THOMAS B. SMITH, Magistrate Judge.
This misappropriation of trade secrets case comes before the Court without a hearing on Defendant Alex Pendolino's Motion to Compel (Doc. 166) and Plaintiff Digital Assurance Certification, LLC's Motion to Compel Defendant Alexander Pendolino and Defendant Lumesis, Inc. to Grant Access to Electronic Media (Doc. 177).
Plaintiff Digital Assurance Certification, LLC ("DAC") alleges that before Defendant >Alex Pendolino, Jr. resigned from its employ on October 10, 2017, he inserted a USB thumb drive, serial number 1019350241088504 (the "Identified USB") into his DAC-issued laptop computer (the "Laptop") and accessed all the information on DAC's shared drive (Doc. 90, ¶¶ 2, 65, 80-81). On November 28, 2016, Pendolino started working for DAC competitor, Defendant Lumesis, Inc. (Doc. 44, ¶ 59; Doc. 172 at 2). Fearing that Pendolino had stolen and delivered its confidential and trade secret information to Lumesis, DAC hired computer forensics expert Charles Platt to examine the Laptop
(Doc. 172-2). DAC says Pendolino had no business reason to attach a USB drive to the Laptop, or to access all information on its shared drive (Doc. 90, ¶¶ 80-81).
In its Second Amended Verified Complaint DAC alleges that Pendolino and Lumesis violated the Defend Trade Secrets Act of 2016, 18 U.S.C. § 1836 and the Florida Uniform Trade Secrets Act, FLA. STAT. § 688.001 et seq.; that Pendolino breached his confidentiality agreement with DAC;
Pendolino denies taking any information from DAC by any means at any time (Doc. 44, ¶ 72). He denies uploading or downloading "any DAC information to the Lumesis computer or systems by any method—USB, cloud or otherwise . . ." (
Lumesis' President and Chief Operating Officer, Timothy J. Stevens has declared that after investigation he "was able to confirm that there is no reasonable basis to believe that Pendolino has used or provided any DAC documents, data or information through any of Lumesis' electronic networks or systems, or utilized it in the performance of his work for Lumesis." (Doc. 41, ¶ 9). Stevens has testified that Lumesis "reviewed Pendolino's computer hard drive, recycle bin, email, cloud network storage system and determined that no DAC materials have been provided by, uploaded or utilized by Pendolino in the performance of his services for Lumesis." (
DAC argues that Platt's analysis contradicts Pendolino's claim that he did not insert a USB device into the Laptop and download information on October 10, 2016 (Doc. 172 at 2-3). It also disputes Stevens' testimony that Lumesis performed a complete forensic examination of Pendolino's Lumesis' issued computer (
Parties may obtain discovery regarding any non-privileged matter that is relevant to any party's claim or defense. FED. R. CIV. P. 26. "The discovery process is designed to fully inform the parties of the relevant facts involved in their case."
The party seeking to compel discovery has the burden of showing that the information sought is relevant to the lawsuit.
"It is settled that, electronically stored information is discoverable under Rule 34(a) of the Federal Rules of Civil Procedure. `During discovery, the producing party has an obligation to search available systems for the information demanded.'"
Rule 34 authorizes the requesting party to "inspect, copy, test, or sample" the documents, things, and other information that is produced. FED. R. CIV. P. 34(a)(1). However, "[t]he addition of testing and sampling to Rule 34(a) with regard to documents and electronically stored information is not meant to create a routine right of direct access to a party's electronic information system, although such access might be justified in some circumstances. Courts should guard against undue intrusiveness resulting from inspecting or testing such systems." Advisory Committee Notes 2006 Amendment;
DAC would have the Court believe that Pendolino's requests for production, all of which are discussed below, are not relevant. It argues that once Pendolino denied inserting the Identified USB into the Laptop and failed to offer an alternative explanation for how that occurred the only remaining relevant question is whether Pendolino in fact plugged the Identified USB into the Laptop (Doc. 172 at 15). DAC also contends that Pendolino's forensic computer expert, Richard D. Connor, Jr., is on a fishing expedition "to provide an alternative explanation for the USB's insertion based on some unspecified evidence relating to other time periods, other DAC employees, and USB usage concerning the laptop where such an alternative explanation directly contradicts facts as presented under oath by Defendant Pendolino himself."
Pendolino is asking the Court to compel DAC to comply with the following requests for production:
(Doc. 166 at 6-7).
DAC has agreed to produce non-privileged documents in response to these requests by the deadline for expert disclosures (Doc. 166 at 7). And, although it does not believe it has any additional documents that are responsive to these requests, DAC is "willing to have additional forensic tests run to obtain additional forensic information that would be responsive to [these requests] provided that Pendolino agrees to pay the cost of obtaining this forensic evidence or provided that Pendolino utilizes his own expert to conduct the forensic examination necessary to obtain this information under the supervision of DAC's forensic expert in this matter."
(
DAC objects to this request on the grounds that it is not proportional to the needs of the case and seeks information that is not relevant or reasonably calculated to lead to the discovery of admissible evidence
(Doc. 166 at 5-8).
Originally, DAC said it would be willing to permit Connor to conduct certain pre-identified tests on the mirror image of the Laptop under supervision by Platt (Doc. 166 at 6). Later, DAC said it would give Connor access to the mirror image created by Platt on two conditions. First, consistent with its response, DAC wants to know in advance what tests Connor intends to conduct, and then the tests must be performed under Platt's supervision (Doc. 172 at 7). DAC has proposed that Platt and Connor meet in advance to agree on the protocol for the examination, including a protocol for when Connor feels that he needs to go beyond the scope of his original predictions as to how he intends to probe the Laptop for evidence
Connor has declared that he is unable to identify all the forensic tests that will be needed to obtain the information necessary to defend against DAC's claims (Doc. 167-1, ¶ 19). He explains that he has not evaluated the Laptop, does not know what programs are installed, how the operating system is configured, how event logging is configured, or what installed programs may provide activity logs (
Even though Pendolino argues that DAC's requirement of a pre-inspection protocol is unworkable, he has undercut his argument to some degree by providing the following list of types of data to be sought and reviewed:
(Doc. 166 at 10).
DAC's second condition to allowing Connor to inspect a forensic copy of the Laptop is that Pendolino and Lumesis give DAC "reciprocal access to Defendants' electronic media, including the mirrored hard drive of the Lumesis desktop issued to Defendant Pendolino, the Lumesis DIVER Underwriter system, and the three mirrored USB drives apparently utilized by Defendant Pendolino while at DAC." (Doc. 172 at 6). The Court agrees with DAC that "the parties need equal forensic access to the electronic data to meet each other's claims and arguments." (Doc. 172 at 6). However, the Federal Rules of Civil Procedure do not permit DAC to condition its compliance with Pendolino's request for production number 10 on reciprocal access to information in Defendants' possession or control. If DAC wants information, it needs to propound its own requests for production.
Platt has already created and analyzed a mirror image of the Laptop hard drive. Pursuant to Pendolino's request number 10 Connor, should have an equal opportunity to examine, search, test, and analyze the same information that was made available to Platt. This is particularly the case because the parties are not simply searching for documents that may be uncovered by a keyword search. They want to know how the Laptop and Identified USB were used during a specific period of time. To make this determination both experts need to search the hard drive for traces, remnants, and residue and then follow those trails, wherever they lead.
While Pendolino is entitled to this discovery, DAC is entitled to the protection of its confidential and trade secret information and other information that is not relevant to this case. So that Pendolino has the necessary access to the mirror image of the Laptop hard drive and DAC's privacy interest is protected, Pendolino's request for production number 10 is
(1) Connor shall agree in writing to be bound by the terms of the parties' Stipulated Confidentiality Agreement. The Court understands Connor has already signed the necessary paper. If not, he shall before there is any further action on request number 10.
(2) Within seven days from the rendition of this Order, Connor and Platt shall meet and confer to discuss the methods Connor will employ to search, test, and analyze the mirror image of the hard drive. The experts are not required to agree on the methodologies Connor will utilize and Connor is not limited to the methodologies he discusses with Platt. But, this process may save time and, if Platt is concerned that Connor intends to do something inappropriate, he can alert DAC's lawyers so that they can bring the concern to the Court. During their meet and confer Platt and Connor shall agree on the time and place when Connor will be given access to the mirror image of the hard drive.
(3) On the agreed date, at the agreed location, the mirror image of the hard drive shall be produced for examination, search, testing, and analysis by Connor. This process shall continue, day-by-day, until Connor has completed his work. Platt may be present while Connor performs his work.
(4) All information collected by Connor shall be turned over to Platt for review by DAC and its attorneys. Within seven days of its receipt of the information collected by Connor, DAC shall produce a privilege log identifying any of the information it maintains is privileged or not relevant to this case. That information shall be isolated and preserved, the remaining information shall be produced to Pendolino's attorneys and Connor.
(5) Counsel shall meet and confer to resolve any disputes over the information listed on the privilege log. To the extent they are unable to resolve a dispute, the parties may motion the Court for a determination.
(6) At the conclusion of the case, the information obtained by Connor shall be disposed of in the manner prescribed in the parties' Stipulated Confidentiality Agreement. If the Agreement does not address disposal of the information, then all copies shall be delivered to the attorneys representing DAC.
(7) Pursuant to Federal Rule of Evidence 502(d), by engaging in the protocol established in this Order, the parties shall not be deemed to have waived the attorney-client privilege, work product protection, or any other privilege or immunity with respect to such disclosure in this case or in any other federal or state proceeding.
Pendolino's motion to compel his requests for production numbered 2, 3 and 11 is also
DAC has motioned the Court to compel Pendolino and Lumesis to comply with the following requests for production:
(Doc. 177 at 10).
These requests are premised on DAC's belief that Pendolino stole its confidential and trade secret information
(Doc. 177 at 10).
Lumesis responded that it was willing "to provide an image of the hard drive from Pendolino's computer to an agreed upon independent third party to perform a search of artifacts which might be responsive to this request upon commonly accepted terms provided that the third party does not provide any document or information otherwise objected to." (Doc. 177 at 10). In a separate letter, Lumesis then asked DAC for "the specific protocols and searches it intends to use, and the nature, scope, and breadth of the investigation it intends to make." (Doc. 187 at 4-5). Lumesis also wants "to know the method(s) by which [DAC] intends (and will) protect all unrelated confidential and proprietary Lumesis business information, other than pursuant to the Stipulated Confidentiality Agreement . . ."