-JMA Han v. Futurewei Technologies, Inc. et al, No. 3:2011cv00831 - Document 25 (S.D. Cal. 2011)

Court Description: ORDER denying 22 Joint Motion for Determination of Discovery Dispute. Huawei's request for an order requiring Han to allow Huawei to copy the hard drives of her personal computing devices is denied. Court adopts Plaintiff Han's proposed protocol for the production of materials from her personal computing devices. Signed by Magistrate Judge Jan M. Adler on 9/15/2011. (jah)

Download PDF
-JMA Han v. Futurewei Technologies, Inc. et al Doc. 25 1 2 3 4 5 6 7 8 UNITED STATES DISTRICT COURT 9 SOUTHERN DISTRICT OF CALIFORNIA 10 JUN HAN, an individual, Case No. 11-CV-831-JM (JMA) 16 ) ) ) ) ) ) ) ) ) ) ) 17 Presently before the Court is a Joint Motion for Determination of Discovery 18 Dispute (“Joint Motion” or “Joint Mot.”), in which Defendant Futurewei Technologies, Inc. 19 d/b/a Huawei Technologies (USA) (“Huawei”) seeks an order requiring Plaintiff Jun Han 20 (“Han”) to allow Huawei to copy the hard drives of her personal computing devices. 21 (Doc. No. 22.) For the reasons set forth below, Huawei’s request is DENIED. The 22 Court instead adopts Han’s proposed protocol for the production of information from her 23 personal computing devices. 24 I. 11 Plaintiff, 12 13 v. 14 FUTUREWEI TECHNOLOGIES, INC., etc., et al., 15 Defendants. 25 ORDER DENYING DEFENDANT HUAWEI’S REQUEST FOR AN ORDER REQUIRING PLAINTIFF TO ALLOW HUAWEI TO COPY THE HARD DRIVES OF HER PERSONAL COMPUTING DEVICES [Doc. No. 22] BACKGROUND Han initiated this action on March 9, 2011 by filing a Complaint in the Superior 26 Court of California, County of San Diego against Huawei, her former employer, and 27 Jiangao Cui, her former supervisor, alleging harassment, retaliation, wrongful 28 termination in violation of public policy, and other employment-related claims. (Doc. No. 11cv831 Dockets.Justia.com 1 1-1 at 2-38.) On April 20, 2011, Defendants filed an Answer and removed the action to 2 this Court. (Doc. No. 1.) On August 2, 2011, Huawei filed a motion for leave to amend 3 pleadings to assert a counterclaim against Han for various claims related to Han’s 4 alleged copying, removal, and deletion of files from her company-issued laptop. (Doc. 5 No. 15.) Han has filed an opposition to the motion. (Doc. No. 23.) The motion is 6 presently set for hearing on September 19, 2011. 7 Huawei states that in performing their due diligence with respect to the initial 8 disclosure requirements of Fed. R. Civ. P. 26(a)(1), Defendants engaged a computer 9 forensic firm to analyze the contents of Han’s company-issued laptop. (Joint Mot., Doc. 10 No. 22 at 7.) Upon doing so, Defendants “discovered for the first time that Han had 11 systematically and intentionally copied, removed, and deleted thousands of files from 12 her company-issued laptop” on July 2, 2010, shortly before Huawei terminated her 13 employment. (Id. [emphasis in original].) Huawei suspects that Han stole confidential 14 and proprietary information belonging to the company, and thus seeks an order 15 permitting expedited discovery of Han’s personal computing devices. (Id. at 8.) 16 Specifically, Huawei requests that the Court implement the following protocol: 17 18 19 20 1. The inspection and copying of Han’s personal computing devices will be conducted by Defendants’ forensic expert, Huron Consulting Group (“Huron”). 2. Han will provide any and all personal computers and external storage devices that were used by Han or anyone acting on her behalf during her employment with Huawei (“the devices”) to Huron by no later than the close of business on a date to be determined by the Court. 21 22 23 24 25 3. Huron will image and return the devices as expeditiously as possible. Han will leave the devices in the custody of Huron for the time period necessary to image the devices . . . . A copy of the imaged devices will be provided to Plaintiff’s computer forensic firm, at Plaintiff’s expense. 4. All parties agree that Defendants, their counsel, and other representatives of Defendants, excluding Huron, will not access the devices or ESI [electronically stored information], except . . . pursuant to Court order. 26 27 5. Huron’s imaging will capture all data and ESI contained on the devices, including, but not limited to, active files, deleted files, and the unallocated drive space. 28 6. Huron will analyze the devices to determine the presence of Huawei 2 11cv831 1 files or data. 2 7. On a date to be determined by the Court, Plaintiff’s counsel will provide a list of search terms to Huron containing the names of any and all individuals with whom Plaintiff may have had attorney-client privileged communications. Any documents containing these search terms will not be disclosed to Defendants. Instead, the identified documents will be placed on a privilege log, and the log will be provided to counsel for Huawei. 3 4 5 6 8. Following the complete analysis of the computer, findings will be reported to Defendants. 7 8 9. Huron and its representatives agree that they will not divulge any of the contents of Han’s Confidential Material to defense counsel, Defendants, or their representatives. 9 10 11 12 13 10. If Huron has questions regarding whether any particular information is Confidential Material, Huron will communicate with both Plaintiff and defense counsel jointly via conference call in regard to any such questions. 11. Huron shall destroy all data and images regarding this matter in its possession within five business days after being notified in writing or electronic mail by counsel for each party that the case has been resolved or finally adjudicated. 14 15 16 (Id. at 9-10.) Han states, in response, that she had been asked to return her company-issued 17 laptop, and prior to doing so, “cleaned up the hard drive and removed incidental 18 personal files, as well as copied several files under an assumption she would receive a 19 new computer.” (Id. at 19.) She states that at that time, “[s]he did not know the 20 company was gearing up to fire her.” (Id.) Han objects to the protocol presented by 21 Huawei on the basis that it “improperly entrusts Defendants alone to determine what is 22 privileged or relevant, and denies Plaintiff’s counsel reciprocity to the data sought or the 23 laptop that sparked the [counterclaim].” (Id.) She also argues that her personal 24 computer contains attorney-client privileged communications, attorney work product, 25 and information in which she has a strong privacy interest, including correspondence 26 with friends and family, online banking information, and other private data and 27 passwords. (Id. at 20.) Han proposes the following alternate protocol for producing 28 information from her personal computing devices to Huawei: 3 11cv831 1. Plaintiff Jun Han will provide counsel for Huawei a list of all relevant documents on Ms. Han’s personal computer as determined by Plaintiff Han’s Certified Forensic Computer Examiner. Relevant documents will be defined as those copied or otherwise transferred as alleged in Huawei’s Motion for Leave to Amend Pleadings, Docket item [15]. 1 2 3 2. Plaintiff Jun Han will provide counsel for Huawei a copy on cd of all such documents retrieved by Plaintiff’s Certified Forensic Computer Examiner. 4 5 3. Plaintiff Jun Han will have her Certified Forensic Computer Examiner work with Huawei’s forensic computer examiner on any further protocols needed, and Huawei will have its Certified Forensic Examiner work with Plaintiff Han’s forensic computer examiner on any further protocols needed. 6 7 8 4. Plaintiff Jun Han, her counsel, and her Certified Forensic Computer Examiner are not to otherwise copy, forward, disclose, disseminate, sell, license, lease, transfer, make any use of, attempt to disclose or use, access or dispose of any of Huawei’s confidential, proprietary or trade secret information, specifically including any information that Han downloaded or copied that is not publicly available, without first filing with the magistrate [judge] under seal a request to do so. This prohibition shall not apply to Han making her personal computer(s) or external storage devices available for forensic review by Defendants as agreed by the parties or otherwise ordered by the court. This prohibition shall also not prevent Plaintiff Han from defending any allegations by Huawei against her as related to the proposed Counterclaim filed as Docket item [15]. 9 10 11 12 13 14 15 .... 16 17 (Id. at 23-24.) Huawei deems Han’s proposal unacceptable because it would require 18 Huawei to rely upon the representations of Han’s computer experts. (Id. at 9.) 19 II. 20 LEGAL STANDARDS Under Rule 26 of the Federal Rules of Civil Procedure, “Parties may obtain 21 discovery regarding any nonprivileged matter that is relevant to any party’s claim or 22 defense . . . .” Fed. R. Civ. P. 26(b)(1). All discovery is subject to the limitations 23 imposed by Rule 26(b)(2)(C), which requires the court to limit the frequency or extent of 24 discovery otherwise allowed if it determines that “the discovery sought is unreasonably 25 cumulative or duplicative, or can be obtained from some other source that is more 26 convenient, less burdensome, or less expensive.” Fed. R. Civ. P. 26(b)(1), 27 26(b)(2)(C)(i). Under Rule 34, a party may request, within the scope of Rule 26(b), that 28 any other party produce and permit the requesting party to test or sample the materials 4 11cv831 1 sought under the rule in addition to inspecting and copying them. Fed. R. Civ. P. 2 34(a)(1). However, [a]s with any other form of discovery, issues of burden and intrusiveness raised by requests to test or sample can be addressed under Rules 26(b)(2) and 26(c). Inspection or testing of certain types of electronically stored information may raise issues of confidentiality or privacy. The addition of testing and sampling to Rule 34(a) with regard to documents and electronically stored information is not meant to create a routine right of direct access to a party’s electronic information system, although such access might be justified in some circumstances. Courts should guard against undue intrusiveness resulting from inspecting and testing such systems. 3 4 5 6 7 8 9 Fed. R. Civ. P. 34 Advisory Comm. Notes, 2006 Amendment (emphases added). 10 “[C]ompelled forensic imaging is not appropriate in all cases, and courts must consider 11 the significant interests implicated by forensic imaging before ordering such 12 procedures.” John B. v. Goetz, 531 F.3d 448, 460 (6th Cir. 2008). 13 III. 14 DISCUSSION A. Huawei’s Request for Discovery on an Expedited Basis is Premature and Unwarranted 15 16 The Court first observes that the discovery sought by Huawei bears no relevance 17 upon the claims and defenses presently in the case, and thus does not fall within the 18 scope of discovery permitted under Rule 26(b)(1). Huawei’s request is therefore 19 premature. That the parties are in litigation, and that Huawei suspects Han stole 20 confidential and proprietary information belonging to the company, does not give 21 Huawei the unfettered right to seek whatever it wishes from Han. The information 22 sought by Huawei will not be relevant to the claims and defenses in this case until and 23 unless the district judge grants Huawei’s motion for leave to amend pleadings to assert 24 a counterclaim against Han. 25 Furthermore, given the Court’s August 9, 2011 Order Granting Joint Motion for 26 Entry of Order, which prohibits Han from copying, disclosing, or disseminating any of 27 Huawei’s confidential or proprietary information, specifically including information Han 28 downloaded or copied that is not publicly available, the Court finds that any exigency 5 11cv831 1 concerning Han’s alleged possession of Huawei’s company documents has been 2 eliminated. There is no need for the Court to allow “expedited discovery” in this 3 instance. 4 B. Huawei Has Provided No Evidence or Authority Justifying Its Proposed Protocol 5 Notwithstanding the Court’s finding that the discovery sought by Huawei is not 6 7 relevant to any of the claims or defenses presently asserted in this case, the Court now 8 addresses the merits of the parties’ proposed protocols, as Han has demonstrated a 9 willingness to partake in some kind of protocol to provide Huawei with the information it 10 11 seeks. As set forth above, Huawei’s request to copy the hard drives of Han’s personal 12 computing devices is premature. It is premature not only because Huawei presently 13 does not have a counterclaim pending against Han, but because Huawei has not 14 demonstrated that obtaining mirror images of Han’s computing devices is necessary or 15 justified. Huawei has not established that Han is in the wrongful possession of any 16 company documents, or that the copying and “wiping” of files from her work laptop was 17 improper or malicious. Although Huawei attempts to place Han’s alleged actions under 18 a cloud of suspicion, it has not provided an expert declaration or any other evidence 19 supporting a conclusion that Han was doing anything other than what any conscientious 20 employee would do when asked to return a company-issued computer. Huawei has 21 provided no evidence or argument demonstrating the alleged copying, removal, and 22 deletion of files was at all unusual or unexpected. It is perfectly conceivable that Han 23 was “cleaning up” her laptop by, for example, deleting personal emails or files, deleting 24 files no longer needed, or copying important files for placement on the new work laptop 25 she expected to receive. Additionally, Huawei has not provided any employment 26 agreements or work policies prohibiting the transfer or deletion of company files from 27 one computer to another. Huawei simply assumes that because files were copied, 28 transferred, and deleted, Han was necessarily engaged in nefarious conduct. Such an 6 11cv831 1 unsupported assumption does not entitle Huawei or its expert to unlimited access to 2 Han’s personal computing devices. 3 Furthermore, following Huawei’s proposed protocol would lead to the inspection 4 by Huawei’s expert of non-responsive, irrelevant, and privileged information. Although 5 Huawei has not provided the Court with copies of the subject discovery requests 6 (assuming it has even served discovery requests), Huawei is presumably seeking the 7 return of any of its confidential and proprietary information, as well as information about 8 what Han may have done with the information she copied or transferred. There is a 9 more convenient, less burdensome, and less expensive way for Huawei to obtain what 10 it wants — to serve discovery requests, including interrogatories and document 11 requests, asking for this information. See Fed. R. Civ. P. 26(b)(2)(C)(i); see also Slater 12 & Assoc. Ins., Inc. v. Roork, 2007 WL 3026944 (D. Ariz. 2007) (allowing mirror imaging 13 of Defendants’ hard drives only if Defendants failed, through the discovery process, to 14 return company documents and to provide affidavit avowing that all company materials 15 had been returned). Huawei has provided no argument or justification for immediately 16 jumping to the step of copying Han’s personal computing devices, except for its 17 statement that it does not wish to rely upon the representations of Han’s experts. (Id. at 18 9.) A requesting party, however, must rely on the representations of the producing party 19 or its representative that it is producing all responsive, relevant, and non-privileged 20 discovery. See Qualcomm Inc. v. Broadcom Corp., 2008 WL 66932, at *9 (S.D. Cal. 21 2008) (“The Federal Rules of Civil Procedure require parties to respond to discovery in 22 good faith[.]”). That is the way our “good faith” discovery system works. 23 The protocol presented by Huawei would result in the needless accessing by 24 Huawei’s expert of Han’s personal information, and would be unduly burdensome upon 25 Han. The authorities considered by the Court demonstrate that courts generally permit 26 mirror imaging only when a responding party’s discovery responses have been 27 incomplete or inconsistent. See, e.g., In re Weekley Homes, L.P., 295 S.W. 3d 309, 28 317 (Tex. 2009) (observing that under federal case law, direct access to a party’s 7 11cv831 1 electronic storage device requires a showing by the requesting party that the 2 responding party has “defaulted in its obligation to search its records and produce the 3 requested data”); Balfour Beatty Rail, Inc. v. Vaccarello, 2007 WL 169628 (M.D. Fla. 4 2007), at *3 (denying access to responding party’s hard drives when requesting party 5 failed to show that responding party had not complied with its discovery obligations). 6 There has been no such showing here. 7 Although there are cases in which courts have permitted mirror imaging of an 8 opposing party’s computers, Huawei has cited none of these, and the cases found by 9 the Court are distinguishable. For example, in Orrell v. Motorcarparts of Am., Inc., 2007 10 WL 4287750 (W.D.N.C. 2007), the court allowed the employer defendant to conduct a 11 forensic examination of the plaintiff’s home computer, but only after the plaintiff provided 12 deposition testimony that it was her practice to forward emails from co-workers, 13 supervisors, and customers, which constituted evidence relevant to her harassment 14 claims, to her home computer for storage, and only after the Court determined that the 15 plaintiff’s prior productions were deficient. In Ameriwood Indus., Inc. v. Liberman, 2006 16 WL 3825291 (E.D. Mo. 2006), the court permitted mirror imaging of the defendant’s 17 computers upon finding a sufficient nexus between the plaintiff employer’s claims that 18 the defendants, its former employees, had improperly used the plaintiff’s computers to 19 divert plaintiff’s business to themselves, and the need to mirror image the defendants’ 20 hard drives, and because the court had cause to question whether the defendants had 21 produced all documents responsive to discovery served. These cases demonstrate that 22 while it is possible Huawei may, at a later juncture, be entitled to copy the hard drives of 23 Han’s personal computing devices, it will only be permitted to do so upon a more 24 substantial showing than it has made here. 25 The protocol proffered by Han takes into account the significant privilege and 26 privacy interests implicated in this case, is reasonable at this stage of the case, and 27 follows the convention under the Federal Rules that the party responding to discovery 28 determines what is relevant, responsive, and protected by privilege or privacy interests. 8 11cv831 1 A very similar protocol was adopted in Coburn v. PN II, Inc., 2008 WL 879746, at *4-5 2 (D. Nev. 2008) (requiring mirror image of plaintiff’s hard drives to be provided to 3 plaintiff’s counsel, who was then to “print and review any recovered documents and 4 produce to defendants those communications that are responsive to any earlier request 5 for documents and relevant to the subject matter of this litigation”, and providing for 6 plaintiff’s counsel to be the sole custodian of the mirror image throughout the course of 7 the litigation.). Therefore, the protocol proffered by Han will govern the production of 8 the materials sought by Huawei from Han relating to the alleged copying, transferring, 9 and/or deleting by Han of Huawei company information. As with any discovery, all 10 documents that are withheld on a claim of privilege shall be recorded on a privilege log. 11 IV. 12 CONCLUSION Huawei has provided no authority or argument upon which the Court can 13 presently find that it should be permitted to copy the hard drives of Han’s personal 14 computing devices, on an expedited basis or otherwise. The Court therefore cannot 15 find that Huawei’s proposed protocol is presently justified. Accordingly, Huawei’s 16 request for an order requiring Han to allow Huawei to copy the hard drives of her 17 personal computing devices is DENIED. Instead, the Court adopts Han’s proposed 18 protocol for the production of materials from her personal computing devices. 19 20 IT IS SO ORDERED. DATED: September 15, 2011 21 Jan M. Adler U.S. Magistrate Judge 22 23 24 25 26 27 28 9 11cv831

Some case metadata and case summaries were written with the help of AI, which can produce inaccuracies. You should read the full case before relying on it for legal research purposes.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.