• Technologies
    • Review Platforms
    • ILS Social Media Data Analysis Suite
  • Consulting & Services
    • Consulting
    • Forensics & Collections
    • Review Platform Hosting & Management
    • Managed Review
    • Our Experts
  • AI Resources
  • ILS Articles
  • Company
    • About Us
    • Careers
    • Support
    • Contact Us
  • ILS
  • Sales
  • Support
  • Technologies
    • Review Platforms
    • ILS Social Media Data Analysis Suite
  • Consulting & Services
    • Consulting
    • Forensics & Collections
    • Review Platform Hosting & Management
    • Managed Review
    • Our Experts
  • AI Resources
  • ILS Articles
  • Company
    • About Us
    • Careers
    • Support
    • Contact Us

March 26, 2020

PDF Production Ruled Insufficient In Case Involving Theft of Trade Secrets

by Alan Brooks

In Balancecxi, Inc. D/B/A Zacoustic v. International Consulting and Research Group, LLC, et al (W.D. Tex, Mar. 13, 2020), the Court granted plaintiffs’ motion to compel requiring defendants to produce all ESI, including metadata, and additional storage devices after finding that defendants’ discovery responses were insufficient in both form and content.

The lawsuit alleged that defendants stole trade secrets from, and violated their non-competition and non-solicitation agreements with, their former employer, the plaintiff. Defendants left their employment with plaintiff on January 15, 2019, and through a letter sent by its counsel, plaintiff directed defendants to return all company property, including their laptops. The letter contained a specific directive that:

“You must refrain from deleting or modifying any programs, data, or files on the above-referenced laptop computer, as these actions constitute not only spoliation of evidence but also the destruction of Company property. You must further refrain from making any copies of any source code, files, programs, or other intellectual property stored on the computer.”

Upon receipt of the laptops, plaintiff hired a computer forensics firm to perform a forensic analysis of the computers. That analysis showed that both defendants copied large numbers of files from their laptops using at least three separate storage devices. In addition, the forensic report showed that both defendants deployed the “CCleaner” software to delete thousands of files and folders from the laptop. According to the report, CCleaner was launched from a storage device and ran on the company laptop at least three times with at least 14,000 files and folders deleted from the computer.

In response to plaintiff’s written discovery, defendants did not produce any documents but stated that they would be willing to produce the external drives on which they saved their files from their work laptops. After months of failing to produce the hard drives and in response to a motion to compel, defendants finally produced the files in .pdf format.

In a subsequent motion to compel, plaintiff requested that defendants produce all responsive ESI in .TIFF format with a corresponding load file, containing metadata fields. In objection, defendants asserted that production of the records in .pdf format was sufficient. The Court disagreed with defendants and ruled that because the case involved the theft of trade secrets, as well as significant issues regarding defendants’ copying and deleting of files, metadata would likely be important to the case. As such, the Court ruled that plaintiff’s request for ESI in .TIFF format with a corresponding load file, containing metadata fields, was reasonable.

Categories: eDiscovery, eDiscovery Case Law, Electronic Discovery, ESI, Metadata, Motions to Compel

ILS
17744 Sky Park Circle, Suite 270
Irvine, CA 92614
(888) 313-4457
sales@ilsteam.com
  • About ILS
  • Consulting
  • Forensics & Collections
  • Review Platform Hosting & Management
  • Managed Review
  • Sales
  • Support
  • LinkedIn
  • X

© 2025 ILS.

  • Privacy Statement
  • Cookie Statement
  • Terms of Use/Legal
ILS
Manage Cookie Consent
We use cookies to optimize our website and our service.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}