Social Media Discovery in Employment and Personal Injury Litigation
While email is still widely used, more people are communicating with social media platforms such as Facebook, Twitter, Snapchat, and Instagram. While using these communications platforms has become second nature to many, they present discovery challenges. A 2017 survey by Robert Half Legal found that 52 percent of lawyers said they’ve seen an increase in litigation involving social media and mobile devices, while 27 percent reported a rise in cases related to data on personal mobile devices that employees used for work purposes.
Social Media Preservation and Collection Complicate Discovery
Social media evidence is not as easy to preserve and collect as either paper records or other forms of electronically stored information, such as word processing documents or emails. This is in part because social media by its nature resides in a quickly evolving environment, where it can be easy to replace content with updates and changes. The sheer volume of social media, as well as rapidly changing platforms, creates additional complications.
Both these aspects of social media suggest that attorneys should stay abreast of rapidly changing technologies and that they may wish to consider partnering with experts in preservation and collection at various stages of litigation or pre-litigation.
Duty To Preserve Social Media
First and foremost, as with other forms of evidence, if litigation is contemplated, attorneys must inform clients of their duty to preserve social media material and advise them that they cannot destroy potentially relevant information. Allied Concrete Co. v. Lester shows the importance of preserving social media, as well as the consequences of advising clients involved in litigation to remove damaging information from their social media pages.
After a car accident with an Allied Concrete truck, Lester sued Allied Concrete for damages related to his personal injuries and the death of his wife. Allied Concrete sought discovery of Lester’s Facebook page, resulting in Lester’s attorney instructing Lester to “clean up” his Facebook page, which Lester did. The deleted content was eventually produced, and even though Lester prevailed on his lawsuit, the court ordered sanctions in the amount of $180,000 for Lester and $542,000 for his attorney for the discovery violation. The attorney ultimately agreed to a five-year suspension from practice for his actions.
While relevant social media must be preserved, this should not be misunderstood to require that all social media must be preserved. Rather, only nonprivileged material “that is relevant to any party’s claim or defense and proportional to the needs of the case” needs to be preserved and produced if requested. Assessments of what is proportionally necessary to a case are within the purview of the attorney.
Several steps can be taken by attorneys to help ensure that preservation obligations are met. For instance, prior to litigation, they can make sure clients have in place reasonable policies to ensure preservation should the obligation arise. Also, they can take steps to identify relevant custodians and ask them about the location of potentially relevant social media data and document the preservation process.
While discovery into retention and preservation practices should not be allowed routinely, it may be advisable to discuss these matters with opposing counsel, while being mindful of privilege and confidentiality concerns.
Technicalities of Preserving Social Media
The technical aspects of gathering social media evidence are less straightforward than those for email and digital documents. Several methods exist for gathering social media–type communications in the eDiscovery context, though they vary in advisability.
Taking screenshots or printing the images is one method, but it tends to lose context and associated metadata. Self-service export tools can retrieve social media, but they’re usually built into the platform being used and may only be available to account holders. Specialized forensic collection software is another option that captures files as well as associated metadata and linked content. It also provides options for searching, sorting, and filtering information.
Authenticity and Admissibility Requirements
From a litigation standpoint, electronic communications and information are generally discoverable in the same ways as other types of evidence. Anything made publicly available can be collected by any party, while nonpublic materials are obtained through the discovery process, with access depending on privilege, relevance, and proportionality.
Digital evidence such as emails, web postings, texts, tweets, and Snapchat messages are commonly offered as evidence and must meet standards for authenticity and admissibility. Generally, the standard for establishing authenticity of digital evidence is the same as for traditional forms of evidence.
The authenticity of a text message can be established by the author of the text or by someone who saw the text message being produced or received, while websites present greater authenticity challenges because of their dynamic nature. To authenticate website evidence, a witness may testify or certify that he or she typed in the internet address reflected on an offered exhibit on the date and time stated, that the witness logged on to the website and reviewed its contents, and that the exhibit fairly and accurately reflects what the witness saw.
A factor to consider when reviewing authenticity and authorship is that the person identified as being the owner of an account may not necessarily be the person who actually created the content. A third party could have logged in to a social media account under the owner’s name. With respect to establishing authenticity, attorneys must be familiar with the standards in the jurisdiction in which their case resides. Maryland and Texas apply different requirements for establishing authenticity, and other states are adopting these standards.
Subsections 13 and 14 to Federal Rules of Evidence 902 took effect in December 2017. Under the subsections, the party offering the evidence may provide a certification from a person with knowledge that the evidence is authentic rather than producing witness testimony.
In addition to authentication concerns, electronic communications must meet standards of admissibility. Decisions regarding admissibility are solely in the purview of the judge and include judgments about whether evidence is relevant, constitutes hearsay, or is excessively prejudicial when compared to its probative value.
Social Media in The Employment Context
Case law suggests that access to an employee’s social media accounts may be allowed in employment cases. Employers may be able to gain broad access to an employee’s private social media accounts if they can articulate a relevant basis for the request.
“Courts have reached different results as to whether to compel the production of a plaintiff’s ‘private’ information,” said Ryan D. Derry, an associate at Paul Hastings. “In cases ordering production, the defendant typically demonstrates a reason as to why the information is potentially probative.”
For example, in Reid v. Ingerman Smith LLP, a case where an employee sued her employer alleging emotional distress due to sexual harassment and termination, the defendant successfully obtained private Facebook postings by demonstrating to the court that they contradicted her claims of mental anguish.
“In contrast,” Derry said, “courts have denied production where there is not a demonstrable relationship between production and the claim—for instance, in Howell v. The Buckeye Ranch Inc., where the court denied the motion to compel social media usernames and passwords because the request was not limited to plaintiff’s emotional state or claim of sexual harassment.”
Trail v. Lesko provides an extensive discussion of factors for consideration in determining whether to grant access to social media content, as well as a summary of cases from Pennsylvania and other jurisdictions. In Lesko, a case involving an automobile accident, the trial court denied motions to compel from both the plaintiff and the defendant seeking access to the other’s social media content. The judge reasoned that the social media content would not provide information relevant to the damages issue in the case.
Social Media in Personal Injury Cases
“Social media is important in the personal injury context to test the bona fides of physical and emotional injuries, not just to learn what happened to cause the injury,” said Mark Berman, litigation partner at Ganfer Shore Leeds & Zauderer.
As in the employment context, a significant question when requesting social media information relates to the time period covered by the request. “Courts don’t usually limit access to social media created after the event but may limit access to information created prior to the event,” Berman said.
In Gordon v. T.G.R. Logistics Inc., a case involving a collision between the plaintiff’s vehicle and a tractor-trailer driven by TGR’s employee, the defense requested the plaintiff’s entire Facebook history. The court noted that evaluation of the discovery requires a three-part analysis: whether information is privileged, relevant, and proportional. Neither party argued that the sought-after information was privileged.
Regarding relevance, the court noted that almost any post could conceivably be relevant with respect to the plaintiff’s injuries and emotional distress. Proportionality, though, required the court to undertake a deeper analysis to protect a party from “annoyance, embarrassment, oppression, or undue burden or expense.” The court concluded that granting discovery of the plaintiff’s entire Facebook account would provide minimal relevant information and would therefore exceed the limits of proportionality.
In contrast, in McMillen v. Hummingbird Speedway Inc., a personal injury case involving a rear-end collision after a stock car race, the court ordered the plaintiff to produce Facebook and Myspace usernames and passwords where public information showed the plaintiff engaging in sporting events that contradicted claimed injuries.
Concluding Thoughts and Practical Tips
Litigators need a thorough understanding of the communications platforms used by their clients and opposing parties, as well as a strategy for how to access social media information. The information above, coupled with the tips below, is a good place to start.
Ensure Preservation
Because social media content changes rapidly, attorneys must act quickly to protect potential evidence. As soon as possible and according to relevant rules, they’ll want to place the opposing side on notice that social media will be sought and should be preserved.
Review Publicly Available Social Media
From a defense perspective, routine practice includes immediately conducting a broad search of publicly available social media information related to a plaintiff. Social media postings often contain statements related to employment, information regarding mitigation, and evidence relevant to claims of emotional distress. “It is also important to periodically monitor social media throughout the course of litigation,” Derry said.
Also, attorneys might consider searching social media generally for references to the event at issue. Relevant information may not be posted by parties known to counsel. Searching for location, date, and event can sometimes reveal information that would not otherwise be found.
Limit and Structure Requests
Social media content, like all discovery, is limited to what is relevant. However, broad requests for social media content that are not moored to the case subject matter or limited to the relevant time period will likely be denied. “Keep requests proportional to what is at issue with respect to relevance and cost. Break requests down into pieces so that if you lose one request, you don’t necessarily lose everything,” Berman said.
Protect Privacy
Opposing counsel may object to social media content access based on privacy concerns. A protective order can preserve privacy while also ensuring access to relevant information.
Request Metadata
Screenshots may seem like a good way to capture social media content, but they are challenging to authenticate, and the information portrayed is difficult to put in context. Metadata containing information such as author, time of posting, recipients, and location can help provide context and establish authenticity. Attorneys will want to be sure to specifically request metadata and specify that it be collected in a forensically sound manner.
Avoid Communications With Represented Parties
Generally, state ethics rules prohibit lawyers from communicating with represented parties. As such, lawyers (and their agents) should avoid engaging in social media communications with persons whom the lawyer knows to be represented by counsel. Practically, this means a lawyer may not send Facebook friend requests or LinkedIn invitations to parties represented by counsel.
However, viewing publicly accessible social media content that does not precipitate communication with a represented party is generally not prohibited.
Use Caution When Communicating With Unrepresented Third Parties
Publicly viewable social media content is generally considered accessible. However, information sheltered by privacy settings raises ethical constraints that limit the lawyer’s options for obtaining it. The consensus among courts appears to be that a lawyer may not attempt to gain access to nonpublic social media content by using subterfuge, trickery, dishonesty, deception, pretext, false pretenses, or an alias. “Counsel cannot use ethically impermissible ‘backdoor’ methods to access private posts,” Berman said.
Staying up to date with social media changes can seem daunting. However, being proactive, staying abreast of rules and practice requirements related to electronic discovery, and seeking the expertise of those with technological backgrounds can ease the process when counsel is faced with a case involving social media discovery.
This whitepaper is not intended to provide any legal advice.