Bow Tie Law

When HR Pros Go Bad: Spoliation & Personal Identifiable Information

A HR professional emailed to his home computer the personnel files of 68 employees when he feared layoffs were coming.  That is only the beginning of a really ugly fact pattern. The data included past and current employee names, social security numbers, date of births, compensation, and addresses.  The former employer[…]

Read more

Circular Form of Production Objections

In a form of production battle, the producing party claimed they were denied the opportunity to object to the form of production, because the requesting party did not state a form of production.  The Court did not need to use Pi to solve this circular argument. Procedural Circles After a motion[…]

Read more

It Takes the Cake: e-Discovery & Social Networking in Trademark Litigation

In a reverse confusion trademark infringement case, the Plaintiff made software named CakeBoss.  The Plaintiff had a website with the same name and registered their trademark. Masters Software, Inc. v. Discovery Communs., Inc., 2010 U.S. Dist. LEXIS 79584, at *1-3 (W.D. Wash. July 16, 2010). Tasting the Difference The Discovery[…]

Read more

How “Ridiculous” Productions Can Waive the Attorney-Client Privilege

The ridiculously high number of irrelevant materials and the large volume of privileged communications produced demonstrate a lack of reasonableness. Robert C. Chambers, United States District Court Judge Preparing electronic discovery takes careful review and following Judge Grimm’s Victor Stanley checklist.  That did not happen in this case. The Plaintiffs[…]

Read more

A Handshake Deal That Created Confidential Communications from a Work Computer

Shanahan v. Superior Court, is an unpublished California opinion that furthers the story of confidential communications sent from a business computer.  Shanahan v. Superior Court, 2010 Cal. App. Unpub. LEXIS 5756 (Cal. App. 2d Dist. July 21, 2010) Privacy at Work…Literally and Figuratively Privacy interests originating from electronically stored information created at[…]

Read more

Tech Savvy Judges and the Challenge of Jurors Conducting Online Research

Why would a juror’s online research be a “problem” for a criminal defendant? Because an “extrinsic influence on a jury’s deliberations violates a defendant’s Sixth Amendment rights to an impartial jury, to confront witnesses against him, and to be present at all critical stages of his trial.” United States v.[…]

Read more