Mobile Devices

No Sanctions for Failing to Preserve Cell Phone Records and Call Logs: eDiscovery Case Law

In Dotson, et al. v. Edmonson, et. al., No. 16-15371 (E.D. La. Jan. 22, 2018), Louisiana District Judge Susie Morgan denied the plaintiff’s motion in limine seeking sanctions for spoliation of evidence, finding that the plaintiff had “not met his burden of establishing that the Trooper Defendants had a duty to preserve” cell phone records and call logs from the evening of October 7, 2015 from Louisiana State Police (LSP) issued cell phones that were used that night by LSP officers during an undercover operation, or that their destruction of the evidence was intentional.

Case Background

In this case related to a civil suit over a drug bust involving the plaintiff, the defendants provided interrogatory responses deposition testimony which indicated that LSP troopers relied on their LSP-issued (or LSP-funded) cell phones to communicate during the course of operations in general, and specifically on the night of October 7, 2015.  The plaintiff asserted that this “establishes the existence of electronically stored information such as call logs and text messages on those cell phones” and argued that, as early as October 7, 2016, when the defendants were named in an article on nola.com and the case was filed, the defendants and the LSP were on notice that litigation was pending, and thus should have known that any ESI relating to the investigatory stop and arrest of the plaintiff was required to be preserved. Nonetheless, Defendants traded in their cell phones one month after Plaintiff filed his suit.

The plaintiff issued multiple discovery requests and subpoenas, and filed several motions to compel in efforts to obtain the call logs and text messages and develop an understanding of the officers’ movements and observations on the night of the arrest to no avail and claimed the loss of these records prejudiced his case, because the movements and communications among these officers were crucial to establishing whether reasonable suspicion existed to stop the plaintiff.  In response, the defendants argued that the plaintiff’s proposed remedy unfairly targeted Defendant Bodet (one of the Trooper Defendants), “as the Fifth Circuit makes clear that sanctions for spoliation should be taken against the alleged spoliator” and argued there is no evidence to suggest that Bodet acted in bad faith, or that he should have known of a need to preserve any electronically stored information on his phone.

Judge’s Ruling

Citing Rule 37(e), Judge Morgan stated: “The Plaintiff has not met his burden of establishing that the Trooper Defendants had a duty to preserve the electronically stored information related to the cell phone records from October 7, 2015 at the time the information was destroyed or that their destruction of the evidence was intentional. The Court will not provide the requested instruction to the jury based on an adverse inference.”

However, Judge Morgan excluded the Trooper Defendants from speculating at trial that they “may have” called a particular trooper based on deposition testimony to the contrary.  She also stated that “the Court’s ruling does not preclude the Plaintiff from eliciting testimony regarding the loss of the cell phone records and text messages”, nor did it prohibit questioning “regarding the cell phone record preservation policies of the Louisiana State Police, as such testimony is relevant and its relevance is not outweighed by the risk of undue prejudice.”

So, what do you think?  Should the defendants have received some sanctions?  Please share any comments you might have or if you’d like to know more about a particular topic.

Case opinion link courtesy of eDiscovery Assistant.

Sponsor: This blog is sponsored by CloudNine, which is a data and legal discovery technology company with proven expertise in simplifying and automating the discovery of data for audits, investigations, and litigation. Used by legal and business customers worldwide including more than 50 of the top 250 Am Law firms and many of the world’s leading corporations, CloudNine’s eDiscovery automation software and services help customers gain insight and intelligence on electronic data.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine. eDiscovery Daily is made available by CloudNine solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscovery Daily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

Befuddled by BYOD? The Sedona Conference Has a New Set of Principles to Guide You: eDiscovery Best Practices

Many organizations are permitting (or even encouraging) their employees to use their own personal devices to access, create, and manage company related information – a practice commonly referred to as Bring Your Own Device (BYOD).  But, how can those organizations effectively manage those BYOD devices to meet their discovery obligations?  To help with that issue, The Sedona Conference® (TSC) has published an initial Public Comment Version of a Commentary to help.

In late January, TSC and its Working Group 1 on Electronic Document Retention and Production (WG1) rolled out the Public Comment version of its Commentary on BYOD: Principles and Guidance for Developing Policies and Meeting Discovery Obligations.  The Commentary is designed to help organizations develop and implement workable – and legally defensible – BYOD policies and practices. This Commentary also addresses how creating and storing an organization’s information on devices owned by employees impacts the organization’s discovery obligations.  It focuses specifically to mobile devices that employees “bring” to the workplace (not on other “BYO” type programs) and does not specifically address programs where the employer provides the mobile device.

The Commentary begins with five principles related to the use of BYOD programs and continues with commentary for each.  Here are the five principles:

  • Principle 1: Organizations should consider their business needs and objectives, their legal rights and obligations, and the rights and expectations of their employees when deciding whether to allow, or even require, BYOD.
  • Principle 2: An organization’s BYOD program should help achieve its business objectives while also protecting both business and personal information from unauthorized access, disclosure, and use.
  • Principle 3: Employee-owned devices that contain unique, relevant ESI should be considered sources for discovery.
  • Principle 4: An organization’s BYOD policy and practices should minimize the storage of––and facilitate the preservation and collection of––unique, relevant ESI from BYOD devices.
  • Principle 5: Employee-owned devices that do not contain unique, relevant ESI need not be considered sources for discovery.

The Commentary weighs in at a tidy 40 page PDF file, which includes a couple of appendices.  So, it’s a fairly light read, at least by TSC standards.  :o)

TSC is encouraging public comment on the Commentary on BYOD, which can be downloaded free from their website here (whether you’re a TSC member or not). They encourage Working Group Series members and others to spread the word and share the link (you’re welcome!) so they can get comments in before the public comment period closes on March 26. Questions and comments may be sent to comments@sedonaconference.org.  So, you have a chance to be heard!

Speaking of mobile devices, I’m excited to be speaking this year for the first time at the University of Florida Law E-Discovery Conference on March 29.  I’m on a panel discussion in a session titled Getting Critical Information From The Tough Locations – Cloud, IOT, Social Media, And Smartphones! with Craig Ball, Kelly Twigger, and with The Honorable Amanda Arnold Sansone, Magistrate Judge in Florida, moderating.  As always, the conference will be conducted in Gainesville, FL (as well as being livestreamed), with CLE-accredited sessions all day from 8am to 5:30pm ET, with an all-star collection of speakers.  I’ll have more to say about the conference as we get closer to it.  Click here to register!

So, what do you think?  Does your organization have a BYOD policy?  Please share any comments you might have or if you’d like to know more about a particular topic.

Sponsor: This blog is sponsored by CloudNine, which is a data and legal discovery technology company with proven expertise in simplifying and automating the discovery of data for audits, investigations, and litigation. Used by legal and business customers worldwide including more than 50 of the top 250 Am Law firms and many of the world’s leading corporations, CloudNine’s eDiscovery automation software and services help customers gain insight and intelligence on electronic data.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine. eDiscovery Daily is made available by CloudNine solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscovery Daily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

Wife’s Fitbit Leads to Murder Arrest for the Husband: eDiscovery Trends

At both the Master’s Conference session that I moderated in San Francisco on Tuesday and the webcast that I conducted yesterday, the topic of discovery from IoT (Internet of Things) devices came up.  This story illustrates how discovery from IoT devices is becoming more and more important, especially in criminal cases.

According to an article in Business Insider, data from a murdered woman’s Fitbit led Connecticut police to arrest her husband in connection with the death.  After more than a year of investigations, the Hartford police charged Richard Dabate with his wife’s murder, tampering with physical evidence, and making false statements to the police after her Fitbit showed she was still walking around an hour after he claimed she was murdered by an intruder.

In December 2015, Connie Dabate was shot in her home with a .357 Magnum that her husband, Richard, had bought a few months before.  Dabate stated that, after getting a house alarm notification on his phone, he got back around 9 a.m. when he spotted an intruder, he said: a 6’2” man with a stocky build wearing a “camouflaged suit with a mask.”  Dabate said that, at about that time, he heard his wife come home and yelled for her to run, but the intruder shot her to death after a short struggle.  Dabate also said that the intruder tied him to a chair and began burning him with a torch, but he struggled with the intruder, eventually getting the torch from the intruder and causing him to flee.

Cops brought in K-9’s to pick up the scent of an intruder, but they could only pick up Dabate’s scent.  With no other evidence regarding an intruder, cops eventually obtained search warrants for Connie Dabate’s Fitbit, both of their cell phones, computers and house alarm logs.

According to an article in CNN, this timeline of activities conflicted with the story that Dabate told the police:

  • At 9:01 a.m. Richard Dabate logged into Outlook from an IP address assigned to the internet at the house.
  • At 9:04 a.m., Dabate sent his supervisor an e-mail saying an alarm had gone off at his house and he’s got to go back and check on it.
  • Connie’s Fitbit registered movement at 9:23 a.m., the same time the garage door opened into the kitchen.
  • Connie Dabate was active on Facebook between 9:40 and 9:46 a.m., posting videos to her page with her iPhone. She was utilizing the IP address at their house.
  • While she was at home, her Fitbit recorded a distance of 1,217 feet between 9:18 a.m. and 10:05 a.m. when movement stops. If Richard Dabate’s claims were correct, detectives say the total distance it would take the victim to walk from her vehicle to the basement, where she died, would be no more than 125 feet.

Dabate later admitted to having an extramarital affair where he impregnated a woman.  Oh, and five days after the incident, Dabate also attempted to make a claim for his wife’s life insurance policy for $475,000, police said.  He is due to appear in court today.

It seems IoT devices are becoming more and more important to criminal investigations.  It seems like only a matter of time before that becomes the case for civil litigations as well.

So, what do you think?  Have you been involved in any cases where data from IoT devices was at issue?  Please share any comments you might have or if you’d like to know more about a particular topic.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine. eDiscovery Daily is made available by CloudNine solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscovery Daily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

Craig Ball Says That Failure to Preserve Mobile Devices in Litigation is the “M” Word: eDiscovery Best Practices

In the latest post in his excellent Ball in Your Court blog, Craig Ball has some strong words for attorneys who fail to advise clients to preserve ESI from mobile devices when under a preservation duty.

In the post titled A New Paradigm in Mobile Device Preservation, Craig discusses how prevalent the use of mobile devices have become in our society, noting that “[d]riving under the influence of phones has eclipsed driving under the influence of alcohol as the most frequent cause of motor vehicle collisions” and that “[w]alking into fixed objects while texting is reportedly the most common reason young people visit emergency rooms today”.

As someone who never goes anywhere without my iPhone and a parent of two pre-teen kids for whom we have to set limits on their devices (for fear that they will literally spend the entire day on them), I can certainly relate to our level of addiction to our mobile devices in today’s society.

Because of that change, Craig issues a very strong statement when it comes to an attorney’s duty to advise clients to preserve ESI from these devices now:

“Today, if you fail to advise clients to preserve relevant and unique mobile data when under a preservation duty, you’re committing malpractice.”

That’s the “M” word that I referred to in the title of this post and Craig says he doesn’t use it lightly.

Craig identifies the fact that data on phones and tablets is not just a copy of ESI on other sources anymore and the increasing ease to perform a backup of data on your mobile device as two paradigm shifts that impact the requirement for mobile device preservation.  Today, it’s unique data without an unusual burden required to preserve that data.

Our coverage yesterday of this case where the judge recommended dismissal of the case after the plaintiff erased and reset her iPhone – 6 hours before turning it over to her attorney to be sent for forensic examination (naturally, she claimed not to know what happened) illustrates what can happen when mobile devices aren’t preserved.  Sadly, I expect we will see more cases like this in the future.

So, what do you think?  Is failure to advise clients to preserve ESI from mobile devices malpractice?  As always, please share any comments you might have with us or let us know if you’d like to know more about a particular topic.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine. eDiscovery Daily is made available by CloudNine solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscovery Daily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.