-
[Cite as Fasteners For Retail, Inc. v. DeJohn,
2014-Ohio-1729.] Court of Appeals of Ohio EIGHTH APPELLATE DISTRICT COUNTY OF CUYAHOGA JOURNAL ENTRY AND OPINION No. 100333 FASTENERS FOR RETAIL, INC. PLAINTIFF-APPELLEE vs. MICHAEL A. DEJOHN, ET AL. DEFENDANTS-APPELLANTS JUDGMENT: REVERSED AND REMANDED Civil Appeal from the Cuyahoga County Court of Common Pleas Case No. CV-12-786894 BEFORE: Kilbane, J., Keough, P.J., and McCormack, J. RELEASED AND JOURNALIZED: April 24, 2014 ATTORNEY FOR APPELLANTS John F. Burke Burkes Law, L.L.C. 614 West Superior Ave. Rockefeller Bldg., Suite 1500 Cleveland, Ohio 44113 ATTORNEYS FOR APPELLEE Charna E. Sherman Charna E. Sherman Law Offices 5310 Key Tower 127 Public Square Cleveland, Ohio 44114 F. Benjamin Riek, III Emershaw, Mushkat & Schneier 120 E. Mill Street, Suite 437 Akron, Ohio 44308 MARY EILEEN KILBANE, J.: {¶1} In this appeal, defendants-appellants, Michael DeJohn (“DeJohn”) and Daniel Kump (“Kump”),1 appeal from the trial court’s order compelling them to produce their computer hard drives for forensic imaging2 in litigation filed by plaintiff-appellee, Fasteners for Retail (“FFR”). {¶2} Having reviewed the record and the controlling case law, we reverse and remand the matter for further proceedings consistent with this opinion. {¶3} This appeal arises from a lawsuit filed by FFR in an unrelated matter in the United States District Court for the Northern District of Illinios. See Fasteners for Retail v. Anderson, N.D.Ill. No. 11 C 2164,
2011 U.S. Dist. LEXIS 124937(Oct. 28, 2011). FFR, a company engaged in selling products used in retail shelving displays, brought suit against K International (“KI”) and Gerald Andersen alleging patent infringement, false advertising, misappropriation of trade secrets, and other claims. KI filed a counterclaim, alleging false patent marking and other claims. During the course of the Illinois litigation, FFR learned that DeJohn, who had worked as FFR’s vice president in charge of sales until his termination on March 12, 2008, performed consulting work for KI. FFR also learned that Kump, who had worked as FFR’s vice president for new market 1 Thisappeal was previously consolidated with 8th Dist. Cuyahoga No. 100336, an appeal from the same discovery order filed by defendant Bruce Hrvatin (“Hrvatin”). On March 6, 2014, however, this court granted Hrvatin’s motion to dismiss his appeal. 2On September 10, 2013, this court determined that the discovery order is final and appealable under R.C. 2505.02(B)(4). development until his termination on October 24, 2009, also performed consulting work for KI. {¶4} Subsequently, on July 12, 2012, FFR filed suit against DeJohn and Kump in the Cuyahoga County Common Pleas Court. In relevant part, FFR alleged that DeJohn and Kump had breached the confidentiality and nondisclosure provisions of their employment agreements, misappropriated trade secrets, and engaged in unfair competition; Kump breached his noncompete agreements; and DeJohn tortiously interfered with Kump’s contract with FFR. DeJohn and Kump filed answers denying liability and also filed counterclaims asserting breach of contract, abuse of process, and unfair competition. {¶5} In October 2012, FFR sought discovery from defendants; however, defendants did not fully comply with FFR’s request. As a result, on December 7, 2012, FFR filed a motion to compel in which it complained that DeJohn and Kump filed incomplete responses to a number of interrogatories. In the motion, FFR stated that DeJohn and Kump objected to the discovery request because it was overbroad, indicated overall that they had no list of FFR customers, and argued that neither individual had disclosed FFR’s confidential information. {¶6} In response, DeJohn and Kump moved to strike the motion to compel because it was not signed by counsel. Defendants also asserted that the response “may exceed 20,000 names. Moreover, plaintiff is fully aware of its customers and this defendant has no documentation containing any such customers’ names.” In addition, on December 7, 2012, defendants filed their own motion to compel FFR to comply with discovery, seeking the nature of the confidential information they had allegedly disclosed to KI. In this motion, defendants complained that FFR had “failed to respond to nearly all of [their] interrogatories and had failed to produce a single document in response to the Request for Production of Documents.” {¶7} On December 26, 2012, FFR moved for a protective order governing use of confidential information and apprised the court that the parties “have failed to reach agreement on terms of a stipulated protective order creating a standstill in discovery.” {¶8} The same day, FFR also filed a motion for electronic discovery, asserting that the parties “have been unable to agree upon the parameters of discovery.” FFR proposed that defendants produce “any relevant computer hard drives and electronic media” for FFR’s review, and from that review a list of search terms would be derived. Upon completion of defendants’ discovery, FFR would “produce pursuant to a protective order a subset of documents concerning the information FFR contends constitutes Confidential Information.” In opposition, defendants asserted that it would be unfair to order defendants to provide discovery to FFR before FFR provided any discovery to defendants. Defendants complained that FFR had not provided them with discovery and that FFR had already received extensive electronic discovery in the Illinois litigation. {¶9} On March 26, 2013, the trial court granted defendants’ motion to compel discovery responses and also granted FFR’s motion to compel discovery and for sanctions. {¶10} On March 27, 2013, FFR filed an amended complaint with leave of court. In relevant part, this pleading added Hrvatin and KI as new party defendants and alleged that DeJohn, Kump, and Hrvatin breached their employment agreements, misappropriated trade secrets, and engaged in unfair competition; that DeJohn tortiously interfered with Kump’s employment; and that Kump and DeJohn fraudulently induced FFR to enter into severance agreements. {¶11} On May 31, 2013, following a pretrial, the trial court ordered, in relevant part, that FFR “produce 20 gigs of documents” “for attorney’s eyes only,” and identify those documents that would notify the defendants of the basis of their alleged disclosure of trade secrets. The trial court also ordered defendants to produce all outstanding discovery “for attorney’s eyes only.” {¶12} On July 9, 2013, FFR filed another motion to compel and for sanctions, complaining that Hrvatin had indicated in response to a motion for production of documents that “[t]here are no documents that satisfy this request,” and that documents FFR obtained in the Illinois litigation and Hrvatin’s other discovery responses refuted that contention. {¶13} On July 12, 2013, FFR filed a motion to compel defendants to comply with discovery and for production of their computer hard drives. FFR asserted that defendants have “engaged in knowingly evasive and even perjured testimony, and potentially even the spoliation of critical evidence.” In support of this motion, FFR asserted that there are “mounting signs” that “[d]efendants purposely destroyed relevant electronic information.” FFR asserted that DeJohn stated that he experienced computer problems that prevented him from retrieving all of his emails, and that Kump had the hard drive on one of his computers replaced one day before this matter was filed. FFR also asserted that DeJohn wrote “Hello men” on a number of emails with two recipients who are employees of FFR, but “FFR has received more of the chain,” thus suggesting that a larger email chain existed. FFR also submitted evidence that its expert, Mark Lanterman, had developed an electronic discovery protocol that has successfully been used by attorneys for years. {¶14} In opposition, defendants asserted that FFR should not be given unfettered access to their computers since FFR already had access to all of the email sent to FFR from its own servers, in addition to all of the information obtained in the Illinois litigation. Moreover, defendants argued, FFR had not shown that the defendants revealed any confidential information. {¶15} On August 8, 2013, FFR filed a motion for an extension of time to respond to defendants’ requests for discovery. The next day, on August 9, 2013, the trial court issued the following order: Defendants Kump, DeJohn, and Hrvatin are hereby ordered to produce electronic discovery and the computer hard drives by 9/3/13. All parties are to answer all interrogatories served on them by opposing counsel. {¶16} Defendants appealed from that order on August 30, 2013. On September 10, 2013, this court determined the order to be final and appealable under R.C. 2505.02(B)(4), and concluded in relevant part: To the extent the order requires disclosure of such matter, it determines the action with respect to a provisional remedy and prevents a judgment in appellant’s favor with respect to the discovery. Bennett v. Martin,
186 Ohio App.3d 412,
2009-Ohio-294, [
928 N.E.2d 763,] ¶ 35 [(10th Dist.)]. An appeal following a final judgment would not be an effective remedy for the disclosure of privileged and/or confidential information. {¶17} DeJohn and Kump assign the following errors for our review: I. The trial court erred because its order compels production of irrelevant, privileged and confidential information and imposes an undue burden on Appellants. II. The trial court erred in ordering forensic imaging of Appellants’ computer hard drives because Appellee failed to demonstrate what it must [do] to warrant that degree of intrusion, disruption, and invasion. III. The trial court erred in issuing the discovery order because it fails to include any protocols and procedures and because it fails to adequately protect Appellants’ privileged and confidential electronically-stored information. Standard of Review {¶18} Pursuant to Civ.R. 26(B)(1), the scope of discovery is as follows: [A]ny matter, not privileged, which is relevant to the subject matter involved in the pending action, whether it relates to the claim or defense of the party seeking discovery or to the claim or defense of any other party[.] {¶19} An appellate court reviews a claimed error relating to a discovery matter under an abuse of discretion standard. Lightbody v. Rust,
137 Ohio App.3d 658, 663,
739 N.E.2d 840(8th Dist.2000); Trangle v. Rojas,
150 Ohio App.3d 549,
2002-Ohio-6510,
782 N.E.2d 617(8th Dist.). {¶20} Further, if forensic imaging is imposed as a sanction under Civ.R. 37(B), it is likewise to be reviewed under an abuse of discretion standard. Bennett,
186 Ohio App.3d 412,
2009-Ohio-6195,
928 N.E.2d 763, ¶ 40. Order for Production of the Computer Hard Drives {¶21} In this matter, the trial court ordered defendants to produce their computer hard drives for discovery. Forensic imaging of a computer’s hard drive creates a mirror image that replicates bit for bit, sector for sector, all information on the hard drive, including embedded, residual, and deleted data.
Id.The Bennett court noted that courts are generally reluctant to compel such forensic imaging of a hard drive “largely due to the risk that the imaging will improperly expose privileged and confidential material contained on the hard drive.”
Id.For that reason, and in order to guard against undue intrusiveness to a party’s privacy and confidentiality, the Bennett court established a two-part procedure to determine whether forensic imaging is warranted, as opposed to other discovery procedures.
Id.First, the trial court must weigh the parties’ interests in obtaining the discovery against privacy concerns. Second, the trial court must set forth a protective protocol to ensure forensic imaging is not unduly intrusive. Id.; Nithiananthan v. Toirac, 12th Dist. Warren No. CA2011-09-098,
2012-Ohio-431, ¶ 9. 1. Weighing of Interests in Discovery Versus Privacy {¶22} In their first and second assignments of error, DeJohn and Kump assert that the trial court did not follow the first part of the procedure outlined in Bennett,
186 Ohio App.3d 412,
2009-Ohio-6195,
928 N.E.2d 763. Defendants argue that the trial court did not weigh FFR’s interests in obtaining discovery versus the defendants’ competing interests in privacy and confidentiality, and that the record did not establish the requisite background of noncompliance with discovery. {¶23} With regard to the first part of the procedure, the Bennett court began by cautioning against undue intrusiveness. Id. at ¶ 41. The court then observed that the plaintiff was forced to file numerous motions to compel, the defendants did not comply with the court’s orders to comply with discovery requests, the defendants were untruthful regarding what had and had not been produced, and the defendants had adopted a “lackadaisical and dilatory approach.” Id. at ¶ 42. {¶24} The Bennett court stated: Thus, before compelling forensic imaging, a court must weigh “the significant privacy and confidentiality concerns” inherent in imaging against the utility or necessity of the imaging. * * * In determining whether the particular circumstances justify forensic imaging, a court must consider whether the responding party has withheld requested information, whether the responding party is unable or unwilling to search for the requested information, and the extent to which the responding party has complied with discovery requests. * * * When a requesting party demonstrates either discrepancies in a response to a discovery request or the responding party’s failure to produce requested information, the scales tip in favor of compelling forensic imaging. (Citations omitted.) Id. at ¶ 41. See also Nithiananthan, 12th Dist. Warren No. CA2011-09-098,
2012-Ohio-431, at ¶ 9 (the party requesting forensic imaging must demonstrate a “background of noncompliance” with discovery under part one of the Bennett framework). {¶25} We also observe that federal courts are likewise “loathe to sanction intrusive examination of an opponent’s computer as a matter of course, or on the mere suspicion that the opponent may be withholding discoverable information. Such conduct is always a possibility in any case, but the courts have not allowed the requesting party to intrude upon the premises of the responding party just to address the bare possibility of discovery misconduct.” Scotts Co., L.L.C. v. Liberty Mut. Ins. Co., S.D.Ohio No. 3:06-CV-899,
2007 U.S. Dist. LEXIS 43005, at *4-5 (June 12, 2007), quoting Diepenhorst v. Battle Creek, W.D. Mich. No. 1:05-CV-734,
2006 U.S. Dist. LEXIS 48551, *10-11 (June 30, 2006). {¶26} In Bennett, the court outlined the following examples of situations where imaging was warranted: Playboy Enters. [v. Welles],
60 F.Supp.2d 1050, 1054 [(S.D.Cal. 1999)] (allowing access to party’s computer system on a finding of systematic deletion of relevant e-mails after litigation had commenced). See, e.g., Williams v. Mass. Mut. Life Ins. Co.,
226 F.R.D. 144, 146 (D.Mass. 2005) (denying motion to appoint computer forensic expert because moving party failed to present any “credible evidence that Defendants are unwilling to produce computer-generated documents”); Bethea v. Comcast,
218 F.R.D. 328, 329-30 (D.D.C. 2003) (denying motion to compel because, “[i]n the context of computer systems and computer records, inspection or seizure is not permitted unless the moving party can demonstrate that the documents they seek to compel do, in fact, exist and are being unlawfully withheld”); Simon Prop. Group L.P. v. Simon, Inc.,
194 F.R.D. 639, 641 (S.D.Ind. 2000) (allowing plaintiff to inspect defendant’s computer system because plaintiff demonstrated “troubling discrepancies with respect to defendant’s document production”); Ameriwood Indus., Inc. v. Liberman, Case No. 4:06CV524-DJS,
2006 U.S. Dist. LEXIS 93380,
2006 WL 3825291, *1 (E.D.Mo. Dec. 27, 2006) (unpublished) (granting motion to compel imaging of defendant’s hard drive because the court had “cause to question whether defendants have produced all responsive documents”); Balboa Threadworks, Inc. v. Stucky, Case No. 05-1157-JTM-DWB,
2006 U.S. Dist. LEXIS 29265,
2006 WL 763668, at *4 (D.Kan. Mar. 24, 2006) (unpublished) (permitting imaging of defendants’ computer where defendants’ representation that no responsive materials existed on computer was contradicted by their production of e-mail created on that computer). {¶27} Applying the first portion of the Bennett procedure, the court in Scott Process Sys. v. Mitchell, 5th Dist. Stark No. 2012CA00021,
2012-Ohio-5971, concluded that the trial court abused its discretion by permitting forensic imaging of electronic devices without first requiring the requesting party to show that there had been a background of noncompliance with discovery. Id. at ¶ 38. Accord Nithiananthan, 12th Dist. Warren No. CA2011-09-098,
2012-Ohio-431, at ¶ 9. The Scott Process Sys. court also concluded that the order for forensic imaging was erroneous where the requesting party failed to demonstrate that paper production of the records was insufficient or that the requesting party’s need for forensic imaging outweighed the party’s privacy interests. Id. at ¶ 37-38; see also Nithiananthan at ¶ 18. {¶28} In this matter, the record does not demonstrate the requisite showing of defendants’ noncompliance with discovery as mandated under the first portion of the Bennett procedure. The record demonstrates that FFR was noncompliant with defendants’ request for production of documents during the course of litigation. FFR also conceded that the parties “failed to reach agreement on terms of a stipulated protective order creating a standstill in discovery.” In addition, FFR sought detailed electronic discovery as early as October 2012, or prior to its filing of any motion to compel discovery. Moreover, under FFR’s proposal, defendants would produce “any relevant computer hard drives and electronic media” for FFR’s review, then upon defendants’ compliance, FFR would “produce pursuant to a protective order a subset of documents[.]” At this time, however, there is no evidence in the record that FFR has fully complied with discovery, and FFR has already received extensive records from the Illinois litigation. {¶29} We acknowledge that FFR sought and obtained a motion to compel discovery and for sanctions on March 26, 2013, but following that order, FFR filed an amended complaint with new allegations and obtained additional discovery on May 30, 2013. The record does not demonstrate that the documents FFR sought were being unlawfully withheld and not available from FFR’s own information or other sources. Viewing the record as a whole, the showing required under the first portion of the Bennett analysis has not been met. {¶30} Therefore, DeJohn and Kump’s first and second assignments of error are well taken. 2. Protective Protocol {¶31} DeJohn and Kump’s third assignment of error asserts that the trial court did not require the protocol for discovery required under the Bennett framework. {¶32} With regard to the second part of the procedure, the Bennett court clearly held that “the failure to produce discovery as requested or ordered will rarely warrant unfettered access to a party’s computer system,” and that “a court must protect the defendant’s confidential information, as well as preserve any private and privileged information.” Id.,
186 Ohio App.3d 412,
2009-Ohio-6195,
928 N.E.2d 763, at ¶ 47. The Bennett court then outlined a protocol for discovery: [A]n independent computer expert, subject to a confidentiality order, creates a forensic image of the computer system. The expert then retrieves any responsive files (including deleted files) from the forensic image, normally using search terms submitted by the plaintiff. The defendant’s counsel reviews the responsive files for privilege, creates a privilege log, and turns over the nonprivileged files and privilege log to the plaintiff. (Citations omitted.) Id. at ¶ 47. Similarly, in Nithiananthan, 12th Dist. Warren No. CA2011-09-098,
2012-Ohio-431, the court held that at minimum, an appropriate protocol requires that an independent computer expert, subject to a confidentiality order, creates a forensic image of the computer system. Id. at ¶ 20. The expert then retrieves any responsive files (including deleted files) from the forensic image, normally using search terms submitted by the plaintiff. The defendant’s counsel reviews the responsive files for privilege, creates a privilege log, and turns over the nonprivileged files and privilege log to the plaintiff. {¶33} Under the second portion of the Bennett procedure, a trial court abuses its discretion when its judgment entry permits unfettered forensic imaging of a party’s electronic devices, and contains none of the Bennett protections required to conduct such forensic analysis. Scott Process Sys., 5th Dist. Stark No. 2012CA00021,
2012-Ohio-5971, at ¶ 36. {¶34} In this matter, the record does not contain the protective protocol required under Bennett. Therefore, DeJohn and Kump’s third assignment of error is well taken. The trial court abused its discretion in ordering forensic imaging of appellants’ computer hard drives. {¶35} Accordingly, the judgment is reversed and remanded for further proceedings consistent with this opinion. It is ordered that appellants recover of said appellee costs herein taxed. The court finds there were reasonable grounds for this appeal. It is ordered that a special mandate issue out of this court directing the common pleas court to carry this judgment into execution. A certified copy of this entry shall constitute the mandate pursuant to Rule 27 of the Rules of Appellate Procedure. MARY EILEEN KILBANE, JUDGE KATHLEEN ANN KEOUGH, P.J., and TIM McCORMACK, J., CONCUR
Document Info
Docket Number: 100333
Citation Numbers: 2014 Ohio 1729
Judges: Kilbane
Filed Date: 4/24/2014
Precedential Status: Precedential
Modified Date: 10/30/2014