SlideShare ist ein Scribd-Unternehmen logo
1 von 41
Downloaden Sie, um offline zu lesen
April 11-13, 2011
                            www.techshow.com



Litigators Toolbox:
      Session Title
    Social Media
       Presenters
           Presenters
   Judge Herbert Dixon
      Sharon {Name}
             Nelson
     Antigone{Name}
              Peyton

         PRESENTED BY THE

                              April 11-13, 2011
                             www.techshow.com
Social Media




          April 11-13, 2011
         www.techshow.com
Social Media
•    Internet forums
•    Weblogs
•    Social blogs
•    Microblogging
•    Wikis
•    Podcasts
•    Pictures
•    Video
•    Ratings
•    Social bookmarking
                           April 11-13, 2011
                          www.techshow.com
Facebook Stats
•  April 2011: Nearly 600 million active
   Facebook users (50% daily users)
•  Over 100 million w/public information
•  Complete Facebook profile contains
   over 40 pieces of information (+wall
   posts & status updates)
•  2/3 of comScore s Top U.S. websites
   integrated



                            April 11-13, 2011
                           www.techshow.com
Some Global User Stats

•    Twitter – 190 million
•    LinkedIn – 75 million
•    Plaxo – 40 million
•    MySpace – 65 million




                              April 11-13, 2011
                             www.techshow.com
Social Media: Advice For Clients
•  The President s Advice:
     Well, let me give you some very
   practical tips. First of all, I want
   everybody here to be careful about
   what you post on Facebook, because
   in the YouTube age, whatever you do,
   it will be pulled up again later
   somewhere in your life.
   Obama warns U.S. teens of perils of Facebook, Sept.
  8, 2009 (Reuters).


                                       April 11-13, 2011
                                      www.techshow.com
How Long Does It Last?
•  Approximately forever, so THINK before you
   post
•  Twitter keeps all tweets
•  April 14, 2010--Library of Congress
   announced that it is acquiring entire public
   archive of Tweets
•  Facebook keeps posted info until deleted
   items are overwritten
•  You can t control what others do with your
   posts/photos
                               April 11-13, 2011
                              www.techshow.com
Deleted Does NOT
         Mean Deleted
•  Computer forensics can recover data until
   overwritten
•  May exist on social media servers until
   overwritten
•  Someone else may have reposted or kept
   the data (e.g., wayback machine )




                              April 11-13, 2011
                             www.techshow.com
Social Media In Court
•  Criminal proceedings-
   sentencing, alibi
•  Evidence to discredit
   witness/impeachment
•  Investigation tool-
   authorities, lawyers,
   and jury consultants




                            April 11-13, 2011
                           www.techshow.com
The Power Of
      Social Media Evidence
•  American Academy of
   Matrimonial Lawyers
  –  80% of members have
     seen a sharp increase in
     SM evidence
  –  One in five cases now
     involves FB evidence
  –  In the U.K. 1/5 of divorce
     petitions cite FB
                                   April 11-13, 2011
                                  www.techshow.com
Regular Use Of Social Media
•  Criminal law
•  Employment law
•  Personal injury law




                          April 11-13, 2011
                         www.techshow.com
Its Not Yours Only
•  Privacy preferences give way to
   liberal discovery rules in litigation
•  Many rights are waived upon joining,
   or by default settings
•  Information may be subject to
   subpoena
•  Little to no expectation of privacy
•  Leduc v. Roman (Quebec)-private
   Facebook page still discoverable

                          April 11-13, 2011
                         www.techshow.com
Finding Evidence On Social
         Networking Sites
•  The old days: little privacy, you could mine at
   will
•  Today: the majority of people understand
   privacy settings
•  Always check – many accounts are still open
•  A friend might always provide info
•  Deception is obviously unethical (on the part of
   the attorney or her staff)
•  If someone else deceives (without your
   involvement), it will probably come in

                                April 11-13, 2011
                               www.techshow.com
Social Media Ethics
•  Phila. Bar Op. 2009-02 (3/2009)
•  Lawyer had 3rd party send friend
   request to adverse witness
•  Lawyer cannot do that for purposes of
   searching for otherwise private
   information on Facebook page
•  Rules regarding non-lawyer assistants
   apply to third-party actions
•  Concerns re: dishonesty, fraud, deceit
   or misrepresentation
                            April 11-13, 2011
                           www.techshow.com
New York Bar Association

          •  (Sep. 24, 2010)
             Ethics opinion
          •  Attorneys can
             comb through
             PUBLIC areas of
             social media sites



                   April 11-13, 2011
                  www.techshow.com
Service of Process
•  London High Court allowed service of a
   court order to an anonymous blogger
   over Twitter
•  Australian court allowed service of a
   default judgment through Facebook
•  9th Circuit ordered e-mail service




                            April 11-13, 2011
                           www.techshow.com
How To Get
Social Media Evidence
•  Civil subpoenas were long honored
•  Now ISPs are citing the ECPA and the
   SCA and challenging subpoenas
•  18 U.S.C. Sec. 2702-2703 – can t
   divulge the contents of e-mails or other
   electronic records
•  Some exceptions for law enforcement




                          April 11-13, 2011
                         www.techshow.com
What Are Contents?
•  It should be the substance of a
   message
•  Attorneys have gotten odd responses
  –  Times of connections, IP addresses are
     content
  –  When challenged SM sites have backed
     down



                              April 11-13, 2011
                             www.techshow.com
Leading Case
•  In Re Subpoena Duces Tecum to AOL, LLC, 550 F.
   Supp. 2d 606, 2008 U.S. Dist. LEXIS 39349 (E.D.
   Va. April 18, 2008)
•  ECPA prohibits an e-mail service provider from
   producing customer s e-mail in response to a civil
   subpoena because it is not a disclosure exemption
   under the Act




                                  April 11-13, 2011
                                 www.techshow.com
SCA vs. Social Media
    •  Crispin v. Christian Audigier, Inc.
       (C.D. CA. May 26, 2010)
    •  First case to hold that SCA applies to
       social networking sites
    •  Held that messages and comments
       visible to a restricted set of users
       were private
    •  Artist Crispin claimed Ds violated
       copyright – Ds wanted all MySpace
       and Facebook references to Ds
    •  Trying to fit facts into SCA (1986 law)
       – a very bad fit

                            April 11-13, 2011
                           www.techshow.com
If You Sue…Your Life Is
     An Open Book
       •  EEOC v. Simply Storage
          Management (S.D. In.
          May 11, 2010)
       •  Permitted discovery of all
          relevant SM data whether
          or not it was private
       •  EEOC had sued on
          behalf of two women
          claiming sexual
          harassment
       •  Defendant employer
          sought the info
                     April 11-13, 2011
                    www.techshow.com
Looking Ahead

•  The information will
   probably still be
   discoverable and the
   respondent will have to
   provide it
•  If they don t, attorneys
   will ask court to compel
   discovery

                               April 11-13, 2011
                              www.techshow.com
How to Subpoena
      Facebook
•  http://www.facebook.com/
   help/?safety=law
•  Facebook urges parties to
   resolve their discovery issues
   without involving Facebook
•  Stored Communications Act, 18
   U.S.C. § 2701 et seq. prohibits
   disclosure of all but basic
   subscriber info
                      April 11-13, 2011
                     www.techshow.com
FB & User Both Have Access
•  Unless user has terminated account,
   unknown how long data retained (was 90
   days, believed to be less now)
•  You must serve a valid California or
   Federal subpoena on Facebook. Out-of-
   state civil subpoenas must be
   domesticated in California. Facebook s
   registered agent for service of process:
  Custodian of Records, Facebook, Inc.
  c/o Corporation Services Company
  2730 Gateway Oaks Drive
  Suite100
  Sacramento CA 95833


                           April 11-13, 2011
                          www.techshow.com
What Does It Cost?

•  $500 for each
   account
•  $200 for expedited
   response
•  30 days response
   time


                         April 11-13, 2011
                        www.techshow.com
User Consent Forms
•  Obsolete for Facebook, should work
   for any other sites
•  Pursuant to a Rule 34 request for
   production of relevant, non-privileged
   material
•  Material produced to user or attorney
   for review before production


                             April 11-13, 2011
                            www.techshow.com
April 11-13, 2011
www.techshow.com
April 11-13, 2011
www.techshow.com
Downloading An Account
•  Facebook will prepare download and
   send a link via e-mail to the user
•  All elements of the site – wall, photos,
   etc. will download as a zip file
•  User s counsel will screen for relevant,
   non-privileged info prior to production




                             April 11-13, 2011
                            www.techshow.com
Danger Of Spoliation
   •  Attorneys routinely advising
      deletions (prior to litigation
      holds)
   •  Client often deletes after
      litigation holds
   •  Preservation of evidence letters
      critical
   •  If spoliation suspected,
      computer forensics may be
      needed

                      April 11-13, 2011
                     www.techshow.com
Preserving Social Media Evidence

•  Generally less than perfect options
   available
•  Screenshot or PDF
•  Someone will have to authenticate
•  Can use GoToMeeting, CamStudio or
   other programs to record the process
•  Inexpensive to use third-party expert

                           April 11-13, 2011
                          www.techshow.com
Evidentiary Issues
•  St. Clair v. Johnny s Oyster & Shrimp,
   Inc.
  –  Any evidence procured from the Internet is
     good for almost nothing
•  Lorraine v. Markel American Insurance
   Co.
  –  Counsel must be prepared to deal with the
     evidentiary issues associated with
     admissibility


                                April 11-13, 2011
                               www.techshow.com
Evidentiary Issues
•  FRE 901
•  901(b)(1). Testimony of witness with
   knowledge.
•  901(b)(3). Comparison by the trier of fact or by
   expert witnesses with a specimen.
•  901(b)(4). Distinctive characteristics and the
   like.
•  901(b)(7). Public records.
•  901(b)(9). Evidence produced as a result of an
   accurate process or system.

                                  April 11-13, 2011
                                 www.techshow.com
Evidentiary Issues
•  FRE 902: SELF AUTHENTICATION
•  Three of the rules have been used in
   the courts to authenticate ESI:
•  902(5). Official publications.
•  902(7). Self-authentication by
   inscriptions, signs, tags or labels.
•  902(11). Authentication of regularly
   conducted business.


                            April 11-13, 2011
                           www.techshow.com
Facebook Authentication

      •  Notarized declarations as
         to validity provided (an
         extra $100)
      •  But no witnesses for trial
         or depositions
      •  Will notify user of
         subpoena to allow time for
         motion to quash
                     April 11-13, 2011
                    www.techshow.com
How Do You
            Authenticate?
•  Smart lawyers
  –  Requests for admission
  –  Stipulations
•  Many courts have
   common sense rule: If
   the other side doesn t
   object, it comes in


                               April 11-13, 2011
                              www.techshow.com
Authentication

   •  Did you post this?
   •  Did you see this post?
   •  Context and content
      can authenticate
   •  Expert testimony
   •  Computer forensics if
      data was deleted

              April 11-13, 2011
             www.techshow.com
Snitches Get Stitches:
         U Know Who U Are!
•  Griffin v. Maryland (Ct. of App. M.D. May
   27, 2010)
•  Murder case - D s girlfriend appeared to
   threaten a witness on MySpace
•  Site maintained under pseudonym
•  Prosecution sought to intro to rehabilitate
   witness who changed testimony
•  Had photo of D and girlfriend
•  Page referred to D as Boozy
•  Court said site could be authenticated
   from content and context
                                      April 11-13, 2011
                                     www.techshow.com
Prosecutors Embracing
iJuror        Social Media
              •  Cameron County TX
              •  Searching SM sites of
                 prospective jurors
              •  Googling them
              •  Keeping up with the
                 defense in jury
                 investigations

                            April 11-13, 2011
                           www.techshow.com
Voir Dire Trends
•  Wall Street Jrnl. (Feb. 22, 2011)-
   Prosecution and defense lawyers
   probing jury pool
   –  Religion
   –  Activities
   –  What TV they watch
   –  Opinions they hold
   –  But much is now private
   –  Useful to know that someone is
      married and loves GLEE?

                        April 11-13, 2011
                       www.techshow.com
Save the Date
ABA TECHSHOW 2012
 March 29-31, 2012
   Hilton Chicago




                 April 11-13, 2011
                www.techshow.com

Weitere ähnliche Inhalte

Was ist angesagt?

00.fnc forensics overview new
00.fnc forensics overview new00.fnc forensics overview new
00.fnc forensics overview newforensicsnation
 
search engines and copyrights : How far a fair defense
search engines and copyrights : How far a fair defense search engines and copyrights : How far a fair defense
search engines and copyrights : How far a fair defense NanubalaDhruvan
 
Application of the internet
Application of the internetApplication of the internet
Application of the internetLayani Malsha
 
Computer Ethics in Digital Resources
Computer Ethics in Digital ResourcesComputer Ethics in Digital Resources
Computer Ethics in Digital Resourcesb5thom
 
Legal Research in the Age of Cloud Computing
Legal Research in the Age of Cloud ComputingLegal Research in the Age of Cloud Computing
Legal Research in the Age of Cloud ComputingNeal Axton
 
Safe and ethical use of technology
Safe and ethical use of technologySafe and ethical use of technology
Safe and ethical use of technologyAllison Loyd
 
Privacy and Freedom of Expression
Privacy and Freedom of ExpressionPrivacy and Freedom of Expression
Privacy and Freedom of ExpressionMark Jhon Oxillo
 
The "Chilling Effect" 
on Digital Development: 
US vs. ElcomSoft
The "Chilling Effect" 
on Digital Development: 
US vs. ElcomSoft The "Chilling Effect" 
on Digital Development: 
US vs. ElcomSoft
The "Chilling Effect" 
on Digital Development: 
US vs. ElcomSoft Shane Tilton
 
Internet Applications
Internet ApplicationsInternet Applications
Internet ApplicationsMarlon Jamera
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentationkatespeach
 
Internet basics
Internet basicsInternet basics
Internet basicsosuchin
 
Presentation internet programming report
Presentation internet programming reportPresentation internet programming report
Presentation internet programming reportBilal Maqbool ツ
 

Was ist angesagt? (20)

00.fnc forensics overview new
00.fnc forensics overview new00.fnc forensics overview new
00.fnc forensics overview new
 
FNC Forensics Overview
FNC Forensics OverviewFNC Forensics Overview
FNC Forensics Overview
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
search engines and copyrights : How far a fair defense
search engines and copyrights : How far a fair defense search engines and copyrights : How far a fair defense
search engines and copyrights : How far a fair defense
 
Application of the internet
Application of the internetApplication of the internet
Application of the internet
 
Educational Technology
Educational TechnologyEducational Technology
Educational Technology
 
Computer Ethics in Digital Resources
Computer Ethics in Digital ResourcesComputer Ethics in Digital Resources
Computer Ethics in Digital Resources
 
The internet
The internetThe internet
The internet
 
Legal Research in the Age of Cloud Computing
Legal Research in the Age of Cloud ComputingLegal Research in the Age of Cloud Computing
Legal Research in the Age of Cloud Computing
 
Cyber Ethics
Cyber EthicsCyber Ethics
Cyber Ethics
 
Copyright
CopyrightCopyright
Copyright
 
Safe and ethical use of technology
Safe and ethical use of technologySafe and ethical use of technology
Safe and ethical use of technology
 
Privacy and Freedom of Expression
Privacy and Freedom of ExpressionPrivacy and Freedom of Expression
Privacy and Freedom of Expression
 
The "Chilling Effect" 
on Digital Development: 
US vs. ElcomSoft
The "Chilling Effect" 
on Digital Development: 
US vs. ElcomSoft The "Chilling Effect" 
on Digital Development: 
US vs. ElcomSoft
The "Chilling Effect" 
on Digital Development: 
US vs. ElcomSoft
 
Internet Applications
Internet ApplicationsInternet Applications
Internet Applications
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentation
 
Internet basics
Internet basicsInternet basics
Internet basics
 
Presentation internet programming report
Presentation internet programming reportPresentation internet programming report
Presentation internet programming report
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
copyright Infringement
copyright Infringementcopyright Infringement
copyright Infringement
 

Ähnlich wie Litigators’ Tool Box: Social Media (2011)

Copyright infringement
Copyright infringementCopyright infringement
Copyright infringementwcudsce
 
Infocom Security
Infocom SecurityInfocom Security
Infocom Securitymmavis
 
Social Media And Litigation Nov 2011
Social Media And Litigation Nov 2011Social Media And Litigation Nov 2011
Social Media And Litigation Nov 2011Lisa McManus
 
Chapter 8- 9 update 5
Chapter 8- 9 update 5Chapter 8- 9 update 5
Chapter 8- 9 update 5edniuchis
 
Content & copyright
Content & copyrightContent & copyright
Content & copyrightjadams1957
 
Social Media and Litigation Nov 2011
Social Media and Litigation Nov 2011Social Media and Litigation Nov 2011
Social Media and Litigation Nov 2011LexisNexis
 
Building Corpora from Social Media
Building Corpora from Social MediaBuilding Corpora from Social Media
Building Corpora from Social MediaRichard Littauer
 
2010-09-09 The World-Wide Bathroom Wall
2010-09-09 The World-Wide Bathroom Wall2010-09-09 The World-Wide Bathroom Wall
2010-09-09 The World-Wide Bathroom WallFrederick Lane
 
ethcpp05-Unit 3.ppt
ethcpp05-Unit 3.pptethcpp05-Unit 3.ppt
ethcpp05-Unit 3.pptAnil Yadav
 
JTerm Day 2 - History, Definitions & Stats
JTerm Day 2 - History, Definitions & StatsJTerm Day 2 - History, Definitions & Stats
JTerm Day 2 - History, Definitions & StatsAndrew Hoffman
 
Social Media for Law Enforcement Agencies
Social Media for Law Enforcement AgenciesSocial Media for Law Enforcement Agencies
Social Media for Law Enforcement AgenciesSmall World Social
 
Internet decency legislation
Internet decency legislationInternet decency legislation
Internet decency legislationTgarmon34
 
Intellectual Freedom, Privacy and Social Media
Intellectual Freedom, Privacy and Social MediaIntellectual Freedom, Privacy and Social Media
Intellectual Freedom, Privacy and Social MediaElizabeth T. "Eli" Edwards
 
Neville,jennifer the importance of labor lawsand reforms
Neville,jennifer the importance of labor lawsand reformsNeville,jennifer the importance of labor lawsand reforms
Neville,jennifer the importance of labor lawsand reformsjmneville
 
Social media used in higher education
Social media used in higher educationSocial media used in higher education
Social media used in higher educationAnne Arendt
 

Ähnlich wie Litigators’ Tool Box: Social Media (2011) (20)

Copyright infringement
Copyright infringementCopyright infringement
Copyright infringement
 
Infocom Security
Infocom SecurityInfocom Security
Infocom Security
 
Social Media And Litigation Nov 2011
Social Media And Litigation Nov 2011Social Media And Litigation Nov 2011
Social Media And Litigation Nov 2011
 
Social Media Forensics
Social Media ForensicsSocial Media Forensics
Social Media Forensics
 
Chapter 8- 9 update 5
Chapter 8- 9 update 5Chapter 8- 9 update 5
Chapter 8- 9 update 5
 
Copyright & Fair Use for Digital Projects
Copyright & Fair Use for Digital ProjectsCopyright & Fair Use for Digital Projects
Copyright & Fair Use for Digital Projects
 
Content & copyright
Content & copyrightContent & copyright
Content & copyright
 
Social Media and Litigation Nov 2011
Social Media and Litigation Nov 2011Social Media and Litigation Nov 2011
Social Media and Litigation Nov 2011
 
Building Corpora from Social Media
Building Corpora from Social MediaBuilding Corpora from Social Media
Building Corpora from Social Media
 
2010-09-09 The World-Wide Bathroom Wall
2010-09-09 The World-Wide Bathroom Wall2010-09-09 The World-Wide Bathroom Wall
2010-09-09 The World-Wide Bathroom Wall
 
ethcpp05-Unit 3.ppt
ethcpp05-Unit 3.pptethcpp05-Unit 3.ppt
ethcpp05-Unit 3.ppt
 
JTerm Day 2 - History, Definitions & Stats
JTerm Day 2 - History, Definitions & StatsJTerm Day 2 - History, Definitions & Stats
JTerm Day 2 - History, Definitions & Stats
 
Social Media for Law Enforcement Agencies
Social Media for Law Enforcement AgenciesSocial Media for Law Enforcement Agencies
Social Media for Law Enforcement Agencies
 
Ethics & Etiquette Online
Ethics & Etiquette OnlineEthics & Etiquette Online
Ethics & Etiquette Online
 
4-H volunteers final
4-H volunteers final4-H volunteers final
4-H volunteers final
 
Internet decency legislation
Internet decency legislationInternet decency legislation
Internet decency legislation
 
Intellectual Freedom, Privacy and Social Media
Intellectual Freedom, Privacy and Social MediaIntellectual Freedom, Privacy and Social Media
Intellectual Freedom, Privacy and Social Media
 
Neville,jennifer the importance of labor lawsand reforms
Neville,jennifer the importance of labor lawsand reformsNeville,jennifer the importance of labor lawsand reforms
Neville,jennifer the importance of labor lawsand reforms
 
Jan 14 NISO Webinar Net Neutrality: Will Library Resources be stuck in the Sl...
Jan 14 NISO Webinar Net Neutrality: Will Library Resources be stuck in the Sl...Jan 14 NISO Webinar Net Neutrality: Will Library Resources be stuck in the Sl...
Jan 14 NISO Webinar Net Neutrality: Will Library Resources be stuck in the Sl...
 
Social media used in higher education
Social media used in higher educationSocial media used in higher education
Social media used in higher education
 

Mehr von Antigone Peyton

Kill the Dinosaurs, and Other Tips for Achieving Technical Competence
Kill the Dinosaurs, and Other Tips for Achieving Technical CompetenceKill the Dinosaurs, and Other Tips for Achieving Technical Competence
Kill the Dinosaurs, and Other Tips for Achieving Technical CompetenceAntigone Peyton
 
A Litigator's Guide to the Internet of Things (IoT)
A Litigator's Guide to the Internet of Things (IoT)A Litigator's Guide to the Internet of Things (IoT)
A Litigator's Guide to the Internet of Things (IoT)Antigone Peyton
 
Protect That IP! Or the Art of Doing Business with the Government if You Sell...
Protect That IP! Or the Art of Doing Business with the Government if You Sell...Protect That IP! Or the Art of Doing Business with the Government if You Sell...
Protect That IP! Or the Art of Doing Business with the Government if You Sell...Antigone Peyton
 
Big Data, Cloud Computing, and Privacy Implications
Big Data, Cloud Computing, and Privacy ImplicationsBig Data, Cloud Computing, and Privacy Implications
Big Data, Cloud Computing, and Privacy ImplicationsAntigone Peyton
 
Big Changes in Patent Laws: Implementing the AIA
Big Changes in Patent Laws: Implementing the AIABig Changes in Patent Laws: Implementing the AIA
Big Changes in Patent Laws: Implementing the AIAAntigone Peyton
 
Angel & Devil: Danger of Emerging Technologies
Angel & Devil: Danger of Emerging TechnologiesAngel & Devil: Danger of Emerging Technologies
Angel & Devil: Danger of Emerging TechnologiesAntigone Peyton
 
Social Media for Litigators
Social Media for LitigatorsSocial Media for Litigators
Social Media for LitigatorsAntigone Peyton
 
Two Businessess & An IP Fracas
Two Businessess & An IP FracasTwo Businessess & An IP Fracas
Two Businessess & An IP FracasAntigone Peyton
 
KIPO/KIPA Presentation: Direct Infringement (2010)
KIPO/KIPA Presentation: Direct Infringement (2010)KIPO/KIPA Presentation: Direct Infringement (2010)
KIPO/KIPA Presentation: Direct Infringement (2010)Antigone Peyton
 
Spoliation Wars & Other ESI Highlights (2010)
Spoliation Wars & Other ESI Highlights (2010)Spoliation Wars & Other ESI Highlights (2010)
Spoliation Wars & Other ESI Highlights (2010)Antigone Peyton
 

Mehr von Antigone Peyton (12)

Kill the Dinosaurs, and Other Tips for Achieving Technical Competence
Kill the Dinosaurs, and Other Tips for Achieving Technical CompetenceKill the Dinosaurs, and Other Tips for Achieving Technical Competence
Kill the Dinosaurs, and Other Tips for Achieving Technical Competence
 
A Litigator's Guide to the Internet of Things (IoT)
A Litigator's Guide to the Internet of Things (IoT)A Litigator's Guide to the Internet of Things (IoT)
A Litigator's Guide to the Internet of Things (IoT)
 
Lawyers in the Cloud
Lawyers in the CloudLawyers in the Cloud
Lawyers in the Cloud
 
Protect That IP! Or the Art of Doing Business with the Government if You Sell...
Protect That IP! Or the Art of Doing Business with the Government if You Sell...Protect That IP! Or the Art of Doing Business with the Government if You Sell...
Protect That IP! Or the Art of Doing Business with the Government if You Sell...
 
Big Data, Cloud Computing, and Privacy Implications
Big Data, Cloud Computing, and Privacy ImplicationsBig Data, Cloud Computing, and Privacy Implications
Big Data, Cloud Computing, and Privacy Implications
 
2013 SBIR Presentation
2013 SBIR Presentation2013 SBIR Presentation
2013 SBIR Presentation
 
Big Changes in Patent Laws: Implementing the AIA
Big Changes in Patent Laws: Implementing the AIABig Changes in Patent Laws: Implementing the AIA
Big Changes in Patent Laws: Implementing the AIA
 
Angel & Devil: Danger of Emerging Technologies
Angel & Devil: Danger of Emerging TechnologiesAngel & Devil: Danger of Emerging Technologies
Angel & Devil: Danger of Emerging Technologies
 
Social Media for Litigators
Social Media for LitigatorsSocial Media for Litigators
Social Media for Litigators
 
Two Businessess & An IP Fracas
Two Businessess & An IP FracasTwo Businessess & An IP Fracas
Two Businessess & An IP Fracas
 
KIPO/KIPA Presentation: Direct Infringement (2010)
KIPO/KIPA Presentation: Direct Infringement (2010)KIPO/KIPA Presentation: Direct Infringement (2010)
KIPO/KIPA Presentation: Direct Infringement (2010)
 
Spoliation Wars & Other ESI Highlights (2010)
Spoliation Wars & Other ESI Highlights (2010)Spoliation Wars & Other ESI Highlights (2010)
Spoliation Wars & Other ESI Highlights (2010)
 

Kürzlich hochgeladen

TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 

Kürzlich hochgeladen (20)

TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 

Litigators’ Tool Box: Social Media (2011)

  • 1. April 11-13, 2011 www.techshow.com Litigators Toolbox: Session Title Social Media Presenters Presenters Judge Herbert Dixon Sharon {Name} Nelson Antigone{Name} Peyton PRESENTED BY THE April 11-13, 2011 www.techshow.com
  • 2. Social Media April 11-13, 2011 www.techshow.com
  • 3. Social Media •  Internet forums •  Weblogs •  Social blogs •  Microblogging •  Wikis •  Podcasts •  Pictures •  Video •  Ratings •  Social bookmarking April 11-13, 2011 www.techshow.com
  • 4. Facebook Stats •  April 2011: Nearly 600 million active Facebook users (50% daily users) •  Over 100 million w/public information •  Complete Facebook profile contains over 40 pieces of information (+wall posts & status updates) •  2/3 of comScore s Top U.S. websites integrated April 11-13, 2011 www.techshow.com
  • 5. Some Global User Stats •  Twitter – 190 million •  LinkedIn – 75 million •  Plaxo – 40 million •  MySpace – 65 million April 11-13, 2011 www.techshow.com
  • 6. Social Media: Advice For Clients •  The President s Advice: Well, let me give you some very practical tips. First of all, I want everybody here to be careful about what you post on Facebook, because in the YouTube age, whatever you do, it will be pulled up again later somewhere in your life. Obama warns U.S. teens of perils of Facebook, Sept. 8, 2009 (Reuters). April 11-13, 2011 www.techshow.com
  • 7. How Long Does It Last? •  Approximately forever, so THINK before you post •  Twitter keeps all tweets •  April 14, 2010--Library of Congress announced that it is acquiring entire public archive of Tweets •  Facebook keeps posted info until deleted items are overwritten •  You can t control what others do with your posts/photos April 11-13, 2011 www.techshow.com
  • 8. Deleted Does NOT Mean Deleted •  Computer forensics can recover data until overwritten •  May exist on social media servers until overwritten •  Someone else may have reposted or kept the data (e.g., wayback machine ) April 11-13, 2011 www.techshow.com
  • 9. Social Media In Court •  Criminal proceedings- sentencing, alibi •  Evidence to discredit witness/impeachment •  Investigation tool- authorities, lawyers, and jury consultants April 11-13, 2011 www.techshow.com
  • 10. The Power Of Social Media Evidence •  American Academy of Matrimonial Lawyers –  80% of members have seen a sharp increase in SM evidence –  One in five cases now involves FB evidence –  In the U.K. 1/5 of divorce petitions cite FB April 11-13, 2011 www.techshow.com
  • 11. Regular Use Of Social Media •  Criminal law •  Employment law •  Personal injury law April 11-13, 2011 www.techshow.com
  • 12. Its Not Yours Only •  Privacy preferences give way to liberal discovery rules in litigation •  Many rights are waived upon joining, or by default settings •  Information may be subject to subpoena •  Little to no expectation of privacy •  Leduc v. Roman (Quebec)-private Facebook page still discoverable April 11-13, 2011 www.techshow.com
  • 13. Finding Evidence On Social Networking Sites •  The old days: little privacy, you could mine at will •  Today: the majority of people understand privacy settings •  Always check – many accounts are still open •  A friend might always provide info •  Deception is obviously unethical (on the part of the attorney or her staff) •  If someone else deceives (without your involvement), it will probably come in April 11-13, 2011 www.techshow.com
  • 14. Social Media Ethics •  Phila. Bar Op. 2009-02 (3/2009) •  Lawyer had 3rd party send friend request to adverse witness •  Lawyer cannot do that for purposes of searching for otherwise private information on Facebook page •  Rules regarding non-lawyer assistants apply to third-party actions •  Concerns re: dishonesty, fraud, deceit or misrepresentation April 11-13, 2011 www.techshow.com
  • 15. New York Bar Association •  (Sep. 24, 2010) Ethics opinion •  Attorneys can comb through PUBLIC areas of social media sites April 11-13, 2011 www.techshow.com
  • 16. Service of Process •  London High Court allowed service of a court order to an anonymous blogger over Twitter •  Australian court allowed service of a default judgment through Facebook •  9th Circuit ordered e-mail service April 11-13, 2011 www.techshow.com
  • 17. How To Get Social Media Evidence •  Civil subpoenas were long honored •  Now ISPs are citing the ECPA and the SCA and challenging subpoenas •  18 U.S.C. Sec. 2702-2703 – can t divulge the contents of e-mails or other electronic records •  Some exceptions for law enforcement April 11-13, 2011 www.techshow.com
  • 18. What Are Contents? •  It should be the substance of a message •  Attorneys have gotten odd responses –  Times of connections, IP addresses are content –  When challenged SM sites have backed down April 11-13, 2011 www.techshow.com
  • 19. Leading Case •  In Re Subpoena Duces Tecum to AOL, LLC, 550 F. Supp. 2d 606, 2008 U.S. Dist. LEXIS 39349 (E.D. Va. April 18, 2008) •  ECPA prohibits an e-mail service provider from producing customer s e-mail in response to a civil subpoena because it is not a disclosure exemption under the Act April 11-13, 2011 www.techshow.com
  • 20. SCA vs. Social Media •  Crispin v. Christian Audigier, Inc. (C.D. CA. May 26, 2010) •  First case to hold that SCA applies to social networking sites •  Held that messages and comments visible to a restricted set of users were private •  Artist Crispin claimed Ds violated copyright – Ds wanted all MySpace and Facebook references to Ds •  Trying to fit facts into SCA (1986 law) – a very bad fit April 11-13, 2011 www.techshow.com
  • 21. If You Sue…Your Life Is An Open Book •  EEOC v. Simply Storage Management (S.D. In. May 11, 2010) •  Permitted discovery of all relevant SM data whether or not it was private •  EEOC had sued on behalf of two women claiming sexual harassment •  Defendant employer sought the info April 11-13, 2011 www.techshow.com
  • 22. Looking Ahead •  The information will probably still be discoverable and the respondent will have to provide it •  If they don t, attorneys will ask court to compel discovery April 11-13, 2011 www.techshow.com
  • 23. How to Subpoena Facebook •  http://www.facebook.com/ help/?safety=law •  Facebook urges parties to resolve their discovery issues without involving Facebook •  Stored Communications Act, 18 U.S.C. § 2701 et seq. prohibits disclosure of all but basic subscriber info April 11-13, 2011 www.techshow.com
  • 24. FB & User Both Have Access •  Unless user has terminated account, unknown how long data retained (was 90 days, believed to be less now) •  You must serve a valid California or Federal subpoena on Facebook. Out-of- state civil subpoenas must be domesticated in California. Facebook s registered agent for service of process: Custodian of Records, Facebook, Inc. c/o Corporation Services Company 2730 Gateway Oaks Drive Suite100 Sacramento CA 95833 April 11-13, 2011 www.techshow.com
  • 25. What Does It Cost? •  $500 for each account •  $200 for expedited response •  30 days response time April 11-13, 2011 www.techshow.com
  • 26. User Consent Forms •  Obsolete for Facebook, should work for any other sites •  Pursuant to a Rule 34 request for production of relevant, non-privileged material •  Material produced to user or attorney for review before production April 11-13, 2011 www.techshow.com
  • 29. Downloading An Account •  Facebook will prepare download and send a link via e-mail to the user •  All elements of the site – wall, photos, etc. will download as a zip file •  User s counsel will screen for relevant, non-privileged info prior to production April 11-13, 2011 www.techshow.com
  • 30. Danger Of Spoliation •  Attorneys routinely advising deletions (prior to litigation holds) •  Client often deletes after litigation holds •  Preservation of evidence letters critical •  If spoliation suspected, computer forensics may be needed April 11-13, 2011 www.techshow.com
  • 31. Preserving Social Media Evidence •  Generally less than perfect options available •  Screenshot or PDF •  Someone will have to authenticate •  Can use GoToMeeting, CamStudio or other programs to record the process •  Inexpensive to use third-party expert April 11-13, 2011 www.techshow.com
  • 32. Evidentiary Issues •  St. Clair v. Johnny s Oyster & Shrimp, Inc. –  Any evidence procured from the Internet is good for almost nothing •  Lorraine v. Markel American Insurance Co. –  Counsel must be prepared to deal with the evidentiary issues associated with admissibility April 11-13, 2011 www.techshow.com
  • 33. Evidentiary Issues •  FRE 901 •  901(b)(1). Testimony of witness with knowledge. •  901(b)(3). Comparison by the trier of fact or by expert witnesses with a specimen. •  901(b)(4). Distinctive characteristics and the like. •  901(b)(7). Public records. •  901(b)(9). Evidence produced as a result of an accurate process or system. April 11-13, 2011 www.techshow.com
  • 34. Evidentiary Issues •  FRE 902: SELF AUTHENTICATION •  Three of the rules have been used in the courts to authenticate ESI: •  902(5). Official publications. •  902(7). Self-authentication by inscriptions, signs, tags or labels. •  902(11). Authentication of regularly conducted business. April 11-13, 2011 www.techshow.com
  • 35. Facebook Authentication •  Notarized declarations as to validity provided (an extra $100) •  But no witnesses for trial or depositions •  Will notify user of subpoena to allow time for motion to quash April 11-13, 2011 www.techshow.com
  • 36. How Do You Authenticate? •  Smart lawyers –  Requests for admission –  Stipulations •  Many courts have common sense rule: If the other side doesn t object, it comes in April 11-13, 2011 www.techshow.com
  • 37. Authentication •  Did you post this? •  Did you see this post? •  Context and content can authenticate •  Expert testimony •  Computer forensics if data was deleted April 11-13, 2011 www.techshow.com
  • 38. Snitches Get Stitches: U Know Who U Are! •  Griffin v. Maryland (Ct. of App. M.D. May 27, 2010) •  Murder case - D s girlfriend appeared to threaten a witness on MySpace •  Site maintained under pseudonym •  Prosecution sought to intro to rehabilitate witness who changed testimony •  Had photo of D and girlfriend •  Page referred to D as Boozy •  Court said site could be authenticated from content and context April 11-13, 2011 www.techshow.com
  • 39. Prosecutors Embracing iJuror Social Media •  Cameron County TX •  Searching SM sites of prospective jurors •  Googling them •  Keeping up with the defense in jury investigations April 11-13, 2011 www.techshow.com
  • 40. Voir Dire Trends •  Wall Street Jrnl. (Feb. 22, 2011)- Prosecution and defense lawyers probing jury pool –  Religion –  Activities –  What TV they watch –  Opinions they hold –  But much is now private –  Useful to know that someone is married and loves GLEE? April 11-13, 2011 www.techshow.com
  • 41. Save the Date ABA TECHSHOW 2012 March 29-31, 2012 Hilton Chicago April 11-13, 2011 www.techshow.com