Social Media Discovery: It's Not So Different After All

Similar documents
A NEW FRONTIER. or the Same Issues in New Packaging?

Discovery of Social Media: The Seventh Circuit E-Discovery Pilot Program. Ronald L. Lipinski, Seyfarth Shaw LLP Jay C. Carle, Seyfarth Shaw LLP

Overcoming Potential Legal Challenges to the Authentication of Social Media Evidence

New Technologies Test the Limits of the Duty to Preserve, Collect and Produce Information in Civil Discovery

Current Trends in Litigation Involving the Use of Social Media

Social Media in Tribunal Proceedings

Social Media & ediscovery: Untangling the Tweets for the Trials

Social Media in Litigation and E Discovery: Risks and Rewards

Spoliation of Evidence. Prepared for:

Electronic Discovery: Litigation Holds, Data Preservation and Production

ISSUES ON SOCIAL MEDIA DISCOVERY IN PERSONAL INJURY CASES

CIVIL LITIGATION PRACTICE FOR PARALEGALS. Many attorneys, paralegals and legal assistants refer to pleadings as all

Discovery Devices. Rule 26 requires the automatic disclosure of a host of basic information regarding the case

Social Media, Instant Messaging, Webmail and E-Discovery: How the Internet Boosts the Power of ESI. Written by Vere Software

Investigating Workers Compensation Claims in the Age of Social Media

Social Media: Cutting Edge Evidence Questions. Presented by: Lawrence Morales II The Morales Firm, P.C. San Antonio, Texas

How To Use Social Media To Help Your Business

UNDERSTANDING E DISCOVERY A PRACTICAL GUIDE. 99 Park Avenue, 16 th Floor New York, New York

May 2015 Vol. 44, No. 5 Page 45. Articles Family Law Preservation of Social Media Evidence in a Family Law Context

WHAT TO DO WHEN YOU RECEIVE A LITIGATION HOLD NOTICE. A Guide for University Faculty, Staff, and Others

Litigation Hold Notices & Electronic Discovery A R E S O U R C E F O R W S U E M P L OY E E S

LEGAL HOLD OBLIGATIONS FOR DISTRICT EMPLOYEES

Five Steps to Ensure a Technically Accurate Document Production

SOCIAL MEDIA IN PERSONAL INJURY LAW

COURSE DESCRIPTION AND SYLLABUS LITIGATING IN THE DIGITAL AGE: ELECTRONIC CASE MANAGEMENT ( ) Fall 2014

PRESENTED BY: Sponsored by:

Electronic Discovery Rules & Social Media

Tweets and Status Updates Meet the Courtroom: How Social Media Continues to be a Challenge for E-Discovery in By Nadine R.

Xact Data Discovery. Xact Data Discovery. Xact Data Discovery. Xact Data Discovery. ediscovery for DUMMIES LAWYERS. MDLA TTS August 23, 2013

A Brief Overview of ediscovery in California

Discovery Ethics Course Plan

IMPORTANT CONSIDERATIONS FOR MID-RANGE EDISCOVERY DATA COLLECTION

E-Discovery and Data Management. Managing Litigation in the Digital Age. Attorney Advertising

The Impact of Social Media on Damages in Employment Litigation. By: Angie C. Davis and Mary Wu

The Risks, Rewards and Limits of Social Media in Defense Counsel's Arsenal

Minimizing ediscovery risks. What organizations need to know in today s litigious and digital world.

Acknowledgments Introduction: Welcome to the Labyrinth. CHAPTER 1 Gathering the Evidence 1. CHAPTER 2 Third-Party Experts 25

2004 E-Discovery Developments: Year in Review

Measures Regarding Litigation Holds and Preservation of Electronically Stored Information (ESI)

General Items Of Thought

Social Media E-Discovery: Process & Technology

Professional Responsibility and New Technology

Ethics in Technology and ediscovery Stuff You Know, But Aren t Thinking About

The Ethics Surrounding the Use of Facebook by Opposing Counsel. By: Douglas Mena Litchfield Cavo

ediscovery: The New Information Management Battleground Developments in the Law and Best Practices

Social networking, mobile devices, and cloud computing are enabling new forms of commerce and communication.

Electronic Discovery How can I be prepared? September 2010

The e-workplace: Balancing Privacy and Information Security to Manage Risks. Overview. Employee Monitoring

Expert Witness Disclosure and Privilege (Federal & New York)

Overview of E-Discovery and Depositions in U.S. IP Litigation

ESI DEMYSTIFIED. Streamlining the E-Discovery Process Through Internal Processes and Controls. Melinda Burrows Bruce Cosgrove*

Electronic Discovery

E-Discovery Quagmires An Ounce of Prevention is Worth a Pound of Cure Rebecca Herold, CISSP, CISA, CISM, FLMI Final Draft for February 2007 CSI Alert

NightOwlDiscovery. EnCase Enterprise/ ediscovery Strategic Consulting Services

Legal Arguments & Response Strategies for E-Discovery

DOCSVAULT WhitePaper. Concise Guide to E-discovery. Contents

Journal of Digital Forensic Practice

The Importance of Appropriate Record Retention Policies

Pretrial Practice Course Syllabus Spring, 2014 Meeting -- Tuesdays 1:30-3:20pm Room (C)

Ethics and ediscovery

E-Discovery Toolkit for Educational Institutions

The 2010 Amendments to the Expert Discovery Provisions of Rule 26 of the Federal Rules of Civil Procedure: A Brief Reminder

How to Manage Costs and Expectations for Successful E-Discovery: Best Practices

INTERNET ISSUES: PROTECTING TRADE SECRETS NEW E-DISCOVERY RULES. William R. Denny Potter Anderson & Corroon LLP September 26, 2006

Ten Tips for Responding to Litigation Hold Letters

UNITED STATES DISTRICT COURT WESTERN DISTRICT OF MICHIGAN SOUTHERN DIVISION

In-House Solutions to the E-Discovery Conundrum

DISCOVERY OF ELECTRONICALLY-STORED INFORMATION IN STATE COURT: WHAT TO DO WHEN YOUR COURT S RULES DON T HELP

FLORIDA FAMILY LAW: SOCIAL MEDIA & E-DISCOVERY. Christopher.Hopkins@Akerman.com

B. Preservation is not limited to simply avoiding affirmative acts of destruction because day-to-day operations routinely alter or destroy evidence.

Rule 30(b)(6) Depositions in Electronic Discovery. Discovering What There Is to Discover

Preservation and Production of Electronic Records

Michael J. McGuire. Focus Areas. Overview

Five Rules for Discovery of Electronically Stored Information

E-Discovery: The New Federal Rules of Civil Procedure A Practical Approach for Employers

Continuing Legal Education Program Course Catalog

Electronic Discovery and the New Amendments to the Federal Rules of Civil Procedure: A Guide For In-House Counsel and Attorneys

Want To Be My Friend? Social Networking & Ediscovery

FORMAL OPINION NO Accessing Information about Third Parties Through a Social Networking Website. Facts:

ZL UNIFIED ARCHIVE A Project Manager s Guide to E-Discovery. ZL TECHNOLOGIES White Paper

E-Discovery: A Common Sense Approach. In order to know how to handle and address ESI issues, the preliminary and

When a lawyer seeks evidence in

ediscovery and Information Governance Practice Overview

Social Media is Pervasive

Discovery in Bad Faith Insurance Claims: State of the Law, Successful Strategies. Teleconference Program Wednesday, March 29, 2006

MCGRAW MORRIS P.C. Presented By: Stacy J. Belisle

E-Discovery and Electronically Stored Information (ESI):

Handling Costly E-Discovery Demands in Smaller Cases

Employment Law Issues in Social Media

(Previously published in The Legal Intelligencer, November 8, 2011) New Cost Guidelines for E-Discovery by Peter Vaira

BEYOND THE HYPE: Understanding the Real Implications of the Amended Federal Rules of Civil Procedure. A Clearwell Systems White Paper

Whistleblower Claims: Are You Covered?

Digital Government Institute. Managing E-Discovery for Government: Integrating Teams and Technology

COALSP 2013 E-Discovery Case Law Update. Drew Unthank Partner Wheeler Trigg O Donnell LLP

Litigation Hold Procedures

SOCIAL MEDIA. What Every Litigator Needs to Know

ACADEMIC AFFAIRS COUNCIL ******************************************************************************

R U My Cookies? Sexual Harassment In The Age Of Technology

Amendments to the Rules to Civil Procedure: Yours to E-Discover. Prepared by Christopher M. Bartlett Cassels Brock & Blackwell LLP

Developing an Integrated e-discovery and Corporate Records Management Program. Presented by: Janeine Charpiat Information Security Professional

Transcription:

Social Media Discovery: It's Not So Different After All by Cris Whitman As the use of social media continues to grow, so do concerns about preserving and collecting related content. Topics surrounding the discoverability of social media and related collection, preservation and production issues can be unnecessarily complex because of the dynamic and innovative nature of the underlying technology. 1 In approaching discovery, it is easy to get bogged down by the technical details related to new and dynamic technologies. However, parties can develop an effective strategy for dealing with social media content if they remain steadily focused on the basic tenets of the Federal Rules, e-discovery best practices and helpful guidance from recent case law. The 2006 amendments to the Federal Rules clearly contemplate the discovery of all forms of documents and electronic information. 2 Although it is not explicitly stated in the amendments, one can reasonably infer that "electronic documents and data" include social media content. Regardless of form, the guiding principle for discoverability is the same -- documents and data are discoverable if relevant to a claim or defense. As such, successful strategies for obtaining social media content should first and foremost be focused on the relevant content. Considering the popularity of social media and people's tendency to over-share information on social media sites, it is likely that relevant photos, videos, messages and other content exist in these locations. Particularly for defendants facing product liability claims or personal injury lawsuits, social media sites have proven to be illuminating sources of revealing information about a plaintiff's condition or other evidence to dispute an alleged injury or harm. 3 Fortunately, the vast majority of social media content is available for the world to see. Parties seeking discovery of social media content should leverage this Social Media Discovery: It's Not So Different After All Thorough Custodian Interviews Uncover Valuable Information Predictive Coding: Webcast to Explore Uses, Best Practices LeClairRyan's William Belt, Jr. and Daryl Shetterly will present "Computer Assisted Review: What Is It and Is It Defensible?" via webcast on Tuesday, January 10. The webcast is hosted by DRI, an international membership organization of civil defense lawyers, and will discuss popular topics related to predictive coding and how to ensure defensibility when applying this document review method. Visit DRI to register online. To learn more about managed self collection, please visit LeClairRyan's blog, The e-

access by taking ethical steps to investigate the information available on these sites. The initial investigation may include viewing pages related to a party or witness and printing or taking screenshots of the publicly available content. However, the investigation should never include using deceptive tactics to access social network content, such as impersonating a "friend" to gain access to a user's private profile information. 4 Discovery Myth. How then are parties able to access this so-called "private" content? The most effective way to access social media content, including "private" information, is to specifically request it from the opposing side. 5 Courts have found the information on social media pages to be within the control of the content owners 6 and that there is an obligation to produce relevant social media content. In party discovery, an objection to a request for social media content on "privacy" grounds is unlikely to be successful. The rules of evidence define the scope of discovery, in which relevance is the controlling factor. Relevant information -- regardless of whether it comes from a locked filing drawer, a personal email account or a "private" social media page -- is discoverable. 7 Written discovery requests should include language specifically requesting relevant social media content. To the extent the request is challenged on relevancy grounds, the requesting party's preliminary investigation may serve as justification for the request. Screenshots or printouts of publicly available content may help establish the likelihood that relevant information exists within the non-viewable or "private" spheres of a user's social network. 8 Although most courts have found relevant content on a private page to be discoverable, courts take privacy concerns into account to appropriately limit access to information. 9 Therefore, the requesting party should also avoid seeking unfettered access to a user's social media account. Requests that are less intrusive and narrowly tailored to address relevant content and date ranges are more likely to be upheld as reasonable in the face of a challenge. 10 Comprehensive social media discovery strategies also account for the dynamic nature of the content. Social media sites are interactive and frequent user activity means the content is always changing. The risk that an opposing party will remove or alter relevant information can be mitigated significantly by implementing a preservation order for social media content. The language of the order should specifically provide that existing social media is not to be altered. Otherwise, any claimed spoliation may be deemed "unintentional." 11 1 See Barnes v. CUS Nashville, LLC, 2010 WL 2265668 (M.D. Tenn. June 3, 2010) (illustrating the unnecessarily complex process involved in the

discovery of clearly relevant photos on the plaintiff's social media page). 2 FED.R.CIV.P. 34(a)(1) defines "electronically stored information" to include "data or data compilations stored in any medium from which information can be obtained " 3 See Offenback v. L.M. Bowman, Inc., 2011 WL 2491371at 3 (M.D. Pa. June 22,2011)(finding content on plaintiff's social media page that directly refuted claims of "psychological injuries" and inability to participate in certain activities to be discoverable). 4 Such actions are contrary to ABA Model Rule 4.2 and likely violate similar local rules of professional conduct pertaining to deceptive practices such as fraud, misrepresentation and unauthorized contact of a represented party. 5 Although it may be possible to gain access to social media content through a subpoena to the third-party social networking website, the Federal Stored Communications Act (SCA) may preclude a third party from providing certain types of social media content. For a detailed discussion of the SCA requirements related to the discovery of "private" social media content, see Social Media and Word-of-Mouse Discovery Tips, an article in the DRI online newsletter available at the following website link: click here 6 See Katiroll Co., Inc. v Kati Roll & Platters, Inc., No. 10-3620 (GEB), 2011 WL 3583408 (D.N.J August 3, 2011). 7 See Held v. Ferrellgas, Inc., 2011 WL 3896513 (D.Kan. Aug.31, 2011) (finding that relevant information from a plaintiff's Facebook page must be produced, subject to minor limitations.) See also EEOC v. Simply Storage Management, LLC, 270 F.R.D. 430, 436 (S.D. Ind. 2010)(holding that social media content related to the emotional or mental status of the plaintiff was discoverable as relevant to the claims in the workplace harassment suit). 8 See Romano v. Steelcase, 2010 WL 3703242 (N.Y. Sup. Ct. Sept. 21, 2010) (granting requesting party's access to non-public social media content based on publicly available photographs and suggesting additional relevant content was likely to be found in the non-public areas). 9 Held at 1. 10 Effectively drafted preservation orders, like document requests, should also be informed by considerations of relevancy. Although, the scope of preservation is broader than the scope of discovery, the language in social media-specific preservation orders should still be limited to sources of potentially relevant content. 11 See Katiroll Co. v. Kati Roll and Platters, Inc., 2011 WL 3583408 (D.N.J. Aug. 3, 2011) (holding that the alteration of social media profiles was unintentional when the party had not been clearly ordered to refrain from tampering with them). Thorough Custodian Interviews Uncover Valuable Information by Daryl Shetterly Interviewing key custodians is a crucial component of the e-discovery life cycle. Information gathered during custodian interviews helps e- discovery professionals identify relevant documents in the corporation and uncover valuable information that aids in privilege review as well as deposition and trial preparation. It is important that custodian interviews are properly documented for

defensibility purposes. To aid in documentation and ensure consistency across interviews, develop an electronic form that allows the interviewer to record the custodian's answers as they are given. The questions asked during the interview will depend on the facts of each case. However, the six topics below should be addressed during every custodian interview. Potential Privilege Identifying potentially privileged documents related to the data being collected allows access to valuable information that can be shared with the document review and production team. Maintain a list of names and email addresses of each attorney with which the custodian has communicated. Use this information to draft a list of search terms to isolate potentially privileged material prior to review and production. Save time and money by foregoing a frontline review of these documents and instead route them directly to the privilege review team. Legal Hold Notice Case law and The Sedona Conference, among others, indicate that the preservation obligation does not end with a properly drafted and distributed litigation hold notice. It is important to follow up with the custodians. During the custodian interview, ask whether they received, understand and are following the litigation hold. A blank stare followed by the question, "litigation, what?" is generally not a good sign. Scope of Relevant Documents Develop a checklist that tracks the relationship between each custodian and category of the document requests. This will allow e- discovery professionals to see at a glance which custodians have in their possession documents responsive to each document category. When the theory of the case shifts or issues are dropped, refer to the checklist to prioritize documents for production or make prompt exclusion decisions. Tracking this type of information will also aid in identifying gaps in the collection of relevant documents and highlight instances in which the same information is being collected from multiple individuals. This checklist will prove beneficial regardless of how few custodians there are, and it will become indispensible as the custodian list grows. Locations of Relevant Documents Custodians will often identify only a few locations when asked where potentially relevant document may reside. However, by asking specific questions and looking around custodians' offices, e-discovery professionals may find additional files in other folders on their computers or in binders, boxes and external media on their shelves. Walk through a list of potential data sources with each custodian,

including: Corporate email account Personal email account Corporate computers Personal computers Network servers Databases Portable media (CDs, DVDs, external hard drives) Social media sites (Facebook, LinkedIn, Twitter) Text messages or other information on personal or corporate smartphones that are not synced with a computer Audio (voicemail and Skype) Instant messaging Document management tools (SharePoint) In addition, remember to ask about paper documents, which may reside in custodians' offices, centralized departmental storage or offsite archives. Technical Specifications For each source of potentially relevant information identified in the above list, include a description of the data and relevant technical specifications of the storage device on the interview form. Having this information will streamline document collection and ensure that the data is gathered from the correct locations. It also makes it easier to later audit the collection steps. Remember, while the custodian may point to a computer and say that everything is on that computer, the trend toward cloud storage makes it increasingly likely that the data is stored in the cloud rather than on the actual machine. Other Custodians Before concluding the interview, ask each custodian if there are other individuals inside or outside the company who may possess relevant documents. The names gathered will provide early insight into the distribution of relevant documents across the organization in the event the company lacks technology that can provide this type of information. This list will also prove useful if the need to perform additional collections for a particular category of documents arises. Conducting a thorough custodian interview takes time, and in some cases a lot of time. However, the investment put into a custodian interview early in the document collection process will inevitably save hours of work down the road and make for a streamlined and costeffective trial preparation.

CALIFORNIA MASSACHUSETTS NEW JERSEY PENNSYLVANIA CONNECTICUT MICHIGAN NEW YORK VIRGINIA WASHINGTON, D.C. Copyright 2011 LeClairRyan. All rights reserved. To unsubscribe, please reply to this email with UNSUBSCRIBE in the subject line.