Use of Subpoenas to Obtain Evidence Finding and Obtaining Admissions - - PowerPoint PPT Presentation

use of subpoenas to obtain evidence
SMART_READER_LITE
LIVE PREVIEW

Use of Subpoenas to Obtain Evidence Finding and Obtaining Admissions - - PowerPoint PPT Presentation

Presenting a live 90-minute webinar with interactive Q&A Securing Social Media Admissions: Investigative Strategies, Spoliation Warnings, Use of Subpoenas to Obtain Evidence Finding and Obtaining Admissions by Opponents on Twitter,


slide-1
SLIDE 1

The audio portion of the conference may be accessed via the telephone or by using your computer's

  • speakers. Please refer to the instructions emailed to registrants for additional information. If you

have any questions, please contact Customer Service at 1-800-926-7926 ext. 10.

Presenting a live 90-minute webinar with interactive Q&A

Securing Social Media Admissions: Investigative Strategies, Spoliation Warnings, Use of Subpoenas to Obtain Evidence

Finding and Obtaining Admissions by Opponents on Twitter, Instagram, Facebook, Reddit, YouTube and Other Social Media Sites

Today’s faculty features:

1pm Eastern | 12pm Central | 11am Mountain | 10am Pacific THURSDAY, OCTOBER 26, 2017

Steven Brower , Shareholder, Buchalter, Irvine, Calif. Marcus C. Chatterton, Partner, Balch & Bingham, Birmingham, Ala. Margaret Twomey, Lueder Larkin & Hunter, Alpharetta, Ga.

slide-2
SLIDE 2

Tips for Optimal Quality

Sound Quality If you are listening via your computer speakers, please note that the quality

  • f your sound will vary depending on the speed and quality of your internet

connection. If the sound quality is not satisfactory, you may listen via the phone: dial 1-866-869-6667 and enter your PIN when prompted. Otherwise, please send us a chat or e-mail sound@straffordpub.com immediately so we can address the problem. If you dialed in and have any difficulties during the call, press *0 for assistance. Viewing Quality To maximize your screen, press the F11 key on your keyboard. To exit full screen, press the F11 key again.

FOR LIVE EVENT ONLY

slide-3
SLIDE 3

Continuing Education Credits

In order for us to process your continuing education credit, you must confirm your participation in this webinar by completing and submitting the Attendance Affirmation/Evaluation after the webinar. A link to the Attendance Affirmation/Evaluation will be in the thank you email that you will receive immediately following the program. For additional information about continuing education, call us at 1-800-926-7926

  • ext. 35.

FOR LIVE EVENT ONLY

slide-4
SLIDE 4

Program Materials

If you have not printed the conference materials for this program, please complete the following steps:

  • Click on the ^ symbol next to “Conference Materials” in the middle of the left-

hand column on your screen.

  • Click on the tab labeled “Handouts” that appears, and there you will see a

PDF of the slides for today's program.

  • Double click on the PDF and a separate page will open.
  • Print the slides by clicking on the printer icon.

FOR LIVE EVENT ONLY

slide-5
SLIDE 5

Securing Social Media Admissions : Investigative Strategies, Spoliation Warnings, Use of Subpoenas

Steven Brower – Buchalter sbrower@buchalter.com Marcus Chatterton – Balch & Bingham mchatterton@balch.com Margaret Twomey – Leuder, Larkin & Hunter mtwomey@luederlaw.com

5

slide-6
SLIDE 6

Agenda

  • Pre-litigation
  • Spoliation
  • Developing your case in discovery
  • Unmasking anonymous sources
  • Social media in settlement
  • Litigation strategies for authentication and

admission

6

slide-7
SLIDE 7

Pre-Litigation

7

slide-8
SLIDE 8

Early Case Assessment

Intelligence gathered from Social Media should be a central feature of your ECA

  • Just as you would use other types of information to “count the costs” of

litigation: Discovery Costs, Potential for Negative Media Coverage, Business Delays and Interruption, or Potential for Adverse Outcomes

Parse and review publically available information

  • Who are the likely witnesses?
  • Are likely witnesses credible in light of their social media footprint?
  • Are there connections between potential witnesses?
  • Is substantive information relevant to your case already public?
  • Who are the likely targets for formal discovery?

Incorporate that information in your ECA

8

slide-9
SLIDE 9

Early Case Assessment

  • Insider info
  • May be able to use “friends of friends” to collect information informally
  • No pretexting
  • N.Y. Ethics Op. 843 (Sept. 10, 2010)
  • But, may be OK to “Friend” unrepresented party…
  • Philadelphia Bar No. 2009‐02 (March 2009)
  • Specialized web-crawlers / Vendors
  • The “Wayback Machine” can be very useful (but it

does not index social media platforms)

  • Identify relevant / unique hashtags

9

slide-10
SLIDE 10

Discovery

10

slide-11
SLIDE 11

Locating And Collecting Social Media Evidence

  • First, what are we looking for?

(1) Known info from known entity

  • Public post made by a witness

(2) Hidden info from known entity

  • Private post by a Plaintiff or other witness

(3) Known info from an unknown entity

  • Public statement by an anonymous poster

11

slide-12
SLIDE 12

Identifying and Preserving Public Info—DIY Method

Appropriate for Simple or Cost-Sensitive Matters 1. Identify a Non-Lawyer Custodian

  • Paralegal, project assistant, etc…
  • May create a conflict if counsel is the custodian (you generally can’t be

your own witness)

2. Save electronically – .jpg .pdf .html 3. Reduce to traditional producible format

  • Keep two digital copies
  • Use one to produce, print, etc…
  • Do not ever touch the second copy (preserve the metadata from the

moment it was captured)

4. Affidavit by non-lawyer custodian

  • Identify date / time of collection, method of preservation, website visited,

etc…

12

slide-13
SLIDE 13

Identifying and Preserving Public Info—Best Practice

For Complex or High-Value Matters 1. Retain a Qualified Vendor

  • Have the vendor make a forensically-sound capture
  • The vendor may also serve as an expert for authentication,

if necessary

13

slide-14
SLIDE 14

Identifying and Preserving Hidden Info

When the Account Owner Enables Privacy Settings 1.Use a legitimate third-party who has lawful access to preserve

  • Caveat re: Stored Communication Act 18 U.S.C. § 2701

2.Subpoena process

  • Social media platforms are notoriously stubborn (and, are generally

protected by the SCA)

  • Subpoena to individual parties / witnesses
  • Subpoena to ISP

14

slide-15
SLIDE 15

Identifying and Preserving Hidden Info

  • Consider forensics
  • Tailor Your Civil Discovery Requests
  • Define “social media”
  • Target your requests
  • Instruct the recipient to utilize the Facebook “Activity Log” or

download an Archive of their Facebook Data

  • Facebook periodically changes the methods of retrieving

archived information. Present method is outlined here: https://www.facebook.com/help/131112897028467/

  • Twitter offers a similar option to “Request Your Archive” in its

“Settings” tab

15

slide-16
SLIDE 16

Identifying and Preserving Hidden Info

Defining “Social Media”

  • “Social Media Site” means any website used to share electronic

Communications and includes, but is not limited to, such examples as YouTube or Vimeo (video sharing); Yelp or Urban Spoon (restaurant reviews); Last.fm, 8tracks, or Spotify (personal music); Second Life (virtual reality); Flickr, PhotoBucket, Tumblr, EyeEm, SnapChat, or Imgur (photo sharing), Reddit or Digg (news sharing); Wikipedia (reference); and public or private message boards.

  • “Social Network Site” means a web-based service allowing individuals to (1)

construct a public or semi-public profile within a bounded system, (2) articulate a list of other users with whom they share a connection, and (3) view and traverse their list of connections and those made by others within the system. Examples of Social Network Sites include Facebook, MySpace, Instagram, Friendster, Cyworld, Bebo, Foursquare, Google Plus, and Pinterest.

  • “Blog” means a website on which an individual or group of users record
  • pinions, information, analysis, photographs, etc. on a regular basis outside of

traditional Social Networking Sites or Social Media Sites. Examples of websites that provide platforms for creating and maintaining Blogs include www.blogger.com, www.twitter.com, www.tumblr.com. www.wordpress.com, and www.livejournal.com

16

slide-17
SLIDE 17

Identifying and Preserving Hidden Info

Sample Request for Production

  • RFP. If Facebook is a Social Media Site which is responsive to

interrogatory no. __, please follow the “Downloading Your Info” instructions, https://www.facebook.com/help/131112897028467/ and produce from the resulting archive, all information responsive to the following requests:

  • All information related to EMPLOYER;
  • All information related plaintiff’s employment with EMPLOYER;
  • All social events involving or attended by plaintiff after the date of the

[event/accident/etc…] that forms the basis of the complaint;

  • All information regarding physical activities that plaintiff performed or

participated in after the date of the [event/accident/etc…] that forms the basis of the complaint;

  • The allegations set forth in your amended complaint; or
  • Your alleged damages.

17

slide-18
SLIDE 18

Go to the Experts

  • Although these self-help methods can be an

excellent start, they do not address all possible

  • data. It may be prudent to employ the assistance
  • f a third-party vendor in order to ensure complete
  • preservation. Commercially available tools /

vendors* capable of archiving and collecting social media content include:

  • CloudPreservation
  • X1 Social Discovery http://www.x1.com/
  • Social Media Information https://smiaware.com/
  • NextPoint http://www.nextpoint.com/

* No express endorsement is offered for any of these vendors

18

slide-19
SLIDE 19

Private Accounts

  • User’s right to privacy
  • Courts generally find that “private” is not necessarily the same as “not

public.” By sharing the content with others – even if only a limited number

  • f specially selected friends – the litigant has no reasonable expectation
  • f privacy with respect to the shared content. Thus, the very purpose of

social media – to share content with others – precludes the finding of an

  • bjectively reasonable expectation that content will remain “private.”

Consequently, discoverability of social media is governed by the standard analysis and is not subject to any “social media” or “privacy” privilege.

  • Legal Authority Regarding Discoverability of Private

Accounts:

  • Crispin v. Christian Audiegier, Inc., 717 F. Supp. 2d 965 (C.D. Cal.,

2010)(private messages analogous to email)

  • Romano v. Steelcase, Inc., 907 N.Y.S.2d 650 (N.Y. Sup. Ct. 2010) (rejecting

privacy arguments by Facebook user)

  • Cf. McCann v. Harleysville Ins. Co., 910 N.Y.S.2d 614 (N.Y. App. Div. 2010)

(access to Facebook account denied as mere “fishing expedition”)

19

slide-20
SLIDE 20

Private Accounts

More Legal Authority:

  • Mackelprang v. Fidelity Nat’l Title Agency, No. 2:06‐cv‐00788,

2007 WL 119149 (D. Nev. Jan. 9, 2007)

  • Tompkins v. Detroit Metro. Airport, 278 F.R.D. 430 (E.D. Mich. 2012)
  • Davenport v. State Farm Mut. Ins. Co., No. 3:11‐cv‐632, 2012 WL

555759 (M.D. Fla. Feb. 21, 2012)

  • Largent v. Reed, No. 2009-1823, slip op (39th Judicial Dist. of

Penn., Nov 8, 2011)

20

slide-21
SLIDE 21

Identifying Anonymous Creators of Public Info

  • Public / Anonymous Info On:
  • Social Media Accounts
  • Message Boards
  • Comment Sections of Conventional Media
  • Review Forums
  • Useful for:
  • Defamation
  • Deceptive / Counterfeit Social Media Accounts
  • Malicious Reviews (Tortious Interference?)
  • Trade Secrets
  • IP Infringement
  • Unfair Competition

21

slide-22
SLIDE 22

Identifying Anonymous Creators of Public Info

  • Digital Investigation / Forensics
  • Pre-litigation discovery
  • Pseudonymous Lawsuit / Subpoenas
  • Mickelson v. John Doe, a/k/a “Fogroller” and “Longitude”
  • Ziegler, et at v. John Doe, a/k/a “MajorHoople” et al

22

slide-23
SLIDE 23

Identifying Anonymous Creators of Public Info

23

slide-24
SLIDE 24

Discovery

  • Methods of Producing Social Media Evidence
  • Direct Access
  • In-Camera Review
  • Attorney Eyes Only
  • Conventional Production
  • Forensically Sound Capture
  • These methods have evolved as courts become

more comfortable with social media and digital evidence

  • Competent courts will expect the parties to make a conventional or

forensically-sound production without the exchange of passwords or interference from the court

24

slide-25
SLIDE 25

Direct Access

  • Not surprisingly, this method of “production” has not

been popular with parties or with courts.

  • Largent v. Reed, No. 2009-1823 (Pa. C.C.P. Nov. 8, 2011),

court ordered the plaintiff to turn over her Facebook login information to defense counsel within 14 days of the date of the order. Defense counsel then would have 21 days to “inspect [the plaintiff’s] profile.” After that period, the plaintiff could change her password to prevent any further access to her account by defense

  • counsel. Although the order specifically identified the

defendant’s lawyer as the only party who would be given the login information, it did not specify whether the defendant was permitted to view the account’s contents once the attorney had logged in.

25

slide-26
SLIDE 26

Direct Access

  • Gatto v. United Airlines, Inc., No. 10-1090-ES-SCM (D.N.J.
  • Mar. 25, 2013), the plaintiff voluntarily provided his

Facebook password to the defendants’ counsel during a settlement conference facilitated by the court. When the defendants’ attorney later logged into the account and printed portions of the plaintiff’s profile page as previously agreed, Facebook sent an automated message to the plaintiff, alerting him that his account had been accessed from an unauthorized ISP address.

  • The plaintiff attempted to deactivate the account but

deleted it instead. As a result, all of the data associated with the account was automatically and permanently deleted 14 days later. The court found that the plaintiff had failed to preserve relevant evidence and granted the defendants’ request for an adverse-inference instruction as a sanction.

26

slide-27
SLIDE 27

Direct Access

  • Trail v. Lesko, No. GD-10-017249 (Pa. C.C.P. July 3, 2012),

both sides sought to obtain Facebook posts and pictures from the other. Neither complied and both parties filed motions seeking to compel the other to turn over its Facebook password and username. The court explained that a party is not entitled to free-reign access to the non-public social-networking posts of an opposing party merely because he asks the court for it. “To enable a party to roam around in an adversary’s Facebook account would result in the party to gain access to a great deal of information that has nothing to do with the litigation and [] cause embarrassment if viewed by persons who are not ‘Friends.’”

27

slide-28
SLIDE 28

Direct Access

  • Chauvin v. State Farm Mutual Automobile Insurance

Company, No. 10-11735, 2011 U.S. Dist. LEXIS 121600 (S.D.

  • Mich. Oct. 20, 2011), the court affirmed an award of

sanctions against the defendant due to its motion to compel production of the plaintiff's Facebook password. The court upheld the decision of the magistrate judge, who had concluded that the content the defendant sought to discover was available “through less intrusive, less annoying and less speculative means,” even if

  • relevant. Furthermore, there was no indication that

granting access to the account would be reasonably calculated to lead to discovery of admissible

  • information. Thus, the motion to compel warranted an

award of sanctions.

28

slide-29
SLIDE 29

In Camera Review

  • Offenback v. Bowman, a No. 1:10-cv-1789, 2011 U.S.
  • Dist. LEXIS 66432 (M.D. Pa. June 22, 2011), the

magistrate judge conducted an in camera review

  • f the plaintiff’s Facebook account and ordered

the production of a “small segment” of the account as relevant to the plaintiff’s physical condition.

29

slide-30
SLIDE 30

In Camera Review

  • Douglas v. Riverwalk Grill, LLC, No. 11-15230, 2012

U.S. Dist. LEXIS 120538 (E.D. Mich. Aug. 24, 2012), the court ordered the plaintiff to provide the contents for in camera review. After conducting its review of “literally thousands of entries,” the court noted that “majority of the issues bear absolutely no relevance” to the case. In particular, the court found that the only entries that could be considered discoverable were those written by the plaintiff, which could be in the form of “comments” he made on another’s post or updates to his own “status.” The court identified the specific entries it had determined were discoverable.

30

slide-31
SLIDE 31

In Camera Review

  • At least one court has agreed to “friend” a litigant

for the purpose of conducting an in camera review

  • f the litigant’s Facebook page.
  • Barnes v. CUS Nashville, LLC, No. 3:09-cv-00764, 2011

U.S. Dist. LEXIS 143892 (M.D. Tenn. June 3, 2010). Judge offered to expedite the parties’ discovery dispute by creating a Facebook account and then “friending” two individuals “for the sole purpose of reviewing photographs and related comments in camera.” The judge then would “properly review and disseminate any relevant information to the parties . . . [and would] then close Facebook account.”

31

slide-32
SLIDE 32

In Camera Review

  • Many courts have been less than enthusiastic about

the idea of doing the parties’ burdensome discovery work.

  • Tomkins v. Detroit Metropolitan Airport, 278 F.R.D.

387 (E.D. Mich. 2012). Court declined the parties’ suggestion that it conduct an in camera review, explaining that “such review is ordinarily utilized only when necessary to resolve disputes concerning privilege; it is rarely used to determine relevance.”

32

slide-33
SLIDE 33

Attorneys’ Eyes Only

  • In Thompson v. Autoliv ASP, Inc., No. 2:09-cv-01375 (D. Nev. June

20, 2012), the defendant obtained information from the plaintiff’s publicly available social-networking profiles that was relevant to the case, but asserted that the plaintiff had since changed her account settings to prevent the defendant from further access and had failed to produce (or had produced in overly-redacted form) information from these profiles in response to the defendant’s formal discovery requests.

  • The defendant sought to have the court conduct an in camera

review of the profiles in their entirety to determine whether the plaintiff’s discovery responses were complete. Instead, the court

  • rdered the plaintiff to provide the requested information to the

defendant’s counsel for an attorney’s-eyes-only review for the limited purpose of identifying whether information had been improperly withheld from production. The defendant’s counsel was instructed that it could not use the information for any other purpose without a further ruling by the court.

33

slide-34
SLIDE 34

Conventional Production

  • Again, competent courts will expect the parties to

make a conventional or forensically-sound production without the exchange of passwords or interference from the court

34

slide-35
SLIDE 35

Subpoenas

  • When to avoid:
  • The usefulness of a subpoena is limited by the Stored Communications

Act, 18 U.S.C. 2701-2712, which regulates the disclosure of private parties’ stored electronic communications.

  • Therefore, it is generally fruitless to subpoena substantive information

directly from Social Media providers

  • Providers, including Facebook, take the position that the SCA prohibits

them from disclosing social media contents. From the Facebook website:

  • Facebook will provide subscriber information in response to a subpoena,

which can be helpful to authenticate an account.

  • Additionally, Facebook requires that it be served with a valid California or

federal subpoena.

35

slide-36
SLIDE 36

Subpoenas

  • When to use subpoenas to Social Media

providers:

  • To obtain basic subscriber information
  • Useful for identifying anonymous, pseudonymous, or

deceptive users

  • To request preservation

36

slide-37
SLIDE 37

090701_37

37

Unmasking Anonymous Sources

slide-38
SLIDE 38

090701_38

38

Steven Brower

  • Computer programmer
  • First regular user of the Internet (Arpanet)
  • California Attorney since 1980
  • Insurance coverage, starting from computers
  • Jury trials, bench trials, appeals, arbitrations, mediations

(300+) across the U.S. in technology, trade secrets, data breach, e-discovery, intellectual property, contracts, real estate, fraud, libel, professional liability, embezzlement

slide-39
SLIDE 39

090701_39

39

User of Internet Since 1973

  • First (?) Non-Scientist With Regular Unrestricted Access To The Internet

Internet as of Sept, 1973 NOT Al Gore

slide-40
SLIDE 40

090701_40

40

Finding and Stopping John Doe

  • Sooner or later every attorney gets asked “what can we do

about these anonymous comments”

  • Post on Vitals.com (2/11) “My father had an Advanced

Directive . . . This “doctor” performed over 10 colonoscopies on my father in less than 6 months and God

  • nly knows how many stomach endoscopies. He is callous

and ruthless and has no bedside manner. I am reporting him to Medicare and the California Medical Board. Apparently, this “doctor” has been known in Riverside for many years to be one of the most fraudulent physicians in practice. . .”

slide-41
SLIDE 41

090701_41

41

Site Refuses Takedown

  • Site refuses request for takedown
  • They offer options to “respond”
  • They confirm they will respond to a

subpoena

  • They later remove the posting because their

policy is that any review must be by a patient (sometimes you just get lucky)

slide-42
SLIDE 42

090701_42

42

Subject Matter Jurisdiction

  • Decide to file suit against John DOE
  • Need subpoenas to other jurisdictions
  • File in Federal Court
  • Can’t allege diversity
  • Federal question jurisdiction
  • Lanham Act Trade Libel
  • Recent – Trade Secrets Act
slide-43
SLIDE 43

090701_43

43

Discovery – Get IP address of Doe

  • Need subpoena to website and internet

provider

  • Rule 26 delay on discovery actually works

in our favor

  • Ex Parte Application to get IP address of

anonymous poster from website, granted

  • Quick response, IP address traced to block of

IP’s owned by Charter Communications

slide-44
SLIDE 44

090701_44

44

Get Subpoena for Subscriber Info

  • 2nd Ex Parte Application to get subpoena for

subscriber information from Charter Communications to find account from which the posting was done

  • If it was done from the public library, case over
  • Served subpoena on “secret” back door at

Charter

  • Success!!! – received motion to quash
slide-45
SLIDE 45

090701_45

45

Hearing on Motion to Quash

  • Hearing
  • n

Motion to Quash User Identifying Information

  • You can’t get content, only user information
  • Decision

taken “under submission” by Magistrate Judge, then denied

slide-46
SLIDE 46

090701_46

46

Amended Complaint

  • Faxed the court order to Charter (back door)
  • n 9/13/11 and got quick response
  • Filed a First Amended Complaint, with the

actual name of John Doe in the public record, on 9/21/11

  • Chief of hospital Medical Staff
  • Motion for review (appeal), filed with

District Court on 9/26/11, denied 10/25/11

slide-47
SLIDE 47

090701_47

47

Deposition

  • He has never been formally introduced to

Plaintiff, although he has seen him

  • He does not recall ever having a direct

conversation with the Plaintiff

  • He is the author of the “offending post” and

he remembers doing the posting

slide-48
SLIDE 48

090701_48

48

Deposition

  • The posting described a particular patient (not

his father), but he does not recall the name of the patient

  • He never provided medical services to the

patient being described (heard from nurses)

  • Can’t remember if he drank a lot before he

made the posting

slide-49
SLIDE 49

090701_49

49

Settlement

  • So we have proof of the false nature of the

information and we have proof of no reasonable basis to believe the factual information posted

  • But how do you show damages from an

unfavorable review?

  • Attorney’s fees are relatively clear
slide-50
SLIDE 50

Settlement Value and Use in Discovery

50

slide-51
SLIDE 51
  • Pre-Trial Uses of Social Media Information
  • Information obtained can be used in settlement

negotiations

  • Any information obtained before a deposition can be

brought to the deposition

  • Ask the deponent about social media content that you have

already flagged

  • Establish posted content is from a relevant time period and not a

“throwback” (#tbt = “Throwback Thursday”)

  • Any information discovered after the deposition can

accompany a Request for Admission to the party

  • Attach the content in question
  • Ask the plaintiff to confirm dates, activities and locations

represented by the content at issue

51

slide-52
SLIDE 52

Plaintiff in a Personal Injury case had these pictures on her Instagram account. Some of the admissions sought by defense counsel included:

  • “Please admit the photographs attached

hereto as Exhibit S were taken subsequent to the motor vehicle accident forming the basis of your Complaint.”

  • “Please admit that at least one of the

photographs attached hereto as Exhibit S depicts you climbing rocks.”

  • “Please admit the photograph attached

hereto as Exhibit T depicts you running up a hill.”

  • “Please admit ‘suicides’ are an exercise

drill where one runs as fast as they can.”

52

slide-53
SLIDE 53

Spoliation

53

slide-54
SLIDE 54

Avoiding Spoliation

  • Duty to preserve social media evidence.
  • All evidence in a party’s “possession, custody, or

control” is subject to the duty to preserve.

  • Evidence generally is considered to be within a

party’s “control” when the party has the legal authority or practical ability to access it.

  • Does this include:
  • Company Twitter account?
  • Social Media accounts of employees?
  • Company’s website?

54

slide-55
SLIDE 55

Spoliation in Action Lester v. Allied Concrete Company and William Donald Sprouse

  • Plaintiff’s counsel was VP of VA Trial Lawyers; Pres. of

Local Bar

  • Instructed his paralegal to have the client to “clean

up” his Facebook page because, “we don’t want blowups of this stuff at trial,”

  • This was after receiving discovery requests that

included a copy of a photo gleaned from the Plaintiff’s Facebook account of him drinking a beer and wearing a T-shirt that says: “I [heart] hot moms.”

55

slide-56
SLIDE 56

Lester v. Allied Concrete Company and William Donald Sprouse

56

slide-57
SLIDE 57

Lester v. Allied Concrete Company and William Donald Sprouse

  • What happened to the lawyer?
  • Multi-million dollar verdict was cut in half

(VA Sup. Ct. later reinstated the verdict)

  • Suspended for 5 years
  • For “violating professional rules that govern candor toward

the tribunal, fairness to opposing party and counsel, and misconduct.”

  • Taxed with Defendant’s fees (> $700k)
  • Resigned from law firm

57

slide-58
SLIDE 58

Katiroll Company, Inc. v. Kati Roll and Platters, Inc., (D.N.J.

  • Aug. 3, 2011)
  • The defendant in a trade dress lawsuit committed technical

spoliation when he changed his Facebook profile picture, where the picture at issue was alleged to show infringing trade

  • dress. Because the defendant had control over his Facebook

page, he had the duty to preserve the photos.

  • Because the photos were relevant to the litigation, their

removal was “somewhat prejudicial” to the plaintiff. Instead of monetary or evidentiary sanctions, the court ordered the defendant to coordinate with the plaintiff’s counsel to change the picture back to the allegedly infringing picture for a brief time during which the plaintiff could print whatever posts it believed to be relevant.

  • Critical to the court’s decision not to award sanctions was its

finding that the plaintiff had not explicitly requested that the defendant preserve his Facebook account as evidence.

58

slide-59
SLIDE 59
  • Spoliation Sanctions
  • Courts have held that when litigation is reasonably

foreseeable, parties have a responsibility to preserve any unique, relevant information. Smith v. Hillshire Brands, 2014 WL 2804188 (D. Kan. June 20, 2014) (holding that plaintiff’s failure to preserve e-mails was considered spoliation, but choosing to require plaintiff to attempt to recover the e-mails rather than fine him). Plaintiff are obviously aware of the litigation before defendants or witnesses.

  • Courts have also put the responsibility on attorneys to ensure

that their clients understand the repercussions of deleting any relevant content. Painter v. Atwood, 2014 WL 1089694 (D. Nev.

  • Mar. 18, 2014) (ordering an adverse inference sanction for

spoliation and rejecting plaintiff’s argument that she was a “22-year-old girl who would not have known better than to delete her Facebook comments” because once she retained counsel, her counsel should have informed her of her duty to preserve.)

59

slide-60
SLIDE 60
  • Spoliation Warning/Litigation Hold Letters
  • Most courts require some degree of culpability before

imposing sanctions (dismissal or adverse inference sanctions are both available) for spoliation—unless, like in Gatto—the evidence lost is known to be relevant

  • Sending a litigation hold letter to your clients ensures they

are aware of their obligations and you may be able to avoid a situation like Painter

  • This also gives you an opportunity to tell your client to switch

all social media to private, in case your judge takes the Romano “public content” threshold approach to social media discovery. Romano v. Steelcase, Inc., 907 N.Y.S.2d 650 (N.Y. Sup. Ct. 2010).

60

slide-61
SLIDE 61

Authentication and Admissibility

61

slide-62
SLIDE 62
  • Authentication should not be a high hurdle
  • Rule 901- “Evidence sufficient to support a finding that

the matter in question is what its proponent claims” (b)(1) - Testimony of a witness with knowledge (b)(4) - Distinctive Characteristics, and the like

  • Rule 902 – Self-Authentication

62

slide-63
SLIDE 63

What about the “voodoo evidence”?

  • Early technophobic opinions resisted any internet-based

evidence: “There is no way Plaintiff can overcome the presumption that the information he discovered on the Internet is inherently

  • untrustworthy. Anyone can put anything on the Internet …

hackers can adulterate the content on any web-site from any location at any time.” St. Clair v. Johnny’s Oyster and Shrimp, Inc., 76 F. Supp. 2d 773, 774-75 (S.D. Tex 1999).

63

slide-64
SLIDE 64

Fortunately, things have progressed… “A party seeking to admit an exhibit need only make a prima facie showing that it is what he or she claims it to

  • be. This is not a particularly high barrier to overcome.”

Lorraine v. Markel Am. Ins. Co., 241 F.R.D. 534, 542 (D.

  • Md. 2007)

64

slide-65
SLIDE 65
  • In Lorraine, Judge Grimm discusses the various provisions
  • f 901 at length.
  • Distinction between computer generated data and

computer stored data

  • Best practice is to be prepared to prove both sides of

coin

65

slide-66
SLIDE 66
  • Authentication is another area in which utilizing the services of

a vendor may be prudent

  • Preservation of metadata may help prove/disprove claims
  • f authentication
  • Lorraine specifically mentions hash values
  • Repeated use of a username (even across multiple

platforms) alone is likely not enough to authenticate the poster’s identity. US v. Vayner, 769 F. 3d 125 (2d Cir. 2014), but see US v. Brinson, 772 F. 3d 1314 (10th Cir. 2014).

  • In Brinson, the prosecution offered additional witnesses

and evidence of email addresses and phone numbers linked to the username which were associated with the defendant—this is information that a vendor may be able to help you obtain

66

slide-67
SLIDE 67

Here we go again… “Any evidence procured off the Internet is adequate for almost nothing, even under the most liberal interpretation

  • f the hearsay exception rules.” St. Clair v. Johnny’s

Oyster & Shrimp, Inc., 76 F. Supp. 2d 773, 775 (S.D. Tex. 1999)

67

slide-68
SLIDE 68

Hearsay

  • The Business Record Exception of 803(6) is sort of a

fallacy

  • How does an 803(6) foundation make this any more

trustworthy?

  • Business record exception has no bearing on its

admissibility

  • This statement is really a non-hearsay admission under

801(d)(2)

68

slide-69
SLIDE 69
  • A party’s own social media post may constitute non-

hearsay, if the proponent can show by a preponderance of the evidence that the opposing party made the statement. Linscheid v. Nautus Medical, 2015 WL 1470122 (N.D. Ga. 2015).

  • In general, judges act as the gatekeepers of the

evidence, and a jury is expected to assess reliability of the evidence supporting authenticity. Tienda v. State, 358 S.W. 3d 633 (Ct. Crim. App. Tx. 2012).

  • You may be able to get this extrinsic evidence

through outside means (subpoena social media for

  • wnership information, etc) or through more

traditional discovery tools (RFAs or in depositions).

69

slide-70
SLIDE 70

Trial Strategy and Other Considerations

70

slide-71
SLIDE 71

Social Media Monitoring

  • Vendors do this cheaply and easily
  • No social media on the “wayback machine”
  • Pre-trial / Post-trial
  • Dana Snay case
  • Confidential settlement of age discrimination lawsuit
  • "Mama and Papa Snay won the case against
  • Gulliver. Gulliver is now officially paying for my

vacation to Europe this summer. SUCK IT."

71

slide-72
SLIDE 72
  • Opponents
  • Clients
  • Jurors
  • Relatives…

72

slide-73
SLIDE 73

Defensibility

  • Trustworthiness / Jury Perception
  • Potential sensitivity to privacy issues
  • Doubts should go to the weight, and not to the

admissibility of the evidence

73