SlideShare a Scribd company logo
1 of 94
Searching Social Media
Pennsylvania Bar Institute
July, 2015
Jennifer Ellis
Lowenthal & Abrams, PC
&
Jennifer Ellis, JD, LLC
Jennifer@JLEllis.net
@JLE_JD
About Jennifer Ellis
• Lowenthal & Abrams, LLC
• Legal Ethics Attorney
• Manage Online Presence
• Jennifer Ellis, JD, LLC
• Online Marketing Consultant
• Expert Witness
• Author
• Wordpress in One Hour for Lawyers
Today’s Discussion
• What is Social Media?
• Unique considerations
• Legal
• Privacy
• Ethical
• How to Perform Research of Social Media
• Social Media Cases & Ethics Issues
What is Social Media?
• Websites and Applications
• Desktop, Laptop, Phone, Tablet (etc.)
• Users create and share content
• Engage in communication with each other and the
public at large
• May know who is seeing content
• May not know
• Content is easily shared
•Social media is meant to be shared
•It is NOT meant to be private
1.44 billion
157 million daily in
US & Canada
21 min per day
1 billion users
4 billion views per day
6 billion hours per month
600 million
22% online adults
at least once per month
300 million
53% of 18-29
60.3 million US
70 million
80% women
42% of online
adult US Women550 million
50% of
People
Read Blogs
332 million
40% check daily
107 Million US
17 minutes monthly
97% lawyers listed
200,000 active lawyers
Over 6 million questions
100 million daily active users
30% U.S. millennial internet users –
every day
Unique Considerations
Legal Issues – Improper Access
Felony and/or Misdemeanor Charges
• Charges for Improper access to
• E-Mail
• Social Media
• All Accounts
Federal
• Electronic Communications Privacy Act
18 USC § 2510-2522
• Includes computer based communications
• Includes stored communications
Federal
• 18 USC § 2511
• Interception and disclosure of wire, oral,
or electronic communications prohibited
• intentionally discloses, or endeavors to
disclose, to any other person the contents
of any…communication…
Pennsylvania
• 18 § 7611. Unlawful use of computer and
other computer crimes. (3rd Degree Felony)
• Accesses or exceeds authorization to access
• Provides password or other information
allowing access to a third party
Applies to:
• Everyone
• Spouses
• Children
• Paralegals
• Private Investigators
• Attorneys
Subpoenas for Data?
•Most sites state they will not respond to a
civil subpoena
•Claim violates Stored Communications
Act
•Some sites will surprise you so ask
Subpoenas for Ownership
• Some sites will cooperate
• Provide email address
• Provide username or ID number
Privacy Issues –
Access Blocked
• Unlike traditional research
• Privacy settings can block access to undesired
viewers
• Privacy settings often complex and confusing
• Famous last words “I didn’t think anyone could
see it.”
Ethical Issues
•Can’t do it off line, can’t do it online
•No connecting with represented party
•May connect to witnesses
•Must reveal who you are
•May research jurors
•No connecting
Ethical Issues
• Fine to review
• What is publically available
• What legitimately connected people can see
• Make sure employees and independent
contractors understand rules
• Do not ask a third party to do what you cannot
do
Process and Examples
Don’t Forget the Litigation Hold!
Send a Notice to Preserve Immediately
Three or Four Pronged Approach
1. Gather Data about Person
• Interrogatories critical
• Ask the right questions
• Search Google
• Ask your client
• Ask people who know the subject
2. Locate Account(s)
3. Review Accounts
• Preserve data
4. Verify Information
Gather Data
• Name(s)
• Email Address(es)
• Site(s) using
• Links to accounts
• Is your client connected to the person?
Ask the Right Questions
• Do you use social media?
• Give examples, but make clear it is not limited
• Facebook, Snapchat, Twitter, Quora, Foursquare, MySpace
• Ask doctors and lawyers if they answer questions on sites
such as Avvo
• Find out the profession and hobbies. Ask if there are any sites
where the person answers questions.
• Do you comment on any blogs or websites?
• Give examples, but make clear it is not limited
• Do you post on any news groups?
• Don’t forget older online communication methods
Ask the Right Questions (Part 2)
• Identify each site
• Provide link to each site
• Provide user IDs
• You may need to provide instructions on how to obtain
user IDs for various sites
• Do you have a blog?
• Get the link
• Provide all email addresses used within X time
period
Ask the Right Questions (3)
• Have you altered your privacy settings?
• What changes have you made?
• Have you deleted any content within X period of
time?
• What have you deleted?
• When?
• Have you disabled any accounts?
• What have you disabled?
• When?
Ask the Right Questions (4)
• Do you have any social media pages (versus accounts)
• Do you use X, Y, Z to access your social media accounts?
• Phone, desktop computer, laptop computer, tablet, etc.
• Does anyone else have access to any of these devices?
• Who?
• When?
• Does anyone else access any of your social media
accounts?
• Which ones?
• Who?
• How?
• When?
Ask the Right Questions (5)
• Does anyone else have a password to any of your social
media accounts
• Which ones
• Who
• When?
• Have you posted anything related to this case online or via
any applications?
• What
• Where
• Provide copy
• Ask about specific issues you want to know about
• I.e., have they posted a picture of themselves holding alcohol
during X time period
• You may ask for username or password. A wise attorney will
refuse.
2. Find the Account
• Use search techniques to find the account
• Might require offline techniques
• Spouse, friends, etc.
• Cooperation of account owner
• Discovery
Searching
• Look for the person’s name on specific sites
• Try Googling the person’s name
• Add the person’s name to identifying information
• Age
• Nickname
• Geographic location
Google Jennifer Ellis
Found
• Website for Jennifer Ellis, JD
• Website for Lowenthal & Abrams
Google Jennifer Ellis Esq
Found
• Website for Lowenthal & Abrams
• Website for Jennifer Ellis, JD
• Account on Avvo
• Account on LinkedIn
• Business Page on Facebook
• Class taught on LegalSpan
• Slideshare Account
Conclusion?
•Narrow the search
• Add additional terms
• Obtain more detailed and useful results
•Don’t narrow the search too much
• Try different terms for different results
3. Review the Account
• Access what you can
•Privacy settings will be an issue in many
cases
Facebook
Privacy Settings
• Privacy control what you can see
• Friends can see a lot
• Can limit what specific friends can see
• Public can only see what owner of
account allows
What the Public Can See
No Information
Publicly Shared
Photos
What the Public Can See
Looks Like Curtis
Doesn’t Post Much
What Friends Can See
Details Curtis
has shared
Posts by
Others on
Curtis’ Wall
Friends
What Friends Can See
Check Ins to
locations
Interests
Posts
and
Answers
Control Settings for Each Post
Finding Someone on Facebook
• No Connection?
• Common name?
•Very Difficult
Get ID Link if You Can
• People can choose to be
searchable in Google, most don’t
Facebook
• Individual settings matter
• Can be set per post
• Tagging a person allows his friends to see the post
Researching a Person Who Contacted
Your Client on Facebook
• Someone posted something rude on a
Facebook Page
• Wanted to know who he was and why so
offended
Finding the Person
• Easy to find, because had posted on the
Page
• This gives link to account
• Able to access his account and determine:
• A Public Defender
• In Maryland
• Connected to Page through another
attorney who had “Liked” the page.
• Can send message to this person
Search Facebook Posts
A Word on Facebook Search
• Post must either be
• Public
• By a friend
• By a friend of a friend who tagged your mutual friend
• Otherwise you will not be able to see the post
Getting Data From Facebook
• Civil case?
• Basic subscriber information (not content)
• Indispensable to the case
• Not within a party’s possession
• Personal service of a valid federal, California or
California domesticated subpoena and after notice to
people affected
• Specifically identify accounts by email address and
Facebook user ID
Entire Account?
• Subpoena owner of account requiring download of
entire Facebook account
• Will not included deleted data
Snapchat
How Snapchat Works
• Pictures / Videos Disappear
• Countdown from 1-10 seconds
• Can sometimes replay
• Can save in phone’s gallery or send without saving
• Stories – Sharing Location
• Privacy settings control
• Seen by friends only or all Snapchatters for up to 24 hours
• Chat
• Send messages to friends
• Both sides view message
• Both “swipe away” = message deleted
• Unless someone chose to save it
Snapchat Deletes Images?
Just Take a
Screen Shot
Ask
• Did you save photos on your phone?
• See if you can get the phone
• To whom did you send photos?
• Might have sent to a witness or even opposing party
• Very common in family law and criminal cases
• With whom did you have chats?
• When did you send the photos?
Getting Data From Snapchat
• Must comply with ECPA
• 18 U.S.C. § 2703(c)(2) or 18 U.S.C. § 2703(d)
• Question whether will cooperate with civil
subpoena
• Maintains
• Snapchat username
• Email address
• Phone number
• Account creation date
• Timestamp and IP address of account logins and logouts
Snapchat Logs
• Retains logs in the form of meta-data about
messages
• Not content
• Only will cooperate with court order or a federal/state
warrant pursuant to 18 U.S.C. § 2703(d)
Sample Language
• Sample Language for Basic Subscriber Information:
“Records concerning the identity of the user with
the username ______ consisting of the email
address, phone number, account creation date, and
timestamps and IP address for account
logins/logouts.”
Twitter
Twitter Search
Twitter Requires Operators
More Twitter Operators
Privacy on Twitter
• Either very open or very closed
• Can require people to seek permission to follow you
• Will receive a message informing you the person
requires permission
• Person can approve or reject
Getting Data
• Subpoena requiring owner to download entire
account
• Subpoena requiring owner to request Twitter
provide non-public account information
• Owner must complete the privacy form
• Twitter will respond
YouTube & Other
Google Services
YouTube
YouTube: Filter
Don’t Forget Comments
• Many people who never post videos post
comments
• Remember to ask in interrogatories about comments on
YouTube
Google+
• Must be in your circles or
• Publicly shared
• Works like regular Google search
• Google+ results integrated into regular
Google results
• Bookmark search for repetition
Can Download Many Services
Civil Subpoena
• Gmail
• Subscriber registration information (e.g., name, account creation
information, associated email addresses, phone number)
• Sign-in IP addresses and associated time stamps
• YouTube
• Subscriber registration information
• Sign-in IP addresses and associated time stamps
• Google Voice
• Subscriber registration information
• Sign-up IP address and associated time stamp
• Telephone connection records
• Billing information
• Blogger
• Blog registration page
• Blog owner subscriber information
Google Authentication
• Google provides a certificate of authentication with
any data provided
• It does not provide experts to testify in court
LinkedIn
Posts Disappear Quickly
• Privacy settings impact what you can see
• Connection – can see all posts
• Not a connection – may be able to see who the person is
connected to. May not.
Getting Data
• Must be
• Indispensable to the case
• Not in party’s possession
• Valid subpoena and notice
• Should seek to have Member download account instead
• Provide basic subscriber information
• Email address
• Member ID
• Date and time of account creation
• IP addresses
• Profile page
• Date accounts accessed
LinkedIn Search
LinkedIn Search
4. Verify
• Does the account belong to the person you are
seeking?
• Compare with what you know about the person
• Pictures
• Email address(es)
• Other details
• Use other accounts or online presence to verify
• Was the account created by a third party to hurt the
person?
In Court - Authentication
• If owner of account refuses to acknowledge
ownership of account or post
• Compare to texts (no social media opinions)
• Circumstantial evidence of ownership of account
• Must also show created actual post
• Jury then decides whether person authored
• Must still satisfy all other aspects of admission of
evidence
• Relevance
• Best evidence
• Etc.
Preserve the Data
Preservation
•Have a third party do the evidence
preservation
•Don’t be a witness in your own case
•Use video and images to show
preservation
How I Preserve & Authenticate
• Video and audio recording of my actions on the
computer
• Camtasia
• Screen captures
• Snag-It
• Explaining what I am doing
• Mention account identifying information (email, ID
number/name)
• Date and time
• Name of person doing the preservation
Case Law & Ethics Issues
Discovery of Data
• Can you find contradictory information?
• Is that information relevant?
• Discovery likely granted
• See Judge Wettick’s Opinion in Trail v. Lesko (2012).
• Cannot go on a fishing expedition
Relevance of Data
• Newell v. Campbell Transportation Co., Inc., No.
2:12-cv-1344 (W.D. Pa. Jan. 14, 2015)
• Plaintiff wanted to prevent introduction of
Facebook posts
• Irrelevant
• Unfairly prejudicial
• Claimed physically injured
• Posts showed Plaintiff engaged in “physically taxing
activities”
• Admitted
Authentication
• No cases specifically on social media … yet
• Texting – Commonwealth v. Koch, 29 A.3d 996 (Pa.
Super. 2011), aff’d 106 A.3d 705 (Pa. 2014)
• Must connect ownership of phone
• Must connect actual text
• Circumstantial evidence acceptable
• Most states follow this rule
• Not Maryland – requires direct evidence
Lawyers in Trouble
Adverse Inference
• Gatto v. United Airlines (D.N.J. 2013)
• Plaintiff claimed disabled account
• Account was deleted
• Court ordered adverse inference for failure to preserve
Major Trouble
Friending Opposing Side
Pretending to be Someone Else
Searching Social Media
Pennsylvania Bar Institute
July, 2015
Jennifer Ellis
Lowenthal & Abrams, PC
&
Jennifer Ellis, JD, LLC
Jennifer@JLEllis.net
@JLE_JD

More Related Content

Viewers also liked

Web services, the ws stack, and research prospects a survey
Web services, the ws stack, and research prospects   a surveyWeb services, the ws stack, and research prospects   a survey
Web services, the ws stack, and research prospects a surveybdemchak
 
Annual Report 2003
Annual Report 2003Annual Report 2003
Annual Report 2003Tele2
 
Education Its Your Civil Right Sample Syllabus
Education Its Your Civil Right Sample SyllabusEducation Its Your Civil Right Sample Syllabus
Education Its Your Civil Right Sample SyllabusMatthew Nelson
 
Músculos del miembro pelviano (reconocimiento)
Músculos del miembro pelviano (reconocimiento)Músculos del miembro pelviano (reconocimiento)
Músculos del miembro pelviano (reconocimiento)David Poleo
 
Eragiteko Zuzeneko MKT
Eragiteko Zuzeneko MKTEragiteko Zuzeneko MKT
Eragiteko Zuzeneko MKTmaitomato
 
Carta de servicios Biblioteca Juan Leiva. Versión 2015 16
Carta de servicios Biblioteca Juan Leiva. Versión 2015 16Carta de servicios Biblioteca Juan Leiva. Versión 2015 16
Carta de servicios Biblioteca Juan Leiva. Versión 2015 16Biblioteca Escolar Juan Leiva
 
Textos no literarios.Inventores y viajeros
Textos no literarios.Inventores y viajeros Textos no literarios.Inventores y viajeros
Textos no literarios.Inventores y viajeros kroldan
 
Los andes 2[1]
Los andes 2[1]Los andes 2[1]
Los andes 2[1]leticiajx
 
Jax2009 inovex-tjoch-lift-20090423
Jax2009 inovex-tjoch-lift-20090423Jax2009 inovex-tjoch-lift-20090423
Jax2009 inovex-tjoch-lift-20090423inovex GmbH
 
BNG 2015 Annual Report
BNG 2015 Annual ReportBNG 2015 Annual Report
BNG 2015 Annual ReportLisa Howie
 
Presentacion (Presentation)2012
Presentacion (Presentation)2012Presentacion (Presentation)2012
Presentacion (Presentation)2012VBarquitectos
 
Unitary Patent System
Unitary Patent SystemUnitary Patent System
Unitary Patent SystemSaravanan A
 
INTRODUCCIÓN AL LIDERAZGO INNOVADOR 4h (parte 2de2)
INTRODUCCIÓN AL LIDERAZGO INNOVADOR 4h (parte 2de2)INTRODUCCIÓN AL LIDERAZGO INNOVADOR 4h (parte 2de2)
INTRODUCCIÓN AL LIDERAZGO INNOVADOR 4h (parte 2de2)Carlos Goga
 
04 clean techalps
04 clean techalps04 clean techalps
04 clean techalpsTechnoArk
 
La rana saltarina de Thales
La rana saltarina de ThalesLa rana saltarina de Thales
La rana saltarina de ThalesRafa Aranda
 

Viewers also liked (20)

Web services, the ws stack, and research prospects a survey
Web services, the ws stack, and research prospects   a surveyWeb services, the ws stack, and research prospects   a survey
Web services, the ws stack, and research prospects a survey
 
Annual Report 2003
Annual Report 2003Annual Report 2003
Annual Report 2003
 
Education Its Your Civil Right Sample Syllabus
Education Its Your Civil Right Sample SyllabusEducation Its Your Civil Right Sample Syllabus
Education Its Your Civil Right Sample Syllabus
 
Músculos del miembro pelviano (reconocimiento)
Músculos del miembro pelviano (reconocimiento)Músculos del miembro pelviano (reconocimiento)
Músculos del miembro pelviano (reconocimiento)
 
Eragiteko Zuzeneko MKT
Eragiteko Zuzeneko MKTEragiteko Zuzeneko MKT
Eragiteko Zuzeneko MKT
 
Carta de servicios Biblioteca Juan Leiva. Versión 2015 16
Carta de servicios Biblioteca Juan Leiva. Versión 2015 16Carta de servicios Biblioteca Juan Leiva. Versión 2015 16
Carta de servicios Biblioteca Juan Leiva. Versión 2015 16
 
Textos no literarios.Inventores y viajeros
Textos no literarios.Inventores y viajeros Textos no literarios.Inventores y viajeros
Textos no literarios.Inventores y viajeros
 
Los andes 2[1]
Los andes 2[1]Los andes 2[1]
Los andes 2[1]
 
Jam spanish bk1_0.96
Jam spanish bk1_0.96Jam spanish bk1_0.96
Jam spanish bk1_0.96
 
Biciplan Monterrey - Gestión social y comunicación
Biciplan Monterrey - Gestión social y comunicaciónBiciplan Monterrey - Gestión social y comunicación
Biciplan Monterrey - Gestión social y comunicación
 
Jax2009 inovex-tjoch-lift-20090423
Jax2009 inovex-tjoch-lift-20090423Jax2009 inovex-tjoch-lift-20090423
Jax2009 inovex-tjoch-lift-20090423
 
BNG 2015 Annual Report
BNG 2015 Annual ReportBNG 2015 Annual Report
BNG 2015 Annual Report
 
Diseño grafico tapicarpas
Diseño grafico tapicarpasDiseño grafico tapicarpas
Diseño grafico tapicarpas
 
Presentacion (Presentation)2012
Presentacion (Presentation)2012Presentacion (Presentation)2012
Presentacion (Presentation)2012
 
Digestión
Digestión Digestión
Digestión
 
Unitary Patent System
Unitary Patent SystemUnitary Patent System
Unitary Patent System
 
INTRODUCCIÓN AL LIDERAZGO INNOVADOR 4h (parte 2de2)
INTRODUCCIÓN AL LIDERAZGO INNOVADOR 4h (parte 2de2)INTRODUCCIÓN AL LIDERAZGO INNOVADOR 4h (parte 2de2)
INTRODUCCIÓN AL LIDERAZGO INNOVADOR 4h (parte 2de2)
 
04 clean techalps
04 clean techalps04 clean techalps
04 clean techalps
 
Eva gomez orea_unidad_2
Eva gomez orea_unidad_2Eva gomez orea_unidad_2
Eva gomez orea_unidad_2
 
La rana saltarina de Thales
La rana saltarina de ThalesLa rana saltarina de Thales
La rana saltarina de Thales
 

Similar to Researching Social Media

Social Media, Journalism and Branding
Social Media, Journalism and BrandingSocial Media, Journalism and Branding
Social Media, Journalism and BrandingMandy Jenkins
 
Don't get fooled again: Best Practices for Online Verification gatehouse
Don't get fooled again: Best Practices for Online Verification gatehouseDon't get fooled again: Best Practices for Online Verification gatehouse
Don't get fooled again: Best Practices for Online Verification gatehouseGateHouseMedia
 
Facebook Presentation Privacy and tagging
Facebook Presentation Privacy and taggingFacebook Presentation Privacy and tagging
Facebook Presentation Privacy and taggingVictor Castelo
 
fissea-conference-2012_srinivasan.pdf
fissea-conference-2012_srinivasan.pdffissea-conference-2012_srinivasan.pdf
fissea-conference-2012_srinivasan.pdfRobin540999
 
B.S. Detection for Digital Content
B.S. Detection for Digital ContentB.S. Detection for Digital Content
B.S. Detection for Digital ContentCraig Silverman
 
The Reality Behind Your Webpresence
The Reality Behind Your WebpresenceThe Reality Behind Your Webpresence
The Reality Behind Your Webpresencecdoval
 
Employment and Labour Seminar 2013: The Perils and Promises of Social Media
Employment and Labour Seminar 2013: The Perils and Promises of Social MediaEmployment and Labour Seminar 2013: The Perils and Promises of Social Media
Employment and Labour Seminar 2013: The Perils and Promises of Social MediaThis account is closed
 
Social Networking: Use & Impact
Social Networking: Use & ImpactSocial Networking: Use & Impact
Social Networking: Use & ImpactGaurav Wadhwa
 
Group 4 discussion leading
Group 4 discussion leadingGroup 4 discussion leading
Group 4 discussion leadingHsuan-Ting Chen
 
Caivano Asst4 Facebook Powerpoint Presentation
Caivano Asst4 Facebook Powerpoint PresentationCaivano Asst4 Facebook Powerpoint Presentation
Caivano Asst4 Facebook Powerpoint Presentationroxanacaivano
 
Public by Default: Life Online in 2012
Public by Default:  Life Online in 2012Public by Default:  Life Online in 2012
Public by Default: Life Online in 2012Pat Sine
 
Attorney Marketing (Ads, Social Media) / The Cloud - Concerns for Lawyers
Attorney Marketing (Ads, Social Media) / The Cloud - Concerns for LawyersAttorney Marketing (Ads, Social Media) / The Cloud - Concerns for Lawyers
Attorney Marketing (Ads, Social Media) / The Cloud - Concerns for LawyersJennifer Ellis, JD, LLC
 
Facebook and Linkedin Jobseekers
Facebook and Linkedin JobseekersFacebook and Linkedin Jobseekers
Facebook and Linkedin JobseekersPhil Gerbyshak
 
2018-05-14 Digital Misconduct and Digital Altruism in the United States
2018-05-14 Digital Misconduct and Digital Altruism in the United States2018-05-14 Digital Misconduct and Digital Altruism in the United States
2018-05-14 Digital Misconduct and Digital Altruism in the United StatesFrederick Lane
 

Similar to Researching Social Media (20)

Social Media - Not Just for Marketing
Social Media - Not Just for MarketingSocial Media - Not Just for Marketing
Social Media - Not Just for Marketing
 
Social Media, Journalism and Branding
Social Media, Journalism and BrandingSocial Media, Journalism and Branding
Social Media, Journalism and Branding
 
Don't get fooled again: Best Practices for Online Verification gatehouse
Don't get fooled again: Best Practices for Online Verification gatehouseDon't get fooled again: Best Practices for Online Verification gatehouse
Don't get fooled again: Best Practices for Online Verification gatehouse
 
Facebook Presentation Privacy and tagging
Facebook Presentation Privacy and taggingFacebook Presentation Privacy and tagging
Facebook Presentation Privacy and tagging
 
fissea-conference-2012_srinivasan.pdf
fissea-conference-2012_srinivasan.pdffissea-conference-2012_srinivasan.pdf
fissea-conference-2012_srinivasan.pdf
 
Doxing
 Doxing Doxing
Doxing
 
B.S. Detection for Digital Content
B.S. Detection for Digital ContentB.S. Detection for Digital Content
B.S. Detection for Digital Content
 
The Reality Behind Your Webpresence
The Reality Behind Your WebpresenceThe Reality Behind Your Webpresence
The Reality Behind Your Webpresence
 
Social networking 101
Social networking 101Social networking 101
Social networking 101
 
Employment and Labour Seminar 2013: The Perils and Promises of Social Media
Employment and Labour Seminar 2013: The Perils and Promises of Social MediaEmployment and Labour Seminar 2013: The Perils and Promises of Social Media
Employment and Labour Seminar 2013: The Perils and Promises of Social Media
 
Social Networking: Use & Impact
Social Networking: Use & ImpactSocial Networking: Use & Impact
Social Networking: Use & Impact
 
Group 4 discussion leading
Group 4 discussion leadingGroup 4 discussion leading
Group 4 discussion leading
 
Caivano Asst4 Facebook Powerpoint Presentation
Caivano Asst4 Facebook Powerpoint PresentationCaivano Asst4 Facebook Powerpoint Presentation
Caivano Asst4 Facebook Powerpoint Presentation
 
Public by Default: Life Online in 2012
Public by Default:  Life Online in 2012Public by Default:  Life Online in 2012
Public by Default: Life Online in 2012
 
Attorney Marketing (Ads, Social Media) / The Cloud - Concerns for Lawyers
Attorney Marketing (Ads, Social Media) / The Cloud - Concerns for LawyersAttorney Marketing (Ads, Social Media) / The Cloud - Concerns for Lawyers
Attorney Marketing (Ads, Social Media) / The Cloud - Concerns for Lawyers
 
Facebooklinkedinjobseekers 100330221132 Phpapp01
Facebooklinkedinjobseekers 100330221132 Phpapp01Facebooklinkedinjobseekers 100330221132 Phpapp01
Facebooklinkedinjobseekers 100330221132 Phpapp01
 
Facebook and Linkedin Jobseekers
Facebook and Linkedin JobseekersFacebook and Linkedin Jobseekers
Facebook and Linkedin Jobseekers
 
Overdrive Social Media
Overdrive Social MediaOverdrive Social Media
Overdrive Social Media
 
2018-05-14 Digital Misconduct and Digital Altruism in the United States
2018-05-14 Digital Misconduct and Digital Altruism in the United States2018-05-14 Digital Misconduct and Digital Altruism in the United States
2018-05-14 Digital Misconduct and Digital Altruism in the United States
 
Socialmedia.pptx
Socialmedia.pptxSocialmedia.pptx
Socialmedia.pptx
 

More from Jennifer Ellis, JD, LLC

GLBT Representation in Pennsylvania - A Broad Overview
GLBT Representation in Pennsylvania - A Broad OverviewGLBT Representation in Pennsylvania - A Broad Overview
GLBT Representation in Pennsylvania - A Broad OverviewJennifer Ellis, JD, LLC
 
Law Practice Management - Organization, Cloud, Social Media and Ethics
Law Practice Management - Organization, Cloud, Social Media and EthicsLaw Practice Management - Organization, Cloud, Social Media and Ethics
Law Practice Management - Organization, Cloud, Social Media and EthicsJennifer Ellis, JD, LLC
 

More from Jennifer Ellis, JD, LLC (7)

Staying Secure Electronically
Staying Secure ElectronicallyStaying Secure Electronically
Staying Secure Electronically
 
Social Media and Litigation
Social Media and Litigation Social Media and Litigation
Social Media and Litigation
 
Basics - Setting up a WordPress Site
Basics - Setting up a WordPress SiteBasics - Setting up a WordPress Site
Basics - Setting up a WordPress Site
 
SEO: Now What Does Google Want?!
SEO: Now What Does Google Want?!SEO: Now What Does Google Want?!
SEO: Now What Does Google Want?!
 
SEO: Now What Does Google Want?
SEO: Now What Does Google Want?SEO: Now What Does Google Want?
SEO: Now What Does Google Want?
 
GLBT Representation in Pennsylvania - A Broad Overview
GLBT Representation in Pennsylvania - A Broad OverviewGLBT Representation in Pennsylvania - A Broad Overview
GLBT Representation in Pennsylvania - A Broad Overview
 
Law Practice Management - Organization, Cloud, Social Media and Ethics
Law Practice Management - Organization, Cloud, Social Media and EthicsLaw Practice Management - Organization, Cloud, Social Media and Ethics
Law Practice Management - Organization, Cloud, Social Media and Ethics
 

Recently uploaded

Good Governance Practices for protection of Human Rights (Discuss Transparen...
Good Governance Practices for protection  of Human Rights (Discuss Transparen...Good Governance Practices for protection  of Human Rights (Discuss Transparen...
Good Governance Practices for protection of Human Rights (Discuss Transparen...shubhuc963
 
Vanderburgh County Sheriff says he will Not Raid Delta 8 Shops
Vanderburgh County Sheriff says he will Not Raid Delta 8 ShopsVanderburgh County Sheriff says he will Not Raid Delta 8 Shops
Vanderburgh County Sheriff says he will Not Raid Delta 8 ShopsAbdul-Hakim Shabazz
 
Alexis O'Connell Lexileeyogi 512-840-8791
Alexis O'Connell Lexileeyogi 512-840-8791Alexis O'Connell Lexileeyogi 512-840-8791
Alexis O'Connell Lexileeyogi 512-840-8791BlayneRush1
 
The Patents Act 1970 Notes For College .pptx
The Patents Act 1970 Notes For College .pptxThe Patents Act 1970 Notes For College .pptx
The Patents Act 1970 Notes For College .pptxAdityasinhRana4
 
Alexis O'Connell Arrest Records Houston Texas lexileeyogi
Alexis O'Connell Arrest Records Houston Texas lexileeyogiAlexis O'Connell Arrest Records Houston Texas lexileeyogi
Alexis O'Connell Arrest Records Houston Texas lexileeyogiBlayneRush1
 
Grey Area of the Information Technology Act, 2000.pptx
Grey Area of the Information Technology Act, 2000.pptxGrey Area of the Information Technology Act, 2000.pptx
Grey Area of the Information Technology Act, 2000.pptxBharatMunjal4
 
John Hustaix - The Legal Profession: A History
John Hustaix - The Legal Profession:  A HistoryJohn Hustaix - The Legal Profession:  A History
John Hustaix - The Legal Profession: A HistoryJohn Hustaix
 
Guide for Drug Education and Vice Control.docx
Guide for Drug Education and Vice Control.docxGuide for Drug Education and Vice Control.docx
Guide for Drug Education and Vice Control.docxjennysansano2
 
THE INDIAN CONTRACT ACT 1872 NOTES FOR STUDENTS
THE INDIAN CONTRACT ACT 1872 NOTES FOR STUDENTSTHE INDIAN CONTRACT ACT 1872 NOTES FOR STUDENTS
THE INDIAN CONTRACT ACT 1872 NOTES FOR STUDENTSRoshniSingh312153
 
Hungarian legislation made by Robert Miklos
Hungarian legislation made by Robert MiklosHungarian legislation made by Robert Miklos
Hungarian legislation made by Robert Miklosbeduinpower135
 
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书1k98h0e1
 
Understanding Cyber Crime Litigation: Key Concepts and Legal Frameworks
Understanding Cyber Crime Litigation: Key Concepts and Legal FrameworksUnderstanding Cyber Crime Litigation: Key Concepts and Legal Frameworks
Understanding Cyber Crime Litigation: Key Concepts and Legal FrameworksFinlaw Associates
 
citizenship in the Philippines as to the laws applicable
citizenship in the Philippines as to the laws applicablecitizenship in the Philippines as to the laws applicable
citizenship in the Philippines as to the laws applicableSaraSantiago44
 
PPT Template - Federal Law Enforcement Training Center
PPT Template - Federal Law Enforcement Training CenterPPT Template - Federal Law Enforcement Training Center
PPT Template - Federal Law Enforcement Training Centerejlfernandez22
 
Analysis on Law of Domicile under Private International laws.
Analysis on Law of Domicile under Private International laws.Analysis on Law of Domicile under Private International laws.
Analysis on Law of Domicile under Private International laws.2020000445musaib
 
Are There Any Alternatives To Jail Time For Sex Crime Convictions in Los Angeles
Are There Any Alternatives To Jail Time For Sex Crime Convictions in Los AngelesAre There Any Alternatives To Jail Time For Sex Crime Convictions in Los Angeles
Are There Any Alternatives To Jail Time For Sex Crime Convictions in Los AngelesChesley Lawyer
 
Sarvesh Raj IPS - A Journey of Dedication and Leadership.pptx
Sarvesh Raj IPS - A Journey of Dedication and Leadership.pptxSarvesh Raj IPS - A Journey of Dedication and Leadership.pptx
Sarvesh Raj IPS - A Journey of Dedication and Leadership.pptxAnto Jebin
 
SecuritiesContracts(Regulation)Act,1956.pdf
SecuritiesContracts(Regulation)Act,1956.pdfSecuritiesContracts(Regulation)Act,1956.pdf
SecuritiesContracts(Regulation)Act,1956.pdfDrNiteshSaraswat
 
Comparison of GenAI benchmarking models for legal use cases
Comparison of GenAI benchmarking models for legal use casesComparison of GenAI benchmarking models for legal use cases
Comparison of GenAI benchmarking models for legal use casesritwikv20
 
Law360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
Law360 - How Duty Of Candor Figures In USPTO AI Ethics GuidanceLaw360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
Law360 - How Duty Of Candor Figures In USPTO AI Ethics GuidanceMichael Cicero
 

Recently uploaded (20)

Good Governance Practices for protection of Human Rights (Discuss Transparen...
Good Governance Practices for protection  of Human Rights (Discuss Transparen...Good Governance Practices for protection  of Human Rights (Discuss Transparen...
Good Governance Practices for protection of Human Rights (Discuss Transparen...
 
Vanderburgh County Sheriff says he will Not Raid Delta 8 Shops
Vanderburgh County Sheriff says he will Not Raid Delta 8 ShopsVanderburgh County Sheriff says he will Not Raid Delta 8 Shops
Vanderburgh County Sheriff says he will Not Raid Delta 8 Shops
 
Alexis O'Connell Lexileeyogi 512-840-8791
Alexis O'Connell Lexileeyogi 512-840-8791Alexis O'Connell Lexileeyogi 512-840-8791
Alexis O'Connell Lexileeyogi 512-840-8791
 
The Patents Act 1970 Notes For College .pptx
The Patents Act 1970 Notes For College .pptxThe Patents Act 1970 Notes For College .pptx
The Patents Act 1970 Notes For College .pptx
 
Alexis O'Connell Arrest Records Houston Texas lexileeyogi
Alexis O'Connell Arrest Records Houston Texas lexileeyogiAlexis O'Connell Arrest Records Houston Texas lexileeyogi
Alexis O'Connell Arrest Records Houston Texas lexileeyogi
 
Grey Area of the Information Technology Act, 2000.pptx
Grey Area of the Information Technology Act, 2000.pptxGrey Area of the Information Technology Act, 2000.pptx
Grey Area of the Information Technology Act, 2000.pptx
 
John Hustaix - The Legal Profession: A History
John Hustaix - The Legal Profession:  A HistoryJohn Hustaix - The Legal Profession:  A History
John Hustaix - The Legal Profession: A History
 
Guide for Drug Education and Vice Control.docx
Guide for Drug Education and Vice Control.docxGuide for Drug Education and Vice Control.docx
Guide for Drug Education and Vice Control.docx
 
THE INDIAN CONTRACT ACT 1872 NOTES FOR STUDENTS
THE INDIAN CONTRACT ACT 1872 NOTES FOR STUDENTSTHE INDIAN CONTRACT ACT 1872 NOTES FOR STUDENTS
THE INDIAN CONTRACT ACT 1872 NOTES FOR STUDENTS
 
Hungarian legislation made by Robert Miklos
Hungarian legislation made by Robert MiklosHungarian legislation made by Robert Miklos
Hungarian legislation made by Robert Miklos
 
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
 
Understanding Cyber Crime Litigation: Key Concepts and Legal Frameworks
Understanding Cyber Crime Litigation: Key Concepts and Legal FrameworksUnderstanding Cyber Crime Litigation: Key Concepts and Legal Frameworks
Understanding Cyber Crime Litigation: Key Concepts and Legal Frameworks
 
citizenship in the Philippines as to the laws applicable
citizenship in the Philippines as to the laws applicablecitizenship in the Philippines as to the laws applicable
citizenship in the Philippines as to the laws applicable
 
PPT Template - Federal Law Enforcement Training Center
PPT Template - Federal Law Enforcement Training CenterPPT Template - Federal Law Enforcement Training Center
PPT Template - Federal Law Enforcement Training Center
 
Analysis on Law of Domicile under Private International laws.
Analysis on Law of Domicile under Private International laws.Analysis on Law of Domicile under Private International laws.
Analysis on Law of Domicile under Private International laws.
 
Are There Any Alternatives To Jail Time For Sex Crime Convictions in Los Angeles
Are There Any Alternatives To Jail Time For Sex Crime Convictions in Los AngelesAre There Any Alternatives To Jail Time For Sex Crime Convictions in Los Angeles
Are There Any Alternatives To Jail Time For Sex Crime Convictions in Los Angeles
 
Sarvesh Raj IPS - A Journey of Dedication and Leadership.pptx
Sarvesh Raj IPS - A Journey of Dedication and Leadership.pptxSarvesh Raj IPS - A Journey of Dedication and Leadership.pptx
Sarvesh Raj IPS - A Journey of Dedication and Leadership.pptx
 
SecuritiesContracts(Regulation)Act,1956.pdf
SecuritiesContracts(Regulation)Act,1956.pdfSecuritiesContracts(Regulation)Act,1956.pdf
SecuritiesContracts(Regulation)Act,1956.pdf
 
Comparison of GenAI benchmarking models for legal use cases
Comparison of GenAI benchmarking models for legal use casesComparison of GenAI benchmarking models for legal use cases
Comparison of GenAI benchmarking models for legal use cases
 
Law360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
Law360 - How Duty Of Candor Figures In USPTO AI Ethics GuidanceLaw360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
Law360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
 

Researching Social Media

  • 1. Searching Social Media Pennsylvania Bar Institute July, 2015 Jennifer Ellis Lowenthal & Abrams, PC & Jennifer Ellis, JD, LLC Jennifer@JLEllis.net @JLE_JD
  • 2. About Jennifer Ellis • Lowenthal & Abrams, LLC • Legal Ethics Attorney • Manage Online Presence • Jennifer Ellis, JD, LLC • Online Marketing Consultant • Expert Witness • Author • Wordpress in One Hour for Lawyers
  • 3. Today’s Discussion • What is Social Media? • Unique considerations • Legal • Privacy • Ethical • How to Perform Research of Social Media • Social Media Cases & Ethics Issues
  • 4. What is Social Media? • Websites and Applications • Desktop, Laptop, Phone, Tablet (etc.) • Users create and share content • Engage in communication with each other and the public at large • May know who is seeing content • May not know • Content is easily shared •Social media is meant to be shared •It is NOT meant to be private
  • 5. 1.44 billion 157 million daily in US & Canada 21 min per day 1 billion users 4 billion views per day 6 billion hours per month 600 million 22% online adults at least once per month 300 million 53% of 18-29 60.3 million US 70 million 80% women 42% of online adult US Women550 million 50% of People Read Blogs 332 million 40% check daily 107 Million US 17 minutes monthly 97% lawyers listed 200,000 active lawyers Over 6 million questions 100 million daily active users 30% U.S. millennial internet users – every day
  • 7. Legal Issues – Improper Access Felony and/or Misdemeanor Charges • Charges for Improper access to • E-Mail • Social Media • All Accounts
  • 8. Federal • Electronic Communications Privacy Act 18 USC § 2510-2522 • Includes computer based communications • Includes stored communications
  • 9. Federal • 18 USC § 2511 • Interception and disclosure of wire, oral, or electronic communications prohibited • intentionally discloses, or endeavors to disclose, to any other person the contents of any…communication…
  • 10. Pennsylvania • 18 § 7611. Unlawful use of computer and other computer crimes. (3rd Degree Felony) • Accesses or exceeds authorization to access • Provides password or other information allowing access to a third party
  • 11. Applies to: • Everyone • Spouses • Children • Paralegals • Private Investigators • Attorneys
  • 12. Subpoenas for Data? •Most sites state they will not respond to a civil subpoena •Claim violates Stored Communications Act •Some sites will surprise you so ask
  • 13. Subpoenas for Ownership • Some sites will cooperate • Provide email address • Provide username or ID number
  • 14. Privacy Issues – Access Blocked • Unlike traditional research • Privacy settings can block access to undesired viewers • Privacy settings often complex and confusing • Famous last words “I didn’t think anyone could see it.”
  • 15. Ethical Issues •Can’t do it off line, can’t do it online •No connecting with represented party •May connect to witnesses •Must reveal who you are •May research jurors •No connecting
  • 16. Ethical Issues • Fine to review • What is publically available • What legitimately connected people can see • Make sure employees and independent contractors understand rules • Do not ask a third party to do what you cannot do
  • 18. Don’t Forget the Litigation Hold! Send a Notice to Preserve Immediately
  • 19. Three or Four Pronged Approach 1. Gather Data about Person • Interrogatories critical • Ask the right questions • Search Google • Ask your client • Ask people who know the subject 2. Locate Account(s) 3. Review Accounts • Preserve data 4. Verify Information
  • 20. Gather Data • Name(s) • Email Address(es) • Site(s) using • Links to accounts • Is your client connected to the person?
  • 21. Ask the Right Questions • Do you use social media? • Give examples, but make clear it is not limited • Facebook, Snapchat, Twitter, Quora, Foursquare, MySpace • Ask doctors and lawyers if they answer questions on sites such as Avvo • Find out the profession and hobbies. Ask if there are any sites where the person answers questions. • Do you comment on any blogs or websites? • Give examples, but make clear it is not limited • Do you post on any news groups? • Don’t forget older online communication methods
  • 22. Ask the Right Questions (Part 2) • Identify each site • Provide link to each site • Provide user IDs • You may need to provide instructions on how to obtain user IDs for various sites • Do you have a blog? • Get the link • Provide all email addresses used within X time period
  • 23. Ask the Right Questions (3) • Have you altered your privacy settings? • What changes have you made? • Have you deleted any content within X period of time? • What have you deleted? • When? • Have you disabled any accounts? • What have you disabled? • When?
  • 24. Ask the Right Questions (4) • Do you have any social media pages (versus accounts) • Do you use X, Y, Z to access your social media accounts? • Phone, desktop computer, laptop computer, tablet, etc. • Does anyone else have access to any of these devices? • Who? • When? • Does anyone else access any of your social media accounts? • Which ones? • Who? • How? • When?
  • 25. Ask the Right Questions (5) • Does anyone else have a password to any of your social media accounts • Which ones • Who • When? • Have you posted anything related to this case online or via any applications? • What • Where • Provide copy • Ask about specific issues you want to know about • I.e., have they posted a picture of themselves holding alcohol during X time period • You may ask for username or password. A wise attorney will refuse.
  • 26. 2. Find the Account • Use search techniques to find the account • Might require offline techniques • Spouse, friends, etc. • Cooperation of account owner • Discovery
  • 27. Searching • Look for the person’s name on specific sites • Try Googling the person’s name • Add the person’s name to identifying information • Age • Nickname • Geographic location
  • 29. Found • Website for Jennifer Ellis, JD • Website for Lowenthal & Abrams
  • 31. Found • Website for Lowenthal & Abrams • Website for Jennifer Ellis, JD • Account on Avvo • Account on LinkedIn • Business Page on Facebook • Class taught on LegalSpan • Slideshare Account
  • 32. Conclusion? •Narrow the search • Add additional terms • Obtain more detailed and useful results •Don’t narrow the search too much • Try different terms for different results
  • 33. 3. Review the Account • Access what you can •Privacy settings will be an issue in many cases
  • 35. Privacy Settings • Privacy control what you can see • Friends can see a lot • Can limit what specific friends can see • Public can only see what owner of account allows
  • 36. What the Public Can See No Information Publicly Shared Photos
  • 37. What the Public Can See Looks Like Curtis Doesn’t Post Much
  • 38. What Friends Can See Details Curtis has shared Posts by Others on Curtis’ Wall Friends
  • 39. What Friends Can See Check Ins to locations Interests Posts and Answers
  • 40. Control Settings for Each Post
  • 41. Finding Someone on Facebook • No Connection? • Common name? •Very Difficult
  • 42. Get ID Link if You Can • People can choose to be searchable in Google, most don’t
  • 43. Facebook • Individual settings matter • Can be set per post • Tagging a person allows his friends to see the post
  • 44. Researching a Person Who Contacted Your Client on Facebook • Someone posted something rude on a Facebook Page • Wanted to know who he was and why so offended
  • 45. Finding the Person • Easy to find, because had posted on the Page • This gives link to account • Able to access his account and determine: • A Public Defender • In Maryland • Connected to Page through another attorney who had “Liked” the page. • Can send message to this person
  • 47. A Word on Facebook Search • Post must either be • Public • By a friend • By a friend of a friend who tagged your mutual friend • Otherwise you will not be able to see the post
  • 48. Getting Data From Facebook • Civil case? • Basic subscriber information (not content) • Indispensable to the case • Not within a party’s possession • Personal service of a valid federal, California or California domesticated subpoena and after notice to people affected • Specifically identify accounts by email address and Facebook user ID
  • 49. Entire Account? • Subpoena owner of account requiring download of entire Facebook account • Will not included deleted data
  • 51. How Snapchat Works • Pictures / Videos Disappear • Countdown from 1-10 seconds • Can sometimes replay • Can save in phone’s gallery or send without saving • Stories – Sharing Location • Privacy settings control • Seen by friends only or all Snapchatters for up to 24 hours • Chat • Send messages to friends • Both sides view message • Both “swipe away” = message deleted • Unless someone chose to save it
  • 52. Snapchat Deletes Images? Just Take a Screen Shot
  • 53. Ask • Did you save photos on your phone? • See if you can get the phone • To whom did you send photos? • Might have sent to a witness or even opposing party • Very common in family law and criminal cases • With whom did you have chats? • When did you send the photos?
  • 54.
  • 55. Getting Data From Snapchat • Must comply with ECPA • 18 U.S.C. § 2703(c)(2) or 18 U.S.C. § 2703(d) • Question whether will cooperate with civil subpoena • Maintains • Snapchat username • Email address • Phone number • Account creation date • Timestamp and IP address of account logins and logouts
  • 56. Snapchat Logs • Retains logs in the form of meta-data about messages • Not content • Only will cooperate with court order or a federal/state warrant pursuant to 18 U.S.C. § 2703(d)
  • 57. Sample Language • Sample Language for Basic Subscriber Information: “Records concerning the identity of the user with the username ______ consisting of the email address, phone number, account creation date, and timestamps and IP address for account logins/logouts.”
  • 62.
  • 63.
  • 64. Privacy on Twitter • Either very open or very closed • Can require people to seek permission to follow you • Will receive a message informing you the person requires permission • Person can approve or reject
  • 65. Getting Data • Subpoena requiring owner to download entire account • Subpoena requiring owner to request Twitter provide non-public account information • Owner must complete the privacy form • Twitter will respond
  • 69. Don’t Forget Comments • Many people who never post videos post comments • Remember to ask in interrogatories about comments on YouTube
  • 70. Google+ • Must be in your circles or • Publicly shared • Works like regular Google search • Google+ results integrated into regular Google results • Bookmark search for repetition
  • 71. Can Download Many Services
  • 72. Civil Subpoena • Gmail • Subscriber registration information (e.g., name, account creation information, associated email addresses, phone number) • Sign-in IP addresses and associated time stamps • YouTube • Subscriber registration information • Sign-in IP addresses and associated time stamps • Google Voice • Subscriber registration information • Sign-up IP address and associated time stamp • Telephone connection records • Billing information • Blogger • Blog registration page • Blog owner subscriber information
  • 73. Google Authentication • Google provides a certificate of authentication with any data provided • It does not provide experts to testify in court
  • 75. Posts Disappear Quickly • Privacy settings impact what you can see • Connection – can see all posts • Not a connection – may be able to see who the person is connected to. May not.
  • 76. Getting Data • Must be • Indispensable to the case • Not in party’s possession • Valid subpoena and notice • Should seek to have Member download account instead • Provide basic subscriber information • Email address • Member ID • Date and time of account creation • IP addresses • Profile page • Date accounts accessed
  • 77.
  • 80. 4. Verify • Does the account belong to the person you are seeking? • Compare with what you know about the person • Pictures • Email address(es) • Other details • Use other accounts or online presence to verify • Was the account created by a third party to hurt the person?
  • 81. In Court - Authentication • If owner of account refuses to acknowledge ownership of account or post • Compare to texts (no social media opinions) • Circumstantial evidence of ownership of account • Must also show created actual post • Jury then decides whether person authored • Must still satisfy all other aspects of admission of evidence • Relevance • Best evidence • Etc.
  • 83. Preservation •Have a third party do the evidence preservation •Don’t be a witness in your own case •Use video and images to show preservation
  • 84. How I Preserve & Authenticate • Video and audio recording of my actions on the computer • Camtasia • Screen captures • Snag-It • Explaining what I am doing • Mention account identifying information (email, ID number/name) • Date and time • Name of person doing the preservation
  • 85. Case Law & Ethics Issues
  • 86. Discovery of Data • Can you find contradictory information? • Is that information relevant? • Discovery likely granted • See Judge Wettick’s Opinion in Trail v. Lesko (2012). • Cannot go on a fishing expedition
  • 87. Relevance of Data • Newell v. Campbell Transportation Co., Inc., No. 2:12-cv-1344 (W.D. Pa. Jan. 14, 2015) • Plaintiff wanted to prevent introduction of Facebook posts • Irrelevant • Unfairly prejudicial • Claimed physically injured • Posts showed Plaintiff engaged in “physically taxing activities” • Admitted
  • 88. Authentication • No cases specifically on social media … yet • Texting – Commonwealth v. Koch, 29 A.3d 996 (Pa. Super. 2011), aff’d 106 A.3d 705 (Pa. 2014) • Must connect ownership of phone • Must connect actual text • Circumstantial evidence acceptable • Most states follow this rule • Not Maryland – requires direct evidence
  • 90. Adverse Inference • Gatto v. United Airlines (D.N.J. 2013) • Plaintiff claimed disabled account • Account was deleted • Court ordered adverse inference for failure to preserve
  • 93. Pretending to be Someone Else
  • 94. Searching Social Media Pennsylvania Bar Institute July, 2015 Jennifer Ellis Lowenthal & Abrams, PC & Jennifer Ellis, JD, LLC Jennifer@JLEllis.net @JLE_JD

Editor's Notes

  1. http://expandedramblings.com/index.php/resource-how-many-people-use-the-top-social-media/Jeff Bullas, 22 Social Media Facts and Statistics You Should Know in 2014 (2014.) http://www.jeffbullas.com/2014/01/17/20-social-media-facts-and-statistics-you-should-know-in-2014/
  2. http://pahomepage.com/fulltext?nxd_id=164266 http://www.myfoxdetroit.com/dpp/news/let_it_rip/rochester-man-reads-wifes-e-mail-faces-felony-charges-for-computer-misuse http://www.uticaod.com/news/x602920770/Verona-woman-charged-with-felony-for-hacking-into-Facebook-account