Running Head: SOCIAL NETWORKING 1 AMERICAN MILITARY UNIVERSITY Charles Town, West Virginia SOCIAL NETWORKING: GATHERING EVIDENCE FROM FACEBOOK, MYSPACE & TWITTER A thesis submitted in partial fulfillment of the requirements for the degree of MASTER OF ARTS in LEGAL STUDIES by Zovinar Mherian Sayegh Department Approval Date: The author hereby grants American Military University the right to display these contents for educational purposes. The author assumes total responsibility for meeting the requirements set by United States Copyright Law for the inclusion of any materials that are not the author’s creation or in the public domain. SOCIAL NETWORKING 2 © Copyright 2011 by Zovinar Mherian Sayegh All rights reserved. SOCIAL NETWORKING 3 DEDICATION I dedicate this thesis to my children, Moses, Jordan, Markos, Jacob and my niece Stephanie Nicole Thompson. Without their motivation and support, the completion of this work would not have been possible. SOCIAL NETWORKING 4 ACKNOWLEDGEMENTS I wish to thank my sister Irena Kageorgis for introducing me to American Military University’s Master’s Program. I also wish to thank every instructor that I had with American Military University. My experience as a graduate student has been educational and enjoyable. SOCIAL NETWORKING 5 ABSTRACT OF THE THESIS SOCIAL NETWORKING: GATHERING EVIDENCE FROM FACEBOOK, MYSPACE & TWITTER by Zovinar Mherian Sayegh American Military University, October 23, 2011 Charles Town, West Virginia Professor Constance St. Germaine-Driscoll, Thesis Professor The establishment and progression of our online community has been rapid and unrelenting. With the development of new communication technologies, the sharing of information is more difficult than ever to organize. Social media websites such as Myspace, Facebook, Twitter, Google+, and YouTube, in which user submitted content is updated nearly every second, are slowly becoming valuable sources for finding and gathering evidence related to modern cases. As such, the current statutes governing the admissibility and relevance of evidence, the Federal Rules of Evidence, must be amended respectively. SOCIAL NETWORKING 6 TABLE OF CONTENTS SECTION PAGE INTRODUCTION 8 FEDERAL RULES OF EVIDENCE 8 Article I-IV 9 Article V-XI 10 EVOLUTION OF FEDERAL RULES OF EVIDENCE 11 TECHNOLOGICAL REVOLUTION 11 SOCIAL NETWORKING WEBSITES 12 LITIGATION USING EVIDENCE FROM CYBERSPACE 13-15 CYBERBULLYING United States 15-20 International 20-21 CIVIL CASES Romano v. Steelcase 21-22 Ledbetter v. Wal-Mart 22-23 CRIMINAL CASES United States v. Tank 23-24 People v. Clevenstine 24-25 People v. Hardaway 25-26 People v. Fernino 26-27 Criminal Libel 27-28 RECENT CASES 29-30 PRIVACY 30-31 Katz v. United States 31-32 SOCIAL NETWORKING 7 ADMISIBILITY OF EVIDENCE Lorraine v. Markel American Insurance Co. 32-33 ANALYZING LORRAINE 33-36 THE SMOKING GUN 36-38 CONCLUSION 39-40 SOCIAL NETWORKING 8 INTRODUCTION Over the past 10 years, society has become dependent on information collected from the World Wide Web. With the introduction of social networking websites such as Myspace and Facebook, the sharing of information between users has reached an all time high. In order for the legal system in the United States to remain efficient and relevant, legal staff must regard these websites as viable sources for evidence pertaining to modern cases. With the onset of new technology, the Federal Rules of Evidence has evolved to include social networking and media websites as a means of gathering pertinent evidence. FEDERAL RULES OF EVIDENCE In 1961, the Judicial Conference of the United States, under the direction of Chief Justice Earl Warren, appointed a committee to research the practicability of a uniform code for use of evidence in the United States’ court system. In 1970, after a preliminary draft was distributed and returned, a revised draft was agreed upon by both the Advisory Committee and Judicial Conference and circulated to members of the House for review. Concurrently, President Richard Nixon and members of his cabinet were involved in a highly publicized scandal known as Watergate. In order to appropriately investigate dealings with Watergate, the formal adoption of the Federal Rules Evidence was postponed. In 1975, after much deliberation over detail, the revised code was submitted to the House of Representatives, where it was voted into action and endorsed by the President. 1 At present, the Federal Rules of Evidence consists of twelve articles: 1 Federal Rules of Evidence: The Legislative and Drafting History, 6 Tex. Tech. L. Rev. 773 (1974-1975). SOCIAL NETWORKING 9 Article I involves the general provisions of the Federal Rules of Evidence including scope, purpose and construction, rulings on evidence, preliminary questions, limited admissibility, and remainder of or relating writings or recorded statements. 2 Article II involves judicial notice of adjudicative facts. 3 Article III involves presumptions in general civil actions and proceedings, and applicability of state law in civil actions and proceedings. 4 Article IV involves relevancy of evidence and its limitations, including definition of relevant evidence, relevant evidence generally admissible, irrelevant evidence inadmissible, and exclusion of relevant evidence on grounds of prejudice, confusion, or waste of time. Article III also comprises character evidence not admissible to prove conduct, exceptions, and other crime, methods of proving character, habit, routine practice, subsequent remedial measures, compromise and offers to compromise, payment of medical and similar expenses, inadmissibility of pleas, plea discussions, and related statements, and liability insurance. Rules 412 through 415 of Article III take account of sex offense cases, relevance of alleged victim’s past sexual behavior or alleged sexual predisposition, evidence of similar crimes in sexual assault cases, evidence of similar crimes in child molestation cases, and evidence of similar acts in civil cases concerning sexual assault or child molestation. 5 2 FED. R. EVID. art. I (2010). 3 FED. R. EVID. art. II (2010). 4 FED. R. EVID. art. III (2010). 5 FED. R. EVID. art. V (2010). SOCIAL NETWORKING 10 Article V involves the privileges shared within the attorney/client relationship. 6 Article VI six involves witnesses, taking account of competency, lack of personal knowledge, oath or affirmation, interpreters, competency of judges and jurors as witnesses, impeachment, evidence of character and conduct of witness, religious beliefs or opinions, mode and order of interrogation and presentation, writing used to refresh memory, prior statements, calling and interrogation of witnesses by court, and exclusion of witnesses in court. 7 Article VII comprises opinions and expert testimony. 8 Article VIII addresses the hearsay rule. 9 Article IX encompasses the authentication and identification of evidentiary documents. 10 Article X incorporates the contents of writings, recordings and photographs submitted as evidence. 11 Article XI addresses miscellaneous rules such as the applicability of rules, amendments made to the Rules of Evidence, and title for citation. 12 6 FED. R. EVID. art. IV (2010). 7 FED. R. EVID. art. VI (2010). 8 FED. R. EVID. art. VII (2010). 9 FED. R. EVID. art. VIII (2010). 10 FED. R. EVID. art. IX (2010). 11 FED. R. EVID. art. X (2010). 12 FED. R. EVID. art. XI (2010). SOCIAL NETWORKING 11 EVOLUTION OF FEDERAL RULES OF EVIDENCE While the existing Federal Rules of Evidence (F.R.E.) has substantiated our litigation process for years, it has become perceptibly necessary for an additional standard to include evidence gathered from a source entirely left out of the FRE, the World Wide Web. Electronic informal discovery is very much in its infancy in terms of the claims and litigation process. While there are some reported decisions on these topics there is certainly no unified movement in the courts to address these types of issues. Various bar groups and other court panels are looking into adopting model rules, but as of yet, very few jurisdictions have addressed the subject. Therefore, there is no one set of rules that defines the scope and use of this information. 13 TECHNOLOGICAL REVOLUTION Use of the internet was popularized in the mid-nineties as it proved necessary for person to person dialogue to be faster and more direct than telephone and mail communication. “The Internet now affects nearly every facet of our daily lives. It connects individuals, facilitates economic transactions, fosters the exchange of information, and serves as a vibrant commercial marketplace. This technological revolution also has left its mark on the practice of law.” 14 13 Mathew R. Booker, Informal Discovery: Google, Facebook and Beyond, Heyl, Royster, Voelker & Allen, available at http://www.heylroyster.com/_data/files/Seminar_2010/2010_CP_F_MRB.pdf (last visited August 9, 2011). 14 John S. Wilson, MySpace, Your Space, or Our Space? New Frontiers in Electronic Evidence, 86 Oreg. L. Rev. 1201, 1202 (2007-08) available at http://www.law.uoregon.edu/org/olr/archives/86/Wilson.pdf (last visited August 9, 2011). SOCIAL NETWORKING 12 SOCIAL NETWORKING WEBSITES In the last decade, the establishment of social networking websites such as Myspace, Facebook, Google+ and Twitter has made the share of information accessible to an entire cyber community. “Social networking sites are online networks of individuals linked through personalized Internet web pages. These web sites typically allow users to customize their own personal web pages (often known as “profiles”), post photographs or videos, add music, or write a journal or blog that is published to the online world.” 15 In the last two years, Facebook and Twitter have ranked highest of social networking websites for user traffic. Facebook has over 400 million active users, in which, 50 percent of these users log on to Facebook daily. Thirty-five million Facebook users update their status daily equaling more than 60 million updates per day. 16 Additionally, advances made to personal and business e-mail services have generated an unremitting and open tunnel for information otherwise private, including information regarding finances, relationships, employment, and the like. “The average employee sends twenty and receives thirty emails per day, and over eighty percent of all corporate data is created and stored electronically without ever being converted to paper.” 17 15 Id. at 1220. 16 Mathew R. Booker, Informal Discovery: Google, Facebook and Beyond, Heyl, Royster, Voelker & Allen, available at http://www.heylroyster.com/_data/files/Seminar_2010/2010_CP_F_MRB.pdf (last visited August 9, 2011). 17 John S. Wilson, MySpace, Your Space, or Our Space? New Frontiers in Electronic Evidence, 86 Oreg. L. Rev. 1201, 1207 (2007-08) available at http://www.law.uoregon.edu/org/olr/archives/86/Wilson.pdf (last visited August 9, 2011). SOCIAL NETWORKING 13 LITIGATION USING EVIDENCE FROM CYBERSPACE Websites like Facebook and Myspace have already become a budding source of information leading to the acquisition of jurisdiction and initiation of litigation in court proceedings, providing law enforcement with evidence for arrest and search warrants, and establishing a basis for indictments and convictions. In civil suits, courts have approved for parties to serve summons through an online profile. These websites will eventually become an integral part of serving warrants and complaints, discovery requests, evidence in all manner of proceedings, and newly discovered evidence for post-conviction motions. In criminal cases of the present and future, social media content might prove to be the ultimate source discovering evidence. 18 Nationally, some of the country’s most notorious criminals and, violent gang members, have joined social networking websites to communicate with their associates, leaving a trail of incriminating evidence for law enforcement to follow. Recently, a number of gang members have been taken into custody after posting pictures and videos of themselves via Facebook, Twitter, and YouTube parading their gang affiliations, including tattoos, inscribed gang necklaces, stolen money and firearms. In some cases, the cars, guns, and other stolen property photographed have been identified by law enforcement as evidence in pertinent crimes. Greg Antonsen, Deputy Inspector for the New York Police Department, made a statement: “[Gang members] want to brag…Never underestimate their desire to show off. It works against them.” In one case, a gang member was arrested for felony theft after posting on twitter details regarding his upcoming birthday gathering including the date, time, and location. Antonsen said 18 Ken Strutin, Social Media and the Vanishing Points of Ethical and Constitutional Boundaries, 31 PACE L.REV. 228 (2011). SOCIAL NETWORKING 14 about the arrest, “We had two detectives grab him up when he got out of the limo. He never got to celebrate his birthday.” 19 Internationally, Facebook has already been integrated into court procedures. In Australia, Facebook is currently a satisfactory means of delivering notifications regarding process serving, complaints, and court orders. After unsuccessful attempts to serve a man with request for a court-ordered paternity test, a Sydney woman’s attorney informed the Federal Magistrate if a private Facebook message would be sufficient for serving the man, whose residence was in flux. The court granted the order to serve the documents via Facebook and the documents were delivered. 20 Attorneys and litigators have realized that social networking web sites can be utilized in gathering of evidence, including popular websites such as Facebook and Myspace. Current court proceedings in civil and criminal venues confirm that using evidence from Facebook and Myspace may apply as relevant and admissible under Rule 401. 21 One such example is member participation in social media websites during times of alleged personal injury, resulting in an adverse ruling at trial due to contradictory behavior. This evidentiary support has demonstrated great significance in personal injury cases during which a plaintiff is awarded hedonic damages, compensation granted for the loss of enjoyment of life. 19 FederalComputerWeek. Com, Agencies Use Social Media to Bust Gangs, available at http://fcw.com/articles/2011/04/05/law-enforcement-agencies-usiing-social-media-to-bust-gangs.aspx (last visited August 18, 2011). 20 Ken Strutin, Social Media and the Vanishing Points of Ethical and Constitutional Boundaries, 31 PACE L.REV. 228 (2011). 21 Daniel L. Brown and Aimee R. Kahn, The Smoking Gun in an Adversary’s Network, Law Technology News (September 11, 2009) available at http://www.law.com/jsp/lawtechnologynews/PubArticleFriendlyLTN.jsp?id=1202433691927&slreturn=1&hbxlogin =1 (last visited August 9, 2011). SOCIAL NETWORKING 15 “Those who advocate hedonics believe that life is inherently worth more than just the amount of money an individual can earn.” 22 CYBERBULLYING United States Cyberbullying is harassment that occurs via the Internet, cell phones, or other electronic devices. Communication technology is used to intentionally disturb others using text messages, e-mails and comments sent through cyberspace. 23 Upon the arrival of social-networking websites, an alarming number of cyberbullying incidents have occurred, leading to the formation of preventative measures pending passage by congress including the Megan Meier Cyberbullying Prevention Act. Additionally, a large amount of attention had been paid to states working towards developing and incorporating cyberbullying legislation within school districts, requiring that technology use policies be updated to include cyberbullying in their definitions of prohibited behavior. 24 The Megan Meier Cyberbullying Prevention Act proposes a) whoever transmits in interstate or foreign commerce any communication, with the intent to coerce, intimidate, harass, or cause substantial emotional distress to a person, using electronic means to support severe, 22 USLegal.com, Hedonic Damages Law & Legal Definition, available at http://definitions.uslegal.com/h/hedonicdamages (last visited August 11, 2011). 23 USLegal.com, Cyberbullying Law & Legal Definition, available at http://definitions.uslegal.com/c/cyber-bullying (last visited September 28, 2011). 24 Sameer Hinduja, PH.D. and Justin W. Patchin, PH.D., Cyberbullying Fact Sheet: A Brief Review of Relevant Legal & Policy Issues, Cyberbullying Research Center, available at http://www.Cyberbullying.us (last visited September 28, 2011). SOCIAL NETWORKING 16 repeated, and hostile behavior, shall be fined under this title or imprisoned not more than two years or both. b) As used in this section, 1) the term ‘communication means the electronic transmission, between or among points specified by the user, of information of the user’s choosing, without change in the form or content of the information as sent and received; and 2) the term ‘electronic means’ means any equipment dependent on electrical power to access an information service, including e-mail, instant messaging, blogs, websites, telephones, and text messages. 25 In the Nation’s first ever cyberbullying case, United States v. Lori Drew, No. 08-CR582 (C.D. Cal Nov 26, 2008), the defendant was indicted for violating the Federal Computer Fraud and Abuse Act. Drew was charged with conspiracy, fraudulent use of the Internet and providing false information to Myspace when creating “Josh’s” account. Megan Meier was described by her mother as a vibrant, fun-loving young girl. Meier was a thirteen-year-old eighth grade student at the Immaculate Conception School in Missouri. Meier had recently ended her friendship with Drew’s young daughter Sarah, an elementary school classmate. After the two friends parted ways, Drew created a false profile, claiming to be a sixteen-year-old boy named Josh Evans in order to investigate what Megan was saying about her daughter. “Josh” began sending messages to Megan sparking romantic interest. “Josh” and Megan began a six-week relationship after which “Josh” unexpectedly turned on Megan. “He” began sending unkind messages claiming Megan was cruel and that he had no interest in continuing their friendship. Myspace posts on “Josh’s” profile read, “Megan Meier is a slut,” and “Megan Meier is Fat,” and 25 The Library of Congress, H.R. Megan Meier Cyberbullying Prevention Act, available at http://thomas.loc.gov/cgibin/query/z?c111:H.R.1966: (last visited September 28, 2011). SOCIAL NETWORKING 17 messages sent to Megan included statements like, “the world would be a better place without you in it.” The last correspondence from Megan to Josh stated, “You are the kind of boy a girl would kill herself over.” Megan hung herself with a belt in her bedroom closet the next day. The false profile was discovered six-weeks after Megan’s death, but Drew could not be criminally prosecuted for the creation of the profile even after Megan’s hometown passed a state law making cyberbullying a crime two years later. Because the law was not an ex post facto law, it did not apply retroactively to the case of Megan Meier. In May of 2008, Drew was finally indicted on four counts by a Grand Jury in Los Angeles, CA. Drew was charged with one count of conspiracy and three counts of violation of computer fraud use through the breach of MySpace’s terms of service. Drew was found guilty for conspiracy, but was anonymously found not guilty on the last three counts. Six months later, Drew filed an acquittal for her conviction under Title 18 USC Section 1030 (a) (2) (C). In order for Drew to be convicted under this title, the computer accessed must be involved in an interstate or foreign communication and Drew must have intentionally accessed the computer without authorization. The judge presiding refused to set precedent with Drew’s case, thereby acquitting her in the cyberbullying case, reasoning that if Drew was convicted, any Internet user violating the terms of agreement of a website could suddenly face criminal charges. The United States Government appealed the dismissal of the criminal charges, however in November 2009 withdrew the appeal, ending the case. 26 Another high-profile tragedy resulting from cyberbullying is the story of Rachel Neblett. Rachel was a seventeen-year-old high school student in Kentucky. She participated in cheerleading and was an exceptional gymnast. In the summer of 2006, Rachel began receiving 26 Judge Tom Jacobs, Teen Cyberbullying Investigated 157-61 (2010). SOCIAL NETWORKING 18 threatening E-mails through her Myspace account. Rachel believed the E-mails were sent from a fellow student with knowledge of Rachel’s school schedule. She told her sisters and friends about the E-mails. Her parents caught wind and notified the school principal at Bullitt High School; Rachel’s teachers were also notified and agreed to keep an eye on her. In September of 2006, Rachel received a messaged that read, “Meet me out front of school…and we’ll settle it there and honey, you’re not going to the hospital. I’m going to put you in the morgue.” Rachel was terrified for her life and withdrew from all social activities, remaining at home except to attend classes. Three weeks after Rachel received the threatening message, she shot herself in the chest in her parent’s bedroom. Police never identified Rachel’s cyberbully. Following Rachel’s death, her close friend committed suicide. 27 The Internet is littered with websites memorializing the fallen victims of cyberbullying. One of the most touching memorial sites is dedicated to Ryan Patrick Hallogan, a thirteen-yearold boy from Vermont who committed suicide after being bullied, both in person and online. Ryan was a creative student who loved acting and comedy. In the seventh grade, Ryan was confronted by a bully and engaged in a fight. The bully then became his friend for a short while until he turned on Ryan, spreading rumors online that Ryan was gay. The summer following, Ryan developed an interest in a female classmate and the two began texting each other, however, the girl admitted to Ryan at school she was only pretending to like him, calling him a “loser.” Shortly after, Ryan hung himself in his bathroom. 28 27 Judge Tom Jacobs, Teen Cyberbullying Investigated 163 (2010). 28 Judge Tom Jacobs, Teen Cyberbullying Investigated 166 (2010). SOCIAL NETWORKING 19 Tyler Clementi, an eighteen-year-old Rutgers University freshman, threw himself off the George Washington Bridge after a video of him having sexual relations with another man was live-streamed through the media website Skype to fellow students. Cameras were placed in his room without his knowledge by his roommate and a student in his corridor and the video was broadcasted to one-hundred-and-fifty followers on Twitter. On September 22nd, 2010, Tyler wrote a note on his Facebook page that read, “Jumping off the GW Bridge, sorry.” Dahrun Ravi and Molly Wei were charged with two counts each of Invasion of Privacy. Additionally, Ravi was charged with two more counts of Invasion of Privacy for streaming the video again the following day. Collecting or viewing sexual images without consent is a fourth degree crime; transmitting sexual images without consent is a third degree crime. 29 In 2009, Phoebe Prince moved from Ireland to Massachusetts with her family and entered the South Hadley High School. Phoebe became involved in a brief relationship Sean Mulveyhill. Mulveyhill’s former girlfriend, Kayla Narey, along with her friends, began harassing Phoebe in person and online. Narey and her friends posted slanderous comments on Facebook, Twitter, Craigslist, and Formspring, comments that read, “Irish Slut” and “whore.” Eventually, the group of students bullying Phoebe grew to include even her former boyfriend, Sean Mulveyhill. Books were regularly knocked from her hands, items were thrown at her, and her face was scratched out of pictures on the school walls. Phoebe wrote in a text message, “I think Sean condoning this is one of the final nails in my coffin.” Nine of Phoebe’s classmates were indicted for driving her to suicide. Six of the nine students are facing charges of criminal harassment, stalking and statutory rape. Ashley Longe, Sharon Chanon Velazquez, and Flannery Mullins were charged 29 CBSNews.com Tyler Clementi, Taped Having Sex, Kills Self, available at http://www.cbsnews.com/stories/2010/09/30/national/main6913514.shtml (last visited September 29, 2011). SOCIAL NETWORKING 20 with civil rights violations and criminal harassment as youth offenders. Sean Mulveyhill was charged with statutory rape, civil rights violations resulting in bodily injury, criminal harassment, and disturbing a school assembly. Kayla Narey was charged with civil right violations resulting in bodily injury, criminal harassment, and disturbing a school assembly. Austin Renaud was charged with statutory rape. 30 International In 2008, twenty-seven countries in the European Union agreed to spend seventy million dollars to make the Internet a safer place for children and teens. The agreement requires websites including Myspace, Facebook, Bebo, Yahoo! Europe, Skyrock, and Youtube to set profiles for users under the age of eighteen to be private and untraceable through search engines or other websites. Additionally, these websites are required to include a one-click button for reporting abuse or unwanted contact. 31 On August 21st, 2009, eighteen-year-old Keeley Houghton of Malvern, Worcestershire, England was the first person to be jailed for cyberbullying in the UK after she posted death threats on her Facebook profile towards a fellow classmate, Emily Moore. It was revealed to the court that Houghton had been verbally and physically bullying Moore since the pair were fourteen. District Judge Bruce Morgan stated in court, “Since Emily Moore was 14 you have waged compelling threats and violent abuse towards her. Bullies are by their nature cowards, in school and society. The evil, odious effects of being bullied stay with you for life. On this day 30 Pete Kotz, Phoebe Prince Suicide: Nine Teens Charged with Bullying 15-year-old to Death, True Crime Report, available at http://www.truecrimereport.com/2010/03/phoebe_prince_suicide_nine_tee.php (last visited September 30, 2011). 31 Judge Tom Jacobs, Teen Cyberbullying Investigated 21 (2010). SOCIAL NETWORKING 21 you did an act of gratuitous nastiness to satisfy your own twisted nature.” Two days after the threat was made, Houghton approached Moore and her boyfriend in a public place. When Moore said she’d be calling the police, Houghton retorted, “I’ll give you something to ring the police about.” Houghton had two previous convictions for activity relating to her vendetta against Moore. She was sentenced with three months in a young offender’s facility. 32 Cyberbullying has not only affected adolescents, but has come full circle, claiming adult victims as well. In October 2008, thirty-nine-year old veteran actress Chai Jin-Sil of South Korea hung herself in her shower with rope made of medical bandages. She had been verbally attacked by thousands of chat room users questioning her morals and character. Jin-Sil was accused of being a loan shark after advancing two million dollars to a fellow actor, Ahn Jae Hwan who was unable to return the money, allegedly causing his suicide. Since, South Korean government has passed a law requiring web users to reveal their true identity and governmental issued I.D. number when posting to social networking websites. 33 CIVIL CASES In Romano v. Steelcase Inc., 2010 N.Y. Slip. Op. 20388, 2010 N.Y. Misc. Lexis 4538 (N.Y. Sup. Ct., Suffolk Cty. Sept. 21, 2010), in which the plaintiff, Kathleen Romano, was injured after allegedly falling out of her office chair. She filed suit against both the manufacturer and distributor of the chair, claiming she could no longer participate in certain activities and that these injuries had confined Romano to her home, thereby affecting her enjoyment of life. Conversely, information collected from Romano’s personal Facebook and Myspace web profiles 32 Judge Tom Jacobs, Teen Cyberbullying Investigated 105-106 (2010). 33 Judge Tom Jacobs, Teen Cyberbullying Investigated 164-65 (2010). SOCIAL NETWORKING 22 revealed that Romano led an active lifestyle, traveling to Florida and Pennsylvania during the time she claimed to be injured, prohibiting such activity. The court ordered disclosure of the information, finding that Romano’s privacy was outweighed by the need for the evidence. The Romano court found, inter alia, that …in light of the fact that the public portions of the plaintiff’s social networking sites contained material that was contrary to her claims and deposition testimony, there was a reasonable likelihood that the private portions of her sites might contain further evidence such as information with regard to her activities and enjoyment of life, all of which were material and relevant to the defense of her personal injury action. In response to the request by the plaintiff to uphold her right to privacy, the court stated that in creating a Facebook and Myspace profile, Romano was aware of the fact that information posted would be accessible by the public hence; she relinquished any reasonable expectation to privacy. 34 In a similar case, Ledbetter v. Wal-Mart Stores, Inc., 2009 U.S. Dist. LEXIS 126859 (D. Colo. Apr. 21, 2009), the plaintiff, Joel Ledbetter, an electrician, and his coworker Heath Powell, sought action against the Wal-Mart Corporation after sustaining severe burns during an electrical shortage that occurred while the two attempted to repair a store’s electrical system. Powell’s spouse, Disa Powell, also brought a claim against the company for loss of consortium stating that she could no longer have normal marital relations with her husband following the incident. The 34 Romano v. Steelcase Inc., 2010 N.Y. Slip. Op. 20388, 2010 N.Y. Misc. Lexis 4538 (N.Y. Sup. Ct., Suffolk Cty. Sept. 21, 2010). SOCIAL NETWORKING 23 defendant pursued information from several social networking websites through third party subpoenas to refute claims made by the plaintiffs. The plaintiffs filed a motion of protective order to prevent the social networking websites from releasing the requested confidential information. The court denied the motion and granted the defendant’s subpoenas. The court held, “the information sought by the subpoenas was reasonably calculated to lead to the discovery of admissible evidence and was relevant to the issues in the case.” 35 While evidence found on these social media websites benefit the opposition, often it can cause damage to a case for those seeking retribution in personal injury lawsuits. Carol L. Schlitt cautions her clients to avoid using social media websites during a lawsuit in her article entitled, Social Media and Your Personal Injury Lawsuit: How Facebook, Myspace, and Twitter Can Affect Your Lawsuit. “An innocent posting such as an old family photo posted online can wind up as evidence presented by the defense in a court case.” 36 CRIMINAL CASES In criminal cases, the social networking arena has become an invaluable resource for potential evidence. In United States v. Tank, 200 F.3d 627 (9th Cir. 2000), the defendant was convicted of conspiring to exploit, receive, and distribute sexually explicit images of children. The government had gathered evidence at issue from Internet chat rooms pertinent to the case. The 35 36 Ledbetter v. Wal-Mart Stores, Inc., 2009 U.S. Dist. LEXIS 126859 (D. Colo. Apr. 21, 2009). Carol L. Schlitt, Social Media and Your Personal Injury Lawsuit: How Facebook, MySpace and Twitter Can Affect Your Lawsuit, available at http://nylawthoughts.com/2010/09/27/social-media-and-your-personal-injurylawsuit-how-facebook-my-space-and-twitter-can-affect-your-lawsuit/ (last visited August 11, 2011). SOCIAL NETWORKING 24 court found that the “government made a prima facie showing of the authenticity” of chat room log print-outs. In citing U.S. v. Catabran, 836 F. 2d 453 (9th Cir. 1988), “[a]ny question as to the accuracy of the print-outs…would have affected only the weight of the print-outs, not their admissibility.” Additionally, the court found that the government sufficiently linked the defendant to the chat-room conversations and determined that the conversations held relevance to the defendant’s charges. 37 In People v. Clevenstine, 891 N.Y.S.2d 511 (N.Y. App Div. 2009), after accidentally accessing Richard Clevenstine’s Myspace profile including instant message conversations, the defendant’s wife discovered sexually explicit communications between Clevenstine and two teenage sisters. Clevenstine’s wife confronted the young victims and confirmed that sexual activity had indeed occurred between both sisters and the defendant. A week following the confrontation, Clevenstine’s wife notified the police of her husband’s doings which resulted in an eleven count conviction, and ultimately Clevenstine was sentenced to 243 to 323 years in prison. Clevestine appealed two counts of rape in the second degree, three counts of rape in the third degree, criminal sexual act in the third degree, attempted criminal sexual act in the third degree, sexual abuse in the third degree, and three counts of endangering the welfare of the child, challenging the electronically sourced evidence used against him, claiming it had not been properly authenticated. The court reasoned that the authentication of evidence was established so long as the evidence had not been tampered with and was indeed genuine. The court found that, “both 37 Katherine Minotti, Evidence: The Advent of Digital Diaries: Implications of Social Networking Web Sites for the Legal Profession, 60 S.C.L. Rev. 1057 (Summer 2009). SOCIAL NETWORKING 25 victims testified that they had engaged in instant messaging about sexual activities [the] defendant through the social networking site, Myspace. Additionally, a police officer testified ‘that he had reviewed [the] conversations from the hard drive of the computer used by the victims.’ Further, a Myspace representative ‘explained that the messages…had been exchanged by users of accounts created by [the] defendant and the victims, and [the] defendant’s wife recalled the sexually explicit conversations she viewed in [the] defendant’s Myspace account.’” The court held that the testimony provided sufficient authentication for the admission of the evidence. 38 In People v. Hardaway, the defendant appealed his conviction for third-degree criminal sexual conduct, claiming that the council was ineffective in addition to other issues. The core of his appeal was that Hardaway’s attorney failed to preserve the contents of the victim’s social networking profile, which held information possibly leading to the impeachment of her testimony. The defendant claimed that the contents of the victim’s Myspace profile could have established a pattern of the victim’s dishonesty, since it was published that the victim was eighteen years of age and married. Further, the defendant argued that his council failed to inquire about the disappearance of the victim’s Myspace page, and moreover, had the defendant’s council done so, a Brady violation may have been established. 39 In 1963, the Supreme Court ruled in Brady v. Maryland, 373 U. S. 83 (1963), that, “the suppression by the prosecution of evidence favorable to an accused upon request violates due process where the 38 Edward M. Marisco, Jr., Social Networking Websites: Are MySpace & Facebook the Fingerprints of the TwentyFirst Century? 19 WIDENER L.J. 967 (2010). 39 Ken Strutin, Social Media and the Vanishing Points of Ethical and Constitutional Boundaries, 31 PACE L.REV. 228 (2011). SOCIAL NETWORKING 26 evidence is material either to guilt or to punishment, irrespective of the good faith or the bad faith of the prosecution.” 40 In People v. Fernino, 19 Misc. 3d, 851 N.Y.S.2d 339 (N.Y. City Crim. Ct. 2008), the defendant, Melissa Fernino violated court orders of protection after making friend requests via MySpace to Sandra Delgrosso and her two minor daughters. Fernino’s father was involved in a relationship with Delgrosso and Delgrosso had placed a protective order against the Ferninos in family court after the two ended their relationship. Delgrosso reported the request to authorities and Fernino was charged with three counts of second-degree criminal contempt for allegedly violating the protection orders. The defendant claimed that regardless of whether or not the allegations in the complaint were true, she could not have been convicted of the charges made against her. In his four-page decision, Judge Sciarriano stated, If a person establishes an account from Myspace, she may receive and send messages from the Mail Center Friend Request Manager and upon receiving such a message, the recipient could choose to do nothing, indicate that she approves of communication with the potential friend and create an opportunity for further communication by choosing approve, signal that she does not want immediate communication by choosing deny, or block immediate and future communications with the potential friend by choosing spam. The court held that the use of MySpace to contact the victim was indeed in violation of the protection order granted in family court, because the friend’s request was still an attempt to 40 Elizabeth Napier Dewar, A Fair Trial Remedy for Brady Violations, 115 YALE L.J. 1450 (2006). SOCIAL NETWORKING 27 contact despite it being electronically, and no contact was allowed by the order of protection. Therefore, any contact made through social networking websites such as MySpace and Facebook constitute a violation of restraining orders placed by any court. 41 The Judge reasoned his ruling by referencing the case of People v. Johnson, 208 A.D.2d 1051, 617 N.Y.S.2d 577 (3rd Dept.1994), in which the defendant indirectly contacted the victim through offering a letter, which he signed with the victim’s name and mailed to a post office box in response to a personal ad placed in a newspaper. Following the receipt of the letter, the victim received further unsolicited communication from the person who originally placed the personal advertisement. In Johnson, the court held that the defendant violated his probation by creating the letter and fraudulently endorsing it, which resulted in an unsolicited communication to the victim. Criminal Libel Currently, seventeen states enforce criminal libel statutes including Colorado, Florida, Idaho, Kansas, Louisiana, Michigan, Minnesota, Montana, New Hampshire, New Mexico, North Carolina, North Dakota, Oklahoma, Utah, Virginia, Washington, and Wisconsin. Libel law states that charges can be brought against a person for defamation of character, even electronically. Colorado libel law states, 1) a person who shall knowingly publish or disseminate, either by written instrument, sign, pictures, or the like, any statement or object tending to blacken the memory of one who is dead, or to impeach the honesty, integrity, virtue, or reputation or expose the natural defects of one who is alive, and thereby to expose him to 41 Mark Fass, MySpace ‘Friend Request’ Could Violate Protection Order, Law.com, available at http://www.law.com/jsp/article.jsp?id=1202904867035&slreturn=1 (last visited September 30, 2011). SOCIAL NETWORKING 28 public hatred, contempt, or ridicule, commits criminal libel. 2) It shall be an affirmative defense that the publication was true, except libels tending to blacken the memory of the dead and libels tending to expose the natural defects of the living. 3) Criminal libel is a class six felony. 42 In 2008, J.P. Weichel allegedly posted comments about his former girlfriend on the Craigslist “Rant and Raves” forum, making crude comments about her sexual relations and alleging that she was guilty of welfare fraud and child abuse. According to an old Colorado state statute, a person can be charged criminally against libel. Weichsel’s former girlfriend made a complaint to the Fort Collins’ police department. The Larimer County District Attorney, Larry Abrahamson, filed two criminal libel charges against Weichel on October 21st. Colorado State’s libel law carries a maximum sentence of eighteen months in jail. Several attorneys weighed in on the case, stating that the government’s involvement was a troubling infringement on free speech and the case would be more appropriate for civil court. A professor at Georgia State University, Gregory Lisby, specializing in criminal libel prosecutions stated that, “Criminal libel prosecutions are a sledgehammer when a scalpel would do the same trick.” On May 14th, 2009, Weichel pled guilty to two counts of harassment, paid a five-hundred dollar fine, was assigned sixty hours of community service and was put under probation for four years. 43 42 Donald Burleson, 17 States Have Criminal Libel Laws for the Web Defamation, available at http://www.dbaoracle.com/oracle_news/news_states_criminal_libel_web_internet.htm (last visited September 30, 2011). 43 Nicholas Riccardi, Craigslist Rant by Ex-boyfriend Leads to Criminal Libel Charges: Colorado Statute Dates to 19th Century, Chicago Tribune, available at http://articles.chicagotribune.com/2008-12-14/news/0812130373_1_exboyfriend-craigslist-libel (last visited September 30, 2011). SOCIAL NETWORKING 29 RECENT CASES Yet another incident involving the social networking website, Facebook, went to court in February of 2009. Gary Waters, accused of possessing a loaded weapon, was acquitted of the gun charge after evidence collected from Officer Vaughan Etienne’s Facebook profile was used for impeachment purposes. The defendant Waters was assaulted by Etienne and his partner and suffered from three broken ribs. Additionally, the officers planted the loaded weapon on Waters to cover their activity. After investigating Etienne’s Facebook profile, the defense council discovered pertinent data including a “devious” mood update and a status post claiming the officer had watched the movie “Training Day” to, “brush up on proper police procedure.” Both pieces of information led to the dismissal of Water’s gun charge. 44 Recently, a more tremendous example of online evidentiary support is illustrated in the case of Jason Valdez, a thirty-six year old male facing drug possession charges in Ogden, Utah. On June 23, 2011 Valdez held a woman hostage during a sixteen-hour standoff with SWAT officials. During the standoff, Valdez posed with his female hostage for a picture, later posted on the website, Facebook with the caption, “Got a cute hostage, huh?” Law enforcement agents are currently working to use this evidence to convict Valdez, who was in critical condition shortly after the incident. 45 44 Ken Strutin, Social Media and the Vanishing Points of Ethical and Constitutional Boundaries, 31 PACE L.REV. 228 (2011). 45 Wil Longbottom, Facebook Kidnapper Poses With His Hostage in Picture Posted Online During 16-hour Standoff With SWAT Team, available at http://www.dailymail.co.uk/news/article-2006671/Utah-man-16-hour-standoffSWAT-team-time-update-friends-family-Facebook.html#ixzz1S1a6r7tp (last visited August 11, 2011). SOCIAL NETWORKING 30 It seems people are so interconnected within the social networking web; it has become impossible to find disconnect. In the most extreme cases, social networking websites have been the key indicator in who might have committed a crime. Such is the case of Jonathan G. Parker, a Loudoun, Pennsylvania man who was charged with one count of felony daytime burglary after he failed to log off of his Facebook account on the victim’s home computer. On August 28th, 2009, Parker broke into a Pennsylvania home through a bedroom window and stole two diamond rings valued at thirty-five hundred dollars. Before exiting the property, Parker checked his Facebook page on the home computer, but forgot to log off his account. The victim later discovered Parker’s Facebook account open on the desktop. She notified the county deputy sheriff’s department. During the investigation, a friend of the victim revealed that he knew where Parker resided and that Parker had approached him the night prior and asked if he wanted to assist with the burglary. Parker faces ten years in prison if convicted. 46 PRIVACY ISSUES How does social networking impact the right to privacy? Author Susan Brenner in her book, 2002, examined three amendments, which protect an individual’s right to privacy to determine whether communication in cyberspace invokes the law that governs the right to privacy. The U.S. Constitution does not particularly guarantee an individual’s right to privacy. However, the U.S. Supreme Court has interpreted the U.S. Constitution to allow individuals a right to privacy, which has, in part, derived from various constitutional guarantees, namely, as mentioned in the First, Fourth, and Fifth Amendments. The 46 Edward Marshal, Burglar Leaves His Facebook Page on Victim’s Computer, available at http://www.journalnews.net/page/content.detail/id/525232.html (last visited September 29, 2011). SOCIAL NETWORKING 31 First Amendment protects the privacy of certain acts including the right to speak anonymously and the right to preserve the confidentiality of one’s associations. The Fourth Amendment prevents Government intrusion into matters, which are constitutionally considered “private”. The Fifth Amendment offers limited protection against self-incrimination, except when properly acquired evidence proves otherwise, and when a person waives their right to divulge their guilt or information leading to their incrimination. 47 One of the earliest cases involving constitutionally protected privacy, Katz v. United States, 389 U.S. 347, occurred in 1967. There the defendant, Katz, divulged information regarding bets placed over several telephone calls to clients around the country. Federal agents had used a wiretap outside of a public phone booth frequented by Katz to collect information pertinent to their investigation. The evidence collected from the conversations between Katz and his clients made possible for Katz to be indicted under eight counts of illegal transmission of wagering information. Katz appealed the conviction disputing that the recordings could not be used as evidence against him, because the Fourth Amendment of the Constitution protected him against illegal search-and-seizure without a search warrant. The U.S. Supreme Court held that in instances where a person participates in a conversation in a telephone booth behind a closed door, there is an expectation of privacy, and therefore, he may rely upon the protection of the Fourth Amendment. Unlike the Katz case, modern cases involving communication on websites such as Facebook and MySpace, where an individual knowingly shares information to the public, a reasonable expectation of privacy cannot be guaranteed. 47 Susan W. Brenner, The Privacy Privilege: Law Enforcement, Technology, and the Constitution, 7 J. TECH. L. & POL’Y 123 (2002). SOCIAL NETWORKING 32 Moreover, in some social networking websites such as Facebook and Google+, users are offered the option to privatize elements of their public profile. One can argue that if a user chooses to privatize certain elements while allowing other elements of his or her profile to be viewed by the general public, one nullifies the reasonable expectation of privacy protected by the Fourth Amendment. Upon further examination it can be concluded that so long as evidence is admissible and relevant, it can be allowed as legitimate evidence in trial regardless of where it was sourced. ADMISIBILITY OF EVIDENCE How do courts test the admissibility of evidence encountered electronically, through websites, e-mail and other digital sources? In Lorraine v. Markel American Insurance Co., 241 F.R.D. 534 (D. Md. May 4, 2007), the plaintiff filed an insurance dispute after Lorraine’s boat was struck by lightning. The insurance company paid out for damages covered under the plaintiff’s policy, however, Lorraine later discovered further damage had occurred to the ship’s hull and demanded an additional $36,000 to fix the damages. The insurance company refused the additional demands and the matter was pushed to arbitration. During arbitration, the sum of additional damages was approved, but the amount was limited to under half the amount demanded, at $14,000. Both parties involved filed motions for summary judgment, submitting evidence including e-mails discussing the policy at greater length. The e-mails were not authenticated and thus lacked admissibility of the evidence. Judge Grimm of the district court discussed how the evidence could have been submitted to retain admissibility. Judge Grimm held that “website ESI SOCIAL NETWORKING 33 (Electronically Stored Information), e-mail, web postings, digital photos, and computer generated document are subject to the standard rules of admissibility.” The court’s reasoning was that the test of admissibility for ESI should reflect the test used for other types of evidence: (1) relevance; (2) authenticity; (3) exceptions to hearsay; (4) the original writing rule; and (5) the probative value substantially outweighing the danger of unfair prejudice. 48 ANALYZING LORRAINE The presiding Judge, Grimm, penned a one-hundred-and-one page opinion following the Lorraine trial in which he explained how to submit electronically stored information into evidence while ensuring admissibility and relevancy. According to Grimm, when entering electronically sourced evidence into trial, there exist many evidentiary barriers to overcome, especially the Federal Rules of Evidence, reviewed below. 49 Rule 104 currently governs matters concerning preliminary questioning of admissibility. “Preliminary questions concerning the qualification of a person to be a witness, the existence of a privilege, or the admissibility of evidence shall be determined by the court, subject to the provisions of sub-division B and in making its determination it is not bound by the rules of 48 Katherine Minotti, MySpace & My Liability, E-Discovery Connection, available at http://www.imakenews.com/admirlaw/e_article001388969.cfm?x=bfst3C1,b9bmfcpV,w (last visited August 11, 2011). 49 LexisNexis.com, Lorraine v. Markel: Electronic Evidence 101, available at http://www.lexisnexis.com/applieddiscovery/LawLibrary/whitePapers/ADI_WP_LorraineVMarkel.pdf (last visited August 18, 2011). SOCIAL NETWORKING 34 evidence except those with respect to privileges.” Furthermore, Rule 104 handles relevancy conditioned on fact, hearing of jury, testimony by accused, and weight and credibility. 50 Rule 401 currently governs relevant evidence which is defined as “evidence having any tendency to make the existence of any fact that is of consequence to the determination of the action more probably or less probable than it would be without the evidence.” 51 Rule 402 currently governs matters concerning relevancy of evidence. “All relevant evidence is admissible, except as otherwise provided by the Constitution of the United States, by Act of Congress, by these rules, or by other rules prescribed by the Supreme Court pursuant to statutory authority. Evidence which is not relevant is not admissible.” 52 Rule 403 currently governs matters concerning exclusion of relevant evidence on grounds of prejudice, confusion, or waste of time. “Although relevant, evidence may be excluded if its probated value is substantially outweighed by the danger of unfair prejudice, confusion of the issues, or misleading the jury, or by considerations of undue delay, waste of time, or needless presentation of cumulative evidence.” 53 Rule 901 currently governs matters concerning authentication of evidence. “The requirement of authentication or identification as a condition precedent to admissibility is 50 FED. R. EVID. 104 (2010). 51 FED. R. EVID. 401 (2010). 52 FED. R. EVID. 402 (2010). 53 FED. R. EVID. 403 (2010). SOCIAL NETWORKING 35 satisfied by evidence sufficient to support a finding that the matter in question is what its proponent claims.” 54 Rule 902 currently governs matters concerning self-authentication, in which it illustrates how authentication can be attained without extrinsic evidence. 55 Rule 807 currently governs the exception to hearsay. “A statement not specifically covered by Rule 803 or 804 but having equivalent circumstantial guarantees of trustworthiness, is not excluded by the hearsay rule, if the court determines that (A) the statement is offered as evidence of a material fact; (B) the statement is more probative on the point for which it is offered than any other evidence which the proponent can procure through reasonable efforts; and (C) the general purposes of these rules and the interests of justice will best be served by admission of the statement into evidence. However, a statement may not be admitted under this exception unless the proponent of it makes known to the adverse party sufficiently in advance of the trial or hearing to provide the adverse party with a fair opportunity to prepare to meet it, the proponent's intention to offer the statement and the particulars of it, including the name and address of the declarant.” 56 Rule 1001 Section 3 governs the “original” writing rule. “An ‘original’ of a writing or recording is the writing or recording itself or any counterpart intended to have the same effect by a person executing or issuing it. An ‘original’ of a photograph includes the negative or any print 54 FED. R. EVID. 901 (2010). 55 FED. R. EVID. 902 (2010). 56 FED. R. EVID. 807 (2010). SOCIAL NETWORKING 36 there from. If data are stored in a computer or similar device, any printout or other output readable by sight, shown to reflect the data accurately, is an ‘original’.” 57 Rule 1003 governs the admissibility of duplicates. “A duplicate is admissible to the same extent as an original unless 1) a genuine question is raised as to the authenticity of the original or 2) in the circumstances it would be unfair to admit the duplicate in lieu of the original. 58 Clear of the Federal Rules of Evidence, some of the added barriers to presenting electronic evidence in trial have been outlined in articles written by legal professionals as well as court officials. The question of privacy and one’s ability to invoke his or her right to privacy has become one of the most difficult pieces to place in the puzzle that is electronically obtained evidence. THE SMOKING GUN Daniel L. Brown and Aimee R. Kahn wrote an article framing the issue at hand entitled, “The Smoking Gun in an Adversary’s Network”. It was published on September 11, 2009 in the New York Law Review. This article addresses a new conduit for attorneys and litigators in gathering evidence found in social networking sites such as Facebook and MySpace. Evidence collected from these sites may hold the smoking gun needed to serve legal process against the opposition. Attorneys and litigators must use caution in their attempts to present evidence collected from social networking sites, as well as examine the evidentiary and ethical implications it might present. Brown introduces the questions of “whether there is a reasonable expectation of privacy on a social networking site accessible to the public at large; and whether 57 FED. R. EVID. 1001 (3) (2010). 58 FED. R. EVID. 1003 (2010). SOCIAL NETWORKING 37 there is a reasonable expectation of privacy on a social networking site that has been secured by some form of privacy protection, the later creating greater concern.” According to the authors, an attorney should disclose intention when accessing a member’s profile to gather evidence pertinent to a case. Brown states, “social networking sites can potentially contain a plethora of information useful for litigation, but attorneys must understand the ethical and evidentiary rules associated with discovering such evidence.” A review of current court proceedings in civil and criminal venues has confirmed that using evidence from Facebook and MySpace may apply as relevant and admissible under Rule 401. 59 The website Facebook clearly identifies the scope of privacy as pertaining to information stored on member’s profiles in their privacy settings page. Everyone Information. Information set to ‘everyone’ is publicly available information, just like your name, profile picture, and connections. Such information may, for example, be accessed by everyone on the Internet (including people not logged into Facebook), be indexed by third party search engines, and be imported, exported, distributed, and redistributed by us and others without privacy limitations. Such information may also be associated with you, including your name and profile picture, even outside of Facebook, such as on public search engines and when you visit other sites on the Internet. The default privacy setting for certain types of information you post on Facebook is set to ‘everyone.’ You can review and change the default settings in your privacy settings. If you delete 59 Daniel L. Brown & Aimee R. Kahn, The Smoking Gun in an Adversary’s Network, Law Technology News, 2009 available at http://www.law.com/jsp/lawtechnologynews/PubArticleFriendlyLTN.jsp?id=1202433691927&slreturn=1&hbxlogin =1 (last visited August 11, 2011). SOCIAL NETWORKING 38 ‘everyone’ content that you posted on Facebook, we will remove it from your Facebook profile, but have no control over its use outside of Facebook. In the criminal venue, Facebook identifies its policies on the share of information to law enforcement and court officials in the “How We Share Information” section of their privacy settings page. To respond to legal requests and prevent harm. We may disclose information pursuant to subpoenas, court orders, or other requests (including criminal and civil matters) if we have a good faith belief that the response is required by law. This may include respecting requests from jurisdictions outside of the United States where we have a good faith belief that the response is required by law under the local laws in that jurisdiction, apply to users from that jurisdiction, and are consistent with generally accepted international standards. We may also share information when we have a good faith belief it is necessary to prevent fraud or other illegal activity, to prevent imminent bodily harm, or to protect ourselves and you from people violating our Statement of Rights and Responsibilities. This may include sharing information with other companies, lawyers, courts or other government entities. 60 60 Facebook.com, Statement of Rights & Responsibilities, available at http://www.facebook.com/terms.php (last visited August 18, 2011). SOCIAL NETWORKING 39 CONCLUSION The ultimate question is whether our legal system should allow the use of evidence gathered from social networking and media websites. Although initially the Federal Rules of Evidence were not intended for the cybernetic age, we have found instances where they capably operate in conjunction with evidence found on social networking websites. “All evidence is subject to procedural laws and rules from the moment it is discovered until the moment it is entered into evidence at trial.” 61 By allowing evidence gathered from social networking websites and e-mail to be relevant and admissible in trial, do we find ourselves in breach of constitutional rights to privacy? “Modern privacy law holds that a reasonable expectation of privacy in a communication medium is a condition precedent to investing it with Fourth Amendment protection.” 62 Supreme Courts allows the discovery and presentation of relevant evidence in trial. Until the uncertainties on how to handle evidence gathered online become unquestionably resolved, the court must level the playing field for both the prosecution and defense. If it is permissible for law enforcement to conduct undercover investigations using evidence on social media websites, the same privilege should be granted to attorneys in court. With the benefits of online information come the risk of spoliation of digital media and the inadmissibility of evidence. The rapid communication these websites offer carry with a heavy price tag. “The cost of this 61 New Jersey Criminal Defense Lawyer, Text Messages, Facebook Photos, and Tweets as Criminal Evidence? available at http://www.mynewjerseydefenselawyer.com/text-messages-facebook-photos-and-tweets-as-criminalevidence/#more-94 (last visited August 15, 2011). 62 John S. Wilson, MySpace, Your Space, or Our Space? New Frontiers in Electronic Evidence, 86 Oreg. L. Rev. 1201, 1233 (2007-08) available at http://www.law.uoregon.edu/org/olr/archives/86/Wilson.pdf (last visited August 9, 2011). SOCIAL NETWORKING 40 freedom is qualified privacy, a cloverleaf intersection weaving electronic human activities with the law, and the unveiling of new avenues of investigation.” 63 The most effective way to incorporate this new evidence smoothly into our legal system is to construct a guideline, which follows our constitutionally instated rights to privacy. The progression of our nation's legal system should closely mirror our societal advancement to provide efficiency in justice. The Internet has existed for more than ten years, and yet, there remains a lack of credibility for evidence gathered from cyberspace. How long can we continue to ignore the substantial influence of both the Internet and social media in our lives and in our courtrooms? 63 Ken Strutin, Social Media and the Vanishing Points of Ethical and Constitutional Boundaries, 31 PACE L.REV. 228 (2011).