I Saw it on Facebook, now how do I use it at Trial?

Transcription

I Saw it on Facebook, now how do I use it at Trial?
“I SAW IT ON FACEBOOK, NOW
HOW DO I USE IT AT TRIAL?”
DBA TRIAL SKILLS
November 11, 2011
MICHAEL SAWICKI
(with special assistance from Brandi Concienne)
Sawicki & Lauten, L.L.P.
4040 N. Central Expressway, Ste. 850
Dallas, Texas 75204
(214) 468-8844
(214) 468-8845 (Fax)
[email protected]
Michael G. Sawicki
Sawicki & Lauten, L.L.P.
4040 North Central Expressway, Suite 850
Dallas, Texas 75204
(214) 468-8844 ( Telephone)
(214) 468-8845 ( Facsimile)
[email protected]
Michael Sawicki is Board Certified in Personal Injury litigation by the Texas Board of
Legal Specialization. His past experience includes work on major airline crashes, military
aviation and weapons cases, general aviation product liability, medical malpractice wrongful
death and injury cases and sexual assault and abuse cases. In 2005, he obtained a $606,100,000
jury verdict in a Dallas County wrongful death medical malpractice trial. The verdict was one of
the largest in the nation that year.
Mr. Sawicki is a graduate of the Southern Methodist University School of Law. Before
entering law school, he worked for several years as a news reporter for the Dallas Times Herald.
He covered Dallas courts and police department for the newspaper and wrote a column on the
business of law in the city.
He earned his undergraduate degree from the University of Missouri- Columbia School
of Journalism. Mr. Sawicki has long been fascinated with flying and is a licensed pilot. He
enjoys flying gliders in his spare time.
PROFESSIONAL ACTIVITIES:
Texas Monthly Super Lawyer (2003- present)
Dallas Bar Association, currently president of the Association’s Trial Skills section
American Bar Association
Texas Trial Lawyers Association
The American Association of Justice
Dallas Area Trial Lawyers Association, Board of Directors
PRACTICE AREAS:
Aviation, medical malpractice, general negligence, product liability, nursing home negligence.
TABLE OF CONTENTS
TABLE OF CONTENTS................................................................................................................. i
Introduction ..................................................................................................................................... 1
The Impact of New Information Technology ................................................................................. 1
Kwame Kilpatrick ............................................................................................................... 3
Twitter Verdict .................................................................................................................... 6
Facebook DWI .................................................................................................................... 7
Social Networking Sites.................................................................................................................. 8
What can you find on Facebook? ..................................................................................... 10
MySpace Features ............................................................................................................. 13
Bulletins ............................................................................................................................ 13
Groups ............................................................................................................................... 13
MySpaceIM ...................................................................................................................... 14
MySpaceTV ...................................................................................................................... 14
Applications ...................................................................................................................... 14
MySpace Mobile ............................................................................................................... 14
MySpace News ................................................................................................................. 14
MySpace Classifieds ......................................................................................................... 14
MySpace Karaoke ............................................................................................................. 15
MySpace Polls .................................................................................................................. 15
MySpace forums ............................................................................................................... 15
Other social networking sites ........................................................................................................ 15
Orkut. ................................................................................................................................ 16
Linked In. .......................................................................................................................... 16
Ryze.com ........................................................................................................................... 16
i
Affluence.org. .................................................................................................................... 17
Buzznet.com. ..................................................................................................................... 17
DeviantArt. ........................................................................................................................ 17
Reunion.com...................................................................................................................... 17
VampireFreaks.com .......................................................................................................... 18
Windows Live Spaces. ....................................................................................................... 18
Twitter ............................................................................................................................... 19
Privacy and security ...................................................................................................................... 20
Using Social Network Evidence in Court ..................................................................................... 20
Discovery Issues ............................................................................................................... 20
Finding Social Networking Evidence ............................................................................... 21
Legal issues- General Concerns About Admissibility of Social Networking Evidence ... 23
Authentication ................................................................................................................... 23
Authentication under the Federal Rules ............................................................................ 24
Relevance and undue prejudice ........................................................................................ 25
Hearsay ............................................................................................................................. 26
Best evidence .................................................................................................................... 27
Other Uses of Social Networking Evidence ................................................................................. 27
Jury Selection .................................................................................................................... 27
Current Texas Social Networking Cases .......................................................................... 28
Hernandez v. State, 2010 WL 2099220 (Tex. App. – San Antonio 2010). ...................... 28
Mann v. Department of Family and Protective Services, 2009 WL 2961396 (Tex.App.Houston [1 Dist.], 2009) ................................................................................................... 28
Munoz v. State, 2009 WL 695462 (Tex. App. – Corpus Christi 2009) ............................ 29
Draker v. Schrieber, 271 S.W.3d 318, (Tex. App. – San Antonio 2008 WRIT) ................. 29
ii
In Re Rodney Reed, 2009 WL 97260 (Tex. Crim. App. 2009) (not reported)
........................................................................................................................................... 30
Williford v. State, 127 S.W.3d 309 (Tex. App.-­‐ Eastland 2004) ....................................... 30
Social Networking Cases outside of Texas ....................................................................... 30
State v. Altajir, 123 Conn.App. 674, --- A.2d ----, 2010 WL 3489049 (Conn. App. 2010)
........................................................................................................................................... 30
Jabbar v. Travel Services, Inc., 2010 WL 3563112 (D.Puerto Rico, 2010) ..................... 31
Griffin v. State, 192 Md.App. 518, 995 A.2d 791 (Md.App., 2010) ................................ 31
Crispin v. Christian Audigier, Inc., --- F.Supp.2d ----, 2010 WL 2293238 (C.D.Cal.,
2010) ................................................................................................................................. 36
Bass ex rel. Bass v. Miss Porter's School, 2009 WL 3724968 (D.Conn., 2009) ............. 37
Maldonado v. Municipality of Barceloneta, 2009 WL 636016 (D.Puerto Rico, 2009) ... 37
Cases of General Interest .................................................................................................. 38
Email Authentication ........................................................................................................ 38
U.S. v. Sidiqui, (11th Cir. 2000) 235 F.3d 1318. .............................................................. 38
People v. Von Gunten, (2002 Cal.App.3d Dist.) 2002 WL 501612. [Unpublished.] ....... 38
On-line Evidence Admissibility ........................................................................................ 38
United States v. Brand, 2005 WL 77055 (S.D.N.Y. January 12, 2005). .......................... 38
Hammontree v. State, (Ga. Ct. App. 2007) -­‐-­‐-­‐ S.E.2d -­‐-­‐-­‐-­‐, 2007 WL 547763.................. 38
U.S. v. Burt, (7th Cir.,July 26, 2007) 495 F.3d 733 .......................................................... 38
Lorraine v. Markel American Insurance Company, (D.Md. May 4, 2007) 241 F.R.D. 534.
........................................................................................................................................... 39
People v. Hawkins, (June 2002) 98 Cal.App.4th 1428 ..................................................... 39
EEOC v. E.I dupont de Nemours & Co., 2004 WL 2347559, 65 Fed. R. Evid. Serv. 706,
........................................................................................................................................... 39
Telewizja Polska USA, Inc., v. Echostar Satellite Corp., (N.D. Ill.2004) 2004 WL
2367740 [Not Reported] ................................................................................................... 39
iii
Authentication of Screen Name ........................................................................................ 39
People v. Von Gunten, (2002 Cal.App.3d Dist.) 2002 WL 501612. [Unpublished.] ....... 39
Introduction of Web Sites ................................................................................................. 39
EEOC v. E.I dupont de Nemours & Co., 2004 WL 2347559, 65 Fed. R. Evid. Serv. 706,
........................................................................................................................................... 39
Telewizja Polska USA, Inc., v. Echostar Satellite Corp., (N.D. Ill.2004) 2004 WL
2367740 [Not Reported] ................................................................................................... 39
Bass v. Miss Porter’s Sch., 2009 U.S. Dist. LEXIS 99916 (D. Conn. Oct. 27, 2009) ..... 39
Texas Cases of General Interest ........................................................................................ 40
Faxes ................................................................................................................................. 40
Computer Printouts ........................................................................................................... 40
Emails and chat room transcripts ...................................................................................... 40
Websites ............................................................................................................................ 41
Digital video ..................................................................................................................... 41
Automated computer-generated records ........................................................................... 41
Chain of custody ............................................................................................................... 41
Ethical Issues related to Social Networking sites ......................................................................... 41
Truthfulness in Statements to Others ................................................................................ 42
New Duty to advise clients? ............................................................................................. 42
iv
“I SAW IT ON FACEBOOK, NOW
HOW DO I USE IT AT TRIAL?”
MICHAEL SAWICKI
Introduction
The internet has revolutionized the way the world communicates. Information now
moves in a variety of ways, is stored in many locations and can travel instantly across the globe
amazingly, people are often incredibly frank when using this new technology, publishing
intimate details of their lives for anyone who knows how to find it to see. Learning to find,
collect and use this new information can arm litigators with powerful and economical tools. This
information can be used to do a variety of trial-related tasks from instantly evaluating potential
jurors to conducting potentially damaging discovery of an opponent or witness.
This paper reviews recent news events where information from websites and instant
message services entered the courtroom with damaging effect. It will provide a brief overview of
some of the more popular social networking and instant messaging sites. And it will discuss the
developing law and other practical uses of electronic information in court.
The Impact of New Information Technology
Recent news stories demonstrate that new communication and social networking
technology is providing powerful evidence in today’s courtrooms. For proof, consider the
following:
-
In Arkansas, a $12 million jury verdict was almost overturned when it was learned
one of the jurors had been posting details of the case on his Twitter account.
-
In Detroit, Mayor Kwame Kilpatrick was convicted of perjury and was forced out of
office when thousands of pages of text messages were discovered that proved he had
an affair with another worker.
1
-
In Rhode Island, a defendant in a DWI case received a stiffer sentence when
prosecutors discovered photos of him drinking while wearing a prison costume on his
Facebook page.
-
In Milwaukee, a surgeon performed a knee surgery using Twitter to provide minute
by minute descriptions of the procedure while it was actually taking place.
A few years ago, the use of social networking sites and instant messages were popular
among relatively small number of people. Today, hundreds of millions regularly log into sites
like Facebook and Myspace to share information, re-connect with old friends and look for
employment. It is estimated that there are currently more than 500 social networking sites online
ranging from those with broad appeal, like Facebook, to others that which much narrower and
often unique focuses, like Ravelry – a site specializing on knitting and crocheting and
Vampirefreaks – a site devoted to people wishing to dress and live like vampires. The sites are
typically easy to join, encourage interaction between their members and can be a wonderful
source of information about potential witnesses, parties to cases and even jurors.
Along with the rise of social networks, the popularity of communicating using text
messages, chat rooms and sites like Twitter has exploded. Most cell phone service includes text
messaging capability and many web sites host services that can be used to conduct private chat
sessions amongst individuals or groups. From AOL Instant Messenger to Yahoo! Messenger,
there are now many methods available to send and receive information almost instantly.
For some reason, many users of both social networking sites and messaging services do
so without any, or very little discretion, about what they post. This unguarded approach to use of
these services has begun to provide litigators with powerful weapons in the courtroom. The most
high-profile recent example would be the amazingly quick downfall of Detroit Mayor Kwame
Kilpatrick.
2
Kwame Kilpatrick
Kilpatrick and an aide, Christine Beatty, gave depositions in a civil wrongful termination
lawsuit brought by a city employee. The employee had alleged that Kilpatrick and Beatty had
conspired against him to have him terminated. In the civil depositions, Kilpatrick denied any
involvement in the decision to fire the employee and further repeatedly denied any affair with
Beatty. Kilpatrick, who was married at the time, testified in the civil depositions that he had
nothing but a professional relationship with Beatty and rarely saw her in person.
Then, the cat got out of the bad.
Attorneys got a hold of more than 600 pages of text messages Kilpatrick made on a city
phone. The records contained more than 14,000 text messages sent between Kilpatrick and
Beatty during 2002 and 2003, when the issues involved in the wrongful termination suit were
happening. Contrary to Kilpatrick and Beatty’s testimony about their relationship, the text
messages revealed in intimate detail that they were in fact having an affair. 1
Here are some of the messages. Consider whether you would want to get similar evidence
about a defendant if you could.
1
M.L. ELRICK; JIM SCHAEFER and BEN SCHMITT (March 26, 2008). "Text message casts more doubt on
mayor
HE
ASKED
HOW
TO
EXPLAIN
COP'S
FIRING".
Detroit
Free
Press.
http://www.freep.com/apps/pbcs.dll/article?AID=/20080326/NEWS01/803260408.
3
4
5
After the text messages were released, Wayne County Prosecutor Kym Worthy
announced a 12-count criminal indictment against Kilpatrick and Beatty, charging Kilpatrick
with eight felonies and Beatty with seven. The charges included perjury, misconduct in office
and obstruction of justice. Kilpatrick ultimately pled guilty to two felony counts of obstruction of
justice, agreed to serve a four month jail term, pay a one million fine, surrender his law license,
and resign his post.2
Twitter Verdict
Consider this litigator’s nightmare; you’ve just tried a difficult case and won a multimillion verdict jury verdict. But, days after the verdict, the other side moves to set it aside
because of evidence that a juror was texting messages about the deliberations.
This is exactly what happened in an Arkansas court in March 2009. Attorneys for Stoam
Holdings filed a motion requesting a new trial of a $12 million jury verdict after they found that
a juror sent eight messages about the case on his Twitter account via his cell phone. One
message, sent before the jury announced its verdict, read: “Ooh and nobody buy Stoam. Its bad
mojo and they'll probably cease to Exist, now that their wallet is 12m lighter.” Another read: “I
just gave away TWELVE MILLION DOLLARS of somebody else’s money.” Stoam’s attorneys
argued that these and other messages sent during the trial demonstrated that the juror was not
impartial and conducted outside research about the issues involved in the case.
The Court ultimately held that the juror’s actions did not violate any rules and denied the
motion for new trial.3 The judge held that there was no evidence the juror, Jonathan Powell, did
any outside research about the case and that his Twitter messages did not demonstrate evidence
of his being partial to either side. The judge noted that some of the messages were sent before
Powell was selected as a juror and that the attorneys for the defense had not bothered to question
2
ASHENFELTER, DAVID (March 27, 2008). “Detroit resident files recall petition against mayor”. Detroit Free
Press. http://www.freep.com/apps/pbcs.dll/article?AID=/20080327/NEWS01/80327060. Retrieved on 2008-03-28;
ELRICK, M.L., SCHAEFER, JIM, SWICKARD, JOE and SCHMITT, BEN, (September 4, 2008). “Kilpatrick to
city: ‘There’s another day for me’ Fallen, yet resolute, mayor says he accepts responsibility for actions. Detroit Free
Press.
3
GAMBRELL, JON (April 3, 2009) “Judge Rejects New Trial Over Juror’s Online Posts,” Kansas City Star.
6
him about bias during jury selection. In statements to the media, Powell said he just wanted to be
a good juror and was looking forward to his involvement in the process. He said he did not use
his cell phone or lap top during the trial, although he brought them to court each day and warned:
“The courts are just going to have to catch up with the technology.”4
Facebook DWI
A 20-year old Rhode Island man had been charged with driving drunk and causing a
crash that seriously injured another driver. Before his sentencing, prosecutors checked Joshua
Lipton’s Facebook page as part of their routine investigation. They found that two weeks after
he’d been charged with causing the wreck, Lipton attended a Halloween party dressed as a “jail
bird.” There were several photos of him posing with his tongue sticking out in a black-and-white
striped shirt and an orange, prison-style jumpsuit with the words “JAILBIRD” printed on the
chest.
The prosecutors offered the photos into evidence during the sentencing and argued that
Lipton was an “unrepentant partier” who “lived it up” while the female victim of the crash laid in
4
DAVIS, SCOTT F. (April 2, 2009). “No new trial over Juror’s Twittering,” Northwest Arkansas Times. Powell
continued to post Twitter entries about ordeal and sudden notoriety after the trial. On the day he was supposed to
appear in court to address the issues raised in the motion for new trial he wrote “Well, I’m off to see a judge. Hope
they don’t lock me under the jail, and forget about me for four days.”
7
a hospital bed. The judge agreed, calling Lipton “depraved” and handed down a 2-year prison
sentence.5
Social Networking Sites
Social networking sites have proliferated across the globe, with millions of users and
more being springing up every day. They typically focus on building online communities of
people who share similar interests or are interested in learning more about specific topics. Most
provide users ways to trade messages, send pictures and videos and share information over the
internet through email and instant messaging services. Typically, joining the sites is free and can
instantly link a user with access to information on millions of people. Many users customize their
5
KUFF, NICOLETTE (July 20, 2008) “Facebook Photos Lead to 2-year Sentence After Drunk Driving Crash,
Prosecutors Now Digging for Dirt on Various Social Networking Sites,” Rhode Island News.
8
sites with detailed personal information, including birthdates, work histories, voting preferences,
political and social affiliations.6
This unlimited access has concerned some of these sites’ operators and users worried
about who can see their information. Recently, some sites have taken steps to reduce access and
beef up user’s controls over who can see their information. But the same search tools created to
help link users with long-lost friends and others with similar interests can be used by anyone
seeking to get more information.
This portion of the paper will review some of the more popular sites, describe how you
access them and what information may be, generally, available.
Anyone not living under a rock, or ensconced in the warm cocoon of a post-tort reform
legal practice, will have heard about Facebook by now. The social networking site recently
surpassed Myspace in total user numbers.7 The site was started by two Harvard University
students in 2004 as a way for students there to get to know one another. Just two weeks after it
was launched, nearly half the Boston area schools began demanding their own Facebook
networks. In four months, Facebook had grown to more than 30 different colleges. Since then, its
rise has been meteoric.8 In the summer of 2006, Yahoo offered Facebook’s creators $1 billion to
purchase the site. They turned the offer down.9
6
GROSS, R and ACQUISTI, A (2005) “Information Revelation and Privacy in Online Social Networks (The
Facebook case),” ACM Workshop on Privacy in the Electronic Society (WPES); “Social Nets Engage in Global
Struggle" - 66% of MySpace and Facebook users come from North America” Adweek website. (January 15, 2008).
7
ARRINGTON, MICHAEL (June 12, 1008) “Facebook No Longer the Second Largest Social Network,” Tech
Crunch.com
8
Facebook, (April 20, 2009) TechCrunch.com
9
SAKUMA,
PAUL
(June
17,
2007)
“The
Future
of
Facebook,”
Time.
http://www.time.com/time/business/article/0,8599,1644040,00.html. Retrieved on 2008-03-05.
9
Last year, the 25-year old inventor is listed as the 321st richest person in the U.S. with an
estimated net worth of $1.5 billion. He is the youngest person to ever appear on the Forbes 400.10
The site that started as a way to help meet girls has now grown into one of the largest
social networking sites in the world. More than 1 million new users signed up every week in
2007, swelling the total number over 50 million. Facebook pages received more than 40 billion
page views a month. The make-up of the average user changed dramatically with over 11% of its
users over the age of 35. Currently, the fastest growing demographic is among users over the age
of 30. The popularity of the site has spread internationally as well, with approximately 15% of its
user base in Canada.11
Users’ activities on the site is amazing. One survey found more than half of Facebook
users visited on a daily basis and spent an average of 19 minutes a day on it. Facebook is listed
as the 6th most trafficked site in the U.S. and the top photo sharing site with more than 4 billion
photos uploaded.12
What can you find on Facebook?
Facebook has a number of features that have proved wildly popular with users. Many
also provide an interesting source for litigators to examine when digging into a case. First, it is
free for users to join the site. When they do, new users are asked to provide some personal
information when starting their access such as where they graduated from high school, their birth
date, geographical location. This information then helps the user connect with people who have
similar backgrounds or interests. Anecdotally, I joined the site and input where I graduated from
high school. Within seconds of joining, Facebook suggested two “friends” that I might know
who were also users of the site. One was my best friend from junior high school now living in
Sweden. We had not seen or communicated with each other for years. The other was working in
10
“The 400 Richest Americans - #321 Mark Zuckerberg” (September 17, 2008) Forbes.
Facebook, TechCrunch.com (April 20, 2009).
12
Id.
11
10
Hong Kong and had also been out of communication because of the geographical distance.
Within weeks, we were reconnected and picking up our friendship even though we were all miles
way from one another.
Once they have created an account, users can customize their profile with as little or as
much information about themselves as the wish. The site profile contains fields for basic
information like birth date, hometown, relationship status, areas of interest and political views. It
also asks for contact information, past education and work history and will list any other special
areas of interest that the user adds to it.
11
In addition to the Profile, Facebook has a number of other features that have proved very
popular with users. They include:
-
Facebook Chat – a real-time chat service allowing users to communicate instantly
with other users logged onto the site.
Facebook Connect – a tool that allows the user to link his or her profile to any other
web address or internet site.
Facebook Newsfeed – a device that automatically broadcasts users’ most important
activities and status updates.
Facebook IPhone App – allows IPhone users to connect to their Facebook pages and
receive instant updates from friends.
MySpace was launched in the Summer of 2003 and quickly grew to be one of the first
successful social networking sites.13 The site was created by employees of eUniverse, a Los
Angeles based internet marking company, who had seen the potential future market while
working with an earlier site called Friendster. 14 Initially used only by eUniverse employees,
MySpace quickly grew in popularity when the company sponsored contests to draw new users.15
Within a short time, MySpace grew to have more than 20 million users. MySpace’s commercial
success was driven by the use of targeted advertising. The site used personal information entered
by users to generate data that allowed advertisers to use behavioral targeting to focus ads that
they might be interested in.16 In 2006, Google paid MySpace $900 million to make its search
engine exclusively listed on the site.17
13
Lapinski, Trent (2006-09-11). “MySpace: The Business of Spam 2.0 (Exhaustive Edition)”. ValleyWag.
http://valleywag.com/tech/myspace/myspace-the-business-of-spam-20-exhaustive-edition-199924.php. Retrieved on
2008-03-13.
14
Betsy Schiffman, May 9, 2008. “In Praise of Friendster”, Wired. Retrieved October 27, 2008.
15
Rosmarin, Rachel (2006-10-04). “The MySpace Economy”. Forbes. http://www.forbes.com/2006/04/07/myspacegoogle-murdoch-cx_rr_0410myspace.html. Retrieved on 2006-10-04.
16
Story, Louise and comScore (March 10, 2008). “They Know More Than You Think” (JPEG).
http://www.nytimes.com/imagepages/2008/03/10/technology/20080310_PRIVACY_GRAPHIC.html. in Story,
Louise (March 10, 2008). “To Aim Ads, Web Is Keeping Closer Eye on You”. The New York Times (The New York
Times Company). http://www.nytimes.com/2008/03/10/technology/10privacy.html. Retrieved on 2008-03-09.
17
Google signs $900m News Corp deal". BBC News. 2006-08-07. http://news.bbc.co.uk/1/hi/business/5254642.stm.
Retrieved on 2006-09-09.
12
MySpace initial success was with younger users but this demographic also created
problems for the company. While the minimum age to join was 14, the site became the subject of
news reports of under-aged users being targeted by sexual predators. There were also wellpublicized incidents involving parties advertised on MySpace that grew out of control. MySpace
has responded to the issues by trying to beef-up security and privacy of personal information
with moderate success.
While still enjoying considerable success, lately MySpace has been losing ground to the
growing popularity of Facebook which recently surpassed it with the number of users. MySpace
has responded to the challenge by taking the service world-wide and now boasts users
throughout Europe, Canada, South America and China.
MySpace Features
MySpace provides many of the same social networking tools as rival Facebook. Both
sites allow users to post information about themselves, their personal professional and political
interests and provide updates about user’s moods and activities. The primary difference between
the two sites is the ability for users to uniquely customize the look of their profile pages with
photos, graphics and animations. Users can also add music to their pages via the MySpace
Music, a service that allows bands to post songs for use on the site. There are estimated to be
more than eight million artists with songs on MySpace and the number continues to grow.18The
popularity of the page customization feature has spawned several services and websites that help
users create unique pages.
Other MySpace features include:
Bulletins
Bulletins are posts that are posted on to a “bulletin board” for everyone on a MySpace
user’s friends list to see. Bulletins can be useful for contacting an entire friends list without
resorting to messaging users individually. Some users choose to use Bulletins as a service for
delivering chain messages about politics, religion, or anything else and sometimes these chain
messages are considered threatening to the users, especially the ones that mention bad luck,
death, or topics similar to that. Bulletins are deleted after ten days.
Groups
MySpace has a Groups feature which allows a group of users to share a common page
and message board. Groups can be created by anybody, and the moderator of the group can
choose for anyone to join, or to approve or deny requests to join.
18
Coyle, Jack (2008-04-28). “Myspace unveils new
http://www.msnbc.msn.com/id/24358965/. Retrieved on 2008-04-29.
13
karaoke
feature”.
Associated
Press.
MySpaceIM
In early 2006, MySpace introduced MySpaceIM, an instant messenger that uses one's
MySpace account as a screen name. A MySpace user logs in to the client using the same e-mail
associated with his or her MySpace account. Unlike other parts of MySpace, MySpaceIM is
stand-alone software for Microsoft Windows. Users who use MySpaceIM get instant notification
of new MySpace messages, friend requests, and comments.
MySpaceTV
In early 2007, MySpace introduced MySpaceTV, a service similar to the YouTube video
sharing website. MySpaceTV is now in beta mode, and will probably be launched as a separate
site in either 2008 or early 2009. MySpaceTV might be a standard channel that will be shown on
television.
Applications
In 2008, MySpace introduced an API with which users could create applications for other
users to post on their profiles. The applications are similar to the Facebook applications. In May
2008, MySpace had added some security options regarding interaction with photos and other
media.
MySpace Mobile
There are a variety of environments in which users can access MySpace content on their
mobile phone. American mobile phone provider Helio released a series of mobile phones in early
2006 that can utilize a service known as MySpace Mobile to access and edit one's profile and
communicate with, and view the profiles of, other members.19 Additionally, UIEvolution and
MySpace developed a mobile version of MySpace for a wider range of carriers, including
AT&T, Vodafone and Rogers Wireless.20
MySpace News
In the month of April 2007, MySpace launched a news service called MySpace News
which displays news from RSS feeds that users submit. It also allows users to rank each news
story by voting for it. The more votes a story gets, the higher the story moves up the page.
MySpace Classifieds
Full service classifieds listing offered beginning in August 2006. It has grown by 33
percent in one year since inception. MySpace Classifieds was launched right at the same time the
site appeared on the internet.
19
“MySpace Mobile To Debut On Helio; Details on Handsets”. Dis*Content Media LLC. 2006-02-16.
http://www.moconews.net/?p=5176. Retrieved on 2006-09-08.
20
“MySpace partners with Vodafone”. StrategyWire.
http://live.marketclusters.com/cl2/view/2007/02/07/myspace_partners_with_vodafone/. Retrieved on 2007-02-08.
14
MySpace Karaoke
Launched April 29, 2008, ksolo.myspace.com is a combination of MySpace and kSolo,
which allows users to upload audio recordings of themselves singing onto their profile page.
Users’ friends are able to rate the performances.
MySpace Polls
MySpace Polls is a feature on MySpace that was brought back in 2008 to enable users to
post polls on their profile and share them with other users.
MySpace forums
Allows MySpace users to discuss a variety of topics on line with other users.
Other social networking sites
The number of social networking sites seems to be expanding each day. Any paper trying
to capture them all will fail and instantly date itself. Safe to say, there are sites for almost any
type of interest including sites for job searches, religious organizations, and many “special
interests. Some examples include:
15
Orkut is a social networking service which is run by Google and named after its creator,
an employee of Google - Orkut Büyükkökten – in 2006. The service is similar to Facebook and
MySpace. It was originally targeted at the U.S. market but has become very popular in Brazil
and India.
Linked In is a business-oriented social networking site launched in 2003 for professional
networking. As of February 2009, it had more than 35 million registered users spanning more
than 170 industries. The site allows users to link up their professional activities through alumni,
industry or other professional groups. The site allows registered users to maintain contact
information for people they know and trust in lists called Connections. Users can invite anyone
(whether a site user or not) to become a connection and they may, in turn, be introduced to other
site users. The site is currently popular for job and resume listings.
Ryze.com is another site designed to link business professionals, with an emphasis on
new entrepreneurs. It claims to have over 500,000 members in 200 countries, with over 1,000
external organizations hosting sub-networks on the site. Both paid and unpaid membership levels
are offered.
16
Affluence.org is an online social network targeting affluent and influential individuals.
The site, founded in 2008, claims that its members must have a net worth of at least US$ 3
million, or have an income of $300000 a year.
Buzznet.com is a photo, journal, and video-sharing social media network. Its members
seem to be focused around popular culture, predominantly music, celebrities and the media. Like
MySpace, users can personalize their profile pages with music, photographs and graphics to
reflect their individual tastes.
DeviantArt is an online community art showcasing website. Launched in 2000, the site
claims to have more than 10 million members with over 75 million art submissions online. The
site offers artists a place to exhibit and discuss their works in a variety of mediums including
photography, digital art, traditional art, film and website “skins.” The domain is said to have
received at least 36 million visitors in 2008.21
Reunion.com, which recently changed its name to MyLife.com, was founded in 2002 by
a man who first met his wife while attending a high school reunion. The site claims to help
members find and keep in touch with old friends, relatives and lost loves. It claims to have more
than 28 million members in the United States and Canada.
21
Ressner, Jeffrey (October 19, 2006). "The Newest Time Waster: Line Rider". Time Magazine.
http://ww.time.com/time/business/article/0,8599,1548299-1,00.html. Retrieved on 2006-12-12
17
VampireFreaks.com, which users refer to as “VF,” is an online community catering to
the Gothic/industrial subculture. Basically people who like to dress up and act like vampires.
Founded in 1999, the site boasts more than 1 million users worldwide. Users can highly
personalize their pages, with software tools more powerful than those found on MySpace, and
can join forums catering to specific “cults” within the subculture. Registration is free but a paidfor “premium” membership entitles users to access to a number of bonus features.
Windows Live Spaces (also known by its users as MSN Spaces) is Microsoft’s blogging
and Social Networking platform. The site was originally released in early 2004 under the MSN
Spaces name to compete with other social networking sites. Windows Live Spaces received an
estimated 27 million (27,000,000) unique visitors per month as of August 2007.22
Social networks are beginning to be adopted by healthcare professionals as a means to
manage institutional knowledge, disseminate peer to peer knowledge and to highlight individual
physicians and institutions. The advantage of using a dedicated medical social networking site is
that all the members are screened against the state licensing board list of practitioners. The role
of social networks is especially of interest to pharmaceutical companies who spend
approximately “32 percent of their marketing dollars” attempting to influence the opinion leaders
of social networks.
22
“Face to interface”. Social networks. Economist.com.
http://economist.com/daily/chartgallery/displaystory.cfm?story_id=9981022. Retrieved on 2007-11-15.
18
A new trend is emerging with social networks created to help its members with various
physical and mental ailments. For people suffering from life altering diseases, PatientsLikeMe
offers its members the chance to connect with others dealing with similar issues and research
patient data related to their condition. For alcoholics and addicts, SoberCircle gives people in
recovery the ability to communicate with one another and strengthen their recovery through the
encouragement of others who can relate to their situation. Daily strength is also a website that
offers support groups for a wide array of topics and conditions, including the support topics
offered by PatientsLikeMe and SoberCircle. SparkPeople offers community and social
networking tools for peer support during weight loss.
Twitter is a social networking and micro-blogging service that enables its users to send
and read other users’ updates known as tweets. Tweets are text-based posts of up to 140
characters in length. Updates are displayed on the user's profile page and delivered to other users
who have signed up to receive them. Senders can restrict delivery to those in their circle of
friends or have the posts visible to anyone accessing the site. Users can send and receive updates
via the Twitter website or through a number of other applications such as Tweetie, Twitterrific,
Twitterfon, TweetDeck and feedalizr. The service is free to use over the web but cell phone users
may incur a charge.
Twitter was created by Cornell student Jack Dorsey in 2006 and has quickly become a
world-wide phenomenon. The service allows users from sites like Facebook and MySpace to
send and receive short text messages about themselves. The site has proved popular among teens,
people seeking to promote their business or professional services and a growing number of
celebrities.
Estimates of the number of daily users vary as the company does not release the number
of active accounts. In November 2008, Jeremiah Owyang of Forrester Research estimated that
Twitter had 4-5 million users.23 A February 2009 Compete.com blog entry ranks Twitter as the
third most used social network (Facebook being the largest, followed by MySpace), and puts the
number of unique monthly visitors at roughly 6 million and the number of monthly visits at 55
million.24 In March 2009, a Nielsen.com blog ranked Twitter as the fastest growing site in the
Member Communities category for February 2009. Twitter had a growth of 1382%, Zimbio had
a growth of 240%, followed by Facebook with a growth 228%.
23
Aneesh, Jeremiah (2008-11-19). “Social Networks Site Usage: Visitors, Members, Page Views, and Engagement
by the Numbers in 2008”. http://www.web-strategist.com/blog/2008/11/19/social-networks-site-usage-visitorsmembers-page-views-and-engagement-by-the-numbers-in-2008/. Retrieved on 2009-02-16.
24
Kazeniac, Andy (2009-02-09). “Social Networks: Facebook Takes Over Top Spot, Twitter Climbs”
Compete.com. http://blog.compete.com/2009/02/09/facebook-myspace-twitter-social-network/. Retrieved on 200902-17.
19
Privacy and security
Twitter collects personally identifiable information about its users and shares it with third
parties. Twitter considers that information an asset, and reserves the right to sell it if the
company changes hands.25
Twitter has had some problems with security as hackers have accessed the site to send
fake messages from someone else’s account. This has led Twitter to offer users an optional PIN
number to secure their posts. In January 2009, more than 30 high-profile user’s Twitter accounts
were compromised and fake messages – including sexually explicit and drug-related posts –
were sent. This triggered Twitter to re-examine password security in an attempt to avoid future
attacks.26
Using Social Network Evidence in Court
This section of the paper will address methods to discover and use social networking
evidence in your litigation. It will discuss techniques to improve the chances of admitting the
evidence at trial and discuss recent cases dealing with social networking evidence.
Discovery Issues
While there has been an explosive growth of information available on the internet, the
law has not kept pace with the developments. The Federal Rules were recently amended to
address discovery of electronically stored information (ESI) and there are other papers that deal
with that subject in more detail. In general, the new Federal rules, for the first time, explicitly
made mention of ESI and began to set out a framework for how to deal with it. The rules set out
methods requiring parties to deal with e-discovery issues early in the case and provide a
procedural mechanism through which parties can produce and protect electronic data.27
Under the new rules, ESI includes (but is not limited to) e-mail, web pages, word
processing files, computer databases, and almost anything that can be stored on a computer.28
25
“Twitter Privacy Policy”. Twitter. 2007-05-14. http://twitter.com/privacy/. Retrieved on 2009-03-11.
Arrington, Michael (2009-01-05). “Celebrity Twitter Accounts Hacked (Bill O'Reilly, Britney Spears, Obama,
More)”. TechCrunch. http://www.techcrunch.com/2009/01/05/either-fox-news-had-their-twitter-account-hacked-orbill-oreilly-is-gay-or-both/. Retrieved on 2009-01-05. Arrington, Michael (2009-01-05). “Twitter Gets Hacked,
Badly”. TechCrunch. http://www.techcrunch.com/2009/01/05/twitter-gets-hacked-badly/. Retrieved on 2009-01-05.
27
See Federal Rules of Civil Procedure 16, 26, 33, 34, 37 and 45.
28
See THE SEDONA PRINCIPLES: BEST PRACTICES, RECOMMENDATIONS & PRINCIPLES FOR
ADDRESSING
ELECTRONIC
DISCOVERY
at
1,
available
at
http://www.thesedonaconference.org/content/miscFi1es/2007SummaryofSedonaPrinciples2ndEdition
Aug17assentforWG1.pdf (hereinafter “THE SEDONA PRINCIPLES: BEST PRACTICES”). The Sedona
Conference is a nonprofit research and educational institute composed of lawyers, consultants, academics, and
jurists, who discuss appropriate standards for corporations and the courts to follow when addressing issues of
electronic discovery. In the absence of contrary authority, employing the Sedona Principles as guidance is
reasonable and advisable. See, e.g., Zubulake v. U.B.S. Warburg L.L.C., 229 F.R.D. 422, n.122 (S.D.N.Y. 2004)
(“[P]rofessional groups such as the American Bar Association and the Sedona Conference have provided very useful
guidance on thorny issues relating to the discovery of electronically stored information.”); In re Search of 3817 W.
End, 321 F. Supp. 2d 953, 956 (N.D. Ill. 2004) (relying on the principles’ definition of “metadata”).
26
20
The commentators indicate that the rules were intended to be read broadly to apply the ESI
definition to many forms including traditional e-mail, text messaging, instant messaging,
personal web mail, voicemail, Blackberry devices, ‘blogs,’ and other emerging technologies.
Litigants in federal courts are now faced with an obligation to preserve potentially relevant
information contained within any of these sources.
The Texas rules and case law have not kept pace with the Federal developments. In fact,
the Texas Rules of Civil Procedure make very little effort to differentiate electronic discovery
from any other form of discovery. Only Rule 196.4 of the Texas Rules of Civil Procedure
addresses the production of electronic or magnetic data. It states:
To obtain discovery of data or information that exists in electronic or magnetic
form, the requesting party must specifically request production of electronic or
magnetic data and specify the form in which the requesting party wants it
produced. The responding party must produce the electronic or magnetic data that
is responsive to the request and is reasonably available to the responding party in
its ordinary course of business. If the responding party cannot—through
reasonable efforts- retrieve the data or information requested or produce it in the
form requested, the responding party must state an objection complying with
these rules. If the court orders the responding party to comply with the request,
the court must also order that the requesting party pay the reasonable expenses of
any extraordinary steps required to retrieve and produce the information.
Comment Number 3 to the Rule states:
A party requesting production of magnetic or electronic data must specifically
request the data, specify the form in which it wants the data produced, and specify
any extraordinary steps for retrieval and translation. Unless ordered otherwise, the
responding party need only produce the data reasonably available in the ordinary
course of business in reasonably usable form.
Finding Social Networking Evidence
There are many different ways to begin looking for social networking evidence. First, run
simple search engine checks of the names of individuals you are interested in. There are many
search engines, beyond sites like Google.com and Yahoo.com, that offer more focused results.
Many of these search engines will provide basic searches for free but will require a subscription
to get more detailed information. However, even the limited results of a free search can help you
locate witnesses or develop more information about a person. For example, Wink.com is a site
that offers detailed people finding and background searches. The site works by entering a
person’s name and geographic location into its engine. The basic results can show the
individual’s address, age, and the identity of other people who are associated with them. These
results alone can be used to help track someone or identify other potential witnesses.
Other search engines, like Zabasearch.com, allow you to enter a name or a phone number
and find information associated with it. This site helps produce prior street addresses, email
21
addresses and phone numbers, all free of charge. Another site, Pipl.com, produces similar results
and searches for photographs and images associated with the individual on sites like Facebook
and Myspace.
There are a growing number of both free and pay sites providing a wide variety of on-line
search capabilities. Additionally, there are many sites and blogs that provide discussions of
emerging issues in on-line searches, privacy controls and how to gain access to information.
Many of these sites offer search tips and address the constantly changing ways information can
be ferreted out of the internet.
If you haven’t already, it is time to start incorporating requests and interrogatories
concerning social networking evidence into your standard sets of discovery. We currently ask
opposing parties to identify any on-line presence they maintain, including blogs, websites, and
social networking pages. It helps to ask if they use any assumed names or alter-egos in creating a
web presence. From there, we request the actual web address, or URL, to provide access to the
public information the party has placed on the web. We have had limited success seeking access
to private on-line sites, like Facebook, with most judges limiting the discovery to what is
publically available or specifically related to the issues involved in the case.
Again, if you haven’t already, it is time to sit down every client you have and discuss the
importance of monitoring exactly what they put on the web or social networking sites.
Anecdotally, I have heard of lawyers being surprised at depositions of their clients when
opposing counsel pull out incriminating or embarrassing materials posted on the web. One
attorney friend found her clients, a married couple injured in a motor vehicle accident, were
regular members of a website focused on linking people interested in the “swinging” lifestyle
together. While the material might not have been directly relevant to their damage claims, having
it appear for the first time during a video-taped deposition is not a comfortable legal experience.
Clients also need to be told that sites their friends are posting on can also create
problems. Facebook, for example, allows individuals to “tag” people – i.e. post their names – on
photographs put on the site. These tags may not always be covered by the individual’s privacy
settings and can sometimes be accessed by the general public.
A recent case out of Ontario, Canada provides a look at where the law may be taking us
on this issue. A judge in a personal injury case expressed an opinion that it may now constitute
legal malpractice for a lawyer to ignore the potential damaging effect of social networking
evidence and fail to educate their clients about it. In Leduc v. Roman, 2009 CanLII 6838 (ON
S.C.), the judge suggested a new standard of care may now apply.
“Given the pervasive use of Facebook and the large volume of photographs typically
posted on Facebook sites, it is now incumbent on a party’s counsel to explain to the client, in
appropriate cases, that documents posted on the party’s Facebook profile may be relevant to
allegations made in the pleadings.”
Because this same logic could be extended to almost anything on the web, i.e. YouTube,
Twitter, Flickr, Myspace, etc. and the methods of accessing the web are constantly changing,
22
lawyers may now have to keep pace with developments to ensure their clients are appropriately
counseled.
Legal issues- General Concerns About Admissibility of Social Networking Evidence
Texas, like most other states, has very few cases directly dealing with the admissibility of
social networking evidence. Absent that, the best approach is to rely on the basics. Generally,
there are four issues to consider when admitting any type of evidence. They are: 1)
authentication, 2) relevance and undue prejudice, 3) hearsay and 4) the best evidence or original
writing issues. This section will discuss the rules pertaining to each issue and offer examples of
how they might be used.
Authentication
The Texas Rules of Evidence 901-903 deal with authentication. At their core, the rules
requirement the proponent of the evidence to prove that it actually is what they claim it to be.
The threshold to accomplish this is fairly low. For example, witnesses can authenticate
photographs if they testify they have personal knowledge of what they depict and are accurate.
See Kirwan v. City of Waco, 249 S.W.3d 544, 549 (Tex. App.- Waco 2008), In re G.F.O., 874
S.W.2d 729, 731 (Tex. App.- Houston [1st Dist.] 1994, no writ). Circumstantial evidence can be
used to authenticate. See Sanchez v. Texas State Bd. of Med. Examiners, 229 S.W.3d 498, 509
(Tex. App. – Austin 2007, no pet.).
Rule 901 sets out illustrations of ways to authenticate evidence and include testimony of
a witness with knowledge, use of distinctive characteristics and evidence of a process or system.
This is a good place to start when trying to challenge or admit social networking evidence.
Consider how authentication could be used to challenge a print out of a chat room
discussion about issues in your case. For example, the chat room discussion alone may not
contain sufficient evidence for someone to identify who the participants were, when the
conversation occurred or what the subjects were discussing. Using 901, a party seeking to avoid
the admission of the transcript could argue that it is not authentic. In response, the proponent
could use the outline contained in 901(b)(6) concerning telephone conversations as a guideline to
develop authentication evidence.
First, consider the nature of what it is you are trying to admit into evidence. This will
help define the scope of your authentication challenge. For example, if you are trying to offer a
Facebook page photograph to identify someone, you need only to establish testimony that the
photograph depicts that person in a reasonably accurate manner. If you are trying to authenticate
an email, without the sender’s supporting testimony, consider tracing how the email moved
through the system. For example, testimony from someone identifying the email address, the
substance of the message that is unique to the sender, conduct by the sender consistent with the
23
email message or corresponding information found on the sender’s own computer may be
enough to authenticate the message.
Rule 902 deals with self-authentication but neglects to specifically mention social
networking or internet evidence. However, the rule does discuss official publications, trade
inscriptions and newspapers and periodicals. Could this rule be used to prove up data from
government-run websites and on-line periodicals? There are no cases on point but strong
arguments could be made that the rule would support such a conclusion.
Case law interpreting the rule requires evidence from which a reasonable juror could find
that the material being offered is what the proponent claims it to be. Beware that the evidence
supporting this offer, i.e. the evidence of authentication, must itself be admissible in evidence. In
other words, avoid using hearsay or inadmissible evidence to support your authentication offer.
What happens if you believe that internet evidence against your client is not authentic?
For example, photographs can be altered using Photoshop and other similar tools to obscure or
erase relevant details. If you believe that a photo has been altered, the burden is on you to object
and provide the court with some evidence support your claim. See Kingsbury v. State, 14 S.W.3d
405, 407 (Tex. App. – Waco 2000, no pet.). Minor discrepancies go to the weight given the
evidence. To exclude it requires evidence of tampering or other fraud. See Druery v. State, 225
S.W. 3d 491, 503-4 (Tex. Crim. App. 2007).
Consider using pre-trial methods to overcome these authentication issues. For example,
Texas Rule of Civil Procedure 193.7 makes production of a document during discovery selfauthenticate the materials against the party producing it. Also, consider using admissions,
deposition testimony or interrogatory requests to force an opponent to authenticate internet
evidence.
Authentication under the Federal Rules
Authentication under the Federal Rules follows a similar logic. The Federal Rules
Advisory Committee acknowledged years ago that ancient document and authentication rules
should be extended to include electronically stored data. Consequently, the standard for
authenticating electronic evidence is substantially the same as authenticating other types of
physical evidence such as documents or handwriting as aforementioned. Authentication will
usually take the form of testimony by an individual with direct knowledge that the produced
evidence is what it purports to be under Federal Rule 901(b). Accordingly, a witness who
testifies on the authenticity of electronic evidence does not need to present any special
qualifications or expertise on the programming or technical operation of the program, but merely
requires first-hand knowledge of the program or technology presented. Although this places a
24
burden on the party wishing to introduce electronic evidence to find someone who can testify to
the operation of the technology involved, the Federal Rules are open to providing a mechanism
for the authentication of electronic evidence.
Relevance and undue prejudice
Many of the cases currently on the books deal with objections that social networking
materials contain unduly prejudicial evidence. This objection has been raised when a witness or
party places highly incriminating evidence on their own sites and then seek to avoid its effect
during trial. Some of these cases are described in more detail in the section discussing current
cases. In general, however, few courts seem willing to keep the evidence out just because it is
very damaging.
Texas Rule of Evidence 403 provides the basis for an unduly prejudicial objection. The
rule states that relevant evidence may be excluded if its probative value is substantially
outweighed by the danger of unfair prejudice, confusion of the issues or misleading the jury. The
cases dealing with this rule make it clear that this is a difficult burden to establish. Courts have
held that just because the evidence is persuasive, does not mean it is to be excluded. “Testimony
is not inadmissible on the sole ground that it is ‘prejudicial’ because in our adversarial system,
much of a proponent’s evidence is legitimately intended to wound the opponent.” See Bay Area
Healthcare Group v. McShane, 239 S.W.3d 231, 234 (Tex. 2007). The rule carries a presumption
that relevant evidence will be more probative than prejudicial. See Murray v. TDFPS, 294
S.W.3d 360, 368 (Tex. App.- Austin 2009, no pet.). Generally, courts have held relevant
evidence inadmissible where it was cumulative or repetitive of other evidence on the same
subject. For example, multiple autopsy photographs, settlement history of other similar suits, and
evidence of insurance coverage for the claims have been held prejudicial.
Many lawyers I have talked to after giving this speech have asked about challenges to
incriminating or embarrassing photographs of witnesses or parties found on their personal
websites. Most assume, simply because they have the photograph, that the evidence is
admissible. But, if the incident depicted is not shown to have some relevance to the case, don’t
be quick to assume it is admissible. Take into account the limitations on character evidence
found in Rule of Evidence 404 which limits evidence of a particular trait to prove conformity on
a specific occasion. Also consider if your own questioning of a witness or party could potentially
25
open the door to challenges from the other side. I once had an expert witness in a legal
malpractice case testify that the defendant had a sterling reputation as evidenced by the many
achievements he listed on his website. This opened the door to previously excluded evidence that
the same lawyer had been sanctioned by the disciplinary committee and judges for unethical
conduct in the case. Had the defense attorney not opened the door himself, this damaging
testimony would never have been heard by the jury. The same threat exists if your client testifies
in a manner consistent with claims or depictions they have made on their social networking sites.
Hearsay
The Texas and Federal Rules of Evidence deal with hearsay in very similar manners.
Generally, reliability and accuracy are the focus with a preference for live testimony in court
over statements made outside the parties’ abilities to challenge.
Texas Rule 801 defines hearsay as a “a ‘statement’ is (1) an oral or written verbal
expression or (2) nonverbal conduct of a person, if it is intended by the person as substitute for
verbal expression.29 A “declarant” is defined merely as a person who makes a statement. What is
not included in the rule are expressions made by non-persons, i.e. computers. The Texas rules do
not make any specific reference to social networking or internet evidence.
For example, if you are trying to offer information from someone’s Facebook, Myspace
or Twitter statements may be challenged with hearsay objections. Since many statements, like
personal updates, are often time-stamped you could consider using 803 (1-2) present sense
impression or excited utterance exceptions to overcome an objection. If the statement helps
refute a claim for damages, i.e. “I feel great” when the declarant is claiming disabling injuries
prevent them from enjoying life, consider 803(24) statement against interest exceptions.
Similar challenges are available under the Federal Rules. Under Rule 801(d)(2) an
admission by a party-opponent is admissible as “non-hearsay.” According to the Advisory
Committee to the Rules, admissions do not qualify as hearsay simply because fairness requires a
party to take responsibility for something that he or she said, and therefore, a party cannot claim
that the statement is untrustworthy. Instead, the party who made the admission now has the
burden of explaining to the trier of facts (judge or jury) why the statement is unreliable. A party
29
Note: the Federal rule counterpart, 801, contains very similar language.
26
cannot offer its own admission — it must only be offered by the party-opponent at the time of
trial.
Best evidence
Texas Rules of Evidence 1001-1007 deal with the requirement of original or “best
evidence.” Again, none of the rules deals specifically with social networking or internet related
evidence but does provide a framework to consider when trying to admit that evidence. Courts in
some other states have used similar rules to determine the admissibility of chat room transcripts
and email chains. The primary issue is how to take what only appears on a computer monitor
screen and turn it into something that can be presented to the jury.
Rule 1001(d) allows the use of a “duplicate” which is described as “a counterpart
produced by the same impression as the original, or from the same matrix, or by means of
photography, including enlargements and miniatures, or by mechanical or electronic rerecording, or by chemical reproduction, or by other equivalent techniques which accurately
reproduce the original.” Similarly to the discussion about authentication, this threshold requires
the evidence to be sponsored by someone who can vouch for the duplicate’s accuracy.
An interesting challenge under this area involves efforts to offer earlier versions of
websites. There are search engines that have the ability to pull up prior versions of a website, in
some cases containing materials that have been removed from the current sites. This evidence
can be helpful to prove a parties’ prior knowledge of a condition or representations about their
services. I recently used old versions of a hospital’s website to challenge its expert witnesses
about representations of the quality of the services provided in a neonatal intensive care unit.
You can find this evidence by using sites like Web.Archive.Org. Simply place the web address
of the site you are interested in checking into the site and it will generate a list of earlier versions
of it. From there, you can print off or record the prior versions of the site. In my case, the
defendant tried to argue that the earlier versions were not accurate and threatened a challenge
under the best evidence rule, among other objections. Ultimately, we were able to overcome the
threats by having the hospital’s own experts ratify that the representations were true and
accurate.
Other Uses of Social Networking Evidence
Jury Selection
Because information on social networks can be so personal and so revealing, it has
become a tool for litigators preparing for jury selection. Many jury consultants use the sites to
mine for information on potential jurors before voir dire begins. Start by getting the juror’s name
and entering it into search engines. If they have public personal profiles, you can obtain a very
personal and unmitigated look into the person’s beliefs, likes and dislikes. This type of search is
quickly replacing money spent on private investigators to look into the background of potential
27
jurors. For the time and nominal expense of an internet search, you can often obtain just as much
information as a more expensive private investigator might find.
Current Texas Social Networking Cases
A general search using the terms Facebook, Myspace or social networks in Westlaw
reveals only a handful of Texas cases. The majority are related to family law issues. In most of
the reported cases, the issues tend to focus on the prejudicial impact of the evidence rather than
the nuts and bolt elements for admitting it into evidence.
Hernandez v. State, 2010 WL 2099220 (Tex. App. – San Antonio 2010).
This criminal sexual solicitation and assault case concerned a challenge to the admission
of evidence from a MySpace page. The defendant tried to offer pages from the victim’s MySpace
page to show that she participated in sexual activities before her encounter with him. The
MySpace page included a picture of the victim with her boyfriend taken at school some time
after the incident with the defendant. The picture included a caption that read “omg how nasty i
get it all the time jeje.” The defendant claimed this was relevant to prove that the victim was
sexually active before his encounter with her and that she fabricated the accusation against him.
The trial court refused to admit the evidence and the appellate court upheld the decision. It wrote
that the defendant failed to show the context of the MySpace page and that, without it, the
evidence was potentially misleading. The Court wrote:
“We are left to speculate as to what the caption refers, the nature of its intended
meaning, and whether it was written in jest. Even if we take the caption to imply
what appellant asserts it implies-that B.M. was sexually active prior to the
solicitation-we disagree that the implication makes it more likely that B.M.
fabricated the allegation of solicitation. Moreover, because the picture was taken
after the solicitation, the caption also was posted after the solicitation. Therefore,
the caption has no specific relevance to B.M.’s knowledge of sexual terms before
her encounter with appellant. For these reasons, we conclude the evidence is
irrelevant, the trial court did not abuse its discretion in refusing to admit it, and its
exclusion did not violate appellant's constitutional rights.”
This rationale may be helpful to follow if an opponent seeks to offer damaging but
potentially unrelated social networking evidence against your client.
Mann v. Department of Family and Protective Services, 2009 WL 2961396
(Tex.App.-Houston [1 Dist.], 2009)
This family law case helps illustrate how people can willingly post damaging evidence on
social networking sites. The case involved a claim that a mother had endangered her child’s
physical and emotional well-being by drinking alcohol while she under the legal drinking age.
The woman posted several pictures on her MySpace page showing her drinking or intoxicated.
The pictures were captioned “At Ashley House Dranking it Up” and “Me Helping Ashley Stand
28
Up, Were Both Drunk.” Other photos on the site depicted her inside a local bar. To refute her
claims that she was not drinking at the bar, CPS offered the captions of the photos which said”
Me Dancing my ass off, I can dance when I drunk,” “Yall see how much we Dranked plus the
one’s that droped on the floor,” and “We were all fucked up.”
The young woman admitted that she had posted the pictures to her MySpace page and
identified herself and her friends in the photographs. In re K.E.L., 2008 WL 5671873 (Tex. App.
– Beaumont 2009)
A party to a family law case involving a custody dispute introduced evidence of sexually
explicit statements contained on the opposing party’s MySpace page to help prove he was not fit
to raise the children. The trial court allowed the evidence in and relied upon it to award primary
custody of the children to the other parent. While there was no fight about admissibility, the
parent making the statements claimed that they were not relevant to his ability to care for the
children and should not have been introduced into evidence. The appeals court disagreed and
found that this, and other evidence, supported the trial court’s custody decision.
Munoz v. State, 2009 WL 695462 (Tex. App. – Corpus Christi 2009)
A criminal law case in which the state offered evidence from the defendant’s MySpace
page to prove that he was engaged in gang-related activity. Evidence that his actions were gangrelated carried a multiplier to the potential sentence the defendant could face. The defendant
posted pictures of himself on MySpace showing him with several other individuals who were
known to be members of a gang and photos of the defendant exhibiting gang-related handsigns
and wearing gang-related clothing. The State sponsored the evidence through a police
investigator assigned to a special gang unit. The officer testified about how he found the
materials through an internet search, how he confirmed the identity of the individuals in the
photographs and how they were involved in gang activities and testified about his knowledge of
the gang culture and how the signs and clothing in the photographs were related to the gang.
This case is interesting because it demonstrates one way to prove up photographic
evidence from a social networking site in a situation where the target does not assist in
authenticating or describing the evidence. Of note are the careful steps the State took to provide
testimony about how the materials were collected, how the individuals in the photos were
identified and how the content of the photographs were interpreted.
Draker v. Schrieber, 271 S.W.3d 318, (Tex. App. – San Antonio 2008, no writ).
This case dealt with a civil suit brought by a high school vice principal against two
students and their parents related to a fictitious MySpace page. The students were accused of
faking a MySpace page that purported to be posted by the vice principal. The page contained
explicit sexual content about the woman and was written to imply that she had posted it herself.
The vice principal sued the students and their parents for libel, defamation and intentional
29
infliction of emotional distress. The claims were dismissed on summary judgment for failing to
provide evidence to support the high burden required under Texas law required for intentional
infliction of emotional distress.
In Re Rodney Reed, 2009 WL 97260 (Tex. Crim. App. 2009) (not reported)
The Texas Court of Criminal Appeals dealt with a case where pages from a defendant’s
MySpace page were offered as evidence. The defendant filed an appeal of a capital murder
conviction claiming that the investigating officer had a history of violence. He sought to
introduce MySpace pages containing sexually explicit and violent images that he claimed were
created by the officer. The Court did not allow introduction of the evidence because the
defendant could not sufficiently demonstrate that they were in fact created by the officer. The
defendant produced evidence showing the pages were created by an individual named
“pointman-1” who was listed as a “34-year old, 5’11”, straight white male, Swat operator in
Texas. The court concluded that, even though the descriptive information was similar to the
officer, there was not enough to prove he created the page and did not allow the evidence.
Williford v. State, 127 S.W.3d 309 (Tex. App.-­‐ Eastland 2004)
The court upheld the use of “Encase®”, a software program that allowed tracking of a
user’s internet and computer use history.
Social Networking Cases outside of Texas
Courts in other states have also started looking at issues concerning the use of evidence
from social networks. Here is an overview of recent cases on a variety of topics from other
states.
State v. Altajir,
(Conn. App. 2010)
123
Conn.App.
674,
---
A.2d
----,
2010
WL
3489049
A criminal case where defendant challenged the revocation of her probation. The
defendant had been convicted of driving while intoxicated. As part of her probation, she was
required not to leave the state and not drive while intoxicated. The State offered photographs
from her Facebook page that depicted her drinking alcohol and attending parties outside of the
state. While the State conceded that the photos did not depict the defendant drinking and driving,
it argued that they could infer that the defendant had violated the probation terms and that she
had not learned from her mistakes. The Defendant objected that the photographs were
cumulative and inflammatory. She also claimed that she was denied due process under the
federal constitution because the court admitted unreliable Facebook evidence. She contended that
because the dates the photographs were “posted” on the Facebook page do not indicate when
they were actually taken, the photographs were unreliable because it could not be confirmed that
they were taken while she was on probation.
The Court was not persuaded by the Defendant’s arguments and allowed the photographs
into evidence. The Defendant’s probation was revoked and she was sentenced to jail.
30
Jabbar v. Travel Services, Inc., 2010 WL 3563112 (D.Puerto Rico, 2010)
The case involved claims of a hostile workplace and discrimination by an employee
against her employer. The plaintiff claimed she was subjected to racial jokes and harassment,
some of which was contained in photographs taken at a company outing. The defendant
company regularly posted the photographs of its employees’ activities on its Facebook page. The
plaintiff claimed that the defendant encouraged the harassment by allowing its employees to
upload the photographs on its Facebook page.
The Facebook photographs were offered by the plaintiff over her testimony that it was the
company’s general practice to load the photographs after every company outing. Otherwise, the
plaintiff offered no other evidence to support the photographs or the author of the Facebook site.
The Court held that it could not be proved from the plaintiff’s testimony alone that the company
created the Facebook site, that it was company policy to upload the photographs or that the
company condoned the use of Facebook during company time. The record also demonstrated
that, after the plaintiff complained about its content, the defendant company instructed its IT
consultant to block access to Facebook for all office computers.
Griffin v. State, 192 Md.App. 518, 995 A.2d 791 (Md.App., 2010)
This case contained an interesting discussion of issues concerning authentication of social
networking evidence including instant messaging and chat room transcripts. The court held that
statements from a chatroom could be authenticated by reference to the user’s profile that
accompanied them. The state offered testimony that the profile listed the same date of birth as
the defendant, referenced her having a boyfriend with the same nickname as the boyfriend she
described in her own testimony and produced testimony from a police officer that compared the
profile picture with a photograph of the defendant.
After losing on the authentication challenge, the defendant argued that the evidence
should have been excluded because its prejudicial effect was too severe. The Court overruled
both objections and admitted the evidence.
I have reproduced a significant portion of the case below because it does an interesting
job of reviewing issues that could pertain to any social networking evidence.
We have found only a handful of reported cases involving evidence specifically
pertaining to social networking Web sites. See, e.g., A.B., supra, 885 N.E.2d 1223
(holding that a juvenile's profane messages criticizing disciplinary actions taken
by her former school principal, which she posted on her MySpace profile and on a
MySpace group page, were protected political speech); In re K. W., 192 N.C.App.
646, 666 S.E.2d 490, 494 (2008) (concluding that victim's statements on her
MySpace profile were admissible as prior inconsistent statements to impeach her
testimony, but that exclusion was harmless error); In re T.T., 228 S.W.3d 312,
322-23 (Tex.Ct.App.2007) (involving a termination of parental rights proceeding,
in which the court considered a father's statement on his MySpace profile that he
31
did not want children). Our research reveals only one reported decision directly
resolving an authentication challenge to evidence printed from a social media
Web site. However, it involved a printout of MySpace instant messages rather
than a MySpace profile page, and was authored by a trial court; we have not
found a reported appellate decision addressing the authentication of a printout
from a MySpace or Facebook profile.
In Ohio v. Bell, 145 Ohio Misc.2d 55, 882 N.E.2d 502, 511 (C.P.2008), aff'd, No.
CA2008-05-044, 2009-Ohio-2335, 2009 WL 1395857, 2009 Ohio App. Lexis
2112 (Ohio Ct.App. May 18, 2009), the trial court denied a defense motion to
exclude printouts of MySpace instant messages alleged to have been sent to a
victim by the defendant under his MySpace screen name. It pointed to the dearth
of authority on the “important issue” of authenticating printouts of electronic
communications. Moreover, it was not persuaded by the defense complaints “that
MySpace chats can be readily edited after the fact from a user’s homepage” and
that, “while his name may appear on e-mails to T.W., the possibility that
someone else used his account to send the messages cannot be foreclosed.” See id.
at 511-12. The trial court emphasized that the evidence required to meet the
authentication threshold for admissibility “is quite low-even lower than the
preponderance of the evidence,” and observed that “[o]ther jurisdictions
characterize documentary evidence as properly authenticated if ‘a reasonable
juror could find in favor of authenticity.’ ” Id. at 512 (citing United States v. Tin
Yat Chin, 371 F.3d 31, 38 (2d Cir.2004)).
After reviewing the evidentiary proffers, the court concluded that the MySpace
chat logs could be authenticated “through [the alleged victim’s] testimony that (1)
he has knowledge of defendant’s ... MySpace user name, (2) the printouts appear
to be accurate records of his electronic conversations with defendant, and (3) the
communications contain code words known only to defendant and his alleged
victims.” Id. Moreover, the court held that “evidence of electronic conversations
between defendant and the alleged victims would be relevant under Evid.R. 40”
and that, “[u]pon testimonial development of the ‘code language’ at issue, the
probative value of these messages would outweigh any prejudicial effect.” Id.
Bell is consistent with other decisions affirming the admission of transcripts of
chat room conversations on the basis of similar authenticating testimony by the
other party to the online conversation. See, e.g., United States v. Barlow, 568 F.3d
215, 220 (5th Cir.2009) (Internet chat logs of correspondence between defendant
and police contractor posing as minor were adequately authenticated through
contractor’s testimony); United States v. Gagliardi, 506 F.3d 140, 151 (2d
Cir.2007) (concluding that chat room logs were authenticated as having been sent
by defendant through testimony of persons who participated in the online
conversations); United States v. Tank, 200 F.3d 627, 630-31 (9th Cir.2000)
(concluding that content of conversation was sufficient to link defendant to user
name on chat room log printouts); State v. Glass, 146 Idaho 77, 190 P.3d 896, 901
(Ct.App.2008) (finding that chat room statements were adequately linked to the
32
defendant by evidence that he arrived for a meeting as arranged in that private
correspondence), rev. denied, No. 31422, 2008 Ida.App. Lexis 117 (Idaho August
11, 2008); In re F.P., 2005 PA Super 220, 878 A.2d 91, 95-96 (2005) (holding
that evidence regarding content and timing of threatening instant messages was
sufficient to authenticate them, and rejecting the argument that anonymity of
electronic messages makes them inherently unreliable).
To be sure, profile information posted on social networking Web pages differs
from chat logs of instant message correspondence conducted through such sites. A
chat log is a verbatim transcript of a private “real time” online conversation
between site members, which can be authenticated by either of the two
participants. In contrast, social networking profiles contain information posted by
someone with the correct user name and password, with the intent that it be
viewed by others. Therefore, a proponent should anticipate the concern that
someone other than the alleged author may have accessed the account and posted
the message in question. Cf., e.g., In re K.W., 192 N.C.App. 646, 666 S.E.2d 490,
494 (2008) (although victim admitted that the proffered MySpace page was hers,
she claimed that her friend posted the answers to the survey questions that
defendant sought to introduce as impeachment evidence with respect to her claims
of rape). See also St. Clair v. Johnny's Oyster & Shrimp, Inc., 76 F.Supp.2d 773,
774-75 (S.D.Tex.1999) (“There is no way Plaintiff can overcome the presumption
that the information he discovered on the Internet is inherently untrustworthy.
Anyone can put anything on the Internet ... hackers can adulterate the content on
any website....”).
A pseudonymous social networking profile might be authenticated by the profiled
person, based on an admission. That did not occur here, however, because the
State never questioned Ms. Barber about the profile. Nevertheless, we regard
decisions as to authentication of evidence from chat rooms, instant messages, text
messages, and other electronic communications from a user identified only by a
screen name as instructive to the extent that they address the matter of
authentication of pseudonymous electronic messages based on content and
context. We see no reason why social media profiles may not be circumstantially
authenticated in the same manner as other forms of electronic communication-by
their content and context. Accord Minotti, supra, at 1061-62 (“cases that did not
address social networking web sites specifically but addressed Internet
communication devices similar to social networking web sites, such as instant
messaging and email, are helpful because of the argument presented for the denial
of admissibility ... such as ... problems with authentication”).
The inherent nature of social networking Web sites encourages members who
choose to use pseudonyms to identify themselves by posting profile pictures or
descriptions of their physical appearances, personal background information, and
lifestyles. This type of individualization may lend itself to authentication of a
particular profile page as having been created by the person depicted in it. That is
precisely what occurred here.
33
The MySpace profile printout featured a photograph of Ms. Barber and appellant
in an embrace. It also contained the user’s birth date and identified her boyfriend
as “Boozy.” Ms. Barber testified and identified appellant as her boyfriend, with
the nickname of “Boozy.” When defense counsel challenged the State to
authenticate the MySpace profile as belonging to Ms. Barber, the State proffered
Sergeant Cook as an authenticating witness. He testified that he believed the
profile belonged to Ms. Barber, based on the photograph of her with appellant;
Ms. Barber’s given birth date, which matched the date listed on the profile; and
the references in the profile to “Boozy,” the nickname that Ms. Barber ascribed to
appellant. The defense never recalled Ms. Barber to dispute the accuracy of
Cook’s testimony.
Appellant relies on two out-of-state cases to suggest that printouts from such
social networking sites must be authenticated either by the author or expert
information technology evidence, neither of which occurred here. We are not
persuaded. The unpublished Florida decision cited by appellant lacks persuasive
value. The other case, In re Homestore.com, Inc. Securities Litigation, 347
F.Supp.2d 769 (C.D.Cal.2004), involved a ruling that printouts from a corporate
Web site were properly excluded in securities litigation because there was no
authenticating evidence from the company's “web master or someone else with
personal knowledge....” Id. at 782. In our view, the case is not instructive because
appellant never argued below that the printout did not accurately depict the
MySpace profile in question. Moreover, printouts from a company-created and
controlled Web site differ materially from printouts from a social networking
profile, in that site members create and control their own individual profiles.
On the record before us, we have no trouble concluding that the evidence was
sufficient to authenticate the MySpace profile printout. Therefore, the trial court
did not err or abuse its discretion in admitting that document into evidence.
Alternatively, appellant argues that the MySpace profile printout should have
been excluded “because its prejudice to appellant far outweighed its probative
value.” In his view, the probative value of the evidence was “minimal,” given that
the only change in Gibbs's testimony pertained to whether he saw appellant enter
the bathroom after Mr. Guest. On the other hand, appellant maintains that the jury
“undoubtedly” was influenced by the statement as “evidence of witness
intimidation,” making it possible that “the jury ... decided to find him guilty, at
least partly, for the purpose of sending a message regarding witness intimidation.”
Moreover, he contends that admission of the evidence could not have been
harmless error because, without it, “it is highly likely that the jury would have had
a reasonable doubt regarding appellant's guilt based on the evidence surrounding
Gibbs's involvement alone.”
Preliminarily, the State contends that appellant has not preserved his claim that
the probative value of the evidence was outweighed by the prejudice. It points out
34
that at trial Griffin “argued only that Gibbs' testimony was fundamentally
consistent, making the admission of the MySpace page unwarranted. Griffin,
however, made no other argument at trial regarding either the MySpace page's
relevance or its risk of introducing unfair prejudice, leaving all other arguments
regarding its admissibility unpreserved.”
Even if preserved, the State maintains that appellant's claim is without merit. In its
view, because the defense challenged Gibbs's credibility, the MySpace page had
“significant probative value in corroborating Gibbs' claim of threats,” and the
probative value was not “outweighed by any danger of unfair prejudice.”
The State argues:
To the extent that this Court addresses the merits of Griffin's claim, the trial court
acted within its broad discretion in admitting a redacted printout of the MySpace
page, which corroborated Gibbs's explanation that changes in his testimony
followed threats from Griffin's girlfriend. Because Gibbs testified at the second
trial to a crucial fact contrary to his previous testimony-namely, that he did see
Antoine Griffin enter the women's restroom, where the shooting occurred-the trial
court properly exercised its discretion in admitting the printout.
Assuming that the claim is preserved, we conclude that the trial court did not err
or abuse its discretion in failing to exclude the “SNITCHES GET STITCHES”
statement on Ms. Barber's MySpace profile on the basis of undue prejudice. We
explain.
[Under Maryland Rule 5-403, “[a]lthough relevant, evidence may be excluded if
its probative value is substantially outweighed by the danger of unfair prejudice,
confusion of the issues, or misleading the jury [.]” The task of balancing the
probative value of a particular item of evidence against its potential prejudicial
effect “is committed to the sound discretion of the trial judge.” State v. Broberg,
342 Md. 544, 552, 677 A.2d 602 (1996).
Gibbs’s credibility was a hotly contested issue at trial. The defense underscored
that Gibbs's testimony at the first trial was inconsistent with his testimony at the
second trial as to whether he saw appellant or George Griffin enter the bathroom
following Mr. Guest. Although the prosecution acknowledged the inconsistencies,
it offered Gibbs's explanation that Ms. Barber had threatened him before the first
trial.
Even if appellant had explicitly asked for exclusion under Rule 5-403, the record
indicates that the trial court reasonably exercised its discretion in deciding to
permit the State to present such evidence, for whatever value the jury might give
it, in support of its effort to explain the inconsistencies in Mr. Gibbs's testimony.
It is also salient that the trial court carefully redacted irrelevant material from the
profile and gave a detailed limiting instruction to the jurors, telling them that it
35
was up to them to weigh such evidence. We cannot say that exclusion on the
ground of undue prejudice was required under these circumstances.
Crispin v. Christian Audigier, Inc., --- F.Supp.2d ----, 2010 WL 2293238 (C.D.Cal.,
2010)
A commercial civil case where defendants sought aggressive discovery from thirdparties, including Facebook and Myspace. The defendants served subpoenas duces tecum on four
third-party businesses, including Facebook and Myspace, seeking basic subscriber information
and the content of all webmail and correspondence on those sites involving the Plaintiff. The
Plaintiff filed a motion to quash the subpoenas and argued that they sought electronic
communications that third-party Internet Service Providers are prohibited from disclosing under
the Stored Communications Act (“SCA”), 18 U.S.C. § 2701(a)(1); (2) that the subpoenas were
otherwise overbroad in that they required disclosure of information protected by the marital
privilege, the attorney-client privilege, the trade secret doctrine, and Plaintiff’s privacy rights.
The trial judge rejected each of Plaintiff’s arguments and concluded that the SCA did not
apply because that Act reaches only electronic communication service (“ECS”) providers and
third-party businesses are not ECS providers as defined in the statute. The judge also concluded
that the SCA prohibits only the voluntary disclosure of information by ECS providers, not
disclosure compelled by subpoena. Finally, the judge found that the SCA prohibits only the
disclosure of communications held in “electronic storage” by the ECS provider, and that the
materials were not in electronic storage as that term is defined in the statute.
The appeals court disagreed and reversed holding regarding the private messaging. It held
that, generally, the webmail and private messages were not subject to the subpoenas because they
were intended to be private. The court was troubled by requests for Facebook “wall” postings
since they might be viewed by anyone with access to the user’s profile page. (It is worth noting
that the evidence used to support this claim was based on a page printed from the Wikipedia
website.) The court held that further inquiry had to be made about the Plaintiff’s privacy settings
for his Facebook account to determine what materials would not be considered private.
“Given that the only information in the record implied restricted access, the court
concludes that Judge McDermott's order regarding this aspect of the Facebook
and MySpace subpoenas was contrary to law. Because it appears, however, that a
review of plaintiff's privacy settings would definitively settle the question, the
court does not reverse Judge McDermott’'s order, but vacates it and remands so
that Judge McDermott can direct the parties to develop a fuller evidentiary record
regarding plaintiff's privacy settings and the extent of access allowed to his
Facebook wall and MySpace comments.
With respect to webmail and private messaging, the court is satisfied that those
forms of communications media are inherently private such that stored messages
are not readily accessible to the general public. Thus, the court reverses Judge
McDermott’'s order with respect to the Media Temple subpoena and the Facebook
and MySpace subpoenas to the extent they seek private messaging.”
36
Bass ex rel. Bass v. Miss Porter's School, 2009 WL 3724968 (D.Conn., 2009)
A civil case where defendants filed a request for production seeking all documents
related to Plaintiff’s alleged teasing and taunting through text messages and on Facebook. The
request was directed at documentation of the Plaintiff’s former Facebook account. Plaintiff
asserted two objections claiming Defendants sought “the production of information that [is]
irrelevant and immaterial, and ... is not reasonably calculated to lead to the discovery of
admissible evidence,” and that “[Plaintiff’s] ability to produce responsive documents was
severely curtailed by Defendants’ actions in disconnecting the Plaintiff's access to her school
email and intranet access prior to the filing of this lawsuit.”
Plaintiff then served a subpoena on Facebook to get records of her former Facebook
account. Facebook and Plaintiff reached an agreement through which Facebook released
“reasonably available data” from Plaintiff's Facebook profile. The Court ordered the Plaintiff to
produce responsive documents for an in camera inspection. The Plaintiff provided the Court both
a complete set of the documents provided to Plaintiff by Facebook, which totaled more than 750
pages of wall postings, messages, and pictures and a copy of the subset of those documents that
were produced to Defendants, which totaled approximately 100 pages.
The Plaintiff failed, however, to outline for the court how she determined which
documents to produce to the Defendant and which she wanted to assert a privilege to. Without
this information, the Court found it impossible to assess the Plaintiff’s objections and ordered the
entire set of documents produced.
The Court offered an interesting sidebar about the nature of Facebook-related evidence.
“Facebook usage depicts a snapshot of the user’s relationships and state of mind
at the time of the content's posting. Therefore, relevance of the content of
Plaintiff's Facebook usage as to both liability and damages in this case is more in
the eye of the beholder than subject to strict legal demarcations, and production
should not be limited to Plaintiff's own determination of what may be “reasonably
calculated to lead to the discovery of admissible evidence.”
Maldonado v. Municipality of Barceloneta, 2009 WL 636016 (D.Puerto Rico, 2009)
This case reflects the growing pains associated with the new vocabulary created by social
networking evidence. It involved a protective order request after a witness was sent a Facebook
“friend” request by a defendant. The witness testified that the request intimidated her and the
plaintiff claimed the contact violated the federal witness tampering laws.
The two sides had trouble classifying the nature of the communication. The defendant
claimed the site was a blog, the plaintiff claimed the message was an email. The court recognized
the novelty of the new forms of communication.
37
“There also appears to be confusion as to the classification of the message in
question. Defendants incorrectly claim the message constitutes a “blog.” See
Quixtar Inc. v. Signature Mgmt. Team, LLC, 566 F.Supp.2d 1205, 1209 n. 3
(D.Nev.2008) (defining a blog as “[a] frequently updated web site consisting of
personal observations, excerpts from other sources, etc.”); see also Indep.
Newspapers, Inc. v. Brodie, 2009 WL 484956, at *3 (Md. Feb. 27, 2009);
Plaintiffs incorrectly claim the message constitutes an e-mail. See Am. Civil
Liberties Union v. Reno, 929 F.Supp. 824, 834 (E.D.Pa.1996); This type of
communication, a message sent on Facebook, a “social networking website,”
which has not been considered by this circuit or in any other circuit to the court's
knowledge, is likely a hybrid of the two. Connectu LLC v. Zuckerberg, 522 F.3d
82, 86 (1st Cir.2008). The message in question is clearly in the latter category:
messages sent to a user's Facebook inbox are not publicly viewable. Thus, they
are not in the “public domain,” where First Amendment rights might attach.”
Cases of General Interest
Email Authentication
U.S. v. Sidiqui, (11th Cir. 2000) 235 F.3d 1318.
E-­‐mails introduced into evidence over defendant hearsay and improper authentication objections.
Court analyzed the authentication issues under traditional evidentiary standards. (FRE 901(a) and
901(B)(4).) Contains good discussion of circumstantial evidence of authenticity but no
discussion as to the technical aspects of e-­‐mail. As to hearsay objection, the e-­‐mails were
considered admissions of a party. (FRE 801(d)(2)(A).)
People v. Von Gunten, (2002 Cal.App.3d Dist.) 2002 WL 501612. [Unpublished.]
Defendant laid an inadequate foundation of authenticity to admit, in prosecution for assault with
a deadly weapon, hard copy of e-­‐mail messages (Instant Messages) between one of his friends
and the victim’s companion, as there was no direct proof connecting victim’s companion to the
screen name on the e-­‐mail messages.
On-line Evidence Admissibility
United States v. Brand, 2005 WL 77055 (S.D.N.Y. January 12, 2005).
Chat transcript of AOL instant messages admissible since it was sufficiently similar to the
charged conduct.
Hammontree v. State, (Ga. Ct. App. 2007) -­‐-­‐-­‐ S.E.2d -­‐-­‐-­‐-­‐, 2007 WL 547763
Where the victim testified that she was an ‘actual participant’ in the IM conversation and
confirmed its contents, the IM ‘transcript’ was properly authenticated.
U.S. v. Burt, (7th Cir.,July 26, 2007) 495 F.3d 733
Logs of a Yahoo! chat were admissible when properly authenticated.
38
Lorraine v. Markel American Insurance Company, (D.Md. May 4, 2007) 241 F.R.D. 534.
Case provides a comprehensive analysis of how to authenticate digital evidence such as digital
photos, email and text messages.
People v. Hawkins, (June 2002) 98 Cal.App.4th 1428. Court addresses California Evidence Code
section 1552 [printed representation of computer information or a computer program is presumed
to be accurate]. Court noted "the true test for admissibility of a printout reflecting a computer’s
internal operations is not whether the printout was made in the regular course of business, but
whether the computer was operating properly at the time of the printout."
EEOC v. E.I dupont de Nemours & Co., 2004 WL 2347559, 65 Fed. R. Evid. Serv. 706,
Printout from Census Bureau web site containing domain address from which image was printed
and date on which it was printed was admissible in evidence.
Telewizja Polska USA, Inc., v. Echostar Satellite Corp., (N.D. Ill.2004) 2004 WL 2367740 [Not
Reported] Archived versions of web site content, stored and available at a third party web site,
were admissible into evidence under Federal Rule of Evidence 901. The contents of the web site
could also be considered an admission of a party opponent, and thus are not barred by the
hearsay rule.
Authentication of Screen Name
People v. Von Gunten, (2002 Cal.App.3d Dist.) 2002 WL 501612. [Unpublished.]
Defendant laid an inadequate foundation of authenticity to admit, in prosecution for assault with
a deadly weapon, hard copy of e-­‐mail messages (Instant Messages) between one of his friends
and the victim’s companion, as there was no direct proof connecting victim’s companion to the
screen name on the e-­‐mail messages.
Introduction of Web Sites
EEOC v. E.I dupont de Nemours & Co., 2004 WL 2347559, 65 Fed. R. Evid. Serv. 706,
Printout from Census Bureau web site containing domain address from which image was printed
and date on which it was printed was admissible in evidence.
Telewizja Polska USA, Inc., v. Echostar Satellite Corp., (N.D. Ill.2004) 2004 WL 2367740 [Not
Reported] Archived versions of web site content, stored and available at a third party web site,
were admissible into evidence under Federal Rule of Evidence 901. The contents of the web site
could also be considered an admission of a party opponent, and thus are not barred by the
hearsay rule.
Bass v. Miss Porter’s Sch., 2009 U.S. Dist. LEXIS 99916 (D. Conn. Oct. 27, 2009). In Bass the
Defendant school sought from the Plaintiff discovery of her alleged teasing and taunting on
Facebook. The Plaintiff objected to the Facebook discovery request on the following grounds:
1) The Facebook information was “irrelevant and immaterial” and was “not
reasonably calculated to lead to the discovery of admissible evidence;” and
39
2) “[Plaintiff’s] ability to produce responsive documents was severely curtailed by
Defendants’ actions in disconnecting the Plaintiff’s access to her school email and
intranet access prior to the filing of this lawsuit.”
After subpoenaing Facebook, Facebook agreed to produce “reasonably available data”
from the Plaintiff’s profile from January 1, 2008 to May 1, 2009. The Court ordered the Plaintiff
to produce 1) all responsive Facebook discovery to the Defendant and 2) everything produced
from Facebook to the Court for in camera review. The resulting production was 100 pages
(apparently printed out) to the Defendant and 750 pages produced to the Court. The Court was
frustrated with the Plaintiff’s attorney and stated the production offered “no guidance as to the
grounds or basis on which her counsel made the determination of which documents to produce to
Defendants.” The Court took direct aim Plaintiff’s claim the Facebook discovery was irrelevant
after reviewing the Facebook production by date, sender/recipient and subject matter. It found:
“The selections of documents Plaintiff disclosed to Defendants and those she
referred for in camera review reveal no meaningful distinction. Facebook usage
depicts a snapshot of the user’s relationships and state of mind at the time of the
content’s posting. Therefore, relevance of the content of Plaintiff’s Facebook
usage as to both liability and damages in this case is more in the eye of the
beholder than subject to strict legal demarcations, and production should not be
limited to Plaintiff’s own determination of what maybe “reasonably calculated to
lead to the discovery of admissible evidence.”
The Court overruled the Plaintiff’s objection to producing Facebook discovery, especially
in light of the fact the in camera production contained communications clearly relevant to the
lawsuit.
Texas Cases of General Interest30
Faxes
Tyson v. State, 873 S.W.2d 53 (Tex. App.-Tyler 1993, pet. ref’d) (fax of telephone co. records
properly authenticated).
Computer Printouts
Johnson v. State, 208 S.W.3d 478 (Tex. App.-Austin 2006, pet ref’d) (printout of letter stored on
computer properly authenticated; hearsay).
Emails and chat room transcripts
Bailey v. State, 2009 WL 4725348 (Tex. App.—Dallas 12/11/09)(party admission authenticated
“chat log”).
Varkonyi v. State, 276 SW3d 27 (Tex. App.—El Paso ’08, rev. ref’d)(“reply letter doctrine”
applied to authenticate email).
Shea v. State, 167 S.W.3d 98 (Tex. App. Waco 2005, pet. ref’d) (email).
Massimo v. State, 144 S.W.3d 210 (Tex. App.-Fort Worth 2004, no writ) (email).
30
This list was compiled by Frederick C. Moss, Prof. of Law (Emeritus)Dedman School of Law
Southern Methodist University
40
Kupper v. State, 2004 WL 60768 (Tex. App.-Dallas 2004, writ ref’d) (email).
Robinson v. State, 2000 WL 622945 (Tex. App.-Amarillo 2000, pet.ref’d) (email).
Ussery v. State, 2008 WL 269439 (Tex. App. Austin 2008, pet. ref’d) (email).
Websites
Burnett Ranches, LTD v. Cano Petroleum, Inc., 2009 WL 619590 (Tex. App.—Amarillo, Mar.
20, 2009)(website printouts NOT properly authenticated).
Daimler-Benz Aktiengesellschaft v. Olson, 21 S.W.3d 707 (Tex.App.-Austin 2000, rev. dismd)
(website printouts properly authenticated).
Digital video
Thierry v. State, 2009 WL 350626 (Tex. App.—Houston [1st Dist.] Feb. 12 2009) (unwitnessed
surveillance video properly authenticated).
Page v. State, 125 S.W.3d 640 (Tex. App.-Houston [1st Dist.] 2003, pet. ref’d) (digital video
recording authentication).
Automated computer-generated records
Haskins v. State, 2010 WL 2524797 (Dallas 6/24/10) (same).
Miller v. State, 208 S.W.3d 554 (Tex. App.—Austin 2006)(cell phone record not hearsay, but
not properly authenticated).
Stevenson v. State, 920 S.W.2d 342 (Dallas 1996, no pet.)(computer-generated records are not
hearsay).
Ly v. State, 908 S.W.2d 598 (Tex. App.-Houston [1st Dist.] 1995, no pet) (computer generated
electronic monitoring printout properly authenticated).
Chain of custody
Ex Parte Ysafi, 2000 WL 6740798 (Tex. App.—Beaumont 8/26/09).
Kingsbury v. State, 14 SW3d 405 (Tex. App.—Waco 2000, no pet.).
Ethical Issues related to Social Networking sites
The rise in social networking creates ethical and professional challenges for lawyers.
With no specific rules governing the sites, many may be tempted to ignore their common sense
when conducting online investigations. During this speech I have frequently been asked if it is
appropriate for a lawyer to use a surrogate or false on line presence to “friend” witnesses or
opponents. Since state bar associations are only beginning to examine lawyer’s ethical duties
while on line, there is a temptation to take chances. But the decisions coming out of other states
provides a warning that this type of behavior will not be tolerated.
First, Pennsylvania’s state bar ethical committee issued an advisory opinion in March
2009 addressing the appropriateness of using a third party to “friend” a subject involved in
litigation. The committee looked at the appropriateness of asking someone unrelated to the
lawyer’s staff to request access to the target’s social networking pages and then correspond with
the target in an attempt to solicit damaging evidence. The Pennsylvania committee questioned
whether this technique was a form of “deception in investigation” or whether it was similar to
efforts to surreptitiously videotape a subject while they went about in public. The committee held
41
such actions would not be condoned. The committee concluded that the lawyer would be held
responsible for the actions of a third party used to gain access to a social networking site under
Pa. R. Prof. Cond. 5.3 (note: Pennsylvania’s ethical rules are patterned off the ABA Model
Rules). In other words, just getting someone else unrelated to the lawyer did not insulate him/her
from their actions. The Committee further noted that the conduct would violate other rules that
prohibited making a false statement of material fact to a witness.
Second, on September 25, 2010, the New York’s bar association published new
guidelines for online activities. It ruled that lawyers may use social network sites to gather
information about their opponents. The ruling stated that this was limited to sites that were open
to the public. It cited the Pennsylvania ruling to reiterate that creating fictional friends to gain
information would be considered unethical.
The Texas Rules of Professional Conduct contain language similar to that cited by the
Pennsylvania and New York associations. Rule 4.01 states:
Truthfulness in Statements to Others
In the course of representing a client a lawyer shall not knowingly:
(a)
make a false statement of material fact or law to a third person; or
(b)
fail to disclose a material fact to a third person when disclosure is
necessary to avoid making the lawyer a party to a criminal act or
knowingly assisting a fraudulent act perpetrated by a client.
The Comment to the rule notes:
2. A lawyer violates paragraph (a) of this Rule either by making a false statement
of law or material fact or by incorporating or affirming such a statement made by
another person. Such statements will violate this Rule, however, only if the
lawyer knows they are false and intends thereby to mislead.
Such conduct could also run afoul of Rule 8.04 regarding misconduct. It states:
(a) A lawyer shall not:
(1) violate these rules, knowingly assist or induce another to do so, or do
so through the acts of another, whether or not such violation occurred
in the course of a client-lawyer relationship;
(3) engage in conduct
misrepresentation;
involving
42
dishonesty,
fraud,
deceit
or
This section would likely make the lawyer ultimately responsible for the actions of the
third party. This section would also be invoked to remind the lawyer that they cannot use a third
party to engage in conduct that the lawyer would be ethically prohibited from doing as well.
The rule I would suggest following is to first consider whether the actions would be
considered appropriate if done in a context outside of a social networking site. For example,
would it be appropriate to misrepresent your identity to a witness in an effort to collect evidence?
If the disciplinary rules prohibit the conduct, chances are it is also going to be prohibited if the
only difference is that a social networking site is used to get the information.
Other considerations include using social networking sites to advertise a lawyer or a law
firm. In most cases, the pages on a social networking site will have to meet the ethical
requirements generally applicable to any lawyer advertising. Again, there are no rules directly
yet on point, but with the increasing number of lawyers using Facebook to tout their services an
opinion is all but inevitable.
New duty to advise clients?
A recent Canadian Leduc v. Roman, 2009 CanLII 6838 (ON S.C.) suggests that lawyers
there may commit malpractice if they do not counsel clients about the potential impact their
involvement in social networking sites can have on their case. The case involved a personal
injury matter where Facebook evidence was sought during discovery. Justice David Brown
offered an observation as part of his ruling:
“Given the pervasive use of Facebook and the large volume of photographs
typically posted on Facebook sites, it is now incumbent on a party’s counsel to
explain to the client, in appropriate cases, that documents posted on the party’s
Facebook profile may be relevant to allegations made in the pleadings.”
This reasoning could apply to any form of social networking medium, Twitter, postings
on YouTube, discussions in chat rooms or on online game forums. Given the rapid pace of
expansion of this technology and it’s constantly evolving uses, the potential exposure for clients
is vast.
Finally, be careful what you or your clients post on any social networking site. The safest
way to approach posting any information is to determine whether it is potentially damaging. If it
is, presume that the information is going to get out one way or another. Many lawyers now
require their clients to remove or deactivate any social networking site they have during the
pendency of the litigation. As unrealistic as this request may be, it may not solve the problem as
information from the pages can linger because of connections to other user’s pages.
It isn’t only clients that have to worry about what they post on their pages. Galvestonarea Judge Susan Criss reported a story about one lawyer who got into trouble in her court
because of a status update on a Facebook page. The lawyer had requested, and received, a
continuance of a matter before Judge Criss claiming that her father had died. But the lawyer, who
had previously “friended” the Judge, went on to post a string of Facebook updates detailing her
43
week of partying and drinking with friends while she was allegedly in mourning. Needless to
say, the lawyer had some explaining to do at her next court appearance. Judge Criss has also
discussed seeing lawyers who have bragged about how much they were going to win in an
ongoing case or complaining about the actions of opposing counsel in most colorful terms.
44