NO. 05-11-00952-CV - 5th Court of Appeals

Transcription

NO. 05-11-00952-CV - 5th Court of Appeals
NO. 05-11-00952-CV
ACCEPTED
225EFJ016533669
FIFTH COURT OF APPEALS
DALLAS, TEXAS
11 October 7 P1:57
Lisa Matz
CLERK

In The Court Of Appeals
For the Fifth District Of Texas
Dallas, Texas

RELIANT HOSPITAL PARTNERS, LLC, et al.,
Appellants
vs.
CORNERSTONE HEALTHCARE GROUP HOLDINGS, INC.,
Appellee

On Appeal From The
68th Judicial District Court of Dallas County, Texas
Trial Court Cause No. 11-04339

APPELLEE’S RESPONSE BRIEF

Scott A. Brister
State Bar No. 00000024
David P. Whittlesey
State Bar No. 00791920
ANDREWS KURTH LLP
111 Congress Ave., Suite 1700
Austin, Texas 78701
Phone: 512.320.9200
Fax: 512.320.9292
[email protected]
[email protected]
Marc D. Katz
State Bar No. 00791002
Cristina I. Torres
State Bar No. 24051437
ANDREWS KURTH LLP
1717 Main Street, Suite 3700
Dallas, Texas 75201
Phone: 214.659.4400
Fax: 214.659.4401
[email protected]
[email protected]
ATTORNEYS FOR APPELLEE CORNERSTONE
HEALTHCARE GROUP HOLDINGS, INC.
AUS:646830.2
TABLE OF CONTENTS Index of Authorities ................................................................................................. ii Introduction .............................................................................................................1 Statement of Facts ...................................................................................................2 1. Cornerstone’s managers use Cornerstone’s assets to set up a competing business ..................................................................... 2 2. They copy Cornerstone’s reports and data ......................................... 5 3. They cover their tracks by deleting data at Cornerstone .................... 7 4. When suit is filed, they delete data at Reliant too .............................. 9 Summary of Argument...........................................................................................12 I. The Consequences of Spoliation..................................................................14 II. No‐Evidence Issues ......................................................................................17 III. A. Probable Right: Misuse of Confidential Information ........................ 19 B. Probable Right: Usurpation of Corporate Opportunities.................. 23 C. Probable Irreparable Injury: Possession + Position.......................... 26 D. Balance of Equities/Public Interest: Those Who Breach Confidences and Delete Evidence Have No Claim ............................. 30 Objections to the Form of the Order ...........................................................32 A. For Obvious Reasons, the Order Did Not Detail Trade Secrets ............................................................................................... 32 B. The Order is not Overbroad; it Covers Targets Identified Using Cornerstone’s Confidential Information .................................. 36 C. Effective Relief Must Include Those Acting in Concert ...................... 40
i
AUS:646830.2
INDEX OF AUTHORITIES Cases Alex Sheshunoff Mgmt. Servs., L.P. v. Johnson,
209 S.W.3d 644 (Tex. 2006) ................................................................................. 42
Bennett v. Reynolds,
315 S.W.3d 867 (Tex. 2010) ................................................................................. 41
Birnbaum v. Alliance of Am. Insurers,
994 S.W.2d 766 (Tex. App.—Austin 1999, pet. denied) ................................. 19
Buckeye Retirement Co., LLC, Ltd. v. Bank of Am., N.A.,
239 S.W.3d 394 (Tex. App.—Dallas 2007, no pet.) .......................................... 14
Butnaru v. Ford Motor Co.,
84 S.W.3d 198 (Tex. 2002) ................................................................................... 29
Chrysler Ins. Co. v. Greenspoint Dodge of Houston, Inc.,
297 S.W.3d 248 (Tex. 2009) ................................................................................. 41
Cire v.Cummings,
134 S.W.3d 835 (Tex. 2004) ................................................................................. 17
Computek Computer & Office Supplies, Inc. v. Walton,
156 S.W.3d 217 (Tex. App.—Dallas 2005, no pet.) .......................................... 36
Computer Assocs. Int'l, Inc. v. Altai, Inc.,
918 S.W.2d 453 (Tex. 1996) ................................................................................. 21
Conley v. DSC Comm'ns Corp.,
No. 05-98-01051-CV, 1999 WL 89955 (Tex. App.—Dallas
Feb. 24, 1999, no pet.) .............................................................................. 27, 39, 42
Dallas/Fort Worth Int'l Airport Bd. v. Ass'n of Taxicab Operators, USA,
335 S.W.3d 361 (Tex. App.—Dallas 2010, no pet.) ................................ 2, 17, 18
Electronic Data Systems Corp. v. Powell,
524 S.W.2d 393 (Tex. Civ. App.—Dallas 1974, writ ref'd n.r.e.).................... 38
ii
AUS:646830.2
ERI Consulting Eng’rs, Inc. v. Swinnea,
318 S.W.3d 867 (Tex. 2010) ................................................................................. 29
Estancias Dallas Corp. v. Schultz,
500 S.W.2d 217 (Tex. Civ. App.—Beaumont 1973, writ ref'd n.r.e.)............. 30
Franke v. Wiltschek,
209 F.2d 493 (2 Cir. 1953) .................................................................................... 23
GTE Sw., Inc. v. Bruce,
998 S.W.2d 605 (Tex. 1999) ................................................................................. 41
Garth v. Staktek Corp.,
876 S.W.2d 545 (Tex. App.—Austin 1994, writ dism'd w.o.j.) ...........25-26, 29
Global Water Group, Inc. v. Atchley,
244 S.W.3d 924 (Tex. App.—Dallas 2008, no pet.) .......................................... 28
Graham Mortg. Corp. v. Hall,
307 S.W.3d 472 (Tex. App.—Dallas 2010, no pet.) .......................................... 18
Ex parte Hudson,
917 S.W.2d 24 (Tex. 1996) ................................................................................... 34
Hyde Corp. v. Huffines,
314 S.W.2d 763 (Tex. 1958) ..................................................................... 23, 26, 31
IAC, Ltd. v. Bell Helicopter Textron, Inc.,
160 S.W.3d 191 (Tex. App.—Fort Worth 2005, no pet)................. 23, 27, 28, 33
Julius Hyman & Co. v. Velsicol Corp.,
233 P.2d 977 (Colo. 1951) .................................................................................... 31
K & G Oil Tool & Serv. Co. v. G & G Fishing Tool Serv.,
314 S.W.2d 782 (Tex. 1958) ........................................................................... 30, 31
Liberty Mut. Ins. Co. v. Mustang Tractor & Equip. Co.,
812 S.W.2d 663 (Tex. App.—Houston [14th Dist.] 1991, no writ) ................ 35
iii
AUS:646830.2
Ligon v. E. F. Hutton & Co.,
428 S.W.2d 434 (Tex. Civ. App.—Dallas 1968, writ ref'd n.r.e.)..............31-32
MRT, Inc. v. Vounckx,
299 S.W.3d 500 (Tex. App.—Dallas 2009, no pet.) .......................................... 15
Matlock v. Data Processing Sec., Inc.,
618 S.W.2d 327 (Tex. 1981) ................................................................................. 33
Methodist Hosps. of Dallas v. Tex. Indus. Acc. Bd.,
798 S.W.2d 651 (Tex. App.—Austin 1990, ) ..................................................... 30
Protestant Episcopal Church Council of Diocese of Tex. v. McKinney,
339 S.W.2d 400 (Tex. Civ. App.—Eastland 1960, writ ref'd) ......................... 35
Putnam v. City of Irving,
331 S.W.3d 869 (Tex. App.—Dallas 2011, pet. denied) ............................ 18, 22
Ramos v. Frito-Lay, Inc.,
784 S.W.2d 667, 669 (Tex. 1990) ......................................................................... 42
Rugen v. Interactive Bus. Sys., Inc.,
864 S.W.2d 548 (Tex. App.—Dallas 1993, no writ) .................................passim
Safeguard Business Systems, Inc. v. Schaffer,
822 S.W.2d 640 (Tex. App.—Dallas 1991, no writ) ................................... 33, 34
Shannon v. Texas General Indem. Co.,
889 S.W.2d 662 (Tex. App.Houston [14th Dist.] 1994, no writ) .................... 25
Sharma v. Vinmar Int'l Ltd.,
231 S.W.3d 405 (Tex. App.—Houston [14th Dist.] 2007, no pet.) ................. 19
Southwest Research Inst. v. Keraplast Techs., Ltd.,
103 S.W.3d 478 (Tex. App.—San Antonio 2003, no pet.) ............................... 37
Southwest Weather Research, Inc. v. Jones,
327 S.W.2d 417 (1959).......................................................................................... 18
iv
AUS:646830.2
T-N-T Motorsports, Inc. v. Hennessey Motorsports,
965 S.W.2d 18 (Tex. App.—Houston [1st Dist.] 1998, no pet.)................ 27, 37
Tom James of Dallas, Inc. v. Cobb,
109 S.W.3d 877 (Tex. App.—Dallas 2003, no pet.) .......................................... 19
Trilogy Software, Inc. v. Callidus Software, Inc.,
143 S.W.3d 452 (Tex. App.—Austin 1994, no pet.) ......................................... 28
Truly v. Austin,
744 S.W.3d 934 (Tex. 1988) ................................................................................. 31
Vaughn v. Intrepid Directional Drilling Specialists, Ltd.,
288 S.W.3d 931 (Tex. App.–Eastland 2009, no pet.)........................................ 42
Wal-Mart Stores, Inc. v. Johnson,
106 S.W.3d 718 (Tex. 2003) ....................................................................... 2, 14, 15
STATUTES, REGULATIONS, AND RULES
Tex. R. Civ. Proc. 683.................................................................................... 14, 30, 34, 40
v
AUS:646830.2
STATEMENT REGARDING ORAL ARGUMENT Appellee Cornerstone believes this case can be decided on the briefs and
oral argument is unnecessary. The interlocutory appeal challenges a temporary
injunction on grounds this Court has rejected several times before. Moreover,
the extensive spoliation of evidence by the Defendants raises a presumption that
the destroyed evidence, along with all the other evidence and inferences, support
the trial court’s order. That said, Cornerstone would be pleased to present oral
argument if it would aid the Court in the disposition of this appeal
ISSUES PRESENTED In addition to responding to the 15 or more issues in the Defendants’ four
briefs, Appellee presents the following issue for review:
1.
When former employees deliberately delete evidence of what
they downloaded from a former employer’s computers, may
the trial court presume the evidence was confidential and
proprietary and enjoin them from using or disclosing it?
vi
AUS:646830.2
INTRODUCTION The Defendants have nothing if not nerve. They claim there is no
evidence they took any confidential information after wiping their computers clean of whatever information they took. They lay claim to equity and the
public interest, although their briefs never challenge the trial court’s finding
that they “intentionally deleted e-mail and documents to cover up their
actions.” 2 CR 707. They raise three objections this Court has expressly
rejected in one of its most frequently cited opinions on temporary
injunctions —which is completely absent from their 134 pages in four briefs.
See Rugen v. Interactive Bus. Sys., Inc., 864 S.W.2d 548 (Tex. App.—Dallas
1993, no writ).1 They have removed large parts of this dispute to this Court
by filing two appeals.2
And they demand the right to keep using
confidential information on the ground that they didn’t know it was
confidential when they initially got it.
For two main reasons, the Court need not engage in a detailed
analysis of the Defendants’ many complaints in this interlocutory appeal:
Westlaw lists 75 citations to Rugen to date. See Westlaw.com, citing references to Rugen,
854 S.W.2d 548 (available at www.westlaw.com) (accessed October 5, 2011).
1
In addition to this interlocutory appeal, Reliant has filed a separate mandamus action. See
In re Reliant Hospital Partners, LLC, No. 05-11-01218-CV.
2
1
AUS:646830.2
1.
Under Texas law, “a party who has deliberately destroyed
evidence is presumed to have done so because the evidence was
unfavorable to its case.” Wal-Mart Stores, Inc. v. Johnson, 106 S.W.3d 718, 721
(Tex. 2003). Regardless of the other evidence, the trial court had discretion
to presume the destroyed evidence established the grounds for temporary
relief, and this Court should affirm that exercise of discretion.
2.
The Defendants are not entitled to a preview ruling on the
merits from this Court. See Dallas/Fort Worth Int’l Airport Bd. v. Ass'n of
Taxicab Operators, USA, 335 S.W.3d 361, 364 (Tex. App.—Dallas 2010, no
pet.). That is precisely what their no-evidence complaints seek.
The Court should affirm the trial court’s order and send this case back
for trial.
STATEMENT OF FACTS 1. Cornerstone’s managers use Cornerstone’s assets to set up a competing business Five of the individual Defendants are former officers and managers of
Appellee Cornerstone Healthcare Group Holdings, Inc.— Michael Brohm,
Patrick Ryan, Kenneth McGee, Jerry Huggler, and Chad Deardorff (“the
former managers”). They resigned en masse and immediately went to work
at Reliant Hospital Partners, LLC on the day it was created, March 23, 2011.
2
AUS:646830.2
Each took virtually the same position at Reliant that he had held at
Cornerstone.3 Reliant is now a competitor of Cornerstone in the business of
buying and running post-acute care hospitals. 3 RR 87-88; 6 RR 90, 153.4
The former managers readily admit that while still on Cornerstone’s
payroll they had been negotiating for months with Nautic Partners LLC (an
investment banking group in Rhode Island) to hire them to run the chain of
healthcare facilities they convinced Reliant to buy. 1 CR 329-30; 10 RR 6775, 89-95.
To facilitate this new venture, the former managers used
Cornerstone’s confidential information.
Michael Brohm, CEO first of
Cornerstone and later of Reliant, sent a “business plan” to Nautic that
disclosed Cornerstone’s “complete playbook” of business opportunities, 4
RR 12-13, 40-43; 10 RR 212-271, including companies with which it was
currently “in discussions” potentially leading to acquisition. 4 RR 27-28; 11
RR 544. He also sent Nautic the financials, market details, and business
The executives’ positions at Cornerstone were: (1) Michael Brohm - President, CEO,
Director; (2) Kenneth McGee - V.P. of Hospital Operations; Patrick Ryan - V.P. of Business
Development; (4) Jerry Huggler - V.P. of Finance; (5) Chad Deardorff - Group C.F.O.). 1 CR 45.
Upon joining Reliant, Brohm became the CEO and a Board member (19 RR 61), McGee the Chief
Operating Officer (19 RR 476), Ryan the Senior V.P. of Marketing and Provider Relations (19 RR
629), Huggler the Chief Financial Officer (19 RR 429), and Deardorff the Senior V.P. of Financial
Operations (19 RR 343).
3
4
See 4 RR 20 & compare map at 15 RR 431 with map at 15 RR 431; see also infra at 20 n.15.
3
AUS:646830.2
strategy for Cornerstone and its individual hospitals. 4 RR 21-24; 12 RR 3562. After giving a “Strategic Assessment” regarding opportunities in the
post-acute care market to Cornerstone’s Board on February 15, 2011, a week
later the former managers presented the same information to Nautic using
some of the same PowerPoint slides5 — and charged Cornerstone for their
travel to Rhode Island to make the presentation. 4 RR 21-24; 12 RR 35-62.
The data shared with Nautic was not general knowledge; it was
confidential information gathered using Cornerstone’s network of hospital
managers around the country.
In the fall of 2010, Brohm asked these
managers to gather data about potential opportunities in their local markets.
5 RR 83-86; 12 RR 63-80; 19 RR 73-74. Their reports included detailed
information about existing local healthcare facilities, including:
5
•
how they got referrals;6
•
how they were trying to increase those referrals;7
Compare 10 RR 261, 263-64 with 10 RR 941, 934-35.
See, e.g., 12 RR 64 (noting that “most of [facility’s] patients come from” two named
sources); id. at 66 (noting which local facility “Appear[s] to have good physician contacts for
referral sources”); id. at 79 (noting that facility has “a variety of medical staff to achieve admission
and consultation goal”).
6
See, e.g., 12 RR 63 (noting method used by facility “to ensure that patients they want to
keep stay within their system”); id. at 65 (noting that facility was “[s]upposedly working on some
agreement with [named institution’s] neurologists”); id at 68 (noting closure of competing facility
and “Our liaison team is focused on this market to turn some of the patients our direction”).
7
4
AUS:646830.2
•
how they marketed their services;8
•
the problems they faced;9
•
the opportunities and limits for individual facilities or
particular markets;10 and
•
why some local facilities had failed.11
This confidential information from Cornerstone’s network of managers was
never shared with Cornerstone’s Board; instead, the former managers
provided that information to Nautic. 5 RR 139-41; 12 RR 63-80.
2. They copy Cornerstone’s reports and data The former managers did not leave Cornerstone empty-handed. In
an e-mail dated January 28, 2011, Brohm instructed Chad Deardorff to begin
preparations to copy or replicate Cornerstone’s information systems for use
See, e.g., 12 RR 63 (noting method facility uses “to ‘rehab’ patients that don't meet acute
rehab criteria-- they sell it as ‘rehab’ to patients & families”).
8
See, e.g., 12 RR 66 (noting that facility lacked “processes and systems in place” and
“appropriate supplies/equipment”); id. at 67 (noting circumstances in which “it is very difficult to
admit a patient to the unit”); id. at 73 (noting that facility was “known for taking patients that
aren’t ‘Rehab appropriate’”).
9
See, e.g., 12 RR 69 (noting difficulty of increasing occupancy because of medical director’s
strict criteria); id. at 71 (Ex. 266 p. 9) (noting reasons “I would not recommend competing in this
market”); id. at 76 (noting “very strong political clout” of local medical center in legislature, which
“will result in a decline in referrals” if new competition is introduced); id. at 77 (noting regulatory
restrictions that suggested the only avenue for expansion “is to purchase an existing entity or to
manage a unit”); id. at 78 (suggesting that with addition of 20 beds at a hospital, “Economies of
10
scale can be maintained”).
11
See, e.g., 12 RR 65 (noting why two other local facilities had failed).
5
AUS:646830.2
at Reliant:
Need to identify where the software or programming for CHG
[Cornerstone Healthcare Group] lies today and how can we
copy it or eventually redo it at Reliant; and who can redo it if
necessary.
Chad, prepare a list of all such reports we have today, where
does it pull data from, how does it pull the data, what is the
name of the report and where is the report kept; and any other
pertinent data. 10 RR 1030.
Similarly,
Brohm’s
assistant
testified
that
she
downloaded
Cornerstone documents at Brohm’s request and took them with her to her
new job in the same position at Reliant:
Q.
So that thumb drive, Mike Brohm asked you to put documents
on the thumb drive a month before you left Cornerstone, and
then you took that thumb drive with you to Reliant when you
went there?
A.
I did.
Q.
And what was on the thumb drive?
A.
I can't tell you specific documents. It was a folder for Mike
Brohm. 19 RR 461 (depo at 45:12-19).
*
*
*
Q.
And then you -- so you copied the information from the thumb
drive that you took from Cornerstone, you put it on your
Reliant laptop, and then you put that thumb drive in your
desk?
A.
Yes. 19 RR 461 (depo at 48:9-13).
6
AUS:646830.2
3. They cover their tracks by deleting data at Cornerstone It is hard to say precisely what Cornerstone information the former
managers took and disclosed to Reliant, because they deleted everything
from their Cornerstone computers before they left.
Defendant Brohm deletes data
Q.
So before you left Cornerstone, did Mr. Brohm also ask you to
delete e-mails or documents on your computer at Cornerstone?
A.
Yes.
Q.
What did he ask you to delete?
A.
E-mails and documents. I can’t give you specifics. 19 RR 456
(depo at 26:10-18).
...
Q.
And had you been working on a number of documents for
him?
A.
That’s all I did.
Q.
Including PowerPoint presentations?
A.
PowerPoints, Words, Excel. I mean, anything Mike needed, I
did. 19 RR 456 (depo at 28:7-12).
...
Q.
All the documents you had worked on in the last couple of
months before you left Cornerstone you deleted?
A.
Yes.
Q.
And that was at Mr. Brohm’s direction?
7
AUS:646830.2
A.
Yes. 19 RR 456-57 (depo at 28:24-29:3).
Defendant Ryan deletes data
Q.
Okay. So when Mike Brohm came to you in February or March,
you not only did it on your Yahoo account, you did on your
Cornerstone account, you went back and deleted any of the emails about Reliant?
A.
Yes. 19 RR 659 (depo at 38:3-7).
...
Q.
And tell me about that conversation. He comes to you and he
says?
A.
I'm going to guess -- I mean, I don't recall the exact details -Pat, if you have any e-mails that -- that need to be deleted, start
looking at them and start deleting them, something to that
extent.
Q.
What did you do?
A.
Probably deleted them.
Q.
What do you mean "probably deleted them"?
A.
Well, probably deleted them. I mean, I -- he was my boss and, I
mean, I probably went -- I don't recall. I probably went through
and deleted some, kept some based on what I thought I needed
to keep or -- or delete. I'm being honest.
Q.
Okay. And why -- why would you be in there deleting e-mails?
A.
I don't know. It's -- it's obviously conversations that -- or
information such as this that he did not want them to show up
at a later date…. 19 RR 652-53 (depo at 12:10-13:4).
8
AUS:646830.2
Defendant Crouch deletes data
Q.
Which e-mails do you recall deleting?
A.
Those were e-mails and transactions related to any
communication I had with Mike [Brohm] and Ken [McGee]. 19
RR 318 (Crouch Depo 87:20-22).
...
Q.
Why did you do that?
A.
I was requested to do so.
Q.
Who asked you to do that?
A.
I believe Ken McGee asked me to do that.
Q.
Do you know why he asked you to do that?
A.
I have no idea. 19 RR 318 (depo at 88:8-13).
Defendant Deardorff deletes data
Q.
Okay. Tell me more about that. You just sat down and you are
leaving Cornerstone and you feel --
A.
I made a decision to delete the e-mails.
Q.
Okay. And for what purpose? You had not deleted them the
day before or the week before; you decided to delete them right
before you left Cornerstone. Why did you make that decision?
...
A.
I -- I don't know if I had a reason, other than I just made the
decision -- 19 RR 359 (depo at 15:9-16, 15:25-16:6, 16:10-11).
4. When suit is filed, they delete data at Reliant too Again, it is hard to say precisely what the former managers delivered
9
AUS:646830.2
to Reliant, as there too they deleted everything after this suit was filed. As
Brohm’s secretary testified:
Q.
You came to be employed at Reliant in the same position that
you had at Cornerstone, that is, Mr. Brohm' s assistant, right?
A.
Yes.
Q.
As Mr. Brohm' s assistant at Reliant, did Mr. Brohm ask you to
delete e-mails or documents?
A.
Yes. 19 RR 454 (depo at 18:6-12).
...
Q.
How is it that you determined which emails and documents to
delete?
A.
I deleted all of it. 19 RR 454 (depo at 19:11-13).
...
Q.
… The documents that Mr. Brohm asked you to delete at
Reliant, on your Reliant computer, were all documents that you
edited while you were at Reliant?
A.
Yes. 19 RR 456 (depo at 25:15-18).
...
Q.
And essentially it was his communication to you, Delete all of
the documents that you’ve worked on for me since we’ve been
here?
A.
The conversation, how I remember it, was, Delete your e-mails
and delete the documents that you’ve done for me.
Q.
Did you believe that was wrong to do that?
10
AUS:646830.2
A.
I’m not going to question my boss. 19 RR 456 (depo at 25:2226:4).
On October 5, 2011, the court-appointed forensic expert in this case,
Noel Kersh of Pathway Forensics LLC, issued a report stating his findings
after an extensive investigation of the parties’ electronic data (copy attached
hereto as Tab A).12 The report speaks for itself:
1.
“Pathway found evidence of the presence of Cornerstone
proprietary information on the Defendants’ computers
and devices used by the Defendants. One specific device
of particular interest is a Kingston brand thumb drive
which was connected to multiple Defendants’ computers
at both Cornerstone and Reliant that was not produced
by any party for analysis.” Tab A, p. 3 of 44.
2.
“Brohm’s counsel stated that Mike Brohm was not aware
that Ryan Brohm, his son, was remotely logged into his
machine and running CCleaner the night of April 10,
2011. We found evidence that indicates Brohm may not
have been telling the truth about April 10. Brohm also
was in the possession of all four “community” USB
devices that were passed around between the
Defendants, but only one of those four devices was
produced for examination.” Tab A, p. 3 of 44.
3.
“Defendant Brohm provided a download of his Bellsouth
email account which was incomplete as our forensic
analysis uncovered a number of Reliant and Icon related
emails that were not in his production. The other
Defendants didn’t produce much if any webmail.
Cornerstone has requested the trial court clerk to prepare a supplemental record for filing
with this Court to include the forensic report.
12
11
AUS:646830.2
Pathway analyzed for webmail on each machine and
much webmail was found that was not produced by the
Defendants.” Tab A, p. 3 of 44.
4.
“Deardorff attached an external hard drive to his
Cornerstone computer the night before his last day of
employment. We found this same drive attached to his
Reliant computer and a folder named “Chad” which
contained a high volume of Cornerstone data. The drive
containing this Cornerstone data was not produced for
examination.” Tab A, p. 4 of 44.
5.
“Pathway became aware of a potential conflict of interest
with SamTech [employer of Defendant Brohm’s son,
Ryan Brohm] which provided IT services to both parties
in this matter at the same time. SamTech did not notify
either the Plaintiffs or the Defendants that the company
was providing IT services to both parties in this litigation
at the same time. In fact, SamTech instructed its
employees to lie in the event this conflict of interest was
discovered.” Tab A, p. 4 of 44.
SUMMARY OF ARGUMENT Under Texas law, evidence is presumed to be unfavorable to a party
that deliberately destroys it. Regardless of the other evidence, the trial court
had discretion to presume the destroyed evidence here would have
indicated a probable right to relief and probable injury, thus supporting a
temporary injunction.
There was evidence here that the former managers gathered detailed
information about potential business opportunities using Cornerstone’s
12
AUS:646830.2
personnel and assets, information that was only available to someone who
owned and operated post-acute care facilities in those communities. By
taking that information to Reliant for use, the former mangers both
breached their duty of confidences with Cornerstone and usurped its
business opportunities.
The trial court did not abuse its discretion in
protecting that information and those opportunities pending trial.
In Rugen v. Interactive Business Systems, Inc., 864 S.W.2d 548 (Tex.
App.—Dallas 1993, no writ), this Court expressly rejected three of the
arguments raised by the Defendants:
1.
A temporary injunction need not specify the precise
information that is confidential; it is perfectly proper to
enjoin use of “trade secrets” generally or by reference to
other documents. Id. at 552-53.
2.
Irreparable injury is shown by evidence that former
employees possess confidential information and are in a
position to use it; no showing of commercial use is
required. Id. at 552.
3.
An order barring former employees from contacting
particular businesses is not a bar to competition when
they learned about those contacts only through the use of
confidential information. Id. at 551.
There is no good reason this Court should have to explain these rules again.
The balance of equities and the public interest generally favors
protecting applicants like Cornerstone with a probable right and probable
13
AUS:646830.2
injury. Neither favors the Defendants, who either took trade secrets or plan
to use them, and whose deletions of relevant evidence prevent them from
coming to court with clean hands.
Rule 683 provides that a temporary injunction is binding on the
parties to the action and “those persons in active concert or participation
with them.”
Regardless of what the Defendants other than the former
managers knew, they were properly ordered not to perpetuate the misuse of
Cornerstone’s confidences and opportunities by exploiting it pending trial.
I. THE CONSEQUENCES OF SPOLIATION Cornerstone’s former officers and employees deliberately deleted
evidence — both at Cornerstone before they left and at Reliant after this suit
was filed. They admit this. See Statement of Facts, parts (3)-(4) supra. Under
Texas law, “a party who has deliberately destroyed evidence is presumed to
have done so because the evidence was unfavorable to its case.” Wal-Mart
Stores, Inc. v. Johnson, 106 S.W.3d 718, 721 (Tex. 2003). Thus, the trial court
had discretion to presume that the deleted evidence supported what
Cornerstone alleges. See Buckeye Retirement Co., LLC, Ltd. v. Bank of Am.,
N.A., 239 S.W.3d 394, 402 (Tex. App.—Dallas 2007, no pet.) (reviewing trial
judge’s decision whether to apply spoliation presumption for abuse of
14
AUS:646830.2
discretion).
The duty to preserve relevant evidence arises when parties should
know there is a substantial chance of litigation. Wal-Mart, 106 S.W.3d at
722-23. The Defendants clearly violated that duty by deleting data after suit
was filed. MRT, Inc. v. Vounckx, 299 S.W.3d 500, 510 (Tex. App.—Dallas
2009, no pet.). But they anticipated suit long before then, as they requested
indemnification from Nautic in the event Cornerstone filed this suit, and
selectively deleted relevant documents at Cornerstone before they left. See,
e.g., 12 RR 128-130; 19 RR 129-130 (depo at 330:4-5, 330:14-331:11, 331:16332:1); 19 RR 381 (depo at 57:10-58:13); 19 RR 456-457.
Naturally, the Defendants barely mention spoliation in their briefs. In
a footnote, Reliant argues it is irrelevant as the trial court refused to apply a
spoliation presumption.
But that is incorrect; while the trial judge
postponed the decision on a spoliation instruction for the jury trial, see 2 RR
53, he expressly found the Defendants’ evidence “not credible” because of
spoliation. 2 CR 710. As he explained to counsel:
THE COURT:
I just want to make it clear that there were a number of
references made, and you've said it here, that you can't use
the destruction of e-mails as a basis to punish the
defendants through an injunction. I agree with you, but
that's not the reason I think this pattern of destroying
evidence and e-mails and deleting e-mails is relevant….
15
AUS:646830.2
COUNSEL FOR RELIANT: I'm sure, and I will talk about this more, that
you will hear more about e-mails, et cetera. My point for
now is that with respect to November, December, January,
February, even March, there is actually nothing wrong
with deleting an e-mail associated with this because it has
nothing to do with their work at Cornerstone, and they're
entitled to keep that information from Cornerstone. It's not
destroying evidence unless -THE COURT:
How do I know that? I don't know what's in the e-mails.
They have certain duties. . . . I mean, they had certain
duties when they were employees at Cornerstone. Since I
don't have all that evidence, and I don't have certainty that
there isn't evidence that's still missing, it's very hard to
judge the credibility of your witnesses.
Reliant hired a forensic expert to testify that everything deleted from
its computers has been recovered. But it has prevented that claim from
being tested, obtaining an emergency stay from this Court on September 9,
2011 to stop production of the expert’s notes and reports so all his findings
could be examined. More importantly, evidence was deleted from many
places where he did not look, as the court-appointed forensic expert’s report
shows in detail. See Tab A.
It is frustrating, to say the least, to read the Defendants’ briefs
demanding that Cornerstone produce more evidence of what they
themselves took — and deliberately deleted. What they deleted could show
precisely what they took and what they disclosed or used.
16
AUS:646830.2
Having
destroyed the evidence themselves, the trial court was entitled to presume it
would have been favorable to Cornerstone and unfavorable to the
Defendants. See Cire v.Cummings, 134 S.W.3d 835, 841 (Tex. 2004).13 A trial
court does not abuse its discretion by issuing a temporary injunction when
spoliation by several Defendants supplies a presumption of prima facie
evidence against them.
II. NO­EVIDENCE ISSUES In their no-evidence points, the Defendants ask this Court to reverse
the temporary injunction because (1) the information they took was not
confidential, (2) they usurped no corporate opportunities, (3) they haven’t
used any confidential information yet, and (4) the equities are all in their
favor. But as this Court has often stated, an advisory opinion on the merits
is not what an interlocutory appeal is for. “[A] party may not use an appeal
of a temporary injunction ruling to get an advance ruling on the merits.”
Dallas/Fort Worth Int’l Airport Bd. v. Ass'n of Taxicab Operators, USA, 335
S.W.3d 361, 364 (Tex. App.—Dallas 2010, no pet.). As this Court said in
(“Because the audiotapes sought by Cire would have either proved or disproved
Cummings's claims, her destruction of them justifies a presumption they would have done the
latter. On this record, it was within the trial court's discretion to determine that Cummings
deliberately destroyed dispositive evidence; thus, death penalty sanctions are warranted in this
exceptional case.”).
13
17
AUS:646830.2
1959 and again last year:
[O]ur system of procedure is such that legal rights cannot be
finally determined upon a hearing relating to the wisdom or
expediency of issuing a status quo order. Deliberate action is
essential for the accurate determination of legal rights and
upon occasion this can be secured only by issuing a temporary
decree protecting a status quo.
Id. at 366 (quoting Southwest Weather Research, Inc. v. Jones, 327 S.W.2d 417,
421 (1959). The Defendants’ requests are inappropriate before trial.
The Reporter’s Record here contains 12 volumes of testimony and
deposition excerpts, and 9 volumes of exhibits. Marshaling all the evidence
would be wasteful for the litigants and tedious for the Court. Accordingly,
this brief will present only enough examples from the record to show that
the trial court did not abuse its discretion. See Putnam v. City of Irving, 331
S.W.3d 869, 873 (Tex. App.—Dallas 2011, pet. denied) (“When the trial court
bases its decision on conflicting evidence, there is no abuse of discretion.”).
Finally, Cornerstone need not show a probable right to relief and
probable injury relating to every one of its claims; a showing as to any one
of them is sufficient to justify preserving the status quo. See Graham Mortg.
Corp. v. Hall, 307 S.W.3d 472, 481 (Tex. App.—Dallas 2010, no pet.) (holding
movant did not have to show probable right relating to every loan to justify
temporary injunction, as preserving status quo required relief as to all);
18
AUS:646830.2
Birnbaum v. Alliance of Am. Insurers, 994 S.W.2d 766, 776 (Tex. App.—Austin
1999, pet. denied) (“Our reversal of the permanent-injunction order moots
one ground for the temporary injunction, but the other ground--that the
Quarterly Market Reports are trade secrets--survives.”).
A. Probable Right: Misuse of Confidential Information The law forbids employees from disclosing confidential information
of a former employer. See Rugen v. Interactive Bus. Sys., Inc., 864 S.W.2d 548,
551 (Tex.App.-Dallas 1993, no writ). The common law imposes this duty
whether or not there is a nondisclosure or noncompetition contract. See Tom
James of Dallas, Inc. v. Cobb, 109 S.W.3d 877, 888 (Tex. App.—Dallas 2003, no
pet.). The duty survives termination of employment. See Sharma v. Vinmar
Int’l Ltd., 231 S.W.3d 405, 424 (Tex. App.—Houston [14th Dist.] 2007, no
pet.).
Both Reliant and Cornerstone are in the business of buying healthcare
facilities, not just operating them. In the investment banking community
(which includes the owners of both Cornerstone and Reliant), the strengths
and weaknesses of potential target companies are considered highly
19
AUS:646830.2
confidential.14 That is exactly what the former managers took.
While Cornerstone previously owned only long-term acute care
hospitals, changes in federal regulations in 2009 encouraged Cornerstone
and its competitors to begin bundling various types of post-acute care
facilities. See 3 RR 121-128.15 The former managers asked Cornerstone’s
hospital managers throughout the country to identify and recommend local
facilities that would make for profitable acquisitions. This information was
not general knowledge in the industry — that explains why the former
managers had to gather it from local sources. The former CEO of Reliant’s
chain of facilities admitted that such information (e.g., bed-need analysis,
sources of referrals, and marketing strategies) is considered confidential
information. 19 RR 554 (depo at 129:19-131:20). Brohm took a copy of that
report with him to Reliant, where a hardcopy survived his spoliation efforts
See 19 RR 262-63 (depo at 48:19-49:20) (testimony of Vice President and now Principal with
Nautic: “Q. Does Reliant consider its target acquisition list to be confidential? A. Yes, sure.”).
14
Reliant argues that it and Cornerstone were in two entirely different markets. But the
record shows Cornerstone was pursuing the same inpatient rehabilitation facilities (IRFs) targeted
by Cornerstone. See, e.g., 10 RR 794-95 (Cornerstone Board Meeting August 12, 2010 identifying
IRFs for acquisition); 10 RR 942 (Cornerstone Board Meeting February 15, 2011 discussing pursuit
of IRF acquisitions); 10 RR 1010 (email from Cornerstone board member in January 2011 regarding
expansion into IRFs in local markets). Conversely, the record also shows that Reliant was pursuing
long-term acute care hospitals (LTACHs) like those held by Cornerstone, including Cornerstone
itself. See 11 RR 544 (business plan Brohm sent to Nautic in November 2010); 10 RR 262 (business
plan Brohm presented to Nautic iFebruary 22, 2011).
15
20
AUS:646830.2
and was produced by Reliant. 5 RR 21-22, 140.
“A trade secret is any formula, pattern, device or compilation of information which is used in one's business and presents an opportunity to
obtain an advantage over competitors who do not know or use it.”
Computer Assocs. Int’l, Inc. v. Altai, Inc., 918 S.W.2d 453, 455 (Tex. 1996).
Cornerstone produced testimony regarding the confidential nature of this
compilation, the measures taken to protect it, its value, the time and effort
spent gathering it, and the difficulty others would have duplicating it. See
Statement of Facts, part (1); 3 RR 102-106, 109.
In their briefs, the Defendants dismiss this data as “a few trivial
snippets of readily available information.”
But candid opinions from
knowledgeable professionals about local conditions and competitors in a
specialized market is not trivial. Only people in the business would know
these kinds of details. The Defendants disparage the value of knowing
which facilities have a “good reputation” as common knowledge. But the
“buyers” of rehab services are generally doctors who refer patients to
them,16 and their personal professional opinions are what counts rather than
See 3 RR 124 (“You want to be horizontally integrated because if you have that doctor, he's
the referring source. He's the one that has the patients. That's the guy you want to say, look, I can
16
21
AUS:646830.2
public hearsay.
It would be difficult for anyone else to replicate this same level of
inside information.
Reliable information about which facilities are
profitable, respected, or well-run cannot be obtained from the Internet.
Cornerstone could gather that kind of information because, at substantial expense, it owned and operated a network of healthcare facilities with
knowledgeable personnel around the country. Those who do not own such
a network would have difficulty gathering the same information even with
a large investment time and money; simply interviewing strangers is
unlikely to produce the same quality of information that Cornerstone’s
managers shared within their own company.
Reliant asks this Court to draw an inference that individual pieces of
this information were not trade secrets either because they are commonly
known or inconsequential. That is the wrong standard of review in at least
three respects. First, in reviewing a temporary injunction, the Court must
draw all legitimate inferences in favor of the trial court’s Order. See Putnam
v. City of Irving, 331 S.W.3d 869, 873 (Tex. App.—Dallas 2011, pet. denied).
take your patient, your ventilator patient. . . . From a business perspective now, I've captured -my client is really that doctor, even though we take care of the patient.”).
22
AUS:646830.2
Second, in reviewing a temporary injunction the question is not whether
information is in law and fact a trade secret, but whether it is entitled to
protection pending trial. See IAC, Ltd. v. Bell Helicopter Textron, Inc., 160
SW3d 191, 197 (Tex. App.—Fort Worth 2005, no pet).
And third, the
relevant question is not whether the Defendants might have developed this
list of targets independently, because that is not what they did — they took
it. As the Texas Supreme Court stated 53 years ago:
It matters not that defendants could have gained their
knowledge from a study of the expired patent and plaintiffs'
publicly marketed product. The fact is that they did not.
Instead they gained it from plaintiffs via their confidential
relationship, and in so doing incurred a duty not to use it to
plaintiffs' detriment. This duty they have breached.
Hyde Corp. v. Huffines, 314 S.W.2d 763, 774-75 (Tex. 1958) (quoting Franke v.
Wiltschek, 209 F.2d 493, 495 (2 Cir. 1953). Viewed by the proper standards,
the trial court did not abuse its discretion in determining there was
confidential information at stake that deserved protection pending trial.
B. Probable Right: Usurpation of Corporate Opportunities The Court need not address this issue if the temporary injunction is
supported by either ground above. See pp. 19-20 supra.
At the temporary injunction hearing, there was evidence that the
former
managers
(1)
identified
potential
23
AUS:646830.2
target
companies
using
Cornerstone’s assets, networks, and personnel, see e.g. 3 RR 99-105; 4 RR 1114, 19, 47-48; 10 RR 940; 14 RR 129-157; 15 RR 515; (2) took that information
to Reliant and recommended acquiring some of them, see 12 RR 63-80; 10 RR
258-259; 12 RR 63-80;
and (3) unless restrained, that is precisely what
Reliant intends to do, see, e.g., id.; 19 RR 134-136 (depo at 350:17-18, 351:1352:14, 352:19-355:12, 355:22-356:9, 356:14-25); 19 RR 310-312 (depo at 56:1018, 56:24-57:1, 57:5-58:6, 58:11-22, 59:21-60:15, 60:21-61:5). The trial court had
discretion to keep that from happening pending trial.
The Defendants complain that the Order does not contain a “factintensive analysis of multiple factors” required by Delaware law to prove
the merits of this claim. But a temporary injunction under Texas law does
not require a fact-intensive analysis of the merits; it requires only a showing
of probable right and probable injury.
The evidence already cited
establishes that.
The Defendants’ briefs speculate that the corporate-opportunity
doctrine played no part in the Order. There was necessarily some overlap
in Cornerstone’s breach of confidences and usurpation of opportunities
claims because the target companies were identified as potential targets
using Cornerstone’s confidential information and analysis. In any event,
24
AUS:646830.2
the Order expressly states that the facilities listed on Exhibit A attached to
the Order were corporate opportunities identified using Cornerstone’s
assets, see 2 CR 749, that the Defendants “have actively usurped” those
corporate opportunities, see 2 CR 749-750, and that they should be enjoined
from pursuing these “business opportunities” pending trial on the merits,
see 2 CR 757-759. This Order must be reviewed based on what it says, not
on stray remarks by judge or anyone else before or after it. See, e.g., Shannon
v. Texas General Indem. Co., 889 S.W.2d 662, 664 (Tex. App.―Houston [14th
Dist.] 1994, no writ) (holding grounds for summary judgment were those
stated in order, not in judge’s letter to parties).
The Defendants also argue that future targets cannot constitute
usurpation because they had no duty to their former employer. But as
already noted, an employee’s duty not to use confidential information
survives termination, and the information on potential targets was taken
before the former managers left.
See pp. 5-6, 19 supra.
Nor can the
Defendants be excused on the ground that Cornerstone can still compete for
these targets. In new markets, the highest returns are generally earned in
early months before other competitors have a chance to jump in. See Garth
v. Staktek Corp., 876 S.W.2d 545, 549 (Tex. App.—Austin 1994, writ dism’d
25
AUS:646830.2
w.o.j.).17
Allowing any of the Defendants to pursue targets based on
confidential information gained from Cornerstone’s local managers would
give them a “head start” not shared with other companies who have not
been privy to inside information. See Hyde Corp. v. Huffines, 314 S.W.2d 763,
778 (Tex. 1958) (noting that one who obtains confidential information has a
“head start” in subsequent competition).
C. Probable Irreparable Injury: Possession + Position The Defendants assert there was no evidence of probable irreparable
injury absent proof of actual or imminent use of Cornerstone’s confidential
information. This precise argument has been considered and rejected by
this Court before.
In Rugen v. Interactive Business Systems, Inc., 864 S.W.2d 548
(Tex.App.-Dallas 1993, no writ), a former employee challenged a temporary
injunction “because the record does not show that she had wrongfully used
and would continue to use any confidential information.” Id. at 552. But
(“Moreover, in technological industries, the design stage and the start-up phase provide
the creator of a new device a period in which to market the new product before potential
competitors are able to copy the technology. By appropriating Staktek's confidential information
before its publication, RTB was able to prepare to enter the market at the same time as Staktek, and
thus could deprive Staktek of the competitive advantage offered by the normal developmental
period.”).
17
26
AUS:646830.2
this Court held that probable injury and a probable right to relief could be
inferred if a former employee is in possession of confidential information
and in a position to use it:
From our review of the record, we find evidence indicating that
Rugen possesses confidential information of IBS and operates a
firm in direct competition with IBS. Rugen is in possession of
IBS's confidential information and is in a position to use it.
Under these circumstances, it is probable that Rugen will use
the information for her benefit and to the detriment of IBS.
Id. Other courts have applied this same standard. See, e.g., IAC, Ltd. v. Bell
Helicopter Textron, Inc., 160 SW3d 191, 200 (Tex. App.—Fort Worth 2005, no
pet.); T-N-T Motorsports, Inc. v. Hennessey Motorsports, 965 S.W.2d 18, 24
(Tex. App.—Houston [1st Dist.] 1998, no pet.); Conley v. DSC Comm’ns Corp.,
No. 05-98-01051-CV, 1999 WL 89955, at *4 (Tex. App.—Dallas Feb. 24, 1999,
no pet.) (not designated for publication).
In this case, the former managers shared Cornerstone’s confidential
information with their fellow Defendants, and in their briefs the assert the
right to continue using that information pending trial. The information on
these markets may have been deleted from their computers, but it cannot be
deleted from their heads. See, e.g., 7 RR 143 (testimony by Brohm: “I did not
use [Exhibit] 266 specifically because I know the markets in my head. I don't
need to look at a document to know markets.”). As the Defendants are in
27
AUS:646830.2
possession of confidential information and in a position to use it, the trial
court could conclude that Cornerstone had shown a probable injury.
The Defendants’ cite two cases for their claim that evidence of actual
use is required. See Global Water Group, Inc. v. Atchley, 244 S.W.3d 924, 930
(Tex. App.—Dallas 2008, no pet.); Trilogy Software, Inc. v. Callidus Software,
Inc., 143 S.W.3d 452, 463 (Tex. App.—Austin 1994, no pet.). But those were
judgments on the merits in damages actions, not temporary injunctions. In
a damages action, there are no damages without use. But the primary
purpose of a temporary injunction is to prevent use in the first place — and
thus irreparable damages.
It is true that a temporary injunction must state more than that the
movant is “suffering irreparable harm.” See Global Water, 244 S.W.3d at 930;
Trilogy Software, 143 S.W.3d at 463. But that of course is not this case. The
17-page Order here details the Defendants’ use of confidential information
and their efforts to cover it up. “The threatened disclosure of trade secrets
constitutes irreparable injury as a matter of law.” IAC, Ltd., 160 S.W.3d at
200.
Moreover, the trial court noted that use of Cornerstone’s confidential
information could be “impossible to measure with monetary damages.” 2
28
AUS:646830.2
CR 754. As the Defendants concede in their briefs, “there is no way to
measure the damage caused by lost opportunities to expand.” See Reliant
Brief at 49; Brohm Brief at 44. “An injury is irreparable if the injured party
cannot be adequately compensated in damages or if the damages cannot be
measured by any certain pecuniary standard.” Butnaru v. Ford Motor Co., 84
S.W.3d 198, 204 (Tex. 2002).
In the business of turning around less-
profitable healthcare facilities, lost profits may be hard to show with
“reasonable certainty.”
See ERI Consulting Eng’rs, Inc. v. Swinnea, 318
S.W.3d 867, 876 (Tex. 2010) (holding lost profits must be proven “by
competent evidence with reasonable certainty”); Garth v. Staktek Corp., 876
S.W.2d 545, 549 (Tex. App.—Austin 1994, writ dism’d w.o.j.) (“Lost
opportunity to create or gain control of a new market may result in
unquantifiable losses for which there is no adequate remedy at law.”)
Finally, the trial court also noted that the Defendants’ attempts to
“hide their activities” made it “difficult to determine” how Cornerstone’s
confidential information might be used pending trial. 2 CR 753. If the
Defendants wanted more specifics about how Cornerstone’s confidential
information had been used, they should not have deleted it to make that
hard to determine. This Court should not demand more specificity in the
29
AUS:646830.2
Order than the Defendants prevented by concealing what they took.
In this case, the Order specifies that the Defendants had taken and
used confidential information and ordered them to desist. Texas law does
not require any more than that, as the Texas Supreme Court stated more
than fifty years ago:
Future problems of enforcement applicable to most every type
or form of injunction may be imagined. The decree is,
however, to be interpreted in the light of its recitals and
findings. It was found that respondents were wrongfully
making a tool substantially the same as that of petitioners.
They were ordered to desist. The decree is sufficiently definite
to be enforced.
K & G Oil Tool & Serv. Co. v. G & G Fishing Tool Serv., 314 S.W.2d 782, 791
(Tex. 1958).
D. Balance of Equities and the Public Interest: Those Who Breach Confidences and Delete Evidence Have No Claim The Defendants complain that the Order “does not even address …
the balance of harms and the public interest.” There is no such requirement
in Rule 683, or anywhere else.18 In any event, the balance of equities and the
See, e.g., Methodist Hosps. of Dallas v. Tex. Indus. Acc. Bd., 798 S.W.2d 651, 661 (Tex. App.—
Austin 1990, ) (affirming temporary injunction by indulging reasonable presumptions in favor of
judgment that did not explicitly address balance of equities and public interest); Estancias Dallas
Corp. v. Schultz, 500 S.W.2d 217, 221 (Tex. Civ. App.—Beaumont 1973, writ ref'd n.r.e.) ("[T]here is
an implied finding that the trial court balanced the equities in favor of plaintiffs by entering the
judgment granting the injunction.").
18
30
AUS:646830.2
public interest generally favor protecting applicants with a probable right to
relief from irreparable injury — like Cornerstone.
“The protection of a trade secret is a well-recognized objective of
equity.” K & G Oil, 314 S.W.2d at 790. The Defendants all either took trade
secrets or plan to use them. Their claim that the balance of equities favors
such conduct is, as the Texas Supreme Court has said, “abhorrent to our
conception of ordinary honesty:
[T]his knowledge of plaintiff's trade secrets was acquired by
them in confidence and while they were occupying a fiduciary
relationship. They now seek to appropriate these trade secrets
to their own use and profit by a violation of their contractual
agreements and a betrayal of the confidence reposed in them by
plaintiff. This they may not do; such conduct is abhorrent to
our conception of ordinary honesty.
Hyde Corp. v. Huffines, 314 S.W.2d 763, 775 (Tex. 1958) (quoting Julius Hyman
& Co. v. Velsicol Corp., 233 P.2d 977, 999 (Colo. 1951)).
Additionally, one who seeks equity must come to court with clean
hands. Truly v. Austin, 744 S.W.3d 934, 938 (Tex. 1988). “The doctrine is
applied to one whose own conduct in connection with the same matter or
transaction has been unconscientious or unjust, or marked by a want of
good faith, or has violated principles of equity and righteous dealing.”
Ligon v. E. F. Hutton & Co., 428 S.W.2d 434, 437 (Tex. Civ. App.—Dallas
31
AUS:646830.2
1968, writ ref’d n.r.e.).
Given the undisputed fact that the Defendants
deleted relevant material before leaving their former employer and after
being sued at their new one, the Defendants can hardly claim clean hands.
There is absolutely no evidence that the public health or welfare turns
on which set of investment bankers are able to buy the target companies
involved here. Reliant’s plan is to buy existing facilities, not create new
ones. As the facilities listed in Exhibit A to the Order are all already in
operation, temporarily prohibiting Reliant from buying them does not
reduce the level of healthcare available anywhere.
Reliant complains that the temporary injunction “strikes at the heart
of Nautic's business plan.” But the heart of that business plan was to make
use of confidential information gathered from Cornerstone’s network of
healthcare professionals. Neither the law nor the public interest favors
protecting business plans that are unlawful.
III. OBJECTIONS TO THE FORM OF THE ORDER A. For Obvious Reasons, the Order Did Not Detail Trade Secrets The “first and foremost” complaint raised by the Defendants is that
the Order fails to specify “the precise information” that qualified as a trade
secret or confidential information. There is no such requirement.
32
AUS:646830.2
Numerous Texas courts have held that an order prohibiting use of
trade secrets in general terms is not improper:
•
the Texas Supreme Court upheld an order barring
employees from using “any of the trade secrets and/or
confidential business information” of their former
employer in Matlock v. Data Processing Security, Inc., 618
S.W.2d 327, 328-29 & n.2 (Tex. 1981);
•
the Fort Worth court of appeals upheld an order barring
disclosure of “Bell trade secrets and information” in IAC,
Ltd. v. Bell Helicopter Textron, Inc., 160 S.W.3d 191, 201-02
(Tex. App.—Fort Worth 2005, no pet.); and
•
this Court in 1991 upheld an injunction requiring a
former employee to “return … all documents of any type
or description, whatsoever” in Safeguard Business Systems,
Inc. v. Schaffer 822 S.W.2d 640, 642 (Tex. App.—Dallas
1991, no writ).
In the Safegaurd case, this Court noted two reasons why an order in general
terms is sufficient.
First, a temporary injunction is no place to detail confidential
information:
“Where secret customer information was one of the main
assets sought to be protected, the trial court would defeat that purpose by
requiring the public disclosure of such information.” Id. at 644. This Court
expressly approved of temporary injunction orders that incorporate
documents under seal in Rugen:
When confidential information and trade secrets are sought to
be protected, courts should word the injunction order to avoid
33
AUS:646830.2
disclosure of the information. An injunction referring to sealed
exhibits is in compliance with Rule 683 provided the activity
sought to be enjoined is described in reasonable detail.
864 S.W.2d 548, 553 (Tex. App.—Dallas 1993, no writ). A former employee
who has “seen the exhibits and has personal knowledge of the exhibits’
contents” cannot claim a temporary injunction referring to those exhibits is
vague. Id.
Second, former employees usually know precisely what information
is confidential; in most cases, that is why they took it (why take the phone
books or letterhead?). As this Court stated in Safeguard, “we do not think it
unreasonable to assume that he who is sought to be enjoined is sufficiently
familiar with the employer's business and its customers to avoid violating
the injunction.” 822 S.W.2d at 644.
Rule 683’s requirement that an injunction must be “specific in terms”
and describe the acts restrained “in reasonable detail” is not applied in the
abstract. The question is whether this defendant had reasonable notice. See
Ex parte Hudson, 917 S.W.2d 24, 26 (Tex. 1996). Thus,
•
an order to “maintain the land in a sightly condition”
gave adequate notice to a junkyard owner of what was
required, see id.;
•
an order to use property “for residence purposes only”
gave adequate notice to priests using a home as a center
34
AUS:646830.2
for campus ministry, see Protestant Episcopal Church
Council of Diocese of Tex. v. McKinney, 339 S.W.2d 400, 403
(Tex. Civ. App.—Eastland 1960, writ ref’d); and
•
an order prohibiting an insurer from “withdrawing its
defense” gave adequate notice of what it could not do, see
Liberty Mut. Ins. Co. v. Mustang Tractor & Equip. Co., 812
S.W.2d 663, 667 (Tex. App.—Houston [14th Dist.] 1991,
no writ).
In this case, the injunction prohibited the Defendants from retaining
documents they “obtained … during their employment with Cornerstone”
and from using information that was “developed . . . during their respective
periods of employment with Cornerstone.” 2 CR 754-761. No one knows
better than the Defendants precisely what that covers.
In any event, pages 6 and 7 of the injunction specifically list the types
of confidential information the Defendants took from Cornerstone:
financial data from 2007 until 2010, detailed analyses of its markets, strategy
summaries for each market, and a list of potential targets for acquisition
(including data about their personnel, management, capacity, referral
sources, marketing strategies, and competition). 2 CR 749-750. If the Order
were truly vague, the Defendants could not have spent so many pages in
their briefing arguing that these documents weren’t confidential.
35
AUS:646830.2
The Defendants rest their entire argument on one case: Computek
Computer & Office Supplies, Inc. v. Walton, 156 S.W.3d 217 (Tex. App.—Dallas
2005, no pet.). But Computek was a noncompete case, not a confidential
information case. No one claimed the customer list was confidential, and
the former employee needed a list because these were not his customers and
he had no way of knowing whom he could not contact. Id. at 222. In this
case, the Defendants know exactly what data they took from Cornerstone;
indeed, due to spoliation they may be the only ones who know.
The Defendants may disagree that what they took from Cornerstone
was confidential information. But they know perfectly well what it was.
The temporary injunction Order requiring them to stop using it and return
it is sufficiently clear under the circumstances.
B. The Order is not Overbroad; it Covers Targets Identified Using Cornerstone’s Confidential Information The Defendants claim the temporary injunction is overbroad because
it bars competition rather than merely use of confidential information. But
the Order does not bar the Defendants from buying any healthcare facilities
except those they targeted with the help of Cornerstone’s confidential
information. That is what a temporary injunction should do, as this Court
36
AUS:646830.2
said in Rugen:
The temporary injunction does not prevent Rugen from
competing with IBS. Instead, the injunction prohibits her from
soliciting or transacting business with IBS's consultants and
customers, whose identities she was able to obtain through
confidential information.
864 S.W.2d at 551. “Injunctive relief is proper to prevent a party, which has
appropriated another's trade secrets, from gaining an unfair market
advantage.”
T-N-T Motorsports, Inc. v. Hennessey Motorsports, Inc., 965
S.W.2d 18, 24 (Tex. App.—Houston [1st Dist.] 1998, pet. dism’d).
A temporary injunction must fit the circumstances. In cases where it
is easy to separate actions that use confidential information from actions
that don’t, a temporary injunction should be limited to the former. Thus,
for example, in T-N-T Motorsports the secrets for modifying a Dodge Viper’s
engine were separable from other tools of the mechanics trade, so an order
barring the defendants from changing a Viper’s tires or oil was overbroad.
See 965 S.W.2d at 25-26. Similarly, if business can be carried on using public
rather than confidential information, a temporary injunction that bars the
business completely is overbroad. See Southwest Research Inst. v. Keraplast
Techs., Ltd., 103 S.W.3d 478, 482 (Tex. App.—San Antonio 2003, no pet.).
37
AUS:646830.2
But a different rule applies when activities cannot be so neatly
divided.
In Electronic Data Systems Corp. v. Powell, this Court held an
injunction that merely barred a computer programmer from using
confidential information was too narrow; instead, it should have barred him
from doing any programming in the same field. 524 S.W.2d 393, 399 (Tex.
Civ. App.—Dallas 1974, writ ref’d n.r.e.). As the Court noted, a “don’t-useany-secrets
injunction”
is
“intrinsically
unenforceable”
in
these
circumstances because (1) a programmer could not help but use the same
information when doing the same work in the same field, id.; and (2) it
would be hard to tell whether the order was being violated until it was too
late. Id. at 398. As this Court concluded, “the mere rendition of service in
the same area would almost necessarily impart such knowledge” to his new
employer. Id.
Similarly, the former employee in Rugen objected that an order
barring her from doing business with former customers was “equivalent to
enjoining competition” and effectively imposed an invalid noncompete. See
864 S.W.2d at 551. This Court upheld the injunction, noting that it was
impossible for her to contact those clients without using “identities she was
able to obtain through confidential information.” Id. As a practical matter,
38
AUS:646830.2
when the confidential information is a list of customers, the only way to
prohibit use of the information is to prohibit contact with those customers.
And in Conley v. DSC Communications Corp., this Court upheld a
temporary injunction prohibiting a former employee from contacting a
particular customer where disclosure was likely. See No. 05-98-01051-CV,
1999 WL 89955, at *9 (Tex. App.—Dallas Feb. 24, 1999, no pet.) (not
designated for publication).
As the Court stated, a complete bar was
justified because it “is the only effective way to insure that [the former
employee] will not use, intentionally or unintentionally, his knowledge of
[the
former
employer’s
confidential
information
in
the
ongoing
competition.” Id.
In this case, the evidence showed that the former managers gathered
information about potential acquisition targets using Cornerstone’s network
of hospital managers throughout the country, and then shopped some of
those market opportunities to Reliant. The Defendants concede in their
briefs that the trial judge spent a day “parsing through the key documents”
to make sure the list on Exhibit A included only those facilities as to which
Cornerstone’s confidential information was involved. See Reliant Brief at 15;
Brohm Brief at 17. The current Reliant might not even exist, much less want
39
AUS:646830.2
to pursue these targets, but for the breaches by Cornerstone’s former
managers. That Reliant might now develop independent information about
those targets is irrelevant because that is not what it did — its interest in
them arose through a breach of confidences. Pending trial, the only way to
preserve the status quo and keep Reliant from using the information is to
keep it from pursuing those targets — which is what the trial court did.
C. Effective Relief Must Include Those Acting in Concert Finally, several of the Defendants argue that they cannot be bound by
the Order because neither conspiracy nor any other tort has been
independently established against them. For several reasons, that argument
should be rejected.
First, Rule 683 provides that a temporary injunction is binding not
only on wrongdoers but also on “those persons in active concert or
participation with them.” Ignorance of the initial theft does not allow a
recipient of stolen property to keep it. Had the former managers stolen
money from Cornerstone, Reliant and the remaining Defendants could be
enjoined from spending it — not because they were tortfeasors but because
it was not their money.
40
AUS:646830.2
Second, when the former managers acted on behalf of their new
enterprise with Nautic and Reliant, they were acting as vice principals of
those entities. These entities could act only through human agents, and the
agents they chose were the former managers — Brohm as CEO,19 and the
others as mangers of departments or divisions. See Bennett v. Reynolds, 315
S.W.3d 867, 884 (Tex. 2010).20 “When actions are taken by a vice-principal of
a corporation, those acts may be deemed to be the acts of the corporation
itself.”
GTE Sw., Inc. v. Bruce, 998 S.W.2d 605, 618 (Tex. 1999); accord,
Bennett, 315 S.W.3d at 884.
It does not matter whether Nautic or Reliant authorized the former
managers to take Cornerstone’s data or later to delete. If that were the rule,
businesses could simply disavow what their managers did after the fact,
even though businesses only act through those managers. As the Texas
Supreme Court has said: “To permit an employer to escape liability for the
outrageous acts of its management-level employee because the employee
19
See 11 RR 1168 (Nautic report dated Feb. 17, 2001: “Our new CEO, Mike Brohm”).
(“[A] vice-principal includes four classes of human agents: (a) Corporate officers; (b)
those who have authority to employ, direct, and discharge servants of the master; (c) those
engaged in the performance of nondelegable or absolute duties of the master; and (d) those to
whom a master has confided the management of the whole or a department or division of his
business.” (quoting Chrysler Ins. Co. v. Greenspoint Dodge of Houston, Inc., 297 S.W.3d 248, 254 (Tex.
2009)).
20
41
AUS:646830.2
was performing a non-managerial task would severely undercut this
purpose.” Ramos v. Frito-Lay, Inc., 784 S.W.2d 667, 669 (Tex. 1990).
Disclosure and noncompetition cases in Texas often include the new
employer of former employees, as including them is the only way to make
injunctive relief effective.
See, e.g., Alex Sheshunoff Mgmt. Servs., L.P. v.
Johnson, 209 S.W.3d 644, 647 (Tex. 2006) (noting intervention by employee’s
new employer); Vaughn v. Intrepid Directional Drilling Specialists, Ltd., 288
S.W.3d 931, 937 (Tex. App.–Eastland 2009, no pet.) (affirming TI against
former employees and new venture they formed to compete). In this case,
excluding Defendants Nautic, Reliant, or their current officers from the
temporary injunction would allow them to gather the fruit of the tree the
former managers planted using Cornerstone’s confidential information.
Writing for this Court in 1999, Justice Lagarde colorfully explained
why the Order here must extend to such parties:
At best, relying on the new employer to protect the trade
secrets of the former employer when those trade secrets could
work to the new employer's advantage is little better than
asking the fox to guard the henhouse. The richer the henhouse,
the less wise it is to trust even the most responsible and reliable
of foxes.
Conley, 1999 WL 89955, at *6. The trial court properly enjoined Reliant and
the other defendants from using Cornerstone’s confidential information
42
AUS:646830.2
even if they were not the ones who originally took it.
CONCLUSION A party does not have to delay seeking a temporary injunction until
its target companies are bought by a competitor, or its confidential
information is posted on the Internet. The pursuit of this interlocutory
appeal itself shows that the Defendants would use this confidential
information immediately if they had the chance. To preserve the status quo
pending trial, this Court should affirm the trial court’s Order.
Respectfully submitted,
ANDREWS KURTH LLP
By:
/s/ Scott A. Brister
Scott A. Brister
State Bar No. 00000024
David P. Whittlesey
State Bar No. 00791920
ANDREWS KURTH LLP
111 Congress Ave., Suite 1700
Austin, Texas 78701
Phone: 512.320.9200
Fax: 512.320.9292
[email protected]
[email protected]
Marc D. Katz
State Bar No. 00791002
Cristina I. Torres
State Bar No. 24051437
ANDREWS KURTH LLP
1717 Main Street, Suite 3700
Dallas, Texas 75201
Phone: 214.659.4400
Fax: 214.659.4401
[email protected]
[email protected]
ATTORNEYS FOR APPELLEE CORNERSTONE
HEALTHCARE GROUP HOLDING, INC.
43
AUS:646830.2
Certificate Of Service I hereby certify that a true and correct copy f the foregoing document
was served on all counsel of record via electronic transmission on this 7th
day of October, 2011.
Mark R. Steiner
W. Gary Fowler
JACKSON WALKER L.L.P.
901 Main Street, Suite 600
Dallas, Texas 75202
(214) 953-5822 (Fax)
[email protected]
Patrick F. Philbin
KIRKLAND & ELLIS LLP
655 15th Street, NW
Washington, DC 20005
(202) 879-5200 (Fax)
[email protected]
John F. Hartmann
Garbor Balassa
KIRKLAND & ELLIS LLP
300 North La Salle Street
Chicago, Illinois 60654
(312) 862-2200 (Fax)
[email protected]
David Watkins
JENKINS & WATKINS, PC
2626 Cole Ave, Suite 200
Dallas, Texas 75204
(214) 378-6680 (Fax)
[email protected]
Keith A. Clouse
Alyson C. Brown
Gregory M. Clift
CLOUSE DUNN LLP
1201 Elm Street, Suite 5200
Dallas, Texas 75270
(214) 220-3833 (Fax)
[email protected]
Jonathan LaMendola
COBB MARTINEZ WOODWARD PLLC
1700 Pacific Ave., Suite 3100
Dallas, Texas 75201
(214) 220-5299 (Fax)
[email protected]
Mark Bayer
GARDERE WYNNE SEWELL LLP
1601 Elm St., Suite 3000
Dallas, Texas 75201
(214) 999-4667 (Fax)
[email protected]
The Honorable Martin Hoffman
68th District Court of Dallas County
600 Commerce Street
Dallas, Texas 75202
(214) 653-7569 (Fax)
/s/ Scott A. Brister
Scott A. Brister
44
AUS:646830.2
ACCEPTED
225EFJ016533669
FIFTH COURT OF APPEALS
DALLAS, TEXAS
11 October 7 P1:57
Lisa Matz
CLERK
Tab A
Independent Forensic Examiner Report
Case: 10259 — Cornerstone v Reliant
Cause Number: 11-04339
Examiner: Noel Kersh, ACE, EnCE
Pathway Forensics LLC
14405 Walters Road, Suite 630
Houston, Texas 77014
Ph: (713) 401-3380
www.pathwayforensics.com
Licensed Private Investigators, State of Texas (A-15251)
Table of Contents
Table of Contents .......................................................................................................................................... 2
Executive Summary....................................................................................................................................... 3
Approach and Sequencing of Independent Examination ............................................................................. 5
Counsel Interviews .................................................................................................................................... 6
Materials Received.................................................................................................................................... 7
Findings from Discovery Audit ...................................................................................................................... 8
Forensic Analysis Findings........................................................................................................................... 17
Defendant Forensic Analysis ................................................................................................................... 17
USB Analysis ............................................................................................................................................ 17
Recent Items (Windows Link Files) ......................................................................................................... 17
Recycle Bin Records ................................................................................................................................ 18
Webmail .................................................................................................................................................. 18
Internet History ....................................................................................................................................... 18
Shared USB Devices ................................................................................................................................ 19
Mike Brohm ................................................................................................................................................ 20
Brohm CCleaner and Dameware Activity on April 10 ............................................................................. 21
Chad Deardorff............................................................................................................................................ 25
Kenneth McGee .......................................................................................................................................... 27
Jerry Huggler ............................................................................................................................................... 28
Patrick Ryan ................................................................................................................................................ 29
Additional Discovery ................................................................................................................................... 30
Conclusion ................................................................................................................................................... 32
Exhibit 1 ...................................................................................................................................................... 35
Timeline of Key Discovery Dates ............................................................................................................. 35
Exhibit 2 ...................................................................................................................................................... 40
Evidence List............................................................................................................................................ 40
CV – Noel Kersh, ACE, EnCE ........................................................................................................................ 44
Independent Forensic Examiner Report
10259 – Cornerstone v Reliant
Page 2 of 44
Executive Summary
In September 2011, I was named as the Independent Forensic Examiner (“IFE”) in the Cornerstone v
Reliant matter. An Agreed Order outlined the scope of the engagement. I assembled a team of
forensics and eDiscovery professionals from the Pathway Forensics LLC staff (“Pathway”). The team’s
activities undertaken to fulfill the Agreed Order are outlined in this report.
This assignment had a long list of requests and a very short timeline. We interviewed the parties,
vendors and performed analysis on the evidence. Since time was very limited, we were unable to
address each and every request in the Order. Requests we were unable to address were added to the
Additional Discovery section of this report.
Pathway’s audit determined both sides had committed errors in their discovery efforts. Both sides did
not produce some evidence items. From artifacts examined on the evidence produced, Pathway found
evidence of the presence of Cornerstone proprietary information on the Defendants’ computers and
devices used by the Defendants. One specific device of particular interest is a Kingston brand thumb
drive which was connected to multiple Defendants’ computers at both Cornerstone and Reliant that was
not produced by any party for analysis. Both sides had some evidence that was not preserved in either a
timely manner or in a forensically sound manner.
A statement by Defendant Brohm’s counsel on his behalf is not supported by the forensic analysis we
conducted. Brohm’s counsel stated that Mike Brohm was not aware that Ryan Brohm, his son, was
remotely logged into his machine and running CCleaner the night of April 10, 2011. We found evidence
that indicates Brohm may not have been telling the truth about April 10. Brohm also was in the
possession of all four “community” USB devices that were passed around between the Defendants, but
only one of those four devices was produced for examination.
Defendant Brohm provided a download of his Bellsouth email account which was incomplete as our
forensic analysis uncovered a number of Reliant and Icon related emails that were not in his production.
The other Defendants didn’t produce much if any webmail. Pathway analyzed for webmail on each
machine and much webmail was found that was not produced by the Defendants.
Defendant Deardorff testified he removed all Reliant related email prior to his departure from
Cornerstone. Our forensic analysis found Reliant emails that were still in Deardorff’s Yahoo account
Independent Forensic Examiner Report
10259 – Cornerstone v Reliant
Page 3 of 44
after he left Cornerstone. Deardorff viewed these Reliant related Yahoo emails while on his Reliant
computer which contradicts his testimony. Deardorff attached an external hard drive to his Cornerstone
computer the night before his last day of employment. We found this same drive attached to his Reliant
computer and a folder named “Chad” which contained a high volume of Cornerstone data. The drive
containing this Cornerstone data was not produced for examination.
The Plaintiffs did not preserve cell phones used by the executives at Cornerstone. Instead, Cornerstone
IT wiped and reissued the cell phones to employees. Plaintiffs also reissued two computers used by the
Defendants to new employees. The data on these devices is still useful for a forensic examination but
many of the dates and times on the evidence have been altered. In the case of Patrick Ryan’s computer,
only the files in Ryan’s user profile were collected from the machine instead of collecting the entire
computer. This collection left out critical files that, for example, would allow an examiner to determine
if any USB devices were attached.
Email backups for both Plaintiff and Defendants were not preserved. Given the importance placed on
deleted email in this matter, this is a serious gap in the evidence preservation for this litigation.
Through interviews, Pathway became aware of a potential conflict of interest with SamTech which
provided IT services to both parties in this matter at the same time. SamTech did not notify either the
Plaintiffs or the Defendants that the company was providing IT services to both parties in this litigation
at the same time. In fact, SamTech instructed its employees to lie in the event this conflict of interest
was discovered. SamTech’s involvement with the evidence collection in this matter is a cause of
concern as to the reliability of the evidence they collected on behalf of the Plaintiffs.
Pathway discovered several discovery best practices that were not followed by both sides. The details
of our discoveries in this area will be detailed in this report. Pathway’s action recommendations, list of
additional discovery items and results of our forensic analysis are detailed in the report.
Independent Forensic Examiner Report
10259 – Cornerstone v Reliant
Page 4 of 44
Approach and Sequencing of Independent Examination
Shortly after the appointment as Independent Forensic Examiner on September 15, the following major
steps were laid out as our approach to gathering the types of information covered in the Agreed Order,
to be examined by Pathway:
•
Obtain all media images and other specific Initial Request items from all parties, as well as
written, signed statements from counsel responding to sets of tailored inquiries focusing on
awareness of the parties’ duty to preserve discoverable material, consultations with counsel and
actions taken to preserve and collect relevant material, digital media within clients’ possession,
and knowledge or participation in any attempts to delete or destroy evidence.
•
Conduct interviews with each party’s legal counsel as specified in Paragraphs 3 and 9 of the
Agreed Order, using the responses from the Initial Requests and the written statements of
counsel, as the framework for exploration of the completeness of discovery issues raised in the
Agreed Order.
•
Conduct interviews of Defendants’ and Plaintiff’s IT representatives, e-discovery vendors,
forensic consultants or experts, and any other technical personnel who participated in dealing
with the data and document discovery issues in this case.
•
Review key pleadings, motions, affidavits, depositions and related exhibits for comprehension of
issues and context of the discovery process and the events described in the Agreed Order.
•
Apply an extensive set of forensic processing, analysis and cross comparison steps against the
items of digital evidence provided by the parties, including USB, LNK, Recycle Bin records,
Webmail, Comprehensive Internet, Pre-fetch and Web Parser.
•
Prepare a report to the Court and parties summarizing our expert findings and conclusions.
Independent Forensic Examiner Report
10259 – Cornerstone v Reliant
Page 5 of 44
Following this outline as our game plan, the following steps have been completed to bring this report to
the Court:
Counsel Interviews
Plaintiff
Telephone interview with James Stanton of Andrews Kurth, LLP, counsel for Cornerstone Healthcare
Group Holdings.
Defendants
In-person interview with Florence Crisp of Edwards Wildman Palmer LLP, and Kevin Van Wart of Kirkland
& Ellis, counsel for Nautic Partners and Reliant Hospital Partners, LLC.
Telephone interview with Diane Sumoski of Carrington Coleman, counsel for Chad Deardorff.
Telephone interview with Jason Winford of Jenkins & Watkins, counsel for Michael Brohm.
Telephone interviews with Gregory Clift and Alyson Brown of Clouse Dunn LLP, counsel for Ken McGee,
Jerry Huggler and Patrick Ryan.
IT, E-discovery or Forensic Resources
Telephone interview with Adam Davis, IT Director for Cornerstone
Telephone interview with Phillip Jaubert, IT Director for Reliant Hospital Partners, LLC (with counsel on
the line)
Telephone interview with Plaintiff’s forensic consulting expert.
Telephone interview with Aaron Magley, former employee of Document Technologies, Inc. (DTI), and
now Integreon, forensic consultant and expert for Reliant /Nautic.
(In addition, received a written report from Florence Crisp on her interview with a representative of The
Message Center on their backup restoration time limits and ability to recapture deleted emails.)
Independent Forensic Examiner Report
10259 – Cornerstone v Reliant
Page 6 of 44
Forensic Processing and Analysis
Received, processed, analyzed and cross referenced over 50 items of digital evidence containing more
than 7.025 TB (7,025 GB) of data.
Materials Received
Initial Request responses and Written Statements from all counsel listed above.
DVD of organized selected pleadings from Andrews Kurth, counsel for Cornerstone.
FTP site access to full set of docket item pleadings from Greg Fowler of Jackson & Walker, local counsel
for Reliant / Nautic.
Deposition transcripts for Adam Davis, from Andrews Kurth, counsel for Cornerstone.
Deposition transcripts, exhibits and Affidavits of Aaron Magley from Jackson & Walker, local counsel for
Reliant / Nautic.
Deposition transcripts and exhibits of Ryan Patrick Brohm and Cliff Aycock of Samtech, from Florence
Crisp, counsel for Reliant / Nautic and James Stanton, counsel for Cornerstone.
Deposition transcripts and exhibits of Timothy Nalley and Anthony Merlino of DTI, from Florence Crisp,
counsel for Reliant / Nautic.
Independent Forensic Examiner Report
10259 – Cornerstone v Reliant
Page 7 of 44
Findings from Discovery Audit
A thorough examination of the discovery process was conducted on both sides of the case. Multiple
issues were discovered on both sides. Several issues occurring during the early phases of the discovery
process had a domino effect throughout the rest of the matter.
1. Evidence Preservation
Through interviews as well as our analysis, several pieces of evidence were identified as missing. These
are items that were not collected by the parties in this case but in our opinion should have been
collected.
•
Cornerstone failed to have the Defendants’ Cornerstone cell phones preserved. No forensic
examination of these devices was conducted. Instead, the devices were wiped by Cornerstone
IT and redeployed within the organization.
•
The Cornerstone computer used by Patrick Ryan was not forensically imaged. Ryan Patrick’s
user profile was the only folder collected. Data that was needed to determine USB device
connections; web history and webmail (to name a few) was not collected and therefore cannot
be analyzed.
•
Pathway conducted a thorough USB analysis on available evidence, which revealed that over 20
devices were not produced for examination and are unaccounted for at this time. Cornerstone
and Reliant IT departments indicated they do not have any policies restricting the use of these
devices internally and at the time the Defendants were employed with Cornerstone and Reliant.
2. Lack of training in proper preservation
Adam Davis with Cornerstone IT was the “first responder” when the executive team left Cornerstone for
Reliant. He was tasked with setting the executives laptops aside so that they could be imaged. Dan
Perkins of Cornerstone instructed Davis to disable the Defendants accounts, which he did. He was also
instructed to search the share drives in order to locate relevant documents. Cornerstone hired a
forensic expert to forensically image the devices but two of the laptops were reissued to new employees
before that happened. Davis has not been trained in how to handle digital evidence involved in
litigation. Best practices dictate collecting the machines and devices involved then placing them in a
secure location until they can be forensically imaged.
Independent Forensic Examiner Report
10259 – Cornerstone v Reliant
Page 8 of 44
Davis redeployed two Defendants’ computers almost immediately after their departure and before the
laptops could be forensically imaged. Once reassigned and put back in service, multiple types of files
were compromised on the evidence. Additionally the remaining four computers were not stored in a
secure location.
The Defendants also utilized untrained IT personnel to assist with early discovery. We interviewed Philip
Jaubert with Reliant IT to understand the steps he took to preserve the evidence in this case.
Jaubert terminated the accounts for the Defendants which locked them out of the Reliant network.
However, he did not disconnect the Defendants’ computers from the network which meant they could
be accessed remotely which could have resulted in evidence being manipulated or destroyed. While it
was impossible for the individual Defendants to access the machines, it was possible for anyone else
with access to the Reliant network having admin rights to access those machines. On April 14 when the
Defendants were put on leave, SamTech was doing work for Reliant and had access to the Reliant
network. This situation escalated the importance of the machines being disconnected from the network
as soon as possible.
Jaubert also did not place the physical machines into a restricted access area or container. These left
the machines unsecure which could have resulted in the physical devices being tampered with, stolen or
damaged. The machines should have been secured by being placed in a locked container such as locking
file cabinet or a secure area with limited access.
Pathway conducted analysis to determine if evidence for both the Defendant and Plaintiff may have
been accessed after the Defendants’ departure from Cornerstone and Reliant. Aside from the two
machines that were reissued, no other machines appeared to be accessed.
3. Missing Email Backups
In interviews with Reliant’s counsel, Phillip Jaubert (Reliant’s IT director) and from a report obtained
from the Message Center by Reliant’s counsel, it has been determined that no effort was made by
Reliant or its counsel to collect available email backups of custodians’ double deleted emails from the
Message Center.
The Message Center (now known as SAAS Host) is a vendor hired by Reliant, providing Microsoft
Exchange email server hosting services to corporate clients. The services include very tight – almost real
Independent Forensic Examiner Report
10259 – Cornerstone v Reliant
Page 9 of 44
time – synchronization between the Message Center’s servers and the Offline Storage files (OST) of
users’ computers. This synchronization occurs when a laptop or desktop computer is connected to the
customer’s network and Outlook is open on the individual computer.
Unless longer email archiving is contracted for (not included in Reliant’s contract), backup recoveries are
limited to approximately 14 days prior to when a recovery request is made. (From emails with the
Message Center provided by Reliant’s counsel, it is noted that there is a possibility of utilizing what
Message Center calls a 30-day round-robin backup, which may provide limited ability to recover items
deleted more than 14 but less than 30 days prior.)
When Reliant issued its litigation hold and began collection of custodians’ devices including emails, the
decision was made that, due to the tight synchronization feature between the Message Center servers
and the individual custodians’ OST files, that it was not necessary to obtain backups of the custodial PST
files on the Message Center servers because it was felt they would contain essentially identical material
to what was available on the OST files of the individuals’ machines. In the interview with Phillip Jaubert,
Reliant IT Director, it was confirmed that it was his advice to counsel not to order the Message Center
backups for this reason. One statement made by Jaubert would seem to indicate, though, that he also
made the decision not to order more PST material from the Message Center based in part on avoidance
of a very small additional charge which would have been made.
For forensic preservations, it is preferable to collect both the email stored on the custodian’s
workstation (OST file) as well as what resides (including deleted material) on the email server – in this
case, the email server of an external service provider. Even with tight synchronization, there are
scenarios that can occur which cause deleted material to be missed on one source but caught on the
other source. In retrospect, with allegations of deleted email in this litigation, it would have been more
prudent for Reliant to take quick action to capture every bit of custodial email material (deleted
included) which was still residing on the Message Center servers. After the passage of 14 and then 30
days following when the email deletion became an issue, the opportunity to recover anything that might
have been available in the Message Center’s backups was lost.
4. Litigation Hold Letter Issues
Typically in these types of cases we see Counsel issue litigation hold letters. Typically these letters
contain instructions to all relevant personnel to preserve data and email on the network, and locate and
Independent Forensic Examiner Report
10259 – Cornerstone v Reliant
Page 10 of 44
save paper documents. SamTech (Cornerstone) and the Message Center (Reliant) might also receive
letters in this scenario instructing them on the necessary steps to preserve email backups.
Pathway evaluated the litigation hold letters sent to their organizations and subcontractors.
The litigation hold letter sent by Reliant seemed to contain the necessary elements of a litigation hold
letter. However, no letter was sent to the Message Center asking them to set aside and preserve the
backup rotation of their email.
The litigation hold memo sent by the Interim CEO of Cornerstone lacked the following:
-
Not timely: The letter was sent almost 60 days after the litigation began.
-
The letter did not ask for any confirmation or feedback from the recipients, either that they
received it, or that they do or do not still have any potentially relevant material in their
possession.
-
Does not ask for the recipients to report what potentially relevant material they are aware of
that may have been destroyed or altered.
-
No follow up reminders sent after this memo.
-
There is no suspension of routine document deletion policies, and in fact, in the last paragraph,
the Interim CEO approves the deletion of emails more than one day old, because of the
company’s daily backups of email.
-
No hold letter was sent to SamTech, which managed their exchange server.
5. Failure to Preserve Cell Phones
Upon leaving Cornerstone, each Executive turned in a cell phone to Cornerstone IT. Instead of setting
the phones aside to be forensically imaged, the cell phones were wiped by Cornerstone IT and reissued.
The evidence on the phones could have contained relevant text messages, emails, call logs and contacts.
It is unclear whether Cornerstone knew at the time they reissued the cell phones that there was
anticipated litigation; if not then there may have been no requirement to preserve the cell phones.
Independent Forensic Examiner Report
10259 – Cornerstone v Reliant
Page 11 of 44
6. SamTech Conflict of Interest
During this review we became aware that Ryan Brohm, Mike Brohm, Cliff Aycock and Adam Davis
worked at Regency Hospital together. Ryan Brohm, Cliff Aycock and Adam Davis worked in the same
department. Cliff Aycock left Regency and started SamTech. Mike Brohm and Adam Davis went to
Cornerstone. Not long after hiring Ryan Brohm, SamTech started a contract with Cornerstone to provide
IT services. The relationships between these four individuals go back several years.
We explored a potential conflict of interest at SamTech. At the same time SamTech was assisting
Cornerstone with their response to the discovery requests in this matter, they were also providing IT
services to Reliant. During Ryan Brohm’s deposition on 9/27/2011, he said he was instructed by Cliff
Aycock (SamTech CEO) to lie to Cornerstone if asked about SamTech’s engagement with Reliant. It
seems to be an apparent conflict of interest for the Defendant’s son to be participating in the gathering
of evidence for the Plaintiffs and raises questions about the integrity of that collected evidence.
While providing services for Cornerstone, Adam Davis suggested that Ryan Patrick Brohm use an
alternate name so as to ease “political” pressures if a Cornerstone employee was to be uncomfortable
working with the CEO’s son. Ryan Brohm used the name Ryan Patrick. While working for Reliant, Ryan
Brohm continued to use the alternate name of Ryan Patrick. When asked about why he continued to
use an alternate name outside of Cornerstone, Brohm responded nobody told him to do anything
different.
Cornerstone’s new executive team was not aware that Mike Brohm’s son, Ryan, worked for SamTech.
The alternate name of Ryan Patrick made connecting Ryan Brohm to his father Mike Brohm difficult.
However, Adam Davis was aware of Ryan Brohm’s true identity and his relationship to one of the
Defendants.
Adam Davis, Cornerstone’s IT Director was aware of Ryan Brohm’s conflict and he
suspected SamTech was doing work for Reliant. Cornerstone’s counsel stated to us that he was not
aware of Ryan Brohm’s conflict until Aaron Magley’s deposition in August 2011. In addition, Ryan
Brohm testified in his deposition that his father didn’t know he was running CCleaner on April 10 1.
Despite Davis’ awareness of the issues related to having the son of one of the Defendants performing
work for Cornerstone during this litigation, he said nothing to management.
1
Ryan Brohm Deposition 183:15 – 184:7
Independent Forensic Examiner Report
10259 – Cornerstone v Reliant
Page 12 of 44
SamTech had total access to Cornerstone computers, servers, network and email. There are limited
tools available to track SamTech’s activity on the Cornerstone network. (It has been discovered, for
example, that Cornerstone never activated the logging feature for their Virtual Private Network (VPN)
network system, which would have reflected SamTech’s remote activity from its offices in Atlanta.)
SamTech assisted Cornerstone with its discovery requests including pulling email from the servers for
the Defendants. While we acknowledge there may well be no wrongdoing here, it raises concern about
SamTech’s role in discovery. SamTech’s intentional actions to hide its relationship with Reliant are
troublesome.
7. Forensic Experts
Interviews were conducted with the forensic examiners for both sides to understand the work they
performed, their findings as well as the instructions they were given. The interviews with the forensic
examiners provided clarity as to the issues experienced in this case.
The Plaintiff hired a Texas e-discovery company to do its forensic collections of the six Defendants’
laptops and server data. However, two of the devices to be preserved were reissued to new users. This
meant the evidence being analyzed on that evidence was missing accurate date information. This also
made it difficult to attribute actions on the computer to a Defendant or to the person who was
reassigned the computer.
The Plaintiff’s forensic expert did not perform a thorough investigation on the evidence largely due to
time constraints. Had a full investigation been conducted, the expert would have discovered a number
of unaccounted for USB devices which could have been requested and collected early in the
investigation. Webmail analysis would have revealed a number emails of the Defendants’ regarding
their intended departure from Cornerstone. The expert could have suggested an imaging of the email
backups on the SamTech servers which was time sensitive
The Plaintiffs also did not instruct their experts to image the Defendant’s mobile phones. Artifacts from
the phones could include call logs, text messages and in the case of some smart phone devices, email.
Instead, Cornerstone IT reissued the phones to new employees before imaging could be done.
The Defendants’ expert was provided with too narrow a scope from which to work. He was asked to
look for deleted files and email. His investigation revealed several files that were missing. Overlooked
Independent Forensic Examiner Report
10259 – Cornerstone v Reliant
Page 13 of 44
by this limited investigation, however, was webmail activity, USB devices that were attached containing
Cornerstone data and the presence of Cornerstone data on Reliant servers.
The Defendant’s expert did not produce a list of USB devices connected to the Defendants’ machines.
Had this list been generated and provided to counsel, a complete response to the discovery request to
produce all USB devices could have been made.
The Defendants’ expert could have suggested the email backups be collected. The failure to make this
timely request resulted in missing critical email backups which would have included deleted messages.
Finally, all webmail was not collected. Only Brohm’s webmail email account was downloaded. Our
analysis found it to be incomplete. The other defendants did not produce their webmail.
8. Cornerstone Internal Investigation Recommendation
During our investigation, we became very concerned about the relationship between SamTech and
Adam Davis. This is due in part to Davis’ failure to raise the issue of SamTech’s conflict of interest
regarding their work with Reliant while working for Cornerstone. It was not clear if Davis knew for sure
SamTech was working with Reliant, but it was clear that he suspected they were. In any event, this issue
should have been raised to the new executive team at Cornerstone. From Ryan Brohm’s deposition on
September 27, we learned that Davis was interested in leaving Cornerstone to work for Reliant 2. Also, it
was Davis who requested Ryan Brohm use a different name.
We recommend an internal investigation into the communications between SamTech employees and
Adam Davis regarding the data collection done for the litigation specifically as well as their
communication about SamTech’s contract to perform work for Reliant. We recommend this due to
several concerns including:
2
-
SamTech’s efforts to mislead Cornerstone about their work with Reliant.
-
Fact that Ryan Brohm’s father is a Defendant.
-
Mike Brohm, Ryan Brohm, Cliff Aycock and Adam Davis relationship.
-
Davis’ desire to leave Cornerstone for Reliant.
-
Davis’ failure to report his suspicions of SamTech’s work with Reliant.
Ryan Brohm Deposition 83:18 – 84:4
Independent Forensic Examiner Report
10259 – Cornerstone v Reliant
Page 14 of 44
We also believe part of this investigation should include an analysis of SamTech’s activity on
Cornerstone’s network. However as previously described this will not be possible since the logging was
not activated.
SamTech was involved with Cornerstone’s data collection as part of this litigation. SamTech had access
to Cornerstone machines, servers and their entire network. This investigation will seek to ensure that
data collected for this litigation was not undermined by SamTech.
9. Plaintiff’s Request for Personal Email Subpoena
In depositions, the Plaintiff asked some of the Defendants if they would allow a subpoena to be sent to
their personal email provider in order to collect all webmail. The Defendants gave their approval to
send the subpoena. However, the Plaintiff has chosen not to pursue issuance of such subpoenas for
personal email accounts, since the retention period for such material by personal email vendors had
expired.
10. PI License Issues
Once it became evident that allegations of intellectual property theft, as well as possible spoliation of
evidence, would become central issues in this litigation, it is notable that neither Reliant nor
Cornerstone launched any significant forensic analysis in search of additional relevant material within
their respective possession, custody or control.
Reliant did instruct its vendor, DTI, to perform forensic collections of custodial devices.
DTI
subcontracted the work to Protegga who performed the actual collections in Texas. The images
harvested by Protegga have been the forensic focus of much of Pathway’s examination under the
Agreed Order. However, with the limited exceptions of expanding the e-discovery processing and review
hosting of custodial material by DTI to include a partial forensic analysis by Aaron Magley of the specific
McQuistion and Crouch deletion incidents, and examination of the CCleaner issue, Reliant did little more
to obtain the type of in-depth forensic evaluation and analysis of their collected device images which
Pathway has performed since appointment by the Court.
Texas Occupations Code Chapter 1702 requires computer forensics companies in Texas to be licensed
Private Investigation companies and the individuals to be licensed private investigators.
Independent Forensic Examiner Report
10259 – Cornerstone v Reliant
Page 15 of 44
The Defendants’ expert who is located in Atlanta is not a licensed Texas private investigation company;
however they did contract one to perform the collection of the evidence in an attempt to comply with
the law. However, most interpretations of the law require that the presentation of computer evidence
in court requires a license. I cannot opine as whether DTI’s testimony in this case is a violation of this
statute but it warrants examination.
The Plaintiff’s expert was a licensed investigation company and the individual is licensed as well.
However, the company’s license expired in July 2011 and has not been re-instated as of the date of this
report.
11. Recovery of Cornerstone Data
Analysis has established that external USB devices containing Cornerstone data have been connected to
Reliant owned machines. Additionally Cornerstone data has been found on the Reliant computers as
well as the Reliant share drives. In order to come into compliance with the order to return Cornerstone
data, Reliant should take steps to ensure that all Cornerstone data is appropriately and permanently
removed from their systems including email. Reliant should provide Cornerstone with proof that their
data has been removed from their systems.
Independent Forensic Examiner Report
10259 – Cornerstone v Reliant
Page 16 of 44
Forensic Analysis Findings
Defendant Forensic Analysis
Analysis was conducted on each Defendant’s evidence to answer the questions asked of Pathway.
Analysis was conducted on the web artifacts, webmail, USB drive activity, CCleaner activity, remote
connection activity and work to recover deleted files and emails.
For brevity, some of the technical concepts will be introduced, the details of which will be addressed for
each defendant.
USB Analysis
USB devices attached to a computer leave a number of artifacts that can be detected. Some of these
artifacts analyzed for this report include the following:
•
Windows Plug and Play log (setupapi.log) records the date a device is first detected and installed
by Windows.
•
Windows Registry (HKLM\CurrentControlSet\Enum\USBSTOR) enumerates USB devices that
have been installed and includes make, model, and serial number. Information persists even
after devices are no longer connected.
It is important to note that not all USB devices have a serial number. When Windows encounters a
device without a serial number, it will generate a number in its place.
Recent Items (Windows Link Files)
Windows link files, sometimes called shortcuts, are files that point to a file, such as a program or
document, in another location. Windows automatically creates link files for many types of recently
accessed items to make these items conveniently accessible from the Start Menu. These files are not
deleted when the target item is deleted, and it is often possible to recover link files that have been
deleted or purged. Link files contain information such as the Volume Name of the drive the file is
stored, the date stamps of the target file at the time the link file was created, along with several other
details.
Independent Forensic Examiner Report
10259 – Cornerstone v Reliant
Page 17 of 44
Recycle Bin Records
When a file is deleted on a Windows operating system, Windows will place that item into the Recycle
Bin by default (although it is possible to change this default or otherwise bypass the Recycle Bin). When
a file is placed in the Recycle Bin, a record is created that records the date of deletion and the original
path of the file. These records can sometimes be recovered even if the Recycle Bin has been emptied.
Webmail
Internet browsers typically store local copies of web pages viewed, including webmail. These local
copies can often be recovered after the item has been purged from the internet browser cache. By
recovering these files, we are able to retrieve the contents of the Webmail.
Internet History
Internet browsers generally keep some record of websites visited. These records generally include the
website visited and the date. These records can often be recovered after they have been purged from
the history file. The URL (Universal Resource Locator, such as http://www.pathwayforensics.com), may
often yield useful information, such as search queries, usernames, or file names.
Independent Forensic Examiner Report
10259 – Cornerstone v Reliant
Page 18 of 44
Shared USB Devices
We discovered that several USB devices were being shared by the Defendants. In some cases, we see a
USB device being passed between two or more defendants while working at Cornerstone then the
device is attached to one of the Defendant’s Reliant machine. Only one of the four shared USB devices
being passed between the Defendants have been produced.
In addition, we discovered one device that was attached to Huggler’s Cornerstone machine and then
attached to his Reliant machine. This device also has not been produced.
The following table shows the Shared Devices as well as the Huggler device:
Independent Forensic Examiner Report
10259 – Cornerstone v Reliant
Page 19 of 44
Mike Brohm
The forensic image of Michael Brohm’s Cornerstone computer was processed for web activity. Starting
from mid December 2010 we see a dramatic increase of downloaded Reliant documents from his Yahoo
account to his Cornerstone machine. In addition, the Plaintiff has raised the issue about projects,
specifically ICON Hospitals, which Brohm was working on while at Cornerstone but not on behalf of
Cornerstone. Reviewing Michael Brohm’s web history has shown two separate occasions in which an
“Icon Hospital Acquisition Model.xlsx” spreadsheet was downloaded from his personal Yahoo account to
his Cornerstone machine.
The table below shows the dates the ICON files were downloaded to Brohm’s computer.
Several files appear to have been opened from Michael Brohm’s private share drive at Reliant. These
files appear in the LNK file report generated from the first imaging of his Reliant computer. A folder
named “Scans” has files that reside inside it and were opened on 4/6/2011. When the share drive was
forensically imaged on 4/11/2011, the “Scans” folder was empty. A spreadsheet labeled “Icon Hospital
Acquisition Model.xlsx” was also opened on 4/4/2011, this file is also no longer present when Michael
Brohm’s private network share is imaged.
The table below shows a file listing of the files previously accessed on Michael Brohm’s private share
drive that were not present at time his share drive was collected.
A Hitachi external hard drive device was connected to both Brohm’s Cornerstone and Reliant
computers. Link file artifacts found on his Reliant computer indicated that he accessed files on the
Independent Forensic Examiner Report
10259 – Cornerstone v Reliant
Page 20 of 44
Hitachi drive. Many of the files accessed on the Hitachi appear to be work product data from
Cornerstone Healthcare Group.
The table below shows the files that were accessed on Brohm’s Reliant laptop on the Hitachi external
hard drive.
Brohm CCleaner and Dameware Activity on April 10
On April 10, 2011 at approximately 22:00, Mike Brohm signed a visitor log to enter the Reliant building
after hours on a Sunday night.
Independent Forensic Examiner Report
10259 – Cornerstone v Reliant
Page 21 of 44
On Brohm’s Reliant computer, a user remote connected using Dameware on April 10 at 22:10. The User
ID remote connecting was “Ryan Brohm”.
At 22:14, a person sitting at Brohm’s computer attached a Kingston USB thumb drive (S/N:
5B741D00293F) to the machine. This is the same device that was attached to McQuistion and Brohm’s
computers at Cornerstone. On this Kingston drive is a folder named “Cornerstone files”.
At 22:16, CCleaner is downloaded from FileHippo.com.
At 22:17, CCleaner is setup then run on Brohm’s computer.
At 22:22, the Windows event logs are deleted.
At 22:22, “Ryan Brohm” remote session ends.
Approximately 22:30, Mike Brohm signs out on the Reliant building visitor log.
This series of events concerned us so analysis was conducted to determine if the Kingston drive may
have been wiped during this remote session. During Ryan Brohm’s September 27 3 deposition, he
testified that the only situation he would use CCleaner to wipe data, is if he was running CCleaner on a
computer with multiple hard drives.
3
Ryan Brohm Deposition 63:8 - 12
Independent Forensic Examiner Report
10259 – Cornerstone v Reliant
Page 22 of 44
We were able to confirm that the Kingston device was not completely wiped during this remote session
by Ryan Brohm. The day after this session, (April 11), the same Kingston device was connected to
Patrick Ryan’s computer. If the device was wiped on April 10, the volume name on the drive would have
been different than the volume name seen on Patrick Ryan’s machine on 4/11. The volume names
matched which means it was not wiped during the remote session on 4/10.
There is still some question as to what CCleaner was used to do during the remote session on 4/10. An
inspection of the Kingston thumb drive is necessary to determine what happened.
At 22:22, we see the Windows Event logs on the machine were deleted right before the Ryan Brohm
remote session ended.
Brohm had his Yahoo email forensically collected and produced. We analyzed the Yahoo production
against the webmail artifacts discovered during our webmail analysis. We discovered several emails
were missing from the collection that appears to be responsive email.
Independent Forensic Examiner Report
10259 – Cornerstone v Reliant
Page 23 of 44
The missing Yahoo emails are in the exhibit below:
Independent Forensic Examiner Report
10259 – Cornerstone v Reliant
Page 24 of 44
Chad Deardorff
Pathway’s examination of Deardorff’s evidence revealed he attached a Western Digital Passport drive
(S/N: 575843593037353834373338) to his Cornerstone computer on 3/24/2011 at 7:47 PM, the night
before he resigned from Cornerstone. We then see the same device attached to his Reliant computer
on his second date of employment with Reliant on 3/29/2011. Analysis of the LNK files on Deardorff’s
Reliant computer shows a folder named “Chad” was on the external drive. This folder contained a high
number of what appear to be Cornerstone data files. The files in this “Chad” directory were accessed on
his Reliant computer.
This drive appears to have been used on his Reliant computer until April 14,
2011.
Pathway did not receive this external hard drive or an image of this external hard drive. We strongly
recommend that this drive be produced for examination.
It was stated in the interview with Deardorff’s counsel that before he left Cornerstone, he removed all
Reliant related email from his personal email. This was also stated in his deposition 4. The forensic
evidence would suggest otherwise. Using Deardorff’s Reliant computer, Yahoo webmail was viewed on
the machine including one email with the subject “FW:Reliant – YTD results” sent 3/22/11 from Michael
Brohm. Deardorff’s last day at Cornerstone was 3/25 and his first day at Reliant was 3/28. This means
not all Reliant emails were removed from his Yahoo email.
Deardorff’s counsel told Pathway during our interview that Deardorff responded to the discovery
request in this litigation by doing a self collection of Reliant related emails. The search terms he
indicated he used to search his email for responsive email included: Reliant, Cornerstone, Brohm,
McGee, Ryan and Huggler. Despite using “Reliant” as a keyword to search his personal email, the email
sent on 3/22 with the subject “FW:Reliant – YTD results” was not produced.
An email with the subject “Letter” includes Brohm, Deardorff and Huggler as recipients. This email was
first sent to Deardorff on 4/2/11. This too should have been produced using the search terms Deardorff
claimed he used, but the email was not produced.
An email with the subject “FW: Icon Hospital Proforma”, sent 3/27 from Michael Brohm. This is another
example of an email that should have been produced but was not.
4
Deardoff Deposition 8:13 - 25
Independent Forensic Examiner Report
10259 – Cornerstone v Reliant
Page 25 of 44
In addition to these examples, the following webmail was found on Deardorff’s Yahoo webmail. No
emails were produced by Deardorff in response to the discovery request sent by the Plaintiffs.
Independent Forensic Examiner Report
10259 – Cornerstone v Reliant
Page 26 of 44
Kenneth McGee
Ken McGee’s last day at Cornerstone was March 23rd. Cornerstone reassigned his laptop to be used by
Jay Quintana on March 24th.
Analysis was conducted on McGee’s web history. We discovered several Reliant related files were
downloaded from his personal Yahoo account to his Cornerstone computer. The earliest Reliant
download occurred on 1/11/2011.
The table below contains the files downloaded to McGee’s Cornerstone computer.
Analysis of USB evidence on McGee’s Reliant computer showed a file named “CORNERSTONE STUDY.xls”
accessed on 4/6. This device was not produced for examination.
We found Dameware activity similar to the evidence we saw on Brohm’s Reliant machine. Ryan Brohm
remotely connected to McGee’s computer on 4/8 at 17:41. He setup and ran CCleaner on the machine.
After it was complete, he uninstalled CCleaner. We also see the Windows event logs were deleted just
before disconnecting. We saw the same process he followed on Brohm’s computer on McGee’s .
Independent Forensic Examiner Report
10259 – Cornerstone v Reliant
Page 27 of 44
Jerry Huggler
Link files analyzed on Huggler’s Reliant machine showed Cornerstone files were accessed. The files were
found to be accessed from two different types of media. The first was a USB device which has not been
produced for examination. It was accessed on 4/6/2011.
The table below shows the USB device activity on Huggler’s Reliant computer where Cornerstone data
was accessed.
Analysis also showed Cornerstone files were accessed on Huggler’s private share at Reliant. Also
revealed was a folder on Huggler’s share drive labeled “Scans”. This folder contained at least 4 PDF files.
The table below shows the Cornerstone files on Huggler’s private network share.
When the share drive was imaged on 4/11/2011, these files are not present. Sometime between
4/7/2011 8:59 and 4/11/2011, the files are removed from Huggler’s Private network share.
Link files found on the second imaging of Huggler’s Computer show that on 4/13/2011 13:24 the
spreadsheet “Cornerstone Reimbursement.xlsx” was accessed from Huggler’s Reliant computer once
more.
Independent Forensic Examiner Report
10259 – Cornerstone v Reliant
Page 28 of 44
Patrick Ryan
Patrick Ryan’s computer was repurposed for another Cornerstone employee before it could be
forensically imaged. Cornerstone did create a logical Image of Patrick Ryan’s user profile. However this
did not include any system files which is where most analysis is performed. Therefore, most processing
could not be completed for Patrick Ryan’s computer.
Patrick Ryan began employment with Reliant on 3/24/11. On 3/25/11, a SanDisk Cruzer is attached to a
laptop that has been used by both Michael Brohm and Patrick Ryan. Unfortunately due to the
incomplete collection on Patrick Ryan’s Cornerstone PC we are unable to verify if this device had been
previously attached to his Cornerstone PC.
Two devices that have shown up on previous Cornerstone and Reliant Defendant computers are
attached to Ryan’s Reliant computer on the evening of 4/11/11. The computers were imaged for the
first time on 4/11/11.
The table below shows when the devices in question were connected to the Reliant machine.
Independent Forensic Examiner Report
10259 – Cornerstone v Reliant
Page 29 of 44
Additional Discovery
Pathway believes additional discovery is required be able to answer some of the lingering questions in
this matter. The following additional discovery items are recommended.
1. Produce and analyze missing USB devices
Forensic analysis conducted by the IFE showed a number of USB devices that were not produced for
inspection. Also revealed were a large number of files accessed on USB devices, including Cornerstone
data. Each device attached to a Defendant’s computer should be produced and examined. The
examination of the device should include the following analysis:
a. Forensically image the drive
b. Carve the drive for deleted files
c. Run recovered folders (EnCase)
d. Examine Unallocated Clusters for evidence of wiping
e. Examine file metadata
f.
Conduct keyword search for Cornerstone data
g. Create a file listing of all the files on the drive
h. Create a file listing of all deleted, not overwritten files
2. Analyze shadow copies and restore points for USB activity
It is possible to determine multiple connections of a USB drive to a piece of evidence by analyzing the
Windows shadow copies and restore points on the device. Conduct analysis on each Defendant
machine to determine when each device was first plugged in, last plugged in and each time between the
first and last by analyzing the System registry hives and the setupapi.log files in the shadow copies and
restore points.
3. Forensically Image Patrick Ryan Cornerstone Laptop
Create a full forensic image of the entire hard drive, instead of the imaged Windows profile for Patrick
Ryan. Verify that the Patrick Ryan user profile is still present on the computer. Conduct USB analysis on
the machine. Generate a list of USB devices attached to the machine and compare to the list of USB
devices attached to Patrick Ryan’s Reliant computer. Analyze LNK files on the machine for files accessed
on external hard drives. Conduct detailed Webmail analysis. Run Recycle Bin analysis to look for
deleted files. Carve the computer for deleted documents.
Independent Forensic Examiner Report
10259 – Cornerstone v Reliant
Page 30 of 44
4. Perform Yahoo Email Collections
Forensically gather personal email accounts for each Defendant. Once downloaded, search email for
responsive emails and produce.
5. Perform very low level forensic analysis across all images
Due to the time constraints imposed through the Order, low level forensic analysis could not be
conducted on all images. Doing this could lead to additional relevant findings.
6. Run additional analysis on cell phone images
Run deep level analysis tools including file recovery tools on the cell phone images. Look for deleted
text messages on the images.
7. Carve for Deleted Files
Files and emails deleted on the Defendants machines may be recoverable through the use of file
carving.
8. Recover Deleted Email from the Exchange Database
Attempting to recover email not already produced from the Exchange database.
Independent Forensic Examiner Report
10259 – Cornerstone v Reliant
Page 31 of 44
Conclusion
While we were not able to address all requests in the time allotted, we have drawn the following
conclusions based on the work we have performed to date:
-
The Defendants removed Cornerstone data upon their departure from Cornerstone and took it
with them to Reliant.
-
The Cornerstone data was copied to the Reliant network.
-
Cornerstone data was copied using several thumb drives and external hard drives.
-
The Defendants failed to produce several thumb drives shown to contain Cornerstone data.
-
The New Reliant business opportunity was discussed as early as November 2010.
-
The Defendants sent many emails to each other regarding Reliant using their personal email.
-
The Defendants used their Cornerstone issued computers to work on the Reliant opportunity.
-
The Defendants did not produce all of their personal email regarding Reliant.
-
The Defendants uploaded Cornerstone data to their personal email accounts.
-
The Defendants downloaded Reliant related files to their Cornerstone assigned computers.
-
Potentially responsive data was being deleted after the commencement of the litigation.
-
Forensic analysis identified evidence that seemed to conflict with previous testimony by several
parties.
-
Plaintiff did not preserve all sources of evidence related to the matter.
-
SamTech’s employment and utilization of a person with conflicted interests in this matter may
have undermined the integrity of the preservation efforts of both parties.
We have made recommendations including:
-
Cornerstone internal investigation into Adam Davis and SamTech activities.
-
Reliant take steps to remove Cornerstone data from their network including servers and
computers attached to their network.
-
Reliant provide to Cornerstone proof that their data has been removed from their network.
-
Recommend additional discovery outlined in the Additional Discovery section of this report.
Independent Forensic Examiner Report
10259 – Cornerstone v Reliant
Page 32 of 44
Examiner:
Noel Kersh
Signature:
__________________________________
Independent Forensic Examiner Report
10259 – Cornerstone v Reliant
Page 33 of 44
Exhibits
Independent Forensic Examiner Report
10259 – Cornerstone v Reliant
Page 34 of 44
Exhibit 1
Timeline of Key Discovery Dates
Independent Forensic Examiner Report
10259 – Cornerstone v Reliant
Page 35 of 44
Timeline of Key Discovery Dates
Date
November 3, 2010
November 21,
2010
March 17, 2011
March 20, 2011
March 23, 2011
March 28, 2011
April 2, 2011
April 6, 2011
April 7, 2011
April 8, 2011
April 10, 2011
April 11, 2011
April 11, 2011
Case Event
Brohm first contacts Nautic about rehabilitation hospital company opportunity
(Old Reliant)
Brohm has conference call with Nautic and Nautic’s counsel to discuss
Nautic/Reliant Deal; potential legal risks of mass exodus of Executives is discussed.
Following this conference, Brohm generally stops using his Cornerstone e-mail
account, and mostly uses his personal Bellsouth email account to communicate
about the deal. Brohm also obtains personal email addresses for other Executives
to communicate about the deal.
Execs and Nautic anticipate closing of Reliant asset purchase next day, March 18,
and finalizing related employment and personal investment documents.
Executives sending and moving multiple documents in anticipation, including
Cornerstone docs.
Brohm sends himself email titled “Cornerstone Mission, Vision, Values”
Reliant transaction closes; Brohm, McGee, and Ryan leave Cornerstone and begin
working for New Reliant
New Reliant purchased Old Reliant n/k/a Addison Resolution on March 23, 2011.
New Reliant was created and funded by Nautic Partners, LLC.
Jerry Huggler and Chad Deardorff hired by New Reliant (hereafter, Brohm, McGee,
Ryan, Huggler and Deardorff referred to as the “Executives”)
Cornerstone first becomes aware that Executives have gone to work for New
Reliant, which it considers to be a competitor, and learns that customers of
Cornerstone are being contacted by Executives.
First demand letter from Cornerstone (Andrews & Kurth, counsel) received
(demand letters sent to Executives)
Cornerstone files petition in Texas State District Court in Dallas, naming Executives,
New Reliant and Nautic as Defendants
First TRO prohibiting use or disclosure of Cornerstone information entered; Court
orders expedited discovery; Cornerstone serves requests for production on New
Reliant at approximately 11 p.m.; Nautic hold notice sent.
New Reliant hold notice sent; DTI engaged; Crisp has teleconference with Jaubert
(IT) of New Reliant regarding preservation and collection; C-cleaner installed and
run on McGee’s computer, apparently by Ryan Patrick Brohm of SAMTech via
remote access.
C-cleaner installed and run on Mike Brohm’s computer, apparently by Ryan Patrick
Brohm of SAMTech via remote access.
Forensic harvesting begins at New Reliant. Protegga conducts forensic harvest of
computers, Blackberries/Smartphones, and network shares of Executives, plus
Crouch and Moore (former Old Reliant managers.) Collection takes place over
April 11-13, 2011. Oliver Group harvests Nautic’s files in Providence
Deposition of Brohm
Independent Forensic Examiner Report
10259 – Cornerstone v Reliant
Page 36 of 44
Date
Case Event
April 11, 2011
Deposition of Deardorff
April 11, 2011
Deposition of Huggler
April 11, 2011
Deposition of Ryan
April 12, 2011
Deposition of Price
April 12, 2011
Deposition of Smith
April 14, 2011
Executives, plus Marie McCuistion placed on administrative leave with pay; their
access to Reliant computers and premises is blocked
Sometime between April 15 and 18, Crouch has a telephone call with Cliff Aycock
of SAMTech and directs him to hold off doing any additional evaluations of New
Reliant IT for the time being
Crouch informs New Reliant counsel he deleted emails on April 8. New Reliant
counsel takes steps to have deleted emails restored.
New Reliant counsel informed by DTI that all of Crouch’s deleted emails were
recovered
Crouch emailed SAMTech CEO, Cliff Aycock, to inform him that New Reliant no
longer needed any of SAMTech’s services
New Reliant counsel asks DTI to recover any deleted files or emails from Reliant
computers of Executives
Marie McCuistion’s computer is imaged by Protegga.
Aaron Magley (then with DTI) detects presence of C-cleaner on Brohm and McGee
images, and includes entries in his examiner’s notes. New Reliant’s counsel is not
informed of this.
New Reliant informs counsel for Cornerstone that it located calendar entries and
associated attachments that appeared to be created at Cornerstone in Chad
Deardorff’s Reliant files
Second TRO entered; requires (among other things) return of Cornerstone
information by May 2, 2011; Court directed parties to meet to work out protocol
for return of electronic information.
Forensic image of Ellen Lytle’s computer taken.
New Reliant returns hard copy documents that appeared to be from Cornerstone
and asks counsel for Plaintiff to confer regarding return of electronic information.
McCuistion’s counsel informs New Reliant’s counsel regarding her thumb drive;
thumb drive is located and imaged.
DTI recovered deleted files from McCuistion’s thumb drive.
Additional thumb drive located at New Reliant (in McGee’s office); thumb drive is
imaged.
New Reliant informs Cornerstone’s counsel that Marie McCuistion copied a “Mike
Brohm” folder from Cornerstone to a thumb drive, transferred the folder to her
New Reliant computer and then deleted the folder, all at Mike Brohm’s direction
April 15, 2011
(circa)
April 20, 2011
April 21, 2011
April 21, 2011
April 23, 2011
April 26, 2011
April 26, 2011
April 27, 2011
April 28, 2011
April 29, 2011
May 2, 2011
May 12, 2011
May 14, 2011
May 16, 2011
May 17, 2011
Independent Forensic Examiner Report
10259 – Cornerstone v Reliant
Page 37 of 44
Date
Case Event
May 17, 2011
Deposition of Daugherty (Nautic)
May 18, 2011
Deposition of McCuistion
May 18, 2011
Deposition of McGee
May 19, 2011
Deposition of Campbell
May 19, 2011
13 attempted VPN log-ins into Reliant network from SAMTech IP address
May 19, 2011
New Reliant counsel requests information regarding contents of “Mike Brohm”
folder on Cornerstone computers to aid in determining whether files by
McCuistion have been recovered
May 20, 2011
Deposition of Callan
May 20, 2011
Deposition of Crouch
May 20, 2011
Deposition of Deardorff
May 20, 2011
Deposition of Huggler
May 20, 2011
Deposition of Noe
May 20, 2011
Deposition of Ryan
May 23, 2011
Deposition of Beakey
May 23, 2011
Deposition of Moore
May 24, 2011
Deposition of Boguslawski
May 24, 2011
Deposition of Davis
May 24, 2011
Cornerstone files emergency spoliation motion; only conduct of New Reliant
employees at issue in spoliation motion is deletions by McCuistion and Crouch.
May 25, 2011
Deposition of Corey
May 26, 2011
Deposition of Hilinski
May 27, 2011
Deposition of Smith
Independent Forensic Examiner Report
10259 – Cornerstone v Reliant
Page 38 of 44
Date
May 31, 2011
June, 2011
Case Event
Defendants file responses to emergency spoliation motion. New Reliant submits
affidavit of Aaron Magley describing his efforts to recover deleted files of Marie
McCuistion and Chester Crouch.
On several non-consecutive days between June 7 and July 1, the Court held an
evidentiary hearing on Cornerstone’s Motion for a Temporary Injunction
June 2, 2011
Deposition of Brohm
June 3, 2011
Hearing on Spoliation Motion (ruling deferred)
June 10, 2011
Hard drives of Brohm, McGee, Ryan, Huggler, and Deardorff reimaged to capture
any data since date of original image.
Temporary Injunction entered by the Court.
Hard drives removed from computers used by Brohm, McGee, Ryan, Huggler, and
Deardorff and maintained by Protegga.
Aaron Magley informs Crisp that C-cleaner was used on McGee and Brohm’s
computers
Deposition of Magley. Magley testified regarding use of C-cleaner on McGee and
Brohm computers.
Deposition of Nixon (corporate rep for New reliant); Magley’s notes reflecting that
he detected C-cleaner on the computers of Brohm and McGee in April produced to
Plaintiff.
July 1, 2011
July 12, 2011
August 15, 2011
August 25, 2011
August 26, 2011
August 31, 2011
Deposition of Magley
September 2, 2011
Hearing in which Court directs parties to finalize agreed order for appointment of
independent forensic examiner; sets date for show cause hearing; and issues other
rulings.
September 13,
2011
Highland Capital Management is a private equity management firm whose funds
own a majority of Cornerstone. Highland was only recently added to this lawsuit as
a third-party defendant
September 15,
2011
Noel Kersh of Pathway Forensics LLC appointed by Court as Independent Forensic
Examiner, to evaluate compliance by Executives and New Reliant, with discovery
requests propounded by Cornerstone
Independent Forensic Examiner Report
10259 – Cornerstone v Reliant
Page 39 of 44
Exhibit 2
Evidence List
Independent Forensic Examiner Report
10259 – Cornerstone v Reliant
Page 40 of 44
Evidence
Pathway
Evidence #
E001
E002
E003
Custodian
Description
N/A
Sharon Noe
Ken Mcgee
DVD of Docket Material
laptop files
laptop
Cornerstone Exchange
PSTs
laptop
laptop
laptop
File Shares
laptop files/logical file
backup
Acquisition
Date
Company
Other Evidence #
4/28/2011
3/28/2011
Cornerstone
Cornerstone
Cornerstone
048804-020010
048804-020004
3/29/2011
Cornerstone
048804-020008
3/28/2011
3/28/2011
3/28/2011
3/28/2011
Cornerstone
Cornerstone
Cornerstone
Cornerstone
048804-020001
048804-020002
048804-020005
048804-020006
3/28/2011
Cornerstone
048804-020007
048804-020003
E004
Multiple
E005
E006
E007
E008
Michael Brohm
Jerry Huggler
Marie McCuistion
Multiple
E009
Patrick Ryan
E010
Chad Deardorff
laptop
3/28/2011
Cornerstone
E011
Michael Brohm
computer
4/11/2011
Reliant
E012
Chad Deardorff
computer
4/11/2011
Reliant
E013
Jerry Huggler
computer
4/11/2011
Reliant
E014
Chester Crouch
computer
4/11/2011
Reliant
E015
Kenneth McGee
computer
4/11/2011
Reliant
E016
Patrick Ryan &
Michael Brohm
computer
4/11/2011
Reliant
E017
Patrick Ryan
computer
4/11/2011
Reliant
E019
Michael Brohm
Cell Phone
4/11/2011
Reliant
E020
Michael Brohm
Computer
6/10/2011
Reliant
E021
Chad Deardorff
Laptop
6/10/2011
Reliant
E022
Jerry Huggler
Laptop
6/10/2011
Reliant
E023
Ken Mcgee
Laptop
6/10/2011
Reliant
E024
Patrick Ryan
Laptop
6/10/2011
Reliant
Independent Forensic Examiner Report
10259 – Cornerstone v Reliant
RHP-MBrohmPCL-04
RHP-CDeardorffPCL-02
RHP-JHugglerPCL-01
RHP-CCrouchPCL-09
RHP-KMcGeePCL-03
RHP-PRyan-PCL19
RHP-JD3YRH1PCL-20
RHP-MBrohmSPH-23
RHP-MBrohmPCL-41
RHP-CDeardorffPCL-39
RHP-JHugglerPCL-40
RHP-KMcGeePCL-38
RHP-PRyan-PCL42
Page 41 of 44
RHP-KMcGeeSPH-22
RHP-MBrohmOTH-11
RHP-KMcGeeOTH-13
RHP-JHugglerOTH-14
RHP-CDeardorffSPH-10
RHP-CDeardorffOTH-15
RHP-PRyan-SPH21
RHP-PRyan-OTH12
RHP-CcrouchOTH-16
RHP-CcrouchSPH-07
RHP-EmooreOTH-17
RHP-Emoore-PCL08
RHP-EmooreSPH-05
E025
Kenneth Mcgee
Cell Phone
4/11/2011
Reliant
E026
Michael Brohm
Reliant Network Share
4/11/2011
Reliant
E027
Kenneth Mcgee
Network Share
4/11/2011
Reliant
E028
Jerry Huggler
Network
4/11/2011
Reliant
E029
Chad Deardorff
Cell Phone
4/11/2011
Reliant
E030
Chad Deardorff
Network Share
4/11/2011
Reliant
E031
Patrick Ryan
Cell Phone
4/11/2011
Reliant
E032
Patrick Ryan
Network Share
4/11/2011
Reliant
E033
Chester Crouch
Network
4/11/2011
Reliant
E034
Chester Crouch
Cell Phone
4/11/2011
Reliant
E035
Emmett Moore
Network
4/11/2011
Reliant
E036
Emmett Moore
Computer
4/11/2011
Reliant
E037
Emmett Moore
Cell Phone
4/11/2011
Reliant
E038
Ellen Lytle
PST
4/26/2011
Reliant
RHP-Elytle-OTH27
E039
Ellen Lytle
Computer
4/29/2011
Reliant
RHP-Elytle-PCL29
E041
Marie McCuistion
Computer
4/26/2011
Reliant
RHP-McCuistionPCL-28
E040
Mutiple Custodian
Computer
Computer
4/11/2011
Reliant
E042
Marie McCuistion
Thumb drive
5/12/2011
Reliant
E043
Kennth McGee
Thumb drive
5/16/2011
Reliant
Independent Forensic Examiner Report
10259 – Cornerstone v Reliant
RHP-JD3YRH1PCL-20
RHP-Reliant-TBD30
RHP-MCGee-TBD31
Page 42 of 44
E044
Jerry Huggler
Computer
Personal
RHP32A
E045
E046
E047
Ken Mcgee
Ken Mcgee
Ken Mcgee
MAC Computer
Powerbook G4
Thumb drive
Personal
Personal
Personal
E048
Patrick Ryan
Computer
Personal
E049
Patrick Ryan
Computer
Personal
RHP-Mcgee-33
RHP34
RHP 35
OR-002557-0051
RHP37A
OR-002557-0051
RHP36A
048804-Knowles
RHP-MBROHMCTH-24
RHP-MBROHMSPH-23
RHP-MBROHMTBD-18
RHP-MBROHMXHD-26
0159-001
E911
EnCase case files
6/1/2011
9/23/2011
E050
Michael Brohm
Mike Brohms Yahoo
Personal
E051
Michael Brohm
SD Card
Personal
E052
Michael Brohm
Axiom USB Thumb Drive
Personal
E053
Michael Brohm
Hitachi USB Drive
Personal
E054
Chad Deardorff
Personal Computer
Personal
Independent Forensic Examiner Report
10259 – Cornerstone v Reliant
Page 43 of 44
CV – Noel Kersh, ACE, EnCE
Independent Forensic Examiner Report
10259 – Cornerstone v Reliant
Page 44 of 44
14405 Walters Road, Suite 630
Houston, Texas 77014
Ph: (713) 401-3380
www.pathwayforensics.com
Noel E. Kersh
Senior Manager, Forensics
Noel has extensive experience in conducting digital forensics acquisitions and analysis on a
variety of cases involving business and employment disputes, compliance with discovery
requests, family law, harassment, in-house investigations for large corporations, copyright
infringement and criminal cases. He also has handled large-scale eDiscovery matters.
Prior to joining Pathway, Noel helped lead two initiatives to receive a distinguished laboratory
accreditation given by the American Society of Crime Laboratory Directors/Laboratory
Accreditation Board (ASCLD/LAB). This accreditation demonstrates that a computer forensics
laboratory’s operating standards meet quality standards set by ASCLD/LAB. Accreditation
criteria include personnel, technical procedures, equipment and physical facilities. Noel has also
provided audit services to labs seeking ASCLD/LAB accreditation.
Noel has provided expert testimony by deposition, affidavit and at trial on matters involving
computer forensics. Noel is an EnCase Certified Examiner (EnCE), AccessData Certified
Examiner (ACE) and member of the High Technology Investigation Association (HTCIA). Noel is
a licensed Private Investigator by the State of Texas. (Reg #871273)
Professional History:
Senior Manager, Pathway Forensics, LLC
2009 to Present
Conduct computer forensics investigations. Assist in large-scale in-house corporate
investigations.
Lab Director, CyberEvidence, Inc.
2008 to 2009
Oversaw lab operations in the CyberEvidence Digital Forensics Laboratory including overseeing
all investigations performed in the lab, managing lab personnel and client communications.
Conducted computer forensics investigations. Provided expert reports and testimony. Led
CyberEvidence lab to receiving ASCLD/LAB accreditation.
Forensic Practice Leader, ILS Technologies
2007 to 2008
Added to organization to create a computer forensics practice.
PATHWAY FORENSICS, LLC
Noel Kersh
Curriculum Vitae
Page 1 of 3
Lab Manager, HSSK LLC
2006 to 2007
Managed the day to day operations of the lab. Conducted computer forensics investigations.
Provided expert reports and testimony. Noel helped lead the initiative to be the first private
computer forensics laboratory accredited by the American Society of Crime Laboratory
Directors/Laboratory Accreditation Board (ASCLD/LAB).
Senior IT Project Manager, Hewlett Packard Corporation
1997 to 2006
Held several positions during almost 10 years at HP including managing application
development team for HP.com IT, developer, database administrator and system implementer.
Certifications:
EnCase Certified Examiner (EnCE), 2007 to Present
AccessData Certified Examiner (ACE), 2009 to Present
Education:
BBA in Management Information Systems, Texas Tech University, 1997
Professional Affiliations:
High Technology Crime Investigation Association (HTCIA)
Expert Witness Testimony:
Cooper v. Cooper; Cause No. 2010-61285
Catalyst Services, Inc. v. Cat-Spec, Ltd. et. al.; Cause No. 2008-53942
State of Texas v. Matt Dee Baker; Cause No. 2009-456C1 (Trial Testimony)
State of Texas v. Matt Dee Baker; Cause No. 2009-456C1 (Sentence Hearing Testimony)
Talascend, Inc. v. David Lee; Cause No. 2008-21433
Hernandez v Hernandez; Cause No. 2006-52751
Wausau Underwriters v. United Plastics Group; Cause No. 1:04-cv-06543
Catalyst Services Inc v. Cat-Spec LTD; Cause No. 2008-53942
PATHWAY FORENSICS, LLC
Noel Kersh
Curriculum Vitae
Page 2 of 3
Speaking Engagements:
“Computer Forensics in Litigation”
Wright & Close, LLP, 2011
“Computer Forensics in Litigation”
Andrews Kurth, LLP, 2011
“True Crime with Aphrodite Jones” Show
Featured Interview on Discovery Network’s Investigate Discovery Channel, 2011
“Issues with Jane Velez-Mitchell” Show
Expert Panelist on CNN’s Headline News, 2010
“InSession” Show
Expert Panelist on CourtTV, 2010
“What Every Expert Should Know about Computer Forensics and E-Discovery”
Tennessee Society of Certified Public Accountants, 2009
“Digital Evidence: What You Need to Know”
Northwest Houston Bar Association, 2008
“Computer Forensics and E-Discovery”
Tarrant County Bar Association, 2007
“CEIC Tips and Tricks”
Texas Gulf Coast Chapter of the HTCIA, 2007
“Computer Forensics and E-Discovery”
Robertson & Railsback, 2006
“Computer Forensics and E-Discovery”
Houston Metropolitan Paralegal Association, 2006
PATHWAY FORENSICS, LLC
Noel Kersh
Curriculum Vitae
Page 3 of 3