We were retained to investigate accusations that a special education teacher had been browsing the internet for adult content, including suspected child pornography. The school’s web traffic monitoring software had flagged a site the teacher had visited. Given the severity of the accusations, the school executives wanted to verify with certainty that the allegations were accurate.
Case Study
Plaintiff’s Attorney in Wrongful Termination
The Situation
The Plaintiff was a cashier who was terminated after she reported to HR that she had been the target of extremely inappropriate behavior from her Supervisor. She reported that he made lewd comments and that twice he had pressured her into sexual intercourse. The plaintiff’s Attorney filed a complaint on her behalf alleging that the defendant’s employer had failed to prevent sexual harassment and had retaliated against and wrongfully terminated Plaintiff.
The Challenge
The wrangling over discovery began almost immediately. At issue was the Supervisor’s personal computer. The plaintiff’s Attorney wanted to have an ArcherHall digital forensics expert examine the computer data for communications between the Plaintiff and the Supervisor. Defense Counsel had produced some responsive data, but Plaintiff’s Attorney knew that certain communications would be harder to get. These included deleted photos, videos, and messages, and app-based communications, such as Facebook Messenger and Viber.
The Solution
ArcherHall had forensically collected the data from Plaintiff’s phone as well as from an iPod Touch, which Plaintiff said she had used to communicate with her Supervisor. Out of frustration or embarrassment, Plaintiff had deleted most of these messages. ArcherHall was able to recover enough messages to show that relevant communications had occurred between Plaintiff and her Supervisor on the Supervisor’s personal accounts. This increased the strength of the Plaintiff’s Attorney’s argument that the Supervisor’s personal computer should be made available for a full forensic examination to capture a more complete record of those communications, including metadata.
The Outcome
To address the Defense Counsel’s objections, ArcherHall used a Triangle Agreement. This document provided a clear protocol for the examination of the computer that balanced the need for relevant data against the Supervisor’s privacy. ArcherHall forensically examined the computer and captured all data that met certain criteria agreed to by the Parties. ArcherHall then provided this data to the Defense Counsel to review for privilege. ArcherHall then provided the non-privileged data and a privilege log to the Plaintiff’s Attorney.
Key Success
The result of ArcherHall’s work was relevant messages, photos, and videos — many deleted — which otherwise Plaintiff’s Attorney may not have had access to. The case was settled shortly thereafter.
We are a leading provider of computer forensics and e-discovery services for businesses and law firms nationwide. We don’t take chances with your data when litigation is a possibility, and proper handling is critical.
Related Case Studies
Digital Theft of IP
Our client was a corporation investigating suspected theft of intellectual property by a former employee. The employee had left for a competitor, allegedly taking proprietary customer and technical data with him. The client suspected the defendant had attempted to cover his tracks by wiping his computer. The case ultimately involved multiple computers, external media, and mobile devices.the crime.