BAILII is celebrating 24 years of free online access to the law! Would you consider making a contribution?
No donation is too small. If every visitor before 31 December gives just £1, it will have a significant impact on BAILII's ability to continue providing free access to the law.
Thank you very much for your support!
[Home] [Databases] [World Law] [Multidatabase Search] [Help] [Feedback] | ||
England and Wales High Court (Queen's Bench Division) Decisions |
||
You are here: BAILII >> Databases >> England and Wales High Court (Queen's Bench Division) Decisions >> Micheal & Ors v Phillips & Ors [2017] EWHC 142 (QB) (02 February 2017) URL: http://www.bailii.org/ew/cases/EWHC/QB/2017/142.html Cite as: [2017] EWHC 142 (QB) |
[New search] [Printable RTF version] [Help]
QUEEN'S BENCH DIVISION
Strand, London, WC2A 2LL |
||
B e f o r e :
____________________
John Micheal (1) Pauline Wendy Micheal (2) Havering Radio Cars UK Limited (3) |
Claimants |
|
- and - |
||
Gary Anthony Phillips (1) A1 Group (UK) Limited (2) Lynn Phillips (3) |
Defendants |
____________________
Nicholas Cobill (instructed by Middleton Solicitors) for the Defendants
Hearing dates: 14th December 2016
____________________
Crown Copyright ©
MR JUSTICE GREEN :
A. Introduction
B. Outline of Facts
C. The Claim
D. Events Following the Issuance of the Claim
"All electronic files and associated computer hardware within their possession or control containing information and data belonging to the Third Claimant, including all and any emails sent or received for and on behalf of the Third Claimant held on any severs.
The books, accounting records and bank statements of the Second Defendant and those of any other company or concern under the control of the First Defendant."
"We confirm that our client has retained all electronic files and data that was stored within the Second Defendant's computer system and will be kept safe and will not be destroyed pending the finalisation of the trial or further Order."
E. The Unless Order
"5. All underlying accounting documents relating to the accounts of the First and Second [Defendants] businesses, including all of the books, accounts, papers, ledgers, SAGE programmes and nominal ledgers, PAYE records, despatcher and taxi software for the relevant period."
"2. The First and Second Defendants shall by 4pm on 7 December 2016 permit the Claimant's appointed IT and accountancy experts to access and inspect all and any computers and computer systems within their possession or control to search for and take copies of any documents (including any computer software and data):
2.1 Relevant to the issues in the dispute, including:
2.1.1 the documents and data required to be disclosed under the Order of Deputy Master Sullivan dated 14 October 2016 and/or
2.1.2 the documents and data ordered to be preserved and delivered up by the Order of Mr Justice Flaux dated 10 November 2014; and
2.2 Within the relevant period, namely 1 January 2010 to 24 November 2014
3. The parties' solicitors shall be present during the inspection and shall endeavour to agree the manner in which the search shall be undertaken and documents retrieved and copied."
F. Present Position
G. The Denton Test for Relief from Sanctions
H. Analysis: Denton Stage 3
(i) Failure to provide computer records – the cyber attack
"The malware infected 4 PCs at the central office and 2 at satellite offices; the other 6 weren't touched. The damage to these infected PCs was remarkably light: the log files (.log) were all encrypted, as well as one config file (.txt) that the server used for mapping East London into booking zones. After replacing that file, the server was able to run. The only loss was the log files.
The #decryptmyfiles.html contained a message asking for 1.2 Bitcoins (about $500) to recover the PCs, including details on how to pay. No ransom was paid. The taxi firm's Managing Director already had a plan to replace all PCs in a few months as most were 6 to 8 years old. That plan was accelerated, and all 12 PCs were replaced one week after the initial infection.
I returned a week later to help replace the PCs and to my surprise discovered that no further infections had occurred since the first one. It's my belief that the malware just ran once from one PC and managed to infect 5 others. But it wasn't permanent, and didn't reload after a reboot, so the malware was gone."
(ii) Cheques, invoices, invoice books and bank statements
(iii) Romford Minicab Services Limited ("RMSL")
(iv) Documents relating to the external book keeper
(v) Details of search
(vi) Other alleged continuing non-disclosure
(vii) Other matters relating to Denton Stage 3
H. Conclusion