The Poetry of e-Discovery: People Not Only Make Mistakes, They Lie, Steal, Cheat and Fake

Last week I wrote about how the law accounts for the fact that we all make mistakes. The law does not punish if reasonable efforts are made, and the efforts are real, not fakes. I made a plea to all judges hearing sanction cases to remember that one error does not per se negligence make.

This week I go beyond simple mistakes into the dark worlds and celebrate the poetry of e-discovery. Although the law does not demand perfection, especially in complex discovery, it does require a full measure of forthright honesty. The law knows that people not only make mistakes, they lie, steal, cheat and fake. Our system of justice exists to discourage and punish lying, stealing, and the rest. Indeed, we lawyers are constantly dealing with the dark side of human nature, which explains why we are more jaded than the rest.

This brings me to a new case, the one that this blog will embrace: Genworth Financial Wealth Management Inc. v. McMullan, 2010 U.S. Dist. LEXIS 53145, (D. Conn. June 1, 2010). It also brings me to a bit of real poetry, the meta-theme of this week’s off beat reverie.

The lawyers, Bob, know too much.
They are chums of the books of old John Marshall.
They know it all, what a dead hand wrote,
A stiff dead hand and its knuckles crumbling,
The bones of the fingers a thin white ash.
The lawyers know a dead man’s thoughts too well.

Carl Sandburg (1878-1967)


A Lawyer’s Disclaimer

First, to be clear, in discussing this case I am not accusing anyone here. I know too much for that. I have no personal knowledge of the facts. I will just report the written word of United States District Court Judge Vanessa L. Bryant. I may also add a few personal opinions of my own, but no assertions of fact. After a lifetime of working on cases like this, for both plaintiff and defense, I have no shortage of that. I know too much. Not knowledge like Sandburg thinks, from the old Learned Hand, but from experience with litigants just like this, over a thousand. Things have not changed that much from the times of Marshall and Lincoln, we old lawyers still know what most defendants are thinking. We know what goes on in their head. We know too much from both the living and the dead.

See here for my standard full disclaimer. Then listen to the judge and don’t blame me, blame her.

Court’s Statement of Background Facts and Procedure

In Genworth the defendants are accused of theft of trade secrets to solicit clients of their former employer. Plaintiff claims these acts are damaging, a real and potent destroyer.  A violation of the Computer Fraud and Abuse Act, the Connecticut Uniform Trade Secrets Act, the Stored Communications Act, and Connecticut common law’s prohibition of tortious interference with business relationships. This is serious. It goes well beyond a case of loose lips.

Genworth, a financial services company, alleges that while defendants were still Genworth employees, they obtained copies of Genworth’s Automated Contract Tracking (ACT) database. This contains “client names, phone numbers, contact information, portfolio management history, and client notes.” Plaintiff claims that when defendants left their employment, they took plaintiff’s proprietary database with them, formed their own competing company, TJT Capital Group LLC (also a named defendant), and used the database to solicit hundreds of Genworth’s current and former clients. Defendants respond to these accusations with defiance. They deny the allegations of theft. The database, they say they left. They claim they obtained the client information by legal means and dowry, including Internet searches and a very potent memory.

Genworth naturally found out about defendants actions with haste, since it was, after all, their customers going to waste. Genworth’s counsel immediately sent out a preservation demand letter. This proved to be a good idea, hard to find one better. The letter instructed defendants to preserve all relevant electronically stored information. A demand clearly made in anticipation of litigation. Genworth soon thereafter filed suit. It then promptly propounded document requests seeking production of ESI and return of the stolen loot. The defendants made a production which pointedly omitted any email at all (yes, you read that right, none). Defendants also failed to produce any or all of the ACT database they allegedly stole, no byte of data, not a single one.

Plaintiff’s counsel reacted by seeking assurances from defendants’ lawyers. Assurances that forensic imaging had been undertaken. Plaintiff’s counsel raised many concerns, including, if I’m not mistaken, the automatic deletion of temporary and inactive files. Defendants’ counsel said no, they had no image made. Moreover, they had no intention to do so. Plaintiff’s counsel did not appreciate this hostile reply. He countered by seeking relief from the court nearby. He  filed a motion, long in length and erudition:

… for a court order to compel the Defendants Timothy McMullan, James Cook, Timothy McFadden, Karen Bazon, Tamara Rivera, and TJT Capital Group LLC. (“TJT Capital”) to submit their computers and electronic media devices to forensic mirror imaging and examination by a neutral court-appointed forensic expert. The Plaintiff also seeks a court order for the preservation and production of evidence pursuant to Federal Rule of Civil Procedure 37(a)(5)(A) and Local Rule of Civil Procedure 37(c), and sanctions in the form of reasonable attorneys fees and costs associated with the Plaintiff’s motion.

This order contains the rulings made on these motions by Judge Bryant.  After that, the defendants finally became compliant.

The Trial

The evidentiary hearing on the sanction motions took place on April 8, 2010 and April 10, 2010. The Plaintiff presented documentary evidence in support of its requests. Defendant McMullen was also called and testified regarding his handling of the Genworth client data. Genworth’s evidence included highly relevant emails produced under a subpoena by a non-party, the Charles Schwab Corporation, to two of the defendants. These emails were not produced by Defendants. By the way, this is the usual way you go about showing spoliation. You prove the party should have the ESI, since it was sent to or from them, suggesting they now lie about the whole problem.

Defendant McMullen tried to explain this non-production by a story of his honest efforts. He threw the PC in the trash, yes, but only did so to be compliant. He was just trying to do the right thing, not somehow be defiant. The offending computer had the secret ACT database on it, he’s not sure how or why, and, alas, when he threw in it the can, the emails were lost too. An honest mistake he claimed. He was not trying to hide the truth. Still, he admitted under oath that he may, just maybe, have thrown the computer away after the Genworth preservation demand letter. The plot now thickens, conjuring the old wisdom of Dickens who said: Lawyers hold that there are two kinds of particularly bad witnesses–a reluctant witness, and a too-willing witness.

Here is Judge Bryant’s interesting summary of the testimony and evidence presented at these hearings:

The Plaintiff presented evidence that Defendant Timothy McMullen, the principal of Defendant TJT, used his personal computer and personal e-mail address to download, access, and transmit the Plaintiff’s proprietary information without a scintilla of a reasonable expectation to his entitlement thereto or other legitimate justification therefore. Defendant McMullen, while testifying before this Court, admitted that he spoliated evidence when he discarded a personal computer, on which he admittedly accessed and transmitted Genworth’s proprietary information, in a trash can, hard drive and all.

He further testified that he discarded the computer after having been advised by counsel that he had no right to the Genworth data that he had downloaded while employed by Genworth.

The Plaintiff effectively impeached Defendant McMullen’s testimony through exhibits and testimony evidencing that he sent emails to Schwab from his personal email account and the personal computer after the date that he testified as having discarded the computer. Defendant McMullen falsely testified before this Court about the handling of at least one of the electronic devices from which the Plaintiff sought ESI production. Even if Defendant McMullen in fact discarded the computer as he claims, the timing of the computer’s disposal evidences a consciousness of wrongdoing as to his disclosure of Genworth information.

How would you rule if presented with evidence like that? I am reminded again of Charles Dickens: Dishonesty will stare honesty out of countenance any day in the week, if there is anything to be got by it. But wait, there’s more. Judge Bryant continues:

Furthermore, the Plaintiff has also introduced evidence of the voluminous and detailed nature of the client information at issue, undermining if not rendering utterly incredulous the Defendants’ contention that they recalled by memory and discovered through internet searches and other research the detailed client data, including the information that they allegedly conveyed to Schwab in anticipation of their departures. Moreover, the unique and detailed quality of the lists, which include idiosyncratic characteristics of the data undermine any credibility that the Defendants’ contentions might have had.

The judge, who listened to the testimony and observed the demeanor of the witnesses, not only concludes that the defendant lied under oath (falsely testified), but calls their defense utterly incredulous, which, as language buffs well know, is not the same thing as incredible. To buy the defense here would be a strain, even for the gullible.

Judge Bryant then succinctly summarizes the evidence and finds and holds that:

Genworth has alleged and provided evidence supporting its contention that the Defendants used “the computers, which are the subject of the discovery request, to secrete and distribute plaintiff’s confidential information” there is a sufficient nexus between Genworth’s claims and its need to obtain a mirror image of the computer’s hard drive, warranting the imaging requested by the Plaintiff. Ameriwood, 2006 WL 3825291, at *4. The Defendant McMullen’s admitted spoliation of incriminating evidence and Schwab’s disclosure of documents impeaching McMullen’s testimony that he discarded the computer lend further support.

Still, the defendants keep arguing and claim they should not have to pay for the forensic expert. Their grounds are that they already hired an expert. But wait until you see what they hired him to do. It took a lot of chutzpah to make that argument with a straight face, but Judge Bryant’s response quickly put them in their place:

The Defendants initially refused to image their computers and only retained a computer consultant to do so after the Plaintiffs’ motion for a neutral court-appointed expert was pending before this Court. The Plaintiff filed its motion only after seeking the Defendants’ agreement in ensuring forensic imaging of the devices in question. The testimony at the evidentiary hearing however reflects that the Defendants did not exercise diligence in imaging all relevant electronic devices, and instead selectively identified only certain TJT Capital business computers that were not used during the period of misappropriation activity that was alleged to have occurred while the Defendants were still employed by Genworth.

The totality of the circumstances under which the Defendants retained a forensic computer expert suggests an end run in furtherance of efforts by the Defendants to deny the discovery to which the Plaintiff is entitled. Moreover, the Defendants’ contention that they cannot afford to pay an expert is belied by their retention of their own expert while the motion for the appointment of a neutral expert for both parties was pending.

So they hired an expert to go around and image the computers they knew were clean, and kept him away from the real computers that mattered. Then they had the gall to complain about the costs of a forensic exam to uncover the evidence the defendants tried to destroy. Who thought that was a good idea to try to sell to the judge? I am reminded of another stanza from Carl Sanburg’s poem, The Lawyers Know Too Much.

In the heels of the higgling lawyers, Bob,
Too many slippery ifs and buts and howevers,
Too much hereinbefore provided whereas,
Too many doors to go in and out of.

But wait, there’s still another door. The defense lawyers also try to fight the forensic expense by pleading poverty, that the big plaintiff can afford to pay for it easier than they can. How do you think that higgling argument will go over at this point? Here is how Judge Byrant responds:

In further objection to the appointment of a forensic expert, the Defendants cite expense and the relative financial ability of the parties to pay the cost of such an expert. [Doc. #42]. But yet it is the Defendants’ apparent deceit, obstreperousness and destruction of relevant information, that the Defendants were required to maintain and preserve, that necessitates the retention of a neutral forensic computer expert to ascertain what, if any, data existed on any and all computer and electronic storage devices to which the Defendants had access during the relevant period. In light of the Defendants’ culpability in necessitating the expense of a neutral expert, the cost for the appointment of a neutral forensic expert is to be borne 80% by the Defendants and 20% by the Plaintiff.

The only thing I find mysterious about that ruling is why the plainitff’s were required to pay anything at all, but then courts’ usually split the costs of these forensics 50/50 or make the requesting party pay. By the way, for you vocab fans, obstreperousness is another great word to know. It basically means noisy defiance, a really bad show. Not a good thing to do to a federal judge. The may remember and hold a grudge.

Obviously defense counsel here are not among the early adapters of The Cooperation Proclamation. Too bad. A cooperative approach could have saved their clients a lot of time and money. They have not learned the lesson that it is sometimes its better to forego the stick and use the honey. But then again, if that had happened here, this opinion would not be so funny.

Here is what Judge Bryant thinks:

The Court further notes that the Plaintiff’s motion for sanctions is warranted by the fact that it had to seek Court orders to obtain that to which it has been entitled but which the Defendants unreasonably and dubiously refused and possibly intentionally made unavailable. The Defendants were wholly unjustified in their position as they tacitly admitted by finally hiring a computer imaging expert. The Defendants have wasted the Plaintiff and the Court’s resources in necessitating the judicial resolution of this discovery dispute.

Possibly intentionally made unavailable, is a statement likely indeed to be unassailable. This all means the judge has concluded defendants intentionally hid the ball, and so now that is how the gavel must fall.

The Order

The Court concludes by providing the plaintiff with all of the relief it requested, including appointment of a neutral forensic expert, production of all computers to the expert for imaging, delivery of information recovered to defense counsel for first review for relevance and privilege, followed by production of the ESI to plaintiff, and an award of attorneys fees and costs. The plaintiff here wins, a new expert begins, and the defense? Well, it takes a hit on the shins.

The Law

Judge Bryant analogized the facts before her to those in Ameriwood Industries Inc. v. Liberman, 2006 WL 3825291, at *3, *6 (E.D. Mo. Dec. 27, 2006), amended by 2006 WL 685623 (E.D. Mo. Feb. 23, 2007). In Ameriwood, like Genworth, the computers the plaintiff sought to image and examine were alleged to have been used in connection with the plaintiff’s claims — in this case, trade secret violations. This factor, along with the extreme facts, superseded the defendants’ privacy concerns.

Judge Bryant first noted that a party requesting ESI discovery is not normally “entitled ‘to a routine right of direct access to a party’s electronic information system, although such access might be justified in some circumstances.’” The court focused on the analysis in Ameriwood, which involved similar alleged violations of the Computer Fraud and Abuse Act by former employees who started a competing company. In Ameriwood the court ordered the creation and examination of images of the former employees’ computer hard drives after evidence showed that the defendants intentionally withheld all responsive documents. In balancing the privacy interests of the defendants in their computer data against their alleged bad faith behavior, the court held that the use of the particular computer in the alleged fraud was a key element: “[A]llegations that a defendant downloaded trade secrets onto a computer provide a sufficient nexus between the plaintiff’s claims and the need to obtain a mirror image of the computer’s hard drive.” Id.

Judge Bryant in Genworth held that the similarities between the facts in this case and Ameriwood suggested that similar remedies were appropriate. Judge Bryant held that full imaging and forensic examination of the defendants’ ESI sources was warranted, She explained that Genworth “has exhaustively established that forensic imaging by a neutral expert is the only way that the Plaintiff will be able to secure the electronic data to which it is entitled.” Judge Bryant pointed to the lack of any reasonable justification from the defendants for transmitting Genworth’s proprietary data to their personal computers, or for throwing McMullen’s computer into a trash can. She noted that “the timing of the computer’s disposal evidences a consciousness of wrongdoing as to his disclosure of Genworth information.”  Thus ends the Court’s castigation.

Concluding Poem

I am reminded of a poem written by one of my students below. It is perhaps the first of its kind in a new genre of post-modern literature: e-discovery poetry. I encourage my readers to write and leave here their own legal poems; I make this a general plea. Be brave and join with me. Have courage to sing the body electric of legal discovery. It does not have to meet the high standards of W. H. Auden, shown right, or his great poem Law Is Love. Obviously my low writing in this blog is far from the above. I only ask that your contributions in some way, or degree, pertain at least obliquely to the noble art of e-discovery.


Temporary internet files,
Store records that go on for miles,
To delete them is fair,
If no reason is there,
to think they could be used in a trial.

Lawyers often think about spoliation,
of evidence which has no relation.
But if the files the parties erase,
were important to the case,
then the judge may give consideration.

The judge may take into account,
the production cost and amount,
the importance of documents sought,
and whether they’re accessable or not,
to determine if sanctions can mount.

But at the end of the day,
the Defendants will pay,
If after the litigation is pending,
its employees are deleting or amending.

7 Responses to The Poetry of e-Discovery: People Not Only Make Mistakes, They Lie, Steal, Cheat and Fake

  1. I never presumed Mr. Losey a poet
    The defendant’s a** was grass and Judge Bryant needed to mow it.
    With information and identity theft abounding
    A personal computer in the trash has a “WTF” resounding
    The cost of a forensic expert was too expensive??
    As a service provider, that’s down-right offensive.
    When will Counsels abandon this type of gamesmanship and tactic?
    Shouldn’t repeated sanctions make them anaphylactic?
    Please forgive my simplistic, Suess-like cadence. Clearly, I never earned my “poetic license”
    After all, I’m a product of a Florida state school where I spent much of my time on a barstool.

    Great Job Ralph – you never cease to amaze.

  2. Shannon Capone Kirk says:

    Its always the trade secret cases.

  3. S Kirk says:

    I make no comment on the defendant here, but, as you requested Mr. Losey, a poem for you…

    And he, for shame, is left in tatters
    Wholly blamed
    A failure to gather
    This crucial bunch
    That golden nugget
    The email proving for once, he dunnit

    Don’t let her catch that lie you told
    Or see the evidence unfold
    Of wiping this
    Or deteting that
    A computer will, you know, talk back

    And there you are
    Alone for once
    Left upon the Judge’s hunch
    That you should pay
    Yes, you should suffer
    All the sanctions she can muster

  4. Loren Snodgrass says:

    “No more rhymes now, I mean it.”
    –Vizzini, The Princess Bride (1987)


  5. Lisa Solomon says:

    I’m one of the owners of The Billable Hour Company ( We publish a monthly e-newsletter called The Timesheet, which focuses on legal humor and work/life balance. I invite all e-discovery poets to submit your work to us at info[at], for publication in our Poeticus Lex column.

  6. Jared B says:

    As the poet Ralph Losey could easily surmise,
    A student of e-Discovery reads this blog post with little surprise.

    All too often we read cases of discovery frauds exposed,
    Maybe the message will stick if it’s written in prose.

    Nevertheless, we find a party with the worst fatal flaw,
    An illusory belief that they are somehow above the law.

    Oh, a fly on the wall I’d loved to have been,
    When this defendant discarded his computer in the recycling bin.

    Perhaps it’s the product of intelligence lacked,
    But if spoil ESI you must, at least keep the family computer intact.

    Of course, Judge Bryant saw this all as a sham,
    As any sensible person would have at least saved the RAM.

    Will lawyers or parties ever learn from cases like Genworth Financial?
    If you hide the ball, sanctions will be substantial!

  7. […] someone is Ralph Losey, whose latest blog post is titled, The Poetry of e-Discovery: People Not Only Make Mistakes, They Lie, Steal, Cheat and Fake. In the post, Losey reports on a recent decision of the U.S. District Court in Connecticut, […]

%d bloggers like this: