Erhart v. Bofi Holding Inc., No. 3:2015cv02287 - Document 20 (S.D. Cal. 2016)

Court Description: ORDER denying defendant BofI Holding, Inc.'s 12 Motion for Imposition of Sanctions for Spoliation of Evidence Against Plaintiff Charles Matthew Erhart. The Court grants BofI's 15 Motion to Seal. The Court orders the Clerk of Court to accept and file under seal the requested documents (ECF No. 16 ). Signed by Judge Cynthia Bashant on 9/21/16. (kas)

Download PDF
1 2 3 4 5 6 7 8 9 10 UNITED STATES DISTRICT COURT 11 SOUTHERN DISTRICT OF CALIFORNIA 12 CHARLES MATTHEW ERHART, 13 Case No. 15-cv-02287-BAS(NLS) Plaintiff, 14 15 ORDER DENYING DEFENDANT BOFI HOLDING, INC.’S MOTION FOR IMPOSITION OF SANCTIONS FOR SPOLIATION OF EVIDENCE AGAINST PLAINTIFF CHARLES MATTHEW ERHART v. 16 BOFI HOLDING, INC., 17 Defendant. [ECF No. 12] 18 19 On October 13, 2015, Plaintiff Charles Matthew Erhart commenced this 20 whistleblower retaliation action against Defendant BofI Holding, Inc. (“BofI”) 21 alleging violations of the Sarbanes–Oxley Act of 2002, the Dodd–Frank Wall Street 22 Reform and Consumer Protection Act, and California state law. (ECF No. 1.) Several 23 days later, BofI brought a countersuit against Erhart alleging he violated California 24 state law and the Computer Fraud and Abuse Act by publishing BofI’s confidential 25 information and deleting hundreds of files from his company-issued laptop. See 26 generally BofI Federal Bank v. Erhart, No. 15-cv-02353-BAS(NLS) (S.D. Cal. filed 27 Oct. 19, 2015) (“Countersuit”). 28 // –1– 15cv2287 1 BofI now seeks a terminating sanction against Erhart because it claims he “has 2 engaged in a pattern and practice of destroying relevant evidence in order to 3 prejudice” BofI and “hinder its ability to defend itself in this action.” (Mot. 1:3–5, 4 ECF No. 12.) Alternatively, BofI requests the Court give an adverse inference jury 5 instruction and impose monetary sanctions against Erhart. (Id. 15:1–19:24.) In 6 response, Erhart argues this motion “is about copies of copies of documents that the 7 moving party has always had in its possession,” and BofI is trying “yet another tactic 8 to turn the spotlight away from its own wrongdoing and attack [him] by bringing this 9 motion for sanctions.” (Opp’n 1:2–9, ECF No. 18.) 10 The Court finds this motion suitable for determination on the papers submitted 11 and without oral argument. See Fed. R. Civ. P. 78(b); Civ. L.R. 7.1(d)(1). For the 12 following reasons, the Court DENIES BofI’s motion for spoliation sanctions. 13 14 I. BACKGROUND 15 Erhart is a former BofI employee who claims BofI retaliated against him for 16 reporting conduct he believed to be wrongful to the government. (See generally 17 Compl. ¶¶ 9–52, ECF No. 1.) This motion revolves around whether Erhart has 18 destroyed evidence by deleting files from several electronic devices. These devices 19 are: (i) Erhart’s BofI-issued laptop, (ii) two USB flash drives, (iii) Erhart’s personal 20 desktop computer, and (iv) Erhart’s girlfriend’s Apple MacBook laptop. (Armstrong 21 Decl. ¶ 3, ECF No. 13.) 22 Erhart acquired the first of these devices—his BofI-issued laptop—when he 23 joined BofI as an internal auditor in September 2013. (Tolla Decl. ¶ 3, ECF No. 12- 24 5.) Eighteen months later, Erhart requested, and was granted by BofI, an unpaid leave 25 of absence beginning on March 6, 2015. (Id. ¶ 5.) Shortly after his leave of absence 26 commenced, Erhart met with regulators at the United States Department of the 27 Treasury’s Office of the Comptroller of the Currency (“OCC”) to report BofI’s 28 alleged wrongdoing. (Erhart Dep. 96:15–19, 162:14–163:6, ECF No. 12-3; see also –2– 15cv2287 1 Order Den. BofI’s Am. Mot. For Prelim. Inj., Section I.B., Countersuit, ECF No. 18.) 2 Around the same time, BofI informed Erhart that he was not authorized to retain 3 possession of his BofI laptop while he was on leave. (Tolla Decl. ¶ 5.) Erhart returned 4 the laptop to BofI on March 12, 2015. (Id.) Since then, BofI’s forensic analyst has 5 determined that Erhart deleted hundreds of files from the laptop prior to returning it. 6 (See Armstrong Decl. ¶¶ 2–3.)1 7 Erhart explains that, after he provided documents on the laptop to the OCC to 8 support his claims of wrongdoing, he “deleted [from the laptop] some random emails 9 as well as some of the documents in order to make it more difficult [for BofI] to 10 follow our audit trail.” (Erhart Decl. ¶ 7, ECF No. 18-7.) However, when he initially 11 acquired the BofI documents on the laptop, he “did not remove or delete any 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 1 BofI moves for an order sealing portions of the Armstrong Declaration and the entirety of Exhibits B, C, D, E, and F attached to this declaration. (ECF No. 19.) These items contain file names of BofI documents and “provide a detailed snapshot of BofI’s proprietary and non-public information technology infrastructure.” (Tolla Decl. ¶¶ 7–8, ECF No. 15-2.) Under Ninth Circuit law, the legal standard governing public access to filed motions and their attachments turns on whether the motion is more than tangentially related to the merits of the case. Ctr. for Auto Safety v. Chrysler Grp., LLC, 809 F.3d 1092, 1101 (9th Cir. 2016). When the underlying motion is more than tangentially related to the merits, the “compelling reasons” standard applies. Id. When the underlying motion does not surpass the tangential relevance threshold, the “good cause” standard applies. Here, notwithstanding BofI’s request for a terminating sanction, the Court finds that BofI’s motion is not more than tangentially related to the merits of this whistleblower retaliation action. The motion concerns only whether Erhart deleted files after he reported BofI’s alleged misconduct to the OCC—it does not concern the merits of Erhart’s whistleblower retaliation claims or his state law causes of action. Thus, the good cause standard applies to BofI’s request. Upon review of the declaration of BofI’s Chief Governance, Risk & Compliance Officer filed in support of BofI’s motion to seal (ECF No. 15-2), the Court finds BofI has made a “particularized showing” of good cause to seal these items. See In re Midland Nat. Life Ins. Co. Annuity Sales Practices Litig., 686 F.3d 1115, 1119 (9th Cir. 2012). Accordingly, the Court GRANTS BofI’s motion to seal (ECF No. 15). –3– 15cv2287 1 information in the Bank’s systems[.]”2 (Id. ¶ 4.) Therefore, Erhart submits that these 2 documents “were all copies of documents at the Bank.” 3 (Id. ¶ 7.) All of these events 3 occurred prior to Erhart retaining counsel and eventually commencing this action. 4 (See id.) 5 Erhart turned over the rest of the electronic devices at issue to BofI during 6 litigation. In BofI’s Countersuit, the Court entered a stipulated temporary restraining 7 order. (Countersuit, ECF No. 10 at 2:15–19.) The restraining order required Erhart to 8 deliver to BofI “all BofI records and documents and any Confidential Information in 9 any form, including but not limited to documents or electronically stored information 10 stored in any medium within his . . . custody, possession, or control.” (Id. at 2:15– 11 19.) 12 Afterwards, on November 9, 2015, Erhart produced a USB flash drive 13 containing BofI files to BofI’s expert. (Armstrong Decl. ¶ 13.) Several files were 14 deleted from the drive a few days prior to it being surrendered to BofI. (Id. ¶¶ 13– 15 15.) Erhart states: “Once litigation began, I cooperated with the Bank in its seeking 16 the return of information I had in my possession . . . . I organized the materials and 17 Conspicuously missing from BofI’s briefing is any indication that it does not possess at least some, if not all, of the files Erhart made copies of at BofI. Presumably, BofI seeks to take advantage of presumptions in spoliation law by demonstrating Erhart destroyed files and then leaving it to Erhart to try to prove BofI still has these files and has not suffered meaningful prejudice. When Erhart responds that he only copied files and that the original files remain on BofI’s system, BofI replies with a barrage of evidentiary objections but no meaningful suggestion to the contrary. Although BofI’s strategy may be a savvy litigation tactic, the Court has trouble turning a blind eye to the fact that BofI has already demonstrated it is in possession of files Erhart made copies of. In moving for a preliminary injunction against Erhart in its Countersuit, BofI submitted evidence that one of its executives had reviewed the list of files deleted from Erhart’s laptop. For various files on this list, he declared that: “These files are Confidential Information because they are identical to files held at BofI, which I have personally reviewed and which contain nonpublic information . . . .” (Tolla Decl. ¶ 9, Countersuit, ECF No. 7-4 (emphasis added).) 3 BofI objects to Erhart’s statement that these files are “copies of documents at the Bank” because “Erhart has no personal knowledge regarding the contents of BofI’s system or document files.” (ECF No. 19-5 at 24:25–27.) Erhart may not know which files BofI has retained on its systems, but he does have personal knowledge to state that the files that were in his possession were copies of files he found on BofI’s systems. Thus, the Court overrules this objection. To the extent the Court relies on any other evidence objected to by BofI in its twenty-five pages of evidentiary objections (ECF No. 19-5), the Court overrules BofI’s objections. –4– 15cv2287 2 18 19 20 21 22 23 24 25 26 27 28 1 turned them over to forensic people sent to my home by the Bank’s lawyers. From 2 the thumb drive I only deleted duplicates of files I had copied to it.” (Erhart Decl. ¶ 3 8.) 4 On November 16, 2015, the Court granted the parties’ request to enter a 5 supplemental temporary restraining order in BofI’s Countersuit. (Countersuit, ECF 6 No. 17.) This order required Erhart to—in addition to those requirements contained 7 in the initial restraining order—provide a signed declaration to BofI that he had 8 returned all of BofI’s information and “[d]elete all references to and/or summaries of 9 BofI’s Confidential Information in his possession, custody, or control.” (Id. 2:25– 10 27.) Erhart later provided his personal desktop computer, another USB flash drive, 11 and his girlfriend’s Apple MacBook laptop to BofI in an effort to comply with the 12 parties’ agreements and the Court’s restraining orders. (See Armstrong Decl. ¶¶ 16, 13 20, 26.) BofI’s expert determined that, at some point, BofI files had been deleted 14 from these three devices as well. (Id. ¶¶ 17–19, 22–24, 28–30.) BofI now moves for 15 spoliation sanctions, claiming Erhart intentionally destroyed evidence by deleting 16 files from his BofI-issued laptop, the two USB flash drives, his desktop computer, 17 and his girlfriend’s laptop. (ECF No. 12.) 18 19 II. ANALYSIS 20 A. Destruction of Evidence 21 “Spoliation is ‘the destruction or significant alteration of evidence, or the 22 failure to preserve property for another’s use as evidence[,] in pending or reasonably 23 foreseeable litigation.’” Reinsdorf v. Skechers U.S.A., Inc., 296 F.R.D. 604, 625 (C.D. 24 Cal. 2013) (alteration in original) (quoting Zubulake v. UBS Warburg LLC, 220 25 F.R.D. 212, 216 (S.D.N.Y. 2003)). “The party requesting sanctions bears the burden 26 of proving, by a preponderance of the evidence, that spoliation took place.” Tetsuo 27 Akaosugi v. Benihana Nat’l Corp., No. C 11-01272 WHA, 2012 WL 929672, at *3 28 (N.D. Cal. Mar. 19, 2012) (citing Akiona v. United States, 938 F.2d 158 (9th Cir. –5– 15cv2287 1 1991)); see also, e.g., Compass Bank v. Morris Cerullo World Evangelism, 104 F. 2 Supp. 3d 1040, 1052–53 (S.D. Cal. 2015). Thus, the party seeking sanctions must 3 initially demonstrate that evidence has in fact been destroyed. See, e.g., Tetsuo, 2012 4 WL 929672, at *3. To destroy is “[t]o damage (something) so thoroughly as to make 5 unusable, unrepairable, or nonexistent; to ruin <destroying evidence>.” Destroy, 6 Black’s Law Dictionary (10th ed. 2014). 7 To illustrate, in Tetsuo, the plaintiff in an employment suit copied thousands 8 of files from the defendant employer’s computer onto a USB flash drive the day 9 before his counsel signed his complaint. 2012 WL 929672, at *1–2. He later deleted 10 thousands of files on the flash drive after his deposition and before surrendering the 11 drive to the defendant. Id. at *2. There was no indication, however, that the plaintiff 12 “had deleted any documents from the [defendant’s] computer.” Id. Upon discovering 13 that the plaintiff had deleted files from the flash drive, the defendant moved for 14 sanctions, despite that it had “since been able to recover approximately 6300 files 15 deleted from the thumb drive.” Id. The court denied the motion, reasoning: “[The] 16 [p]laintiff never deleted any documents from the company computer. The deletion of 17 files from the USB drive thus has not limited defendant in its ability to find its own 18 records to defend this suit. Whatever documents were on the company computer are 19 still on it, unharmed.” Id. at *3. In other words, the defendant’s documents had not 20 been destroyed. See id. 21 Here, the Court finds BofI has not met its initial burden of demonstrating 22 Erhart destroyed evidence with respect to many of the files that are at issue. In its 23 motion, BofI often equates deleting computer files with destroying evidence. (See, 24 e.g., Mot. 11:18–12:7.) But, as confirmed by BofI’s expert, deleting a computer file 25 does not necessarily destroy the file because it may still be recoverable. (See 26 Armstrong Decl. ¶¶ 11, 19, 24.) If a file is recoverable, it has not been “damage[d] 27 so thoroughly as to make [it] unusable, unrepairable, or nonexistent.” See Destroy, 28 Black’s Law Dictionary (10th ed. 2014). As detailed below, many of the files Erhart –6– 15cv2287 1 deleted are recoverable; therefore, BofI has not met its initial burden of 2 demonstrating these files have been destroyed. 3 1. 4 Erhart’s BofI-Issued Laptop Computer 5 The first instance of claimed spoliation involves Erhart’s BofI-issued laptop 6 computer. BofI’s expert determined that on March 12, 2015, Erhart deleted “957 files 7 and folders” from the laptop prior to returning it to the company. (Armstrong Decl. 8 ¶ 10.) “Approximately 79 of these deleted objects relate to the operating system and 9 applications and, therefore, are excluded from further discussion.” (Id.) Thus, 878 10 deleted objects are at issue. (Id. ¶ 11.) Consistent with Erhart’s statement that he 11 deleted “some random e-mails” from the laptop, the deleted files include e-mails with 12 subject lines such as “BOFI Christmas Party Gift Winners!”; “BOFI SHIRTS”; and 13 “DAYLIGHT SAVING TIME BEGINS.” (Id. Ex. B.) Although these 878 files have 14 been deleted, 849 “have not been overwritten and are candidates for forensic 15 recovery.” (Id. ¶ 13.) Accordingly, BofI has not shown that these 849 files have been 16 destroyed. 17 Thus, the Court is left with evidence that 29 files have been destroyed on the 18 laptop. BofI has lost access to potential torpedoes to Erhart’s case such as e-mails 19 titled “Register now for two ‘Ask the Fed’ sessions ‘Commercial Real Estate’ and 20 ‘Interest Rate Risk’”; “Flu Season”; and “REFRIGERATOR !!”. (Armstrong Decl. 21 Ex. B.) Aside from these e-mails, it does appear that some potentially relevant files 22 have been destroyed. However, many of these overwritten files reappear in a 23 recoverable form on the other media devices discussed in this Order below. 24 25 2. First USB Flash Drive 26 On November 9, 2015, Erhart produced a USB flash drive to BofI’s expert. 27 (Armstrong Decl. ¶ 13.) The drive contains numerous files that Erhart transferred to 28 the drive on November 7, 2015, to return these items to BofI pursuant to the Court’s –7– 15cv2287 1 temporary restraining order in BofI’s Countersuit. (See id. ¶ 13, Ex. C.) The drive 2 also indicates that “[e]leven files, also copied to the [device] on November 7, 2015, 3 have been deleted.” (Id. ¶ 13.) However, only one of these eleven files has been 4 overwritten and destroyed—a file titled “Employee Account Review 2.” (Id. Ex. C.) 5 This particular file is lost, but Erhart returned to BofI another file titled “Employee 6 Account Review.” These two files have the exact same file size—3,291,345 bytes— 7 indicating they are identical. (See id.) This indication is consistent with Erhart’s claim 8 that he only deleted “from the thumb drive . . . duplicates of files” that he had copied 9 to the drive. (Erhart Decl. ¶ 8.) Accordingly, because Erhart provided to BofI a 10 duplicate of the only file on this flash drive that has been destroyed, the spoliation 11 inquiry ends here for this electronic device. 12 13 3. Erhart’s Personal Desktop Computer 14 The next instance of claimed destruction of evidence involves Erhart’s 15 personal desktop computer, which he surrendered to BofI for analysis on December 16 8, 2015. (Armstrong Decl. ¶ 16.) BofI’s expert opines that “[t]he Recycle Bin of the 17 ‘erhartm’ user profile on the HP desktop computer contains approximately 1,500 files 18 facially relevant to BofI . . . [which] were deleted and moved to the Recycle Bin on 19 or around December 5, 2015.” (Id. (emphasis added).) In other words, the 1500 20 “deleted” files are still sitting in the computer’s Recycle Bin. (See id.) BofI’s expert 21 astutely admits that these files “are candidates for forensic recovery.” (See id. ¶ 19.) 22 He did, however, locate an additional six files “beyond the files located in the Recycle 23 Bin” that were previously stored on the device and are potentially related to BofI. 24 (Id.) Two of these files have been both deleted and overwritten. (Id.) Therefore, out 25 of approximately 1506 files, the Court finds BofI has satisfied its burden of 26 demonstrating just two files have been destroyed. 27 Additionally, many of the files sitting in the desktop computer’s Recycle Bin 28 have the exact same file names and are the exact same sizes as the 29 files that are –8– 15cv2287 1 unrecoverable from the laptop. For example, one of the files on the laptop that has 2 since been destroyed was an e-mail message with the name “RE SEC Subpoena- 3 Internal Audit Review.” (Armstrong Decl. Ex. B.) The file size was 699,904 bytes. 4 (Id.) Several copies of an e-mail message with the exact same title are sitting in the 5 Recycle Bin on the image of Erhart’s desktop computer’s drive in BofI’s possession. 6 (Id. Ex. D.) Unsurprisingly, these copies also have a file size of exactly 699,904 7 bytes. (Id.) Accordingly, aside from potentially losing metadata associated with the 8 destroyed duplicates, which the Court addresses below, BofI has not demonstrated 9 that these files have been destroyed because it has access to duplicate copies sitting 10 in the Recycle Bin on BofI’s image of Erhart’s desktop computer’s hard drive. 11 Instead of seeking a terminating sanction against Erhart, BofI could simply drag these 12 files out of the Recycle Bin and open them. 13 14 4. Second USB Flash Drive 15 A second USB flash Drive surrendered by Erhart on December 8, 2015, is the 16 fourth item on the list. It contains a few dozen deleted files in a deleted “BofI” folder 17 and another folder titled “0319025” that remains active on the drive. (Armstrong ¶¶ 18 21–24.) All of these files “are candidates for forensic recovery.” (Id. ¶ 24.) Therefore, 19 BofI has not met its burden of demonstrating these files have been destroyed, and the 20 spoliation inquiry ends here for this device as well. 21 22 5. Erhart’s Girlfriend’s Apple MacBook Laptop 23 The last instance of claimed spoliation involves an Apple MacBook laptop 24 belonging to Erhart’s girlfriend. (Armstrong Decl. ¶ 26.) This device was similarly 25 surrendered to BofI for analysis on December 8, 2015, and it once contained “more 26 than 300 unique facially-relevant filenames.” (Id. ¶ 28.) When the expert includes 27 “duplicate copies previously stored across all folders . . . the number of facially- 28 relevant filesexceeds [sic] 550.” (Id.) Further, a review of the MacBook’s hard drive –9– 15cv2287 1 “revealed no readily recoverable deleted content pertinent to this investigation.” (Id.) 2 Accordingly, these several hundred files appear to have been destroyed. However, 3 almost all of the files deleted from the MacBook appear to be exact duplicates of files 4 on other devices—presumably because they were transferred from Erhart’s BofI 5 laptop or desktop computer to the MacBook. (See id. Exs. B, D, F.) There is no 6 suggestion that the MacBook was used to initially copy files from BofI’s systems. 7 That said, BofI has met its burden of showing these particular duplicates and possibly 8 some other files on the MacBook have been destroyed. 9 In sum, it is unclear what, if any, potentially relevant evidence has been 10 destroyed from the five electronic devices used by Erhart. Almost all of the deleted 11 files are likely recoverable—either by extracting them from the Recycle Bin or by 12 using more sophisticated data recovery techniques. As for the files that are not 13 recoverable, it appears there are identical copies of many, or possibly all, of these 14 files available from other sources discussed in this motion. 15 Nonetheless, it is possible that a fraction of the deleted files that have been 16 destroyed are relevant. It is also possible that duplicates of these files are not available 17 from other sources. In addition, BofI argues there could have been valuable metadata 18 associated with some of the duplicates of files that have been destroyed.4 The Court 19 acknowledges this possibility. Thus, the Court turns to considering whether it is 20 appropriate to impose spoliation sanctions against Erhart. 21 // 22 // 23 // 24 “Metadata is simply data that provides information about other data.” In re Online DVD-Rental Antitrust Litig., 779 F.3d 914, 925 n.5 (9th Cir. 2015) (quoting Country Vintner of N.C., LLC v. E. & J. Gallo Winery, Inc., 718 F.3d 249, 253 n.4 (4th Cir.2013)). In this setting, it is “electronicallystored evidence that describes the ‘history, tracking, or management of an electronic document.’” See Aguilar v. Immigration & Customs Enf’t Div. of U.S. Dep’t of Homeland Sec., 255 F.R.D. 350, 353–55 (S.D.N.Y. 2008) (quoting Williams v. Sprint/United Mgmt. Co., 230 F.R.D. 640, 646 (D. Kan. 2005)) (discussing metadata and delineating substantive metadata, system metadata, and embedded metadata). – 10 – 15cv2287 4 25 26 27 28 1 B. Imposition of Sanctions 2 Even if a party has destroyed evidence, this fact “does not necessarily mean 3 that the party has engaged in sanction-worthy spoliation.” See Reinsdorf, 296 F.R.D. 4 at 626 (quoting Ashton v. Knight Transp., Inc., 772 F. Supp. 2d 772, 799–800 (N.D. 5 Tex. 2011)). To determine whether to impose sanctions for spoliation, “[t]rial courts 6 have widely adopted the Second Circuit’s three-part test” used for determining 7 whether to grant an adverse inference spoliation instruction. Apple Inc. v. Samsung 8 Elecs. Co., 888 F. Supp. 2d 976, 989 (N.D. Cal. 2012) (“Apple II”). This test provides 9 that a party seeking an adverse inference instruction based on spoliation must 10 establish: “(1) that the party having control over the evidence had an obligation to 11 preserve it at the time it was destroyed; (2) that the records were destroyed ‘with a 12 culpable state of mind’; and (3) that the evidence was ‘relevant’ to the party’s claim 13 or defense such that a reasonable trier of fact could find that it would support that 14 claim or defense.” Id. at 989–90. 15 Here, BofI has not established that the spoliation criteria are satisfied for each 16 claimed instance of spoliation. In particular, the Court finds that so far as Erhart 17 destroyed files after the Court entered its supplemental temporary restraining order 18 in BofI’s Countersuit, these files were not destroyed “with a culpable state of mind.” 19 See Apple II, 888 F. Supp. 2d at 989. The Court’s supplemental restraining order 20 required Erhart to “[d]elete all references to and/or summaries of BofI’s Confidential 21 Information in his possession, custody, or control.” (Countersuit, ECF No. 17 at 22 2:25–27.) Erhart describes his interpretation of this order as follows: 23 24 25 26 27 28 After I gave the forensic people everything (with the exception of the cover emails to the OCC, I deleted the files on my own computer and on my girlfriend’s . . . . I thought the court order required me not to keep anything after I turned it all over to the forensic people sent by the Bank’s lawyers. I understood that we would later ask for them back during discovery. (Erhart Decl. ¶ 9.) BofI naturally has a different interpretation of the interplay – 11 – 15cv2287 1 between the restrictions in the stipulated supplemental temporary restraining order. 2 (See Reply 6:13–22, ECF No. 19.) But the Court agrees with Erhart that part of the 3 restraining order is ambiguous, and the Court will not construe this ambiguity against 4 Erhart to find that he had a culpable state of mind when he deleted files after the order 5 was entered. (See Erhart Decl. ¶ 9, see also Order Den. BofI’s Am. Mot. For Prelim. 6 Inj. 20:24–28, Countersuit, ECF No. 18.) Thus, imposing spoliation sanctions as to 7 Erhart’s conduct with respect to his personal desktop computer and his girlfriend’s 8 Apple MacBook laptop is not appropriate. 9 Because the Court already found above that BofI has not met its initial burden 10 of demonstrating Erhart destroyed evidence on the two USB flash drives, the only 11 device left is Erhart’s BofI-issued laptop computer. The Court will assume, for the 12 sake of argument, that BofI has satisfied the three-part test for demonstrating Erhart 13 engaged in spoliation by destroying the fraction of the files on this laptop that are 14 discussed above. Nonetheless, as discussed below, the Court ultimately finds no 15 sanction is appropriate regardless of whether or not Erhart had a duty to preserve 16 these files and deleted them with a culpable state of mind. 17 18 C. Appropriate Sanction 19 Assuming Erhart culpably destroyed evidence on his BofI-issued laptop, the 20 Court considers what, if any, sanction is appropriate. “A trial court’s discretion 21 regarding the form of a spoliation sanction is broad, and can range from minor 22 sanctions, such as the awarding of attorneys’ fees, to more serious sanctions, such as 23 dismissal of claims or instructing the jury that it may draw an adverse inference.” 24 Apple Inc. v. Samsung Elecs. Co., 881 F.Supp.2d 1132, 1135 (N.D. Cal. 2012) 25 (“Apple I”). “Any remedy applied to a spoliator ‘should be designed to: (1) deter 26 parties from engaging in spoliation; (2) place the risk of an erroneous judgment on 27 the party who wrongfully created the risk; and (3) restore ‘the prejudiced party to the 28 same position he would have been absent the wrongful destruction of evidence by – 12 – 15cv2287 1 the opposing party.’” Id. at 1136 (quoting Victor Stanley, Inc. v. Creative Pipe, Inc., 2 269 F.R.D. 497, 521, 534 (D. Md. 2010)). “In considering what spoliation sanction 3 to impose, if any, courts generally consider three factors: ‘(1) the degree of fault of 4 the party who altered or destroyed the evidence; (2) the degree of prejudice suffered 5 by the opposing party; and (3) whether there is a lesser sanction that will avoid 6 substantial unfairness to the opposing party.’” Apple II, 888 F. Supp. 2d at 992 7 (quoting Nursing Home Pension Fund v. Oracle Corp., 254 F.R.D. 559, 563 (N.D. 8 Cal. 2008)). 9 In addition, if a party requests a terminating sanction, the Ninth Circuit has 10 explained that district courts should consider five factors before imposing this harsh 11 sanction. Leon v. IDX Sys. Corp., 464 F.3d 951, 958 (9th Cir. 2006). These factors 12 are: “(1) the public’s interest in expeditious resolution of litigation; (2) the court’s 13 need to manage its dockets; (3) the risk of prejudice to the party seeking sanctions; 14 (4) the public policy favoring disposition of cases on their merits; and (5) the 15 availability of less drastic sanctions.” Id. (quoting Anheuser-Busch, 69 F.3d at 348); 16 accord U.S. for Use & Ben. of Wiltec Guam, Inc. v. Kahaluu Const. Co., 857 F.2d 17 600, 603 (9th Cir. 1988). The court is not required to make explicit findings regarding 18 each of these factors. Leon, 464 F.3d at 958 (citing Willtec Guam, 857 F.2d at 603). 19 Yet, “a finding of ‘willfulness, fault, or bad faith’ is required for dismissal to be 20 proper.” Id. (quoting Anheuser-Busch, 69 F.3d at 348). In addition, the court “must 21 consider ‘less severe alternatives’ than outright dismissal.” Id. (quoting Willtec 22 Guam, 857 F.2d at 604). 23 Thus, regardless of the type of sanction requested by BofI, whether it has 24 suffered prejudice influences the Court’s analysis of which sanction “to impose, if 25 any.” See Apple II, 888 F. Supp. 2d at 992; see also Leon, 464 F.3d at 959–60. “The 26 prejudice inquiry ‘looks to whether the [spoiling party’s] actions impaired [the non- 27 spoiling party’s] ability to go to trial or threatened to interfere with the rightful 28 decision of the case.” Leon, 464 F.3d at 959 (alteration in original). “In the Ninth – 13 – 15cv2287 1 Circuit, spoliation of evidence raises a presumption that the destroyed evidence goes 2 to the merits of the case, and further, that such evidence was adverse to the party that 3 destroyed it.” Apple II, 888 F. Supp. 2d at 993 (citing Dong Ah Tire & Rubber Co., 4 Ltd. v. Glasforms, Inc., No. C 06–3359 JF, 2009 WL 1949124, at *10 (N.D. Cal. July 5 2, 2009)). 6 Here, even if spoliation has occurred, the Court finds sanctions are not 7 appropriate because BofI has not suffered any meaningful prejudice. Only a fraction 8 of the files deleted on Erhart’s BofI-issued laptop (29 of 878) have been destroyed. 9 Further, as to the 29 files that have been destroyed, the Court finds Erhart has rebutted 10 the presumption for some of these files that they go “to the merits of the case.” See 11 Apple II, 888 F. Supp. 2d at 993. For example, destroyed e-mails like 12 “REFRIGERATOR !!” do not concern the merits of Erhart’s whistleblower 13 retaliation claims. And again, for many of the files that have been permanently 14 deleted from the laptop, there are identical copies in BofI’s possession. 15 Faced with Erhart’s claim that it has not suffered any prejudice because it has 16 access to copies of the files he destroyed, BofI argues that “[w]hile it may 17 theoretically be possible to locate the same information in other files on BofI’s 18 system and recreate his investigation and findings, it is not BofI’s burden to do so.” 19 (Reply 7:27–28.) The Court agrees. BofI does not have the burden of proof on 20 Erhart’s claims. Erhart is the one who will need to convince the trier of fact that he 21 reasonably believed BofI’s conduct was a violation of the laws covered by the 22 whistleblower provisions he invokes. See Tides v. Boeing Co., 644 F.3d 809, 814 (9th 23 Cir. 2011). He will also need to identify the documents supporting his claims before 24 trial. See Fed. R. Civ. P. 26(a). If, as BofI claims, he destroyed some of the documents 25 supporting his allegations, then he may have trouble meeting his burden. 26 Nevertheless, BofI repeatedly complains that is has been deprived of the “trail 27 of evidence” supporting Erhart’s allegations. Fortunately for BofI, it can recall the 28 bloodhounds—sitting in the Recycle Bin on the hard drive image in BofI’s – 14 – 15cv2287 1 possession is a folder titled “Provided to OCC Via Email from BofI laptop” 2 containing the hundreds of files that were presumably collected by Erhart and sent to 3 the OCC. (See Armstrong Decl. Ex. D.) The trail has been blazed—BofI need only 4 follow it instead of seeking sanctions against Erhart. 5 BofI also relies heavily on the Ninth Circuit’s decision in Leon v. IDX Systems 6 Corp., 464 F.3d 951, 955 (9th Cir. 2006), to support its request for sanctions, but that 7 case is distinguishable. There, after litigation commenced, the plaintiff deleted more 8 than 2,200 files from the defendant company’s laptop and also “wrote a program to 9 ‘wipe’ any deleted files from the unallocated space in the hard drive.” Leon, 463 F.3d 10 at 956. Some of the files permanently wiped from the work laptop contained 11 pornographic content, which would have been “at the heart” of the defendant’s 12 defense to the plaintiff’s employment discrimination claims. Id. at 956, 960. The 13 Ninth Circuit affirmed because the district court did not abuse its discretion in 14 imposing a terminating sanction. Id. at 963. Here, in contrast, only a fraction of the 15 files deleted by Erhart from his BofI-issued laptop have been overwritten and 16 destroyed. Further, duplicates of almost all of these files are available to BofI from 17 the other sources discussed in this motion—in addition to potentially BofI’s own 18 systems. Thus, for these reasons, among others, the prejudice suffered by BofI is 19 minimal in comparison to the defendant in Leon and does not justify comparable 20 sanctions. 21 Accordingly, even if spoliation has occurred, the Court finds spoliation 22 sanctions are not appropriate. In particular, the Court concludes BofI has not suffered, 23 and does not face the risk of, prejudice that is sufficient enough to warrant sanctions 24 against Erhart. The Court denies BofI’s requests for a terminating sanction, an 25 adverse inference jury instruction, and monetary sanctions. 26 // 27 // 28 // – 15 – 15cv2287 1 III. CONCLUSION & ORDER 2 In sum, the Court finds imposing sanctions for spoliation of evidence is not 3 appropriate. It is unclear whether any potentially relevant evidence has been 4 destroyed. Rather, the “destroyed” evidence BofI appears to be hunting for is sitting 5 in the Recycle Bin on a hard drive image in BofI’s possession. BofI has neither met 6 its burden of demonstrating spoliation has occurred nor shown why imposing 7 sanctions are appropriate. 8 In light of the foregoing, the Court DENIES BofI’s motion for imposition of 9 sanctions for spoliation of evidence against Erhart (ECF No. 12). In addition, the 10 Court GRANTS BofI’s motion to seal (ECF No. 15). The Court ORDERS the Clerk 11 of the Court to accept and FILE UNDER SEAL the requested documents (ECF No. 12 16). 13 IT IS SO ORDERED. 14 15 DATED: September 21, 2016 16 17 18 19 20 21 22 23 24 25 26 27 28 – 16 – 15cv2287

Some case metadata and case summaries were written with the help of AI, which can produce inaccuracies. You should read the full case before relying on it for legal research purposes.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.