use of subpoenas to obtain evidence
play

Use of Subpoenas to Obtain Evidence Finding and Obtaining Admissions - PowerPoint PPT Presentation

Presenting a live 90-minute webinar with interactive Q&A Securing Social Media Admissions: Investigative Strategies, Spoliation Warnings, Use of Subpoenas to Obtain Evidence Finding and Obtaining Admissions by Opponents on Twitter,


  1. Presenting a live 90-minute webinar with interactive Q&A Securing Social Media Admissions: Investigative Strategies, Spoliation Warnings, Use of Subpoenas to Obtain Evidence Finding and Obtaining Admissions by Opponents on Twitter, Instagram, Facebook, Reddit, YouTube and Other Social Media Sites THURSDAY, OCTOBER 26, 2017 1pm Eastern | 12pm Central | 11am Mountain | 10am Pacific Today’s faculty features: Steven Brower , Shareholder, Buchalter , Irvine, Calif. Marcus C. Chatterton, Partner, Balch & Bingham , Birmingham, Ala. Margaret Twomey, Lueder Larkin & Hunter , Alpharetta, Ga. The audio portion of the conference may be accessed via the telephone or by using your computer's speakers. Please refer to the instructions emailed to registrants for additional information. If you have any questions, please contact Customer Service at 1-800-926-7926 ext. 10 .

  2. Tips for Optimal Quality FOR LIVE EVENT ONLY Sound Quality If you are listening via your computer speakers, please note that the quality of your sound will vary depending on the speed and quality of your internet connection. If the sound quality is not satisfactory, you may listen via the phone: dial 1-866-869-6667 and enter your PIN when prompted. Otherwise, please send us a chat or e-mail sound@straffordpub.com immediately so we can address the problem. If you dialed in and have any difficulties during the call, press *0 for assistance. Viewing Quality To maximize your screen, press the F11 key on your keyboard. To exit full screen, press the F11 key again.

  3. Continuing Education Credits FOR LIVE EVENT ONLY In order for us to process your continuing education credit, you must confirm your participation in this webinar by completing and submitting the Attendance Affirmation/Evaluation after the webinar. A link to the Attendance Affirmation/Evaluation will be in the thank you email that you will receive immediately following the program. For additional information about continuing education, call us at 1-800-926-7926 ext. 35.

  4. Program Materials FOR LIVE EVENT ONLY If you have not printed the conference materials for this program, please complete the following steps: Click on the ^ symbol next to “Conference Materials” in the middle of the left - • hand column on your screen. • Click on the tab labeled “Handouts” that appears, and there you will see a PDF of the slides for today's program. • Double click on the PDF and a separate page will open. Print the slides by clicking on the printer icon. •

  5. Securing Social Media Admissions : Investigative Strategies, Spoliation Warnings, Use of Subpoenas Steven Brower – Buchalter sbrower@buchalter.com Marcus Chatterton – Balch & Bingham mchatterton@balch.com Margaret Twomey – Leuder, Larkin & Hunter mtwomey@luederlaw.com 5

  6. Agenda • Pre-litigation • Spoliation • Developing your case in discovery • Unmasking anonymous sources • Social media in settlement • Litigation strategies for authentication and admission 6

  7. Pre-Litigation 7

  8. Early Case Assessment Intelligence gathered from Social Media should be a central feature of your ECA Just as you would use other types of information to “count the costs” of o litigation: Discovery Costs, Potential for Negative Media Coverage, Business Delays and Interruption, or Potential for Adverse Outcomes Parse and review publically available information Who are the likely witnesses? o Are likely witnesses credible in light of their social media footprint? o Are there connections between potential witnesses? o Is substantive information relevant to your case already public? o Who are the likely targets for formal discovery? o Incorporate that information in your ECA 8

  9. Early Case Assessment • Insider info May be able to use “friends of friends” to collect information informally o • No pretexting N.Y. Ethics Op. 843 (Sept. 10, 2010) o • But, may be OK to “Friend” unrepresented party… Philadelphia Bar No. 2009 ‐ 02 (March 2009) o • Specialized web-crawlers / Vendors • The “Wayback Machine” can be very useful (but it does not index social media platforms) • Identify relevant / unique hashtags 9

  10. Discovery 10

  11. Locating And Collecting Social Media Evidence • First, what are we looking for? (1) Known info from known entity • Public post made by a witness (2) Hidden info from known entity • Private post by a Plaintiff or other witness (3) Known info from an unknown entity • Public statement by an anonymous poster 11

  12. Identifying and Preserving Public Info — DIY Method Appropriate for Simple or Cost-Sensitive Matters 1. Identify a Non-Lawyer Custodian - Paralegal, project assistant, etc… - May create a conflict if counsel is the custodian (you generally can’t be your own witness) 2. Save electronically – .jpg .pdf .html 3. Reduce to traditional producible format - Keep two digital copies - Use one to produce, print, etc… - Do not ever touch the second copy (preserve the metadata from the moment it was captured) 4. Affidavit by non-lawyer custodian - Identify date / time of collection, method of preservation, website visited, etc… 12

  13. Identifying and Preserving Public Info — Best Practice For Complex or High-Value Matters 1. Retain a Qualified Vendor - Have the vendor make a forensically-sound capture - The vendor may also serve as an expert for authentication, if necessary 13

  14. Identifying and Preserving Hidden Info When the Account Owner Enables Privacy Settings 1.Use a legitimate third-party who has lawful access to preserve - Caveat re: Stored Communication Act 18 U.S.C. § 2701 2.Subpoena process - Social media platforms are notoriously stubborn (and, are generally protected by the SCA) - Subpoena to individual parties / witnesses - Subpoena to ISP 14

  15. Identifying and Preserving Hidden Info - Consider forensics - Tailor Your Civil Discovery Requests - Define “social media” - Target your requests - Instruct the recipient to utilize the Facebook “Activity Log” or download an Archive of their Facebook Data - Facebook periodically changes the methods of retrieving archived information. Present method is outlined here: https://www.facebook.com/help/131112897028467/ - Twitter offers a similar option to “Request Your Archive” in its “Settings” tab 15

  16. Identifying and Preserving Hidden Info Defining “Social Media” “Social Media Site” means any website used to share electronic • Communications and includes, but is not limited to, such examples as YouTube or Vimeo (video sharing); Yelp or Urban Spoon (restaurant reviews); Last.fm, 8tracks, or Spotify (personal music); Second Life (virtual reality); Flickr, PhotoBucket, Tumblr, EyeEm, SnapChat, or Imgur (photo sharing), Reddit or Digg (news sharing); Wikipedia (reference); and public or private message boards. “Social Network Site” means a web-based service allowing individuals to (1) • construct a public or semi-public profile within a bounded system, (2) articulate a list of other users with whom they share a connection, and (3) view and traverse their list of connections and those made by others within the system. Examples of Social Network Sites include Facebook, MySpace, Instagram, Friendster, Cyworld, Bebo, Foursquare, Google Plus, and Pinterest. “Blog” means a website on which an individual or group of users record • opinions, information, analysis, photographs, etc. on a regular basis outside of traditional Social Networking Sites or Social Media Sites. Examples of websites that provide platforms for creating and maintaining Blogs include www.blogger.com, www.twitter.com, www.tumblr.com. www.wordpress.com, and www.livejournal.com 16

  17. Identifying and Preserving Hidden Info Sample Request for Production RFP. If Facebook is a Social Media Site which is responsive to interrogatory no. __, please follow the “Downloading Your Info” instructions, https://www.facebook.com/help/131112897028467/ and produce from the resulting archive, all information responsive to the following requests: All information related to EMPLOYER; o All information related plaintiff’s employment with EMPLOYER; o All social events involving or attended by plaintiff after the date of the o [event/accident/etc…] that forms the basis of the complaint; All information regarding physical activities that plaintiff performed or o participated in after the date of the [event/accident/etc…] that forms the basis of the complaint; The allegations set forth in your amended complaint; or o Your alleged damages. o 17

  18. Go to the Experts • Although these self-help methods can be an excellent start, they do not address all possible data. It may be prudent to employ the assistance of a third-party vendor in order to ensure complete preservation. Commercially available tools / vendors* capable of archiving and collecting social media content include: CloudPreservation o X1 Social Discovery http://www.x1.com/ o Social Media Information https://smiaware.com/ o NextPoint http://www.nextpoint.com/ o * No express endorsement is offered for any of these vendors 18

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend