White SW Computer Law
Intellectual Property, Information Technology & Telecommunications Lawyers
Melbourne Office - PO Box 452, COLLINS STREET WEST Victoria 8007 Australia
Sydney Office - GPO Box 2506, SYDNEY New South Wales 2001 Australia
Telephone: Melbourne Office - +61 3 9629 3709 Sydney Office - +61 2 9233 2600
Facsimile: Melbourne Office - +61 3 9629 3217 Sydney Office - +61 2 9233 3044
Email: wcl@computerlaw.com.au Internet: http://www.computerlaw.com.au

User Tools

Site Tools


discovery2

DISCOVERY OF ELECTRONIC DOCUMENTS

Steve White, Principal - White SW Computer Law

INTRODUCTION

Discovery involving electronic documents such as email or software source code poses many issues that do not arise as commonly with traditional paper documents.

These issues include:

  • Working out which documents are discoverable or not. Having regard to the quantity of electronic documents generated by businesses and the variety of data sources (emails, electronic records etc) used these days this has become a much more time consuming task than in the past.
  • Numerous Copies. The ease of duplication and the propensity to have multiple copies of data (in various versions for backup and other purposes) leads to multiple intermediate versions of the same document being in existence for possibly years after the final document was created. The strict obligation to discover copies of all documents becomes particularly important in this regard.
  • Unforeseen or Unintended Copies. Many copies of the document are created by machines in the ordinary course of processing such documents. These documents or the information stored in each different document can be very significant and have real impact on the proceedings. However, without significant technical expertise and understanding of the computer systems involved these documents are often lost or not discovered.
  • Are the known documents recoverable? In many cases, backup storage techniques may have utilised superseded hardware and software and the examination of the media can be very difficult when the storage media is not compatible with modern equipment - for example tape backups have over the years utilised different recording formats and smaller and smaller tape spooling devices. Backup tapes are not usable unless you have a tape reader that is designed to read and house that particular sized tape cartridge.
  • Who has control of the documents? When off site records are involved, it should be asked who has possession and control the data and whether such documentation should be subpoenaed rather than discovered, for example web site logs stored by an Internet Service Provider.
  • Additional Costs. The abovementioned factors all mean that discovery is a complex and expensive exercise the costs of which could amount to a significant percentage of the amount in dispute. Particular consideration needs to be given to the costs involved in ascertaining which documents are discoverable or not, searching for same and retrieving data including the time and equipment involved.

This article will examine these issues in more detail in the light of recent case decisions.

PRELIMINARY DISCOVERY OF ELECTRONIC DOCUMENTS

To understand the importance of discovery in relation to electronic documents it is useful to look firstly at its application in a preliminary discovery scenario.

In matters involving information technology disputes or copying of electronically stored materials, preliminary discovery of electronic documents can play an important role in collecting evidence and identifying potential defendants and causes of action. Often such cases involve incidents in which software or other electronic data is more crucial to the determination of a matter than may be the case in a normal commercial transaction which has merely been documented electronically.

In the matter of A2B Telecommunications Pty Ltd v Hinkley & Anor1) the plaintiff sought an order pursuant to Rule 32.05 that the defendants make discovery of specific documents.

The plaintiff alleged that the first defendant, Adam Hinkley ( “Hinkley” ) had been an employee of the plaintiff from October 1995 until September 1997 and during the course of his employment, had developed source code for certain computer software applications.

The plaintiff further alleged that prior to resigning from the employ of the plaintiff (without notice) and moving to Canada, Hinkley deleted or encrypted all copies of the source code he had been developing on the computer systems of the plaintiff.

In related proceedings Hotline Communications Ltd & Ors v Adam Hinkley & Ors Hotline Communications ( “Hotline” )2) obtained in 1998, by way of an Anton Piller Order, copies of source code for various software applications and related materials from Hinkley and other parties. Hotline claimed, amongst other things, that Hinkley had deleted certain source code from computers at Hotline Communications' premises in Canada and had left in similar circumstances to those of his departure from A2B.

A2B sought preliminary discovery of the materials obtained by Hotline by way of the Anton Piller order to determine whether the source code developed for Hotline by Hinkley was the same or substantially the same as the product developed by Hinkley during the course of his employment by A2B.

It was found by Warren J that notwithstanding A2B's suspicions, it could not know of any similarity between the respective source code until it had the benefit of inspection of the documents it sought to be discovered.

Following inspection, litigation was subsequently successfully undertaken by A2B against Hotline, Hinkley and other parties based upon the similarities found between the source code, the other electronic information which was discovered and the analysis that this made possible.

An application for preliminary discovery need not be for specific documents it may also be used in order to identify a respondent3). London Economics (Aust) Pty Ltd v Frontier Economics Pty Ltd4) is an example of a matter in which the applicant sought discovery by certain parties then employed by the respondent (who had been formally employed by the applicant) of materials including, amongst other things, computer programs, data files, computer tapes and CD-Rom disks containing relevant information. The applicant satisfied the Court that in compliance with Federal Court Rules O 15A r3 and r6 (see appendices 1 and 2) that it had made reasonable inquiries to elicit the relevant information and its inquiries had been unsuccessful.

In following Gobbo J in G Breschi & Son Pty Ltd V AFT Ltd5) , Finkelstein J found that whilst it was not a legitimate use of O 15A, r3 for “identified potential defendants” to be examined about their own involvement, the rule can be used in a case where there are many prospective defendants, none of whom have been sufficiently identified as potential defendants, to ascertain who might be the proper defendant.

Electronic documents may be particularly useful in such discovery because they often contain within the document itself a record of who has accessed, modified or printed the document and the time and date of such use.

Applicants must bear in mind though that the cost of such electronic discovery may be high and as in this matter, the person seeking such discovery, may be required, in the first instance, to pay for the costs associated with discovery.

Discovery and inspection before suit was also sought in the matter of Sony Music Entertainment (Australia) Ltd v University of Tasmania6). The respondents (three Australian universities) had agreed to take a copy of information held by them on electronic backup tapes, CD ROMs and computer hard drives at specific points in time pending the hearing of the preliminary discovery application.

The respondents opposed the application for preliminary discovery, disputing the application of Federal Court Rules O15A r3 on the grounds that the applicants should not be entitled to discovery of material which includes documents that fall outside the scope of documents relating to the description of the person allegedly involved in the distribution of copyright protected sound recordings using the respondents' computer networks.

The applicants contended that computers belonging to the respondents permitted hosting of websites on university computers. After discovering a number of MP3 music files on one of the University of Tasmania's servers on 20 December 2002, the International Federation of Phonographic Industry wrote to the University of Tasmania ( “the University” ) requesting it to take steps to prevent the distribution of copied sound files by a website housed on one of its servers.

By 7 January 2003, the website was unavailable or had been removed. The applicants sought to have a backup copy made of data on certain parts of the server in question, which was commenced by the University on 22 January 2003.

On 24 January 2003, a copy was made of all data on the hard disk of the person identified as being responsible for the creation of the website in question. This data was examined by a representative of Music Industry Piracy Investigations ( “MIPI” ) who identified over 400 copies of digital music files.

The applicants sought discovery of the preserved material by way of preliminary discovery , pursuant to Federal Court Rules O15A r3 and r6 on the basis that the records would assist in determining who made, or assisted in the making of copies of the sound recordings and in deciding whether the making of the infringing copies had been authorised, aided or abetted by the University.

The applicants sought orders that the respondents permit inspection of the documents by the applicants, MIPI and their employees, legal representatives and a forensic investigator.

The University proposed orders that required it to only deliver a subset of the preserved material, which was considered by the University to be relevant, on a confidential and privileged basis.

The Court was also asked to decide whether CD ROMs and backup tapes are “documents” as defined by the Federal Court Rules. Tamberlin J considered that as there was a body of authority that had previously found electronic records and computer databases to be documents and the fact that electronic records such as computer files and CD ROMs have been the subject of discovery orders in earlier Federal Court matters, the Court should find that the CD ROMs and backup tapes in question were “documents” . The Court also held that it was the CD ROM or tape itself that came within the definition of a document rather than, as contended by the respondents, the individual files stored on that media.

Having been satisfied that the required nexus between the documents and the matters sought under O15A r3 and r6 existed, the Court ordered that the forensic investigator nominated by the applicants be given access to the complete copies of the preserved materials. The Court accepted the applicants' arguments that the proposed subset of data suggested by the respondents was too narrow, and ordered that the forensic investigator use forensic methods and appropriate software to extract the relevant material, under the supervision of the respondents.

The material so extracted was then to be examined by the respondents and their legal advisors to determine whether they or any third parties had any claims for privilege or confidentiality.

The respondents were then required to make an affidavit of discovery including all information produced on the search which the respondents say is discoverable, claiming privilege or confidentiality, as appropriate.

The applicants would then be able to inspect the documents so discovered.

The final orders made7) limited discovery to parts of the documents which:

  1. related to the description of a person or persons for the purpose of any applicant commencing a proceeding in the Court against that person or persons in respect of infringement of copyright in any sound recordings owned by that applicant (as identified in the applicants' affidavits or notified to the respondents within 14 days of the date of the orders) relating in any way to three named people on whose computer hard disks MIPI had identified the infringing copies of digital music files or their websites; or
  2. related to the question whether any applicant has the right to obtain relief in the Court from the respondents in respect of any infringement of any copyright in sound recordings owned by that applicant (as identified in the applicants' affidavits or notified to the respondents within 14 days of the date of the orders) relating in any way to three named people on whose computer hard disks infringing copies of digital music files had been identified or their websites, being documents of a kind that inspection would assist the applicant in making a decision whether to commence a proceeding in the Court to obtain that relief.

By making in the orders in this form, the Court sought to provide, as far as possible, the same protection to the respondents in relation to their electronic documents as is normally provided by segregation or masking out of information in paper documents.

THE RELATIONSHIP BETWEEN ANTON PILLER ORDERS AND DISCOVERY

In disputes involving large amounts of information available only in electronic form, it is easy for that information to be destroyed either deliberately by the parties involved once they have knowledge of the pending proceedings or through routine overwriting of data as part of normal operations.

In such cases, if a “snapshot” of the data as it appears on the working computer systems can be taken before the parties have knowledge of the proceedings, crucial evidence can be preserved that might otherwise be quite costly to recover.

In Universal Music Australia Pty Ltd v Sharman License Holdings Ltd8) two notices of motion seeking discharge of Anton Piller orders were considered by the Court.

Wilcox J stated that “ In an ideal world, it would be preferable for parties not to need to resort to Anton Piller action. However, where the case sought to be made by a party depends upon demonstrating the operation of a dynamic system, it is difficult to see any alternative to the taking of snapshots of the system in operation, thereby preserving evidence of what the dynamic system was doing at the moment of inspection.

His Honour considered that it was “ an essential part of the applicant's case to put evidence before the Court about the dynamic operation of the Kazaa system, as distinct from its structure. As his Honour stated, “the operation of the Kazaa system does not depend only (or even principally) upon the action then being taken by the respondents &, but upon the actions of countless other participants using the system the respondents have allegedly created. I do not understand how it could be ensured that these participants would act in a normal and natural way in an organised demonstration.

To the extent that any static data was copied, the files were to be extracted and copied and then held by a forensic expert, without further analysis, until further order of the Court. Anything of a static nature would be treated like a discoverable document and was not to be inspected until the appropriate time.

The role of Anton Piller orders is to preserve evidence and the scope of material that may be seized needs to be very carefully defined. Where data is obtained that falls outside the scope of the Anton Piller orders, the access to this material is governed by the rules of discovery. Leave to appeal the decision of Wilox J was denied by the Full Federal Court9) . Black CJ, Emmett and Stone JJ considered that as access to the seized material that fell outside the scope of the Anton Piller orders would be on the same basis as normally available on discovery, there was ”an orderly process for the management of the seized material in which the interests of both parties will receive due consideration“.

POST ISSUE DISCOVERY

Discovery was first introduced in nineteenth century English equity procedures and aims to provide the parties access to all of the relevant documentary evidence in each party's possession so as to prevent “ambush” at trial and to ensure that litigation is decided on its merits10).

The process involves an exchange of lists of documents which are usually verified by an affidavit following which each party may inspect the non-privileged documents set out in the opposing party's list.

Discovery is an invasion of the privacy and confidentiality of litigants but is incorporated into legal procedure because the public interest in ensuring justice is done between parties is considered great enough to outweigh the interest in maintaining confidentiality11).

However, discovery is not directed towards assisting a party on a “fishing expedition”. Only documents, which relate to the matter in issue, are discoverable, with it being sufficient justification that the document would, or would lead to a train of inquiry which would, either advance one party's case or damage that of his adversary12).

The Federal Court rules O15, r 15 (see appendix 3) requires that the Court be satisfied that an order for discovery is, at the time when the order is made, necessary in the interests of a fair trial13). Practice Note 14 (see appendix 4), issued by the Chief Justice in 1999, makes it clear that general discovery will not usually be ordered. As a result, it is common practice for parties to categorise and limit the documents which they will seek and provide access to. The choice of such categories should be related to the pleadings in the matter to assist in minimising the scope of discovery to a reasonable level.

Whether and when discovery will be ordered depends upon the nature of the case and the stage of the proceedings at which the discovery is sought14).

A party is not compelled to discover a document which would tend to subject him to a penalty and discovery will not be ordered in proceedings which are analogous to proceedings to enforce a penalty15). A party may also refuse to produce any document that may tend to bring him into the peril and possibility of being convicted as a criminal , which may be useful in cases where electronic documents may provide evidence of criminal activity such as copyright infringement. However, seeking to avoid discovery on such a basis may be prejudicial to the party's credibility.

Where a party has been required or ordered to give discovery, they are under an ongoing obligation to discover any document not previously discovered and which would be necessary to comply with the requirement or order16). This means that in cases where further backup tapes are located or data is successfully recovered that was previously unreadable a supplementary affidavit of documents must be prepared and supplied to the other party.

After a directions hearing under Order 10, any party may, with the leave of the Court, require any other party to give discovery of documents17). Although there is no express limit on discovery, the Federal Court may limit discovery under Order 15 r3 where appropriate. In cases involving vast quantities of electronic documents, the parties may be able to request that the scope of inquiry in relation to the electronic records be limited to avoid the sometimes great expense of recovering data, where there is little chance of useful information being supplied.

”& the process should not be allowed to place upon the litigant any harsher or more oppressive burden than is strictly required for the purpose of securing that justice is done.18)

DOCUMENT DESCRIPTION

Federal Court O 15 r6(3) provides that ”A list of documents shall enumerate the documents in a convenient sequence and as shortly as possible, but shall describe each document or, in the case of a group of documents of the same nature, shall describe the group, sufficiently to enable the document or group to be identified“.

In Kyocera Mita Australia Pty Ltd v Mitronics Corporation Pty Ltd19) Kyocera sought a list of each document otherwise identified only by categories for which legal privilege was claimed by Mitronics. Kyocera wanted each document to be specifically identified and a description of each document so that Kyocera could verify whether what was in the privileged lists was in fact properly privileged documents. Stone J declined to make the requested orders as the categories of documents had been identified not by description of the legal privilege that is claimed but by description of the documents themselves and that the costs involved in a matter that has been going for such a long period of time as this far outweigh any benefit from identifying and describing the documents individually in the way [sought by] Kyocera.

This case is not surprising as significant and unnecessary costs can be incurred by laboriously producing lists of all electronic and paper documents (not just privileged or confidential documents) which ultimately does little to resolve the issues between the parties and or assist in the preparation for trial.

CRITICISMS OF DISCOVERY

Common criticisms of discovery include:

  • Objectives of discovery are not achieved due to discovery being used as a delaying tactic, a fishing expedition or as a process to add to the other side's litigation costs; and
  • When useful, discovery is at too great a cost.

If the costs of complying with orders for discovery are excessive they should be brought to the attention of the Court. In cases involving vast quantities of electronic data, accurate estimates of the cost of providing information in a useable form should be determined and where appropriate used to limit the required scope of investigation. If discovery orders are made by consent, there may be no consideration by the Court of the reasonableness of discovery, or analysis of the possible cost and benefits of the process.

Discovery ought not to be used by litigants as a weapon with the purpose to delay, harass or drive the other party, by exhausting their litigation funds or by otherwise forcing an early settlement. Demanding or producing an overwhelming amount of irrelevant documents or withholding documents can impose a high cost as can excessive legal arguments relating to access to documents.

Options for controlling discovery through more intervention by the Court include

  • Keeping the level of discovery proportionate to the type of case;
  • Encouraging parties to confer and concur on the scope of discovery; and
  • Greater use of 'informal discovery' involving the exchange of relevant documents without the need for verification.

Some of the principles relevant to an application for discovery were summarised by Finn J20) as follows:

  • A party does not have an unqualified right to discovery under the Federal Court Rules.
  • General discovery will not be ordered as of course, discovery commonly being ordered only in relation to particular issues or defined categories of documents.
  • The rules of court do not place on judges the responsibility of determining for the parties which of their respective documents are required to be discovered. Judges have not traditionally assumed such a role.
  • Where a proceeding is one for judicial review, discovery in that proceeding is not to be treated otherwise than according to the normal principles applicable in civil proceedings. Nonetheless, the nature of judicial review proceedings is commonly such either that the occasion for making an order will not arise or that discovery will only be ordered in relation to a particular issue or issues.
  • Whether or when discovery will be ordered depends on the nature of the case and the stage of the proceedings at which the discovery is sought
  • With the rules of Court having prescribed the method by which parties can obtain discovery or further discovery, and having regard to the constraints imposed on discovery, it is impermissible to attempt to achieve discovery through resort to the subpoena process.

These points do not outline the circumstances in which a Court will regard an order for discovery as necessary in the interests of a fair trial. However, important considerations must be the nature of the case and the stage of the proceedings at which discovery is sought.

In relation to discovery orders in doubtful cases, Brennan J21) stated that ”discovery [may be] given to a party before he was required to give particulars of his claim & [where] sufficient is shown to ground a suspicion that the party applying for discovery has a good case proof of which is likely to be aided by discovery“.

This was contrasted with the case where ”the proceeding is essentially speculative in nature“.

In matters involving vast quantities of electronic records, the hurdle to get over in relation to showing a party is “likely to be aided by discovery” should perhaps be set a little higher to avoid the situation where one party is forced to sift through huge amounts of documentation for items which they contend will be of little assistance to the other parties to the litigation.

Before extensive data recovery is required, the parties should be given the opportunity to depose as to what the electronic records are likely to consist of and why these materials are likely to be of little assistance to the other parties.

PROBLEMS ASSOCIATED WITH DISCOVERY OF EMAILS & OTHER ELECTRONIC DOCUMENTS

The Federal Court Rules define the word “document” to include any material data or information stored by mechanical or electronic means22). This definition says nothing about whether such electronically stored documents must be in a readable format or not. As a result, any data stored by the organisation must be considered when providing discovery and an appropriate discovery strategy devised and agreed.

Despite conventional backup strategies resulting in periodic overwriting of backup media, the possibility that copies of documents may exist dating back several years due to lapses in applying the backup strategy or retention of copies which would normally have been discarded - for example when a backup tape is suspected of being faulty, it may be stored and not re-used rather than being discarded. This could potentially mean that years of data will need to be reviewed to determine whether it includes any discoverable documents.

Usual backup procedures will need to be reviewed during litigation. The obligation to not destroy relevant evidence during litigation needs to taken into account so that electronic documents that only exist in electronic form on backup tapes are not destroyed by subsequent overwriting.

Important issues to note about email correspondence is that emails are often informal (people say things that they ordinarily would not), they are time stamped, they are written and they are very hard to delete. The explosive cross examination power of emails has been underpinned in numerous recent matters, for example, the Microsoft anti-trust litigation, the Channel 7 trade practices litigation and the Australian Wheat Board inquiry.

In the matter of BT (Australasia) Pty Ltd v State of New South Wales & Anor (No 9)23) a large amount of discoverable material existed as emails, backup tapes and other electronic documents. BT (Australasia) Pty Ltd filed a motion which claimed that Telstra Corporation Ltd ( “Telstra” ) had failed to comply with its discovery obligations in respect of electronic communications such as emails and other electronic documents and had failed to take appropriate steps to prevent the destruction of discoverable documents, including documents in electronic form.

In this matter, Telstra was found to have backup tapes dating back several years despite standard procedures being in place that would normally prevent such long term storage by overwriting data tapes. In his judgment, Sackville J stated that ”I do not think that technical sophistication is a prerequisite to a litigant or its advisors making inquiries to ascertain whether discoverable electronic communications or documents have been recorded and retained in a retrievable form“. It would seem that the excuse that retrieval and reviewing stored data is difficult and time consuming will not be accepted by the Court.

A similar stance was taken by Mansfield J in NT Power Generation Pty Ltd v Power & Water Authority24). The respondents sought an order that the discovery of email communications be limited to discovery of email communications which, since the order for discovery was made, have existed in hard copy form. His Honour was not persuaded that, in the interest of justice, the respondents ought be excused from giving discovery of email communications retained only electronically not withstanding the time, expense and effort involved in doing so.

Accordingly, the rules governing the use of email, particularly to external parties should be carefully considered as it is common for email correspondence to be less carefully worded than other forms of correspondence, particularly when it is not proof read before being sent. Employers should also consider the use of disclaimers or limitations on the use of email as there is a tendency for email messages to reflect the preliminary thoughts or ideas of an employee that may not have been reviewed by the employer. Such emails may be construed by the Court to reflect the employer's view.

Once a policy has been developed in relation to the use and storage of email and other electronic documents, it is important for management to liaise with the information system managers in relation to backup procedures. It is commonly considered that backup information should be saved for long periods with the view that “longer is better”. Particularly if an organisation is in a litigation prone industry, there should be established procedures to periodically delete electronically stored documents from the backup media to reduce any potential burden imposed by the discovery process.

Of course such procedures need to be implemented in conjunction with a review to ensure that the organisation has adequate documentation that would be of assistance to it in the course of any future litigation, otherwise stored. The removal of backed up materials should be done in a systematic way to reduce the likelihood of a heavy burden in relation to discovery being forced upon the organisation rather than from the view of destroying all possibly incriminating evidence. The Court has on occasion ordered that documents be discovered even though a document may have been deleted25).

Should there be a requirement for the term of retention being at least as long as any applicable statute of limitations or regulatory review period? At the moment, there are no such restrictions in Australia specifically directed toward electronic documents, but this may be an area of change in the future as more documents are stored only in electronic form.

However, having a backup and purging policy in place is only effective if the policy is implemented correctly - for example, have you considered what is done with discarded backup tapes? Are they simply thrown in the rubbish or is an effort made to physically destroy the media so that any stored data is irretrievable. Similarly, storage media that has been overwritten may be able to be manipulated in order to recover the earlier recorded material if the time and effort is justified.

Internal housekeeping will reduce the burden of discovery, but it does not mean that copies of electronic documents will not be stored by, for example, the recipient of email messages, on disks and backup tapes of intermediate external IT systems used to transmit the email message, third party internet service providers or merely on employees' laptops. Should a party's obligations in relation to discovery be interpreted so widely as to encompass all these possible data repositories? It would seem unlikely that such an order would be made unless there was a very high probability that further relevant material would be retrieved that is otherwise not available.

It is very dangerous to assume that merely due to thoroughly implemented internal periodic deletion of electronic records that further copies of certain documents, for example emails will not exist externally to the organisation's IT system. While inquiries regarding third parties' backup procedures may have been made, if there is no control over the implementation of those procedures or subsequent changes to the procedures the possibility of copies of documents being in existence must not be discounted. As an example, a programmer may keep an annual backup indefinitely due to previous experiences involving data loss. When information has been recorded even inadvertently or without the knowledge of the parties it may be admissible as evidence unless otherwise considered by the Court, for example, the Court may consider interception of email messages to be analogous to the interception of telephone conversations.

The possibility also exists that a party may claim that legal professional privilege for electronic documents has been waived as a result of intentionally giving a copy to a third-party for reasons other than providing legal advice, for example for purposes of communication or storage at a data centre or outsourcing facility.

Even if emails themselves are not recorded by third parties, automatic recording of information for billing purposes documenting the message transmission time, time and date of transmission, author address, and recipient address may be relevant if one party is aided by the confirmation of communication between parties regardless of the content of such communication. For instance, one party may be claiming that a message had been sent on a particular day, and the other party denies receiving it on that day, a mail log could be introduced as proof of sending the message. The time and “blind carbon copy” addresses can in certain cases be critical. This may be particularly useful if the parties are in dispute in relation to the timing of offer and acceptance in contractual negotiations, or say, prosecutions for insider trading . A mail log could also be used to show that an affidavit of documents does not include all email messages exchanged between the parties.

COMPUTER FORENSICS

Electronic data can be easily lost, damaged, hidden or password protected preventing easy access. This may occur by accidental or malicious file corruption or loss, hardware failure or virus activity. In such circumstances, a computer forensics expert may be required to extract and interpret data held on electronic storage media.

The ability to retrieve data in this way raises the questions of which party should be responsible for the costs of such data recovery and whether the rules of discovery compel a party to retrieve such data if its existence is known to a party.

An example where computer forensics were used was in Sony Computer Entertainment Australia Pty Ltd v Jakopcevic26) in which the respondents were involved in manufacturing and distributing CD Roms infringing Sony's trade marks. The respondents deleted records from their computer systems, but these deleted records were able to be recovered.

Federal Court Practice Note 14 states that ”In determining whether to order discovery, the Court will have regard to … the resources and circumstances of the parties, the likely cost of discovery and its likely benefit.

As found by Burchett, J in Murex Diagnostics Australia Pty Ltd v Chiron Corporation27), discovery may not be ordered in circumstances where it would be burdensome for one party without commensurate benefit being derived by another party.

It is important for the Courts to bear in mind that while computer forensics makes a wider range of data recovery and analysis technically possible, the associated costs need to be limited to a scale in keeping with the issues and quantum in dispute.

When responding to a notice for discovery, the party from whom discovery is sought should consider requesting the Court to make an order apportioning the costs of data recovery and analysis equally between the parties (or in some other proportion deemed suitable). Where the existence of useful information is disputed they should request an order that in the event that no useful data is obtained, that the party seeking discovery bear the whole expense of the data recovery and analysis.

DISCOVERY OF ELECTRONIC VERSIONS OF DOCUMENTS DISCOVERED IN HARD COPY

Many businesses store vast amounts of information in databases as such data can be manipulated to generate reports of subsets of the total data. For example, a database may contain the names and addresses of an entire customer list for a business. By designing a suitable “query”, a report can be generated listing only the customers located in a particular suburb rather than the entire list of customers.

If discovered documents were generated from data stored in a database, should the entire database have to be discovered? This could be potentially useful for the other party as they may be able to generate reports that otherwise did not exist and which may assist in their preparation for trial.

In Kyocera Mita Australia Pty Ltd v Mitronics Corporation Pty Ltd28) Kyocera sought discovery of Mitronics electronic database which was a summary of the service history for its customer's copier machines arguing that it could be used to produce useful information not yet supplied by Mitronics. Mitronics had already given discovery by providing hard copies of the relevant documents (such as invoice details) and had argued that the database contained a large pool of information that included every facet of Mitronics business. Kyocera argued that the information should also be discovered in electronic format. Although there are ways around this problem, for example limiting access to the parties' legal representatives and independent experts, the court declined to make the orders sought. Kyocera was unsuccessful in its application for leave to appeal this point on the basis that a hard copy version of the relevant information had already been supplied.

CONCLUSION

The rules governing discovery need to be constantly reviewed as our use of electronic documents and communication methods increase. Consideration needs to be given to:

  • Greater emphasis on particular discovery;
  • Greater emphasis on who is responsible for the costs of discovery at first instance;
  • Greater emphasis on complete indemnity costs being awarded in circumstances where discovery was ordered and was later found to be completely unnecessary;
  • The party seeking discovery's strategy - What documents does it need? Who has those documents? What costs are involved? Is the request practical? Does it need discovery experts?
  • The party resisting discovery's strategy - Is the request relevant? Is the request necessary? Who is responsible for the cost?
  • The person from whom discovery is being sought - pre-discovery strategy - what records should be kept - for how long?
  • Whether the rules should be amended having regard to the large amounts of commercial data that is only stored in electronic form;
  • Whether the Court should be assisted by any third party such as a special referee in relation to discovery applications where electronic documents are involved; and
  • Whether or not discovery is being misused.



STEVE WHITE & SARAH PIKE
WHITE SW COMPUTER LAW
FEBRUARY 2006

www.computerlaw.com.au

© White SW Computer Law 2006

This paper is a guide only and should not be used as a substitute for legal advice, readers should make their own enquiries and seek appropriate legal advice.


Appendix 1

FEDERAL COURT RULES - ORDER 15A RULE 3
Discovery to identify a respondent

  1. Where an applicant, having made reasonable inquiries, is unable to ascertain the description of a person sufficiently for the purpose of commencing a proceeding in the Court against that person (in this rule called the person concerned ) and it appears that some person has or is likely to have knowledge of facts, or has or is likely to have or has had or is likely to have had possession of any document or thing, tending to assist in such ascertainment, the Court may make an order under subrule (2).
  2. The Court may order that the person, and in the case of a corporation, the corporation by an appropriate officer, shall:
    1. attend before the Court to be examined in relation to the description of the person concerned;
    2. make discovery to the applicant of all documents which are or have been in the person's or its possession relating to the description of the person concerned.


Where the Court makes an order under paragraph (2) (II), it may:

  1. order that the person or corporation against whom or which the order is made shall produce to the Court on the examination any document or thing in the person's or its possession relating to the description of the person concerned;
  2. direct that the examination be held before a Registrar.

Appendix 2

FEDERAL COURT RULES - ORDER 15A RULE 6
Discovery from prospective respondent

Where:

  1. there is reasonable cause to believe that the applicant has or may have the right to obtain relief in the Court from a person whose description has been ascertained;
  2. after making all reasonable inquiries, the applicant has not sufficient information to enable a decision to be made whether to commence a proceeding in the Court to obtain that relief; and
  3. there is reasonable cause to believe that that person has or is likely to have or has had or is likely to have had possession of any document relating to the question whether the applicant has the right to obtain the relief and that inspection of the document by the applicant would assist in making the decision;

The Court may order that that person shall make discovery to the applicant of any document of the kind described in paragraph (3).

Appendix 3

FEDERAL COURT RULES - ORDER 15 RULE 15
Order only if necessary

The Court shall not make an order under this Order for the filing or service of any list of documents or affidavit or other document or for the production of any document unless satisfied that the order is necessary at the time when the order is made.

Appendix 4

Practice Notes issued by the Chief Justice
14. Discovery

Practice Note No. 14 issued on 12 February 1999 is revoked and the following Practice Note No. 14 is substituted.

  1. Practitioners should expect that, with a view to eliminating or reducing the burden of discovery, the Court:
    1. will not order general discovery as a matter of course, even where a consent direction to that effect is submitted;
    2. will mould any order for discovery to suit the facts of a particular case; and
    3. will expect the following questions to be answered:
      1. is discovery necessary at all, and if so for what purposes?
      2. can those purposes be achieved:
        1. by a means less expensive than discovery?
        2. by discovery only in relation to particular issues?
        3. by discovery (at least in the first instance - see (iii)) only of defined categories of documents?
      3. particularly in cases where there are many documents, should discovery be given in stages, eg initially on a limited basis, with liberty to apply later for particular discovery or discovery on a broader basis?
      4. should discovery be given in the list of documents by general description rather than by identification of individual documents?
  2. In determining whether to order discovery, the Court will have regard to the issues in the case and the order in which they are likely to be resolved, the resources and circumstances of the parties, the likely cost of the discovery and its likely benefit.
  3. To prevent orders for discovery requiring production of more documents than are necessary for the fair conduct of the case, orders for discovery will ordinarily be limited to the documents required to be disclosed by Order 15, rule 2(3).

M E J BLACK
Chief Justice
3 December 1999

1) [1999] VSC 76
2) Proceeding No. 7673 of 1998
3) Federal Court Rules Order 15A r3
4) [1999] FCA 932
5) [1988] VR 109
6) [2003] FCA 532
7) [2003] FCA 724
8) [2004] FCA 183
9) [2004] FCFC 270
11) Home Office v Harman [1983] 1 AC 280
15) R v Deputy Commissioner of Taxation; Ex parte Briggs (1987) 13 FCR 389
16) Federal Court Rules O15 r7A
17) Federal Court Rules O15 r 1
18) op cit 11
19) op cit 10
20) Pasini v Vanstone [1999] FCA 1271
22) Federal Court Rules O1, r 4
23) [1998] 363 FCA (9 April 1998)
24) [1999] FCA 1669
26) [2001] FCA 1520
27) (1995) 55 FCR 194
28) op cit 10

  © White SW Computer Law 1994-2016. ABN 94 669 684 644. All Rights Reserved.
  Liability limited by a scheme approved under Professional Standards Legislation
  This website is a guide only and should not be used as a substitute for proper legal advice.
  Readers should make their own enquiries and seek appropriate legal advice.
  For legal advice please email wcl@computerlaw.com.au