ARTICLE
17 August 2017

How To Address Wipers In Trade Secret Cases

SS
Seyfarth Shaw LLP
Contributor
With more than 900 lawyers across 18 offices, Seyfarth Shaw LLP provides advisory, litigation, and transactional legal services to clients worldwide. Our high-caliber legal representation and advanced delivery capabilities allow us to take on our clients’ unique challenges and opportunities-no matter the scale or complexity. Whether navigating complex litigation, negotiating transformational deals, or advising on cross-border projects, our attorneys achieve exceptional legal outcomes. Our drive for excellence leads us to seek out better ways to work with our clients and each other. We have been first-to-market on many legal service delivery innovations-and we continue to break new ground with our clients every day. This long history of excellence and innovation has created a culture with a sense of purpose and belonging for all. In turn, our culture drives our commitment to the growth of our clients, the diversity of our people, and the resilience of our workforce.
As a special feature of our blog—special guest postings by experts, clients, and other professionals—please enjoy this blog entry from Bobby R. Williams, Jr., a senior consultant at iDiscovery Solutions.
United States Intellectual Property
To print this article, all you need is to be registered or login on Mondaq.com.

As a special feature of our blog—special guest postings by experts, clients, and other professionals—please enjoy this blog entry from Bobby R. Williams, Jr., a senior consultant at iDiscovery Solutions.

When litigation looms or a data preservation notice is sent out, key individuals or parties might try to delete data to avoid discovery – despite well-publicized horror stories regarding data destruction, phone and email wiping, and the risks of spoliation and sanctions. In many cases, if we find an absence of evidence during an examination, we typically also find evidence of destruction. We refer to these individuals as "Wipers."

Wipers are the folks who roll the dice and try to game the system. They have enough knowledge to know how to destroy data, feel like they can get away with it, and take a chance. "The document is gone, aha!" might say the Wiper. However, Wipers still run into problems they didn't anticipate. Even if they manage to delete or destroy the incriminating document or email, they've usually taken the time to install and run data destruction software, leaving behind associated artifacts showing the download and usage of such software. Another thing Wipers usually don't consider: they leave behind other artifacts and data that gives us a clear picture of the document. Data showing when the document was created or modified, the folder it was saved in, even who opened it, when, and how many times. In trying to cover up the original footprints, they invariably left new footprints. And sometimes, even when a Wiper believes they completely deleted the document itself, it sometimes resides in a snapshot or backup they did not see.

"Amateurs!" says the super-duper IT-savvy group of Wipers with IT backgrounds. This group of Wipers takes it to another level – they sometimes wipe their entire hard drive, install a fresh instance of their operating system, and rebuild their system from scratch. "The whole computer is gone, aha!" These Wipers have no choice but to own up to what they did. Hard drives do not yet wipe themselves. As a client once told me, nothing says "culpability" like a freshly-wiped hard drive that was wiped when it should have been preserved.

On a recent project, iDS took possession of a computer used by a long-time office administrator who worked for the defendant for several years. Examination of the computer's hard drive showed that it appeared to be brand new – it was never used. The drive did not even have a user profile for the administrator, despite the computer being used daily. It turns out the administrator opted to have IT wipe their hard drive before providing it to counsel. Instead of handing over their documents and email for preservation, the administrator now how had to explain to management and legal counsel why they instead chose to destroy all the data on their computer. A potential case destroyer, but at the very least, a move that usually leads to sanctions or adverse inference instructions.

At the end of the day, Wipers pretty much announce to everyone that they're wiping. Facing the music is often the easiest route, and it certainly puts counsel in the best position to protect their client.

The content of this article is intended to provide a general guide to the subject matter. Specialist advice should be sought about your specific circumstances.

ARTICLE
17 August 2017

How To Address Wipers In Trade Secret Cases

United States Intellectual Property
Contributor
With more than 900 lawyers across 18 offices, Seyfarth Shaw LLP provides advisory, litigation, and transactional legal services to clients worldwide. Our high-caliber legal representation and advanced delivery capabilities allow us to take on our clients’ unique challenges and opportunities-no matter the scale or complexity. Whether navigating complex litigation, negotiating transformational deals, or advising on cross-border projects, our attorneys achieve exceptional legal outcomes. Our drive for excellence leads us to seek out better ways to work with our clients and each other. We have been first-to-market on many legal service delivery innovations-and we continue to break new ground with our clients every day. This long history of excellence and innovation has created a culture with a sense of purpose and belonging for all. In turn, our culture drives our commitment to the growth of our clients, the diversity of our people, and the resilience of our workforce.
See More Popular Content From

Mondaq uses cookies on this website. By using our website you agree to our use of cookies as set out in our Privacy Policy.

Learn More