Peterson v. City of Minot et al
Filing
83
AMENDED ORDER granting in part and denying in part 67 MOTION to Compel. By Magistrate Judge Charles S. Miller, Jr. (BG)
IN THE UNITED STATES DISTRICT COURT
FOR THE DISTRICT OF NORTH DAKOTA
Joshua Peterson,
Plaintiff,
vs.
City of Minot, a political subdivision, and
Officer Brandon Schmitt, a Minot
Police Officer, in his individual capacity
Defendants.
)
)
)
)
)
)
)
)
)
)
)
ORDER (AMENDED) GRANTING IN
PART AND DENYING IN PART
MOTION TO COMPEL
Case No.1:16-cv-271
Before the court is a motion by defendants to compel discovery from plaintiff’s laptop
computer. This is the second time a discovery issue with respect to this computer has come before
the court.
I.
BACKGROUND
During the early morning hours of August 30, 2014, plaintiff, an admitted methamphetamine
addict and drug dealer, drove into an area behind several commercial establishments located on the
periphery of downtown Minot, North Dakota. Brandon Butler, also an admitted methamphetamine
user and purported drug-dealing associate of plaintiff, was a passenger. Plaintiff pulled his vehicle
up to the back entrance of Minot Welding Company and proceeded to burglarize the establishment
while Butler remained in the vehicle
While in Minot Welding, plaintiff observed a Minot police vehicle pull up across the street
from the front side of the building. Recognizing he might be in trouble, plaintiff exited out the back
1
to where his vehicle was parked. As police officers converged on the area in back of the business
establishments, plaintiff pulled his vehicle away in attempted flight. As he was doing so, defendant
Schmitt fired five rounds from relatively close range into the side of the vehicle, several of which
struck plaintiff and Butler. Plaintiff was seriously injured and rendered a paraplegic. Butler was
not so seriously injured.
Following these events, plaintiff was not incarcerated while he recovered from his injuries
and underwent some rehabilitation. Later, and after accumulating new charges, he was sentenced
to prison and is still serving his sentence.
Plaintiff initiated this action against the City of Minot and Officer Schmitt in his individual
capacity, alleging that Schmitt violated his federal constitutional rights by using excessive force.
Plaintiff also asserts state law claims of battery and negligence.
During the taking of depositions in this case, defendants became aware that plaintiff had a
laptop computer that was then being held by his parents. Prior to that, plaintiff’s then spouse, who
was separated from plaintiff and has now since divorced him, had possession of the computer for
a period of time after plaintiff went to prison, before turning it over to plaintiff’s parents. Relevant
to what follows, it appears plaintiff used the computer for some period of time following the incident
that is the subject of this action and so did plaintiff’s ex-spouse while she had possession of it.
After learning of the laptop, defendants sought to inspect the computer—if not outright gain
possession of it—by serving a Rule 45 subpoena upon plaintiff’s parents directing them to produce
the computer at the Minot Police Department. When plaintiff’s counsel complained about this in
2
a letter, defendants’ counsel stated in response that they intended to ship the computer to an expert
in Minneapolis for examination and that plaintiff’s attorneys could have someone in attendance for
the examination. Nothing was offered in terms of any limitation upon the extent of the search.
Plaintiff then moved to quash the subpoena and defendants moved to enforce it—claiming that they
had the right to an unfettered inspection of the computer. In a prior order dated January 8, 2018, the
court (1) granted plaintiff’s motion to quash the subpoena, and (2) denied defendants’ motion to
compel enforcement of it. The court, however, did require that plaintiff’s counsel take possession
of the computer to insure that any information on it was properly preserved. The court then went
on to state:
The court further concludes that defendant does not have the right to go on a fishing
expedition to examine the computer for whatever might suit its interest. Consequently, the
subpoena to plaintiff’s parents will be quashed.
That being said, given the particular circumstances of the case and the fact that we
are still a long way prior to trial, the court will allow defendant to make a very targeted
request to the plaintiff for discovery of additional information that may be on the computer
that is not cumulative of what defendant has already obtained from plaintiff during his
deposition. Plaintiff’s counsel can then respond accordingly, either by objecting (but not on
the basis that discovery has closed) or providing responsive information that is on the
computer, if any. Any disputes can be resolved by motion, but only after first following the
procedure for informal resolution of the disputes through a phone call to the undersigned as
required by our Local Rules.
(Doc. No. 43).
Following the court’s order, defendants did make what they styled as a “Request for
Discovery of Additional Information From Joshua Peterson’s Laptop.” The individually numbered
requests describe a number of possible locations on the computer for electronic information (e.g.,
email, social media, file exchange, messaging, photo, and internet browser programs) and then asks
3
for virtually all files and other information at these locations, including deleted information. The
individual requests are as follows:
REQUEST NO. 1: Please produce any and all Viber history and records, including deleted
history, from the subject laptop. See attached page 43 of Raquel Peterson’s deposition
transcript regarding Joshua Peterson’s use of Viber on the subject laptop.
REQUEST NO. 2: Please produce any and all messaging or communication applications or
programs records from the subject laptop, including deleted or purged items. See attached
page 44 of Raquel Peterson’s deposition transcript regarding Joshua Peterson’s use of “other
form of communication [on subject laptop] besides his cell phone.”
REQUEST NO. 3: Produce all resident email account (e.g., Outlook) records from the
subject laptop, including usernames, sent items, received items, subject lines, for and from
lines, dates of activity, email content, contacts list, and deleted or purged items. See attached
page 45 of Raquel Peterson’s deposition transcript regarding Joshua Peterson’s use of the
subject laptop to communicate through email, including after the subject incident.
REQUEST NO. 4: Please produce all third-party web-based email account (e.g. Google,
Hotmail, Yahoo) records from the subject laptop, including usernames sent items, received
items, subject lines, to and from lines, dates of activity, email content, contact lists, and
deleted or purged items. See attached page 45 of Raquel Peterson’s deposition transcript
regarding Joshua Peterson’s use of the subject laptop to communicate through email,
including after the subject accident, and page 44 of Raquel Peterson’s deposition transcript
regarding Joshua Peterson’s use of at least one “gmail” email account and page 45 of Raquel
Peterson’s deposition transcript regarding Joshua Peterson’s use of the subject laptop to
communicate through email, including after the subject incident.
REQUEST NO. 5: Please produce any and all internet history from any browser used on the
subject laptop, including deleted or purged history.
REQUEST NO. 6: Please produce any and all photos and/or videos on the subject laptop,
including deleted or purged photos and/or videos. See attached page 46 of Raquel Peterson’s
deposition transcript stating that at least one deletion of the subject laptop has occurred since
the subject incident.
REQUEST NO. 7: Please produce any and all social media records from the subject laptop,
including deleted and/or purged records, contact lists, and friends lists.
REQUEST NO. 8: Please produce all user created files, including deleted files, and the dates
they were deleted. See attached page 46 of Raquel Peterson’s deposition transcript stating
that at least one deletion of the subject laptop has occurred since the subject incident.
4
REQUEST NO. 9: Please provide any and all records from data destruction programs. or
indications of data destruction.
REQUEST NO. 10: Please provide any and all records of transferring of files between the
subject laptop and any external electronic device or data storage unit. See pp. 223-224 of
Joshua Peterson's deposition transcript acknowledging that he has transferred files between
the subject laptop and other electronic devices.
(Doc. No. 69-1).
While there are no limitations set forth in the individual requests with respect to subject
matter or time, the defendants did state the following in the predicate to the requests:
SCOPE OF DOCUMENTS REQUESTED AND TO BE PRODUCED
"Subject incident" or "incident'' is described as the incident occurring on August 30, 2014
when plaintiff Joshua Peterson was in the vicinity of 400 4th Avenue Northeast, at and/or
near Minot Welding Company, Minot, ND, as described in the Complaint and Jury Trial
Demanded (doc. 1) elated July 22, 2016 (hereinafter "Subject Complaint"). For purposes of
these requests, the following requests are limited to responsive documents and/or files,
including deleted files, from 30 days prior to the subject incident until 30 days after the
subject incident. ''Responsive documents" include any and all forms of documents, files,
or electronically stored information (''EST''), including deleted and/or purged documents,
related to: methamphetamine possession, use and/or trafficking of methamphetamine,
including all references to the same by street names or slang, such as, but not limited to,
"meth", ''crystal", and "rock''; communications that Joshua Peterson had with witnesses
and/or potential witnesses, for purposes of the requests "witnesses and/or potential
witnesses'' is limited to the following: Megan Owens, Brandon Butler, the persons that
Brandon Butler testified that he visited in the early morning hours on August 30, 2014, any
other individuals that Joshua Peterson interacted with in relation to methamphetamine
trafficking, any other individuals that Joshua Peterson interacted with in relation to the
buying or selling of stolen goods, and any communications related to the subject incident.”
(Id.) (bolded type in original).
After this demand was made, plaintiff’s attorneys took the computer to a local computer store
in Minot to assist in responding to the requests without advising defendant’s counsel of their
intentions. The local computer store conducted an examination of the computer that resulted in
5
some information being recovered (apparently none of it helpful to defendants) and generated a
report of its findings relative to the individual requests as follows:
Request No. 1: No Viber program found on computer. No Viber history or records found on
computer. Looked for Viber program - not found. Scanned HD for Viber references - none
found. If software was on computer it may have been uninstalled/deleted.
Request No. 2: No messaging or communications programs, except email programs, found
on computer. Looked for messaging and communications programs - none found. If
programs were on computer they may have been uninstalled/deleted.
Request No. 3: Found Windows Mail and MS Outlook email programs on computer. Neither
program has any local email or email accounts. Windows Mail is currently configured to
access a web-based email account. Looked for email programs - found Win Mail and MS
Outlook. Looked for local mail repositories - none found. Outlook appears not to have been
used. Mail wants to use Microsoft to access web-based email account(s). May be able to use
computer to access web email.
Request No. 4: No third-party web-based email found on computer. All email for web-based
email accounts is stored on the web. Looked for locally stored email data from web-based
programs - none found. Neither Gmail or Yahoo store email on local computer.
Request No. 5: Web browsers found - Internet Explorer, Firefox, and Chrome. IE is set to
delete history after 20 days. Found browser history for Firefox - exported history to external
HD. Scanned HD for web browser history. Copied files found to external HD. Used history
viewer program to view browser history and export history in readable format for dates
needed to external HD.
Request No. 6: Exported pictures to external HD. Scanned HD for all image files for dates
needed. Copied all files to external HD. Looked at files - 90% of files are images from
program installation/usages. Deleted those files from external HD. Had to restore folders
from Windows Recycle Bin to look at files contained. Copied files from needed dates to
external HD. Returned files to Recycle Bin.
Request No. 7: No social media programs installed on computer. Any social media websites
would store on their servers not on local computer. Looked for social media programs none found. Almost all social media platforms (ie. Facebook) used on computers are
accessed through web browsers and keep data on their servers.
Request No. 8: Exported documents to external HD. Scanned HD for all document files for
dates needed. Copied all files to external HD. Had to restore folders from Windows Recycle
Bin to look at files contained. Copied files from needed dates to external HD. Returned files
to Recycle Bin.
6
Request No. 9: No data destruction programs found on computer. Looked for data
destruction programs • none found. If programs were on computer they may have been
uninstalled/deleted.
Request No. 10: Not able to find data. Have no software needed to provide this info.
(Doc. No. 69-3). Plaintiff’s counsel then furnished the report to defense counsel along with the
recovered electronic data. Plaintiff’s counsel also made a formal written response to the individual
requests stating that what information that could be retrieved during the proposed 60-day window
straddling the shooting incident was turned over and that the requests were in any event variously
vague, overbroad, unduly burdensome, not relevant, and/or not reasonably calculated to lead to the
discovery of relevant evidence.
Defendants have employed the services of a forensic computer expert who has provided an
affidavit stating that the search conducted by the local computer store was inadequate and may have
compromised the information that was existing at the time it conducted the search.1 Defendants in
their present motion ask the court to either order complete responses to the requests or, in the
1
Defendants’ counsel subsequently wrote plaintiff’s counsel a letter blaming them for purported “significant
spoilation” occurring as a result of the attempt to retrieve information made by the local computer store and failing to
address defendants’ proposal for the computer to be first imaged by plaintiff’s counsel and a copy of the image sent to
defendant’s counsel. Certainly, the better practice would have been for an image to have been made of the computer
by the local computer store and for it to have worked from that image. That being said, while the court is going to permit
a limited forensic examination, there is not at this point any definitive evidence there was any information relevant to
this case on the computer. Further, in this court’s view, the failure to reach a compromise on this matter that would have
avoided all of this rests upon both parties. If defense counsel had at any point (including going back to the issuance of
the Rule 45 subpoena requiring that the computer be produced at the Minot Police Department) put forth a proposal for
inspection that was compliant with what the federal rules permit, not based on inflated notions of relevancy and
proportionality, and that set forth a protocol for inspection that preserved privacy interests, the result may have different.
Likewise, if plaintiff’s counsel had engaged in some additional dialog with defense counsel prior to taking the computer
to the local computer store, it may have avoided that expense along with the present claims of spoilation, albeit as
speculative as they might be at this point. In this case, both parties would have benefitted from spending less time letter
writing and more time considering what the courts have concluded is reasonable as reflected by the cases cited later
herein.
7
alternative, that the computer be turned over to defendants’ expert for an intensive examination that
would include recovery of any deleted files to the extent the files may still be recoverable. But,
while defendants ask for relief in the alternative, it is clear that what they are really seeking is the
forensic examination by their expert given the impracticality of plaintiff being able to respond to the
requests as drafted.
II.
DISCUSSION
Generally speaking, Fed. R. Civ. P. 34 treats discovery of electronic documents in the same
manner as it treats discovery of paper documents. That is, the party seeking discovery of electronic
information on a device belonging to the other party is normally not entitled to production of all of
the electronic data on the device so that the party can rummage around looking for whatever the
party might believe to be useful—even if the time frame is limited. Rather, the party seeking
documentary evidence, whether it be in paper or in electronic format, must make specific requests
for the documents it wants to obtain that “describe with reasonable particularity each items or
category of items to be inspected” as required by Rule 34(b)(1)(A). Then, the party to whom the
requests are made has the obligation to search for and produce the documents that are responsive
and not subject to objection.
Not only is it clear from the text of Rule 34 that this is the normal course to be followed in
the production of electronic information, the Official Advisory Committee Notes to the 2006
Amendments to Rule 34 Subdivision (a), in relevant part, state:
Rule 34(a)(1) is also amended to make clear that parties may request an opportunity to test
or sample materials sought under the rule in addition to inspecting and copying them. That
8
opportunity may be important for both electronically stored information and hard-copy
materials. The current rule is not clear that such testing or sampling is authorized; the
amendment expressly permits it. As with any other form of discovery, issues of burden and
intrusiveness raised by requests to test or sample can be addressed under Rules 26(b)(2) and
26(c). Inspection or testing of certain types of electronically stored information or of a
responding party's electronic information system may raise issues of confidentiality or
privacy. The addition of testing and sampling to Rule 34(a) with regard to documents and
electronically stored information is not meant to create a routine right of direct access to a
party's electronic information system, although such access might be justified in some
circumstances. Courts should guard against undue intrusiveness resulting from inspecting
or testing such systems.
(italics added).
As an initial matter, it not clear from defendants’ predicate to its discovery requests whether
defendants are asking for all the electronic information for each of the specified requests, including
that related to the specific subject matters set forth in the predicate, or whether the requests seeking
information beyond mere technical data are limited to the specified subject matters. If it is the
former, the court agrees that defendants’ requests are objectionable because, among other things,
they seek all information, even if limited to a 60-day window, and not just that which would be
relevant to the case. Consequently, the court will assume it is the latter.
While not entirely clear, it appears that plaintiff’s attorneys voluntarily turned over any
information that was recovered from the computer by its local expert within the 60-day window,
even if it went beyond the subject matters specified in the predicate, while preserving in the formal
written responses their objections to the scope and breadth of what was being requested as well
objecting to any further examination. The question now is whether defendants are entitled to an
exhaustive forensic examination of the computer since, as already noted, plaintiff making a detailed
written response to the requests is not a realistic one.
9
The cases applying Rule 34 make clear that a party who is dissatisfied with Rule 34
discovery responses and seeks a forensic examination of a particular electronic device must (1) offer
something more than suspicion that the device contains material that is relevant, and (2) that the
forensic examination is proportional to the needs of the case in light of the factors set forth in Fed.
R. Civ. P. 26(b)(1), including the additional costs and burdens imposed by such an examination.
An often-cited case in this regard is the Sixth Circuit decision in John B. v. M.D. Goetz, Jr., 531
F.3d 448 (6th Cir.2008), where the court stated in relevant part:
To be sure, forensic imaging is not uncommon in the course of civil discovery. See
Balboa Threadworks, Inc. v. Stucky, No. 05–1157–JTM–DWB, 2006 WL 763668, at *3
(D.Kan. March 24, 2006). A party may choose on its own to preserve information through
forensic imaging, and district courts have, for various reasons, compelled the forensic
imaging and production of opposing parties' computers. See, e.g., Ameriwood Indus., Inc.
v. Liberman, No. 4:06CV524–DJS, 2006 WL 3825291, at *3–*6 (E.D.Mo. Dec.27, 2006),
amended by 2007 WL 685623 (E.D.Mo. Feb.23, 2007); Cenveo Corp. v. Slater, No.
06–CV–2632, 2007 WL 442387, at *1–*3 (E.D.Pa. Jan. 31, 2007); Frees, Inc. v. McMillian,
No. 05–1979, 2007 WL 184889, at *2 (W.D.La. Jan.22, 2007). Nevertheless, “[c]ourts have
been cautious in requiring the mirror imaging of computers where the request is extremely
broad in nature and the connection between the computers and the claims in the lawsuit are
unduly vague or unsubstantiated in nature.” Balboa Threadworks, 2006 WL 763668, at *3;
see also Balfour Beatty Rail, Inc. v. Vaccarello, No. 3:06–CV–551–J–20MCR, 2007 WL
169628, at *2–*3 (M.D.Fla. Jan.18, 2007); Diepenhorst v. City of Battle Creek, No.
1:05–CV–734, 2006 WL 1851243, at *2–*4 (W.D. Mich. June 30, 2006). As the Tenth
Circuit has noted, albeit in an unpublished opinion, mere skepticism that an opposing party
has not produced all relevant information is not sufficient to warrant drastic electronic
discovery measures. See McCurdy Group, LLC v. Am. Biomedical Group, Inc., 9 Fed.Appx.
822, 831 (10th Cir.2001). And the Sedona Principles urge general caution with respect to
forensic imaging in civil discovery:
Civil litigation should not be approached as if information systems were crime
scenes that justify forensic investigation at every opportunity to identify and
preserve every detail.... [M]aking forensic image backups of computers is only the
first step of an expensive, complex, and difficult process of data analysis that can
divert litigation into side issues and satellite disputes involving the interpretation of
potentially ambiguous forensic evidence.
The Sedona Principles, supra, at 34, 47. Thus, even if acceptable as a means to preserve
10
electronic evidence, compelled forensic imaging is not appropriate in all cases, and courts
must consider the significant interests implicated by forensic imaging before ordering such
procedures. Cf. Fed.R.Civ.P. 34(a) Advisory Committee Note (2006) (“Courts should guard
against undue intrusiveness resulting from inspecting or testing [electronic information]
systems.”).
Id. at 459–60. See also Tingle v. Herbert, Civ. No. 15-626, 2018 WL 1726667, at **6–8 (M.D. La.
April 10, 2018) (denying a request for forensic examination of a cell phone and email accounts
because it was based only on skepticism that discoverable information had not been produced, was
lacking in proportionality, and failed to address the inherent privacy concerns); East Bridge Lofts
Property Owners Association, Inc. v. Crum & Forster Specialty Insurance Company, No.
2:14-cv-2567, 2015 WL 12831731, at **2–3 (D.S.C. June 18, 2015) (concluding that a sufficient
showing had not been made that warranted, at that point, a forensic examination); John Crane
Group Corp. v. Energy Devices of Texas, Inc., No. 6:14-cv-178, 2015 WL 11089486, at *3 (E.D.
Tex. February 2, 2015) (observing that “[d]irect inspection of an opponent’s computers is generally
the exception rather than rule” and denying a request for a forensic examination of the opposing
party’s computers because mere skepticism that discovery responses were not complete was not
enough); NOLA Spice Designs, LLC v. Haydel Enterprises, No. 12-2515, 2013 WL 3974535, at
**1–4 (E.D. La. Aug. 2, 2013) (denying request for forensic examination of computers because a
sufficient threshold showing had not been made and the request lacked proportionality in relation
to the needs of the case).
Aside from technical data with respect to the computer, including whether files and programs
have been deleted, the content-based information that defendants appear to be seeking according to
the predicate—at least as best the court can understand it—appears to fall within one of the
11
following five categories:
1.
Information related to or evidencing methamphetamine possession, use, and/or
trafficking of methamphetamine, including all references to the same by street names
or slang, such as, but not limited to, “meth”, “crystal”, and “rock.”
2.
Communications that Joshua Peterson had with other individuals in relation to
methamphetamine.
3.
Communications that Joshua Peterson had with other individuals in relation to
buying and selling stolen goods.
4.
Communications that Joshua Peterson had with:
(a)
Megan Owens;
(b)
Brandon Butler; and
(c)
the persons that Brandon Butler testified that he visited in the early morning
hours on August 30, 2014.
5.
Communications with anyone about the subject incident.
The predicate further states it is limited to information that is within a 60-day window of thirty days
before the incident on August 30, 2014, and thirty days after.
With respect to the first two categories, the issue in this case is whether defendant Schmitt
used excessive force in firing at the vehicle driven by plaintiff, severely injuring him. While
plaintiff’s use of and dealing in drugs may be relevant to what he was doing at the time of the
incident and may also be relevant generally in terms of the scope of potential damages, his use and
12
dealing of drugs is only relevant up to a point. And, in reviewing plaintiff’s deposition, he has
admitted to: (1) consuming methamphetamine on an almost daily basis for a number of years prior
to the incident; (2) consuming methamphetamine throughout the day leading up to the incident; (3)
renewing his consumption of methamphetamine after treatment following the incident and
continuing to use it up to when he went to prison; and (4) dealing drugs (specifically
methamphetamine) on the day of the incident as well as before and after, including the fact this was
his only gainful employment. In short, defendants already have more information on the subject of
plaintiff’s drug use and drug dealing than the trial judge will likely allow to be admitted, particularly
after balancing Rule 403 concerns.2
Likewise, the same is true for the third category, which is communications plaintiff may have
had with others relating to the buying and selling of stolen goods. Plaintiff already admitted in his
deposition that he was in the process of burglarizing Minot Welding just prior to the shooting.
Except for any conversations plaintiff may have had with Butler about burglarizing Minot Welding
2
Defendants may contend that some of the requested information related to drugs and drug dealing may be
relevant in terms of being able to attack Butler’s account of the events. However, Butler admitted during his deposition
to being a regular user of methamphetamine and that he had been using it along with plaintiff over a number of hours
leading up to the incident, as well as personally consuming upwards of ten cans of beer. And, while he attempted to deny
in his deposition that he had ever been involved in dealing drugs, he acknowledged he pled guilty to possession of
methamphetamine on the day of the incident with the intent to deliver. He also admitted that he was the one who
purchased a certain quantity of methamphetamine on the day of the incident that in part he gave to plaintiff—which is
drug dealing. Further, the physical evidence retrieved following the incident included bags of drugs marked with the
prices that were recovered from Butler’s backpack. Finally, plaintiff has himself testified to the drug transaction that
he and Butler engaged in on the day of the incident and plaintiff’s ex-wife also testified she had been supplied drugs
by Butler. In short, this is not a drug conspiracy case; further details of the drug activity prior to the incident in terms
of additional sales and the persons involved are collateral to the issues of this case. And, to the extent Butler’s credibility
is an issue, there is already more evidence than what the court is likely to allow on that score. Further discovery on these
points is neither relevant nor proportional to the needs of the case.
13
prior to the incident, information about plaintiff buying and selling stolen goods is beside the point
with respect to this case.
With respect to the fourth category, defendants appear to seek all information pertaining to
conversations that plaintiff may have had with the persons specified. The requests here are
overbroad in that they encompass communications that have nothing to do with the case and any
relevant ones would be encompassed in the fifth category of information discussed next.
What may be of some relevance and not necessarily cumulative is what defendants seek in
the fifth category. This includes any communications plaintiff had with others about the shooting
incident and the events immediately associated with it, including the burglarizing of Minot Welding
and the attempted flight by plaintiff and Butler.
But, as already noted, relevancy alone is not enough. Defendants must demonstrate there
is a reasonable possibility amounting to more than surmise and conjecture that relevant and
responsive information may still exist on the computer, which plaintiff’s counsel were not able to
retrieve, and that a forensic examination is proportional to the needs of the case. With respect to the
fifth category, the court concludes there is enough to permit defendants to proceed with a forensic
examination, including the following:
C
The evidence that plaintiff used his computer for communicating with others before
and after the incident. And, while it appears that most of the communications were
likely from web-based platforms, there is the possibility that, for certain programs,
copies of the communications may have resided on the computer and may still be
14
recovered even though nominally deleted.
C
The evidence that one of the communication programs that plaintiff had used was
not on the computer when it was examined by the local computer store and which the
computer store stated could have been deleted.
C
The evidence that plaintiff discussed the events surrounding the incident after-thefact in person with Butler and likely others. Given that plaintiff was known to have
communicated by computer, it is not a reach to conclude there may also have been
similar communications using that medium.
C
Plaintiff has admitted to engaging in criminal conduct both on the day of the incident
as well as before and after. He also has admitted to carrying on several affairs with
other women. Given this, it is also not a stretch to conclude that he may have been
in the habit of deleting material from his computer (although, perhaps, not in a
sophisticated enough fashion to completely wipe it to the point where it becomes
irretrievable) and that this could have extended to the information that the court will
permit to be searched for.
C
Plaintiff’s ex-spouse admitted that she deleted some information from the computer
while it was in her possession following the incident and the extent to which she may
have done so is not certain.
C
Plaintiff contends he has no memory of what happened after he saw the police car
pull up outside of Minot Welding and his thinking to himself he needed to get out of
15
there. Plaintiff contends this lack of memory is due to the traumatic nature of the
shooting. However, while plaintiff’s account has a ring of authenticity—particularly
in view of everything else he has said and the fact that this puts him in the position
of personally not being able to dispute the accounts of the officers involved, plaintiff
has a demonstrated history of untruthfulness. The court cannot discount the
possibility of his having offered more detail about the incident in subsequent
communications with others.
In summary, while there is no reason to suggest that plaintiff’s counsel have withheld any
responsive information that they were able to retrieve with the help of their expert, defendants have
offered enough to demonstrate a reasonable possibility amounting to more than mere conjecture that
material that is now discoverable may have been on the computer and deleted prior to the computer
coming into the possession of plaintiff’s counsel.
The examination that the court will permit will be limited to a search for: (1) any
communications that plaintiff had with anyone about burglarizing Minot Welding during the period
from May 28 through May 30, 2014, and (2) any communications or documents that mention or
relate to the burglary of Minot Welding, the attempted flight by plaintiff and Butler, and the
shooting. With respect to the latter, the court will not impose a time limitation, since any
communications by plaintiff about the incident, even after the 30 days following the incident, may
be of some relevance.
While the court will order that plaintiff’s attorneys make the computer available to
16
defendant’s expert for further examination, it will not allow defendants’ attorneys free access to any
information that might be on the computer through the expert they have retained. Consequently, to
address the privacy concerns noted in the cases previously cited, the examination will be limited in
terms of content, and the protocol for the search and production of any responsive information shall
be as set forth in the court’s order below, which is on par with what this court and others have
ordered. See, e.g., Bellisle v. Landmark Medical Center, No. 14-266, 2015 WL 13672466, at *2
(D.R.I. Nov. 16, 2015) (ordering a similar protocol); Weatherford U.S., LP v. Innis, No. 4:09-cv061, 2011 WL 2174045, at * 5 (D.N.D. June 2, 2011) (adopting a similar protocol and citing
Ameriwood Indus., Inc. v. Liberman, No. 4:06CV524–DJS, 2006 WL 3825291, at **5-6 (E.D. Mo.
Dec. 27, 2006); Antioch Co. v. Scrapbook Border, Inc., 210 F.R.D. 645, 653–54 (D. Minn. 2002),
Simon Property Group L.P. v. mySimon, Inc., 194 F.R.D. 639, 643–44 (S. D. Ind. 2000), and
Playboy Enterprises. v. Welles, 60 F. Supp. 2d 1050, 1054–55 (S.D. Cal.1999)).
III.
ORDER
Based on the foregoing, defendants Motion to Compel (Doc. No. 67) is GRANTED IN
PART and DENIED IN PART, and the court ORDERS as follows:
1.
The court will permit a forensic examination of plaintiff’s laptop computer but
limited to the following:
a.
A search for (1) any communications that plaintiff had with anyone about any
attempts to commit theft or burglary of Minot Welding during the period from
August 28 through August 30, 2014, and (2) any communications or documents that
17
mention or relate to the burglary of Minot Welding, the attempted flight by plaintiff
and Butler from the scene, and the shooting.
b.
Electronic information relevant to when and how the foregoing information was
stored or deleted and how it was recovered.
2.
Plaintiff’s counsel shall ship at defendants’ expense the laptop computer to
defendants’ forensic expert. The risk of loss or physical damage to the computer shall at all times
be upon the defendants from the time it is turned over by plaintiff’s counsel to the shipping company
until it is returned to plaintiff’s counsel.
3.
The protocol for the search, retrieval, and production of any responsive information
shall be as follows:
a.
Defendants’ expert may image the computer for purposes of the examination and
may retain custody of the image, subject to the requirements of non-disclosure set
forth below, until a final non-appealable judgment has been entered in this case, at
which point the image must be destroyed.
b.
Except as provided below, defendants’ expert may not share any of the information
obtained from the examination with any person, including defendants’ counsel.
c.
Any documents or other responsive information that defendants’ expert retrieves
from the computer the contents of which appear to fall within the subject matters of
the search being permitted as set forth above shall be sent by the expert to plaintiff’s
counsel in a format that will enable them to review it. Plaintiff’s counsel will then
18
have twenty days to review and produce the information that falls withing the scope
of the subject matters delineated above. If plaintiff’s counsel believes the material
should not be produced because it either is not within what the court has ordered or
there is some other basis for objection, plaintiff’s counsel shall submit the withheld
material to the court for an in camera inspection and file a brief setting forth the
bases for not producing the information.
d.
Defendants’ expert may disclose to defendants’ attorneys whether any information
was turned over to plaintiff’s counsel (without disclosing the contents of the
information), where it came from, whether any of it came from data that was deleted,
and when the deletions took place. Also, defendants’ expert can communicate
whether any programs appear to have been deleted and, if so, when. If based on this
information as well as whatever might ultimately be produced by plaintiff’s counsel,
defendants’ counsel believes there are good reasons why they should be entitled to
more information, they can request a hearing on the matter.
e.
Prior to any shipment of the computer for examination, defendants’ attorneys must
file with the court a declaration by defendants’ expert in which he agrees not to
communicate the contents of any information that he has reviewed or retained to any
person(s), including defendants’ counsel, without a prior order of the court. The only
exceptions are the transmittal of any responsive information to plaintiff’s counsel as
well as the communication of certain non-content information to defendants’ counsel
19
as set forth above. The declaration must be sworn to under oath and shall contain a
statement that defendants’ expert submits himself to the jurisdiction of this court for
purposes of compliance with this court’s orders, including the court’s exercise of its
contempt power in the event of any noncompliance by the expert with this order or
any other order the court may issue involving the computer and the information
extracted from it.
f.
Defendants shall bear the cost of the forensic examination. Upon completion of the
examination, defendants’ expert shall promptly ship the computer back to plaintiff’s
counsel at defendants’ expense.
Dated this 17th day of October, 2018.
/s/ Charles S. Miller, Jr.
Charles S. Miller, Jr., Magistrate Judge
United States District Court
20
Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.
Why Is My Information Online?