19.07.2013 Views

Facebook Discovery and the Unbearable Sameness of Internet Law

Facebook Discovery and the Unbearable Sameness of Internet Law

Facebook Discovery and the Unbearable Sameness of Internet Law

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Oversharing: <strong>Facebook</strong> <strong>Discovery</strong> <strong>and</strong> <strong>the</strong><br />

<strong>Unbearable</strong> <strong>Sameness</strong> <strong>of</strong> <strong>Internet</strong> <strong>Law</strong><br />

Bruce E. Boyden ∗<br />

I. INTRODUCTION<br />

Social-media networks have resulted in <strong>the</strong> oversharing <strong>of</strong><br />

information. Too many people, confronted with <strong>the</strong> ability to<br />

share information with o<strong>the</strong>rs via social networks, readily avail<br />

<strong>the</strong>mselves <strong>of</strong> that opportunity, causing personal information to<br />

be shared from <strong>Facebook</strong> or Twitter accounts with little care as<br />

to its relevance or privacy. These people need to be reminded<br />

that <strong>the</strong>re are rules about how much information must be shared,<br />

<strong>and</strong> with whom—rules that served a prior generation just fine<br />

<strong>and</strong> continue to govern <strong>the</strong> <strong>Internet</strong>, even if <strong>the</strong>y seem oldfashioned.<br />

I am speaking, <strong>of</strong> course, <strong>of</strong> judges.<br />

Judges are obviously not <strong>the</strong> only ones struggling to<br />

determine what <strong>the</strong> rules are—legal or social—when it comes to<br />

social networks such as <strong>Facebook</strong>. The changes wrought by<br />

modern technology <strong>and</strong> <strong>the</strong>ir concomitant effects on social <strong>and</strong><br />

legal practices have bemused <strong>and</strong> bedeviled judges, lawyers,<br />

legislators, businesses, <strong>and</strong> ordinary individuals for <strong>the</strong> past two<br />

decades. The rise <strong>of</strong> social-networking sites is only <strong>the</strong> latest<br />

development in that brief history. 1 The ease with which<br />

∗ Assistant Pr<strong>of</strong>essor, Marquette University <strong>Law</strong> School. B.A., Arkansas, 1991; M.A.,<br />

Northwestern, 1993; J.D., Yale, 1997.<br />

1. For an overview <strong>of</strong> <strong>the</strong> rise <strong>of</strong> social-networking sites, see generally danah m.<br />

boyd & Nicole B. Ellison, Social Network Sites: Definition, History, <strong>and</strong> Scholarship, J.<br />

COMPUTER-MEDIATED COMM., Oct. 2007, http://jcmc.indiana.edu/vol13/issue1/boyd.<br />

ellison. html; James Grimmelmann, Saving <strong>Facebook</strong>, 94 IOWA L. REV. 1137, 1144-49<br />

(2009); Evan E. North, Comment, <strong>Facebook</strong> Isn’t Your Space Anymore: <strong>Discovery</strong> <strong>of</strong><br />

Social Networking Websites, 58 U. KAN. L. REV. 1279, 1284-86 (2010). Although <strong>the</strong> first<br />

recognizable social network, SixDegrees.com, launched in 1997, it was not until 2002 <strong>and</strong><br />

<strong>the</strong> launch <strong>of</strong> Friendster that social-networking sites began to become a cultural force. See<br />

boyd & Ellison, supra. Friendster recently closed its doors, see Jenna Wortham, Social<br />

Site to Erase Early Posts, N.Y. TIMES, Apr. 27, 2011, at B1, having been overshadowed in<br />

<strong>the</strong> interim in <strong>the</strong> United States by <strong>the</strong> overwhelming popularity <strong>of</strong> <strong>Facebook</strong>, which was


40 ARKANSAS LAW REVIEW [Vol. 65:39<br />

information can now be collected, distributed, <strong>and</strong> stored is<br />

leading to a truly revolutionary shift in <strong>the</strong> power <strong>and</strong><br />

capabilities <strong>of</strong> individuals <strong>and</strong> small businesses. 2 But<br />

technological revolutions disrupt both limitations <strong>and</strong><br />

protections alike. The same changes that exp<strong>and</strong> <strong>the</strong> reach <strong>of</strong><br />

ordinary individuals are also leading to <strong>the</strong> increased<br />

documentation <strong>of</strong> every aspect <strong>of</strong> <strong>the</strong>ir lives.<br />

The disruptive effects <strong>of</strong> <strong>the</strong>se changes are real, <strong>and</strong><br />

examples <strong>of</strong> individuals, companies, <strong>and</strong> courts that ignore <strong>the</strong>m<br />

are well known. But it is possible to overcompensate for<br />

technological change. The meme that everything on <strong>the</strong> <strong>Internet</strong><br />

is startlingly different has become so engrained that it is actually<br />

fairly common for people to miss instances where <strong>the</strong> fact that a<br />

transaction or communication occurs on <strong>the</strong> <strong>Internet</strong>, or using<br />

computers, is <strong>of</strong> no significance at all. In <strong>the</strong> legal world, <strong>the</strong>re<br />

are numerous examples where <strong>the</strong> st<strong>and</strong>ard rules developed over<br />

<strong>the</strong> course <strong>of</strong> <strong>the</strong> twentieth century work just fine when applied<br />

to <strong>the</strong> <strong>Internet</strong>.<br />

Call <strong>the</strong>se “<strong>Law</strong> <strong>of</strong> <strong>the</strong> Horse” cases. The term is derived<br />

from Judge Frank Easterbrook, who in 1996, <strong>the</strong> dawn <strong>of</strong> <strong>the</strong><br />

Information Age, decried efforts to develop new laws <strong>and</strong> legal<br />

doctrines to govern <strong>the</strong> <strong>Internet</strong> as akin to trying to define a “law<br />

<strong>of</strong> <strong>the</strong> horse”—that is, a compilation <strong>of</strong> all laws <strong>and</strong> cases in<br />

which a horse was involved. 3 There would be no coherence to<br />

such a subject; <strong>and</strong> so it was, Easterbrook argued, with <strong>the</strong><br />

nascent subject that devotees were already calling “<strong>the</strong> <strong>Law</strong> <strong>of</strong><br />

Cyberspace.” 4 A field <strong>of</strong> study defined only by <strong>the</strong> fact that its<br />

cases involved <strong>the</strong> <strong>Internet</strong> <strong>and</strong> that its statutes applied to<br />

<strong>Internet</strong> activities would be a confusing mélange <strong>of</strong> materials. 5<br />

Worse, Easterbrook argued, in attempting to invent new law<br />

without a good sense <strong>of</strong> what new law is needed, or why, <strong>the</strong>re<br />

is <strong>the</strong> risk <strong>of</strong> doing more harm than good. 6<br />

launched in 2004 <strong>and</strong> slowly rolled out to <strong>the</strong> general public by 2006. See boyd & Ellison,<br />

supra.<br />

2. See William Jeremy Robison, Note, Free at What Cost?: Cloud Computing<br />

Privacy Under <strong>the</strong> Stored Communications Act, 98 GEO. L.J. 1195, 1197-98 (2010).<br />

3. Frank H. Easterbrook, Cyberspace <strong>and</strong> <strong>the</strong> <strong>Law</strong> <strong>of</strong> <strong>the</strong> Horse, 1996 U. CHI. LEGAL<br />

F. 207, 207-08.<br />

4. See id.<br />

5. See id.<br />

6. See id. at 215-16.


2012] OVERSHARING: FACEBOOK DISCOVERY 41<br />

If <strong>Internet</strong> law is to be a useful subject, <strong>the</strong>n its focus must<br />

be on something o<strong>the</strong>r than just how modern legal disputes<br />

sometimes involve <strong>the</strong> <strong>Internet</strong>. One alternative might be a<br />

substantive focus; to study, as telecommunications law does, just<br />

those statutes that regulate <strong>Internet</strong>-only transactions: domainname<br />

regulation, 7 anti-spam laws, 8 web-host immunities, 9 <strong>and</strong><br />

more. But <strong>the</strong>re are broader <strong>the</strong>mes within <strong>the</strong> development <strong>of</strong><br />

law over <strong>the</strong> past decade <strong>and</strong> a half since Easterbrook’s article<br />

that might also be worth attention. Ano<strong>the</strong>r pr<strong>of</strong>itable focus<br />

might, <strong>the</strong>refore, be methodological: <strong>Internet</strong> law can be seen as<br />

a special case study <strong>of</strong> how law changes, or should change, in<br />

response to changes in technology.<br />

The issue <strong>of</strong> discovery <strong>of</strong> social-networking communications<br />

in civil suits provides a useful example <strong>of</strong> <strong>the</strong> methodology<br />

<strong>of</strong> <strong>Internet</strong> law <strong>and</strong> illustrates some <strong>of</strong> <strong>the</strong> hazards <strong>of</strong> getting it<br />

wrong. There are at least two types <strong>of</strong> inquiry one might make.<br />

One is <strong>the</strong> normative question, from <strong>the</strong> perspective <strong>of</strong> a<br />

legislator or perhaps a judge with discretion to adopt a new rule,<br />

<strong>of</strong> whe<strong>the</strong>r <strong>the</strong> law should change in response to technological<br />

changes. Ano<strong>the</strong>r is <strong>the</strong> interpretive question <strong>of</strong> how best to<br />

read <strong>and</strong> apply existing law to a new set <strong>of</strong> facts that do not fit<br />

well within it. The key step in both is to determine whe<strong>the</strong>r a<br />

given technological change has materially altered ei<strong>the</strong>r <strong>the</strong><br />

underlying behaviors or <strong>the</strong> effectiveness <strong>of</strong> <strong>the</strong> law in<br />

regulating <strong>the</strong>m. If so, <strong>the</strong> lawmaker may want to alter <strong>the</strong> law<br />

to bring it back in line with its objectives; <strong>and</strong> <strong>the</strong> interpreter <strong>of</strong><br />

<strong>the</strong> law may need to make his or her reading <strong>of</strong> <strong>the</strong> law ei<strong>the</strong>r<br />

more restrictive or more expansive to keep it within its original<br />

bounds. But if a change in technology has not materially altered<br />

<strong>the</strong> way <strong>the</strong> law operates, <strong>the</strong>n tinkering with <strong>the</strong> law is not only<br />

unnecessary, it may disrupt careful balances that <strong>the</strong> rule had<br />

7. See, e.g., Anticybersquatting Consumer Protection Act, 15 U.S.C. § 1125(d)<br />

(2006); Uniform Domain Name Dispute Resolution Policy, INTERNET CORPORATION FOR<br />

ASSIGNED NAMES AND NUMBERS (Oct. 24, 1999), http://archive.icann.org/en/udrp/udrppolicy-24oct99.htm.<br />

8. See, e.g., Controlling <strong>the</strong> Assault <strong>of</strong> Non-Solicited Pornography <strong>and</strong> Marketing<br />

Act <strong>of</strong> 2003, 15 U.S.C. §§ 7701-7713 (2006).<br />

9. See, e.g., 17 U.S.C. § 512 (2006) (granting conditional immunity to websites for<br />

<strong>the</strong> infringing acts <strong>of</strong> users); 47 U.S.C. § 230(c)(1) (2006) (providing that no ISP shall be<br />

treated as <strong>the</strong> “publisher or speaker <strong>of</strong> any information provided by ano<strong>the</strong>r information<br />

content provider”).


42 ARKANSAS LAW REVIEW [Vol. 65:39<br />

achieved without anyone fully realizing it. There is danger,<br />

<strong>the</strong>n, in “<strong>Law</strong> <strong>of</strong> <strong>the</strong> Horse” cases; not <strong>the</strong> <strong>of</strong>t-cited danger <strong>of</strong><br />

blindly staying <strong>the</strong> course in turbulent wea<strong>the</strong>r, but <strong>the</strong> more<br />

subtle risk <strong>of</strong> turning too abruptly away from <strong>the</strong> storm into<br />

uncharted waters.<br />

Social-media discovery is an example <strong>of</strong> <strong>the</strong> challenges <strong>of</strong><br />

<strong>Internet</strong> law. Social media are part <strong>of</strong> a growing trend <strong>of</strong> <strong>the</strong><br />

increasing documentation <strong>of</strong> <strong>the</strong> daily lives <strong>of</strong> individuals. 10<br />

Through <strong>Facebook</strong>, Twitter, <strong>and</strong> o<strong>the</strong>r similar services, users can<br />

share a variety <strong>of</strong> materials with friends or acquaintances <strong>of</strong> <strong>the</strong>ir<br />

choosing, including tasteless jokes, updates on <strong>the</strong>ir love lives,<br />

poignant reminiscences, business successes, petty complaints,<br />

party photographs, news about <strong>the</strong>ir children, or anything else<br />

<strong>the</strong>y choose to disclose. Users can broadcast such information<br />

to several hundred recipients at once, or send more targeted<br />

communications to particular friends. Thus, <strong>Facebook</strong> <strong>and</strong> its<br />

ilk allow an individual to self-report a more or less permanent<br />

record <strong>of</strong> his or her daily activities, <strong>and</strong> even his or her thoughts.<br />

Moreover, those thoughts are <strong>of</strong>ten unfiltered, since <strong>the</strong>y are<br />

intended only for “friends,” <strong>and</strong> <strong>the</strong> idiom for social-networking<br />

posts seems to encourage sarcasm, humor, cynicism, or anger,<br />

none <strong>of</strong> which translate well into o<strong>the</strong>r contexts. 11 Ordinary<br />

individuals are just starting to come to terms with <strong>the</strong><br />

implications <strong>of</strong> this, however. As business litigants have known<br />

for quite some time, such documents can prove a lucrative area<br />

for discovery in any dispute. 12 Individuals, too, have been<br />

surprised by <strong>the</strong> extent to which technology has changed <strong>the</strong><br />

practical realities <strong>of</strong> litigation for <strong>the</strong>m.<br />

Attorneys <strong>and</strong> courts have <strong>the</strong>mselves made two sorts <strong>of</strong><br />

errors in adapting to this new situation—one a “false negative”<br />

<strong>and</strong> <strong>the</strong> o<strong>the</strong>r a “false positive.” The first error sometimes made<br />

10. See, e.g., Cindy Rich, Secret Life <strong>of</strong> Teens: “Coolest Thing Ever,”<br />

WASHINGTONIAN MAG. (Aug. 1, 2007), available at http://www.washingtonian.com/<br />

articles/businesscareers/4903.html.<br />

11. See, e.g., This American Life: Right to Remain Silent, Chicago Public Radio<br />

(Sept. 10, 2010), http://www.thisamericanlife.org/radio-archives/episode/414/right-toremain-silent<br />

(paraphrase <strong>of</strong> line from “Fight Club” as <strong>Facebook</strong> status update leads to<br />

arrest for making terroristic threats).<br />

12. See, e.g., Scott Cohn, S&P Officials: We’d Do a Deal ‘Structured by Cows,’<br />

CNBC.COM (Oct. 22, 2008), http:// www.cnbc.com/id/27321998/S_P_Officials_We_d_<br />

Do_a_Deal_Structured_by_Cows.


2012] OVERSHARING: FACEBOOK DISCOVERY 43<br />

by attorneys, <strong>and</strong> less frequently by courts, is in presuming that<br />

<strong>the</strong> procedures for obtaining discovery will work exactly <strong>the</strong><br />

same for electronic documents, such as emails <strong>and</strong> socialnetworking<br />

posts, as <strong>the</strong>y do for paper documents—that nothing<br />

has changed. In particular, parties who presume <strong>the</strong>y can<br />

subpoena electronic documents from third-party <strong>Internet</strong> Service<br />

Providers (ISPs) may discover that federal law bars ISPs from<br />

complying with ordinary pretrial subpoenas. 13 The party itself<br />

must be <strong>the</strong> target <strong>of</strong> such discovery. 14<br />

But <strong>the</strong> more serious mistake is <strong>the</strong> opposite one—a<br />

presumption by courts <strong>and</strong> attorneys that <strong>the</strong> rules governing<br />

discovery <strong>of</strong> social-networking information in a civil dispute<br />

must be radically different from those governing paper<br />

documents. Courts are increasingly ordering parties to provide<br />

not just relevant documents responsive to an opposing party’s<br />

requests—an obligation that private parties in litigation<br />

unquestionably have, <strong>and</strong> which individuals are discovering to<br />

<strong>the</strong>ir chagrin—but also to provide opposing parties with<br />

unfettered access to <strong>the</strong>ir accounts. 15 That is, courts are<br />

ordering parties to provide access to all <strong>of</strong> <strong>the</strong>ir socialnetworking<br />

posts on any subject, related or not to <strong>the</strong> claims <strong>and</strong><br />

defenses at issue in <strong>the</strong> lawsuit, apparently on <strong>the</strong> <strong>the</strong>ory that<br />

because <strong>the</strong> posts are on <strong>the</strong> <strong>Internet</strong>, <strong>the</strong> normal rules <strong>of</strong><br />

discovery do not apply. 16<br />

As I argue below, ordering a party to provide ano<strong>the</strong>r party<br />

with access to an entire account is an incorrect reading <strong>of</strong> <strong>the</strong><br />

rules governing discovery. But it is intriguing to speculate as to<br />

why some courts are making this mistake. In part, it may simply<br />

13. See 18 U.S.C. § 2702 (2006). For more, see infra Part II.<br />

14. See 18 U.S.C. § 2702 (prohibiting a service provider from divulging <strong>the</strong> contents<br />

<strong>of</strong> a person’s electronic communication except in <strong>the</strong> allowable exceptions listed in §<br />

2702(a)); see also In re Subpoena Duces Tecum to AOL, 550 F. Supp. 2d 606, 611 (E.D.<br />

Va. 2008) (holding that a party could not use a civil-discovery subpoena to circumvent <strong>the</strong><br />

exceptions listed in <strong>the</strong> Privacy Act).<br />

15. See, e.g., Barnes v. CUS Nashville, LLC, No. 3:09-cv-00764, 2010 WL<br />

2265668, at *1 (M.D. Tenn. June 3, 2010). For more, see infra Part III.A.<br />

16. See infra note 58 <strong>and</strong> accompanying text. For <strong>the</strong> most part, <strong>the</strong> courts ordering<br />

such access have been state courts. See id. However, <strong>the</strong> rules governing discovery in<br />

most states are fairly similar to those governing discovery under <strong>the</strong> Federal Rules <strong>of</strong> Civil<br />

Procedure. See infra note 34 <strong>and</strong> accompanying text. Fur<strong>the</strong>rmore, <strong>the</strong>re is no reason to<br />

suspect that federal judges are somehow immune from whatever chain <strong>of</strong> reasoning is<br />

leading state-court judges to order over-production.


44 ARKANSAS LAW REVIEW [Vol. 65:39<br />

be an example <strong>of</strong> <strong>Internet</strong> law gone slightly awry. Certainly <strong>the</strong><br />

courts are correct to <strong>the</strong> extent <strong>the</strong>y are sensing that one <strong>of</strong> <strong>the</strong><br />

costs <strong>of</strong> discovery, leading to a vast amount <strong>of</strong> inefficiency, is<br />

removed when <strong>the</strong> documents in question are available online<br />

with a simple username <strong>and</strong> password. But one pervasive<br />

feature <strong>of</strong> <strong>Internet</strong> law is that transaction costs in <strong>the</strong> physical<br />

world <strong>of</strong>ten mask o<strong>the</strong>r values that we as a society believe to be<br />

important. For example, <strong>the</strong> cost <strong>of</strong> personally visiting a clerk’s<br />

<strong>of</strong>fice <strong>and</strong> looking up property or court records concerning<br />

individuals not only made large-scale use <strong>of</strong> such records<br />

inefficient, but it also protected personal privacy to some extent.<br />

Likewise, <strong>the</strong> cost <strong>of</strong> duplicating copyrighted materials did a fair<br />

amount <strong>of</strong> <strong>the</strong> work <strong>of</strong> enforcing copyright law.<br />

Social-media discovery orders entered by courts <strong>the</strong>refore<br />

have <strong>the</strong> advantage <strong>of</strong> revealing a hidden <strong>and</strong> important function<br />

<strong>of</strong> civil-discovery rules: <strong>the</strong> extent to which <strong>the</strong>y protect privacy.<br />

The Federal Rules <strong>of</strong> Civil Procedure <strong>and</strong> similar state rules, by<br />

<strong>the</strong>ir very terms, balance efficiency against justice. The rules<br />

governing discovery would perhaps be more efficient if <strong>the</strong>y<br />

allowed opposing counsel to go rummaging through a party’s<br />

documents, looking for relevant material. But <strong>the</strong> rules by <strong>and</strong><br />

large require only production <strong>of</strong> documents, with limited<br />

exceptions for physical objects, processes, or real property. 17<br />

The reason is that it would be far too invasive to require, as a<br />

condition <strong>of</strong> bringing a claim or defending against one, that<br />

parties open all evidence <strong>of</strong> <strong>the</strong>ir most personal thoughts or<br />

confidential business plans to an adverse party. 18 The gain in<br />

efficiency from a different rule is outweighed by <strong>the</strong> net social<br />

costs in both <strong>the</strong> privacy <strong>of</strong> litigants <strong>and</strong> <strong>the</strong> dissuasion <strong>of</strong> those<br />

with meritorious claims or defenses from pursuing those claims<br />

<strong>and</strong> defenses to <strong>the</strong>ir conclusions.<br />

17. See FED. R. CIV. P. 34(a)(2).<br />

18. There has been considerable grumbling about m<strong>and</strong>atory disclosure <strong>and</strong> how it is<br />

contrary to <strong>the</strong> nature <strong>of</strong> <strong>the</strong> adversarial system. See generally 6 JAMES WM. MOORE ET<br />

AL., MOORE’S FEDERAL PRACTICE § 26.28 (3d ed. 1997). But <strong>the</strong> interest <strong>the</strong>re seems to<br />

be one that is not much worth protecting. The inequality in <strong>the</strong> ability <strong>of</strong> parties to retain<br />

competent legal representation is a defect <strong>of</strong> our process, not a feature.


2012] OVERSHARING: FACEBOOK DISCOVERY 45<br />

II. FALSE NEGATIVES: SUBPOENAS TO THIRD PARTY<br />

SOCIAL NETWORKING SITES<br />

We are still at <strong>the</strong> dawn <strong>of</strong> <strong>the</strong> Information Age. For only a<br />

few short years have individuals’ lives been quite so well<br />

documented as <strong>the</strong>y are now. Social-networking sites are only<br />

<strong>the</strong> beginning: keypasses, swipe cards, smartphones, <strong>and</strong> cell<br />

phones all track an individual’s location; search queries on<br />

Google <strong>and</strong> o<strong>the</strong>r search engines are logged; communications by<br />

email, text message, or voicemail are <strong>of</strong>ten permanently saved. 19<br />

Much <strong>of</strong> this information is held by third parties <strong>and</strong> stored on<br />

servers accessible from <strong>the</strong> web, making it a particularly<br />

attractive target for discovery. 20<br />

Not only are individuals in litigation struggling to come to<br />

terms with this new information reality, so are attorneys <strong>and</strong><br />

judges. Requests for social-networking communications are<br />

quickly evolving from novel to de rigueur. 21 But <strong>the</strong> rules<br />

governing <strong>the</strong> online world can be starkly different than what<br />

lawyers may be used to. In particular, subpoenas in civil cases<br />

to <strong>Internet</strong> Service Providers <strong>of</strong>fer an example <strong>of</strong> where <strong>the</strong> law<br />

was dramatically altered to deal with technological change. In<br />

1986, well before <strong>the</strong> web, broadb<strong>and</strong> <strong>Internet</strong> access, <strong>and</strong> social<br />

networks, Congress passed <strong>the</strong> Electronic Communications<br />

Privacy Act (ECPA), sharply limiting <strong>the</strong> disclosures an ISP<br />

could make. 22 The ECPA broadly prohibits an ISP from<br />

disclosing <strong>the</strong> contents <strong>of</strong> communications except in certain<br />

circumstances. 23 One <strong>of</strong> those is with <strong>the</strong> consent <strong>of</strong> <strong>the</strong> sender<br />

19. See John G. Browning, Digging for <strong>the</strong> Digital Dirt: <strong>Discovery</strong> <strong>and</strong> Use <strong>of</strong><br />

Evidence from Social Media Sites, 14 SMU SCI. & TECH. L. REV. 465, 495 (2011).<br />

20. See PETER MELL & TIMOTHY GRANCE, The NIST Definition <strong>of</strong> Cloud<br />

Computing, NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 2-3 (Sept. 2011),<br />

available at http://csrc.nist.gov/publications/nistpubs/800-145/SP800-145.pdf.<br />

21. For a brief history <strong>of</strong> <strong>the</strong> rules regarding <strong>the</strong> discovery <strong>of</strong> electronic documents,<br />

see Richard L. Marcus, E-<strong>Discovery</strong> Beyond <strong>the</strong> Federal Rules, 37 U. BALT. L. REV. 321,<br />

330-32 (2008) (describing <strong>the</strong> beginnings <strong>of</strong> e-discovery). E-discovery has become so<br />

important that many law firms have created departments dedicated entirely to e-discovery.<br />

See id. at 324 (describing how non compliance with e-discovery rules relating to<br />

preservation can lead to malpractice).<br />

22. Electronic Communications Privacy Act <strong>of</strong> 1986, Pub. L. No. 99-508, 100 Stat.<br />

1848 (1986) (codified as amended in scattered sections <strong>of</strong> 18 U.S.C.).<br />

23. Specifically, Title II <strong>of</strong> <strong>the</strong> ECPA, known as <strong>the</strong> Stored Communications Act,<br />

prohibits any person providing an “electronic communications service” (ECS) to <strong>the</strong> public<br />

from “knowingly divulg[ing] to any person or entity <strong>the</strong> contents <strong>of</strong> a communication while<br />

in electronic storage by that service.” 18 U.S.C. § 2702(a)(1) (2006). An “electronic


46 ARKANSAS LAW REVIEW [Vol. 65:39<br />

or recipient. 24 Ano<strong>the</strong>r is in response to any “administrative<br />

subpoena authorized by a Federal or State statute or a Federal or<br />

State gr<strong>and</strong> jury or trial subpoena” from a government entity. 25<br />

The statute does not mention pretrial subpoenas, however, <strong>and</strong><br />

courts have generally held that ISPs are barred from disclosing<br />

<strong>the</strong> contents <strong>of</strong> communications held on <strong>the</strong>ir servers in response<br />

to a civil subpoena. 26<br />

communications service” is “any service which provides to users <strong>the</strong>re<strong>of</strong> <strong>the</strong> ability to send<br />

or receive wire or electronic communications.” 18 U.S.C. § 2510(15). <strong>Facebook</strong> <strong>and</strong> o<strong>the</strong>r<br />

social-networking services have been held to be ECS providers. See Crispin v. Christian<br />

Audigier, Inc., 717 F. Supp. 2d 965, 982 (C.D. Cal. 2010). Section 2702(a)(2)(B) also<br />

prohibits providers <strong>of</strong> “remote computing service” (RCS) to <strong>the</strong> public from disclosing<br />

communications received from subscribers “solely for <strong>the</strong> purpose <strong>of</strong> providing storage or<br />

computer processing services to such subscriber or customer, if <strong>the</strong> provider is not<br />

authorized to access <strong>the</strong> contents <strong>of</strong> any such communications for purposes <strong>of</strong> providing<br />

any services o<strong>the</strong>r than storage or computer processing.” Congress evidently had in mind<br />

service providers that provided data storage capacity <strong>and</strong> processing power for companies<br />

too small to afford <strong>the</strong>ir own local computer network. See Crispin, 717 F. Supp. 2d at 978<br />

& n.26; Robison, supra note 2, at 1207. But that business model has only recently been<br />

resurrected with <strong>the</strong> rise <strong>of</strong> cloud computing. There is considerable confusion about how to<br />

treat entities that <strong>of</strong>fer both ECS <strong>and</strong> RCS, which Congress in 1986 apparently did not<br />

anticipate. See Crispin, 717 F. Supp. 2d at 986 n.42; Bruce E. Boyden, Privacy <strong>of</strong><br />

Electronic Communications, in PROSKAUER ON PRIVACY 6-1, 6-105 to -107 (Kristen J.<br />

Ma<strong>the</strong>ws ed., 2011); Orin S. Kerr, A User’s Guide to <strong>the</strong> Stored Communications Act, <strong>and</strong><br />

a Legislator’s Guide to Amending It, 72 GEO. WASH. L. REV. 1208, 1216 (2004).<br />

24. 18 U.S.C. § 2702(b)(3) (2006).<br />

25. 18 U.S.C. § 2703(b)(1)(B)(i); see also 18 U.S.C. § 2702(b)(2) (“A provider<br />

described in subsection (a) may divulge <strong>the</strong> contents <strong>of</strong> a communication . . . as o<strong>the</strong>rwise<br />

authorized in section 2517, 2511(2)(a), or 2703 <strong>of</strong> this title.”). Sections 2517 <strong>and</strong><br />

2511(2)(a) concern court-authorized wiretaps in law-enforcement investigations. Section<br />

2703 provides that “[a] governmental entity may require <strong>the</strong> disclosure by a provider <strong>of</strong><br />

electronic communication service <strong>of</strong> <strong>the</strong> contents <strong>of</strong> a[n] . . . electronic communication”<br />

only pursuant to a criminal search warrant if it has been held 180 days or less, or by<br />

“us[ing] an administrative subpoena authorized by a Federal or State statute or a Federal or<br />

State gr<strong>and</strong> jury or trial subpoena” if it is more than 180 days old. 18 U.S.C. §§ 2703(a),<br />

(b)(1)(B)(i) (2006). These exceptions do not seem to even contemplate requests by private<br />

parties in civil litigation, as evidenced by <strong>the</strong> search-warrant requirement for emails less<br />

than six months old. See 18 U.S.C. § 2703(a). But even though a Rule 45 subpoena issues<br />

from <strong>the</strong> court, see FED. R. CIV. P. 45(a)(2), <strong>and</strong> may thus be said to be a “require[ment]”<br />

by a “governmental entity” to disclose <strong>the</strong> contents <strong>of</strong> communications, it is nei<strong>the</strong>r an<br />

administrative subpoena, a gr<strong>and</strong>-jury subpoena, nor a trial subpoena, <strong>and</strong> thus fails to fall<br />

within any exception in § 2703.<br />

26. See Crispin v. Christian Audigier, Inc., 717 F. Supp. 2d 965, 975 (C.D. Cal.<br />

2010); Barnes v. CUS Nashville, LLC, No. 3:09-0764, 2010 WL 2196591, at *1 (M.D.<br />

Tenn. May 27, 2010). Not every court is inclined to agree, however. In Ledbetter v. Wal-<br />

Mart Stores, Inc., <strong>the</strong> court denied a request for a protective order against subpoenas to<br />

social networks without mentioning <strong>the</strong> Stored Communications Act (SCA). No. 06-cv-<br />

01958-WYD-MJW, 2009 WL 1067018 (D. Colo. Apr. 21, 2009). And in McCready v.<br />

eBay, Inc., <strong>the</strong> Seventh Circuit held that “[g]ood faith reliance on a [private party’s]


2012] OVERSHARING: FACEBOOK DISCOVERY 47<br />

The rule governing subpoenas on nonparties for ordinary<br />

documents is different. Such requests are governed by Rule 45<br />

<strong>of</strong> <strong>the</strong> Federal Rules <strong>of</strong> Civil Procedure, or an equivalent state<br />

rule, which provides that nonparties must respond to a subpoena<br />

for documents unless <strong>the</strong> request imposes an “undue burden or<br />

expense” on <strong>the</strong> nonparty. 27 But section 2702 <strong>of</strong> <strong>the</strong> ECPA does<br />

not contain any sort <strong>of</strong> balancing test. ISPs are completely<br />

prohibited from disclosing communications in response to a<br />

pretrial subpoena.<br />

It is unclear why Congress decided to alter <strong>the</strong> existing<br />

rule. The most likely explanation is that it was simply an<br />

oversight; Congress’s primary focus in adopting <strong>the</strong> ECPA was<br />

to regulate government access to electronic communications, in<br />

particular during criminal investigations. 28 The legislative<br />

history for <strong>the</strong> ECPA does not even mention civil subpoenas, let<br />

alone discuss why <strong>the</strong>y were not included as a permitted<br />

disclosure. 29 Fur<strong>the</strong>rmore, <strong>the</strong>re is no obvious purpose served<br />

by treating electronic documents differently than paper<br />

documents in this regard. 30 Emails <strong>and</strong> o<strong>the</strong>r electronic<br />

subpoena is a complete defense to actions brought under <strong>the</strong> . . . SCA.” 453 F.3d 882, 892<br />

(7th Cir. 2006). But that would only be true if a private party could in fact subpoena<br />

electronic communications under <strong>the</strong> SCA, which it cannot.<br />

27. FED. R. CIV. P. 45(c)(1). Rule 45(c)(1) imposes an affirmative duty on <strong>the</strong><br />

requesting party to avoid undue burden or expense. Rule 45(c)(3)(A) requires <strong>the</strong> court to<br />

quash <strong>the</strong> subpoena for certain burdens or expenses, <strong>and</strong> Rule 45(c)(3)(B) permits it to do<br />

so for o<strong>the</strong>rs.<br />

28. See H.R. REP. NO. 99-647, at 16 (1986); S. REP. NO. 99-541, at 1 (1986),<br />

reprinted in 1986 U.S.C.C.A.N. 3555, 3555.<br />

29. See H.R. REP. NO. 99-647, at 68-69 (1986); S. REP. NO. 99-541, at 37-38 (1986),<br />

reprinted in 1986 U.S.C.C.A.N. 3555, 3591.<br />

30. One possibility is that Congress intended in § 2703 to indicate its disapproval, at<br />

least in part, <strong>of</strong> <strong>the</strong> “third-party doctrine,” <strong>the</strong> doctrine that a person does not have any<br />

Fourth Amendment right to prevent searches <strong>of</strong> documents or records held by a third party,<br />

such as a bank or a telephone company. See Smith v. Maryl<strong>and</strong>, 442 U.S. 735 (1979)<br />

(telephone numbers dialed); United States v. Miller, 425 U.S. 435 (1976) (bank records).<br />

At least one current Supreme Court Justice has indicated a willingness to revisit Smith <strong>and</strong><br />

Miller. See United States v. Jones, 132 S. Ct. 945, 954-57 (2012) (Sotomayor, J.,<br />

concurring); see also id. at 957-64 (Alito, J., dissenting) (determining whe<strong>the</strong>r Fourth<br />

Amendment search occurs by looking to societal expectations <strong>of</strong> privacy). But even so, <strong>the</strong><br />

controversy over <strong>the</strong> third-party doctrine concerns only criminal searches <strong>and</strong> seizures;<br />

<strong>the</strong>re has been comparatively little controversy over <strong>the</strong> use <strong>of</strong> subpoenas to nonparties in<br />

civil litigation. And any such controversies that have occurred have been resolved using<br />

Rule 45’s balancing test. See Gonzales v. Google, Inc., 234 F.R.D. 674, 686 (N.D. Cal.<br />

2006) (requests for user-submitted search queries “unreasonably cumulative or<br />

duplicative”).


48 ARKANSAS LAW REVIEW [Vol. 65:39<br />

communications, although sensitive, are not more likely to be<br />

sensitive than financial records, or private papers held in<br />

storage, or mail held in a private mailbox.<br />

In at least this respect, <strong>the</strong> ECPA is <strong>the</strong>refore an example <strong>of</strong><br />

a precipitous reaction by <strong>the</strong> legislature to changed technology,<br />

even when <strong>the</strong>re was no real need to change <strong>the</strong> law at all. 31<br />

<strong>Law</strong>yers unfamiliar with <strong>the</strong> ECPA might be forgiven for not<br />

anticipating that <strong>the</strong> law would change in this way. In any<br />

event, <strong>the</strong> practical effect <strong>of</strong> <strong>the</strong> change in most cases will be<br />

muted. Even if a nonparty ISP cannot be subpoenaed directly to<br />

produce a person’s communications relevant to <strong>the</strong> dispute, <strong>the</strong><br />

person him- or herself can. That is, a party to a civil lawsuit can<br />

simply propound a Rule 34 document request on his or her<br />

opposing party to produce relevant electronic communications<br />

from <strong>the</strong> opposing party’s ISP, or subpoena a nonparty to do so.<br />

As long as opposing parties still have access to <strong>the</strong>ir accounts,<br />

<strong>the</strong> documents are likely to be held within <strong>the</strong>ir “possession,<br />

custody, or control.” Indeed, several courts have ordered parties<br />

to produce <strong>the</strong>ir social-networking communications or o<strong>the</strong>r<br />

messages, or at least consent to <strong>the</strong>ir production by <strong>the</strong> relevant<br />

ISP. 32 Such an order does not fall afoul <strong>of</strong> <strong>the</strong> ECPA, because<br />

as one court noted, an ordinary individual is not an ISP, <strong>and</strong> thus<br />

is not subject to any <strong>of</strong> <strong>the</strong> disclosure prohibitions in section<br />

2702. 33<br />

III. FALSE POSITIVES: DISCOVERY OF SOCIAL<br />

NETWORK POSTS<br />

The unavailability <strong>of</strong> subpoenas for nonparty ISPs under<br />

<strong>the</strong> ECPA is not a serious impediment to discovery, as discovery<br />

may be had directly from <strong>the</strong> party itself. Under Rule 34 <strong>of</strong> <strong>the</strong><br />

Federal Rules <strong>of</strong> Civil Procedure <strong>and</strong> equivalent state rules, a<br />

party can request ano<strong>the</strong>r person or party “to produce <strong>and</strong> permit<br />

31. Protecting <strong>the</strong> privacy <strong>of</strong> electronic <strong>and</strong> telephonic communications has been a<br />

vexing problem for Congress <strong>and</strong> for courts since <strong>the</strong> early days <strong>of</strong> <strong>the</strong> twentieth century.<br />

See generally Boyden, supra note 23, at 6-1 to 6-10.<br />

32. See, e.g., Flagg v. City <strong>of</strong> Detroit, 252 F.R.D. 346, 359 (E.D. Mich. 2008)<br />

(ordering production <strong>of</strong> text messages); People v. Christian, No. 08F09791 (Cal. Super. Ct.<br />

Feb. 4, 2011) (ordering juror to consent to production <strong>of</strong> <strong>Facebook</strong> posts made during trial<br />

to <strong>the</strong> court).<br />

33. Largent v. Reed, No. 2009-1823, 2011 WL 5632688, at *6-7 (Pa. Ct. C.P. Nov.<br />

8, 2011).


2012] OVERSHARING: FACEBOOK DISCOVERY 49<br />

<strong>the</strong> requesting party or its representative to inspect, copy, test, or<br />

sample” designated documents, electronically stored<br />

information, or tangible things “in <strong>the</strong> responding party’s<br />

possession, custody, or control.” 34 This includes socialnetworking<br />

messages, comments, <strong>and</strong> posts, which are<br />

“documents or electronically stored information,” defined under<br />

Rule 34 as including any writing “stored in any medium from<br />

which information can be obtained ei<strong>the</strong>r directly or, if<br />

necessary, after translation by <strong>the</strong> responding party into a<br />

reasonably usable form.” 35 Such materials must <strong>the</strong>refore be<br />

produced if requested, as long as <strong>the</strong>y fit within <strong>the</strong> Rules’ broad<br />

definition <strong>of</strong> relevance <strong>and</strong> are nei<strong>the</strong>r protected by any<br />

privilege 36 nor unduly burdensome in one <strong>of</strong> <strong>the</strong> ways specified<br />

by <strong>the</strong> Rules. 37 And materials held by a nonparty ISP such as<br />

<strong>Facebook</strong> will never<strong>the</strong>less be within a party’s “custody,<br />

possession, or control” as long as <strong>the</strong> party has <strong>the</strong> right to<br />

access <strong>and</strong> copy those materials. 38 <strong>Facebook</strong> itself <strong>of</strong>fers users<br />

34. FED. R. CIV. P. 34(a)(1). Many <strong>of</strong> <strong>the</strong> decisions discussed below were rendered<br />

under state law, particularly New York <strong>and</strong> Pennsylvania, but state rules <strong>of</strong> civil procedure<br />

are similar. See, e.g., N.Y. C.P.L.R. 3120(1)(i) (McKinney 2005) (party may request<br />

ano<strong>the</strong>r party or person “to produce <strong>and</strong> permit <strong>the</strong> party seeking discovery . . . to inspect,<br />

copy, test or photograph any designated documents or any things which are in <strong>the</strong><br />

possession, custody or control <strong>of</strong> <strong>the</strong> party or person served”); PA. R.C.P. NO. 4009.1<br />

(party may request ano<strong>the</strong>r party or person “to produce <strong>and</strong> permit <strong>the</strong> requesting party . . .<br />

to inspect <strong>and</strong> copy any designated documents . . . or to inspect, copy, test or sample any<br />

tangible things . . . which are in <strong>the</strong> possession, custody or control <strong>of</strong> <strong>the</strong> party or person<br />

upon whom <strong>the</strong> request or subpoena is served”).<br />

35. FED. R. CIV. P. 34(a)(1)(A). The term “electronically stored information” was<br />

added in 2006 merely “to confirm that discovery <strong>of</strong> electronically stored information st<strong>and</strong>s<br />

on equal footing with discovery <strong>of</strong> paper documents.” FED. R. CIV. P. 34(a) advisory<br />

committee note to 2006 amendment.<br />

36. FED. R. CIV. P. 26(b)(1) (“Parties may obtain discovery regarding any<br />

nonprivileged matter that is relevant to any party’s claim or defense—including <strong>the</strong><br />

existence, description, nature, custody, condition, <strong>and</strong> location <strong>of</strong> any documents or o<strong>the</strong>r<br />

tangible things <strong>and</strong> <strong>the</strong> identity <strong>and</strong> location <strong>of</strong> persons who know <strong>of</strong> any discoverable<br />

matter.”); FED. R. CIV. P. 26(b)(3) (protecting work product prepared in anticipation <strong>of</strong><br />

litigation).<br />

37. See FED. R. CIV. P. 26(b)(2).<br />

38. See Buckley v. Vidal, 50 F.R.D. 271, 274 (S.D.N.Y. 1970) (“Production may be<br />

ordered when a party has <strong>the</strong> legal right to obtain papers, even though he has no copy, <strong>and</strong><br />

regardless <strong>of</strong> whe<strong>the</strong>r a paper is beyond <strong>the</strong> jurisdiction <strong>of</strong> <strong>the</strong> court.”); MOORE ET AL.,<br />

supra note 18, § 34.14[b] (control includes “<strong>the</strong> legal right to obtain <strong>the</strong> documents<br />

requested upon dem<strong>and</strong>” (quoting Searock v. Stripling, 736 F.2d 650, 653 (11th Cir.<br />

1984))).


50 ARKANSAS LAW REVIEW [Vol. 65:39<br />

<strong>the</strong> ability to download all updates ever made to <strong>the</strong>ir “wall,” as<br />

long as <strong>the</strong>y are current subscribers. 39<br />

Given <strong>the</strong> effect <strong>of</strong> <strong>the</strong> ECPA on discovery from nonparty<br />

ISPs, one might suspect an equally pr<strong>of</strong>ound transformation has<br />

taken place with respect to requests from parties <strong>the</strong>mselves.<br />

That is, given how widely social-networking posts are typically<br />

shared, <strong>and</strong> how easy <strong>the</strong>y are to access <strong>and</strong> copy, one might<br />

conclude that perhaps <strong>the</strong> rules are, or at least should be,<br />

different for social-networking posts than for o<strong>the</strong>r sorts <strong>of</strong><br />

documents. In fact, several courts have presumed exactly that,<br />

ordering parties not merely to produce relevant documents<br />

responsive to a request, but to affirmatively grant unlimited<br />

access to <strong>the</strong>ir accounts to an opposing party. In some cases,<br />

parties have been ordered to turn over <strong>the</strong>ir passwords <strong>and</strong> login<br />

information, so that opposing counsel can log in as <strong>the</strong> account<br />

holder <strong>and</strong> see everything that he or she sees, including not only<br />

<strong>the</strong> account holder’s posts, but <strong>the</strong> posts <strong>of</strong> all <strong>of</strong> <strong>the</strong> account<br />

holder’s friends. 40 And although only a dozen such decisions<br />

have come to light, primarily from state trial courts, it is likely<br />

that <strong>the</strong>se decisions are just <strong>the</strong> tip <strong>of</strong> an unseen iceberg <strong>of</strong><br />

unreported cases, as state trial-court opinions are typically not<br />

captured in online databases <strong>and</strong> are <strong>of</strong>ten simply made on <strong>the</strong><br />

record. Many <strong>of</strong> <strong>the</strong> decisions that have come to light so far<br />

have come from two states, New York <strong>and</strong> Pennsylvania, which<br />

may simply be an artifact <strong>of</strong> better journalistic coverage <strong>of</strong> legal<br />

developments in those jurisdictions. 41<br />

Whatever may be said about <strong>the</strong> prevalence <strong>of</strong> decisions<br />

granting litigants access to <strong>the</strong>ir opponents’ social-networking<br />

39. See Kelly Ann Bub, Comment, Privacy’s Role in <strong>the</strong> <strong>Discovery</strong> <strong>of</strong> Social<br />

Networking Site Information, 64 SMU L. REV. 1433, 1460 (2011); Download Your<br />

Information, FACEBOOK (visited Feb. 6, 2012), http:// www.facebook.com/help/?page=<br />

116481065103985. According to <strong>Facebook</strong>, <strong>the</strong> following is included in a download:<br />

pr<strong>of</strong>ile <strong>and</strong> timeline information, wall <strong>and</strong> timeline posts by <strong>the</strong> user <strong>and</strong> his or her friends,<br />

uploaded photos <strong>and</strong> videos, friend lists, notes, events that users have RSVP’d, sent <strong>and</strong><br />

received messages, <strong>and</strong> comments that a user or his or her friends have posted to <strong>the</strong> user’s<br />

wall, photos, <strong>and</strong> o<strong>the</strong>r pr<strong>of</strong>ile content. Id. Comments that <strong>the</strong> user has made on friends’<br />

posts, as well as friends’ posts merely visible to <strong>the</strong> user, are apparently not included.<br />

40. See, e.g., Romano v. Steelcase, Inc., 907 N.Y.S.2d 650 (Sup. Ct. 2010);<br />

McMillen v. Hummingbird Speedway, Inc., No. 113-2010 CD, 2010 WL 4403285 (Pa. Ct.<br />

C.P. Sept. 9, 2010).<br />

41. Both New York City <strong>and</strong> Philadelphia have daily legal newspapers, <strong>the</strong> New<br />

York <strong>Law</strong> Journal <strong>and</strong> <strong>the</strong> Legal Intelligencer, respectively. I have heard anecdotal reports<br />

<strong>of</strong> similar orders being issued in Wisconsin.


2012] OVERSHARING: FACEBOOK DISCOVERY 51<br />

accounts, <strong>the</strong> propriety <strong>of</strong> <strong>the</strong>se rulings is clear: <strong>the</strong>y are<br />

mistaken. The traditional rules <strong>of</strong> discovery contain no<br />

exception that would permit a party to effectively rummage<br />

through its opponent’s files, looking for relevant <strong>and</strong> responsive<br />

materials. Fur<strong>the</strong>rmore, an expansive reading <strong>of</strong> <strong>the</strong> rules is not<br />

justified as a matter <strong>of</strong> policy. Far from a vestigial remnant <strong>of</strong><br />

paper-based discovery practice, <strong>the</strong> procedures requiring<br />

production by a party <strong>of</strong> its own documents serve an important<br />

function by design, one that has hi<strong>the</strong>rto not been <strong>the</strong> focus <strong>of</strong><br />

much attention.<br />

A. The Cases<br />

Courts in Ontario were among <strong>the</strong> first to confront <strong>the</strong><br />

issue. In three separate decisions starting in 2007, all <strong>of</strong> <strong>the</strong>m<br />

involving automobile accidents, Ontario trial-court judges ruled<br />

on <strong>the</strong> question <strong>of</strong> whe<strong>the</strong>r defendants could obtain information<br />

from <strong>the</strong> plaintiffs’ social-networking accounts contradicting<br />

<strong>the</strong>ir claims <strong>of</strong> injury. In <strong>the</strong> first <strong>of</strong> <strong>the</strong>se cases, Murphy v.<br />

Perger, <strong>the</strong> defendant moved for production <strong>of</strong> photographs<br />

contained on a private <strong>Facebook</strong> page that allegedly showed <strong>the</strong><br />

plaintiff, who was claiming severe physical injuries <strong>and</strong> loss <strong>of</strong><br />

enjoyment <strong>of</strong> life, “engaged in various social activities.” 42 The<br />

court balanced <strong>the</strong> need for <strong>the</strong> information against <strong>the</strong> burden to<br />

<strong>the</strong> plaintiff, but found <strong>the</strong> photographs highly relevant <strong>and</strong> <strong>the</strong><br />

privacy interest minimal: “The plaintiff could not have a serious<br />

expectation <strong>of</strong> privacy given that 366 people have been granted<br />

access to <strong>the</strong> private site.” 43<br />

The defendant in Murphy requested simply production <strong>of</strong><br />

relevant photographs, but in later cases defendants went beyond<br />

that. In Leduc v. Roman, <strong>the</strong> defendant requested “production <strong>of</strong><br />

all information on <strong>the</strong> <strong>Facebook</strong> pr<strong>of</strong>ile.” 44 The Leduc court<br />

followed Murphy in holding that <strong>the</strong>re were likely relevant<br />

documents in <strong>the</strong> private section <strong>of</strong> <strong>the</strong> plaintiff’s account, <strong>the</strong><br />

production <strong>of</strong> which would not be barred by any privacy<br />

concerns: “<strong>Facebook</strong> is not used as a means by which account<br />

holders carry on monologues with <strong>the</strong>mselves.” 45 But <strong>the</strong> court<br />

42. 2007 CarswellOnt 9439, para. 4 (Can. Ont. Super. Ct. J.) (WL).<br />

43. Id. para. 20.<br />

44. 308 D.L.R. 4th 353, para. 6 (Can. Ont. Super. Ct. J. 2009).<br />

45. Id. para. 31.


52 ARKANSAS LAW REVIEW [Vol. 65:39<br />

refused to order complete production <strong>of</strong> <strong>the</strong> account. “[M]ere<br />

pro<strong>of</strong> <strong>of</strong> <strong>the</strong> existence <strong>of</strong> a <strong>Facebook</strong> pr<strong>of</strong>ile does not entitle a<br />

party to gain access to all material placed on that site. Some<br />

material may relate to matters in issue; some may not.” 46<br />

In Schuster v. Royal & Sun Alliance Insurance Co. <strong>of</strong><br />

Canada, <strong>the</strong> defendant went even fur<strong>the</strong>r, requesting “access” to<br />

<strong>the</strong> private area <strong>of</strong> <strong>the</strong> plaintiff’s <strong>Facebook</strong> account. 47 The court<br />

expressed uncertainty as to whe<strong>the</strong>r <strong>the</strong> defendant was<br />

requesting access to <strong>the</strong> <strong>Facebook</strong> account itself or merely<br />

production <strong>of</strong> material from <strong>the</strong> account, but if <strong>the</strong> former, <strong>the</strong><br />

court would have denied <strong>the</strong> request. 48 The Schuster court held<br />

that granting access to <strong>the</strong> plaintiff’s account would be “more<br />

invasive” than an order requiring <strong>the</strong> plaintiff to preserve<br />

materials for later production, not only because it would “require<br />

<strong>the</strong> Plaintiff to provide <strong>the</strong> Defendant with her personal<br />

username <strong>and</strong> password,” as well as her private email<br />

correspondence on <strong>Facebook</strong>, but also because <strong>the</strong> court held<br />

that ordering access was beyond <strong>the</strong> scope <strong>of</strong> <strong>the</strong> rules for<br />

discovery, which only require production <strong>of</strong> materials. 49<br />

Several United States courts have arrived at <strong>the</strong> same<br />

conclusion as <strong>the</strong> Ontario courts: while social-networking posts<br />

do not receive any special protection from production under <strong>the</strong><br />

rules <strong>of</strong> civil procedure, nei<strong>the</strong>r do <strong>the</strong>y get less. In particular,<br />

ordering production <strong>of</strong> an entire account is in most cases<br />

inappropriate, 50 as is requiring opposing counsel to have<br />

46. Id. para. 33; see also Kent v. Laverdiere, 2009 CanLII 16741 (Can. Ont. Super.<br />

Ct. J.) (WL) (denying motion for production <strong>of</strong> <strong>Facebook</strong> <strong>and</strong> MySpace materials close to<br />

trial due to need to review for relevance).<br />

47. 2009 CanLII 58971, para. 1 (Can. Ont. Super. Ct. J.) (WL).<br />

48. See id. paras. 13, 19.<br />

49. Id. paras. 17, 18.<br />

50. See Debord v. Mercy Health Sys. <strong>of</strong> Kan., Inc., No. 10-4055-WEB, 2011 U.S.<br />

Dist. LEXIS 87019, at *6-7 (D. Kan. Aug. 8, 2011) (denying motion to compel on grounds<br />

<strong>of</strong> relevance, embarrassment, <strong>and</strong> failure to demonstrate prior production was lacking);<br />

E.E.O.C. v. Simply Storage Mgmt., LLC, 270 F.R.D. 430, 437 (S.D. Ind. 2010) (request<br />

for all information from account overbroad); Patterson v. Turner Const. Co., 931 N.Y.S.2d<br />

311, 311-12 (App. Div. 2011) (reversing order compelling plaintiff to authorize disclosure<br />

<strong>of</strong> <strong>Facebook</strong> account to defendant <strong>and</strong> rem<strong>and</strong>ing for determination <strong>of</strong> which materials are<br />

relevant); McCann v. Harleysville Ins. Co. <strong>of</strong> N.Y., 910 N.Y.S.2d 614, 615 (App. Div.<br />

2010) (affirming denials <strong>of</strong> motions to compel authorizations to disclose <strong>Facebook</strong><br />

accounts without demonstrations <strong>of</strong> relevance as “fishing expedition[s]”).


2012] OVERSHARING: FACEBOOK DISCOVERY 53<br />

access. 51 This is true even in cases where <strong>the</strong> plaintiff<br />

complains <strong>of</strong> emotional distress, thus arguably making all <strong>of</strong> her<br />

mental states relevant. That does not mean that all evidence <strong>of</strong><br />

mental states must be produced. As one court noted, in denying<br />

a request to order <strong>the</strong> complainant in an employmentdiscrimination<br />

case to disclose her complete <strong>Facebook</strong> <strong>and</strong><br />

MySpace accounts, “[t]o be sure, anything that a person says or<br />

does might in some <strong>the</strong>oretical sense be reflective <strong>of</strong> her<br />

emotional state. But that is hardly justification for requiring <strong>the</strong><br />

production <strong>of</strong> every thought she may have reduced to writing or,<br />

indeed, <strong>the</strong> deposition <strong>of</strong> everyone she may have talked to.” 52<br />

O<strong>the</strong>r courts have ignored such warnings <strong>and</strong> have ordered<br />

complete production <strong>of</strong> <strong>the</strong> information in a party’s socialnetworking<br />

account. 53 In some cases courts have ordered<br />

production after performing an in camera review <strong>of</strong> <strong>the</strong> party’s<br />

entire account for relevance. 54 While such a review is perhaps<br />

less intrusive than ordering complete production ab initio to<br />

opposing counsel, 55 it should not be lightly invoked. Not only is<br />

51. See Chauvin v. State Farm Mut. Auto. Ins. Co., No. 10-11735, 2011 U.S. Dist.<br />

LEXIS 121600, at *3 (S.D. Mich. Oct. 20, 2011) (access denied as burdensome <strong>and</strong><br />

irrelevant); Abrams v. Pecile, 922 N.Y.S.2d 16, 17 (App. Div. 2011) (access denied<br />

because no support for request); In re Application <strong>of</strong> Progressive Ins. Co. v. Herschberg,<br />

No. 000014/10, 2011 WL 1991960 (N.Y. Sup. Ct. Mar. 30, 2011) (“unlimited access”<br />

denied as overbroad); Caraballo v. City <strong>of</strong> New York, No. 103477/08, 2011 WL 972547<br />

(N.Y. Sup. Ct. Mar. 4, 2011) (access denied where relevancy not demonstrated); Arcq v.<br />

Fields, No. 2008-2430, at 4 (Pa. Ct. C.P. Dec. 8, 2011), available at http://www.<br />

volokh.com/wp/wp-content/uploads/2011/12/Arcq<br />

.pdf (access denied where relevancy not demonstrated); Piccolo v. Paterson, No. 2009-<br />

04979 (Pa. Ct. C.P. May 5, 2011) (access denied). Although heartening, <strong>the</strong> holdings in<br />

most <strong>of</strong> <strong>the</strong>se cases has been limited: that access to a social-networking account has not<br />

been justified in that particular case by a preliminary showing that relevant information is<br />

likely to exist in <strong>the</strong> account.<br />

52. Simply Storage Mgmt., LLC, 270 F.R.D. at 435 (quoting Rozell v. Ross-Holst,<br />

No. 05 Civ. 2936(JGK)JCF, 2006 WL 163143, at *3 (S.D.N.Y. Jan. 20, 2006)).<br />

53. See, e.g., Romano v. Steelcase Inc., 907 N.Y.S.2d 650 (Sup. Ct. 2010).<br />

54. See Barnes v. CUS Nashville, LLC, No. 3:09-cv-00764, 2010 WL 2265668, at<br />

*1 (M.D. Tenn. June 3, 2010); Bass ex rel. Bass v. Miss Porter’s Sch., No. 3:08CV1807<br />

(JBA), 2009 WL 3724968, at *1 (D. Conn. Oct. 27, 2009). In Offenback v. Bowman Inc.,<br />

<strong>the</strong> court performed an in camera review for relevance at <strong>the</strong> request <strong>of</strong> <strong>the</strong> parties but<br />

expressed confusion as to why such a review was not something <strong>the</strong> plaintiff could have<br />

done himself. No. 1:10-CV-1789, 2011 WL 2491371, at *2 & n.3 (M.D. Pa. June 22,<br />

2011).<br />

55. In Bass, a case arising from a conflict between <strong>the</strong> plaintiff <strong>and</strong> o<strong>the</strong>r students at<br />

her private school, <strong>the</strong> court ordered production <strong>of</strong> all materials that had been retrieved<br />

from <strong>the</strong> plaintiff’s <strong>Facebook</strong> account after performing an in camera comparison <strong>of</strong><br />

printouts <strong>of</strong> what had been produced versus what had been withheld. 2009 WL 3724968,


54 ARKANSAS LAW REVIEW [Vol. 65:39<br />

a review for relevance a burden on <strong>the</strong> court, 56 but it exposes <strong>the</strong><br />

personal communications <strong>of</strong> a party to <strong>the</strong> judge, perhaps<br />

unnecessarily. Indeed, in order to resolve one discovery dispute<br />

over photographs <strong>and</strong> comments posted on <strong>Facebook</strong>, a judge in<br />

one case requested that <strong>the</strong> plaintiff <strong>and</strong> a nonparty witness<br />

accept “friend requests” from an account he had set up so that he<br />

could review <strong>the</strong> photographs. 57<br />

By far <strong>the</strong> most troubling cases, however, have been when<br />

courts have ordered parties to grant access to <strong>the</strong>ir accounts to<br />

parties requesting discovery <strong>of</strong> those accounts—that is, to<br />

provide adverse parties with <strong>the</strong> ability to roam through <strong>the</strong><br />

accounts at will, without any constraint as to what information is<br />

viewed or copied. 58 Courts have listed three reasons for<br />

granting such requests for access. First, courts have concluded<br />

that <strong>the</strong>re is likely to be relevant information in <strong>the</strong> account. 59<br />

Most <strong>of</strong> <strong>the</strong> cases involving disputes over discovery <strong>of</strong> socialnetworking<br />

sites have been personal-injury lawsuits. 60<br />

Typically it is <strong>the</strong> defendants that are seeking materials,<br />

especially photographs, from <strong>the</strong> plaintiffs’ accounts, in order to<br />

disprove allegations <strong>of</strong> serious, debilitating injury. Socialnetworking<br />

accounts are thus an appropriate target for discovery<br />

at *1. Finding “no meaningful distinction” between <strong>the</strong> two, <strong>the</strong> court allowed <strong>the</strong><br />

defendant to obtain <strong>the</strong> complete set <strong>of</strong> printouts. Id. at *1-2.<br />

56. See Collens v. City <strong>of</strong> New York, No. 03 Civ. 4477 JGK HBP, 2004 WL<br />

1395228, at *2 (S.D.N.Y. June 22, 2004) (“It is well-settled that in camera review <strong>of</strong><br />

documents by <strong>the</strong> Court is <strong>the</strong> exception <strong>and</strong> not <strong>the</strong> rule because <strong>of</strong> <strong>the</strong> enormous strain it<br />

places on <strong>the</strong> resources <strong>of</strong> federal trial courts. Such review is ordinarily utilized only when<br />

necessary to resolve disputes concerning privilege; it is rarely used to determine<br />

relevance.”) (internal citations omitted).<br />

57. Barnes, 2010 WL 2265668, at *1.<br />

58. See Romano v. Steelcase Inc., 907 N.Y.S.2d 650, 657 (Sup. Ct. 2010); Largent v.<br />

Reed, No. 2009-1823, 2011 WL 5632688 (Pa. Ct. C.P. Nov. 8, 2011); Zimmerman v. Weis<br />

Markets, Inc., No. CV-09-1535, 2011 WL 2065410 (Pa. Ct. C.P. May 19, 2011); McMillen<br />

v. Hummingbird Speedway, Inc., No. 113-2010 CD, 2010 WL 4403285 (Pa. Ct. C.P. Sept.<br />

9, 2010).<br />

59. See cases cited supra Part III.A.<br />

60. There are a wide variety <strong>of</strong> o<strong>the</strong>r contexts in which such information might be<br />

relevant, however, such as divorce actions. See Kashmir Hill, Judge Orders Divorcing<br />

Couple to Swap <strong>Facebook</strong> <strong>and</strong> Dating Site Passwords, FORBES.COM (Nov. 7, 2011, 10:42<br />

AM), http:// www.forbes.com/sites/kashmirhill/2011/11/07/judge-orders-divorcing-coupleto-swap-facebook-<strong>and</strong>-dating-site-passwords/<br />

(discussing <strong>the</strong> Connecticut divorce case <strong>of</strong><br />

Stephen <strong>and</strong> Courtney Gallion). Information from social-network sites has also been<br />

relevant in employment-discrimination cases. See E.E.O.C. v. Simply Storage Mgmt., 270<br />

F.R.D. 430, 432 (S.D. Ind. 2010); Ledbetter v. Wal-Mart Stores, Inc., No. 06-cv-01958-<br />

WYD-MJW, 2009 WL 1067018, at *2 (D. Colo. Apr. 21, 2009).


2012] OVERSHARING: FACEBOOK DISCOVERY 55<br />

in such cases; it is likely that <strong>the</strong> average social-networking<br />

account will have relevant information concerning <strong>the</strong> account<br />

holder’s quality <strong>of</strong> life. 61 And defendants undeniably have <strong>the</strong><br />

right to seek such relevant <strong>and</strong> important materials in defense <strong>of</strong><br />

<strong>the</strong> claims being made against <strong>the</strong>m. 62 To <strong>the</strong> extent plaintiffs<br />

have argued that social-networking sites are immune from<br />

discovery in civil cases, that argument is ill-founded.<br />

Second, courts have generally rejected <strong>the</strong> argument that<br />

privacy concerns should bar production <strong>of</strong> relevant materials.<br />

Courts considering whe<strong>the</strong>r to grant access to social-networking<br />

site materials have alternately described <strong>the</strong> argument as ei<strong>the</strong>r<br />

that <strong>the</strong>re should be a new “social-networking privilege” or that<br />

<strong>the</strong> plaintiff had a “reasonable expectation <strong>of</strong> privacy” in <strong>the</strong><br />

materials that makes production improper. 63 Unsurprisingly,<br />

courts have declined to recognize a new evidentiary privilege for<br />

social-networking posts, 64 which are hardly akin to <strong>the</strong><br />

sensitivity or privacy <strong>of</strong> attorney-client, doctor-patient, or priestpenitent<br />

communications. And, courts have likewise rejected<br />

<strong>the</strong> notion <strong>of</strong> any “reasonable expectation <strong>of</strong> privacy” in socialnetworking<br />

materials, 65 although <strong>the</strong>re <strong>the</strong> analysis might have<br />

moved too quickly. It is true, as courts have noted, that <strong>the</strong><br />

entire purpose <strong>of</strong> social-networking sites is to share information<br />

with o<strong>the</strong>rs. 66 And it is also true that <strong>Facebook</strong>, MySpace, <strong>and</strong><br />

61. See Simply Storage, 270 F.R.D. at 435; Largent, 2011 WL 5632688; Leduc v.<br />

Roman, 308 D.L.R. 4th 353, para. 23 (Can. Ont. Super. Ct. J. 2009) (“That a person’s<br />

<strong>Facebook</strong> pr<strong>of</strong>ile may contain documents relevant to <strong>the</strong> issues in an action is beyond<br />

controversy.”).<br />

62. See FED. R. CIV. P. 26(b)(1) (“Parties may obtain discovery regarding any<br />

nonprivileged matter that is relevant to any party’s claim or defense . . . .”); Schlagenhauf<br />

v. Holder, 379 U.S. 104, 114-15 (1964) (“[T]he deposition-discovery rules are to be<br />

accorded a broad <strong>and</strong> liberal treatment to effectuate <strong>the</strong>ir purpose that civil trials in <strong>the</strong><br />

federal courts no longer need be carried on in <strong>the</strong> dark.”) (internal citations omitted)<br />

(internal quotation marks omitted).<br />

63. Largent, 2011 WL 5632688.<br />

64. See id.; McMillen, 2010 WL 4403285.<br />

65. See Largent, 2011 WL 5632688.<br />

66. See Romano v. Steelcase Inc., 907 N.Y.S.2d 650, 657 (Sup. Ct. 2010) (stating<br />

that “<strong>the</strong> very nature <strong>and</strong> purpose <strong>of</strong> <strong>the</strong>se social networking sites” is to share personal<br />

information with o<strong>the</strong>rs, notwithst<strong>and</strong>ing privacy settings or else <strong>the</strong> sites “would cease to<br />

exist”); Largent, 2011 WL 5632688 (“Only <strong>the</strong> uninitiated or foolish could believe that<br />

<strong>Facebook</strong> is an online lockbox <strong>of</strong> secrets.”); Leduc v. Roman, 308 D.L.R. 4th para. 31<br />

(Can. Ont. Super. Ct. J. 2009) (“<strong>Facebook</strong> is not used as a means by which account holders<br />

carry on monologues with <strong>the</strong>mselves.”); Murphy v. Perger, 2007 CarswellOnt 9439, para.


56 ARKANSAS LAW REVIEW [Vol. 65:39<br />

o<strong>the</strong>r social-networking sites make no promise to keep one’s<br />

posts, comments, <strong>and</strong> o<strong>the</strong>r materials confidential. 67<br />

But that does not mean <strong>the</strong>re are not any privacy interests at<br />

stake at all. It is hardly <strong>the</strong> case that sharing information with a<br />

limited number <strong>of</strong> people removes all privacy interests from that<br />

information. 68 Ra<strong>the</strong>r, it can only be said that <strong>the</strong> privacy<br />

interests in social-networking site discussions are not so extreme<br />

as to bar any production <strong>of</strong> material, no matter how relevant,<br />

from a social-networking account. The burden on <strong>the</strong> plaintiff,<br />

however, including <strong>the</strong> burden on <strong>the</strong> plaintiff’s privacy <strong>and</strong><br />

social relationships, must still be balanced against <strong>the</strong> need for<br />

<strong>the</strong> discovery even if <strong>the</strong> requested information is relevant.<br />

Under Rule 26(b)(2), “<strong>the</strong> court must limit <strong>the</strong> frequency or<br />

extent <strong>of</strong> discovery o<strong>the</strong>rwise allowed by <strong>the</strong>se rules . . . if it<br />

determines that . . . <strong>the</strong> burden or expense <strong>of</strong> <strong>the</strong> proposed<br />

discovery outweighs its likely benefit . . . .” 69 Protecting a party<br />

from “annoyance, embarrassment, [or] oppression” is expressly<br />

contemplated under <strong>the</strong> Rules. 70 If <strong>the</strong> importance <strong>of</strong> <strong>the</strong><br />

sought-after information is slim, <strong>and</strong> <strong>the</strong> intrusiveness is great,<br />

courts have <strong>the</strong> discretion to limit discovery <strong>of</strong> such materials or<br />

even order that it not be had. 71<br />

Finally, courts ordering access to an account have required<br />

<strong>the</strong> requesting party to first demonstrate a likelihood that<br />

20 (Can. Ont. Super. Ct. J.) (WL) (“The plaintiff could not have a serious expectation <strong>of</strong><br />

privacy given that 366 people have been granted access to <strong>the</strong> private site.”).<br />

67. See Romano, 907 N.Y.S. 2d at 656-57; McMillen, 2010 WL 4403285.<br />

68. See United States v. Jones, 132 S. Ct. 945, 957 (2012) (Sotomayor, J.,<br />

concurring) (“I would not assume that all information voluntarily disclosed to some<br />

member <strong>of</strong> <strong>the</strong> public for a limited purpose is, for that reason alone, disentitled to Fourth<br />

Amendment protection.”); Multimedia WMAZ, Inc. v. Kubach, 443 S.E.2d 491, 494 (Ga.<br />

Ct. App. 1994) (disclosure <strong>of</strong> HIV-positive status to small group <strong>of</strong> family <strong>and</strong> friends did<br />

not make fact public); DANIEL J. SOLOVE, THE DIGITAL PERSON: TECHNOLOGY AND<br />

PRIVACY IN THE INFORMATION AGE 43-44 (2004) (“[T]he underst<strong>and</strong>ing <strong>of</strong> privacy as<br />

secrecy fails to recognize that individuals want to keep things private from some people but<br />

not o<strong>the</strong>rs.”); Lior Jacob Strahilevitz, A Social Networks Theory <strong>of</strong> Privacy, 72 U. CHI. L.<br />

REV. 919, 974-75 (2005) (defining reasonable expectation <strong>of</strong> privacy in terms <strong>of</strong> risk that a<br />

certain piece <strong>of</strong> information will flow outside a given social network).<br />

69. FED. R. CIV. P. 26(b)(2)(C). The court is to consider five factors in making such<br />

a determination: “<strong>the</strong> needs <strong>of</strong> <strong>the</strong> case, <strong>the</strong> amount in controversy, <strong>the</strong> parties’ resources,<br />

<strong>the</strong> importance <strong>of</strong> <strong>the</strong> issues at stake in <strong>the</strong> action, <strong>and</strong> <strong>the</strong> importance <strong>of</strong> <strong>the</strong> discovery in<br />

resolving <strong>the</strong> issues.” FED. R. CIV. P. 26(b)(2)(C)(iii).<br />

70. FED. R. CIV. P. 26(c)(1).<br />

71. See, e.g., Gonzales v. Google, Inc., 234 F.R.D. 674, 687-88 (N.D. Cal. 2006)<br />

(considering burden on users’ privacy in granting requested discovery).


2012] OVERSHARING: FACEBOOK DISCOVERY 57<br />

relevant materials exist in <strong>the</strong> account. 72 This requirement is<br />

both unnecessary <strong>and</strong> insufficient, however. It is unnecessary<br />

because, if relevant nonprivileged materials exist in <strong>the</strong> account,<br />

a party need do nothing more to obtain those materials than<br />

submit a Rule 34 document request to <strong>the</strong> account holder. 73<br />

Granted, if <strong>the</strong> responding party insists that all relevant materials<br />

have been produced, <strong>the</strong> requesting party must have some basis<br />

for concluding that representation is incorrect in order to prevail<br />

on a motion to compel. But several <strong>of</strong> <strong>the</strong> decisions considered<br />

appear to have required such a demonstration as a threshold to<br />

obtain social-networking-site materials at all, not merely to<br />

contest a claim that all relevant materials have been produced.<br />

For example, in Arcq v. Fields, <strong>the</strong> defendant first requested<br />

materials from <strong>the</strong> plaintiff’s social-networking sites, <strong>and</strong> <strong>the</strong>n<br />

when that was not forthcoming, moved for access to <strong>the</strong><br />

plaintiff’s accounts. 74 A Pennsylvania Court <strong>of</strong> Common Pleas<br />

judge denied <strong>the</strong> motion on <strong>the</strong> grounds that <strong>the</strong> defendant had<br />

failed to allege “any basis for believing that Plaintiff’s pr<strong>of</strong>iles<br />

contain any information relevant to <strong>the</strong> pending matter.” 75 The<br />

plaintiff, however, had not denied that <strong>the</strong>re were relevant<br />

documents in <strong>the</strong> account; he had instead objected to <strong>the</strong> request,<br />

claiming that it was “not reasonably calculated to lead to<br />

discoverable evidence” <strong>and</strong> that he had “a reasonable<br />

expectation <strong>of</strong> privacy in this information.” 76 In effect, <strong>the</strong> court<br />

imposed a heightened showing for discovery requests from<br />

social-networking sites.<br />

The decision in ano<strong>the</strong>r Pennsylvania case, Zimmerman v.<br />

Weis Markets, Inc., 77 sheds some light on why courts may be<br />

imposing this additional threshold. In Zimmerman, as in Arcq,<br />

<strong>the</strong> plaintiff resisted <strong>the</strong> defendant’s attempt to gain access to <strong>the</strong><br />

account not on <strong>the</strong> basis <strong>of</strong> relevance, but on <strong>the</strong> grounds that<br />

“his privacy interests outweigh <strong>the</strong> need to obtain <strong>the</strong> discovery<br />

72. See Largent v. Reed, No. 2009-1823, 2011 WL 5632688 (Pa. Ct. C.P. Nov. 8,<br />

2011).<br />

73. See FED. R. CIV. P. 34(a)(1).<br />

74. No. 2008-2430 (Pa. Ct. C.P. Dec. 8, 2011), available at http://volokh.com/<br />

wp/wp-content/uploads/2011/12/Arcq.pdf.<br />

75. Id. at 3.<br />

76. Id. at 1.<br />

77. No. CV-09-1535, 2011 WL 2065410 (Pa. Ct. C.P. May 19, 2011).


58 ARKANSAS LAW REVIEW [Vol. 65:39<br />

material.” 78 The Zimmerman court granted <strong>the</strong> defendant’s<br />

request, but expressed concern that its decision not be read as<br />

giving opposing counsel in every case “carte blanche entitlement<br />

to <strong>Facebook</strong> <strong>and</strong> MySpace passwords, user names <strong>and</strong> log in<br />

names as part <strong>of</strong> a discovery request . . . .” 79 The court <strong>the</strong>refore<br />

tried to limit its holding with a requirement <strong>of</strong> a “threshold<br />

showing that <strong>the</strong> publicly accessible portions <strong>of</strong> any social<br />

networking site contain information that would suggest that<br />

fur<strong>the</strong>r relevant postings are likely to be found by access to <strong>the</strong><br />

non-public portions.” 80 This reasoning suggests that it is quite<br />

possible that some <strong>of</strong> <strong>the</strong> courts that have refused to grant access<br />

to social-networking sites could be persuaded to do so if <strong>the</strong><br />

defendant is able to articulate a specific basis for believing that<br />

relevant materials existed in <strong>the</strong> account. 81<br />

That would be a mistake, however. Not only is a showing<br />

<strong>of</strong> potentially relevant information unnecessary in order to<br />

obtain such information in discovery, but it is also insufficient in<br />

justifying <strong>the</strong> remedy that some courts have been ordering:<br />

complete access by an opposing party to <strong>the</strong> subscriber’s<br />

account. A party has <strong>the</strong> right to receive in discovery only<br />

relevant, nonprivileged materials that it would not be unduly<br />

burdensome to produce. 82 The party’s ability to make a<br />

preliminary showing that such materials are likely to exist in a<br />

particular location cannot exp<strong>and</strong> <strong>the</strong> scope <strong>of</strong> discovery to<br />

include irrelevant or unduly burdensome materials. Nor does it<br />

permit parties to gain unfettered access to an opposing party’s<br />

files or communications.<br />

B. The <strong>Law</strong><br />

The orders granting access to a party’s social-networkingsite<br />

accounts have two significant problems. First, <strong>the</strong>y are<br />

entirely inconsistent with <strong>the</strong> rules <strong>of</strong> civil procedure. Second,<br />

<strong>the</strong> orders unquestionably invade users’ privacy without<br />

sufficient cause. Indeed, <strong>the</strong>re is some reason for thinking that<br />

78. Id.<br />

79. Id.<br />

80. Id.<br />

81. See supra notes 50-51.<br />

82. By “unduly burdensome,” I mean to refer to all <strong>of</strong> <strong>the</strong> restrictions set forth in<br />

Rule 26(b)(2) <strong>and</strong> (c)(1) <strong>of</strong> <strong>the</strong> Federal Rules <strong>of</strong> Civil Procedure.


2012] OVERSHARING: FACEBOOK DISCOVERY 59<br />

this is one <strong>of</strong> <strong>the</strong> very dangers that <strong>the</strong> structure <strong>of</strong> <strong>the</strong> procedure<br />

for discovery is designed to prevent.<br />

With respect to <strong>the</strong> first point, ordering a party to allow<br />

opposing counsel to have access to a social-networking account<br />

is beyond <strong>the</strong> permissible methods <strong>of</strong> discovery, even if some<br />

information in <strong>the</strong> account is within <strong>the</strong> scope <strong>of</strong> discovery. The<br />

ordinary procedure for obtaining material from ano<strong>the</strong>r party or<br />

a nonparty is to make a request under Rule 34 that <strong>the</strong> party or<br />

nonparty produce documents or things responsive to <strong>the</strong> request.<br />

A document request is not a search warrant; it does not authorize<br />

<strong>the</strong> requesting party to rifle through <strong>the</strong> responding party’s files<br />

on its own, searching for documents. Rule 34 is quite clear<br />

about <strong>the</strong> responding party’s obligations in responding to such a<br />

request: <strong>the</strong> responding party must “produce <strong>and</strong> permit <strong>the</strong><br />

requesting party . . . to inspect, copy, test, or sample” <strong>the</strong><br />

requested items. 83 That is, <strong>the</strong> responding party must itself first<br />

produce <strong>the</strong> items; only <strong>the</strong>n does <strong>the</strong> obligation arise to permit<br />

inspection, copying, testing, or sampling. There is no obligation<br />

to allow opposing counsel to search on its own for responsive<br />

documents <strong>and</strong> things to inspect, copy, test, or sample. 84<br />

O<strong>the</strong>r aspects <strong>of</strong> Rule 34 confirm that <strong>the</strong> rule requires only<br />

that <strong>the</strong> responding party produce documents <strong>and</strong> tangible things<br />

for review. For example, <strong>the</strong> request “must describe with<br />

reasonable particularity each item or category <strong>of</strong> items to be<br />

inspected.” 85 The reason for that is so that <strong>the</strong> responding party<br />

can determine what documents or things are being requested so<br />

that <strong>the</strong> responding party itself may produce <strong>the</strong>m. Similarly,<br />

Rule 26(b)(5) outlines procedures for making assertions <strong>of</strong><br />

privilege; it provides that “[w]hen a party withholds information<br />

o<strong>the</strong>rwise discoverable by claiming that <strong>the</strong> information is<br />

privileged or subject to protection as trial-preparation material,<br />

<strong>the</strong> party must . . . describe <strong>the</strong> nature <strong>of</strong> <strong>the</strong> documents . . . in a<br />

manner that, without revealing information itself privileged or<br />

protected, will enable o<strong>the</strong>r parties to assess <strong>the</strong> claim.” 86 Rule<br />

83. FED. R. CIV. P. 34(a)(1). State rules are similar. See supra note 34.<br />

84. Of course, one way <strong>of</strong> producing documents is simply to direct opposing counsel<br />

to <strong>the</strong> location <strong>of</strong> <strong>the</strong> documents wherever <strong>the</strong>y are kept by <strong>the</strong> responding party. The key<br />

point here is only that this method <strong>of</strong> production is <strong>the</strong> responding party’s choice; it is not<br />

m<strong>and</strong>ated under <strong>the</strong> rule.<br />

85. FED R. CIV. P. 34(b)(1)(A).<br />

86. FED. R. CIV. P. 26(b)(5)(A)(ii).


60 ARKANSAS LAW REVIEW [Vol. 65:39<br />

26(b)(5) <strong>the</strong>refore obviously contemplates that <strong>the</strong> assertion <strong>of</strong><br />

privilege will necessarily occur after some sort <strong>of</strong> review by <strong>the</strong><br />

responding party, but before acquisition <strong>of</strong> <strong>the</strong> documents by <strong>the</strong><br />

requesting party. If <strong>the</strong> requesting party could be allowed to<br />

find documents <strong>and</strong> things on its own, <strong>the</strong>re would be no<br />

opportunity for a privilege review, <strong>and</strong> thus no opportunity to<br />

“withhold” documents, let alone a need to describe <strong>the</strong><br />

documents adequately in that case to allow litigation <strong>of</strong> <strong>the</strong><br />

privilege claim.<br />

There is thus no ordinary procedure under <strong>the</strong> Rules by<br />

which opposing counsel gets to rummage through <strong>the</strong> party’s<br />

papers looking for documents responsive to his or her<br />

requests. 87 The Rules presume production <strong>of</strong> documents by <strong>the</strong><br />

responding party pursuant to a specifically delineated request.<br />

Moore’s Federal Practice confirms this underst<strong>and</strong>ing in<br />

describing <strong>the</strong> state <strong>of</strong> <strong>the</strong> law interpreting Rule 34:<br />

There are three basic appropriate responses to a<br />

request for production: (1) an objection to <strong>the</strong> scope, time,<br />

method, <strong>and</strong> manner <strong>of</strong> <strong>the</strong> requested production; (2) an<br />

answer agreeing to <strong>the</strong> requested scope, time, place, <strong>and</strong><br />

manner <strong>of</strong> production; or (3) a response <strong>of</strong>fering a good<br />

faith, reasonable alternative production that is definite in<br />

scope, time, place or manner. . . .<br />

In lieu <strong>of</strong> actual production <strong>of</strong> documents, a party may<br />

respond to a request for production by allowing <strong>the</strong><br />

requesting party to inspect <strong>and</strong> copy <strong>the</strong> documents at a<br />

place designated by <strong>the</strong> responding party. 88<br />

Fur<strong>the</strong>rmore, <strong>the</strong> rules for electronically stored information are<br />

no different; again, <strong>the</strong>y presume production by <strong>the</strong> responding<br />

party, not a search by <strong>the</strong> requesting party. 89<br />

87. See, e.g., Klugel v. Clough, 252 F.R.D. 53, 54-55 (D.D.C. 2008) (holding that<br />

Rule 34 cannot be used to compel party to sign release allowing o<strong>the</strong>rs to obtain medical<br />

records from third party).<br />

88. MOORE ET AL., supra note 18, § 34.13[2][a]. It is clear that <strong>the</strong> ability to<br />

“inspect” referenced in <strong>the</strong> rule contemplates inspection <strong>of</strong> a copy <strong>of</strong> documents extracted<br />

from whatever filing system in which <strong>the</strong>y are kept <strong>and</strong> produced separately. For example,<br />

permitting inspection <strong>of</strong> documents at one’s counsel’s <strong>of</strong>fice satisfies <strong>the</strong> requirement to<br />

permit “inspection” under Rule 34(a)(1). See Simms v. Ctr. for Corr. Health & Policy<br />

Studies, 272 F.R.D. 36, 39-40 (D.D.C. 2011).<br />

89. See, e.g., FED. R. CIV. P. 26(b)(2)(B) (“A party need not provide discovery <strong>of</strong><br />

electronically stored information from sources that <strong>the</strong> party identifies as not reasonably<br />

accessible because <strong>of</strong> undue burden or cost.”) (emphases added); FED. R. CIV. P.


2012] OVERSHARING: FACEBOOK DISCOVERY 61<br />

There is one procedure under Rule 34 that does allow a<br />

party to enter upon ano<strong>the</strong>r person’s l<strong>and</strong> in order to conduct<br />

discovery—a request to permit inspection <strong>of</strong> premises under<br />

Rule 34(a)(2). Rule 34(a)(2) provides that a party may request<br />

ano<strong>the</strong>r party or nonparty “to permit entry onto designated l<strong>and</strong><br />

or o<strong>the</strong>r property possessed or controlled by <strong>the</strong> responding<br />

party, so that <strong>the</strong> requesting party may inspect, measure, survey,<br />

photograph, test, or sample <strong>the</strong> property or any designated object<br />

or operation on it.” 90 But Rule 34(a)(2) does not allow entry on<br />

ano<strong>the</strong>r’s property in order to conduct a search for documents. 91<br />

The evident purpose is to allow discovery <strong>of</strong> objects, areas, or<br />

activities that it is not feasible to move or produce in any o<strong>the</strong>r<br />

way. 92 Courts have regularly limited <strong>the</strong> scope <strong>of</strong> inspections in<br />

order to restrict it to this narrow purpose. 93<br />

The leading case on this issue is Belcher v. Bassett<br />

Furniture Industries, Inc. 94 In Belcher, an employmentdiscrimination<br />

class action, <strong>the</strong> trial court granted <strong>the</strong> plaintiffs<br />

permission to inspect five factories over a five-day period by an<br />

expert with undisclosed expertise <strong>and</strong> “an entourage consisting<br />

<strong>of</strong> an unspecified number <strong>of</strong> plaintiffs’ attorneys, a paralegal,<br />

<strong>and</strong> two plaintiffs,” accompanied by a guide <strong>and</strong> an attorney <strong>of</strong><br />

<strong>the</strong> defendant’s choosing. 95 During <strong>the</strong> inspection, <strong>the</strong> expert<br />

would have “<strong>the</strong> right to roam through <strong>the</strong> plants, to stop when<br />

34(b)(2)(E) (setting forth procedures that “apply to producing documents or electronically<br />

stored information”) (emphasis added).<br />

90. FED. R. CIV. P. 34(a)(2). Again, state laws provide for similar procedures. See,<br />

e.g., N.Y. C.P.L.R. 3120(1)(ii) (McKinney 2005) (party may request “any o<strong>the</strong>r person . . .<br />

to permit entry upon designated l<strong>and</strong> or o<strong>the</strong>r property in <strong>the</strong> possession, custody or control<br />

<strong>of</strong> <strong>the</strong> party or person served for <strong>the</strong> purpose <strong>of</strong> inspecting, measuring, surveying,<br />

sampling, testing, photographing or recording by motion pictures or o<strong>the</strong>rwise <strong>the</strong> property<br />

or any specifically designated object or operation <strong>the</strong>reon.”); PA. R.C.P. NO. 4009.31<br />

(“Any party may serve a request upon a party . . . to permit entry upon designated property<br />

in <strong>the</strong> possession or control <strong>of</strong> <strong>the</strong> party . . . upon whom <strong>the</strong> request is served for <strong>the</strong><br />

purpose <strong>of</strong> inspecting <strong>and</strong> measuring, surveying, photographing, testing, or sampling <strong>the</strong><br />

property or any designated object or operation <strong>the</strong>reon . . . .”).<br />

91. See supra note 90 <strong>and</strong> accompanying text.<br />

92. See, e.g., Welzel v. Bernstein, 233 F.R.D. 185, 187 (D.D.C. 2005) (allowing<br />

<strong>of</strong>fice suite to be photographed); Micro Chem., Inc. v. Lextron, Inc., 193 F.R.D. 667, 669<br />

(D. Colo. 2000) (allowing access to machine for testing); Minn. Mining & Mfg. Co. v.<br />

Nippon Carbide Indus. Co., 171 F.R.D. 246, 248-49 (D. Minn. 1997) (allowing observation<br />

<strong>of</strong> manufacturing process).<br />

93. See Micro Chem., Inc., 193 F.R.D. at 669 (“The right . . . is not unlimited.”).<br />

94. 588 F.2d 904 (4th Cir. 1978).<br />

95. Id. at 905-06.


62 ARKANSAS LAW REVIEW [Vol. 65:39<br />

he chooses, <strong>and</strong> to make such inquiries as he deems appropriate<br />

<strong>of</strong> any supervisors or employees in <strong>the</strong> plant.” 96 The subject <strong>of</strong><br />

<strong>the</strong> proposed inquiries was not disclosed. 97<br />

The Fourth Circuit reversed. 98 While a response to<br />

ordinary document requests may be compelled based on a<br />

simple showing <strong>of</strong> relevance, <strong>the</strong> court held, “entry upon a<br />

party’s premises may entail greater burdens <strong>and</strong> risks than mere<br />

production <strong>of</strong> documents,” <strong>and</strong> <strong>the</strong>refore “a greater inquiry into<br />

<strong>the</strong> necessity for inspection would seem warranted.” 99 The<br />

Fourth Circuit agreed with <strong>the</strong> defendants that, given <strong>the</strong> lack <strong>of</strong><br />

a stated purpose for <strong>the</strong> inspection, it was likely <strong>the</strong> plaintiffs<br />

wished to have <strong>the</strong>ir expert conduct “roving deposition[s]” <strong>of</strong><br />

<strong>the</strong> defendant’s employees, “taken without notice . . . <strong>of</strong> persons<br />

who were not sworn <strong>and</strong> whose testimony was not recorded”<br />

<strong>and</strong> was not subject to cross-examination, in order to include<br />

those statements in his report. 100 But <strong>the</strong> court held that this<br />

would be improper; <strong>the</strong> plaintiffs could not use an inspection <strong>of</strong><br />

premises to circumvent <strong>the</strong> requirements <strong>and</strong> protections <strong>of</strong> Rule<br />

30 governing depositions. 101<br />

O<strong>the</strong>r courts have followed suit. Courts have expressed<br />

particular concern where <strong>the</strong>re is a possibility that an inspection<br />

will reveal documents or o<strong>the</strong>r information beyond <strong>the</strong> particular<br />

reason for <strong>the</strong> inspection. For example, in Schwab v. Wyndham<br />

International, Inc., <strong>the</strong> court refused to order an inspection due<br />

in part to concerns that “many <strong>of</strong> <strong>the</strong> departments plaintiff<br />

want[ed] to inspect <strong>and</strong> photograph maintain[ed] confidential<br />

<strong>and</strong> proprietary information, such as customer account<br />

information, employee records, tax information, financial<br />

reports, payroll records, sales <strong>and</strong> marketing plans, revenue<br />

goals, <strong>and</strong> investor pr<strong>of</strong>iles.” 102 The defendant was not required<br />

to make an argument that <strong>the</strong>se documents were privileged, only<br />

96. Id. at 906.<br />

97. Id.<br />

98. Id. at 911.<br />

99. Id. at 908. The court’s holding in this regard can be justified, as in fact <strong>the</strong> court<br />

suggested, as required by a careful balancing <strong>of</strong> <strong>the</strong> factors listed in Rules 26(b)(2) <strong>and</strong><br />

26(c), since an inspection is likely to impose more significant burdens on <strong>the</strong> responding<br />

party than a typical document request.<br />

100. Id. at 907, 910.<br />

101. Id. at 909-10; see also FED. R. CIV. P. 30.<br />

102. 225 F.R.D. 538, 539 (D. Colo. 2000).


2012] OVERSHARING: FACEBOOK DISCOVERY 63<br />

that <strong>the</strong>y should not be produced in this manner. 103 In Micro<br />

Chemical, Inc. v. Lextron, Inc., <strong>the</strong> court granted a request in a<br />

patent-infringement case for <strong>the</strong> requesting party to inspect a<br />

machine belonging to <strong>the</strong> defendant—its competitor—but only<br />

because <strong>the</strong> court was confident that <strong>the</strong> responding party could<br />

take reasonable precautions to protect its secrets. 104 In Keith H.<br />

v. Long Beach Unified School District, <strong>the</strong> court restricted <strong>the</strong><br />

scope <strong>of</strong> an inspection <strong>of</strong> two school facilities where <strong>the</strong>re was a<br />

risk that <strong>the</strong> plaintiff’s videotape might capture students’<br />

personal effects, <strong>the</strong>ir works on display, or <strong>the</strong> <strong>the</strong>ir names. 105<br />

The court expressed particular concern that unconstrained<br />

videotaping during school hours might violate <strong>the</strong> students’<br />

privacy. 106<br />

Courts have also limited inspections in order to protect<br />

o<strong>the</strong>r rights <strong>of</strong> <strong>the</strong> responding party. In Baugus v. CSX<br />

Transportation, Inc., <strong>the</strong> court excluded a videotape that was<br />

taken on <strong>the</strong> responding party’s l<strong>and</strong> without prior notice <strong>and</strong><br />

implicitly held that <strong>the</strong> responding party had a right to have<br />

counsel present during any inspection. 107 Obviously, if a<br />

requesting party is given <strong>the</strong> ability to access a socialnetworking<br />

account from any computer, <strong>the</strong> responding party’s<br />

counsel will not likely be “present” during such access. In<br />

Whittle v. Weber 108 <strong>and</strong> Gillett v. Conner, 109 two courts<br />

permitted limited inspections <strong>of</strong> property by parties litigating<br />

nuisance actions against <strong>the</strong>ir neighbors. 110 In Whittle, <strong>the</strong><br />

Alaska Supreme Court, after weighing <strong>the</strong> neighbor’s privacy<br />

interests, 111 upheld an order to allow a limited inspection <strong>of</strong> <strong>the</strong><br />

neighbor’s property to test for <strong>the</strong> presence <strong>of</strong> hazardous or<br />

noxious substances, specifically excluding “any residence” from<br />

103. See id. (making no mention <strong>of</strong> privilege, yet still denying motion to compel<br />

entry).<br />

104. 193 F.R.D. 667, 668 (D. Colo. 2000).<br />

105. 228 F.R.D. 652, 658-59 (C.D. Cal. 2005).<br />

106. See id. at 659 (declining to permit inspection during school day, “when it would<br />

unnecessarily interrupt <strong>the</strong> school’s activities <strong>and</strong> intrude upon <strong>the</strong> students’ privacy”).<br />

107. 223 F.R.D. 469, 470 (N.D. Ohio 2004).<br />

108. 243 P.3d 208 (Alaska 2010).<br />

109. 133 P.3d 960 (Wash. Ct. App. 2006).<br />

110. 243 P.3d at 209.<br />

111. Id. at 213 (balancing <strong>the</strong> “burdens <strong>and</strong> dangers created by <strong>the</strong> inspection”<br />

against whe<strong>the</strong>r a “compelling interest” in <strong>the</strong> inspection has been shown).


64 ARKANSAS LAW REVIEW [Vol. 65:39<br />

<strong>the</strong> inspection. 112 In Gillett, a Washington appellate court<br />

vacated an order permitting inspection where <strong>the</strong> inspection was<br />

not so limited: <strong>the</strong> order <strong>the</strong>re permitted <strong>the</strong> plaintiffs to inspect<br />

<strong>and</strong> photograph <strong>the</strong> interior <strong>and</strong> exterior <strong>of</strong> <strong>the</strong>ir neighbor’s<br />

residence, all outbuildings, <strong>and</strong> <strong>the</strong> l<strong>and</strong>. 113 The court found that<br />

even if such an inspection might uncover relevant evidence, <strong>the</strong><br />

burdens <strong>and</strong> risks posed to <strong>the</strong> neighbor’s privacy interests were<br />

substantial. 114 The court rem<strong>and</strong>ed <strong>the</strong> case for a balancing <strong>of</strong><br />

<strong>the</strong> factors under Washington’s version <strong>of</strong> Federal Rule<br />

26(b)(2)(C). 115<br />

There is at least one case where, contrary to Belcher, <strong>the</strong><br />

court did permit some activity beyond merely inspecting <strong>and</strong><br />

testing property or objects. In New York State Ass’n for<br />

Retarded Children Inc. v. Carey, <strong>the</strong> Second Circuit permitted<br />

plaintiffs’ counsel, consultants, <strong>and</strong> experts to, among o<strong>the</strong>r<br />

things, “interview any class member, staff member or employee<br />

desired outside <strong>the</strong> presence <strong>of</strong> defendants, <strong>the</strong>ir counsel <strong>and</strong><br />

representatives.” 116 Carey is a special case, however, as <strong>the</strong><br />

court took pains to point out. 117 Carey’s inspection was not<br />

pretrial discovery, but ra<strong>the</strong>r part <strong>of</strong> an effort to enforce a<br />

consent decree in <strong>the</strong> wake <strong>of</strong> “quite specific” claims <strong>of</strong><br />

noncompliance <strong>and</strong> in order to “fill a gap left by <strong>the</strong> demise <strong>of</strong><br />

<strong>the</strong> Review Panel provided for in <strong>the</strong> Consent Judgment.” 118<br />

“Mindful <strong>of</strong> <strong>the</strong> unique difficulties presented in post-judgment<br />

compliance efforts <strong>of</strong> <strong>the</strong> sort here in question,” <strong>the</strong> Carey court<br />

concluded, “we do not consider <strong>the</strong> district court’s discovery<br />

order . . . to have been an abuse <strong>of</strong> discretion.” 119<br />

Not only is a search <strong>of</strong> an opposing party’s files<br />

impermissible as a discovery request, it is not even available as a<br />

sanction under Rule 37 after a party has failed to adequately<br />

respond to a request. 120 A party that unjustifiably refuses to<br />

112. Id.<br />

113. 133 P.3d at 964.<br />

114. Id.<br />

115. Id. (citing WASH. CIV. R. 26(b)(1)); see also FED. R. CIV. P. 26(b)(2)(C)(iii).<br />

116. 706 F.2d 956, 960 (2d Cir. 1983) (Friendly, J.) (internal quotation marks<br />

omitted).<br />

117. Id. at 961.<br />

118. Id. Indeed, “Defendants’ own Compliance Report revealed noncompliance<br />

with 22 <strong>of</strong> 39 applicable st<strong>and</strong>ards in this area . . . .” Id. at 962.<br />

119. Id. at 961.<br />

120. See FED. R. CIV. P. 37(d).


2012] OVERSHARING: FACEBOOK DISCOVERY 65<br />

comply with a legitimate request can be ordered by <strong>the</strong> court to<br />

comply. 121 And if <strong>the</strong> party persists in refusing to permit <strong>the</strong><br />

requested discovery, <strong>the</strong> court can issue a wide variety <strong>of</strong><br />

potential sanctions under Rule 37 <strong>and</strong> its state analogs. 122 A<br />

court can direct that <strong>the</strong> contested facts be taken as established,<br />

prohibiting <strong>the</strong> nonresponding party from supporting or<br />

opposing claims or defenses or introducing certain matters into<br />

evidence, strike pleadings, stay fur<strong>the</strong>r proceedings, dismiss <strong>the</strong><br />

action, enter a default judgment, or hold <strong>the</strong> party in<br />

contempt. 123 Nor is this list exhaustive; Rule 37 gives a court<br />

facing a recalcitrant party power to issue “fur<strong>the</strong>r just orders” as<br />

it sees fit. 124 But what all <strong>of</strong> <strong>the</strong> enumerated sanctions have in<br />

common is that <strong>the</strong>y are all aimed at forcing <strong>the</strong> party to<br />

voluntarily provide <strong>the</strong> requested discovery. No specifically<br />

identified sanction permits <strong>the</strong> court, for example, to order a<br />

U.S. Marshal to seize <strong>the</strong> evidence or deputize a private party to<br />

collect it. 125 The underlying principle <strong>of</strong> <strong>the</strong> enumerated<br />

sanctions—that <strong>the</strong>ir aim is to encourage voluntary<br />

compliance—likely cabins <strong>the</strong> court’s discretion to issue<br />

“fur<strong>the</strong>r just orders” under Rule 37(b)(2)(A) under <strong>the</strong> principle<br />

<strong>of</strong> ejusdem generis. 126<br />

There is a reason why such procedures do not exist under<br />

<strong>the</strong> federal or state rules. <strong>Discovery</strong>, like much <strong>of</strong> civil<br />

procedure, is built on a foundation that includes <strong>the</strong> adversarial<br />

121. See FED. R. CIV. P. 37(a)(3)(B).<br />

122. See FED. R. CIV. P. 37(d)(3).<br />

123. See FED. R. CIV. P. 37(b)(2); see also N.Y. C.P.L.R. 3126 (McKinney 2005)<br />

(court may make “such orders with regard to <strong>the</strong> failure or refusal as are just,” including<br />

orders that issues be deemed resolved, prohibiting parties from supporting or opposing<br />

claims or defenses or introducing certain evidence, striking pleadings, staying proceedings,<br />

dismissing <strong>the</strong> action, or entering default judgment); PA. R.C.P. NO. 4019(c) (sanctions<br />

include: orders providing that matters be taken as established; refusing to allow party to<br />

support or oppose claim or defense or introduce matters in evidence; striking pleadings;<br />

staying fur<strong>the</strong>r proceedings; <strong>and</strong> entering judgment, contempt, or “such order with regard<br />

to <strong>the</strong> failure to make discovery as is just”).<br />

124. See FED. R. CIV. P. 37(b)(2)(A).<br />

125. There are certain, limited circumstances where this is possible. See, e.g., 15<br />

U.S.C. § 1116(d)(1)(A), (d)(9) (2006) (allowing seizure by federal or state lawenforcement<br />

<strong>of</strong>ficials <strong>of</strong> counterfeit items <strong>and</strong> records related to <strong>the</strong>ir manufacture, sale, or<br />

receipt); 17 U.S.C. § 503(a) (2006) (same for infringement <strong>of</strong> copyrights).<br />

126. See, e.g., Harrison v. PPG Indus., Inc., 446 U.S. 578, 588 (1979) (“Under <strong>the</strong><br />

rule <strong>of</strong> ejusdem generis, where <strong>the</strong> general words follow an enumeration <strong>of</strong> specific items,<br />

<strong>the</strong> general words are read as applying only to o<strong>the</strong>r items akin to those specifically<br />

enumerated.”).


66 ARKANSAS LAW REVIEW [Vol. 65:39<br />

process. That process is typically justified as a means for<br />

enabling <strong>the</strong> judicial system to determine <strong>the</strong> truth among<br />

contested facts <strong>and</strong> claims; <strong>the</strong> <strong>the</strong>ory is that <strong>the</strong> truth is best<br />

served by allowing each party to vigorously present its<br />

arguments <strong>and</strong> defend its own interests before a neutral arbiter.<br />

But <strong>the</strong> controversies over discovery <strong>of</strong> social-networking<br />

information reveal ano<strong>the</strong>r justification for <strong>the</strong> adversarial<br />

process: it protects <strong>the</strong> parties’ privacy, not only from <strong>the</strong>ir<br />

opponents, but also from <strong>the</strong> state (in <strong>the</strong> form <strong>of</strong> <strong>the</strong> court) <strong>and</strong><br />

<strong>the</strong> public (in <strong>the</strong> form <strong>of</strong> <strong>the</strong> jury). 127 The ordinary procedure<br />

<strong>of</strong> discovery, in requiring that a party be able to review material<br />

prior to production for relevance <strong>and</strong> privilege, helps to limit <strong>the</strong><br />

privacy harm from what is o<strong>the</strong>rwise a very liberal discovery<br />

process. It is <strong>of</strong> course true that if material is clearly relevant<br />

<strong>and</strong> important, <strong>the</strong> mere fact that it is private will not shield it<br />

from production. 128 But while a wide variety <strong>of</strong> materials might<br />

be relevant <strong>and</strong> discoverable in a given lawsuit, <strong>the</strong> ability <strong>of</strong> a<br />

party to limit discovery to what it itself affirmatively produces<br />

prevents <strong>the</strong> discovery process from intruding even fur<strong>the</strong>r into<br />

irrelevant, burdensome, or privileged materials.<br />

The orders permitting parties to gain complete access to<br />

<strong>the</strong>ir opponents’ social-networking accounts thus violate this<br />

fundamental protection provided by <strong>the</strong> rules <strong>of</strong> civil procedure.<br />

Granting access to an account unnecessarily exposes irrelevant<br />

or minimally relevant <strong>and</strong> highly sensitive material belonging to<br />

<strong>the</strong> responding party, such as all photographs uploaded to <strong>the</strong><br />

account, posts about <strong>the</strong> party’s friends or children, posts about<br />

<strong>the</strong> wea<strong>the</strong>r, complaints about politics, discussions <strong>of</strong> illnesses<br />

not related to <strong>the</strong> suit, private communications with third parties<br />

via private messaging, <strong>and</strong> a wide variety <strong>of</strong> o<strong>the</strong>r materials.<br />

But <strong>the</strong> harms go fur<strong>the</strong>r than that. Allowing an opposing party<br />

access allows opposing counsel, at least, to view <strong>the</strong> same sorts<br />

127. See, e.g., Hickman v. Taylor, 329 U.S. 495, 512 (1947). In Hickman, <strong>the</strong> Court<br />

was concerned with an attorney’s privacy in his or her own thoughts <strong>and</strong> impressions, id. at<br />

510-12, but as an attorney is merely an agent for his or her client, <strong>the</strong> more serious invasion<br />

to be guarded against is unnecessary intrusions into <strong>the</strong> client’s privacy.<br />

128. See Seattle Times Co. v. Rhinehart, 467 U.S. 20, 30 (1984) (“[T]he Rules <strong>of</strong>ten<br />

allow extensive intrusion into <strong>the</strong> affairs <strong>of</strong> both litigants <strong>and</strong> third parties.”); Faragiano v.<br />

Town <strong>of</strong> Concord, 741 N.Y.S.2d 369, 369 (App. Div. 2002) (diary ordered produced);<br />

Sgambelluri v. Recinos, 747 N.Y.S.2d 330 (Sup. Ct. 2002) (wedding video ordered<br />

produced).


2012] OVERSHARING: FACEBOOK DISCOVERY 67<br />

<strong>of</strong> materials from all <strong>of</strong> <strong>the</strong> party’s friends as well. As one<br />

Canadian court explained, noting <strong>the</strong> need for restrictions on<br />

production, a person’s account “include[s] blogs <strong>and</strong> e-mails<br />

entirely authored by third parties who are not involved in this<br />

litigation, which, in some cases, pertain exclusively to <strong>the</strong>ir own<br />

lives. Photos <strong>of</strong> <strong>the</strong>se unrelated individuals are also included<br />

among <strong>the</strong> materials sought.” 129 For that reason, <strong>the</strong> court<br />

concluded, “all <strong>the</strong> documents would have to be carefully<br />

reviewed to ensure that only relevant materials were produced<br />

<strong>and</strong> that <strong>the</strong> privacy rights <strong>of</strong> <strong>the</strong>se third parties was<br />

respected.” 130<br />

Most egregious are those orders in which <strong>the</strong> courts have<br />

required parties not only to grant access to <strong>the</strong>ir socialnetworking<br />

accounts to opposing parties, but to produce <strong>the</strong><br />

usernames <strong>and</strong> passwords for those accounts. 131 Such orders are<br />

particularly burdensome for several reasons. In addition to all <strong>of</strong><br />

<strong>the</strong> concerns raised above with respect to opposing counsel<br />

having unfettered access to a party’s account, turning over <strong>the</strong><br />

user’s username <strong>and</strong> password raises significant security issues.<br />

A person with a party’s username <strong>and</strong> password can log in to <strong>the</strong><br />

party’s account posing as <strong>the</strong> party <strong>and</strong> create untold mischief,<br />

such as sending spurious messages. Although this would create<br />

risk for <strong>the</strong> imposter, tracking <strong>the</strong> miscreant down would be<br />

difficult <strong>and</strong> would probably require multiple subpoenas. Even<br />

worse, a user is likely to use <strong>the</strong> same login information on<br />

multiple sites. 132 That means that when a court orders<br />

production <strong>of</strong> a party’s social-networking username <strong>and</strong><br />

password, it is also likely forcing <strong>the</strong> party to disclose his or her<br />

bank, credit-card, or email-login information as well.<br />

129. Kent v. Laverdiere, 2009 CanLII 16741 (Can. Ont. Super. Ct. 2009).<br />

130. Id.<br />

131. See Gallion v. Gallion, No. FA114116955S, 2011 WL 4953451 (Conn. Super.<br />

Ct. Sept. 30, 2011); Largent v. Reed, No. 2009-1823, 2011 WL 5632688 (Pa. Ct. C.P. Nov.<br />

7, 2011); Zimmerman v. Weis Markets, Inc., No. CV-09-1535, 2011 WL 2065410 (Pa. Ct.<br />

C.P. May 19, 2011); McMillen v. Hummingbird Speedway, Inc., No. 113-2010 CD, 2010<br />

WL 4403285 (Pa. Ct. C.P. Sept. 9, 2010). But see Chauvin v. State Farm Mut. Auto. Ins.<br />

Co., No. 10-11735, 2011 U.S. Dist. LEXIS 121600 (S.D. Mich. Oct. 20, 2011) (affirming<br />

denial <strong>of</strong> motion for production <strong>of</strong> username <strong>and</strong> password <strong>and</strong> award <strong>of</strong> sanctions).<br />

132. See Kimberly Palmer, Zappos Customers: Change All Your Passwords, U.S.<br />

NEWS & WORLD REP. ALPHA CONSUMER BLOG (Jan. 17, 2012), http:// money.usnews.com<br />

/money/blogs/alpha-consumer/2012/01/17/zappos-customers-change-all-your-passwords.


68 ARKANSAS LAW REVIEW [Vol. 65:39<br />

Indeed, logging in to someone else’s account to gain<br />

information from it, even with <strong>the</strong> user’s acquiescence, may be<br />

more than an invasion <strong>of</strong> <strong>the</strong> user’s privacy; it is conceivably<br />

also a crime. Under <strong>the</strong> Computer Fraud <strong>and</strong> Abuse Act, it is a<br />

misdemeanor to intentionally exceed authorized access to a<br />

protected computer <strong>and</strong> obtain information from it. 133 A<br />

“protected computer” is essentially any computer connected to<br />

<strong>the</strong> <strong>Internet</strong>. 134 And several prosecutors <strong>and</strong> courts have taken<br />

<strong>the</strong> position that it “exceeds authorized access” to access a<br />

computer after having violated any contractual provision<br />

governing its use, including form terms <strong>of</strong> service. 135 <strong>Facebook</strong>,<br />

for example, prohibits its users in its terms <strong>of</strong> service from<br />

sharing <strong>the</strong>ir passwords, allowing o<strong>the</strong>rs to access <strong>the</strong>ir<br />

accounts, or soliciting login information or accessing someone<br />

else’s accounts. 136 <strong>Facebook</strong> users who obtain a password from<br />

ano<strong>the</strong>r user in violation <strong>of</strong> <strong>Facebook</strong>’s terms are <strong>the</strong>refore<br />

arguably “exceeding authorized access” to <strong>Facebook</strong>’s servers,<br />

<strong>and</strong> if <strong>the</strong>y obtain information in doing so, <strong>the</strong>reby committing a<br />

federal misdemeanor. 137<br />

IV. CONCLUSION<br />

The treatment <strong>of</strong> social-networking sites during discovery<br />

is an example <strong>of</strong> <strong>Internet</strong> law in action: <strong>the</strong> application <strong>of</strong> an<br />

existing body <strong>of</strong> doctrine to a pr<strong>of</strong>oundly new technological <strong>and</strong><br />

sociological set <strong>of</strong> circumstances. There may be valuable<br />

lessons in how courts have responded to that challenge,<br />

133. 18 U.S.C. § 1030(a)(2) (2006). Violation <strong>of</strong> § 1030(a)(2) is punishable by a fine<br />

or imprisonment for not more than one year, or both. 18 U.S.C. § 1030(c)(2)(A) (2006).<br />

134. See United States v. Drew, 259 F.R.D. 449, 456 (C.D. Cal. 2009).<br />

135. See United States v. Nosal, 642 F.3d 781, 784 (9th Cir. 2011); United States v.<br />

Rodriguez, 628 F.3d 1258, 1263 (11th Cir. 2010); Drew, 259 F.R.D. at 456 (C.D. Cal.<br />

2009) (finding prosecution’s <strong>the</strong>ory void for vagueness).<br />

136. Statement <strong>of</strong> Rights <strong>and</strong> Responsibilities, FACEBOOK (Apr. 26, 2011), http://<br />

www.facebook.com/legal/ terms.<br />

137. To be sure, <strong>the</strong>re is a persuasive argument that it is incorrect as a matter <strong>of</strong><br />

ei<strong>the</strong>r statutory interpretation or constitutional limits <strong>of</strong> due process to interpret <strong>the</strong><br />

Computer Fraud <strong>and</strong> Abuse Act as criminalizing violations <strong>of</strong> form user agreements. See<br />

Orin S. Kerr, Vagueness Challenges to <strong>the</strong> Computer Fraud <strong>and</strong> Abuse Act, 94 MINN. L.<br />

REV. 1561, 1562 (2010); Orin S. Kerr, Cybercrime’s Scope: Interpreting “Access” <strong>and</strong><br />

“Authorization” in Computer Misuse Statutes, 78 N.Y.U. L. REV. 1596, 1598-99 (2003).<br />

The point here is simply that <strong>the</strong> matter is currently unresolved in <strong>the</strong> federal courts,<br />

placing civil litigants at some nontrivial risk <strong>of</strong> criminal liability when <strong>the</strong>y access an<br />

account pursuant to court-authorized discovery.


2012] OVERSHARING: FACEBOOK DISCOVERY 69<br />

particularly in those decisions that appear to have extended <strong>the</strong><br />

ordinary bounds <strong>of</strong> discovery when confronted with a novel<br />

form <strong>of</strong> evidence. What can be learned from <strong>the</strong>se cases?<br />

First, judges <strong>and</strong> parties appear in some cases to be having<br />

trouble fitting a new source <strong>of</strong> information into an existing legal<br />

trope about how discovery is conducted <strong>and</strong> what objections are<br />

proper. For example, it is well understood that paper documents<br />

are obtained with a document request <strong>and</strong> that oral questions are<br />

asked in depositions, <strong>and</strong> <strong>the</strong> forms for both asking for such<br />

discovery <strong>and</strong> objecting to it are both deeply engrained <strong>and</strong><br />

rarely thought about. Confronted with issues arising from a new<br />

source <strong>of</strong> information, however, lawyers <strong>and</strong> judges are forced<br />

to consider what box to place those issues in. The courts<br />

granting opposing parties access to accounts, <strong>and</strong> perhaps even<br />

some <strong>of</strong> those denying access, appear to have placed all <strong>of</strong> <strong>the</strong><br />

issues in <strong>the</strong> “relevance” box—that is, is <strong>the</strong>re relevant<br />

information in <strong>the</strong> account? Almost certainly, in all <strong>of</strong> <strong>the</strong> cases<br />

considered above, <strong>the</strong> answer to that question is yes—<strong>the</strong>re is<br />

likely to be relevant <strong>and</strong> discoverable evidence in <strong>the</strong> account.<br />

But <strong>the</strong> answer to that question did not address ano<strong>the</strong>r question,<br />

one that rarely comes to mind: what is <strong>the</strong> proper method to<br />

obtain that information? Just because <strong>the</strong> information is<br />

discoverable does not mean that any conceivable method <strong>of</strong><br />

obtaining it is permissible. Similarly, judges, <strong>and</strong> attorneys for<br />

both sides, appear in many cases to have confused what is<br />

properly a dispute over <strong>the</strong> method <strong>of</strong> discovery with one <strong>of</strong><br />

whe<strong>the</strong>r some sort <strong>of</strong> privilege should bar discovery entirely.<br />

Confronted with arguments from plaintiffs’ attorneys that <strong>the</strong>ir<br />

clients’ social-networking information was privileged, courts<br />

unsurprisingly rejected that assertion.<br />

One advantageous result <strong>of</strong> <strong>the</strong> decisions granting access to<br />

social-networking communications is that <strong>the</strong>y have unwittingly<br />

demonstrated <strong>the</strong> privacy-protective nature <strong>of</strong> <strong>the</strong> rules <strong>of</strong><br />

discovery, in particular those rules that preserve <strong>the</strong> adversarial<br />

process. It is not <strong>of</strong>ten <strong>the</strong> subject <strong>of</strong> much sustained attention,<br />

but it is plainly important how Rule 34 <strong>and</strong> <strong>the</strong> o<strong>the</strong>r discovery<br />

rules say materials are to be obtained in discovery. It matters in<br />

preserving some measure <strong>of</strong> privacy that it is <strong>the</strong> party’s own<br />

attorney, <strong>and</strong> not <strong>the</strong> opposing party’s attorney or <strong>the</strong> court, that<br />

combs through <strong>the</strong> party’s documents looking for responsive


70 ARKANSAS LAW REVIEW [Vol. 65:39<br />

nonprivileged materials. This procedure for supplying <strong>the</strong><br />

action with factual evidence is only overridden in situations<br />

where <strong>the</strong> need for unfiltered access to <strong>the</strong> evidence is<br />

particularly compelling, such as a criminal investigation where<br />

<strong>the</strong>re is probable cause to believe <strong>the</strong> evidence exists in a certain<br />

location.<br />

A second lesson that may be drawn from <strong>the</strong> socialnetworking<br />

discovery cases is in how judges conceive <strong>of</strong> private<br />

information. Several courts, in considering motions to obtain or<br />

compel discovery from social-networking accounts, appear to be<br />

viewing <strong>the</strong> privacy interests at stake as minimal. For example,<br />

several opinions cited <strong>the</strong> number <strong>of</strong> “friends” able to view a<br />

<strong>Facebook</strong> account, <strong>of</strong>ten numbering in <strong>the</strong> hundreds, as<br />

weighing against a privacy interest in <strong>the</strong> information. 138 But<br />

this reflects an overly cramped notion <strong>of</strong> privacy widely held in<br />

<strong>the</strong> judiciary, as well as, to some extent, society at large. The<br />

<strong>the</strong>ory is sometimes voiced that any fact that is disclosed to<br />

anyone—that is known by more than one person—is not private<br />

anymore. But no one actually lives <strong>the</strong>ir life that way. 139 In<br />

fact, people disclose information about <strong>the</strong>mselves all <strong>of</strong> <strong>the</strong><br />

time to friends, family, <strong>and</strong> coworkers that <strong>the</strong>y fully <strong>and</strong><br />

reasonably expect to remain unknown by people outside <strong>of</strong> <strong>the</strong>ir<br />

regular social circle. And that circle can be quite large. The<br />

average adult knows approximately 1700 individuals. 140 A fact<br />

known by all 1700 is likely not still private, but a fact known by<br />

a considerably smaller subset <strong>of</strong> those individuals might well<br />

stay within <strong>the</strong> confines <strong>of</strong> <strong>the</strong> individual’s social network,<br />

which means in effect that fact is still private from <strong>the</strong> rest <strong>of</strong> <strong>the</strong><br />

138. See, e.g., Murphy v. Perger, 2007 CarswellOnt 9439, para. 20 (Can. Ont. Super.<br />

Ct. J.) (WL) (“The plaintiff could not have a serious expectation <strong>of</strong> privacy given that 366<br />

people have been granted access to <strong>the</strong> private site.”). The factual circumstances have<br />

gotten more complicated, as <strong>Facebook</strong> now <strong>of</strong>fers <strong>the</strong> ability to tailor <strong>the</strong> number <strong>of</strong> people<br />

able to see any given post; complete access to an account might <strong>the</strong>refore reveal posts seen<br />

by just one person as well as those visible to “friends <strong>of</strong> friends.” In addition, it has long<br />

been possible to send private chat messages <strong>and</strong> emails through <strong>Facebook</strong>, which would<br />

also be visible to someone with complete access.<br />

139. See United States v. Jones, 132 S. Ct. 945, 954-57 (2012) (Sotomayor, J.,<br />

concurring) (criticizing privacy as secrecy <strong>the</strong>ory); SOLOVE, supra note 68, at 43-44<br />

(criticizing privacy as secrecy <strong>the</strong>ory).<br />

140. Strahilevitz, supra note 68, at 974. As Strahilevitz points out, <strong>the</strong>se are not<br />

necessarily friends or even acquaintances, but persons an individual knows in any capacity.<br />

Id.


2012] OVERSHARING: FACEBOOK DISCOVERY 71<br />

world. 141 Since a social-networking account is almost by<br />

definition comprised <strong>of</strong> individuals within one’s social network,<br />

it can at least be said that <strong>the</strong>re are privacy interests at stake in<br />

ordering production, even if <strong>the</strong>y are not so weighty as to defeat<br />

<strong>the</strong> opposing party’s interest in discovering relevant information<br />

in most cases. But <strong>the</strong>y should certainly be enough to defeat <strong>the</strong><br />

discovery <strong>of</strong> irrelevant information.<br />

It is also possible that courts <strong>and</strong> lawyers are having<br />

difficulty in applying <strong>the</strong> rules <strong>of</strong> discovery to social-networking<br />

sites for a much more prosaic reason: confusion over what<br />

exactly constitutes a “document” on a social-networking site.<br />

That is, <strong>the</strong> problem may simply be one <strong>of</strong> translation from new<br />

technology to more familiar forms <strong>of</strong> media. It is possible that<br />

some courts <strong>and</strong> lawyers are conceiving <strong>of</strong> <strong>the</strong> information<br />

visible on a social-networking site as akin to an ordinary<br />

website, in which a “document” is typically defined as a single<br />

webpage. Once it has been shown that relevant information<br />

exists in a document, typically <strong>the</strong> entire document must be<br />

produced, absent redactions for privileged information, so that<br />

<strong>the</strong> relevant information maintains its context. 142 In ordering<br />

access to entire sites, courts may be thinking <strong>of</strong> socialnetworking<br />

accounts as in essence single documents, or a small<br />

number <strong>of</strong> documents. But <strong>the</strong> information on socialnetworking<br />

sites is not constructed in <strong>the</strong> same manner that a<br />

paper or even website document typically is. The information<br />

available on a person’s <strong>Facebook</strong> “News Feed,” for example, is<br />

an agglomeration <strong>of</strong> information from multiple sources <strong>and</strong> on a<br />

variety <strong>of</strong> subjects, compiled in a bric-a-brac fashion over a<br />

period <strong>of</strong> days, or if one scrolls far enough down, months or<br />

even years. Each separate post concerns a discrete discussion,<br />

initiated by <strong>the</strong> user putting <strong>the</strong> post on his or her wall, which is<br />

<strong>the</strong>n <strong>of</strong>ten <strong>the</strong> subject <strong>of</strong> contemporaneous comments from o<strong>the</strong>r<br />

users on <strong>the</strong> same subject. It would make more sense in that<br />

context to say that each post is a document; production <strong>of</strong><br />

responsive documents would <strong>the</strong>refore entail production only <strong>of</strong><br />

141. See id. at 974-75.<br />

142. See Expert Choice, Inc. v. Gartner, Inc., Civil No. 3:03CV02234 (CFD)(TPS),<br />

2007 WL 951662, at *5 (D. Conn. Mar. 27, 2007).


72 ARKANSAS LAW REVIEW [Vol. 65:39<br />

<strong>the</strong> relevant posts <strong>and</strong> associated comments, not <strong>the</strong> entire<br />

account. 143<br />

Finally, <strong>the</strong> social-networking discovery cases pose a<br />

significant policy question for <strong>Internet</strong> law as well. Socialnetworking<br />

sites are unique in <strong>the</strong>ir ability to record <strong>and</strong><br />

preserve <strong>the</strong> activities, thoughts, <strong>and</strong> communications <strong>of</strong><br />

ordinary individuals, to an extent that few people aside from<br />

celebrities have ever been subject to. Individuals involved in<br />

lawsuits have always been subject to a duty to tell <strong>the</strong> truth<br />

about <strong>the</strong>mselves in depositions <strong>and</strong> at trial, <strong>and</strong> to produce any<br />

relevant documents that <strong>the</strong>y have. The difference now is that<br />

such documents exist, <strong>and</strong> in quantity. There may, however, be<br />

some unrecognized costs to making individuals more susceptible<br />

to evidence—that is, more susceptible to <strong>the</strong> truth. The hard<br />

question in <strong>the</strong> context <strong>of</strong> discovery <strong>of</strong> social-networking<br />

information is just how burdensome <strong>the</strong> law should treat<br />

production <strong>of</strong> such materials in conducting <strong>the</strong> balancing<br />

required under Rule 26(b)(2)(C). Should it be viewed as more<br />

burdensome to produce social-networking posts than o<strong>the</strong>r<br />

relevant information about an individual, such as financial<br />

information, tax returns, emails, letters, deposition questions<br />

about <strong>the</strong>ir activities, <strong>and</strong> <strong>the</strong> like?<br />

On <strong>the</strong> one h<strong>and</strong>, it could be argued that <strong>the</strong> burden is less<br />

in producing tangible records, as individuals creating those are<br />

more likely to take care not to reveal personal information that<br />

<strong>the</strong>y do not fully intend to disclose, whereas social-networking<br />

posts are <strong>of</strong>ten generated on a whim. But that is contrary to <strong>the</strong><br />

general philosophy <strong>of</strong> <strong>the</strong> Federal Rules <strong>of</strong> Civil Procedure,<br />

which is that <strong>the</strong> truth comes out through wide-ranging<br />

discovery, not restricted discovery, a philosophy that many<br />

believe benefits individual plaintiffs <strong>and</strong> small players. And it<br />

may be contrary to <strong>the</strong> direction <strong>of</strong> society as well. Like it or<br />

not, <strong>the</strong> increasing use <strong>and</strong> prevalence <strong>of</strong> data-generating <strong>and</strong><br />

data-recording devices such as computers, cameras, <strong>and</strong> <strong>the</strong> like,<br />

is leading to better documentation <strong>of</strong> <strong>the</strong> lives <strong>of</strong> individuals that<br />

is probably inevitable. While <strong>the</strong> private nature <strong>of</strong> social-<br />

143. Cf. Desgagne v. Yuen, 2006 BCSC 955, para. 20 (Can. B.C. Sup. Ct. 2007)<br />

(concluding hard drive is equivalent to a file cabinet, not a document, <strong>and</strong> production <strong>of</strong> a<br />

file cabinet “in <strong>the</strong> hopes that <strong>the</strong>re might be found a document in which an admission<br />

against interest is made” is improper).


2012] OVERSHARING: FACEBOOK DISCOVERY 73<br />

networking information should be a consideration in a Rule<br />

26(b)(2)(C)(iii) analysis that defeats requests <strong>of</strong> truly marginal<br />

importance, it is hard to argue that social-networking posts<br />

should receive any greater protections than any o<strong>the</strong>r form <strong>of</strong><br />

sensitive information. And at <strong>the</strong> moment, <strong>the</strong>re is no reason to<br />

think that <strong>the</strong> existing procedures for discovery, properly<br />

applied, are not up to <strong>the</strong> task.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!