Social Media Case Law Update

This past July, as part of our ongoing effort to monitor legal developments concerning social media evidence, we searched online legal databases of state and federal court decisions across the United States to identify the number of cases, in the first half of 2012, where evidence from social networking sites played a significant role. The overall tally came in at 319 cases for this 6 month period, which is about an 85 % increase in the number of published social media cases over the same period in 2011, as reported by our prior survey earlier this year.

As we continue to monitor Westlaw and other sources on a daily basis, the indications are that this increase in the prominence of social media evidence continues unabated. We will have a full end of the year report, but for now the following are brief synopses of three of the more notable reported social media cases from the past 75 days:

Rene v. State, 2012 WL 3223667 (Tex. Ct. of Appeals, Aug. 9, 2012)

This case involved an evidentiary authentication challenge to social media evidence introduced through mere printouts of screen captures. The Defendant’s appealed his conviction of sexual assault of a minor child on the grounds that the MySpace pages offered into evidence by the prosecution did not have a proper foundation, and that the prosecution presented no evidence showing that the photographs were unaltered. The Texas appellate court noted in its decision that the prosecution offered minimal circumstantial evidence to establish the authenticity of the MySpace pages and no evidence to demonstrate that the photos were not altered.  However, in upholding the conviction, the court ultimately determined that even if the prosecution failed to establish a proper foundation for the social media evidence, such error was harmless.

This case illustrates the perils of relying on mere printouts of key social media evidence. A determination of harmless error by an appellate court is very subjective and fact specific. The much better approach is for the proponent of social media evidence to collect and preserve such evidence with best practices technology to establish a proper foundation by 1) automatically generating MD5 hash values of the evidence and collection logs including date stamps at the time of collection; 2) collecting all available metadata associated with social media items; and 3) collect the full account as opposed to limited and incomplete segments. Only with this approach can the proponent of the evidence represent that best practices were employed in the collection and preservation of the social media evidence in question.

United States v. Meregildo, F. Supp. 2d, 2012 WL 3264501 (S.D.N.Y. Aug. 10, 2012)

In this case, the defendant sought to suppress evidence from his Facebook account obtained by the government through a cooperator who “friended” him on the social media site. The defendant posted messages to his account boasting prior acts of violence and threatening rival gang members.  One of the Defendant’s “friends” — who became a cooperating witness — had access to all of this content by virtue of being the Defendant’s Facebook friend and turned that evidence over to law enforcement.

The court determined that there is no Fourth Amendment protection in publicly posted information. Nor is there necessarily such protection for data posted that is viewable by a network of “friends”, even though subject to more restrictive privacy settings.  The court noted that the defendant’s profile allowed his friends to view a list of all his other friends, “as well as messages and photographs that Colon and others posted to Colon’s profile.” Because the privacy settings allowed Colon’s friends to view materials posted to his Facebook account, the court determined that there was no Fourth Amendment violation:

Where Facebook privacy settings allow viewership of postings by “friends” the Government may access them through a cooperating witness who is a “friend” without violating the Fourth Amendment…While Colon undoubtedly believed that his Facebook profile would not be shared with law enforcement, he had no justifiable expectation that his “friends” would keep his profile private.

As such, the court determined that the defendant’s expectation of privacy ended when he posted, because his wide circle of “friends” were free to share those posts, just as a friend would be free to share a written letter or email. These posts, according to the court, were at Colon’s “peril.”

Thompson v. Autoliv ASP, Inc., 2012 WL 2342928 (D. Nev. June 20, 2012)

This is yet another personal injury claim where the claimant’s public Facebook postings contradicted their assertions of serious injury. In this products liability case, the defendant sought a court order compelling the plaintiff “to produce complete and un-redacted copies of [her] Facebook and other social networking site accounts.” The defendant based its motion on the plaintiff’s publically available Facebook wall posts and photographs that contradicted her claims of serious injury, and that the plaintiff changed her privacy settings shortly thereafter. The court found the plaintiff’s Facebook account discoverable and compelled its production.

Earlier this year we covered the case of Tompkins vs. Detroit Metropolitan Airport, which also highlighted the importance of systematic search of public Facebook as standard procedure for nearly every type of criminal and civil litigation investigation. These cases illustrate that any solution purporting to support eDiscovery for social media must have robust public search and collection capabilities. This means more than merely one-off screen scrapes but instead an ability to search, identify and capture up to millions of social media posts on a highly automated and scalable basis, and the ability to find all information that is publicly available but may not be readily apparent.

We will continue to monitor the case law on social media and report on significant developments. So stay tuned!

Leave a comment

Filed under Uncategorized

Police Embrace Social Media as Crime-Fighting Tool (CNN Article)

Recently, CNN published an article illustrating how law enforcement agencies are using social media to help solve their cases.  CNN reporter Heather Kelly, states, socialpolice“leveraging Facebook is just one of many ways law enforcement officials are gleaning evidence from social media to help them solve crimes.”  According to a recent survey performed by LexisNexis on federal, state and local law enforcement officials who use social media, 4 of 5 used social media to gather evidence during investigations. Kelly states, “Half said they checked social media at least once a week, and the majority said social media helps them solve crimes faster.”

Read complete CNN article

Visit X1 DISCOVERY

Leave a comment

Filed under Best Practices, Case Law, Social Media Investigations

No Legal Duty or Business Reason to Boil the Ocean for eDiscovery Preservation

As an addendum to my previous blog post on the unique eDiscovery and search burdens associated with the de-centralized enterprise, one tactic I have seen attempted by some CIOs to address this daunting challenge is to try to constantly migrate disparate data from around the globe into a central location. Just this past week, I spoke to a CIO that was about to embark on a Quixotic endeavor to centralize hundreds of terabytes of data so that it could be available for search and eDiscovery collection when needed. The CIO strongly believed he had no other choice as traditional information management and electronic discovery tools are not architected and not suited to address large and disparate volumes of data located in hundreds of offices and work sites across the globe that all store information locally. But boiling the ocean through data migration and centralization is extremely expensive, disruptive and frankly unworkable.

Industry analyst Barry Murphy succinctly makes this point:

Centralization runs counter to the realities of the working world where information must be distributed globally across a variety of devices and applications.  The amount of information we create is overwhelming and the velocity with which that information moves increases daily.  To think that an organization can find one system in which to manage all its information is preposterous. At the same time, the FRCPs essentially put the burden on organizations to be accountable for all information, able to conduct eDiscovery on a moment’s notice.  As we’ve seen, the challenge is daunting.

As I wrote earlier this month, properly targeted preservation initiatives are permitted by the courts and can be enabled by effective software that is able to quickly and effectively access and search these data sources throughout the enterprise.  The value of targeted preservation was recognized in the Committee Notes to the FRCP amendments, which urge the parties to reach agreement on the preservation of data and the keywords used to identify responsive materials. (Citing the Manual for Complex Litigation (MCL) (4th) §40.25 (2)).  And In re Genetically Modified Rice Litigation, 2007 WL 1655757 (June 5, 2007 E.D.Mo.), the court noted that “[p]reservation efforts can become unduly burdensome and unreasonably costly unless those efforts are targeted to those documents reasonably likely to be relevant or lead to the discovery of relevant evidence.”

What is needed to address both eDiscovery and enterprise search challenges for the de-centralized enterprise is a field-deployable search and eDiscovery solution that operates in distributed and virtualized environments on-demand within these distributed global locations where the data resides. This ground breaking capability is what X1 Rapid Discovery provides. Its ability to uniquely deploy and operate in the IaaS cloud also means that the solution can install anywhere within the wide-area network, remotely and on-demand. This enables globally de-centralized enterprises to finally address their overseas data in an efficient, expedient, defensible and highly cost-effective manner.

But I am interested in hearing if anyone has had success with the centralization model. In my 12 years in this business and the 8 years before that as a corporate attorney, I have yet to see an effective or even workable situation where a global enterprise has successfully centralized all of their electronically stored information into a single system consisting of hundreds of terabytes. If you can prove me wrong and point to such a verifiable scenario, I’ll buy you a $100 Starbucks gift certificate or a round of drinks for you and your friends at ILTA next week.  If you want to take the challenge of just meet up at ILTA next week in Washington, feel free to email me.

Leave a comment

Filed under Cloud Data, eDiscovery & Compliance, Enterprise eDiscovery, IaaS, Preservation & Collection

The Global De-Centralized Enterprise: An Un-Met eDiscovery Challenge

Enterprises with data situated within a multitude of segmented networks across North America and the rest of the world face unique challenges for eDiscovery and compliance-related investigation requirements. In particular, the wide area networks of large project engineering, oil & gas, and systems integration firms typically contain terabytes of geographically disparate information assets in often harsh operating environments with very limited network bandwidth. Information management and eDiscovery tools that require data centralization or run on expensive and inflexible hardware appliances cannot, by their very nature, address critical project information in places like Saudi Arabia, China, or the Alaskan North Slope.

Despite vendor marketing hype, network bandwidth constraints coupled with the requirement to migrate data to a single repository render traditional information management and eDiscovery tools ineffective to address de-centralized global enterprise data. As such, the global decentralized enterprise represents a major gap for in-house eDiscovery processes, resulting in significant expense and inefficiencies. The case of U.S. ex rel. McBride v. Halliburton Co. [1]  illustrates this pain point well. In McBride, Magistrate Judge John Facciola’s instructive opinion outlines Halliburton’s eDiscovery struggles to collect and process data from remote locations:

Since the defendants employ persons overseas, this data collection may have to be shipped to the United States, or sent by network connections with finite capacity, which may require several days just to copy and transmit the data from a single custodian . . . (Halliburton) estimates that each custodian averages 15–20 gigabytes of data, and collection can take two to ten days per custodian. The data must then be processed to be rendered searchable by the review tool being used, a process that can overwhelm the computer’s capacity and require that the data be processed by batch, as opposed to all at once. [2]

Halliburton represented to the court that they spent hundreds of thousands of dollars on eDiscovery for only a few dozen remotely located custodians. The need to force-collect the remote custodians’ entire set of data and then sort it out through the expensive eDiscovery processing phase instead of culling, filtering and searching the data at the point of collection drove up the costs.

Despite the burdens associated with the electronic discovery of distributed data across the four corners of the earth, such data is considered accessible under the Federal Rules of Civil Procedure and thus must be preserved and collected if relevant to a legal matter. However, the good news is that the preservation and collection efforts can and should be targeted to only potentially relevant information limited to only custodians and sources with a demonstrated potential connection to the litigation matter in question.

This is important as the biggest expense associated with eDiscovery is the cost of overly inclusive preservation and collection. Properly targeted preservation initiatives are permitted by the courts and can be enabled by adroit software that is able to quickly and effectively access and search these data sources throughout the enterprise. The value of targeted preservation is recognized in the Committee Notes to the FRCP amendments, which urge the parties to reach agreement on the preservation of data and the key words, date ranges and other metadata to identify responsive materials. [3]  And In re Genetically Modified Rice Litigation, the court noted that “[p]reservation efforts can become unduly burdensome and unreasonably costly unless those efforts are targeted to those documents reasonably likely to be relevant or lead to the discovery of relevant evidence.” [4]

However, such targeted collection and ECA in place is not feasible in the decentralized global enterprise with current eDiscovery and information management tools. What is needed to address these challenges for the de-centralized enterprise is a field-deployable search and eDiscovery solution that operates in distributed and virtualized environments on-demand within these distributed global locations where the data resides. In order to meet such a challenge, the eDiscovery and search solution must immediately and rapidly install, execute and efficiently operate in a localized virtualized environment, including public or private cloud deployments, where the site data is located, without rigid hardware requirements or on-site physical access.

This is impossible if the solution is fused to hardware appliances or otherwise requires a complex on-site installation process. After installation, the solution must be able to index the documents and other data locally and serve up those documents for remote but secure access, search and review through a web browser. As the “heavy lifting” (indexing, search, and document filtering) is all performed locally, this solution can effectively operate in some of the harshest local environments with limited network bandwidth. The data is not only collected and culled within the local area network, but is also served up for full early case assessment and first pass review on site, so that only a much smaller data set of potentially relevant data is ultimately transmitted to a central location.

This ground breaking capability is what X1 Rapid Discovery provides. Its ability to uniquely deploy and operate in the IaaS cloud also means that the solution can install anywhere within the wide-area network, remotely and on-demand. This enables globally decentralized enterprises to finally address their overseas data in an efficient, expedient defensible and highly cost effective manner.

If you have any thoughts or experiences with the unique eDiscovery challenges of the de-centralized global enterprise, feel free to email me. I welcome the collaboration.

___________________________________________

[1] 272 F.R.D. 235 (2011)

[2] Id at 240.

[3] Citing the Manual for Complex Litigation (MCL) (4th) §40.25 (2)):

[4] 2007 WL 1655757 (June 5, 2007 E.D.Mo.)

Leave a comment

Filed under eDiscovery & Compliance, Enterprise eDiscovery

Mid-Year Report: Legal Cases Involving Social Media Rapidly Increasing

As part of our ongoing effort to monitor legal developments concerning social media evidence, we again searched online legal databases of state and federal court decisions across the United States — this time to identify the number of cases in the first half of 2012 where evidence from social networking sites played a significant role. The results are available here in a detailed spreadsheet listing each case, allowing for anyone to review the cases and conduct their own analysis. The cases are accessible for free on Google Scholar.  The overall tally come in at 319 cases for this 6 month period, which is about an 85 percent increase in the number of published social media cases over the same period in 2011, as reported by our prior survey earlier this year.

As with the last survey, we reviewed all the search results and added annotations for the more notable cases, and were sure to eliminate duplicates and to not count de minimis entries — defined as cases with merely cursory or passing mentions of social media sites.  As only a very small number of cases–approximately one percent of all filed cases– involve a published decision that we can access online, it is safe to assume that several thousand, if not tens of thousands more cases involved social media evidence during this time period. Additionally, many of these published decisions involve fact patterns from as far back as 2008, as they are now just working their way through the appeals process. Finally, these cases do not reflect the presumably many thousands of more instances where social media evidence was relevant to an internal investigation or compliance audit, yet did not evolve into actual litigation. Even so, this limited survey is an important data point establishing the ubiquitous nature of social media evidence, its escalating importance and the necessity of best practices technology to search and collect this data for litigation and compliance requirements.

The search, limited to the top four social networking sites, tallied as follows: Facebook is now far in the lead with 197 cases, MySpace tallied in at 89, mostly with fact patterns circa 2009, Twitter with 25 and LinkedIn with 8. Criminal matters marked the most common category of cases involving social media evidence, followed by employment related litigation, insurance claims/personal injury, family law and general business litigation (trademark infringement/libel/unfair competition). One interesting and increasingly common theme involved social media usage being considered as a factor in establishing minimum contacts for jurisdictional purposes. (See Juniper Networks, Inc. v. JUNIPER MEDIA, LLC, and Lyons v. RIENZI & SONS, INC, as examples)

We plan on providing a complete summary for all of the 2012 cases in early January and it safe to assume that the second half of 2012 will continue to see a sharp increase in the presence of social media evidence.

> View all 2012 cases and more now

4 Comments

Filed under Case Law