• Technologies
    • Review Platforms
    • ILS Social Media Data Analysis Suite
  • Consulting & Services
    • Consulting
    • Forensics & Collections
    • Review Platform Hosting & Management
    • Managed Review
    • Our Experts
  • AI Resources
  • ILS Articles
  • Company
    • About Us
    • Careers
    • Support
    • Contact Us
  • ILS
  • Sales
  • Support
  • Technologies
    • Review Platforms
    • ILS Social Media Data Analysis Suite
  • Consulting & Services
    • Consulting
    • Forensics & Collections
    • Review Platform Hosting & Management
    • Managed Review
    • Our Experts
  • AI Resources
  • ILS Articles
  • Company
    • About Us
    • Careers
    • Support
    • Contact Us

August 22, 2014

When Is Forensic Imaging Not Warranted?

by Alan Brooks

Forensic imagining typically entails preserving the contents of a custodian hard drive or server. Expert computer forensic services can also be complex as far as sensitive information is concerned. This begs the question of when does forensic imaging become an unwarranted option in the discovery process. The court answered this question in Boston Scientific Corporation v. Dongchul Lee Case Nos. 5:14-mc-80188-BLF-PSG, 1:13-cv-13156-DJC (N.D. Cal. August 4, 2014).

Dongchul Lee (Lee) was hired by Boston Scientific Corporation (BSC) as a senior biomedical system engineer, and his work explored low frequency spinal cord stimulation (“SCS”) devices that helped to mask pain from paresthesia.

While at BSC, Lee entered into a confidentiality agreement. After resigning, Lee went to work for Nevro the following month. Lee’s work at Nevro involved high frequency SCS devices. BCS sued Lee, but not Nevro, alleging that he had breached his confidentiality agreement and trade secret law.

BCS served a subpoena on Nevro, and after a meet-and-confer, requested production and a complete forensic image of:

1. Lee’s first laptop that was assigned to him at the start of his Nevro employment and used to perform job duties and communicate with attorneys; and

2. Lee’s second laptop from Nevro, assigned as a replacement once the first laptop was segregated due to litigation, and which was used for attorney communication and confidential work-related matters.

Nevro first contended that it has already produced information about the contents of the first laptop in the form of listing reports that disclosed extensive metadata, USB reports, and web browsing history reports. Secondly, Nevro stated that the second laptop was used by other employees, including the former director of compliance, who handled very sensitive issues.

Nevro even went as far as offering to have an independent vendor review a full forensic image of only the first laptop, including any deleted files, to search for pertinent information. However, BSC refused this offer.

The court stated that there is no doubt discoverable information exists on the two laptops, but:

1. Because Lee only began using the second laptop at issue in this case after the litigation began, there is no question that the laptop is not discoverable;

2. Demanding the complete forensic image of laptops belonging to a direct competitor is too much;

3. Complete forensic images would disclose privileged communications related to the litigation as well as irrelevant trade secrets from a nonparty-competitor; and

4. Forensic imaging is a highly invasive procedure that engenders the risk of unanticipated, accidental disclosure of crown jewels. This threat is particularly pronounced in competitor-competitor litigation, like this one.

As such, the court ruled that the risks attached to forensic imagining were simply too great to permit such unchecked discovery.

 

ILS – Plaintiff eDiscovery Experts

Categories: Forensics, Metadata

ILS
17744 Sky Park Circle, Suite 270
Irvine, CA 92614
(888) 313-4457
sales@ilsteam.com
  • About ILS
  • Consulting
  • Forensics & Collections
  • Review Platform Hosting & Management
  • Managed Review
  • Sales
  • Support
  • LinkedIn
  • X

© 2025 ILS.

  • Privacy Statement
  • Cookie Statement
  • Terms of Use/Legal
ILS
Manage Cookie Consent
We use cookies to optimize our website and our service.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}