08.01.2015 Views

For The Defense, February 2012 - DRI Today

For The Defense, February 2012 - DRI Today

For The Defense, February 2012 - DRI Today

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Electronic Discovery<br />

drives among other forms. See, e.g., Zubulake<br />

I, 217 F.R.D. at 317 (“[plain tiff] is entitled<br />

to discovery of the requested e-mails<br />

so long as they are relevant to her claims”);<br />

Antioch Co. v. Scrapbook Borders, Inc., 210<br />

F.R.D. 645, 652 (D. Minn. 2002) (“[I]t is a<br />

well accepted proposition that deleted computer<br />

files, whether they be e-mails or otherwise,<br />

are discoverable.”) Moreover, due to<br />

Virtually anyone entering<br />

the workforce today for the<br />

first time is a digital native,<br />

and digital natives will<br />

soon outnumber the rest.<br />

the unique nature of computerized data litigants<br />

can discover even “deleted” electronic<br />

information because a backup or emergency<br />

system will often save it. See Simon Property<br />

Group, L.P. v. MySimon, Inc., 194 F.R.D. 639,<br />

640 (S.D. Ind. 2000) (“[C]om puter records,<br />

including records that have been deleted,<br />

are documents discoverable under Fed. R.<br />

Civ. P. 34.”).<br />

<strong>The</strong> discoverability of emerging social<br />

media presents some unique challenges.<br />

Information from internal instantmessaging<br />

chats, virtual desktops, Yammer,<br />

Facebook, or Twitter posts can provide<br />

evidence vital to disputes and regulatory<br />

proceedings: “Indeed, such evidence may<br />

be the new ‘smoking gun’ in many cases.”<br />

Steven C. Bennett, Civil Discovery of Social<br />

Networking Information, 29 S.W. Law Rev.<br />

413, 413–14 (2010).<br />

In 2006, the U.S. Supreme Court<br />

amended the Federal Rules of Civil Procedure<br />

to create a category for electronic<br />

records that for the first time explicitly<br />

named e-mails and instant- message chats<br />

as records that businesses should probably<br />

archive and produce when relevant.<br />

Although the case law discussing the discoverability<br />

of information on the newly<br />

emerging external and internal social<br />

networks is less than robust, the limited<br />

authority on point indicates that litigants<br />

may potentially discover that information.<br />

28 ■ <strong>For</strong> <strong>The</strong> <strong>Defense</strong> ■ <strong>February</strong> <strong>2012</strong><br />

Flagg v. <strong>The</strong> City of Detroit was a key case<br />

that addressed discovering instant messaging<br />

and other social online tools. No. 05-<br />

74253, 2008 WL 787039, at 3–7 (E.D. Mich.<br />

Mar. 20, 2008). In Flagg, the court stated<br />

that the plaintiff could pursue some but<br />

not all text messages exchanged between<br />

officials or employees during specific time<br />

frames. <strong>The</strong> court also stated that it would<br />

put into place a mechanism to review the<br />

text messages. <strong>The</strong> courts have made it clear<br />

that litigants can discover those things individuals<br />

or organizations post publicly.<br />

See Katiroll Co., Inc. v. Kati Roll & Platters,<br />

Inc., No. 10-3620 (GEB), 2011 WL 3583408<br />

(D.N.J. Aug. 3, 2011) (ordering the defendant<br />

to re-post a Facebook profile picture showing<br />

an allegedly infringing trade dress to<br />

allow the plaintiffs to copy it); Offenback v.<br />

L.M. Bowman, Inc., No. 1:10-CV-1789, 2011<br />

WL 2491371 (M.D. Pa. June 22, 2011) (acknowledging<br />

that the “scope of discovery<br />

into social media sites ‘requires the application<br />

of basic discovery principles in a novel<br />

context’” and that “the challenge is to ‘define<br />

appropriately broad limits… on the discovery<br />

ability of social communications’”);<br />

McMillen v. Hummingbird Speedway, Inc.,<br />

No. 113-2010 CD, 2010 Pa. Dist. & Cnty. Dec.<br />

LEXIS 270, at *4 (Pa. Ct. Common Pleas<br />

Sept. 9, 2010) (holding that it would be unrealistic<br />

for a Facebook user to expect that<br />

his disclosures would be confidential); see<br />

also Bennett, supra, at 450 (explaining that<br />

most sites, such as Twitter, have subpoena<br />

processes, which requires subpoena by e-<br />

mail, and Facebook, which requires issuing<br />

subpoenas through the California courts).<br />

Mitigating Risks<br />

Companies must carefully weigh the pros<br />

and cons when making decisions about<br />

using social media in the workplace.<br />

Whether to host an internal social network<br />

or allowing employee access to public<br />

social networking tools can significantly<br />

impact a business’ bottom line. Many companies<br />

have banned the use of Facebook<br />

and Twitter in the workplace while others<br />

have taken a more moderate stance on<br />

the posting of information. Choosing an<br />

approach requires examining the utility of<br />

the program at issue, and then balancing<br />

the risks and the benefits.<br />

Companies should be aware that simply<br />

“blocking access” may not remedy perceived<br />

problems. Although 30–40 percent<br />

of companies say that they ban sites such<br />

as LinkedIn, Twitter, and Facebook, in a<br />

survey last spring a company called Palo<br />

Alto Networks detected Facebook use on<br />

92 percent of the 347 enterprise networks<br />

that claimed to block it. Additionally, Twitter<br />

was detected on 87 percent of corporate<br />

nets, while LinkedIn and MySpace<br />

were detected at 83 percent and 82 percent<br />

respectively. Dan Tynan, How to Tame the<br />

Social Network at Work, InfoWorld Daily,<br />

Oct. 18, 2010. In short, “employees are<br />

very motivated when it comes to getting on<br />

Facebook.” Id.<br />

With mobile devices, businesses can<br />

lessen security risks and ease discoverability<br />

headaches by issuing company- owned<br />

devices rather than allowing employees<br />

to use their own for business purposes.<br />

A business should install remote<br />

wipe capability and password protection as<br />

standard protocols. Implementing restrictive<br />

policies, setting parameters for use,<br />

and monitoring usage are additional helpful<br />

measures that a company can take to<br />

ensure employee compliance and defensible<br />

business practices.<br />

Acceptable Use Policies<br />

Companies allowing access to outside networking<br />

tools or implementing internal<br />

systems should prioritize developing comprehensive<br />

acceptable use policies with<br />

input and compliance oversight by members<br />

of their legal, human resources, and<br />

IT departments. Because an acceptable<br />

use policy is only valuable if employees<br />

know about and adhere to its provisions, a<br />

robust and well- publicized internal rollout<br />

and ongoing employee education are critical<br />

for success.<br />

Incorporating a company’s acceptable<br />

use policy into a corporate audit program is<br />

something else to consider. Auditing social<br />

networking policy compliance can become<br />

a catalyst for improving effectiveness and<br />

efficiency by providing insight into business<br />

processes; however, audit reports can<br />

also become discovery targets in litigation.<br />

In implementing an acceptable use<br />

policy consider specificity, education,<br />

enforceability, separation, discoverability,<br />

visibility, formality, and accessibility<br />

limits. First, by “specificity,” we mean that<br />

an umbrella computer usage policy may

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!