is aimed at ensuring Plaintiff’s inquiries remain discrete
and limited while providing Plaintiff an opportunity to discover information that either
proves or disproves its claims.21 See, e.g., Gen-Probe, Inc. v. Becton, Dickinson & Co., case
no. 09cv2319, 2010 WL 2011526 (S.D.Cal 2010) (allowing plaintiff to make contact with
defendant’s customers, but ordering plaintiff to make inquiry based on information provided
by the defendant).
Motion for Sanctions
Plaintiff seeks sanctions for the Defendants’ obstreperous conduct during the course
of this litigation, particularly as it pertains to false statements in discovery responses and
during court hearings, and its destruction and failure to produce electronic discovery.
Under the facts presented in this case, the court’s authority to sanction the misconduct
of parties and their attorneys is derived from the Federal Rule of Civil Procedure and the
inherent power of the court. See Fed. R. Civ. P. 11 & 37; Chambers v. NASCO, Inc., 501
21
The court notes this is essentially identical to the procedure Defendants requested in the
initial hearing on the motion for protective order on October 12, 2011.
28
U.S. 32, 44 (1991); Sylla-Sawdon v. Uniroyal Goodrich Tire Co., 47 F.3d 277, 280 (8th Cir.
1995).
The court has the power to shape the appropriate remedy including default
judgment, striking pleadings, an adverse jury instruction, and an award of attorney’s fees and
costs. See Stevenson v. Union Pacific R. Co., 354 F.3d 739, 745-46 (8th Cir. 2004). The
most severe sanctions are reserved for those litigants demonstrating “ ‘blatant disregard of
the Court’s orders and discovery rules’ [and] engaging in a pattern of deceit by presenting
false and misleading answers and testimony under oath in order to prevent their opponent
from fairly presenting its case.” Chrysler Corp. v. Carey, 186 F.3d 1016, 1022 (8th Cir.
1999).
1.
False Affidavits and Testimony.
Defendant West submitted several affidavits to the court in which he stated there
were two and only two instances in which Defendants represented Kiewit as a potential
buyer to clients. He further confirmed this testimony during a deposition. During the course
of this litigation, West has made the following statements under oath, which are now known
to be false:
•
Defendants suggested Kiewit as a potential buyer on only two occasions over
several years. Filing No. 174-3, ¶ 28 (Affidavit of Steven West).
•
WSG's and WSE's standard practice is, and always has been, not to save
documents concerning potential clients unless they actually become clients.
That is why there are no documents referencing "Kiewit" in WSG's or WSE's
computers. Filing No. 115-16, ¶ 22 (Affidavit of Steven West).
•
West’s inquiries and checking revealed no more than two occasions in which
Kiewit was mentioned to prospective clients. Filing No. 115-16, ¶¶ 29-33
(Affidavit of Steven West).
29
•
Defendants have not "failed and refused" to produce documents as to the
name "Kiewit"; there simply are none. Filing No. 115-16, ¶¶ 29-33 (Affidavit
of Steven West).
•
WSE's landlord, Bertke, does not have and does not maintain a copy of the
electronic files created by Defendants. Filing No. 115-16, ¶ 33. Further, there
are no files referencing Plaintiff. Filing No. 115-16, ¶¶ 32-33 (Affidavit of
Steven West).
•
Defendants have fully and honestly responded to every notice of deposition
and discovery request. Filing No. 115-16, ¶45 (Affidavit of Steven West).
•
The Defendants carefully researched their records, and over a period of three
years, found only two instances of using name Kiewit other than brokering
Kiewit’s purchase of a twenty-five million dollar company. Filing No. 199-1
(Deposition of Steven West taken July 12, 2011).22
•
During the time Bethel worked for WSE, the name ‘Kiewit’ was mentioned
by West only once; when speaking to Mike Hdladky of Hdlaky Construction
in April 2010. Filing No. 121-5, ¶5.
Defendants’ counsel made numerous other statements in briefs strenuously arguing
that no records existed beyond the two letters that were the basis for this lawsuit. Filing No.
115, p. 40 (Defendants’ brief in opp. to motion to compel) (Defendants have no documents
mentioning Kiewit); Filing No. 117, p. 16 (Defendants’ brief in opp. to subpoena); Filing
No. 117, p. 19 (Defendants’ brief in opp. to subpoena) (asserting no additional records
naming Kiewit).
22
West was the 30(b)(6) representative for the corporate Defendants’ depositions. As such,
West was designated to testify as to “[a]ny and all representations involving Peter Kiewit Sons’, Inc.
to Wall Street Equity Group, Inc.’s potential clients . . . [and] [a]ll use by Wall Street Equity Group,
Inc. of the name ‘Peter Kiewit Sons’, Inc.,’ ‘Kiewit,’ . . . or any similar name which is affiliated with
the Plaintiff.” Filing No. 62 (Notice to take 30(b)(6) Deposition of Wall Street Equity Group, Inc.)
30
Defendants and their counsel called witness and Defendants’ former employee, Tara
Bethel, a liar.23 Bethel provided an affidavit, submitted to the court by the Plaintiff, which
stated that while she worked for WSE, she “observed at least one-hundred (100) instances
in which a WSE employee would represent to a prospective client-business owner that Peter
Kiewit Sons’ Inc. was a ready, willing, and interested buyer client-business owner’s
business. These representations were made both orally over the telephone and in written
follow-up letters.” Filing No. 119-1. In the end, the forensic examination, which West so
vehemently resisted and attempted to delay, revealed Bethel was telling the truth.
But West, WSE Vice President R.J. Rios, and WSE group employee Steven Blum did
provide false statements to this court. The Continuum examination revealed additional
documents comparable to the Hdlaky and Waterfront Marine letters and naming Kiewit as
a potential buyer. The examination also revealed email correspondence that was purportedly
from Defendant West which mentions Kiewit as a potential buyer of companies. The
evidence also establishes that Bertke possessed back-up copies of Defendants’ electronic
files at the time West stated he did not. The Rios affidavit submitted of record stated that
“[d]uring the time [Tara] Bethel worked for WSE, the name ‘Kiewit’ was never mentioned
in the office where Bethel worked, verbally or in writing.” Filing No. 121-3, ¶5. Blum
submitted an identical affidavit. Filing No. 121-4, ¶5. The assertions made by West, Rios,
and Blum are directly contradicted by the documents obtained as a result of the forensic
examination, to include emails naming Kiewit as a potential buyer, sent under Rios’
23
During the course of hearings before the undersigned, Defense counsel has also muttered
“that’s a lie,” or words to that effect, several times in response to statements made by Plaintiff’s
counsel. Despite the hostile and often volatile environment of the court proceedings, I have not
found any instance where Plaintiff or its counsel misrepresented the record or the facts to this court.
31
signature by Bethel, and of which Rios received a copy. See, e.g., Filing No. 182-1, pp. 3,
6, 9 &12.
Defendants appear surprisingly unconcerned that they misrepresented a large portion
of the factual basis upon which their initial defense of this lawsuit relied.24 Rather than
initiating a contrite dialogue with Plaintiff’s counsel and this court to fix the mess they
caused, the Defendants waited for the Plaintiff to report the problem, and Defendants then
attempted to explain away their patently false and repeated statements from multiple sources
by stating they were simply “mistaken.” Defendants have seamlessly changed their defense
from “there were only 2 letters total” to “there were only 23 letters over five years,” Filing
No. 259, 257:8-9.
Defendants also assert they could not have known about the additional letters
mentioning Kiewit because it was their practice to delete solicitations that did not produce
business for them. This claim is simply not believable. Defendants’ search of their
electronic files to provide discovery responses was woefully inadequate. And having heard
and observed Defendant West testify on several occasions, the undersigned magistrate judge
finds Defendant West is not a credible witness, and his claim that he cannot remember
communicating with potential clients regarding Kiewit is not credible. The forensic
examination produced several copies of letters bearing West’s signature and indicating he
24
Defendants asserted just the contacts with Hdlaky and Waterfront Marine existed and,
presumably because Defendants’ did not profit from those contacts, Plaintiff could not prove any
damages. In fact, Defendants even moved for sanctions on the issue, calling the lawsuit frivolous
based, in part, on these incorrect factual assertions. While the court need not decide the underlying
merits of the lawsuit, Defendants’ motion for sanctions against the Plaintiff based on Defendants’
false representations to this court was clearly improper, bordering on unconscionable.
32
had spoken with the individuals personally regarding the potential sales of their companies
to Kiewit. See, e.g., Filing No. 182-1, pp. 39, 48, 53, 55, 60. West was presented as a
30(b)(6) witness, yet there is no indication he diligently prepared for those depositions, and
he was quick to claim he did not have any first hand knowledge of any list of WSE’s and
WSG’s clients. The lists were, at least at one time, in the Defendants’ possession. Filing
No. 239, 112:7-115:5. West claims he knows nothing about computers, but admits he
dumped Server 1 in the trash, after the discovery battles had erupted and with no notice to
the Plaintiff or this court, upon concluding the motherboard was “fried.” Simply put, West
was not a believable witness and his pattern of dishonesty under oath, and cavalier attitude
while doing so, is a “direct affront to the court.” Chrysler Corp., 186 F.3d at 1021.
2.
Electronic Discovery
Once a party is involved in or reasonably anticipates litigation, several duties arise
related to finding and preserving discoverable information. These duties include:
•
A party must suspend its routine document destruction policy and put a
“litigation hold” in place;
•
Counsel must become fully aware of client’s retention policy and
“architecture”;
•
Counsel must communicate with the “key players” to determine how
information is stored;
•
Counsel must reasonably monitor compliance with the “litigation hold” so that
all sources of discoverable information are identified and searched; and
•
Having identified all sources of relevant information, a party and its counsel
are under a duty to retain that information and produce information responsive
to the opposing party’s requests.
33
Cache La Poudre Feeds, LLC v. Land O’Lakes, 244 F.R.D. 614, 625 (D. Colo. 2007)(citing
Zubulake v. UBS Warburg LLC, 229 F.R.D. 422, 431-433 (S.D.N.Y. 2004).
a.
Equipment in Arthur Bertke’s possession.
Plaintiff asserts Defendants intentionally moved electronic storage devices in order
to prevent Bertke from responding to a subpoena issued by Plaintiff. Plaintiff served its
notice to issue a subpoena on Bertke on August 1, 2011. The proposed subpoena
commanded Bertke to produce:
documents, electronically stored information, or objects and permit their
inspection, copying, testing, or sampling of the material: copies of any and all
electronically stored information, including, but not limited to, all backup data
and/or tapes regarding accounts receivable, money paid for business
valuations, financial statements, and any correspondence referencing Plaintiff
or the word “Kiewit” for Wall Street Equity Group, Inc., Wall Street Group
of Companies, Inc., Shepherd Friedman and Steven West for the time period
January 1, 2008, to the present time.
Filing No. 73.
Defendants served a notice that they intended to object to the issuance of the
subpoena and Plaintiff subsequently moved for a court order to issue the subpoena.
Defendants objected stating that they did not have any records referencing “Kiewit” and
further asserted by affidavit:
All of the business records of Wall Street Group of Companies, Inc. and Wall
Street Equity Group, Inc. are maintained in the offices of Wall Street Equity
Group, Inc., and are not in the possession and/or control of any third party.
34
Filing No. 117-12, ¶3.
A second affidavit submitted by West swore that “WSE’s landlord does not have and
does not maintain a copy of the electronic files created by Defendants.” Filing No. 115-16,
¶ 32.
These assertions were false. Defendants had placed copies of their electronic files
in the possession of Bertke – WSE’s landlord. Moreover, immediately after the undersigned
authorized the issuance of the subpoena on Bertke, but before it was actually served on
Bertke, West contacted Bertke and instructed him to return equipment containing
Defendants’ electronically stored information. Bertke did so and by the time he received the
subpoena, he no longer possessed any responsive materials. Having learned of West’s
actions, Kiewit moved for sanctions.
West again asserted the false statements in his affidavits were mistakes and that he
simply forgot Bertke possessed copies of Defendants’ files. He also asserts his motivation
in removing the equipment from Bertke’s possession was to ensure its safety because he
walked by the room where Bertke stored Defendants’ files, noticed the usually locked door
was ajar, and simultaneously remembered Bertke had the equipment. This allegedly
prompted West to contact Bertke and ask for all of the equipment to make sure it was safely
stored. Further, West asserted he had only a general knowledge that discovery in the suit
was ongoing, but was not aware Bertke was going to be served a subpoena directing him to
produce the exact equipment West commanded Bertke to return.
West’s explanation for retrieving all computer drives from Bertke before a subpoena
could be served is not credible, and his actions were in bad faith. Plaintiff initially noticed
the subpoena of Bertke on August 1, 2011. The matter was contested, with briefs and
35
evidence submitted by both parties. At the motion hearing, West testified that he was not
fully aware of the discovery process because Defendants’ main communication with their
attorney came through Richard Calabria, the current President of WSE. But West himself
submitted an affidavit, filed on October 7, 2011, in support of Defendants’ objection to
issuing the Berktke subpoena. West also testified as Defendants’ 30(b)(6) witness, has
testified at multiple hearings, and has submitted several affidavits in this case. To suggest
he was unaware of the discovery process, including the particulars involved in the dispute
over the issuance of the subpoena to Bertke, is disingenuous.
Defendants removed the electronic storage devices from Bertke on the eve of the
service of the court ordered subpoena and only produced the equipment after the
undersigned ordered the Defendants to do so.25 The court finds Defendants’ conduct with
regard to the initial objection to the Bertke subpoena and the subsequent movement of the
electronic storage devices to constitute bad faith.
b.
Search for Electronically Stored Evidence.
Fed. R. Civ. P. 26(b)(2) addresses a party’s duty in preserving and producing
electronic data.
A party need not provide discovery of electronically stored information from
sources that the party identifies as not reasonably accessible because of undue
burden or cost. On motion to compel discovery or for a protective order, the
25
West argues that he turned over the electronic files to his counsel prior to being ordered
to do so, indicating he was acting in good faith. Whatever his motivation for giving the electronic
storage devices to counsel, I do not believe it was an act of “good faith” or in any way offsets his
intentional disruption of the discovery process.
36
party from whom discovery is sought must show that the information is not
reasonably accessible because of undue burden or cost. If that showing is
made, the court may nonetheless order discovery from such sources if the
requesting party shows good cause, considering the limitations of Rule
26(b)(2)(C). The court may specify conditions for the discovery.
Fed. R. Civ. P. 26(b)(2)(B).
The federal rules further provide that a court may limit the frequency or extent of
discovery if it determines that:
(i) the discovery sought is unreasonably cumulative or duplicative, or can be
obtained from some other source that is more convenient, less burdensome,
or less expensive;
(ii) the party seeking discovery has had ample opportunity to obtain the
information by discovery in the action; or
(iii) the burden or expense of the proposed discovery outweighs its likely
benefit, considering the needs of the case, the amount in controversy, the
parties' resources, the importance of the issues at stake in the action, and the
importance of the discovery in resolving the issues.
Fed. R. Civ. P. 26(b)(2)(C).
Thus, unless the producing party can make a showing that the discovery requests at
issue seek inaccessible information, or responding to those requests will be overly
burdensome in light of other options available for obtaining the requested information, the
producing party will bear the cost of production. See Rowe Entertainment, Inc. v. William
Morris Agency, Inc., 205 F.R.D. 421, 428 (S.D.N.Y. 2002); see also Zubulake v. UBS
Warburg LLC, 217 F.R.D. 309, 318 (S.D.N.Y. 2003)(cost-shifting should only be
37
considered when electronic discovery imposes an “undue burden or expense” on the
responding party).
[W]hether production of documents is unduly burdensome or expensive turns
primarily on whether it is kept in an accessible or inaccessible format (a
distinction that corresponds closely to the expense of production). . . . [I]n the
world of electronic data, thanks to search engines, any data that is retained in
a machine readable format is typically accessible.
Zubulake, 217 F.R.D. at 318.
In this case, Plaintiff is seeking to require Defendants to pay for the costs associated
with the forensic computer examination conducted by the representative from Continuum.
Conversely, Defendants argue they were incapable of finding the letters and other
communications discovered as a result of the forensic examination. Defendants’ basis for
their argument is two-fold: 1) Defendants argue they had Romano, their most “computer
literate” employee, conduct a keyword search for “Kiewit” from her work station and that
search revealed no letters or communications with potential clients containing the term
“Kiewit;” and (2) the search conducted by Continuum took several weeks and Defendants
could not have performed such an extensive search on their own.
Defendants cite to no authority stating they may meet their burden of showing the
electronic discovery in this case was unduly burdensome and too costly to produce because
the information was not disclosed through a keyword search at a computer work station.
Although Romano, who performed the keyword search, testified she consulted with Bertke
prior to performing the search, she is not a computer expert and has no formal training in
computer sciences. Defendants have offered no evidence that they spoke with a forensic
examiner or any other computer expert to even evaluate what the cost and burden of
38
thoroughly searching Server 2. Considering Defendants’ very liberal policy of not keeping
documents, consolidating their records in one location, or organizing their files, their efforts
to locate relevant electronic files were woefully inadequate.
Defendants’ argument that they were not capable of performing a search similar to
Continuum’s search is equally unpersuasive. Defendants focus on the amount of time it took
Clyde to complete the imaging and search of their electronic equipment. However, the
length of a search has very little to do with whether the requested data was accessible.
Simply stating the Continuum analysis took a long time, and no one in the employ of
Defendants could perform the search, does not meet the burden of showing the information
was “inaccessible” for the purposes of discovery. See Zubulake, 217 F.R.D. at 320 (even
“accessible”data may take “days” to actually access).
Thus, Defendants have not shown the documents were inaccessible. Further, by
relying on an employee’s simple key word search from her work station, the court finds
Defendants did not conduct a good faith search for the electronically stored information.
Accordingly, Defendants shall pay for Plaintiff’s reasonable attorney’s fees and the expenses
associated with Continuum’s forensic examination of Defendants’ computer equipment, and
for filing and litigating the motion to compel and all other motions and hearings associated
with retrieving and searching Defendants’ computer files.
c.
Spoliation.
Plaintiff alleges Defendants should be sanctioned for intentionally destroying
evidence. “A spoliation-of-evidence sanction requires ‘a finding of intentional destruction
indicating a desire to suppress the truth.’ ” Greyhound Lines, Inc. v. Wade, 485 F.3d 1032,
1035 (8th Cir. 2007)(quoting Stevenson v. Union Pac. R.R. Co., 354 F.3d 739, 746 (8th Cir.
39
2004)). Intent is rarely proved by direct evidence, and a district court has substantial leeway
to determine intent through consideration of circumstantial evidence, witness credibility,
motives of witnesses in a particular case, and other factors.” Morris v. Union Pac. R.R., 373
F.3d 896, 902 (8th Cir. 2004). Where evidence has been intentionally destroyed to suppress
the truth, one appropriate sanction is an adverse jury instruction regarding the contents of
the destroyed evidence. See Stevenson, 354 F.3d at 746-47.
Plaintiff alleges Defendant West intentionally destroyed evidence when he discarded
Server 1 after it crashed in August or September of 2011. West admits to disposing of
Server 1, but alleges all of the information on Server 1 was preserved on a hard drive prior
to the time it was discarded. In support of this contention, West offered affidavits from
Bertke with the following statements:
•
Bertke copied the data from the black hard drive given to him by West in
September 2011 on to another black hard drive on October 14, 2011. Filing
No. 174-1, ¶5.
•
Bertke did not review the data on the black hard drives, but the amount of data
on those drives is consistent with being all the data from Defendants’ original
server [Server 1]. Filing No. 174-1, ¶6.
•
Bertke examined a Black Western Digital My Passport external USB hard
drive, serial number WX81A5116889 and discovered that it contains 130,423
files in 6,031 folders,(filing no. 229-1, ¶4), with the earliest file dated July 29,
1998, and the latest file dated December 31, 2010. Filing No. 229-1, ¶5.
•
Bertke’s findings on the Black Western Digital My Passport external USB
hard drive are consistent with what he would expect to find on a backup of the
server put in service for Defendants on September 20, 2010 [Server 1]. Filing
No. 229-1, ¶6.
•
All files dated after December 31, 2010 were moved to a new server put in
service in August 2011 [Server 2]. Filing No. 229-1, ¶7.
40
•
The server put in service on September 20 , 2010 [Server 1] contained all the
remaining files; the files on the black hard drives appear to be those files.
Filing No. 229-1, ¶8.
West instructed Romano to create a back-up copy, presumably on one of the black
hard drives that was subjected to the forensic examination, of all the files on Server 1 prior
to its disposal. Filing No. 259, 175:14-25 & Filing No. 207, 91:13-92:2. Thus, West argues
that all of the files on the crashed server had been preserved. West further argues that he
knows very little about computers and despite being in the middle of contentious litigation,
did not think keeping the “fried” server was necessary. West states that he did not dispose
of Server 1 with the intent to destroy evidence.
Although Romano may be the most “computer literate” person employed by
Defendants, she undoubtedly lacks the experience or training to ensure that all files and
other information from Server 1 were preserved in the transfer. And Bertke provided
credible evidence, but his testimony regarding what was transferred to a hard drive from
Server 1 was qualified; Bertke states the information it contained was what he “would
expect to find” on the backup of Server 1 and the amount of information was “consistent”
with being all of the data from Server 1. He could not unequivocally state that all of the data
and files were transferred before Server 1 was discarded. Finally, the Plaintiff presented
evidence of one letter sent by Defendants containing the term “Kiewit” that was not located
during the forensic examination conducted by Continuum – the June 25, 2008 letter
addressed to Randy Sutton at Waterfront Marine. Filing No. 259, 175:14-25. This lends
support to Plaintiff’s claim that evidence was destroyed, with no backup copy, when West
tossed Server 1 in a dumpster.
41
West disposed of Server 1 in the middle of this litigation, and shortly after he was on
notice of Plaintiff’s intention to seek and review Defendants’ electronic records and
equipment. Defendants claim they experienced numerous computer problems over time and
have been through several servers,26 but this argument misses the point. The Plaintiff is not
complaining that Defendants replaced a server: It is stating West intentionally tossed out the
“fried” Server in the middle of litigation without first taking reasonable measures to
determine whether all the information was preserved or forensically examined.
West’s false affidavits and false deposition testimony, particularly combined with the
false affidavits submitted by Rios and Blum (see filing nos. 121-3, ¶¶ 4-5; 121-4, ¶¶ 4-5),
West’s conduct of throwing a computer server in a dumpster while motions for discovery
of electronic information were pending, and his removal of computer hard drives and servers
from Bertke’s possession immediately after the court ruled that Bertke could be subpoenaed
to produce these drives, provide ample evidence that Defendants intentionally submitted
false evidence and testimony in bad faith, committed fraud on this court, and intentionally
destroyed evidence with a desire to suppress the truth in this case.27 Such conduct warrants
26
This is akin to arguing that they were following standard operating procedures in
discarding an allegedly malfunctioning server. However, like document retention policies, even if
this is acceptable conduct outside of the context of litigation, Defendants cannot hide behind it once
litigation has started and they are on notice of Plaintiffs’ intention to seek production of the
equipment. See, e.g., Lewy v. Remington Arms Co. Inc, 836 F.2d 1104, 1112 (8th Cir. 1988)(“a
corporation cannot blindly destroy documents and expect to be shielded by a seemingly innocuous
retention policy.”)
27
The court also reviewed West’s deposition testimony, such as it was. See Filing Nos. 248-
6, -7, -8, and -9. On many occasions, it was difficult to determine who was testifying: West or
Defendants’ counsel. But one thing was clear--West was evasive and uncooperative throughout the
deposition.
42
the imposition of an adverse jury instruction. See Stevenson, 354 F.3d at 750 (finding the
power to give an adverse jury instruction is support by Fed. R. Civ. P. 37 or the “court’s
inherent power”). Specifically, the defendants’s discovery abuse warrants instructing the
jury that it may assume that the contents of the discarded server would have been adverse,
or detrimental, to Defendants’ case.
CONCLUSION
As summarized below, Defendants, and particularly Defendant West, engaged in a
pattern of sanctionable conduct.
•
Defendants argued passionately and unequivocally that no more than two letters were
sent to potential clients mentioning “Kiewit.” Defendants made these representations
under oath, in answers to written discovery, in briefs, and at oral argument before the
undersigned. These representations were false.
•
West told the court that Arthur Bertke did not possess any of Defendants’ electronic
files. This representation was false.
•
Defendants submitted affidavits from two of its employees stating the name “Kiewit”
was never mentioned in writing while Tara Bethel was employed by Defendants.
This representation was false.
•
Defendant West tossed a computer server in a dumpster the same month Defendants
received notice that Plaintiff was seeking Defendants’ electronic records.
•
Defendants’ only search of its electronic files was a key word search conducted by
an employee with no professional training in information services and who admitted
she is not a computer expert.
43
West attempts to explain away these multiple misrepresentations and improper actions
as the “mistakes” of a computer illiterate.28 This explanation is neither satisfactory nor
believable. In fact, the more West testified regarding these matters, the less credible he
appeared. One false affidavit statement may be a mistake. A series of misrepresentations,
particularly in the context of the pattern and timing of the events in this case, is conduct
committed in bad faith to perpetuate fraud on the court. Severe sanctions are warranted.
IT IS ORDERED:
1)
Plaintiff’s motion for leave to file a reply brief, (filing no. 255), is granted and
the court reviewed and considered the proposed reply brief, (filing no. 255-1),
as well as Defendants’ responsive brief, (filing no. 256).
2)
Defendants’ motion to amend its answer, (filing no. 179), is denied.
3)
Defendants’ motion for a protective order, (filing no. 158), is granted in part
and denied in part as set forth in the body of this Memorandum and Order. A
protective order shall be entered separately by this court.
4)
Plaintiff’s motion for sanctions, (filing no. 135), is granted in part and denied
in part as set forth below:
a.
28
Plaintiff’s request for attorneys’ fees and costs associated with its
Motion for Issuance of Subpoena on Arthur Bertke; Plaintiff’s request
for costs associated with the forensic examination of Plaintiff’s
electronic equipment; Plaintiff’s request for attorney’s fees and costs
associated with Plaintiff’s motion to compel, and associated motions
and hearings; and its motion for sanctions, are granted. Plaintiff shall
submit an itemized billing statement of fees and expenses associated
The court finds it extremely ironic that Defendants so readily characterize Tara Bethel as
a liar based on one affidavit she submitted when her affidavit actually led to the discovery of
responsive documents, while Defendants have submitted multiple patently false affidavits to this
court which Defendants simply characterize as “mistakes.”
44
with the above referenced motions and the Continuum forensic
examination of Defendants’ electronic equipment, on or before June 1,
2012, in support of its motion for sanctions. Plaintiff shall refer to
NECivR 54.4 for guidance in preparing the statement.
c.
Plaintiff’s motion for sanctions is denied in all other respects.
d.
The pretrial conference and trial are continued pending further order
of the court. A telephonic status conference before the undersigned
magistrate judge will be held on September 5, 2012 at 10:00 a.m.
(CDT) to discuss further case progression. Counsel for plaintiff shall
place or arrange the call.
IT IS FURTHER HEREBY RECOMMENDED to the Honorable John M. Gerrard
that an adverse jury instruction be given at trial, with the jury instructed as follows:
You may, but are not required to, assume that information stored on the
discarded server [Server 1] would have been adverse, harmful, or detrimental
to the defendants’ claims and defenses.
DATED this 18th day of May, 2012.
BY THE COURT:
s/ Cheryl R. Zwart
United States Magistrate Judge
*This opinion may contain hyperlinks to other documents or Web sites. The U.S. District
Court for the District of Nebraska does not endorse, recommend, approve, or guarantee any third
parties or the services or products they provide on their Web sites. Likewise, the court has no
agreements with any of these third parties or their Web sites. The court accepts no responsibility for
the availability or functionality of any hyperlink. Thus, the fact that a hyperlink ceases to work or
directs the user to some other site does not affect the opinion of the court.
45
Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.
Why Is My Information Online?