Skip to content
Forensicon
CALL US NOW 888-427-5667
  • Home
  • AboutExpand
    • Computer Forensics Team
    • Chicago Computer Forensics
    • Forensicon Noted Cases
    • Careers at QDiscovery
    • Testimonials
  • Practice AreasExpand
    • Trade SecretsExpand
      • Trade Secrets Misappropriation
    • Employment LitigationExpand
      • Employment Litigation Defense
      • Wage & Hour Litigation
    • Internal InvestigationsExpand
      • Corporate Identity Theft
      • Corporate Security Breach
      • Illicit Employee Activity
    • Family Law
  • ServicesExpand
    • Computer Forensics ServicesExpand
      • Computer Forensics Expert Witness Testimony
      • Computer Forensic Analysis
      • Database Forensics
      • Enterprise Storage Failure & Data Recovery
    • Cell Phone Forensics
    • ConsultingExpand
      • Cyber Security Data Breach Response
      • Expert Witness Testimony & Reports
      • ESI Preservation & Collection
      • Online Content Preservation
    • e-DiscoveryExpand
      • Data Removal & Certification
      • Online Content Preservation
    • Internet Investigations
    • DVR Recovery Forensics
  • ResourcesExpand
    • Articles
    • Case Summaries
    • Computer Forensics Resources
    • Resource Documents
    • Forensicon Newsletters
    • Resource Links
  • News & EventsExpand
    • Forensicon News
    • Forensics Blotter
  • Contact Us
Forensicon
Home / Resources / Case Summaries / University Sports Publications Co. v. Playmakers Media Co.

University Sports Publications Co. v. Playmakers Media Co.

Defendant’s Bad Faith Spoliation Leads to Adverse Inference Instruction

2010 U.S. Dist. LEXIS 70361 (S.D.N.Y. July 14, 2010)

On a claim for unauthorized access of a computer system under the Computer Fraud and Abuse Act, the Southern District of New York issued an adverse inference instruction due to the defendant’s bad faith spoliation of evidence.

Plaintiff University Sports Publications (USP) filed suit against several of its former employees, who had quit in order to join the co-defendant Playmakers Media Company. USP alleged that one of its former employees, Shane Pitta, had obtained unauthorized access of its customer and sales database, which was password protected and maintained by the offsite, third-party vendor, Databasaurus. Forensic analysis showed that Pitta had obtained an exact copy of a spreadsheet from the database.

Grubb subsequently contacted the American Board of Orthodontics, which had issued him the laptop, and informed the Board of his concern that confidential patient information had been accessed. Approximately one month later, a lawyer for ABO informed Grubb that he should stop using the laptop so that any digital evidence concerning the incident would not be lost. When Grubb discussed the matter with an ABO computer specialist, however, he was told that any data concerning the incident was likely lost due to his consistent use of the laptop in the interim month.

At issue in the case was the method by which Pitta obtained the database information. If Pitta had accessed the database sometime after his departure from USP, his copying of the file would constitute an unauthorized access supporting the claim under the Computer Fraud and Abuse Act (CFAA). If, however, Pitta had received the spreadsheet from an employee at Databasaurus, he would not have committed an unauthorized access and could not be liable under the CFAA.

No direct evidence supported a conclusion on this dispositive issue. USP had requested that Playmakers produce the laptop Pitta used during his time at Playmakers, believing that an examination would provide evidence of Pitta’s unauthorized access. Forensic analysis of the laptop Playmakers provided during discovery, however, showed that Pitta had not used that laptop. The relevant laptop remained missing.

On defendant’s motion for summary judgment, the court examined whether the evidence could support USP’s claim under the CFAA. By itself, the fact that Pitta had obtained a direct copy of the spreadsheet could not provide enough evidence to show his unauthorized access of USP’s database. Pitta’s intentional bad faith spoliation of the laptop evidence, however, justified an adverse inference that the laptop had contained evidence supporting the claim. The jury could reasonably infer that Pitta had destroyed the laptop because it would provide evidence of his unauthorized access.

Because the adverse inference provided support for the CFAA claim, the court denied the defendant’s motion for summary judgment.

Search

Related Service Offerings

Computer Forensic Analysis
Forensic Vault Service
Expert Witness Testimony & Reports
...more services

Articles

What is Forensic Hard Drive Imaging?
What is Metadata?
The Liability of Email as Evidence
Track Former Employee’s Computer Activities
Exploring fseventsd Forensics Techniques
...more articles

Forensicon © 2025. All Rights Reserved.

  • Website Privacy Policy
  • SiteMap
  • Website Disclaimer
Corporate Headquarters:
309 W Washington St., Ste 1300
Chicago, IL 60606
v. (888) 427-5667 f. (312) 427-5668
Contact us
Computer Forensics Experts
ESI Discovery Consultants
Digital Cyber Forensic Analysis
Computer Forensics Company
Michigan PI Agency# 3701205872
  • Home
  • About
    • Computer Forensics Team
    • Chicago Computer Forensics
    • Forensicon Noted Cases
    • Careers at QDiscovery
    • Testimonials
  • Practice Areas
    • Trade Secrets
      • Trade Secrets Misappropriation
    • Employment Litigation
      • Employment Litigation Defense
      • Wage & Hour Litigation
    • Internal Investigations
      • Corporate Identity Theft
      • Corporate Security Breach
      • Illicit Employee Activity
    • Family Law
  • Services
    • Computer Forensics Services
      • Computer Forensics Expert Witness Testimony
      • Computer Forensic Analysis
      • Database Forensics
      • Enterprise Storage Failure & Data Recovery
    • Cell Phone Forensics
    • Consulting
      • Cyber Security Data Breach Response
      • Expert Witness Testimony & Reports
      • ESI Preservation & Collection
      • Online Content Preservation
    • e-Discovery
      • Data Removal & Certification
      • Online Content Preservation
    • Internet Investigations
    • DVR Recovery Forensics
  • Resources
    • Articles
    • Case Summaries
    • Computer Forensics Resources
    • Resource Documents
    • Forensicon Newsletters
    • Resource Links
  • News & Events
    • Forensicon News
    • Forensics Blotter
  • Contact Us