Sign In
    Wisconsin Lawyer
    February 01, 2011

    Panning for Gold: Social Networking's Impact on E-Discovery

    In seeking evidence when representing clients, attorneys must search where the evidence lies – and today, that often means searching online sources. The authors present practical recommendations and recent legal developments to help lawyers and clients understand how the use of social networking sites can affect a case.

    Hon. Richard J. Sankovitz, Jay E. Grenig & William C. Gleisner III

    Wisconsin LawyerWisconsin Lawyer
    Vol. 84, No. 2, February 2011

    What’s new is old again. Not long ago, social networking – on platforms such as Facebook, MySpace, Twitter, YouTube, and the like – seemed exotic and avant-garde. But no longer. In 2011, social networking is commonplace.

    In fact, social networking has so permeated the culture that competent lawyers cannot afford to ignore its customs and the trove of discoverable information to be found where it takes place. Just as lawyers last century needed to master the intricacies of email, so too this century with social networking. As one commentator puts it: “It should now be a matter of professional competence for attorneys to take the time to investigate social networking sites. You must pan for gold where the vein lies – and today, the mother lode is often online.”1

    This article summarizes practical recommendations and recent legal developments concerning:

    • Helping clients understand how bad social networking habits can undermine their cases;

    • Using commonly available resources to mine social networking sites (SNS) for discoverable information;

    • Whether users of SNS have any right to shield what they post from discovery; and

    • Whether users of SNS may be held liable for the defamatory content of their posts.

    The Ubiquity of Social Networking

    It is commonplace for people to publish information about themselves, their activities, their histories, and their opinions on a variety of SNS platforms, including Facebook, MySpace, Twitter, and YouTube, not to mention on blogs, chatrooms, and so on. Seventy-five percent of people ages 18 to 24 have a profile on online social networks. One-third of adults ages 35 to 44 are active on online social networks, and nearly 20 percent of people ages 45 to 54 have profiles on a social network.2

    Cautions for Clients and Prospective Jurors

    The problem. People who use social networks might not consider that the information they post about themselves can be used against them or the organizations for which they work. In today’s wired world, litigants – adverse parties and clients alike – may be in the habit of regularly posting experiences and opinions on SNS. They create videos and post them to YouTube, or they comment on videos created by others. They publish blogs and comment on blogs published by others. They chat in chatrooms. They create their own Web pages.3 And other people may be posting unflattering or revealing information in cyberspace about the litigant without his or her knowledge. “In 2008, two weeks after being charged with drunk driving in an accident that seriously injured a woman, Joshua Lipton made the foolish decision to show up at a Halloween party in a prisoner costume with the label ‘Jail Bird’ on his orange jumpsuit. Someone posted the photo on Facebook and the prosecutor made effective use of the photo of this young man partying while his victim was recovering in a hospital. The judge called the photos ‘depraved’ and sentenced him to two years in prison.”4

    The problem is aggravated by clients and others who might not appreciate or candidly acknowledge the degree to which their online disclosures may affect their cases, or how they might be sprung on them in a deposition or at trial.

    Deleterious online habits also afflict potential jurors. It has become almost commonplace for jury trials to be derailed by jurors who go online to post their opinions or information about their deliberations or to research extraneous information about the case before them. “A misbehaving juror in Arkansas posted eight tweets during a trial which resulted in a $12.6 million dollar verdict [against defendant Stoam]. During the trial, the juror’s tweets included one that said, ‘oh and nobody buy Stoam. It’s … bad mojo and they’ll probably cease to exist, now that their wallet is 12m lighter.’” 5

    Some solutions. Lawyers advising any kind of client involved in civil or criminal litigation – plaintiffs, defendants, individuals, corporate agents – should put Internet usage at or near the top of the list of things to discuss with the client at the outset of the litigation. Clients must be advised not only of the potential for damaging their own cases (and the need for candor in discussing what damage already may have been done) but also of the opportunity to discover useful information about adverse parties.

    An attorney might even consider including a disclaimer or additional provision in retainer agreements, such as the following:

    1) The client (and, if a corporate client, all of its officers and employees) promises not to post any information on the Internet about the subject matter of the representation without first consulting with counsel.

    2) The client (including corporate employees) must be completely candid concerning all past Internet postings.

    3) If the client is not candid about the client’s Internet postings, counsel cannot be responsible for the consequences and reserves the right to withdraw.

    4) Counsel cannot predict what will be found on the Internet regarding a client and so reserves the right to withdraw as counsel after conducting counsel’s own search of the Web for information concerning the client.

    Discovery of Information Published on an SNS

    The two most common legal issues that arise when a party attempts to discover another’s SNS posts are 1) whether the person who posted the information has any right to shield posts from discovery; and 2) whether the operator of the SNS has any duty to respond to discovery requests.

    Courts generally do not consider SNS posts privileged. In Ledbetter v. Walmart Stores Inc.,6 Walmart sent subpoenas to Facebook, MySpace, and Meetup.com seeking information about the plaintiffs, who had filed an action seeking damages for physical and mental injuries and loss of consortium. The court denied the plaintiffs’ motion for a protective order based on the physician-patient and spousal privileges, finding the plaintiffs had waived the privileges by filing the lawsuit. The court found the information was relevant and reasonably calculated to lead to the discovery of admissible evidence.

    Richard J. SankovitzRichard J. Sankovitz, Harvard 1983, is a Milwaukee County circuit court judge and teaches in the field of electronic discovery, presenting a program entitled “Electronic Discovery: New Wine in Old Bottles.” He seeks to reassure judges and lawyers that they need not be specialists or technicians to master these new tools.

    Jay E. GrenigJay E. Grenig, California-Hastings 1971, is a professor of law at Marquette University Law School. He is a member of the Wisconsin Judicial Council and reporter for the Local Rules Committee of the U.S. District Court for the Eastern District of Wisconsin. He is coauthor of eDiscovery & Digital Evidence, Electronic Discovery and Records Management Guide and Wisconsin Practice Series: Civil Discovery and former managing editor of Electronic Discovery and Records Management Quarterly.

    William C.   Gleisner IIIWilliam C. Gleisner III, Marquette 1974, has an extensive background in state and federal litigation and focuses on the technical and legal aspects of obtaining, organizing, and managing electronic evidence. He provides computerized litigation support and “of counsel” assistance to law firms nationwide, helping them to plan, formulate, and execute e-discovery strategy. With Prof. Grenig, he is coauthor of eDiscovery & Digital Evidence and was a Summation-certified trainer for nearly 10 years. He thanks his associate, Matthew W. Surridge, for his research and drafting assistance.

    In EEOC v. Simply Storage Management,7 a case involving multiple claims of sexual harassment, requests were made directly to the plaintiffs about postings they had made to Facebook and MySpace. The EEOC objected to the production of all SNS content (and to deposition inquiries on the same subjects) on the grounds that the requests were overbroad and unduly burdensome (because they improperly infringed on the claimants’ privacy) and would harass and embarrass the claimants.8

    The defendants claimed the nature of the injuries the claimants had alleged “implicates all their social communications (i.e., all their Facebook and MySpace content).”9 The court first observed that the discovery of SNS “requires the application of basic discovery principles in a novel context.”10

    The defendants in Simply Storage cited one case in which a court required production of the plaintiff’s entire SNS profile.11 The court also discussed the case law it was able to find dealing with the issue of SNS requests directed to a party. According to the court, “[a] person’s expectation and intent that her communications be maintained as private is not a legitimate basis for shielding those communications from discovery. … Murphy v. Perger, 2007 WL 5354848 (S. Cal. 2007), … held that a requesting party is not entitled to access all non-relevant material on a site, but that merely [blocking a] profile from public access does not prevent discovery either. … As in other cases when privacy or confidentiality concerns have been raised, those interests can be addressed by an appropriate protective order, like the one already entered in this case.”12

    The court in Simply Storage determined that the appropriate scope of relevance of an SNS request to a plaintiff was “any profiles, postings or messages (including status updates, wall comments, causes joined, groups joined, activity streams, blog entries) … that reveal, refer or relate to any emotion, feeling or mental state….”13 Overall, the Simply Storage court was unsympathetic to the privacy concerns asserted by the plaintiffs. According to the court, “[t]he court agrees with the EEOC that broad discovery of the claimants’ SNS could reveal private information that may embarrass them.… Further, the court finds that this concern is outweighed by the fact that the production here would be of information that the claimants have already shared with at least one other person through private messages or a larger number of people through postings.”14

    Another case in which postings to an SNS were deemed public, not private, was Moreno v. Hanford Sentinel Inc.15 A student and her family sued a principal and a school district for invasion of privacy and intentional infliction of emotional distress because of the re-publication of a journal entry from a social networking website. The student had published an ode on her MySpace page that contained derogatory remarks about her hometown. The ode was taken down after six days but the school principal was responsible for getting it published in the local newspaper, which led to death threats and other unfortunate acts. The Moreno court held that once the ode had been published on MySpace it was no longer private or entitled to an expectation of privacy. According to the court, “[t]he student’s] affirmative act made her article available to any person with a computer and thus opened it to the public eye. Under these circumstances, no reasonable person would have had an expectation of privacy regarding the published material…. [T]he fact that [the student] expected a limited audience does not change [this fact]. By posting the article on myspace.com, [the student] opened the article to the public at large.”16

    However, not every court will permit the discovery of information stored on online social networks, at least if the user makes definitive efforts to protect the privacy of the information rather than broadcasting it generally. To the extent that a posting to an SNS resembles a private communication that is otherwise privileged, such a posting may be protected from discovery under the federal Stored Communications Act (SCA).17

    In Crispin v. Christian Audigier Inc.,18 several defendants sought to obtain access to the SNS postings of a plaintiff by serving subpoenas directly on the SNS operators. The plaintiff attempted to quash the subpoenas by asserting rights conferred on the SNS operators by the SCA.

    The Crispin court ruled that the SCA protects electronic communications that are configured to be private.19 Thus, some Internet communications are protected and some are not:

    “With respect to Webmail and private messaging, the court is satisfied that those forms of communications media are inherently private such that stored messages are not readily accessible to the general public. … With respect to the subpoenas seeking Facebook wall postings and MySpace comments, however, … it appears… that a review of plaintiff’s privacy settings would definitively settle the question, [and so] the court does not reverse Judge McDermott’s order, but vacates it and remands so that Judge McDermott can direct the parties to develop a fuller evidentiary record regarding plaintiff’s privacy settings.”20

    SNS and Corporate Governance

    Corporate record management administrators face unique and difficult challenges because of SNS. Some commentators have described social networking as an “e-discovery and records management nightmare.”21 According to these commentators:

    “Is a tweet done on firm resources a ‘record’ for purposes of retention requirements and ESI preservation/production? … Much of this remains unsettled ground. If you find that scary, you’re not alone. … Twitter, blogs, and social networks have given almost everyone a Goliath-sized headache. Whether you are thinking in terms of your own law firm or your clients, you must now consider these new technologies.”22

    One record management administrator has described tweets as “being no different from letters, e-mail, or text messages: they can be damaging and discoverable, which could be especially problematic for companies that are required to preserve electronic records, such as the securities industry and federal contractors.”23

    Besides impeding record
    management, social networking could complicate the business world in other ways. Employers already face a number of difficulties arising from employee misuse of work computers.24 Access to SNS websites or blogs actually may give rise to employee privacy rights that one would not expect to exist during the use of company computers.25

    Employees, however, need to realize that emails they send or postings they make to an SNS concerning an employer can come back to haunt them.26 Problematic situations include those associated with trade-secret theft via email or social networking posts27 and an employee making disparaging remarks about an employer on what the employee thought was a secure network.28

    Legal Implications for Badmouthing Others on an SNS

    The spontaneity and immediacy of SNS postings tend to make them frank, sometimes too much so. Frank comments have the potential to do real damage to a client or a client’s business.

    But before considering legal action for defamation or business disparagement, lawyers need to reflect on the fact that there is a growing trend to treat blogs and social networks as news and thus protected, as are traditional news outlets, by the First Amendment and laws that shield press informants. In O’Grady v. Superior Court,29 the court was confronted with a charge by Apple Computer that certain unknown persons had caused the publication of trade secrets. Apple issued subpoenas to the publishers of the websites on which the information was published. The O’Grady court concluded, “We decline the implicit invitation to embroil ourselves in questions of what constitutes ‘legitimate journalis[m].’ The shield law is intended to protect the gathering and dissemination of news, and that is what petitioners did here. We can think of no workable test or principle that would distinguish ‘legitimate’ from ‘illegitimate’ news. Any attempt by courts to draw such a distinction would imperil a fundamental purpose of the First Amendment.”30

    Searching for and Using SNS Data

    Searches. What if a client long ago created a Web page that could prove embarrassing today? Even if the Web page was taken down years ago, a forensic investigator can use tools such as the “Wayback Machine”31 to retrieve that Web page. According to the creator of the Wayback Machine, it can be used to “[b]rowse through over 150 billion Web pages archived from 1996 to a few months ago.”32 With the Wayback Machine, a forensic investigator can retrieve copies of a website even though it was taken down many years ago and the server where it had been located has ceased to operate.

    In a recent legal malpractice case, a defendant firm claimed it had absolutely no knowledge of a particular specialty and nothing on its Web page or in ordinary searches of the Web indicated anything to the contrary. Representatives of the defendant firm swore under oath that the firm never had any expertise in that specialty. However, using the Wayback Machine, the plaintiff’s attorney discovered a Web page published by the defendant firm six years earlier that was devoted entirely to that specialty, including statements about how much knowledge the defendant firm had concerning that specialty and maintaining an “ask the expert feature” about the specialty. This Web page revealed that many of the firm members who were now denying any knowledge of the specialty had claimed extensive knowledge six years earlier. In fact, using the Wayback Machine led to the discovery that the defendant firm had even published a client newsletter concerning the specialty.

    All litigators should become familiar with the wide variety of search engines that are available for conducting Web searches. The accompanying sidebar includes several search engines and their Web addresses. While some of the listed websites charge an access fee, they can be used to supplement private investigators’ findings and can help obtain far greater information about an individual or a business than one might find using Google, for example. Highbeam will provide access to newspaper and magazine archives, which often can point to interesting discovery leads. It is not easy to search for blogs or blog entries using basic search engines. Thus, for such a chore, one should consider using advanced search engines like Google’s blogsearch or Kosmix. Sometimes it is useful to use a search methodology that is not based on keywords. For example, a person can use Hakia to search using semantic connections. Case law or white papers dealing with e-discovery often will be important, and these may be found using the Lexis Applied Discovery site.

    Litigators also should become familiar with Web crawlers.33 A Web crawler is an Internet search device that continuously and automatically searches the Web for sites that address or mention topics the user specifies, for example, news items on a subject that interests the user. For example, Google “news alerts” help keep computer users apprised of news developments about particular issues. Litigators also might consider creating searchbots. “A Searchbot is your own personal search robot that continuously searches the Internet trying to find all the best Websites it can on your behalf. When you build a Searchbot you give it a personality and then program its search circuits with all the things you want to find. You can search for Websites based on factual information like tags and locations…. You can even ask your Searchbot a question and it will talk to other Searchbots to find you an answer.”34

    Admissibility of information obtained from an SNS. There is a difference between asserting SNS posts are discoverable and defending their admissibility in court. Milwaukee County Family Court Judge Michael J. Dwyer has stated that SNS posts are often irrelevant to the legal crux of a case.35 Judge Dwyer also has stated that an SNS post will be considered inadmissible hearsay if one cannot authenticate the source of the post. According to Judge Dwyer, “If a party denies making the post, it’s not admissible.”36 Milwaukee divorce attorney Richard J. Podell has stated that SNS “posts he’s provided in cases were allowed as a rebuttal where a spouse denies an extramarital affair.”37 Regardless of their admissibility at trial, the fact is that SNS posts clearly are discoverable, may lead to other discoverable evidence, and may well present serious challenges for counsel before and during trial, especially if used as impeachment.

    There is a world of difference in using SNS posts in the context of a civil dispute versus in a criminal dispute, but one obvious concern is whether an attempt by law enforcement to obtain communications posted on an SNS infringes the user’s rights under the Fourth Amendment. In United States v. Warshak,38 the court ruled that a suspect may have an expectation of privacy in email communications that bars the production of the information without a warrant. The court explained,

    “If we accept that an email is analogous to a letter or a phone call, it is manifest that agents of the government cannot compel a commercial ISP to turn over the contents of an email without triggering the Fourth Amendment.… [T]he ISP is the functional equivalent of a post office or a telephone company…. [I]f government agents compel an ISP to surrender the contents of a subscriber’s emails, those agents have thereby conducted a Fourth Amendment search, which necessitates compliance with the warrant requirement absent some exception.”39

    Conclusion

    In the social networking era, attorneys face an entirely new challenge that directly affects client representation. It is essential that attorneys and judges keep up to date with these developments. The law is just beginning to evolve in response to SNS data and its use, but the average lawyer cannot afford to ignore the very real potential for legal good and harm that may result from social networking.

    Endnotes

    1Sharon Nelson et al., The Legal Implications of Social Networking, 22 Regent U. L. Rev. 1, 14 (2010).

    2Karen Barth Menzies & Wesley K. Polischuk, Is Your Client an Online Social Butterfly? Trial, Oct. 2010, at 23, 24.

    3Online resources that can be used to create and host Web pages are emerging at a breathtaking pace. See www.intuit.com/Website-building-software or http://mediatemple.net.

    4Nelson, supra note 1, at 12.

    5Id. at 4.

    62009 WL 1067018 (D. Colo. Apr. 21, 2009).

    7EEOC v. Simply Storage Mgmt., 2010 U.S. Dist. Lexis 52766 (S.D. Ind. May 11, 2010).

    8Id. at *4.

    9Id. at *7.

    10Id. at *8.

    11Bass v. Miss Porter’s School, 2009 WL 3724968 (D. Conn. Oct. 27, 2009).

    12Id. at 8-9.

    13Id. at 14-15.

    14Id. at 18.

    15172 Cal. App. 4th 1125, 91 Cal. Rptr. 3d 858 (Cal. App. 2009).

    16Id. at 1130. See also Commonwealth v. Proetto, 771 A.2d 823, 831-32 (Pa. Super Ct. 2001).

    1718 U.S.C. §§ 2701-2712.

    18717 F. Supp. 2d 965 (M.D. Cal. 2010).

    19Id. at 989.

    20Id. at 991.

    21Nelson, supra note 1, at 15.

    22Id. at 15-16.

    23Id. at 16. For an excellent general discussion of the duty to preserve, see Maria Perez Crist, Preserving the Duty to Preserve: The Increasing Vulnerability of Electronic Information, 58 S.C. L. Rev. 7 (2006).

    24Louis J. Papa & Stuart L. Bass, How Employers Can Protect Themselves from Liability for Employees’ Misuse of Computer, Internet and E-mail Systems in the Workplace, 10 B.U. J. Sci. & Tech. L. 110 (2004).

    25See Stengart v. Loving Care Agency Inc., 973 A.2d 330 (N.J. App. 2009) (holding employee’s emails exchanged with her attorney through her personal, password-protected, Web-based email account were protected by attorney-client privilege).

    26See Joshua C. Gilliand & Thomas J. Kelley, Modern Issues in e-Discovery, 42 Creighton L. Rev. 505, 518-21 (2009).

    27See, e.g., Rinkus Consulting Group Inc. v. Cammarata, 688 F. Supp. 2d 598 (S.D. Tex. 2010) (“Rimkus argues that the September 30, 2006 email Bell forwarded to himself is evidence of trade secret misappropriation. At a discovery hearing held on September 2, 2009, this court allowed Rimkus to subpoena Google, an email provider, to obtain emails Bell sent and received.” Id. at 626).

    28See Konop v. Hawaiian Airlines, 302 F.3d 868 (9th Cir. 2002) In Konop, a pilot sued the airline, his employer, alleging that the airline had viewed his secure website, on which he posted bulletins critical of the airline, its officers, and the incumbent union, without authorization. Two other pilots who had permission to access the website allowed an airline officer to use their names to establish accounts and passwords and access the website. Id. at 872. Cf. Intel Corp. v. Hamidi, 30 Cal. 4th 1342 (Cal. Sup. Ct. 2003) (company sued former employee for trespass because he sought to send disparaging emails to current employees).

    29139 Cal. App. 4th 1423, 44 Cal. App. 6 (Cal. App. 2006).

    30Id. at 1457.

    31Wayback Machine, www.archive.org/web/web.php. Other archive sites include the Bibliotheca Alexandrina, www.bibalex.org/Home/Default_EN.aspx; and the Library of Congress National Digital Library Program, http://memory.loc.gov/ammem/dli2/html/lcndlp.html. See http://en.wikipedia.org/wiki/Internet_Archive.

    32www.archive.org/web/web.php.

    33http://en.wikipedia.org/wiki/Web_crawler.

    34www.searchbots.net/about.

    35Jack Zemlicka, High-Tech Hearsay? 24 Wis. L. J. 1 (Daily Reporter Pub’g Co. Ed., Dec. 20, 2010)

    36Id. at 7.

    37Id.

    382010 WL 5071766 (6th Cir. Dec. 14, 2010).

    39Id. at *12.


Join the conversation! Log in to comment.

News & Pubs Search

-
Format: MM/DD/YYYY