For The Defense, February 2012 - DRI Today
For The Defense, February 2012 - DRI Today
For The Defense, February 2012 - DRI Today
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Electronic Discovery<br />
drives among other forms. See, e.g., Zubulake<br />
I, 217 F.R.D. at 317 (“[plain tiff] is entitled<br />
to discovery of the requested e-mails<br />
so long as they are relevant to her claims”);<br />
Antioch Co. v. Scrapbook Borders, Inc., 210<br />
F.R.D. 645, 652 (D. Minn. 2002) (“[I]t is a<br />
well accepted proposition that deleted computer<br />
files, whether they be e-mails or otherwise,<br />
are discoverable.”) Moreover, due to<br />
Virtually anyone entering<br />
the workforce today for the<br />
first time is a digital native,<br />
and digital natives will<br />
soon outnumber the rest.<br />
the unique nature of computerized data litigants<br />
can discover even “deleted” electronic<br />
information because a backup or emergency<br />
system will often save it. See Simon Property<br />
Group, L.P. v. MySimon, Inc., 194 F.R.D. 639,<br />
640 (S.D. Ind. 2000) (“[C]om puter records,<br />
including records that have been deleted,<br />
are documents discoverable under Fed. R.<br />
Civ. P. 34.”).<br />
<strong>The</strong> discoverability of emerging social<br />
media presents some unique challenges.<br />
Information from internal instantmessaging<br />
chats, virtual desktops, Yammer,<br />
Facebook, or Twitter posts can provide<br />
evidence vital to disputes and regulatory<br />
proceedings: “Indeed, such evidence may<br />
be the new ‘smoking gun’ in many cases.”<br />
Steven C. Bennett, Civil Discovery of Social<br />
Networking Information, 29 S.W. Law Rev.<br />
413, 413–14 (2010).<br />
In 2006, the U.S. Supreme Court<br />
amended the Federal Rules of Civil Procedure<br />
to create a category for electronic<br />
records that for the first time explicitly<br />
named e-mails and instant- message chats<br />
as records that businesses should probably<br />
archive and produce when relevant.<br />
Although the case law discussing the discoverability<br />
of information on the newly<br />
emerging external and internal social<br />
networks is less than robust, the limited<br />
authority on point indicates that litigants<br />
may potentially discover that information.<br />
28 ■ <strong>For</strong> <strong>The</strong> <strong>Defense</strong> ■ <strong>February</strong> <strong>2012</strong><br />
Flagg v. <strong>The</strong> City of Detroit was a key case<br />
that addressed discovering instant messaging<br />
and other social online tools. No. 05-<br />
74253, 2008 WL 787039, at 3–7 (E.D. Mich.<br />
Mar. 20, 2008). In Flagg, the court stated<br />
that the plaintiff could pursue some but<br />
not all text messages exchanged between<br />
officials or employees during specific time<br />
frames. <strong>The</strong> court also stated that it would<br />
put into place a mechanism to review the<br />
text messages. <strong>The</strong> courts have made it clear<br />
that litigants can discover those things individuals<br />
or organizations post publicly.<br />
See Katiroll Co., Inc. v. Kati Roll & Platters,<br />
Inc., No. 10-3620 (GEB), 2011 WL 3583408<br />
(D.N.J. Aug. 3, 2011) (ordering the defendant<br />
to re-post a Facebook profile picture showing<br />
an allegedly infringing trade dress to<br />
allow the plaintiffs to copy it); Offenback v.<br />
L.M. Bowman, Inc., No. 1:10-CV-1789, 2011<br />
WL 2491371 (M.D. Pa. June 22, 2011) (acknowledging<br />
that the “scope of discovery<br />
into social media sites ‘requires the application<br />
of basic discovery principles in a novel<br />
context’” and that “the challenge is to ‘define<br />
appropriately broad limits… on the discovery<br />
ability of social communications’”);<br />
McMillen v. Hummingbird Speedway, Inc.,<br />
No. 113-2010 CD, 2010 Pa. Dist. & Cnty. Dec.<br />
LEXIS 270, at *4 (Pa. Ct. Common Pleas<br />
Sept. 9, 2010) (holding that it would be unrealistic<br />
for a Facebook user to expect that<br />
his disclosures would be confidential); see<br />
also Bennett, supra, at 450 (explaining that<br />
most sites, such as Twitter, have subpoena<br />
processes, which requires subpoena by e-<br />
mail, and Facebook, which requires issuing<br />
subpoenas through the California courts).<br />
Mitigating Risks<br />
Companies must carefully weigh the pros<br />
and cons when making decisions about<br />
using social media in the workplace.<br />
Whether to host an internal social network<br />
or allowing employee access to public<br />
social networking tools can significantly<br />
impact a business’ bottom line. Many companies<br />
have banned the use of Facebook<br />
and Twitter in the workplace while others<br />
have taken a more moderate stance on<br />
the posting of information. Choosing an<br />
approach requires examining the utility of<br />
the program at issue, and then balancing<br />
the risks and the benefits.<br />
Companies should be aware that simply<br />
“blocking access” may not remedy perceived<br />
problems. Although 30–40 percent<br />
of companies say that they ban sites such<br />
as LinkedIn, Twitter, and Facebook, in a<br />
survey last spring a company called Palo<br />
Alto Networks detected Facebook use on<br />
92 percent of the 347 enterprise networks<br />
that claimed to block it. Additionally, Twitter<br />
was detected on 87 percent of corporate<br />
nets, while LinkedIn and MySpace<br />
were detected at 83 percent and 82 percent<br />
respectively. Dan Tynan, How to Tame the<br />
Social Network at Work, InfoWorld Daily,<br />
Oct. 18, 2010. In short, “employees are<br />
very motivated when it comes to getting on<br />
Facebook.” Id.<br />
With mobile devices, businesses can<br />
lessen security risks and ease discoverability<br />
headaches by issuing company- owned<br />
devices rather than allowing employees<br />
to use their own for business purposes.<br />
A business should install remote<br />
wipe capability and password protection as<br />
standard protocols. Implementing restrictive<br />
policies, setting parameters for use,<br />
and monitoring usage are additional helpful<br />
measures that a company can take to<br />
ensure employee compliance and defensible<br />
business practices.<br />
Acceptable Use Policies<br />
Companies allowing access to outside networking<br />
tools or implementing internal<br />
systems should prioritize developing comprehensive<br />
acceptable use policies with<br />
input and compliance oversight by members<br />
of their legal, human resources, and<br />
IT departments. Because an acceptable<br />
use policy is only valuable if employees<br />
know about and adhere to its provisions, a<br />
robust and well- publicized internal rollout<br />
and ongoing employee education are critical<br />
for success.<br />
Incorporating a company’s acceptable<br />
use policy into a corporate audit program is<br />
something else to consider. Auditing social<br />
networking policy compliance can become<br />
a catalyst for improving effectiveness and<br />
efficiency by providing insight into business<br />
processes; however, audit reports can<br />
also become discovery targets in litigation.<br />
In implementing an acceptable use<br />
policy consider specificity, education,<br />
enforceability, separation, discoverability,<br />
visibility, formality, and accessibility<br />
limits. First, by “specificity,” we mean that<br />
an umbrella computer usage policy may