Searching over 5,500,000 cases.

Buy This Entire Record For $7.95

Download the entire decision to receive the complete text, official citation,
docket number, dissents and concurrences, and footnotes for this case.

Learn more about what you receive with purchase of this case.

Downs v. Virginia Health System

United States District Court, Western District of Virginia, Harrisonburg Division

June 2, 2014



James G. Welsh U.S. Magistrate Judge

All non-dispositive pretrial motions and issues, except motions in limine, having been previously referred pursuant to 28 U.S.C. § 636(b)(1)(A) (docket #12), this matter is now before the underDated: Virginia Health System, et al’s combined Motion to Compel and to Extend expert disclosure deadlines (docket #56) and their supporting memorandum of points and authorities (docket #57). The plaintiff has responded in opposition (docket #61). All parties having waived oral argument this discovery dispute is now ripe for adjudication.


Substantively, this cause of action pertains to claims asserted by Christy Downs under the Family Medical Leave Act (“FMLA”), 29 U.S.C. § 2601, et seq., and the Americans with Disabilities Act (“ADA”), 42 U.S.C. § 12101, et seq, (docket #30). As with many, if not most, employment discrimination cases, her claim turns on the basis for her termination. Among the reasons given to justify her discharge after nearly seventeen years of employment as an executive secretary (docket #1, ¶7) were that she had accessed her supervisor’s e-mail account without authority and that she had similarly forwarded information from that account to her personal email accounts and her home computers without permission (docket #57, p 1 et seq.). In contrast, the plaintiff claims that her access to her supervisor’s computer was pursuant to a long-standing authorization, was a routine part of her responsibilities and facilitated her ability to work at home (Id., exhibit 5).

The discovery dispute now before the court stems from the plaintiff’s representation that she deleted all material she sent to her home computers following her August 2011 termination, from certain of her discovery responses outlined by the defendants in their memorandum (docket # 57, p. 3-6), and from the defendants’ discovery request seeking to obtain the plaintiff’s family computers in order to attempt to recover the work-related material she forwarded utilizing the services of a computer forensics expert. It is their further contention that since the normal use of computer equipment may cause information to be overwritten or otherwise lost, the only way to ensure against any further spoliation or destruction of evidence is through mirror-imaging. The plaintiff, on the other hand, argues that the defendants’ request is overly broad, burdensome, “personally intrusive, ” and “would necessarily invade” the attorney-client privilege (docket #61, p 1)

Relevant to this request, in the plaintiff’s discovery responses she identified her two home computers as a “tower” and a Dell laptop. Inter alias, she also identified various documents he had forwarded to her home computers, including “minutes or other information … to work-on” at home, notes she “created outlining her treatment, ” and certain of her supervisors emails as material forwarded to her home computers. Throughout this litigation Ms. Downs has also consistently represented that she electronically retained no material pertaining to her former employer.

In a nutshell, the plaintiff’s central objection relates to the defendants’ request to mirror-image the hard drives on two computes that are used, and have been used, to communicate with her attorneys and generally by her entire family, including her husband and their two children (docket #61, p.4). In addition, she argues that the defendants’ in-house IT experts and its own computer logs and reports are readily available sources of information concerning records of electronic mail sent to her personal email account and her access to her supervisor’s e-mail account (Id., p. 4-5).

Rule 26 and ESI

Central to resolving any discovery dispute is determining whether the information sought is within the permissible scope of discovery. See Rules 26(b)(1) and 26(a). In effect, Rule 26 (a)(1) includes all electronically stored information (“ESI”) within the scope of discoverable “documents” and data “compilations." Thus, electronic mail (“e-mail”), Word or WordPerfect documents, voicemail, instant messages, backup tapes, database files, and the like are all generally discoverable.

Although, as a general proposition, the rules of discovery are to be given a broad and liberal construction, Herbert v. Lando, 441 U.S. 153, 177 (1979), ESI discovery is subject to the specific limitations outlined in Rule 26(b)(2)(B). The data must be “reasonably accessible” without undue burden or cost, and if not, on proper motion such information may nevertheless be ordered upon a “showing [of] good cause” and application of the proportionality principles embodied in Rule 26(b)(2)(C).

Consequently, while Rule 26(b)(1) entitles the parties to “obtain discovery of any non-privileged matter that is relevant to any claim or defense, ” the court has broad discretion in determining relevance[1] for discovery purposes. Watson v. Lowcountry Red Cross, 974 F.2d 482, 489 (4th Cir. 1992). In striking the appropriate balance between these two tensions, “[d]istrict courts enjoy nearly unfettered discretion to control the timing and scope of discovery and impose sanctions for failures to comply with its discovery orders, " Hinkle v. City of Clarksburg, 81 F.3d416, 426 (4th Cir. 1996) (citations omitted), and the party resisting discovery bears the burden of showing why it should not be granted. Rogers v. Tri-State Materials Corp., 51 F.R.D. 234, 247 (NDWVa. 1970); Mainstreet Collection, Inc. v. Kirkland's, Inc., 270 F.R.D. 238, 241 (EDNC. 2010); Brey Corp. v. LQ Mgmt., L.L.C., 2012 U.S. Dist. LEXIS 104952, *11 (DMd. July 26, 2012) ("In order to limit the scope of discovery, the 'party resisting discovery bears the burden of showing why [the discovery requests] should not be granted.'" (quoting Clere v. GC Servs., L.P., 2011 U.S. Dist. LEXIS 61730, *2 (SDWVa. June 3, 2011)).

Rule 34 and ESI

On its face, the discovery issue presented by the defendants’ request for an exhaustive forensic examination of the plaintiff’s computers is also directly within the scope of ESI discovery contemplated by the inspection, copying, testing and sampling provisions of Rule 34(a)(1)(A). More generally Rule 34 also sets-out procedures to be used for producing ESI. At the same time, however, such a discovery request is also subject to the proportionality limitations applicable to all discovery under Rule 26(b)(2)(C), including the prohibition of discovery that is unreasonably cumulative, duplicative or seeks discovery that could be obtained from some more convenient, less burdensome or less expensive source, or discovery where the benefit is outweighed by its ...

Buy This Entire Record For $7.95

Download the entire decision to receive the complete text, official citation,
docket number, dissents and concurrences, and footnotes for this case.

Learn more about what you receive with purchase of this case.