Rose v. T-Mobile USA, Inc.

CourtDistrict Court, M.D. Florida
DecidedJune 24, 2024
Docket2:24-cv-00473
StatusUnknown

This text of Rose v. T-Mobile USA, Inc. (Rose v. T-Mobile USA, Inc.) is published on Counsel Stack Legal Research, covering District Court, M.D. Florida primary law. Counsel Stack provides free access to over 12 million legal documents including statutes, case law, regulations, and constitutions.

Bluebook
Rose v. T-Mobile USA, Inc., (M.D. Fla. 2024).

Opinion

UNITED STATES DISTRICT COURT MIDDLE DISTRICT OF FLORIDA FORT MYERS DIVISION

WILLIAM ROSE,

Petitioner,

v. Case No.: 2:24-cv-473-JLB-KCD

T-MOBILE USA, INC.,

Respondent.

v. Case No.: 2:24-mc-8-JLB-KCD

CELLULAR TOUCH WIRELESS, INC.,

Respondent,

KPMG, LLP,

Material Witness,

Intervenor.

/ ORDER Before the Court is Petitioner William Rose’s Motion to Compel Compliance with Non-Party Subpoena Served Upon KPMG, LLP (24mc8, Doc.

1) and his Motion to Compel Compliance with Non-Party Subpoenas Served Upon T-Mobile USA, Inc. (24cv473, Doc. 1-1).1 T-Mobile has responded in opposition and seeks to quash both subpoenas. (24mc8, Doc. 7; 24cv473, Doc. 4.) For the reasons stated below, the motion to compel KPMG’s compliance is

granted in part and denied in part. The motion to compel T-Mobile’s compliance is denied.2 I. Background Rose’s cellular provider is Cellular Touch Wireless—an authorized Metro

by T-Mobile dealer. (23cv22, Doc. 1 ¶ 40.) On August 13, 2021, someone pretending to be Rose obtained control of his wireless account via a SIM swap. (Id.) Representatives of Cellular Touch Wireless allegedly “bypassed . . . T- Mobile’s security protocols and transferred . . . [Rose]’s wireless telephone

number [to an imposter] -- disconnecting the telephone number from [Rose]’s wireless phone’s SIM card and then connecting the telephone number to a SIM

1 Unless otherwise indicated, all internal quotation marks, citations, and alterations have been omitted in this and later citations.

2 During the latest status conference, the parties agreed that the pending motions overlap and should be considered together. (24mc8 Doc. 26.) Accordingly, the Court issues this single order addressing both. card under the control of the [imposter].” (23cv22, Doc. 1 ¶ 40.) This let the imposter access Rose’s bank accounts, from which they stole $280,414.60 in

cryptocurrency. (Id. ¶¶ 39, 41, 47.) Rose now sues Cellular Touch Wireless, and his case is pending before this Court. (Id.) Four days after the imposter obtained control of Rose’s wireless account, T-Mobile confirmed that its “systems were subject to a criminal cyberattack

that compromised [the] data of millions” of customers. (24mc8, Doc. 7-2 at 10.) It then hired KPMG to review its network security and “help [it] prevent future incidents like the August 2021 cyberattack.” (24mc8, Doc. 7 at 5.) According to T-Mobile, the cyberattack is unrelated to the SIM swap that

affected Rose’s account. (24mc8, Doc. 7 at 12.) But Rose believes “the cybersecurity flaws that led, in large part, to the harm addressed in his Complaint” are those that KPMG was retained to assess. (24mc8, Doc. 1 ¶ 8.) So he sent KPMG a subpoena to produce eight categories of documents related

to its work for T-Mobile under Rule 45. (24mc8, Doc. 1 ¶ 11, Doc. 1-3 at 8.) KPMG responded with objections before agreeing to produce (1) its engagement letter, and (2) draft reports, including the related documents, synthesizing KPMG’s control validation work for T-Mobile. (24mc8, Doc. 1 ¶

15, 17, Doc. 1-5.) The parties then signed an agreement to safeguard the information within the documents, but KPMG never followed through om production. (24mc8, Doc. 1 ¶ 16.) Rose also sent T-Mobile two subpoenas. T-Mobile produced documents in response to the first subpoena. (24cv473, Doc. 23 at 2.) But the second

subpoena, which seeks documents related to KPMG’s investigation, remains at issue. (24cv473, Doc. 1-8.) T-Mobile believes the latter subpoena is “categorically objectionable.” (24cv473, Doc. 1-10.) The parties tried to confer, but to no avail.

That brings us to the two motions at issue. As for Rose’s motion to compel production from KPMG, he argues the documents it agreed to produce are relevant because they concern flaws in T-Mobile’s security defenses. (24mc8, Doc. 1 at 8.) Rose believes these flaws contributed to the unauthorized SIM

swap that affected his account. T-Mobile disagrees. It launches a broadside attack on the KPMG subpoena, arguing it seeks confidential information that is neither relevant nor proportional to the needs of the case. (24mc8, Doc. 7 at 2-5, 11-12, 14-15.) Should the Court disagree, T-Mobile asks that parameters

be set on KPMG’s production to safeguard the confidential information therein. (Id. at 16.) For its part, KPMG says it “stands ready to comply” and will defer to the Court’s ruling here. (24mc8, Doc. 8 at 1, 2, 5.) Turning to the T-Mobile subpoena, Rose argues the responsive

documents are needed to show T-Mobile “failed to properly implement and execute security procedures,” ignored security threats, “ignored and bypassed numerous security protocols on [his] account,” and did not protect his personal identifying information. (24cv473, Doc. 1-1 at 13-14.) As it did in response to the KPMG subpoena, T-Mobile maintains that Rose is pursuing confidential

information that is neither relevant nor proportional to the needs of his case. (24cv473, Doc. 4 at 12-19.) It also asserts that “complying with Mr. Rose’s sweeping requests would be unduly burdensome.” (Id. at 19-21.) II. Legal Standard

“Rule 45 is the proper vehicle for obtaining documents and other materials from nonparties relevant to a pending lawsuit.” Landstar Glob. Logistics, Inc. v. Haskins, No. 3:09-CV-1163-J-32JRK, 2011 WL 13176155, at *1 (M.D. Fla. Jan. 25, 2011). But it “must be read in conjunction with Rule 26

[which] clearly defines the scope of discovery for all discovery devices.” Id. Rule 26 “allows discovery regarding any matter, not privileged, that is relevant to the subject matter of the pending litigation and proportional to the needs of the case.” Sims v. BMW of N. Am. LLC, No. 6:22-CV-1685-PGB-EJK, 2023 WL

8254357, at *3 (M.D. Fla. Nov. 29, 2023). When a non-party “objects or otherwise fails to produce the documents requested by” a Rule 45 subpoena, the court may “entertain a motion to compel.” Adebiyi v. City of Riverdale, Georgia, No. 1:09-CV-0025-RWS-JFK,

2010 WL 11493740, at *1 (N.D. Ga. Mar. 12, 2010). Where a party seeks to quash a subpoena, as here, he “bears the burden to establish that the information sought is protectable under Rule 45, but the party issuing the subpoena bears the burden of proving the requests are relevant.” Meide v. Pulse Evolution Corp., No. 3:18-CV-1037-J-34MCR, 2019 WL 1518959, at *4

(M.D. Fla. Apr. 8, 2019). Whether the motion to compel seeks relevant information must be answered before the court considers a request to quash or modify the subpoena. Sims, 2023 WL 8254357, at *3. III. Discussion

A. KPMG Subpoena As the party moving to compel, Rose must first show that KPMG’s engagement letter and draft reports, including the supporting documents, relate to his claims against Cellular Touch Wireless. Meide, 2019 WL 1518959,

at *4. “To determine the relevancy of the information sought [through discovery], the court takes note of the facts set forth in the[] complaint.” Miller v. MP Glob. Prod., LLC, No. CIV.A. 12-00747-KD-N, 2014 WL 1017887, at *2 (S.D. Ala. Mar. 17, 2014). “The term relevant under [Rule 26] is construed

broadly to encompass any matter that bears on, or that reasonably could lead to other matter that bears on, any issue that is or may be in the case.” Sims, 2023 WL 8254357, at *3. Rose claims he was the victim of a SIM swap. He alleges Cellular

Wireless employees “bypassed Metro by T-Mobile’s security protocols and transferred to an [imposter,] [Rose]’s wireless telephone number -- disconnecting the telephone number from [his] wireless phone’s SIM card and then connecting the telephone number to a SIM card under the control of the [imposter].” (23cv22, Doc. 1 ¶ 40 (emphasis added).) He also believes this was

not an isolated incident. (Id.

Free access — add to your briefcase to read the full text and ask questions with AI

Related

Richard Jordan v. Georgia Department of Corrections
947 F.3d 1322 (Eleventh Circuit, 2020)
Sams v. GA West Gate, LLC
316 F.R.D. 693 (N.D. Georgia, 2016)

Cite This Page — Counsel Stack

Bluebook (online)
Rose v. T-Mobile USA, Inc., Counsel Stack Legal Research, https://law.counselstack.com/opinion/rose-v-t-mobile-usa-inc-flmd-2024.