Fasteners For Retail, Inc. v. DeJohn , 2014 Ohio 1729 ( 2014 )


Menu:
  • [Cite as Fasteners For Retail, Inc. v. DeJohn, 
    2014-Ohio-1729
    .]
    Court of Appeals of Ohio
    EIGHTH APPELLATE DISTRICT
    COUNTY OF CUYAHOGA
    JOURNAL ENTRY AND OPINION
    No. 100333
    FASTENERS FOR RETAIL, INC.
    PLAINTIFF-APPELLEE
    vs.
    MICHAEL A. DEJOHN, ET AL.
    DEFENDANTS-APPELLANTS
    JUDGMENT:
    REVERSED AND REMANDED
    Civil Appeal from the
    Cuyahoga County Court of Common Pleas
    Case No. CV-12-786894
    BEFORE: Kilbane, J., Keough, P.J., and McCormack, J.
    RELEASED AND JOURNALIZED:                          April 24, 2014
    ATTORNEY FOR APPELLANTS
    John F. Burke
    Burkes Law, L.L.C.
    614 West Superior Ave.
    Rockefeller Bldg., Suite 1500
    Cleveland, Ohio 44113
    ATTORNEYS FOR APPELLEE
    Charna E. Sherman
    Charna E. Sherman Law Offices
    5310 Key Tower
    127 Public Square
    Cleveland, Ohio 44114
    F. Benjamin Riek, III
    Emershaw, Mushkat & Schneier
    120 E. Mill Street, Suite 437
    Akron, Ohio 44308
    MARY EILEEN KILBANE, J.:
    {¶1} In this appeal, defendants-appellants, Michael DeJohn (“DeJohn”) and
    Daniel Kump (“Kump”),1 appeal from the trial court’s order compelling them to produce
    their computer hard drives for forensic imaging2 in litigation filed by plaintiff-appellee,
    Fasteners for Retail (“FFR”).
    {¶2} Having reviewed the record and the controlling case law, we reverse and
    remand the matter for further proceedings consistent with this opinion.
    {¶3} This appeal arises from a lawsuit filed by FFR in an unrelated matter in the
    United States District Court for the Northern District of Illinios. See Fasteners for Retail
    v. Anderson, N.D.Ill. No. 11 C 2164, 
    2011 U.S. Dist. LEXIS 124937
     (Oct. 28, 2011).
    FFR, a company engaged in selling products used in retail shelving displays, brought suit
    against K International (“KI”) and Gerald Andersen alleging patent infringement, false
    advertising, misappropriation of trade secrets, and other claims. KI filed a counterclaim,
    alleging false patent marking and other claims.        During the course of the Illinois
    litigation, FFR learned that DeJohn, who had worked as FFR’s vice president in charge of
    sales until his termination on March 12, 2008, performed consulting work for KI. FFR
    also learned that Kump, who had worked as FFR’s vice president for new market
    1 Thisappeal was previously consolidated with 8th Dist. Cuyahoga No.
    100336, an appeal from the same discovery order filed by defendant Bruce Hrvatin
    (“Hrvatin”). On March 6, 2014, however, this court granted Hrvatin’s motion to
    dismiss his appeal.
    2On September 10, 2013, this court determined that the discovery order is
    final and appealable under R.C. 2505.02(B)(4).
    development until his termination on October 24, 2009, also performed consulting work
    for KI.
    {¶4} Subsequently, on July 12, 2012, FFR filed suit against DeJohn and Kump in
    the Cuyahoga County Common Pleas Court. In relevant part, FFR alleged that DeJohn
    and Kump had breached the confidentiality and nondisclosure provisions of their
    employment agreements, misappropriated trade secrets, and engaged in unfair
    competition; Kump breached his noncompete agreements; and DeJohn tortiously
    interfered with Kump’s contract with FFR. DeJohn and Kump filed answers denying
    liability and also filed counterclaims asserting breach of contract, abuse of process, and
    unfair competition.
    {¶5} In October 2012, FFR sought discovery from defendants; however,
    defendants did not fully comply with FFR’s request. As a result, on December 7, 2012,
    FFR filed a motion to compel in which it complained that DeJohn and Kump filed
    incomplete responses to a number of interrogatories. In the motion, FFR stated that
    DeJohn and Kump objected to the discovery request because it was overbroad, indicated
    overall that they had no list of FFR customers, and argued that neither individual had
    disclosed FFR’s confidential information.
    {¶6}   In response, DeJohn and Kump moved to strike the motion to compel
    because it was not signed by counsel. Defendants also asserted that the response “may
    exceed 20,000 names.       Moreover, plaintiff is fully aware of its customers and this
    defendant has no documentation containing any such customers’ names.” In addition, on
    December 7, 2012, defendants filed their own motion to compel FFR to comply with
    discovery, seeking the nature of the confidential information they had allegedly disclosed
    to KI. In this motion, defendants complained that FFR had “failed to respond to nearly
    all of [their] interrogatories and had failed to produce a single document in response to
    the Request for Production of Documents.”
    {¶7} On December 26, 2012, FFR moved for a protective order governing use of
    confidential information and apprised the court that the parties “have failed to reach
    agreement on terms of a stipulated protective order creating a standstill in discovery.”
    {¶8} The same day, FFR also filed a motion for electronic discovery, asserting
    that the parties “have been unable to agree upon the parameters of discovery.” FFR
    proposed that defendants produce “any relevant computer hard drives and electronic
    media” for FFR’s review, and from that review a list of search terms would be derived.
    Upon completion of defendants’ discovery, FFR would “produce pursuant to a protective
    order a subset of documents concerning the information FFR contends constitutes
    Confidential Information.” In opposition, defendants asserted that it would be unfair to
    order defendants to provide discovery to FFR before FFR provided any discovery to
    defendants. Defendants complained that FFR had not provided them with discovery and
    that FFR had already received extensive electronic discovery in the Illinois litigation.
    {¶9} On March 26, 2013, the trial court granted defendants’ motion to compel
    discovery responses and also granted FFR’s motion to compel discovery and for
    sanctions.
    {¶10} On March 27, 2013, FFR filed an amended complaint with leave of court.
    In relevant part, this pleading added Hrvatin and KI as new party defendants and alleged
    that   DeJohn,   Kump,     and    Hrvatin   breached    their   employment     agreements,
    misappropriated trade secrets, and engaged in unfair competition; that DeJohn tortiously
    interfered with Kump’s employment; and that Kump and DeJohn fraudulently induced
    FFR to enter into severance agreements.
    {¶11} On May 31, 2013, following a pretrial, the trial court ordered, in relevant
    part, that FFR “produce 20 gigs of documents” “for attorney’s eyes only,” and identify
    those documents that would notify the defendants of the basis of their alleged disclosure
    of trade secrets. The trial court also ordered defendants to produce all outstanding
    discovery “for attorney’s eyes only.”
    {¶12} On July 9, 2013, FFR filed another motion to compel and for sanctions,
    complaining that Hrvatin had indicated in response to a motion for production of
    documents that “[t]here are no documents that satisfy this request,” and that documents
    FFR obtained in the Illinois litigation and Hrvatin’s other discovery responses refuted that
    contention.
    {¶13} On July 12, 2013, FFR filed a motion to compel defendants to comply with
    discovery and for production of their computer hard drives.             FFR asserted that
    defendants have “engaged in knowingly evasive and even perjured testimony, and
    potentially even the spoliation of critical evidence.” In support of this motion, FFR
    asserted that there are “mounting signs” that “[d]efendants purposely destroyed relevant
    electronic information.” FFR asserted that DeJohn stated that he experienced computer
    problems that prevented him from retrieving all of his emails, and that Kump had the hard
    drive on one of his computers replaced one day before this matter was filed. FFR also
    asserted that DeJohn wrote “Hello men” on a number of emails with two recipients who
    are employees of FFR, but “FFR has received more of the chain,” thus suggesting that a
    larger email chain existed.     FFR also submitted evidence that its expert, Mark
    Lanterman, had developed an electronic discovery protocol that has successfully been
    used by attorneys for years.
    {¶14} In opposition, defendants asserted that FFR should not be given unfettered
    access to their computers since FFR already had access to all of the email sent to FFR
    from its own servers, in addition to all of the information obtained in the Illinois
    litigation.   Moreover, defendants argued, FFR had not shown that the defendants
    revealed any confidential information.
    {¶15} On August 8, 2013, FFR filed a motion for an extension of time to respond
    to defendants’ requests for discovery. The next day, on August 9, 2013, the trial court
    issued the following order:
    Defendants Kump, DeJohn, and Hrvatin are hereby ordered to produce
    electronic discovery and the computer hard drives by 9/3/13.
    All parties are to answer all interrogatories served on them by opposing
    counsel.
    {¶16} Defendants appealed from that order on August 30, 2013. On September
    10, 2013, this court determined the order to be final and appealable under R.C.
    2505.02(B)(4), and concluded in relevant part:
    To the extent the order requires disclosure of such matter, it determines the
    action with respect to a provisional remedy and prevents a judgment in
    appellant’s favor with respect to the discovery. Bennett v. Martin, 
    186 Ohio App.3d 412
    , 
    2009-Ohio-294
    , [
    928 N.E.2d 763
    ,] ¶ 35 [(10th Dist.)].
    An appeal following a final judgment would not be an effective remedy for
    the disclosure of privileged and/or confidential information.
    {¶17} DeJohn and Kump assign the following errors for our review:
    I. The trial court erred because its order compels production of irrelevant,
    privileged and confidential information and imposes an undue burden on
    Appellants.
    II. The trial court erred in ordering forensic imaging of Appellants’
    computer hard drives because Appellee failed to demonstrate what it must
    [do] to warrant that degree of intrusion, disruption, and invasion.
    III. The trial court erred in issuing the discovery order because it fails to
    include any protocols and procedures and because it fails to adequately
    protect Appellants’ privileged and confidential electronically-stored
    information.
    Standard of Review
    {¶18} Pursuant to Civ.R. 26(B)(1), the scope of discovery is as follows:
    [A]ny matter, not privileged, which is relevant to the subject matter
    involved in the pending action, whether it relates to the claim or defense of
    the party seeking discovery or to the claim or defense of any other party[.]
    {¶19} An appellate court reviews a claimed error relating to a discovery matter
    under an abuse of discretion standard. Lightbody v. Rust, 
    137 Ohio App.3d 658
    , 663,
    
    739 N.E.2d 840
     (8th Dist.2000); Trangle v. Rojas, 
    150 Ohio App.3d 549
    ,
    
    2002-Ohio-6510
    , 
    782 N.E.2d 617
     (8th Dist.).
    {¶20} Further, if forensic imaging is imposed as a sanction under Civ.R. 37(B), it
    is likewise to be reviewed under an abuse of discretion standard. Bennett, 
    186 Ohio App.3d 412
    , 
    2009-Ohio-6195
    , 
    928 N.E.2d 763
    , ¶ 40.
    Order for Production of the Computer Hard Drives
    {¶21} In this matter, the trial court ordered defendants to produce their computer
    hard drives for discovery. Forensic imaging of a computer’s hard drive creates a mirror
    image that replicates bit for bit, sector for sector, all information on the hard drive,
    including embedded, residual, and deleted data. 
    Id.
     The Bennett court noted that courts
    are generally reluctant to compel such forensic imaging of a hard drive “largely due to the
    risk that the imaging will improperly expose privileged and confidential material
    contained on the hard drive.” 
    Id.
     For that reason, and in order to guard against undue
    intrusiveness to a party’s privacy and confidentiality, the Bennett court established a
    two-part procedure to determine whether forensic imaging is warranted, as opposed to
    other discovery procedures. 
    Id.
     First, the trial court must weigh the parties’ interests in
    obtaining the discovery against privacy concerns. Second, the trial court must set forth a
    protective protocol to ensure forensic imaging is not unduly intrusive. Id.; Nithiananthan
    v. Toirac, 12th Dist. Warren No. CA2011-09-098, 
    2012-Ohio-431
    , ¶ 9.
    1. Weighing of Interests in Discovery Versus Privacy
    {¶22} In their first and second assignments of error, DeJohn and Kump assert
    that the trial court did not follow the first part of the procedure outlined in Bennett, 
    186 Ohio App.3d 412
    , 
    2009-Ohio-6195
    , 
    928 N.E.2d 763
    . Defendants argue that the trial
    court did not weigh FFR’s interests in obtaining discovery versus the defendants’
    competing interests in privacy and confidentiality, and that the record did not establish the
    requisite background of noncompliance with discovery.
    {¶23} With regard to the first part of the procedure, the Bennett court began by
    cautioning against undue intrusiveness. Id. at ¶ 41. The court then observed that the
    plaintiff was forced to file numerous motions to compel, the defendants did not comply
    with the court’s orders to comply with discovery requests, the defendants were untruthful
    regarding what had and had not been produced, and the defendants had adopted a
    “lackadaisical and dilatory approach.” Id. at ¶ 42.
    {¶24} The Bennett court stated:
    Thus, before compelling forensic imaging, a court must weigh “the
    significant privacy and confidentiality concerns” inherent in imaging
    against the utility or necessity of the imaging. * * * In determining
    whether the particular circumstances justify forensic imaging, a court must
    consider whether the responding party has withheld requested information,
    whether the responding party is unable or unwilling to search for the
    requested information, and the extent to which the responding party has
    complied with discovery requests. * * * When a requesting party
    demonstrates either discrepancies in a response to a discovery request or the
    responding party’s failure to produce requested information, the scales tip
    in favor of compelling forensic imaging.
    (Citations omitted.)   Id. at ¶ 41.    See also Nithiananthan, 12th Dist. Warren No.
    CA2011-09-098, 
    2012-Ohio-431
    , at ¶ 9 (the party requesting forensic imaging must
    demonstrate a “background of noncompliance” with discovery under part one of the
    Bennett framework).
    {¶25} We also observe that federal courts are likewise
    “loathe to sanction intrusive examination of an opponent’s computer as a
    matter of course, or on the mere suspicion that the opponent may be
    withholding discoverable information.         Such conduct is always a
    possibility in any case, but the courts have not allowed the requesting party
    to intrude upon the premises of the responding party just to address the bare
    possibility of discovery misconduct.”
    Scotts Co., L.L.C. v. Liberty Mut. Ins. Co., S.D.Ohio No. 3:06-CV-899, 
    2007 U.S. Dist. LEXIS 43005
    , at *4-5 (June 12, 2007), quoting Diepenhorst v. Battle Creek, W.D. Mich.
    No. 1:05-CV-734, 
    2006 U.S. Dist. LEXIS 48551
    , *10-11 (June 30, 2006).
    {¶26} In Bennett, the court outlined the following examples of situations where
    imaging was warranted:
    Playboy Enters. [v. Welles], 
    60 F.Supp.2d 1050
    , 1054 [(S.D.Cal. 1999)]
    (allowing access to party’s computer system on a finding of systematic
    deletion of relevant e-mails after litigation had commenced). See, e.g.,
    Williams v. Mass. Mut. Life Ins. Co., 
    226 F.R.D. 144
    , 146 (D.Mass. 2005)
    (denying motion to appoint computer forensic expert because moving party
    failed to present any “credible evidence that Defendants are unwilling to
    produce computer-generated documents”); Bethea v. Comcast, 
    218 F.R.D. 328
    , 329-30 (D.D.C. 2003) (denying motion to compel because, “[i]n the
    context of computer systems and computer records, inspection or seizure is
    not permitted unless the moving party can demonstrate that the documents
    they seek to compel do, in fact, exist and are being unlawfully withheld”);
    Simon Prop. Group L.P. v. Simon, Inc., 
    194 F.R.D. 639
    , 641 (S.D.Ind.
    2000) (allowing plaintiff to inspect defendant’s computer system because
    plaintiff demonstrated “troubling discrepancies with respect to defendant’s
    document production”); Ameriwood Indus., Inc. v. Liberman, Case No.
    4:06CV524-DJS, 
    2006 U.S. Dist. LEXIS 93380
    , 
    2006 WL 3825291
    , *1
    (E.D.Mo. Dec. 27, 2006) (unpublished) (granting motion to compel imaging
    of defendant’s hard drive because the court had “cause to question whether
    defendants     have   produced    all   responsive   documents”);    Balboa
    Threadworks, Inc. v. Stucky, Case No. 05-1157-JTM-DWB, 
    2006 U.S. Dist. LEXIS 29265
    , 
    2006 WL 763668
    , at *4 (D.Kan. Mar. 24, 2006)
    (unpublished) (permitting imaging of defendants’ computer where
    defendants’ representation that no responsive materials existed on computer
    was contradicted by their production of e-mail created on that computer).
    {¶27} Applying the first portion of the Bennett procedure, the court in Scott
    Process Sys. v. Mitchell, 5th Dist. Stark No. 2012CA00021, 
    2012-Ohio-5971
    , concluded
    that the trial court abused its discretion by permitting forensic imaging of electronic
    devices without first requiring the requesting party to show that there had been a
    background of noncompliance with discovery. Id. at ¶ 38. Accord Nithiananthan, 12th
    Dist. Warren No. CA2011-09-098, 
    2012-Ohio-431
    , at ¶ 9. The Scott Process Sys. court
    also concluded that the order for forensic imaging was erroneous where the requesting
    party failed to demonstrate that paper production of the records was insufficient or that
    the requesting party’s need for forensic imaging outweighed the party’s privacy interests.
    Id. at ¶ 37-38; see also Nithiananthan at ¶ 18.
    {¶28} In this matter, the record does not demonstrate the requisite showing of
    defendants’ noncompliance with discovery as mandated under the first portion of the
    Bennett procedure.     The record demonstrates that FFR was noncompliant with
    defendants’ request for production of documents during the course of litigation. FFR
    also conceded that the parties “failed to reach agreement on terms of a stipulated
    protective order creating a standstill in discovery.” In addition, FFR sought detailed
    electronic discovery as early as October 2012, or prior to its filing of any motion to
    compel discovery. Moreover, under FFR’s proposal, defendants would produce “any
    relevant computer hard drives and electronic media” for FFR’s review, then upon
    defendants’ compliance, FFR would “produce pursuant to a protective order a subset of
    documents[.]” At this time, however, there is no evidence in the record that FFR has
    fully complied with discovery, and FFR has already received extensive records from the
    Illinois litigation.
    {¶29}     We acknowledge that FFR sought and obtained a motion to compel
    discovery and for sanctions on March 26, 2013, but following that order, FFR filed an
    amended complaint with new allegations and obtained additional discovery on May 30,
    2013. The record does not demonstrate that the documents FFR sought were being
    unlawfully withheld and not available from FFR’s own information or other sources.
    Viewing the record as a whole, the showing required under the first portion of the Bennett
    analysis has not been met.
    {¶30} Therefore, DeJohn and Kump’s first and second assignments of error are
    well taken.
    2. Protective Protocol
    {¶31} DeJohn and Kump’s third assignment of error asserts that the trial court
    did not require the protocol for discovery required under the Bennett framework.
    {¶32} With regard to the second part of the procedure, the Bennett court clearly
    held that “the failure to produce discovery as requested or ordered will rarely warrant
    unfettered access to a party’s computer system,” and that “a court must protect the
    defendant’s confidential information, as well as preserve any private and privileged
    information.” Id., 
    186 Ohio App.3d 412
    , 
    2009-Ohio-6195
    , 
    928 N.E.2d 763
    , at ¶ 47.
    The Bennett court then outlined a protocol for discovery:
    [A]n independent computer expert, subject to a confidentiality order,
    creates a forensic image of the computer system. The expert then retrieves
    any responsive files (including deleted files) from the forensic image,
    normally using search terms submitted by the plaintiff. The defendant’s
    counsel reviews the responsive files for privilege, creates a privilege log,
    and turns over the nonprivileged files and privilege log to the plaintiff.
    (Citations omitted.) Id. at ¶ 47. Similarly, in Nithiananthan, 12th Dist. Warren No.
    CA2011-09-098, 
    2012-Ohio-431
    , the court held that at minimum, an appropriate protocol
    requires that an independent computer expert, subject to a confidentiality order, creates a
    forensic image of the computer system. Id. at ¶ 20. The expert then retrieves any
    responsive files (including deleted files) from the forensic image, normally using search
    terms submitted by the plaintiff. The defendant’s counsel reviews the responsive files
    for privilege, creates a privilege log, and turns over the nonprivileged files and privilege
    log to the plaintiff.
    {¶33} Under the second portion of the Bennett procedure, a trial court abuses its
    discretion when its judgment entry permits unfettered forensic imaging of a party’s
    electronic devices, and contains none of the Bennett protections required to conduct such
    forensic analysis.      Scott Process Sys., 5th Dist. Stark No. 2012CA00021,
    
    2012-Ohio-5971
    , at ¶ 36.
    {¶34} In this matter, the record does not contain the protective protocol required
    under Bennett. Therefore, DeJohn and Kump’s third assignment of error is well taken.
    The trial court abused its discretion in ordering forensic imaging of appellants’ computer
    hard drives.
    {¶35}     Accordingly, the judgment is reversed and remanded for further
    proceedings consistent with this opinion.
    It is ordered that appellants recover of said appellee costs herein taxed.
    The court finds there were reasonable grounds for this appeal.
    It is ordered that a special mandate issue out of this court directing the common
    pleas court to carry this judgment into execution.
    A certified copy of this entry shall constitute the mandate pursuant to Rule 27 of
    the Rules of Appellate Procedure.
    MARY EILEEN KILBANE, JUDGE
    KATHLEEN ANN KEOUGH, P.J., and
    TIM McCORMACK, J., CONCUR