Fasteners For Retail, Inc. v. DeJohn

Ohio Court of Appeals
Fasteners For Retail, Inc. v. DeJohn, 2014 Ohio 1729 (2014)
Kilbane

Fasteners For Retail, Inc. v. DeJohn

Opinion

[Cite as Fasteners For Retail, Inc. v. DeJohn,

2014-Ohio-1729

.]

Court of Appeals of Ohio EIGHTH APPELLATE DISTRICT COUNTY OF CUYAHOGA

JOURNAL ENTRY AND OPINION No. 100333

FASTENERS FOR RETAIL, INC. PLAINTIFF-APPELLEE

vs.

MICHAEL A. DEJOHN, ET AL. DEFENDANTS-APPELLANTS

JUDGMENT: REVERSED AND REMANDED

Civil Appeal from the Cuyahoga County Court of Common Pleas Case No. CV-12-786894

BEFORE: Kilbane, J., Keough, P.J., and McCormack, J.

RELEASED AND JOURNALIZED: April 24, 2014 ATTORNEY FOR APPELLANTS

John F. Burke Burkes Law, L.L.C. 614 West Superior Ave. Rockefeller Bldg., Suite 1500 Cleveland, Ohio 44113

ATTORNEYS FOR APPELLEE

Charna E. Sherman Charna E. Sherman Law Offices 5310 Key Tower 127 Public Square Cleveland, Ohio 44114

F. Benjamin Riek, III Emershaw, Mushkat & Schneier 120 E. Mill Street, Suite 437 Akron, Ohio 44308 MARY EILEEN KILBANE, J.:

{¶1} In this appeal, defendants-appellants, Michael DeJohn (“DeJohn”) and

Daniel Kump (“Kump”),1 appeal from the trial court’s order compelling them to produce

their computer hard drives for forensic imaging2 in litigation filed by plaintiff-appellee,

Fasteners for Retail (“FFR”).

{¶2} Having reviewed the record and the controlling case law, we reverse and

remand the matter for further proceedings consistent with this opinion.

{¶3} This appeal arises from a lawsuit filed by FFR in an unrelated matter in the

United States District Court for the Northern District of Illinios. See Fasteners for Retail

v. Anderson, N.D.Ill. No. 11 C 2164,

2011 U.S. Dist. LEXIS 124937

(Oct. 28, 2011).

FFR, a company engaged in selling products used in retail shelving displays, brought suit

against K International (“KI”) and Gerald Andersen alleging patent infringement, false

advertising, misappropriation of trade secrets, and other claims. KI filed a counterclaim,

alleging false patent marking and other claims. During the course of the Illinois

litigation, FFR learned that DeJohn, who had worked as FFR’s vice president in charge of

sales until his termination on March 12, 2008, performed consulting work for KI. FFR

also learned that Kump, who had worked as FFR’s vice president for new market

1 Thisappeal was previously consolidated with 8th Dist. Cuyahoga No. 100336, an appeal from the same discovery order filed by defendant Bruce Hrvatin (“Hrvatin”). On March 6, 2014, however, this court granted Hrvatin’s motion to dismiss his appeal. 2On September 10, 2013, this court determined that the discovery order is final and appealable under R.C. 2505.02(B)(4). development until his termination on October 24, 2009, also performed consulting work

for KI.

{¶4} Subsequently, on July 12, 2012, FFR filed suit against DeJohn and Kump in

the Cuyahoga County Common Pleas Court. In relevant part, FFR alleged that DeJohn

and Kump had breached the confidentiality and nondisclosure provisions of their

employment agreements, misappropriated trade secrets, and engaged in unfair

competition; Kump breached his noncompete agreements; and DeJohn tortiously

interfered with Kump’s contract with FFR. DeJohn and Kump filed answers denying

liability and also filed counterclaims asserting breach of contract, abuse of process, and

unfair competition.

{¶5} In October 2012, FFR sought discovery from defendants; however,

defendants did not fully comply with FFR’s request. As a result, on December 7, 2012,

FFR filed a motion to compel in which it complained that DeJohn and Kump filed

incomplete responses to a number of interrogatories. In the motion, FFR stated that

DeJohn and Kump objected to the discovery request because it was overbroad, indicated

overall that they had no list of FFR customers, and argued that neither individual had

disclosed FFR’s confidential information.

{¶6} In response, DeJohn and Kump moved to strike the motion to compel

because it was not signed by counsel. Defendants also asserted that the response “may

exceed 20,000 names. Moreover, plaintiff is fully aware of its customers and this

defendant has no documentation containing any such customers’ names.” In addition, on December 7, 2012, defendants filed their own motion to compel FFR to comply with

discovery, seeking the nature of the confidential information they had allegedly disclosed

to KI. In this motion, defendants complained that FFR had “failed to respond to nearly

all of [their] interrogatories and had failed to produce a single document in response to

the Request for Production of Documents.”

{¶7} On December 26, 2012, FFR moved for a protective order governing use of

confidential information and apprised the court that the parties “have failed to reach

agreement on terms of a stipulated protective order creating a standstill in discovery.”

{¶8} The same day, FFR also filed a motion for electronic discovery, asserting

that the parties “have been unable to agree upon the parameters of discovery.” FFR

proposed that defendants produce “any relevant computer hard drives and electronic

media” for FFR’s review, and from that review a list of search terms would be derived.

Upon completion of defendants’ discovery, FFR would “produce pursuant to a protective

order a subset of documents concerning the information FFR contends constitutes

Confidential Information.” In opposition, defendants asserted that it would be unfair to

order defendants to provide discovery to FFR before FFR provided any discovery to

defendants. Defendants complained that FFR had not provided them with discovery and

that FFR had already received extensive electronic discovery in the Illinois litigation.

{¶9} On March 26, 2013, the trial court granted defendants’ motion to compel

discovery responses and also granted FFR’s motion to compel discovery and for

sanctions. {¶10} On March 27, 2013, FFR filed an amended complaint with leave of court.

In relevant part, this pleading added Hrvatin and KI as new party defendants and alleged

that DeJohn, Kump, and Hrvatin breached their employment agreements,

misappropriated trade secrets, and engaged in unfair competition; that DeJohn tortiously

interfered with Kump’s employment; and that Kump and DeJohn fraudulently induced

FFR to enter into severance agreements.

{¶11} On May 31, 2013, following a pretrial, the trial court ordered, in relevant

part, that FFR “produce 20 gigs of documents” “for attorney’s eyes only,” and identify

those documents that would notify the defendants of the basis of their alleged disclosure

of trade secrets. The trial court also ordered defendants to produce all outstanding

discovery “for attorney’s eyes only.”

{¶12} On July 9, 2013, FFR filed another motion to compel and for sanctions,

complaining that Hrvatin had indicated in response to a motion for production of

documents that “[t]here are no documents that satisfy this request,” and that documents

FFR obtained in the Illinois litigation and Hrvatin’s other discovery responses refuted that

contention.

{¶13} On July 12, 2013, FFR filed a motion to compel defendants to comply with

discovery and for production of their computer hard drives. FFR asserted that

defendants have “engaged in knowingly evasive and even perjured testimony, and

potentially even the spoliation of critical evidence.” In support of this motion, FFR

asserted that there are “mounting signs” that “[d]efendants purposely destroyed relevant electronic information.” FFR asserted that DeJohn stated that he experienced computer

problems that prevented him from retrieving all of his emails, and that Kump had the hard

drive on one of his computers replaced one day before this matter was filed. FFR also

asserted that DeJohn wrote “Hello men” on a number of emails with two recipients who

are employees of FFR, but “FFR has received more of the chain,” thus suggesting that a

larger email chain existed. FFR also submitted evidence that its expert, Mark

Lanterman, had developed an electronic discovery protocol that has successfully been

used by attorneys for years.

{¶14} In opposition, defendants asserted that FFR should not be given unfettered

access to their computers since FFR already had access to all of the email sent to FFR

from its own servers, in addition to all of the information obtained in the Illinois

litigation. Moreover, defendants argued, FFR had not shown that the defendants

revealed any confidential information.

{¶15} On August 8, 2013, FFR filed a motion for an extension of time to respond

to defendants’ requests for discovery. The next day, on August 9, 2013, the trial court

issued the following order:

Defendants Kump, DeJohn, and Hrvatin are hereby ordered to produce electronic discovery and the computer hard drives by 9/3/13.

All parties are to answer all interrogatories served on them by opposing counsel. {¶16} Defendants appealed from that order on August 30, 2013. On September

10, 2013, this court determined the order to be final and appealable under R.C.

2505.02(B)(4), and concluded in relevant part:

To the extent the order requires disclosure of such matter, it determines the

action with respect to a provisional remedy and prevents a judgment in

appellant’s favor with respect to the discovery. Bennett v. Martin,

186 Ohio App.3d 412

,

2009-Ohio-294

, [

928 N.E.2d 763

,] ¶ 35 [(10th Dist.)].

An appeal following a final judgment would not be an effective remedy for

the disclosure of privileged and/or confidential information.

{¶17} DeJohn and Kump assign the following errors for our review:

I. The trial court erred because its order compels production of irrelevant, privileged and confidential information and imposes an undue burden on Appellants.

II. The trial court erred in ordering forensic imaging of Appellants’ computer hard drives because Appellee failed to demonstrate what it must [do] to warrant that degree of intrusion, disruption, and invasion.

III. The trial court erred in issuing the discovery order because it fails to

include any protocols and procedures and because it fails to adequately

protect Appellants’ privileged and confidential electronically-stored

information.

Standard of Review

{¶18} Pursuant to Civ.R. 26(B)(1), the scope of discovery is as follows: [A]ny matter, not privileged, which is relevant to the subject matter

involved in the pending action, whether it relates to the claim or defense of

the party seeking discovery or to the claim or defense of any other party[.]

{¶19} An appellate court reviews a claimed error relating to a discovery matter

under an abuse of discretion standard. Lightbody v. Rust,

137 Ohio App.3d 658, 663

,

739 N.E.2d 840

(8th Dist. 2000); Trangle v. Rojas,

150 Ohio App.3d 549

,

2002-Ohio-6510

,

782 N.E.2d 617

(8th Dist.).

{¶20} Further, if forensic imaging is imposed as a sanction under Civ.R. 37(B), it

is likewise to be reviewed under an abuse of discretion standard. Bennett,

186 Ohio App.3d 412

,

2009-Ohio-6195

,

928 N.E.2d 763, ¶ 40

. Order for Production of the Computer Hard Drives

{¶21} In this matter, the trial court ordered defendants to produce their computer

hard drives for discovery. Forensic imaging of a computer’s hard drive creates a mirror

image that replicates bit for bit, sector for sector, all information on the hard drive,

including embedded, residual, and deleted data.

Id.

The Bennett court noted that courts

are generally reluctant to compel such forensic imaging of a hard drive “largely due to the

risk that the imaging will improperly expose privileged and confidential material

contained on the hard drive.”

Id.

For that reason, and in order to guard against undue

intrusiveness to a party’s privacy and confidentiality, the Bennett court established a

two-part procedure to determine whether forensic imaging is warranted, as opposed to

other discovery procedures.

Id.

First, the trial court must weigh the parties’ interests in

obtaining the discovery against privacy concerns. Second, the trial court must set forth a

protective protocol to ensure forensic imaging is not unduly intrusive. Id.; Nithiananthan

v. Toirac, 12th Dist. Warren No. CA2011-09-098,

2012-Ohio-431

, ¶ 9.

1. Weighing of Interests in Discovery Versus Privacy

{¶22} In their first and second assignments of error, DeJohn and Kump assert

that the trial court did not follow the first part of the procedure outlined in Bennett,

186 Ohio App.3d 412

,

2009-Ohio-6195

,

928 N.E.2d 763

. Defendants argue that the trial

court did not weigh FFR’s interests in obtaining discovery versus the defendants’

competing interests in privacy and confidentiality, and that the record did not establish the

requisite background of noncompliance with discovery. {¶23} With regard to the first part of the procedure, the Bennett court began by

cautioning against undue intrusiveness. Id. at ¶ 41. The court then observed that the

plaintiff was forced to file numerous motions to compel, the defendants did not comply

with the court’s orders to comply with discovery requests, the defendants were untruthful

regarding what had and had not been produced, and the defendants had adopted a

“lackadaisical and dilatory approach.” Id. at ¶ 42.

{¶24} The Bennett court stated:

Thus, before compelling forensic imaging, a court must weigh “the significant privacy and confidentiality concerns” inherent in imaging against the utility or necessity of the imaging. * * * In determining whether the particular circumstances justify forensic imaging, a court must consider whether the responding party has withheld requested information, whether the responding party is unable or unwilling to search for the requested information, and the extent to which the responding party has complied with discovery requests. * * * When a requesting party demonstrates either discrepancies in a response to a discovery request or the responding party’s failure to produce requested information, the scales tip in favor of compelling forensic imaging.

(Citations omitted.) Id. at ¶ 41. See also Nithiananthan, 12th Dist. Warren No.

CA2011-09-098,

2012-Ohio-431

, at ¶ 9 (the party requesting forensic imaging must

demonstrate a “background of noncompliance” with discovery under part one of the

Bennett framework).

{¶25} We also observe that federal courts are likewise

“loathe to sanction intrusive examination of an opponent’s computer as a matter of course, or on the mere suspicion that the opponent may be withholding discoverable information. Such conduct is always a possibility in any case, but the courts have not allowed the requesting party to intrude upon the premises of the responding party just to address the bare possibility of discovery misconduct.” Scotts Co., L.L.C. v. Liberty Mut. Ins. Co., S.D.Ohio No. 3:06-CV-899,

2007 U.S. Dist. LEXIS 43005

, at *4-5 (June 12, 2007), quoting Diepenhorst v. Battle Creek, W.D. Mich.

No. 1:05-CV-734,

2006 U.S. Dist. LEXIS 48551

, *10-11 (June 30, 2006).

{¶26} In Bennett, the court outlined the following examples of situations where

imaging was warranted:

Playboy Enters. [v. Welles],

60 F.Supp.2d 1050, 1054

[(S.D.Cal. 1999)]

(allowing access to party’s computer system on a finding of systematic

deletion of relevant e-mails after litigation had commenced). See, e.g.,

Williams v. Mass. Mut. Life Ins. Co.,

226 F.R.D. 144, 146

(D.Mass. 2005)

(denying motion to appoint computer forensic expert because moving party

failed to present any “credible evidence that Defendants are unwilling to

produce computer-generated documents”); Bethea v. Comcast,

218 F.R.D. 328, 329-30

(D.D.C. 2003) (denying motion to compel because, “[i]n the

context of computer systems and computer records, inspection or seizure is

not permitted unless the moving party can demonstrate that the documents

they seek to compel do, in fact, exist and are being unlawfully withheld”);

Simon Prop. Group L.P. v. Simon, Inc.,

194 F.R.D. 639, 641

(S.D.Ind.

2000) (allowing plaintiff to inspect defendant’s computer system because

plaintiff demonstrated “troubling discrepancies with respect to defendant’s

document production”); Ameriwood Indus., Inc. v. Liberman, Case No.

4:06CV524-DJS,

2006 U.S. Dist. LEXIS 93380

,

2006 WL 3825291

, *1 (E.D.Mo. Dec. 27, 2006) (unpublished) (granting motion to compel imaging

of defendant’s hard drive because the court had “cause to question whether

defendants have produced all responsive documents”); Balboa

Threadworks, Inc. v. Stucky, Case No. 05-1157-JTM-DWB,

2006 U.S. Dist. LEXIS 29265

,

2006 WL 763668

, at *4 (D.Kan. Mar. 24, 2006)

(unpublished) (permitting imaging of defendants’ computer where

defendants’ representation that no responsive materials existed on computer

was contradicted by their production of e-mail created on that computer).

{¶27} Applying the first portion of the Bennett procedure, the court in Scott

Process Sys. v. Mitchell, 5th Dist. Stark No. 2012CA00021,

2012-Ohio-5971

, concluded

that the trial court abused its discretion by permitting forensic imaging of electronic

devices without first requiring the requesting party to show that there had been a

background of noncompliance with discovery. Id. at ¶ 38. Accord Nithiananthan, 12th

Dist. Warren No. CA2011-09-098,

2012-Ohio-431

, at ¶ 9. The Scott Process Sys. court

also concluded that the order for forensic imaging was erroneous where the requesting

party failed to demonstrate that paper production of the records was insufficient or that

the requesting party’s need for forensic imaging outweighed the party’s privacy interests.

Id. at ¶ 37-38; see also

Nithiananthan at ¶ 18

.

{¶28} In this matter, the record does not demonstrate the requisite showing of

defendants’ noncompliance with discovery as mandated under the first portion of the

Bennett procedure. The record demonstrates that FFR was noncompliant with defendants’ request for production of documents during the course of litigation. FFR

also conceded that the parties “failed to reach agreement on terms of a stipulated

protective order creating a standstill in discovery.” In addition, FFR sought detailed

electronic discovery as early as October 2012, or prior to its filing of any motion to

compel discovery. Moreover, under FFR’s proposal, defendants would produce “any

relevant computer hard drives and electronic media” for FFR’s review, then upon

defendants’ compliance, FFR would “produce pursuant to a protective order a subset of

documents[.]” At this time, however, there is no evidence in the record that FFR has

fully complied with discovery, and FFR has already received extensive records from the

Illinois litigation.

{¶29} We acknowledge that FFR sought and obtained a motion to compel

discovery and for sanctions on March 26, 2013, but following that order, FFR filed an

amended complaint with new allegations and obtained additional discovery on May 30,

2013. The record does not demonstrate that the documents FFR sought were being

unlawfully withheld and not available from FFR’s own information or other sources.

Viewing the record as a whole, the showing required under the first portion of the Bennett

analysis has not been met.

{¶30} Therefore, DeJohn and Kump’s first and second assignments of error are

well taken. 2. Protective Protocol

{¶31} DeJohn and Kump’s third assignment of error asserts that the trial court

did not require the protocol for discovery required under the Bennett framework.

{¶32} With regard to the second part of the procedure, the Bennett court clearly held that “the failure to produce discovery as requested or ordered will rarely warrant unfettered access to a party’s computer system,” and that “a court must protect the defendant’s confidential information, as well as preserve any private and privileged information.”

Id.,186 Ohio App.3d 412

,

2009-Ohio-6195

,

928 N.E.2d 763, at ¶ 47

. The Bennett court then outlined a protocol for discovery:

[A]n independent computer expert, subject to a confidentiality order, creates a forensic image of the computer system. The expert then retrieves any responsive files (including deleted files) from the forensic image, normally using search terms submitted by the plaintiff. The defendant’s counsel reviews the responsive files for privilege, creates a privilege log, and turns over the nonprivileged files and privilege log to the plaintiff.

(Citations omitted.) Id. at ¶ 47. Similarly, in Nithiananthan, 12th Dist. Warren No.

CA2011-09-098,

2012-Ohio-431

, the court held that at minimum, an appropriate protocol

requires that an independent computer expert, subject to a confidentiality order, creates a

forensic image of the computer system. Id. at ¶ 20. The expert then retrieves any

responsive files (including deleted files) from the forensic image, normally using search

terms submitted by the plaintiff. The defendant’s counsel reviews the responsive files

for privilege, creates a privilege log, and turns over the nonprivileged files and privilege

log to the plaintiff.

{¶33} Under the second portion of the Bennett procedure, a trial court abuses its

discretion when its judgment entry permits unfettered forensic imaging of a party’s

electronic devices, and contains none of the Bennett protections required to conduct such forensic analysis. Scott Process Sys., 5th Dist. Stark No. 2012CA00021,

2012-Ohio-5971, at ¶ 36

.

{¶34} In this matter, the record does not contain the protective protocol required

under Bennett. Therefore, DeJohn and Kump’s third assignment of error is well taken.

The trial court abused its discretion in ordering forensic imaging of appellants’ computer

hard drives.

{¶35} Accordingly, the judgment is reversed and remanded for further

proceedings consistent with this opinion.

It is ordered that appellants recover of said appellee costs herein taxed.

The court finds there were reasonable grounds for this appeal.

It is ordered that a special mandate issue out of this court directing the common

pleas court to carry this judgment into execution.

A certified copy of this entry shall constitute the mandate pursuant to Rule 27 of

the Rules of Appellate Procedure.

MARY EILEEN KILBANE, JUDGE

KATHLEEN ANN KEOUGH, P.J., and TIM McCORMACK, J., CONCUR

Reference

Cited By
3 cases
Status
Published