Armour et al v. Wilson et al

Filing 81

STIPULATED ORDER by Judge Richard A Jones. The court GRANTS the parties' 80 stipulated motion for an order governing the examination of certain electronic evidence. (CL)

Download PDF
The Honorable Richard A. Jones 1 2 3 4 5 UNITED STATES DISTRICT COURT WESTERN DISTRICT OF WASHINGTON AT SEATTLE 6 7 8 PAUL ARMOUR, et al., 9 10 11 Case No. 2:12-cv-00851 RAJ Plaintiffs, ORDER ON STIPULATED MOTION OUTLINING COMPUTER AND EMAIL EXAMINATION PROTOCOLS AND PROTECTIONS v. REBECCA WILSON, et al., Defendants. 12 13 The court GRANTS the parties’ stipulated motion (Dkt. # 80) for an order governing the 14 15 examination of certain electronic evidence. The remainder of this order reproduces the parties’ proposed order. 16 COMES NOW, the Parties, by and through undersigned counsel, and stipulate to the 17 below protocols and protections as applied to the examination of the parties computers and 18 emails, and respectfully requests that the Court enter the following order. 19 ORDER 20 21 22 23 24 25 THIS MATTER having come before the above captioned Court on the stipulation of the parties, hereby orders the following protocols and protections for the examination of the parties’ computers and emails: I. Data Necessary for Evaluating Forensic Images The parties require copies of all images and emails created by their respective experts to conduct a forensic examination according to the below protocols. The parties will also require ORDER OUTLINING COMPUTER AND EMAIL EXAMINATION PROTOCOLS AND PROTECTIONS -1 LAW OFFICES OF COSTELLO & ASSOCIATES, PLLC 1000 SECOND AVENUE, SUITE 1780 SEATTLE, WA 98104-2203 (206)749-5020 1 copies of the acquisition forms, prepared contemporaneously with imaging the hard drives, 2 which should include: (1) Make, model, serial number and service tag (if available) of computer 3 as well as the Windows COA including the operating system and product key; and (2) Make, 4 model, serial number and size of the hard drives. If this information is not contained in the 5 6 7 8 acquisition forms, identification of the image file names should be matched up with the hard drives and computers. II. Method of Searching Data A. Computer Images All searches are restricted to the time period from November 1, 2011 through May 23, 9 2012. The images will be loaded into a computer forensic program called EnCase and may also 10 11 12 be loaded into computer forensic programs called X-Ways Forensics and/or AccessData’s Forensic Toolkit. Any hard drives that contain an Apple operating system may also be loaded into a program called MacForensics Lab. The downloaded emails may be loaded into one of the 13 above programs or into another program called Proof Finder. For the hard drives, the parties will 14 identify the user profiles, the type and installation of the operating system, all software installed 15 on the computer and all hardware and networking devices. 16 17 B. Internet Activity The experts may run a program called Internet Evidence Finder against all of the hard 18 drives. This program is designed to extract fragments of web-based email communications and 19 other internet activity. The parties will also review the computers to determine if any of them 20 were used to access the Armour and Chase Comcast email accounts, or the lindaflagery email 21 account. This search will also include IP address history for each computer, any logs 22 23 24 demonstrating text messages synchronized with the computer, internet logs, wireless logs for computer, logs demonstrating the receipt of eBlaster reports, and logs of any backups or alterations of the computers during the relevant time frame. 25 ORDER OUTLINING COMPUTER AND EMAIL EXAMINATION PROTOCOLS AND PROTECTIONS -2 LAW OFFICES OF COSTELLO & ASSOCIATES, PLLC 1000 SECOND AVENUE, SUITE 1780 SEATTLE, WA 98104-2203 (206)749-5020 C. Keyword Searches 1 The experts will search the hard drives and the emails for a series of specific keywords or 2 3 keyword combinations. Depending on the results of the keyword searches, additional discussions may need to take place between the parties to modify or enhance these keywords. 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 General Keywords lindaflagery@hotmail.com bard@abhc.com paularmour@comcast.net karilynnc@comcast.net Linda Patterson Eblaster Spector Pro Equifax Experian ConsumerInfo.com FreeCreditScore.com ProtectMyID.com Experian.com TD Ameritrade WHPS (case sensitive) ABHC MyCharts Swedish *2335 1-6LYIW6A Kari (in connection with other search terms) Chase (in connection with other search terms) Paul (in connection with other search terms) Armour (in connection with other search terms) physical therapist relapse illegal drugs steroids rjkarmour@aol.com rebeccajwilson@comcast.net lindazumwinkle@hotmail.com 98.203.252.75 JoshPArmour@aol.com Joshparmour 206.188.36.191 25 ORDER OUTLINING COMPUTER AND EMAIL EXAMINATION PROTOCOLS AND PROTECTIONS -3 LAW OFFICES OF COSTELLO & ASSOCIATES, PLLC 1000 SECOND AVENUE, SUITE 1780 SEATTLE, WA 98104-2203 (206)749-5020 1 2 D. Activity on Specific Dates. All searches are restricted to the time period from November 1, 2011 through May 23, 3 2012. However, the experts will be allowed to conduct an in depth search of email and computer 4 activity logs for the dates February 16, 2012 and March 9, 2012 through April 9, 2012. 5 6 7 8 E. Examination of Preservation Process. If the review of the forensic images gives rise to a dispute about the completeness of the image or the process by which the technicians prepared them, the parties will meet and confer about that dispute. If they are unable to resolve the dispute, they will contact the court’s in-court deputy clerk to discuss either filing a motion or holding a status conference to resolve the 9 dispute. If necessary, the parties will make their expert’s available for depositions and provide all 10 additional documentation the parties are entitled to under FRCP 26. 11 F. Protocol for Expert Communications. 12 The parties have agreed to the following process for facilitating expert communication 13 14 15 and avoiding any further miscommunications: (1) All communications between our experts needs to be in writing; (2) If communications are by email, counsel for all parties will need to be cc’ed; (3) If oral communication is necessary and cannot be avoided, the conversations need to 16 be immediately preserved in writing, submitted to all parties, with all parties given a reasonable 17 amount of time to respond before any action is taken by the experts; and (4) Meetings between 18 the experts will need to occur with counsel for both parties present. 19 G. Protocol for the Exchange of Computer Images 20 Plaintiffs' expert will provide a copy or the original of the image for the Macbook Pro to 21 defendants' expert and defendants' expert will provide copies or the original of all the hard drive 22 images and emails it has created to plaintiffs' expert. The images should be shipped overnight 23 through a carrier that provides a tracking number or other method of verifying delivery. The 24 experts should ship the copies of the images within 24 hours of receiving authorization. 25 ORDER OUTLINING COMPUTER AND EMAIL EXAMINATION PROTOCOLS AND PROTECTIONS -4 LAW OFFICES OF COSTELLO & ASSOCIATES, PLLC 1000 SECOND AVENUE, SUITE 1780 SEATTLE, WA 98104-2203 (206)749-5020 On April 15, 2013 the parties shall return all originals and copies of the computer images 1 2 to the originating expert. Any extension of this deadline will need to be agreed to by the parties 3 or ordered by the Court in advance of this date. Once returned, the experts shall retain copies of 4 these images until 90 Days of the resolution of this matter or otherwise ordered by the Court or 5 6 agreed to by the parties. III. Protective Order The computer images for the Plaintiffs’ MacBook Pro will remain in the exclusive 7 custody of the Plaintiffs’ expert at all times that it is not being reviewed by the Defendants’ 8 expert. At the end of Defendants’ examination, the original and all copies shall be returned to the 9 10 11 12 13 Plaintiffs’ expert. All other computers images will remain in the exclusive custody of the Defendant’s expert at all times that it is not being reviewed by Plaintiffs’ expert. At the end of Plaintiffs’ examination the original and all copies shall be returned to the Defendants’ expert. The results and fruits of any of the above examinations are deemed protected material. 14 Possession of protected material is limited to the attorneys of record in the above captioned case 15 and their experts. The counsel and their experts may not share or review the protected material in 16 any manner with any other person, including their respective clients. 17 The data resulting from the search of the computer hard drives will be forwarded to the 18 attorney for the computer owner for review. No data will be provided to opposing counsel until 19 it has been reviewed and released by the computer owner or its representative. An index of the 20 21 22 data that was forwarded to counsel for the owner will be included with the data. This index will include the file name, the date created and the file size if available. Not all data that is produced will necessarily be in the form of a file so in those situations the type of data available will be identified on the index (e.g., spreadsheet of Internet activity). The computer owner or its 23 representative will identify on the index the data that should be not produced and the basis for 24 withholding the data, and the rest will be provided to counsel requesting the data, along with the 25 index showing the information that was withheld. ORDER OUTLINING COMPUTER AND EMAIL EXAMINATION PROTOCOLS AND PROTECTIONS -5 LAW OFFICES OF COSTELLO & ASSOCIATES, PLLC 1000 SECOND AVENUE, SUITE 1780 SEATTLE, WA 98104-2203 (206)749-5020 Parties reserve the right to object to withholding of any data, and counsel for the parties 1 2 shall cooperate on procedures to resolve disputes about withheld data from the search terms 3 while preventing dissemination of the documents outside of counsel and experts. If the parties 4 cannot resolve a dispute as to the production of withheld data, then the withheld data may be 5 submitted for in camera review by the court as to its whether it must be disclosed. This order does not prevent counsel from discussing the contents of documents 6 containing personal information with their respective clients or witnesses, as long as counsel 7 does not share the documents or any personal information (dates of birth, social security numbers 8 and other contact information) with the Defendants or their respective witnesses. Counsel and 9 their experts shall keep any protected material secured whenever the protected material is not 10 11 12 being used in furtherance of their work in the above captioned matter. The parties may aid their counsel in the review of contents of their own email accounts only, so long as counsel takes appropriate steps to prevent disclosure of any other data to the parties. 13 14 The results and fruits of any of the above examination may only be used in the above captioned proceedings. They may not be used in any other State or Federal Court proceeding. 15 16 Any confidential communications between the parties and their attorneys (in this or any other matter) or their spouses will not be disclosed to the parties or their counsel. The parties will file all evidence obtained in their examinations with the Court under seal. 17 18 19 20 21 22 Any motion to seal evidence will be made without prejudice to either party. IV. Examination of Plaintiffs MacBook. The parties may examine the Plaintiffs’ MacBook image for evidence that it was used to access Defendants’ AOL account “rjkarmour@aol.com” in April of 2012 and for reference to the eBlaster program. Plaintiffs reserve their right to object to the evidence sought herein as unrelated to any claims and defenses pending in this case, but agree to the search under general 23 discovery. This search will consist of the following keywords: 24 25 ORDER OUTLINING COMPUTER AND EMAIL EXAMINATION PROTOCOLS AND PROTECTIONS -6 LAW OFFICES OF COSTELLO & ASSOCIATES, PLLC 1000 SECOND AVENUE, SUITE 1780 SEATTLE, WA 98104-2203 (206)749-5020 1 MacBook Keywords 69.50.219.44 10.104.8.97 Steen Freshstart Eblaster spectorsoft AOL* rjkarmour@aol.com 2 3 4 5 6 7 8 9 This search shall be limited to the registry and other activity logs and the IP and internet address history of the MacBook. This search shall not include the substance of communications, 10 private, privileged or otherwise. The results of these searches will be disclosed to both parties 11 with all other protections noted above in section III applying. 12 13 Any other searches and examinations of the MacBook by the parties’ experts must be within the protocols of section II and under the full protections applied in section III, including disclosure of all search results to Plaintiffs’ counsel for review and objections prior to disclosure 14 to Defendants’ counsel. 15 16 DATED THIS 27th day of March, 2013. 18 A 19 The Honorable Richard A. Jones United States District Court Judge 17 20 21 22 23 24 25 STIPULATED AND AGREED TO: COSTELLO LAW FIRM OLYMPIC LAW GROUP, PLLP S/ Kristine A. Costello, WSBA #20934 S/Jacob Lewis, WSBA #41856 Attorney for Rebecca Wilson & Ward Wilson Costello Law Firm, PLLC 1000 Second Ave, Suite 1780 Seattle, WA 98104 Telephone: (206) 749-5020 Fax: (206) 749-5074 /s/ Anthony David Gipe Anthony David Gipe, WSBA No. 30491 Dennis J. McGlothin, WSBA No. 28177 ORDER OUTLINING COMPUTER AND EMAIL EXAMINATION PROTOCOLS AND PROTECTIONS -7 LAW OFFICES OF COSTELLO & ASSOCIATES, PLLC 1000 SECOND AVENUE, SUITE 1780 SEATTLE, WA 98104-2203 (206)749-5020

Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.


Why Is My Information Online?