Privacy

When Is An Employer Permitted To Monitor and Review An Employee’s Internet Activity and Usage?

On March 10, 20108, Marc Liebeskind began working at Rutgers Facilities Business Administration Department.  By March 28 of that year, Liebeskind was terminated for lacking the basic skill set needed to perform his job in addition to having a poor attitude while on the job. Liebeskind’s supervisors had suspected he was spending an unreasonable amount of time on non-work related activities on his work computer. Having doubts about Liebeskind’s work performance, his supervisors reviewed the browsing history on Liebeskind’s computer by using an application called IEHistoryView. It is important to note that this search only entailed browsing history, and there is no evidence that Liebeskind’s supervisors were granted any access to his personal or password-protected information and accounts. After his termination, Liebeskind filed suit against Rutgers University and his supervisors, claiming invasion of privacy, among other claims. On appeal, the New Jersey Superior Court Appellate Division affirmed the lower court’s ruling, which ruling struck down all claims that Liebeskind’s privacy was violated as a result of his supervisors’ investigating the browser history on his computer. The appellate court referenced the New Jersey Supreme Court’s Stengart ruling, which had set the precedent for an employer’s right to monitor employee Internet activity and usage. Closely followed in previous eLessons Learned posts, the 2010 Stengart ruling held that an employee’s email communication with her attorney, using a company-issued computer, but via a personal, password-protected email account was held to be protected by the attorney-client privilege. However, the court’s decision to uphold Stengart’s privacy was not intended to forbid employers from monitoring employees’ actions on company-issued computers or devices in the future. In Stengart, New Jersey’s highest court stated: “Companies can adopt lawful policies relating to computer use to protect the assets, reputation, and productivity of a business and to ensure compliance with legitimate corporate policies.” As noted in Liebeskind, Rutgers’ “Acceptable Use Policy for Computing and Information Technology Resources” was in effect during the time of Liebeskind’s employment. This policy expressly stated that an employee’s privacy “may be superseded by the University’s requirement to protect the integrity of information technology resources, the rights of all users and the property of the University.” Additionally, Rutgers University “[r]eserve[d] the right to examine material stored on or transmitted through its facilities.” Unlike the findings in Stengart, the court established that Liebeskind did not have a “reasonable expectation of privacy.” In addition, the court agreed that Rutgers had a “legitimate interest in monitoring and regulating plaintiff’s workplace computer.” All companies can learn from this case and the policies in place at Rutgers that protected its right to monitor and search an employee’s computer. One of the most important lessons to be learned here is the need for a written internet usage policy. At the very least, these written policies should mandate that employees are expected to use the Internet and their work issued computers for work related activities only. Additionally, the possible disciplinary actions for any violation of this policy should be made available to employees. As seen in in this case, the existence of an internet usage policy and the reserved right of a company to monitor its employee’s Internet activity is the key to eliminate an employee’s reasonable expectation of privacy.

Want to Keep Your Dirty Laundry Private? Don’t Air It On An Employer-Issued Communications Device

Facts of the Case The employee in this case was not some floozy with limited knowledge of how the world works. Rather, he was a veteran sergeant of the Ontario, California, police force and a member of its S.W.A.T. team. In 2001, the Ontario Police Department (OPD) issued alpha-numeric pagers to his team in order to facilitate communications between members, which, as you can imagine, would be extremely useful in the field and efficient at the office. OPD then put in place a “Computer Usage, Internet and E–Mail Policy” which the employee signed a statement that said he had read and understood the policy. It expressly reserved the right to monitor all of the network activity, which included e-mail and Internet use. Additionally, the policy said that there should be no expectation of privacy when using the network. The problem was that the computer policy did not cover text messaging, at least expressly, since the pagers were contracted out to a company called Arch Wireless. Therefore, all communication passed through their network, and a copy of all communications was retained on their servers after delivery. However, the OPD made it clear to all of its employees, in a meeting that the employee attended, that the messages sent on the pagers were to be treated as e-mails, meaning that they were subject to the same computer policy. As it turned out, the employee exceeded his monthly text character allotment, almost immediately, and for a period of a few months. He paid for those overages, but the OPD decided that enough was enough. The police chief launched an investigation, ostensibly in order to determine whether the employees were being forced to pay out of pocket for overages on work-related messages due to an overly-restrictive character limit, or if the messages were personal. Transcripts of the messages from the previous 2 months were obtained, and revealed material that was personal, and some sexually explicit, in nature. The employee was then disciplined. Claims by the Employee The employee essentially brought two claims: 1) that the OPD violated the Stored Communications Act (SCA) and 2) his Fourth Amendment privacy rights, by obtaining and reviewing the transcripts of the messages. The first claims was not before the Supreme Court on its merits, since the lower court decided that Arch Wireless was forbidden to turn over the transcripts, and this was not contested. However, the Fourth Amendment claim was alive and well. As with most Fourth Amendment claims, the crux of the issue is whether there is a reasonable expectation of privacy that was violated. The Fourth Amendment guarantees the right of people to secure against unreasonable searches and seizures by the government of their stuff. This has been applied to the government acting as an employer as well. The analysis of such claims, however, was the subject of dispute among the Supreme Court justices in a case called O’Connor v. Ortega. In that case, the plurality opinion of the Court said that the question of whether an employee has a reasonable expectation of privacy is to be decided on a case-by-case basis. If there is an expectation of privacy, is an intrusion on that reasonable under the circumstances. Justice Scalia said that there is a blanket expectation of privacy for government employees, but the employers can search to retrieve work-related materials, etc. Here, the Court expressly punted the issue of whether there was, or is, an expectation of privacy for communications made on electronic equipment owned by a government employer. The Court cited the difficulty in predicting how the expectation of privacy will be shaped by the rapid changes in the dynamics of communication and information transmission. Instead, the Court cautioned “prudence” to avoid deciding this important issue, and instead decided the case without it. The Court stated that even if the employee had a reasonable expectation of privacy in his messages, and therefore protected by the Fourth Amendment, the “search” done by OPD didn’t necessarily violate it. The “special needs” of the workplace were said to be an exception to the rule that all warrantless searches are automatically unreasonable. There was a reasonable ground for assuming that the search was necessary for a work-related purpose, not just to invade the employee’s privacy. Rather, their interest was to ensure the employees were not paying out of pocket for work-related expenses. Therefore the review of the transcripts was reasonable. Also, the employee should not have expected that his messages were going to remain private under all circumstances, since he was told that the messages were subject to auditing. Additionally, the scope of the search was reasonable as well, since it did not reveal the details of the employee’s life, since the private messages in the search sample were redacted. Ultimately, the sergeant should have known better than to air his dirty laundry on a government-issued communications device. Although the Court avoided deciding whether there is an expectation of privacy, they made it pretty clear that if there was a well-distributed policy, and if the review of the messages is ostensibly for work-related issues, that such a “search” will be permissible. Akiva Shepard received his J.D. from Seton Hall University School of Law in 2014. Akiva has worked for a New York State Supreme Court Judge in Kings County and for a NJ real estate firm. 

Does the Government Need a Warrant to Access Cell Phone Tracking Information? Third Circuit Says “No.”

Big Brother is always watching and listening.  If there’s one lesson to take away from the recent NSA scandals it’s that the government is not only capable of tracking your every digital move, but also acting on that capability.  Now, according to the Third Circuit, the government can use the broad language of the Stored Communications Act to force cell phone providers to turn over a criminal suspect’s phone’s historical location data. In a lengthy and drawn-out criminal investigation, the Third Circuit became the first federal court of appeals to decide a crucial issue that required balancing a cell phone user's privacy rights with a law enforcement agency’s needs to acquire potentially vital information.  The government attempted to use the Stored Communications Act to force a suspect's cell phone company to turnover cell site location information or CSLI.  Hoping to prevent an unjust and unwarranted intrusion or breach of a citizen's privacy expectations, the Electronic Frontier Foundation (EFF) filed a response in opposition to the government’s efforts.  The Third Circuit was then forced to determine whether or not the government could obtain this information without first establishing probable cause or acquiring a warrant. The information at issue in the matter is commonly kept by all phone companies and service providers as part of their routine business operations.  Every time a call is made via a cell phone, signals are transmitted via nearby cell phone towers.  These towers then collect and store data that can later be used to establish the general area where the individual was located when making the call at issue.  The information would not provide the exact location of the cell phone at the time of the call, but would instead allow the government to infer as to where the party where was located.  Even though this would seem like a minor distinction, in the eyes of the court it is incredibly important because it weakens any argument that the cell phone acts as a tracking device which would raise significant Fourth Amendment concerns under Supreme Court precedent. According to the exact language of the Stored Communications Act, a court can order the disclosure of this information if the government “offers specific and articulable facts showing that there are reasonable grounds to believe that the contents of a wire or electronic communication, or other records or other information sought, are relevant and material to an ongoing criminal investigation.”  18 U.S.C. § 2703.  The government argued that it met this burden because the information it was seeking was relevant and material to an investigation of narcotics trafficking and other violent crimes.  The EFF attempted to combat these claims by arguing that to obtain the information the government must obtain a warrant by establishing probable cause. Ultimately, however, the court held that the information was in fact obtainable by the government without a warrant or probable cause under the language of the Stored Communications Act.  According to the court, the Act’s language provided a specific test to determine whether an order granting the discovery of such information should be granted.  If Congress wanted to implement a warrant requirement, it could have specifically done so.  Instead, Congress chose the lesser standard of specific and articulable facts. The court, however, also went on to hold that the Act’s language actually granted a magistrate judge discretion as to whether or not to require a warrant showing probable cause.  Because the Act states that an order “may be issued” rather than requiring it, a judge deciding whether or not to allow access to such information could require a showing of probable cause. Additionally, the court established that a cell phone customer does not voluntarily share his or her location information with a service provider because the customer is probably unaware that their providers are in fact collecting and storing this historical information.     Although the Third Circuit’s holding is strictly limited to the collecting of historical cell phone location information, the decision ultimately has far-reaching consequences.  In the field of electronic discovery, privacy is an ongoing topic of debate, especially with the recent revelations of the massive amounts of data the government is in fact already collecting.  Because electronically stored information can provide a bevy of potentially vital information in easily manipulated formats, law enforcement agencies will continue to access it wherever possible.  Courts will continually be asked to balance individual privacy concerns with the broad policies of discovery. Jeffrey, a Seton Hall University School of Law graduate (Class of 2014), focused his studies primarily in the area of civil practice but has also completed significant coursework concerning the interplay between technology and the legal profession.  He was a cum laude graduate of the University of Connecticut in 2011, where he received a B.S. in Business Administration with a concentration in Entrepreneurial Management. 

To Shred or Not To Shred

“Follow the document policy!” Those were the words repeated many a time by Arthur Anderson to Enron’s employees during the pending SEC investigation. Those simple words led to a jury’s finding Anderson guilty of witness tampering through the act of persuading his employees to destroy relevant documents. The jury found Anderson guilty of violating 18 U.S.C. §§ 1512(b)(2)(A) and (B), which makes it a crime to “knowingly us[e] intimidation or physical force, threate[n], or corruptly persuad[e] another person . . . with intent to . . . cause . . . ” that person to “withhold” documents from, or “alter” documents for use in, an “official proceeding.” The Fifth Circuit Court of Appeals upheld this decision. However, the Supreme Court reversed this decision determining that the jury instructions were improper. The Court focused on “what it means to ‘knowingly . . . corruptly persuad[e]’ another person ‘with intent to ... cause’ that person to ‘withhold’ documents from, or ‘alter’ documents for use in, an ‘official proceeding.’” The Court held that this language required a proof of consciousness of wrongdoing. The Court additionally found that the jury instructions provided by the district court did not adequately outline the requirement for the consciousness of wrongdoing. Besides not including the proper intent, the district court also misapplied the “corruptly” definition by leaving out the word “dishonestly” and inputting “impede” in place of “subvert or undermine.” “These changes were significant. No longer was any type of “dishonest[y]” necessary to a finding of guilt, and it was enough for petitioner to have simply “impede[d] the Government's fact-finding ability.” In addition, the Court noted that jury instructions did not require any finding of a nexus between the “‘persua[sion]’ to destroy documents and any particular proceeding.” Even though it is illegal to directly persuade someone to destroy documents in the face of a pending litigation, the Court wanted to emphasize that there is a requirement of knowledge about both a pending proceeding and the materiality of the documents to be found guilty of violating the witness tampering statute. Overall, because of the inaccurate jury instructions, the Court here reversed the decision so another jury could hear the evidence along with proper instructions in making their decision. Though this decision seems to make some room to get out of the witness tampering statute, it is always best to have a proper document retention policy and to not persuade any form of destruction.

How Can You Check if Your Insurance Customer is Faking an Injury? Get Evidence Before Requesting Access to Their Social Media!

A growing trend in insurance disputes is a demand for insurers to have access to the claimant’s social media content.  In January 2013, the District of Montana had to consider whether to compel a woman to produce all of her social media photos.  The court did not grant this request and the decision serves as a good example of what is, or is not, an effective way to request this information. In Keller, one of the plaintiffs claimed she injured her head, neck, and back in an automobile accident when the vehicle she was driving was struck from behind. Her mother also suffered injuries in the accident.  At the time of the accident, they were insured under an automobile liability policy issued by the defendant. The plaintiffs made a claim for uninsured motorist benefits under the policy. The defendant, under Federal Rule 37, moved for an order compelling the plaintiffs to respond to discovery requests for the production of their social network site content.  The defendant’s rationale for the request was the plaintiffs alleged a “host of physical and emotional injuries.”  In respect to the mother, the defendant argued “there is no good reason for her to shield information that might shed light on her or her daughter's injuries.”  This is the language of the request: Request for Production No. 18: Please produce a full printout of all of Plaintiff [driver]’s social media website pages and all photographs posted thereon including, but not limited to, Facebook, Myspace, Twitter, LinkedIn, LiveJournal, Tagged, Meetup, myLife, Instagram and MeetMe from August 26, 2008 to the present. Request for Production No. 19: Please produce a full printout of all of Plaintiff’s [mother's] social media website pages and all photographs posted thereon including, but not limited to, Facebook, Myspace, Twitter, LinkedIn, LiveJournal, Tagged, Meetup, myLife, Instagram and MeetMe from August 26, 2008 to the present. As you can imagine, the court felt these requests were overbroad.  It is well settled that social media content is discoverable, but the requestor must make a threshold showing that publicly available information on those sites undermines the plaintiff’s claims.  The defendant did not come forward with any evidence that the content of either of the plaintiffs’ public postings in any way undermined their claims in this case. Absent such a showing, the defendant was not entitled to delve carte blanche into the nonpublic sections of the laintiffs' social networking accounts, let alone all of them. This case should serve as a lesson to other insurance litigants.  You should only request access to social media accounts if you can make a threshold showing that the social media content will be relevant and hold admissible evidence.  Otherwise you will rightly be admonished for undergoing a “fishing expedition” and your requests will be promptly denied.

You Might Want to Rethink Your Next Fishing Expedition in Tennessee

The scope of discovery, as stated in Federal Rule 26, has been construed very broadly in its relevancy standard.  Any and all requesting parties can seek production of documents and information as long as “the discovery appears reasonably calculated to lead to the discovery of admissible evidence.”  And while this standard has the tendency of having the producing parties provide all requested, non-privileged documents within their control, some courts have determined there are exceptions. In Potts v. Dollar Tree Stores, Inc., the Middle District of Tennessee determined that requests for private Facebook pages require the rquesting party must meet a threshold showing that the information sought is likely to be found on the social media site and lead to admissible evidence. In Potts, the plaintiff filed suit against her former employer, Dollar Tree Stores, Inc., claiming harassment and discrimination based on the plaintiff’s race, a hostile work environment, and retaliation.  After discovery disputes, the defendant filed a motion to compel claiming that the plaintiff did not produce a number of requested items and documents, including: Facebook data, any and all computer and storage devices used during and after the plaintiff’s employment, tax returns, any relevant documents in online email accounts, as well as other items.  The plaintiff’s response to the defendant’s request asserted that she produced what documents were in her possession, that the defendant’s request for the physical production of her computer was unduly burdensome, and that the defendant is not entitled to access to her private Facebook account due to other court holdings requiring a threshold showing that the Facebook page would undermine the producing party’s claim(s). Since, the Sixth Circuit Court of Appeals had not yet ruled on requesting parties’ access to private Facebook pages, the Middle District of Tennessee relied on outside court rulings in Thompkins v. Detroit Metro. Airport, 278 F.R.D. 387, 388 (E.D. Mich. 2012) and McCann v. Harleysville Ins. Co. of N.Y., 910 N.Y.S.2d 614 (N.Y.App. Div. 2010).  Courts in Michigan and New York held that, while Facebook accounts are not considered privileged or necessarily protected by notions of privacy, requesting parties should not be allowed to go on fishing expeditions in hopes of finding relevant information to their case.  In resolving the issue of rummaging for information, the courts held that a requesting party seeking access to private Facebook accounts must meet a threshold showing that the social media page will likely lead to admissible evidence.  Adopting the idea of a “threshold showing,” the Potts court determined that the defendant fell short in showing that the information it gathered from the plaintiff’s public Facebook page would lead to admissible evidence if the plaintiff had given more access. The court determined that the defendant was entitled to certain documents in the defendant’s motion to compel that Plaintiff had not yet produced in discovery, but accepted the plaintiff’s assertion that she no longer had certain requested documents that would not have been relevant to the case.  When dealing with the physical production of the plaintiff’s computer, the court resolved that an agreed neutral party would search for relevant documents on the plaintiff’s computer, using both parties’ agreed-upon word search.  As for the the defendant seeking attorneys’ fees incurred in preparing the motion to compel, the court ruled that Federal Rule 26(b)(2) gives discretion to the court in relieving any undue burdens on responding parties during discovery.  The court did not require the plaintiff to pay the defendant’s attorneys’ fees due to the plaintiff having reasonable objections to the defendant’s discovery requests.

How Can You Check if Your Insurance Customer is Faking an Injury? Get Evidence Before Requesting Access to Their Social Media!

A growing trend in insurance disputes is a demand for insurers to have access to the claimant’s social media content. In January 2013, the District of Montana had to consider whether to compel a woman to produce all of her social media photos. The court did not grant this request and the decision serves as a good example of what is, or is not, an effective way to request this information. One plaintiff claimed she injured her head, neck, and back in an automobile accident when the vehicle she was driving was struck from behind. Her mother also suffered injuries in the accident. At the time of the accident, they were insured under an automobile liability policy issued by the defendant. The plaintiffs made a claim for uninsured motorist benefits under the policy. The defendant moved under Fed.R.Civ.P. 37 for an order compelling the plaintiffs to respond to discovery requests for the production of their social network site content. The defendant’s rationale for the request was the plaintiffs alleged a “host of physical and emotional injuries.” In respect to the mother, Defendant argued “there is no good reason for her to shield information that might shed light on her or her daughter's injuries.” The request stated as follows: Request for Production No. 18: Please produce a full printout of all of Plaintiff [driver]’s social media website pages and all photographs posted thereon including, but not limited to, Facebook, Myspace, Twitter, LinkedIn, LiveJournal, Tagged, Meetup, myLife, Instagram and MeetMe from August 26, 2008 to the present. Request for Production No. 19: Please produce a full printout of all of Plaintiff’s [mother's] so-cial media website pages and all photographs posted thereon including, but not limited to, Facebook, Myspace, Twitter, LinkedIn, LiveJournal, Tagged, Meetup, myLife, Instagram and Meet-Me from August 26, 2008 to the present. As you can imagine, the court felt these requests were overbroad. It is well settled that social media content is discoverable, but the requestor must make a threshold showing that publicly available information on those sites undermines the plaintiff’s claims. The defendant did not come forward with any evidence that the content of either of the plaintiffs' public postings in any way undermined their claims in this case. Absent such a showing, the defendant was not entitled to delve carte blanche into any of the nonpublic sections of plaintiffs' social networking accounts, let alone all of them. This case should serve as a lesson to other insurance litigants. You should only request access to social media accounts if you can make a threshold showing that the social media content will be relevant and hold admissible evidence. Otherwise you will rightly be admonished for undergoing a “fishing expedition” and your requests will be promptly denied.

Court Denies Motion to Compel Forensic Computer Examination Based on Proportionality Grounds

A common problem in e-Discovery is what to do when your adversary is withholding relevant information.  An even worse problem is when you know your adversary is withholding relevant information, but you are not precisely certain what that information is.  This was the problem for the defendant in NOLA Spice Designs, LLC v. Haydel Enterprises, Inc. who sought—but was ultimately denied—a forensic examination of the plaintiff’s computers. In NOLA Spice Designs, a trademark infringement case, the defendant filed a motion to compel the plaintiff to submit its computers to forensic examinations.[1]  The plaintiff challenged the motion by arguing that the forensic examinations failed the proportionality requirement of Federal Rule of Civil Procedure 26(b)(2).  This rule prevents a party from requesting discovery when “the burden or expense of the proposed discovery outweighs its likely benefit.”  In the context of forensic computer examinations, the court explained such an examination will not be permitted when the request is overly broad and the connection between the computer and claims are “unduly vague or unsubstantiated in nature.”  Although the court noted that forensic computer examinations are not uncommon in civil discovery, the court clarified that a mere suspicion that your adversary is dishonestly withholding information is an insufficient basis to order a forensic computer examination. The defendant in NOLA Spice Designs requested the forensic computer examination on the basis that it “has good reasons to believe that something in Plaintiff’s statements is not true” and “that is has suspected all along that its opponents have records that they refuse to produce.”  The court characterized the defendant’s reasons as the precise type of skepticism and unwarranted suspicion of dishonesty that are insufficient to warrant an invasive computer forensic examination. Moving forward, litigants should be mindful that courts may be sensitive to confidentiality and privacy concerns when overly broad discovery is requested.  Although electronic discovery permits litigants to exchange massive amount of information, that exchange is still subject to the traditional rules of discovery, such as proportionality.  In order to combat the hurdle of proportionality, a party who is suspicious that an opponent is withholding information should limit its discovery requests to the specific information that is suspected of being withheld.[2]  If the requesting party obtains some information, then it will at least have a reasonable basis to proceed with broader discovery requests because the party can prove to the court that the opposing party has not been forthright.  This puts the requesting party in a far greater position than merely seeking an intrusive computer forensic examination with no basis other than mere suspicion of dishonest activity. Helvidius Priscus, a Seton Hall University School of Law graduate (class of 2014), served on the executive board of the Seton Hall Law Review and was a member of the Interscholastic Moot Court Board.  Helvidius now clerks for a Justice on the Supreme Court of New Jersey.  [1] “Computer forensics is the practice of collecting, analyzing and reporting on digital information in a way that is legally admissible.”  Forensic ctrl, Introduction to Computer Forensics, http://forensiccontrol.com/resources/beginners-guide-computer-forensics/ (last visited Feb. 12, 2014). [2] Of course, it is difficult to ask for something if you are not sure what exactly you are missing.  Nonetheless, the court in NOLA Spice Designs made clear that asking for everything is not the way to go.  Starting with small and specific discovery requests (even if they are shots in the dark) may be the better choice because a court is unlikely to find that such requests fail the proportionality requirement.

Fishing for Relevancy

Make sure that when you request electronic discovery information, it is relevant to the case at hand. The mere fact that information from the request could lead to admissible evidence is not enough to make the request relevant. In Salvato v. Miley, the father of plaintiff and decedent, Joshua Salvato, brought suit on behalf of his son for wrongful death.  Salvato passed away due to a gunshot wound to his abdomen.  Salvato’s father alleged that two police officers used excessive force during the questionable incident and failed to administer adequate medical treatment. After the plaintiff’s first set of interrogatories, one of the defendant officers, Deputy Brown, objected to the discovery requests that asked for personal cell phone numbers, e-mail accounts, social media accounts, and any online memberships, including the corresponding usernames and passwords and any correspondence sent or received via those accounts. Brown objected to these interrogatory requests for four reasons:  1) the requests sought confidential information protected by Fla. Stat. § 119.071(4); 2) the requests sought irrelevant and immaterial information that is not reasonably calculated to lead to admissible information and constitutes a fishing expedition; 3) the requests were overly broad with respect to their time, scope, and effect while presenting Brown with annoyance, embarrassment, and oppression; and 4) the requests invaded Brown’s right to privacy under Article I, Section 23 of the Florida Constitution.  Salvato, 2013 WL 2712206 at *2. The court did not address the arguments involving the Florida statute or constitution.  Instead, the court focused on the relevancy of the plaintiff’s requests, finding that the plaintiff had “essentially sought permission to conduct ‘a fishing expedition’ . . . on the mere hope of finding relevant evidence.”  Salvato, 2013 WL 2712206 at *2 (quoting Tompkins v. Detriot Metro. Airport, 278 F.R.D. 387, 388 (E.D. Mich. 2012). The plaintiff’s only response was that the information “could include admissions against interest, and could certainly lead to the discovery of admissible evidence.”  The court did not agree, and instead found that the plaintiff must have the “threshold burden of showing that the requested discovery is relevant.”  Here, the information the plaintiff sought was too much of a “fishing expedition” to be deemed relevant.

Fishin’ on Facebook: The Discoverability of Private Facebook Information

There is no question we live in a world consumed by social media where “Tweeting,” “Instagramming,” and “Facebooking” are commonplace. More specifically, people feel compelled to share intimate details, photographs and video of their lives with their “friends” on social media sites, such as Facebook. In the world of litigation, the question becomes “how should courts treat Facebook accounts for the purpose of discovery”?

Continue Reading
  • Find an eLesson


  • Register for Post Notifications

    Subscribe to receive updates whenever a new eLesson is published.

    Manage Subscriptions
  • Let Us Blog Your Event!

    eLessons Learned is fast becoming the site of choice for employers, employees, judges, lawyers, and journalists who are interested in learning more about these areas without being intimidated by the complexity of the topic. In fact, organizations and event coordinators often feature eLessons Learned as their official eDiscovery blog. Fill out our simple registration form to have eLessons Learned be the official blog of your organization or event.

    Register Now
  • Recent Praise

    The blog takes a clever approach to [e-discovery]. Each post discusses an e-discovery case that involves an e-discovery mishap, generally by a company employee. It discusses the conduct that constituted the mishap and then offers its ‘e-lesson’ — a suggestion on how to learn from the mistake and avoid it happening to you.

    Robert Ambrogi

    Legal Tech Blogger and creator of LawSites




    Although I may have missed some, yours is the first article that I have seen addressing Zubulake II. It is often the lost opinion amongst the others.

    Laura A. Zubulake

    Plaintiff, Zubulake v. UBS Warburg


    Click here to see more.
View in: Mobile | Standard