CHAPTER 9
The Rise of Social Media and Its Role in Litigation

Sarah Marmor and Deirdre Fox

Today, nearly everyone—individuals, employees, corporations, government entities—has a social media presence. Whether through Facebook, LinkedIn, Twitter, Instagram, Pinterest, Flickr, or YouTube, or any other means by which users create online communities to share information, ideas, personal messages, videos and other content, the ways that people and companies can communicate about themselves are ever expanding.1 This revolution in communication—faster, broader, less mediated, and in many ways more impersonal than ever before—creates enormous opportunities and serious legal risks for organizations.

With social media so commonplace, parties in litigation have discovered and will continue to discover uses for the vast quantities of information that have been casually shared. This chapter focuses on the uses and pitfalls of social media in litigation, ranging from obligations to preserve social media evidence in prelitigation, to informal and formal discovery of such evidence before trial, to effectively using it at trial.2

Roots of Social Media

Precursors to social media trace back to the first e-mail, sent in 1971. In February 1978, the first dial-up computerized bulletin board system (CBBS) was launched, and electronic communication grew in popularity throughout the 1980s. October 1989 saw the birth of America Online, popularizing e-mail to the general public in the United States. And in 1993, students at the University of Illinois created the first graphical web browser, giving rise to what is now called Web 1.0, which enabled users to view websites but not contribute to content.

Soon, however, interaction with websites changed from viewing static web pages to allowing users to provide data and exercise some control over that data, starting with written information. Blogging became popular in the early 2000s. Wikipedia emerged in 2001. LinkedIn and MySpace appeared in 2003. User-created video became vastly easier to share when YouTube went online in 2005. Twitter created a new, instantaneous form of mass communication in 2006. And that same year, Facebook welcomed all users aged 13 and over, allowing users to share many kinds of data: photos, text, and video.

As with almost any innovation, litigation soon followed the rise of social media. The most common claims tied to social media use include defamation, copyright and trademark infringement, and invasion of privacy. Even when lawsuits are not specifically related to social media use, courts and litigants must grapple with this vast trove of potential discovery in claims involving employment discrimination, personal injury, divorce, and unfair competition.

Why, How, and When to Access Data on Social Media in Litigation

The tension between privacy rights and an organization’s rights to protect itself comes into play in informal and formal discovery before and during litigation. Social media postings can be powerful, sometimes crucial, and increasingly collected and proffered as evidence in matters as diverse as criminal cases, employment cases, intellectual property matters, personal injury cases, and family law disputes.3 Indeed, such postings can be significant evidence in any case in which intent, motives, state of mind, or physical or emotional condition are relevant.4 But the notion of lawyers wading through the personal, password-protected musings of individuals likely will feel unseemly, at least, to judges—to some more than others. Certainly, lawyers should seek social media information about parties and witnesses only through legitimate channels, such as searching public portions of sites or using the formal discovery process provided by the applicable rules of civil procedure.5

Social media law generally vacillates between two poles: protecting the right to privacy and self-expression on the one hand, and mitigating risks to organizations and governments on the other. Both concerns are legitimate. In litigation, witnesses and parties may well feel aggrieved by efforts to obtain access to private social media pages, just as corporate entities may well argue that these sources of discovery are entirely legitimate and necessary. The ability to show that gathering and using another’s social media data as evidence more properly falls on one end of the spectrum between these poles likely will dictate success or failure in obtaining and using it in litigation.

Obligations to Preserve Evidence

Difficulties with social media content as potential evidence begin with the obligation of a party to litigation to preserve relevant evidence and a lawyer’s obligation to advise clients to do so. With social media, the user contributes and controls content that is hosted remotely; that content includes different data types and can be accessed through unique interfaces. Social media sites frequently are updated, and these dynamic and interactive sites may not have a good way to track or store changes. Also, multiple sources of relevant information, such as a corporation’s social media communications, management personnel’s personal social media communications, or other employees’ personal social media communications, may be potentially relevant.

These difficulties and technical challenges do not change a litigant’s duty to preserve relevant evidence, and the failure to do so can lead to legal sanctions, as Gatto v. United Air Lines, Inc., illustrates. In Gatto, a personal injury plaintiff claimed permanent disablement, disability limits on physical and social activities, and an inability to work due to a workplace accident. The court ordered him to execute an authorization for the release of documents and information from his Facebook account, and he agreed to change his password to provide defense counsel access. Defense counsel accessed the account, which revealed comments and photographs (relating to trips and online business activities) that arguably contradicted the plaintiff’s claims and testimony. When the defendant sent the plaintiff’s authorization with a subpoena to Facebook, Facebook objected and recommended that the plaintiff as the account holder download the contents. The plaintiff agreed to do so and to certify that the data was not modified or edited. But the plaintiff deactivated the account, and its content was deleted. After finding that the plaintiff had legal control of his Facebook account because “he had authority to add, delete, or modify his account’s content,” the court sanctioned him for spoliation of evidence. In doing so, the court observed that litigants “have a duty to preserve relevant evidence that they know, or reasonably should know, will likely be requested in reasonably foreseeable litigation, and the court may impose sanctions on an offending party that has breached this duty.”6

The lawyer’s ethical duty to advise his client regarding preservation obligations likewise has not changed, and is particularly important where, as here, it can be so easy just to hit the delete button. Information from social media sources should be treated as any other potential source of discovery, and just as with any other relevant evidence, lawyers should counsel their clients to preserve social media information.7

Lester v. Allied Concrete Co. provides a dramatic example of the consequences when a lawyer and his client fail to preserve (and in this case, affirmatively destroy) social media evidence.8 In Lester, a couple was in a terrible car accident, resulting in the death of the plaintiff’s wife. After bringing a wrongful death action, the plaintiff was counseled by his attorney to remove a Facebook photograph that showed him holding a beer and wearing an “I [Heart] hot moms” T-shirt—an image, arguably, that could undermine the widower’s claims in the case. The plaintiff’s counsel e-mailed him “to ‘clean up’ his Facebook page because ‘we do NOT want blow ups of other pics at trial so please, please clean up your facebook[sic] and myspace[sic]!’”9 The plaintiff deleted his page, and then answered a discovery request, “I do not have a Facebook page on the date this is signed.”10 The defendant moved to compel, and the plaintiff reactivated his Facebook account.11 After the plaintiff went on to testify that he never had deactivated his Facebook page, the defendant issued a subpoena to Facebook to verify that testimony and hired an expert, who determined that 16 pictures had been deleted. These pictures ultimately were produced to the defendant.12 Although the defendant eventually obtained the desired evidence, the trial court issued a spoliation inference instruction and sanctioned the attorney in the amount of $542,000 and the widower plaintiff in the amount of $180,000.13 The Virginia Supreme Court characterized the attorney’s conduct as “patently unethical.”14 Indeed, published reports indicate the lawyer’s license was suspended and he has ceased practicing law as a result of this case.15

The Lester case is a strong reminder that every lawyer should include social media preservation on a standard investigation checklist at the outset of litigation. And every lawyer should include social media in a litigation hold letter in anticipation of litigation.

Accessing Social Media

Evidence may be available on publicly viewable social media sites, such as Facebook or LinkedIn, and case investigations should include searches on these public sites.16 Courts consistently have held that a reasonable expectation of privacy does not accompany publicly available social media content, although periodically, challenges are still made.17

However, users may have restricted access to the content of their social media sites through privacy settings, and relevant content may not be publicly viewable. While relevant nonpublic content generally may be accessed through formal discovery in litigation, when obtaining content from nonpublic portions of social networking websites, care must be exercised to comply with the law and avoid liability for improper access.

From Whom Is Social Media Discoverable?

Federal and state laws and the ethical obligations of lawyers restrict from whom nonpublic social media evidence can be obtained.

The Stored Communications Act

Organizations, investigators, and lawyers will not want to run afoul of the Stored Communications Act (SCA).18 Congress passed the SCA in 1986, well before the rise of social media, “because the advent of the Internet presented a host of potential privacy breaches that the Fourth Amendment does not address.”19 Courts since have held that social media sites, such as Facebook, are electronic communication service (ECS) or remote computing service (RSC) providers, or both, and therefore are within the scope of the SCA’s protections.20 In short, the SCA prohibits providers from divulging the content of private, electronic communications to the government or to private parties.21

Critically, the SCA does not make an exception for civil discovery subpoenas.22 Consequently, Facebook has taken the position that the SCA “prohibits Facebook from disclosing user content (such as messages, timeline posts, photos, etc.) in response to a civil subpoena.”23 Users of services subject to the SCA generally have standing to seek to quash subpoenas to third-party service providers when the subpoenas seek the users’ electronic communications.24

Not only will subpoenas directed to social media sites likely fail to result in the desired discovery, such subpoenas may result in liability. With certain exceptions, the SCA prescribes criminal penalties and provides a private civil right of action against anyone who “(1) intentionally accesses without authorization a facility through which an electronic communication service is provided; or (2) intentionally exceeds an authorization to access that facility; and thereby obtains, alters, or prevents authorized access to a wire or electronic communication while it is in electronic storage in such system. . . .”25 That “anyone” can include the lawyer issuing the subpoena, so caution in this area is crucial.

The SCA expressly allows a service provider to divulge contents of a communication if the service provider has the lawful consent of the originator or recipient of the communication.26 This means that users (account holders) may voluntarily consent to disclose their social media content. Facebook content, for example can be downloaded by logging into a given Facebook account, selecting “account settings,” clicking on a link entitled “download a copy of your Facebook data,” and following the directions on the data download page.27

Of course, the one granting consent must be a “user.” In Konap v. Hawaiian Airlines, Inc., an employee gave certain coworkers authorization to access a secure website, and those coworkers agreed to allow management to access the secure site.28 The court reversed summary judgment for the employer on an employee’s SCA claim, concluding that the coworkers never actually “used” the website and therefore were not “users” within the meaning of the SCA’s exception for consent authorized by a “user” of the service.29

A user’s consent to disclose social media content must be voluntary and care must be taken not to exceed authorized access. Pressuring employees to provide access to private social media sites can violate SCA, as restaurant managers learned in Pietrylo v. Hillstone Rest. Grp.30 In Pietrylo, employees of a chain restaurant set up a private, invitation-only MySpace group that existed to discuss work conditions at the restaurant where they worked. Two managers learned of the page and demanded the password from one of the employees. The managers continued to access the chat room even though they knew the employee had reservations about providing her password. The court found such access was unauthorized and violated the SCA, among other laws.31

State Laws Limiting Employer Access to Employee Social Media

Employers investigating employees for employee misconduct, to protect trade secrets, and to prevent workplace violence, in particular, must be mindful of the proliferation of written state laws that restrict asking employees to allow access to the private sections of their social media (outside of formal discovery in litigation).

Significant public attention was brought to bear on employers’ use of social media after reports surfaced about employers asking candidates for passwords to applicant’s Facebook accounts during the hiring process.32 The resulting public outrage led 12 states to pass laws prohibiting employers from asking for or requiring an employee or applicant to disclose a user name or password for a personal social media account: Arkansas, California, Colorado, Illinois, Maryland, Michigan, Nevada, New Jersey, Oregon, Utah, Washington, and New Mexico.33 More states are likely to follow suit.34

These laws vary in the scope of their restrictions on employers. Across the board, they preclude employers from requiring or requesting employees to disclose usernames and passwords to personal social media accounts. A few statutes stop there.35 Others also ban employers from requiring or requesting employees or prospective employees to add an employee, supervisor, or administrator to contacts associated with his or her social media account.36 Others preclude requiring or requesting an employee or applicant to access personal social media in presence of employer—that is, looming over the employee’s shoulder37—or to change their privacy settings.38 California broadly does not permit employers to require employees or applicants to “divulge any personal social media,” unless a statutory exception applies.39

Many of these laws, to varying degrees, do carve out relatively narrow exception(s) that permit an employer to request or require social media content of an employee to comply with state and federal laws, rules, and regulations or to conduct a legitimate employment investigation to ensure compliance with applicable laws, regulatory requirements, or prohibitions against work-related employee misconduct if the employer has reason to believe, based on specific information, that content of an employee’s personal online account or service is implicated or otherwise involved.40 For example, New Jersey’s new social media privacy law, which took effect on December 1, 2013, allows an employer, after receiving specific information, to investigate a violation of law, employee misconduct, or the unauthorized transfer of proprietary, confidential, or financial information via an employee’s personal social media account.41 Notably, these laws generally require the employee’s personal social media account to be involved in the violation under investigation. Such exception(s), while allowing employers to request or require sharing of social media content, still may not allow employers to request or require passwords or to log on to the employee’s account(s).42 Importantly, not all such state employment social media privacy statutes expressly make exemptions for employers conducting investigations into workplace misconduct.43 And only Arkansas expressly extends the exception to investigations of violations of employer policies.44

Although statutory language varies somewhat from state to state, the statutory restrictions generally do not apply to accounts opened at an employer’s request, or provided or paid for by an employer, or set up on behalf of an employer,45 or under some statutes, to accounts or services obtained “by virtue of ” the employment relationship or used for the employer’s “business purpose”—although there is variation in statutory language.46 Arkansas’ restrictions do not apply to an account set up to impersonate an employer through use of the employer’s name, logos, or trademarks.47 A few states make it clear an employer can view information that is publicly available on the Internet,48 although there is no reason to think otherwise. Some specify that an employer is not liable for receiving an employee’s personal social media account username or password through use of an electronic device the employer provided to the employee or a program that monitors the employer’s network, but the employer may not use that information to access the employee’s social media account.49

Attorney Ethical Limitations

It is unethical for attorneys, either themselves or through an agent, to use deceptive means to “friend” or cause another to “friend” a person to access social media postings that have a heightened privacy setting. The Philadelphia Bar Association Professional Guidance Committee has issued an advisory opinion, concluding that sending an anonymous friend request to a witness MySpace or Facebook account to gain access to nonpublic information would violate Rule 4.1, which prohibits knowingly “mak[ing] a false statement of material fact or law to a third person . . .” and Rule 8.4(c) of the Rules of Professional Conduct, which provides that it “is professional misconduct for a lawyer to . . . engage in conduct involving dishonesty, fraud, deceit, or misrepresentation.”50 The New York City Bar has issued a formal statement opining that a lawyer “may not attempt to gain access to a social networking website under false pretenses, either directly or through an agent.”51 Furthermore, in the case of a represented party, prior consent of counsel is required.52

Discoverability of Relevant Social Media

Once litigation is underway, the most effective way to obtain social media content is through the user of social media him or herself, oftentimes (but not always) a party to the litigation. Courts can and do permit discovery of social media sites, including content to which access is restricted by the user’s privacy settings, from the social media user, but only if the party seeking the information can demonstrate that the social media content is relevant to the claims and defenses in the litigation.

A widely discussed case concerning the right to access social media evidence is EEOC v. The Original Honeybaked Ham Company of Georgia Inc., a sexual harassment suit on behalf of a class of 22 women against a manager at the Honeybaked Ham Company.53 The defendant sought social media evidence and text messages to dispute liability and damages claims, and the district court eventually sanctioned the EEOC for failing to provide social media discovery and for causing unnecessary delays in the eDiscovery process.54

Rejecting the EEOC’s strenuous objections that such discovery violated the privacy rights of the plaintiff class members, the magistrate judge described the social media content as akin to a “file folder titled ‘Everything About Me,’ which [class members] have voluntarily shared with others.”

If there are documents in this folder that contain information that is relevant or may lead to the discovery of admissible evidence relating to [the] lawsuit, the presumption is that it should be produced. . . . Should the outcome be different because it is on one’s Facebook account? There is a strong argument that storing such information on Facebook and making it accessible to others presents an even stronger case for production, at least as it concerns any privacy objection. It was the claimants (or at least some of them) who, by their own volition, created relevant communications and shared them with others.55

The court did not fully reject notions of privacy, however. The magistrate judge made the somewhat novel decision to have the social media information provided to a special master—a computer forensic company that was presumably well-versed in data mining in eDiscovery—and also provided that only relevant information would be turned over to the defense after an in-camera review. In November 2012, the magistrate court ordered all claimants to turn over to the special master social media communications and any cell phone used to send or receive text messages during a three-year period for a forensic collection and review, and to provide access to any e-mail account, website, or cloud-based storage location that they used to post communications or pictures.

Commentators have hailed this decision as evidence that the sometimes lopsided burdens of discovery between defendants and plaintiffs are being evened out—at least in employment cases. Indeed, given the burgeoning use of electronic media, and the consequent plethora of digital information to discover, the ability to seek such information in litigation is likely to become a significant aid to defendants in litigation. At least one other court in Pennsylvania has followed the example of Honeybaked Ham.56

However, other courts, concerned about the burden on judicial resources, have declined to appoint special masters or engage in such in-camera review. These courts instead rely on plaintiffs’ counsel, in light of counsel’s ethical obligations, to review plaintiffs’ social media for documents response to document requests.57 Some courts also have declined to require plaintiffs to provide passwords, relying instead on plaintiffs’ counsel to turn over responsive social media.58 Finally, a special master and/or in-camera process increases the expense of litigation, and those costs may well be split or borne by the party seeking the discovery.59

As with any other kind of evidence, courts will not allow a party to “conduct ‘a fishing expedition’ . . . on the mere hope of finding relevant evidence,”60 and there is no “generalized right to rummage at will through information that Plaintiff has limited from public view.”61 Overly broad document requests are often denied; therefore requests are more likely to succeed if they are tailored to seek relevant categories of social media evidence.62

Not only must a lawyer ask the right person for social media evidence (the social media user), but the requesting party must demonstrate the relevance of the evidence sought. When social media evidence is sought, the threshold showing of relevance may be heightened by some courts and jurisdictions, in part out of concern over privacy concerns.63 Other courts have rejected applying a heightened threshold to social media discovery, reasoning that it is no different from other forms of discovery.64 It is prudent to be familiar with the articulation of the relevance predicate for a particular jurisdiction, court, and judge.

Process of Collecting Social Media Content

As with any other electronically stored information (ESI), planning, documenting and verifying the data collection process and results, which may be supported with affidavits or testimony, is key to withstanding either allegations of spoliation or challenges to later use of the social media content as evidence. The standards, principles, and protocols that have evolved for collection and preservation of ESI are applicable to social media content. However, because of its fluid nature, social media can present particular challenges when applying these standards, principles, and protocols.65

The best approach is to confer with opposing counsel and agree to reasonable steps for preservation and collection.66 But such consultation may not be possible when the duty to preserve is triggered because the opposing party or counsel may not be identifiable then.67

Some court precedent permits the use and introduction of static images—screenshots and pdf images—collected from social media sites, which is economical, as a means of preserving relevant content of sites.68 However, capturing social media content by static printing may not be complete and accurate, and may be challenging to authenticate if opposed. Such capture also will not properly collect nonstatic content like video content.

Another possible process—a video or interactive software demonstration of the collection of the content, thereby creating a record of navigating the site—may relay the dynamic information more accurately.69 Any collection of the content of social media sites represents the site at the fixed time at which the content was collected; thus, periodic collections may be needed.70 Additionally, a collection likely will have been captured without also collecting metadata and logging data that is useful to authenticating the data for uses as evidence and without the benefit of useful data that allows the content to be easily navigated and used.71

Consequently, tools for preserving and collecting social media content are being developed and rapidly are evolving—at least one eDiscovery software solution now exists that can instantly search and capture social media content in its native format, that is, the format of the social media application used to create and store it. This includes metadata, or “data about data” that is stored electronically and describes the characteristics of the social media content that can assist in establishing the chain of custody and authentication of the content and can facilitate more accurate and efficient data processing and review.72 As each social media site is unique, tools used to preserve and collect content from one site may not work for another.73

Using Social Media in Litigation

Of course, social media evidence—like any other evidence—must be relevant, authentic, offered for a non-hearsay purpose or admissible under an exception to the hearsay rule, comply if necessary with the original writing or best evidence rule, and the probative value must outweigh any unfair prejudice. The discussion that follows focuses on authentication and hearsay hurdles because authenticity of social media evidence has presented a significant challenge in a number of cases, with courts reaching widely disparate conclusions depending on the court’s preexisting sense of concern about potential abuse and manipulation of social networking, and because the immediacy and unmediated nature of social media evidence lends itself well to certain hearsay exceptions.74

Authenticity Has Presented a Significant but Undeserved Challenge

Courts have been suspicious of the “potential for abuse and manipulation of a social networking account by someone other than its purported creator or user.”75 Consequently, the most significant hurdle in using social media evidence in litigation is the authentication required for it to be admitted into evidence. It is worth remembering that inauthentic evidence is irrelevant because “‘evidence cannot have a tendency to make the existence of a disputed fact more or less likely if the evidence is not that which its proponent claims.’”76

Concerns about social media—which often are speculative—include hacking, ease of creating fictitious accounts, and the fact that accounts on phones and computers are simply left open and unattended.77 Such possibilities have led numerous courts to set a significantly, sometimes impossibly, higher bar for authenticating social media evidence—even absent any evidence of such hacking, fictitious accounts, or unattended computers or devices.78 Such courts do not admit social media evidence unless the court definitively determines the evidence is authentic.79

Griffin v. State illustrates this “higher bar” approach. In Griffin, the state offered printouts from the MySpace page profile of the girlfriend of a defendant in a murder trial; the printouts included the statement, “Free Boozy [Defendant’s nickname] Just Remember Snitches get stitches U Know who you are.”80 In the state’s offer of proof of authenticity, the lead investigator stated that he knew the page was the girlfriend’s page because of a photo of her and Boozy on front, references to Boozy, references to the girlfriend’s children, and her birthdate on the printout.81 The trial court admitted the printout, and on appeal, the appellate court also found that the state’s circumstantial evidence of authenticity was sufficient.82 However, the Court of Appeals reversed, concluding that (i) the picture, birthdate, and location of the girlfriend on the printout were not distinctive enough characteristics, (ii) that anyone could create the site and post photos and content, and (iii) that the account could be hacked or a fictitious account.83 The Court of Appeals required, instead, either that the creator be asked if she created the profile and posts, or a showing that her computer was used to create the profile and to make the posts and that her Internet address and so forth were used to link to the profile.84

Unlike Griffin and similar cases, other courts have followed a “conditional relevance” approach to authentication that is consistent with the judge’s and the fact finder’s roles under Rules 104(a) and 104(b) of the Rules of Evidence, consistent with the admissibility standard for whether “the matter in question is what its proponent claims” under Rule 901(a), and consistent with the myriad of illustrative examples for authenticating evidence that are spelled out in Rule 901(b). In such cases, a court asks whether there is sufficient evidence of authenticity for a reasonable jury to conclude the evidence is authentic.85 Preliminary determinations of admissibility of evidence are made by the judge under Rule 104(a) and may be made using inadmissible evidence.86 If a question of fact must be resolved to determine admissibility, for example, by weighing circumstantial evidence that an account was created and maintained by a particular person and evidence that the account is fictitious, evidence may be conditionally admitted under Rule 104(b), and the trier of fact will resolve the factual issue based on admissible evidence.87

Tienda v. State illustrates the “conditional relevance” approach.88 The state in Tienda offered MySpace pages from three MySpace accounts that allegedly belonged to the defendant.89 Each account stated that it was “created by a ‘Ron Mr. T’” or Tienda’s well-known nickname, “Smiley-Face,” and that the account owner lived in Dallas or D-Town, where Tienda lived.90 The accounts were registered to e-mail addresses that included Tienda’s name or nickname.91 One account included a heading, “RIP [the victim],” above a link to a song played at the victim’s funeral.92 The accounts linked to photographs of someone who resembled Tienda. Instant messages between the owner of the account and others included details about the murder in question and said that the account owner was placed on electronic monitoring.93 The sponsoring witness for the pages was the sister of the victim, who had directed the state to them, and a detective testified about typical gang usage of social media.94 On the other hand, Tienda elicited testimony about the ease by which a person could create a MySpace page in someone else’s name and send messages purportedly written by that person without their approval.95 The Tienda trial court admitted the MySpace pages as evidence, and an intermediate appellate court concluded that the trial court did not err. The Court of Criminal Appeals of Texas agreed: There was “ample circumstantial evidence—taken as a whole with all of the individual, particular details considered in combination—to support a finding that the MySpace pages belonged to [Tienda] and that he created and maintained them,” and whether the page had been fabricated was an “alternate scenario whose likelihood and weight the jury was entitled to assess.”96

Indeed, the standard for whether “the matter in question is what its proponent claims” under Rule 901(a) is “quite low—even lower than a preponderance of the evidence.” In Lorraine v. Markel American Insurance Company, Hon. Judge Paul Grimm noted:

A party seeking to admit an exhibit need only make a prima facie showing that it is what he or she claims it to be. This is not a particularly high barrier to overcome. . . . ‘The question for the court under Rule 901 is whether the proponent of the evidence has ‘offered a foundation from which the jury could reasonably find that the evidence is what the proponent says it is. . . .’ The Court need not find that the evidence is necessarily what the proponent claims, but only that there is sufficient evidence that the jury ultimately might do so.97

Because both the “higher bar” and the “conditional relevance” approach continue to coexist, it is prudent to research the positions of a particular jurisdiction, court, and judge; identify potential challenges to admitting the evidence, and have a plan (or more than one plan) for admitting the evidence from the beginning of investigating and developing a case; and to gather and document the collection of social media evidence with such plan(s) for admitting the evidence and using it.

As a practical matter, in many cases, the form of the social media evidence will be printouts or screen shots, and the authentication plan may be as simple and effective as a party admission or a stipulation from the opposing party on the foundation for the authenticity of the print outs or screen shots. A party admission can be obtained at deposition or through Rule 26(f) requests to admit. Production of documents by the opposing party in response to a well-tailored document request raises a presumption of genuineness. The content of social media also could be pleaded in a complaint, and thus potentially admitted in the answer.

Applying Rule 901(a)’s Illustrative Authentication Examples to Social Media

Rule 901(b) of the Rules of Evidence spells out illustrative examples of ways to sufficiently authenticate evidence. Some of these are particularly helpful for authenticating social media.

First, Rule 901(b)(1) allows evidence to be authenticated by testimony of a witness with knowledge “that a matter is what it claims to be.” Circumstantial evidence may be used to infer that a person is the author of social media content. A witness with personal knowledge may testify that she knows the user name on the website of the person in question, that the evidence offered (e.g., printouts) accurately reflects the material on the person’s page, and that some of the content from the page is unique or generally would be known only by the person in question or people closely associated with the person. Also, evidence from the hard drive of the person’s computer may reflect that the user used the particular screen name associated with the postings.

Courts have assessed the authenticity of ESI using the testimony of a witness with “personal knowledge of how that type of exhibit is routinely made who provides ‘factual specificity’ about how the ESI is ‘created, acquired, maintained, and preserved without alteration or change’ or about how it was produced ‘via a system or process that does so.’”98 In Dockery v. Dockery, printouts of MySpace e-mails, in which a defendant asked his ex-wife’s friend to ask her to call him, were authenticated by the ex-friend’s testimony about the contents of the conversation between her and the defendant, her testimony that the printouts accurately reflected those conversations, and her testimony that she printed them directly from her computer.99 A MySpace representative was not required to authenticate the MySpace e-mails.100

Second—and oft-used—Rule 901(b)(4) allows evidence to be authenticated by showing distinctive characteristics such as “[a]ppearance, contents, substance, or internal patterns . . . taken in conjunction with [the circumst]ances” to provide a basis for reasonably concluding that the evidence is what it purports to be.” This rule has been a frequent way to authenticate e-mail content through distinctive characteristics in the content of the e-mail itself based on the identifying content of what the e-mail says.101 The same approach can be applied to social media postings and messaging. Distinctive characteristics can include hash values and metadata, in addition to the content of the postings.

Third, Rule 901(b) (6) allows evidence from a telephone conversation to be authenticated by the reply doctrine or “circumstance, including self-identification, [that] shows the person answering to be the one that called,”102 and identifying through responding to details that indicate he knew what the call recipient was talking about. This can be analogized to social networking conversations.

Fourth, Rule 901(b) (9) allows evidence about a process or system to be authenticated by evidence “showing that it produces an accurate result.”103 This will require a witness who has personal knowledge under 602 to explain how the social media evidence was created or an expert qualified under Rule 702 who can provide opinion testimony.

Hearsay and Social Media Evidence

As with authentication, lawyers should have a plan for overcoming hearsay objections to the use of social media as evidence. Hearsay issues are “pervasive when electronically stored and generated evidence is introduced.”104 Much of the content on social networking sites, however, probably is not hearsay, because it is not offered to prove the truth of the matter asserted—but rather is offered for the fact that it was said or posted—or because the content is posted by a party opponent and excluded from the definition of hearsay under Rule 801(d)(2) of the Rules of Evidence.

The content of social media also could fall within one or many of the exceptions to the hearsay rule. As Hon. Judge Grimm observed in Lorraine, “given the ubiquity of communications in electronic media (e-mail, text messages, chat rooms, Internet postings on servers like ‘MySpace’ or ‘YouTube’ or on blogs, voice mail, etc.), it is not surprising that many statements involving observations of events surrounding us, statements regarding how we feel, our plans and motives, and our feelings (emotional and physical) will be communicated in electronic medium. . . .”105

Rules 803 and 804 provide numerous exceptions for types of hearsay that are admissible because the statement has some degree of inherent trustworthiness. Hearsay exceptions dealing with perceptions, observations, state of mind, and sensation are particularly amenable to social media because of the immediate, interactive nature of social media: present sense impressions (803(1)); excited utterances (803(2)); then existing mental, emotional, or physical condition (803(3)).

First, Rule 803(1) provides an exception for statements that describe an event or condition while personally perceiving it or immediately thereafter. Through Twitter, Facebook, text messaging, and so on, users constantly are telling the world about events as the events occur.

Second, Rule 803(2) provides an exception for statements made under the stress and excitement of a startling event or condition that related to that event or condition—excited utterances. Statements made through Twitter, Facebook, text messaging, and the like, because of their typical immediacy, lend themselves to fitting within this exception. Practitioners should, of course, take care to lay a foundation that particular postings qualify under this exception.

Third, Rule 803(3) provides an exception for a statement of the “[t]hen existing state of mind, emotion, sensation, or physical condition (such as intent, plan, motive, design, mental feeling, pain, and bodily health)” of the declarant, but not a statement of memory or a belief to prove the fact remembered or believed (unless it related to a will). Rule 803(3) has been used to prove a variety of matters, including why a declarant would not deal with a particular supplier or dealer, motive, competency, lack of intent to defraud, willingness to engage in criminal conduct, confusion or secondary meaning in a trademark infringement case, and so forth.106

Of course, social media content proffered to prove the truth of a matter asserted, which is not an admission by a party opponent or which does not fall within an exception, will be excluded as inadmissible hearsay.107

Notes

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset