DAVID C. NORTON, District Judge.
The following matter is before the court on plaintiffs IHS Global Limited and IHS Global, Inc's (collectively, "plaintiffs") motion to compel, ECF No. 117. For the reasons set forth below, the court grants the motion.
This case arises out of a variety of disputes between two competing companies. Plaintiffs own and operate a database called Global Trade Atlas ("GTA"). GTA provides comprehensive merchandise trade statistics, including monthly import and export data for more than 95 countries and annual import and export data for more than 180 countries. Defendant C. Donald Brasher, Jr. ("Brasher") and his brother created GTA through their company, Global Trade Information Services, Inc. ("GTIS"). On August 1, 2014, plaintiffs acquired GTIS, including GTA, through a Stock Purchase Agreement ("SPA"). Under the SPA, Brasher and his affiliates were prohibited from using any confidential or proprietary information related to GTIS, including GTA, for three years—until August 1, 2017— and "until such information can no longer be reasonably considered to be a Trade Secret." ECF No. 25 ¶ 22. The SPA defines "Trade Secret" as "confidential and proprietary information, including trade secrets, know-how, processes, schematics, business methods, formulae, drawings, prototypes, models, designs, databases, customer lists and supplier lists."
After selling GTIS to plaintiffs, Brasher worked as a consultant for plaintiffs. Pursuant to this arrangement, Brasher entered into a consulting agreement ("Consulting Agreement") where he promised not to use plaintiffs' confidential and proprietary information. Plaintiffs allege that while working both for GTIS and for plaintiffs, Brasher had "extensive access to and knowledge of GTIS's and now [plaintiffs'] trade secrets."
Plaintiffs allege that soon after Brasher stopped working as a consultant for plaintiffs, he began to work on the Trade Data Monitor Product ("TDM Product"), a "copycat version" of the GTA product.
Plaintiffs allege that defendants used plaintiffs' product, supplier, and customer trade secrets to create the TDM Product. In addition, plaintiffs allege that defendants have been using plaintiffs' confidential customer information, including contact information, pricing arrangements, and subscription preferences, to create business for TDM. In particular, plaintiffs allege that defendants used plaintiffs' trade secrets about when plaintiffs' customers' subscriptions to GTA were up for renewal in order to strategically and timely solicit plaintiffs' customers.
Plaintiffs filed this case on April 16, 2018. The operative complaint is plaintiffs' amended complaint, which alleges various breaches of contracts between the parties, a violation of The Defend Trade Secrets Act, a violation of the Uniform Trade Secrets Act of Colorado and South Carolina, and several tort claims. On November 27, 2019, plaintiffs filed a motion to compel the forensic inspection of Brasher's laptop. ECF No. 117. Defendants responded to the motion on December 11, 2019, ECF No. 126, and plaintiffs filed a reply on December 17, 2019, ECF No. 127. The court held a hearing on the motion on December 19, 2019.
Pretrial discovery is governed by Rule 26 of the Federal Rules of Civil Procedure. Parties are permitted to "obtain discovery regarding any nonprivileged matter that is relevant to any party's claim or defense and proportional to the needs of the case." Fed. R. Civ. P. 26(b)(1). In determining proportionality, a court should consider "the importance of the issues at stake in the action, the amount in controversy, the parties' relative access to relevant information, the parties' resources, the importance of the discovery in resolving the issues, and whether the burden or expense of the proposed discovery outweighs its likely benefit."
Plaintiffs ask the court to compel a forensic inspection of Brasher's laptop. Brasher used his laptop while working for both plaintiffs and TDM, and plaintiffs allege that Brasher misused plaintiffs' proprietary information that he accessed on his laptop. During the course of discovery, Brasher has produced documents from his laptop, some of which include information about plaintiffs' customer history and contact information. The parties disagree about whether this information is properly classified as "trade secrets," but plaintiffs contend that the information produced includes their proprietary information and trade secrets. Now plaintiffs want to conduct a forensic inspection of the laptop to see what documents are and previously were on the laptop as well as how and when Brasher and others accessed, modified, copied, or used those documents. Plaintiffs argue that this request will impose a minimal burden on defendants because defendants have already made a forensically sound image of the laptop, and that defendants can just allow plaintiffs' forensic imager to inspect and make a copy of the forensic image.
Defendants
The court addresses defendants' timeliness argument first. Pursuant to Local Rule 37, motions to compel discovery must be filed within 21 days after receipt of the discovery responses to which the party challenges. Local Civ. Rule 37.01 (D.S.C.). Defendants responded to plaintiffs' request for a forensic inspection on November 22, 2019. Plaintiffs filed their motion to compel five days later. Therefore, plaintiffs' motion is timely, and the court can consider it. To the extent that defendants argue that the motion is untimely because plaintiffs waited over a year into discovery to request a forensic inspection, that argument is unconvincing. Discovery is still ongoing, with fact discovery set to end on March 30, 2020 and expert discovery set to end on April 30, 2020. Plaintiffs are entitled to make discovery requests at any point during discovery.
Having found plaintiffs' motion to be timely, the court now turns to the substance of the motion. Plaintiffs want to inspect and copy the forensic image of Brasher's laptop, which "is generally described as a forensic duplicate, which replicates bit for bit, sector for sector, all allocated and unallocated space, including slack space, on a computer hard drive."
Advisory Committee Notes to Fed. R. Civ. P. 34. Rule 26 also places specific limitations on the production of ESI, providing that "[a] party need not provide discovery of electronically stored information from sources that the party identifies as not reasonably accessible because of undue burden or cost." Fed. R. Civ. P. 26(b)(2)(B). If the party shows that the ESI is not reasonably accessible, "the court may nonetheless order discovery from such sources if the requesting party shows good cause, considering the limitations of Rule 26(b)(2)(C)."
"[F]orensic imaging is not uncommon in the course of civil discovery."
Applying the framework created by Rules 26 and 34, the court finds that plaintiffs are entitled to inspect and copy the forensic image of Brasher's laptop. First, the court is unconvinced that a forensic image of Brasher's laptop is not reasonably accessible. Defendants have already made a forensic image of the laptop. Defendants argue that the forensic image contains nonresponsive and privileged documents, and that because defendants have already reviewed the documents on the laptop for responsiveness and privilege, it would be burdensome to require defendants to go back and conduct another review of the forensic image. However, as discussed in greater detail below, the court will appoint an expert witness to conduct the inspection and make the copy of the forensic image, and the court is confident that the parties can agree upon a protocol to ensure that the expert can efficiently identify the non-privileged and responsive material.
Moreover, even if a forensic image of the laptop were not reasonably accessible, good cause exists for the production of the forensic image. As part of plaintiffs' trade secret claim, they must show that defendants used and misappropriated their trade secrets.
Defendants, citing to several cases, argue that courts generally order a forensic inspection or mirror image of a computer only when there is some evidence of wrongdoing or suspicious behavior by the party subject to the inspection, making a forensic inspection unwarranted here because plaintiffs have not made a credible assertion of wrongdoing by defendants. However, those cases are inapposite to the current matter because the purpose of forensic inspection in those cases was to determine if the party subject to inspection possessed the trade secrets at issue despite their claims otherwise.
In contrast, here defendants have produced documents that show that plaintiffs' allegedly proprietary information and trade secrets were in Brasher's possession via his laptop. Therefore, there is no need for any showing of wrongdoing because there is already evidence that Brasher possessed plaintiffs' information. That alone is evidence of potential wrongdoing that is worth further investigation. The forensic inspection's purpose here is not to resolve a suspicious inconsistency in defendants' productions. Instead, its purpose is to obtain additional information about documents that have already been produced and are clearly relevant to plaintiffs' claims. Plaintiffs' request for a forensic inspection is not based on "mere skepticism that an opposing party has not produced all relevant information is not sufficient to warrant drastic electronic discovery measures,"
2006 WL 3825291, at *3. This is precisely the information plaintiffs seek. Based on plaintiffs' counsel's representation at the hearing on the motion, the court is also convinced that plaintiffs do not intend to use a forensic inspection as a method of unfettered access to Brasher's computer and will endeavor to only identify and copy information that is directly relevant to their claims.
Defendants also rely on
In sum, the court grants plaintiffs' motion. To facilitate the inspection and copying of the laptop's forensic image, the court will appoint an expert witness pursuant to Rule 706 of the Federal Rules of Evidence. The expert must be a neutral third-party who has not been engaged by plaintiffs or defendants in this case. The court instructs the parties to confer and agree upon who shall serve as the expert.
The court also instructs the parties to confer and agree upon a protocol for the inspection and copying of the forensic image of Brasher's laptop, taking particular care to prevent the disclosure of any privileged or personal, unresponsive information within the forensic image of the laptop. The parties shall file a joint letter by January 20, 2019 that either: (1) identifies the agreed upon expert and protocol; or (2) explains the reason as to why the parties could not come to an agreement and includes each party's proposal for an expert and for the protocol. If the parties cannot agree upon the expert and/or the protocol, the court will consider the information in the parties' joint letter and appoint an expert and/or establish a protocol. Once the court appoints an expert witness and a protocol is established, defendants must make the forensic image of Brasher's laptop available to the expert for inspection and copying in accordance with the established protocol.
For the reasons set forth above, the court