Richmond Journal of Law and Technology

The first exclusively online law review.

Blog: NCAA Getting Out of the Video Game Business?

By Kevin Conneran, Associate Staff

 

With the beginning of a new football season, every college football fan is acutely aware of the challenges that his or her school will face this season. However, more pressing than your school’s mid-October game against its in-state rival is the issue of player compensation.

 

The debate over compensation is nothing new in college sports. For years, there have been calls to more fairly compensate student-athletes. Is tuition, room, board, and books fair compensation for athletes who generate millions of dollars for their schools? South Carolina head football coach Steve Spurrier has been outspoken in his support for player compensation, stating that he wished he could give players a “piece of the pie” that they help create.[1]

 

The latest development that has reignited this debate is the 2009 lawsuit filed against the NCAA by former college basketball player Ed O’Bannon that has been joined by current and former football and basketball players. Detailed information on that lawsuit can be found here. The O’Bannon lawsuit takes aim at two major revenue sources for the NCAA and its member institutions both tied to player’s images and likeness: television revenue and video game licensing.[2]

 

In July, the NCAA announced that they would not renew its licensing agreement with EA Sports, maker of the NCAA College Football video game franchise.[3] The Pac-12, Big Ten, and the SEC have followed suit and announced that they will not be a part of the franchise moving forward.[4] While this may sound like a win for those championing reform in college athletics, the practical effect of these moves seems to be minimal. While the NCAA and major conferences have severed their ties with EA Sports, each university still has its own licensing agreements with EA Sports. According to industry sources, only one team that appeared in this year’s version of NCAA College Football will not appear in next year’s.[5]

 

It seems NCAA College Football has at least a few more years left in it. At the end of the day, colleges will continue to use players’ likeness without paying compensation until the threat of litigation becomes too onerous. Until then, college athletes will continue to play for tuition, room, board, and books. I’m sure Johnny Manziel is thrilled.

Blog: NSA Surveillance, the Boston Bombing, and Political Incentives

 

by Walton Milam, Associate Staff

 

The National Security Agency’s surveillance of domestic electronic communication has garnered much attention in recent months.  The NSA apparently has access to immense databases that the government claims will protect Americans from international and domestic terrorist threats.  While the extent of the NSA’s surveillance remains a mystery, the government clearly has the capability to collect data regarding personal communications.  Many opposed to the surveillance fear a slippery slope through which the NSA will eventually monitor individual electronic activity without end.  Some including the ACLU suggest monitoring phone calls, text messages, and email violates first amendment rights.  Supporters of the surveillance claim the data collection will be directed only at identifying and monitoring potential threats to United States.  These supporters include President Obama who claims the surveillance is “circumscribed, narrow system, directed at us being able to protect our people, and all of it is done under the oversight of the courts.”[1]

 

Regardless of the merits of those arguing for or against surveillance, it is likely that NSA surveillance is here to stay as public opinion and as a result politicians will favor homeland security above all else.  Homeland security, for better or worse, has emerged as a dogma in American politics that few politicians seeking reelection dare speak against.  In the wake of the Boston Bombing, where surveillance technology proved particularly helpful in catching the culprits, American sentiment is likely particularly favorable to increased surveillance.  Any politician who opposed NSA surveillance will almost assuredly be met with fear-mongering from opponents who will claim opposition to surveillance equals opposition to homeland security, a cardinal political sin.  At this point, all American voters will have lived through 9/11, the Boston Bombings, the Virginia Tech massacre, and the Sandy Hook school shooting. The vast majority is old enough to remember the Oklahoma City Bombing in 1995.  Thus, National Security remains at the forefront in voters’ minds. 

 

To wage successful campaigns, politicians must meet the demands of their constituents.  With national security such a prominent issue that politicians can ill-afford to oppose, it is unlikely that any substantial group of politicians will gain enough clout to create legislation ending the NSA’s surveillance.  Opponents of NSA surveillance thus likely stand the best chance of ending or limiting the surveillance in the courtroom.  A number of cases have already been filed.[2]  Major telecommunications companies have a dog in the hunt as their consumers may be upset with having data about their communications parlayed to the government.  These companies will likely be primary sponsors of lawsuits against the government seeking an injunction against the NSA’s continued surveillance.

 

While those opposing NSA surveillance have shout loudly and frequently make headlines on NPR, Fox, CNN, and NBC, it is likely these shouts will not be heard in the Capitol where politicians face major incentives to act like they care more about national security than individual rights that may or may not be infringed by NSA surveillance.


[1] http://www.theguardian.com/world/2013/jun/19/barack-obama-nsa-people-emails

[2] http://www.theguardian.com/world/2013/jul/17/nsa-court-challenges-tech-firms

Blog: I Just (Don’t) Want My MTV: VMA Performances Spark Movement for A La Carte Cable

 By:  Catherine Gray, Associate Staff 

 

            I admit it. I love the MTV Video Music Awards (VMAs). From Lil’ Kim’s seashell pasty in 1999 to Beyoncé announcing her pregnancy with Blue Ivy in 2011, the VMA’s always deliver just the right combination of crazy, ridiculous, and pure celebrity trash I’m looking for. Unfortunately this year, the event that should have taken the cake—the reunion of *NSYNC and the subsequent restoration of all my middle school hopes and dreams—was overshadowed by Miley Cyrus and her dancing teddy bears. In what can only be described as one of the most bizarre performances in VMA history, Hannah Montana twerked her way into homes across the country wearing nothing more than a spandex bikini.

            While I found this horrific and embarrassing display highly entertaining, I realize that others, particularly those individuals with young and impressionable children, might not find this to be quality broadcast. Moreover, I recognize that these parents might not want their children to have access to networks that offer this kind of programming. Indeed, in the aftermath of Miley’s attempt to prove to the world she’s a big girl now, the Parents Television Council pointed to her display of ‘creativity’ as a reason for Congress to pass the proposed Television Consumer Freedom Act.[1] The bill, introduced by Arizona Senator John McCain, would allow multi-channel distributors to provide video programming to subscribers on an individual, per channel basis.[2]

            Despite the somewhat suspect source of this movement—the Parents Television Council has a history of criticizing MTV programming for failing to adhere to family values—the appeal of the Television Consumer Freedom Act extends beyond parents who want to protect their children from the likes of Miley Cyrus’ foam finger.[3] Even those of us who gleefully tune in to the VMAs, Jersey Shore, and Teen Mom stand to benefit from being able to purchase programming on a per-channel basis. Cost-conscious consumers, instead of paying roughly $70, $80, or $90 a month for a Verizon FiOS package of assorted channels, would be able to select each channel they wish to subscribe to individually, creating a substantial reduction in cost.[4] Gone would be the days of subscribing to a bundled package, paying for channels you’d never watch to have access to ones you want. This option already exists with regard to premium channels such as HBO and Showtime, so why not extend individual subscriptions to basic network channels?[5]

The Television Consumer Freedom Act was referred to the Committee on Commerce, Science, and Transportation on May 9, 2013. [6] Although it has a slim chance of becoming enacted, the idea of a la carte cable has mainstream consumer appeal.[7] Lastly, just in case you’re interested, you can catch all the highlights from the 2013 VMAs here.


[1] Parents Television Council Blasts VMAs as Serving Sex to Teens, The Hollywood Reporter (Aug. 26, 2013), http://www.hollywoodreporter.com/live-feed/parents-television-council-blasts-mtvs-614448.

[2] Television Consumer Freedom Act of 2013, S. 912, 113th Cong. (2013).

[3] Parents watchdog group assailts [sic] content of MTV’s ‘Jersey Shore’ and other shows, NY Daily News (Dec. 7, 2011), http://www.nydailynews.com/entertainment/tv-movies/parents-watchdog-group-assailts-content-mtv-jersey-shore-shows-article-1.988095#ixzz2drd5h9Vc.

[4] TV PackagesFiOS TV Packages, Verizon, http://www.verizon.com/home/fiostv/tv-packages/ (last visited Sept. 3, 2013).

[5] Premium TV Channels – FiOS TV, Verizon, http://www.verizon.com/home/fiostv/tv-packages/#premiumchannels (last visited Sept. 3, 2013).

[6] Television Consumer Freedom Act of 2013 (S. 912), GovTrack.us, http://www.govtrack.us/congress/bills/113/s912 (last visited Sept. 3, 2013).

[7] Id.

Blog: Welcoming our Volume XX Associate Staff

by Benjamin Fox, Editor-in-Chief, Volume XX
 
It is my distinct honor to introduce the incoming staff members of Volume XX of the Richmond Journal of Law and Technology.  These students worked extremely hard during the journal competition, and we look forward to working with them during the upcoming school year!
 
Congratulations to the following students:

Billy Raska
Brittani Lemonds
Catherine Gray
Danielle Bringard
Dimitri Karles
Dylan Denslow
Emma Buck
Fiona Clancy
Jasmine McKinney
Jessica Ertel
Kevin Conneran
Kit Mathers
Laura Bedson
Matt Miller
Miles Jolley
Silvia Lee
Spencer Mead
Taylor Linkous
Walton Milam

Snapchat and Sexting: A Snapshot of Baring Your Bare Essentials

pdf_iconDownload PDF

Cite as: Nicole A. Poltash, Snapchat and Sexting: A Snapshot of Baring Your Bare Essentials, 19 Rich. J.L. & Tech. 14 (2013), available at http://jolt.richmond.edu/v19i4/article14.pdf. 

by Nicole A. Poltash*

 

I.  Introduction

[1]        The usurpation of personal pictures posted on social media websites is not uncommon.  Cheryl Smith was unknowingly made the face of a dating website.[1]  A headshot of popular blogger Sara Pinnix was used “to promote an overseas Tarot card reader named Cristal.”[2]  And eighteen-year-old Arielle Goldfinch’s pictures were used on Tagged, a website “aimed at meeting people for sexual relationships.”[3]  

[2]        Such potential for misuse is particularly unsettling in light of the fact that three hundred million photos are uploaded to Facebook every day.[4]  Yet a careful reading of Facebook’s privacy policy dispels any notion that information a person chooses to share will not be disclosed to anybody else—even if shared with only one friend.[5]  Communications can be disseminated “by the friends with whom [users] share it, or even by Facebook at its discretion.”[6]  Indeed, Facebook recently sent its users notice of a pending class action which claims that “Facebook unlawfully used the names, profile pictures, photographs, likenesses, and identities of Facebook users in the United States to advertise or sell products and services . . . without obtaining those users’ consent.”[7]

[3]        Enter Snapchat, a mobile phone application that sends self-destructing messages.[8]  The company touts: “[S]imply set the timer up to ten seconds and send.  [Recipients will] have that long to view your message and then it disappears forever.”[9]  And disappear it does.  “[T]he company deletes any videos or photos off its servers after the content has been viewed. . . . [T]he data is completely deleted and could not be recalled even if law enforcement came looking for [it].”[10]  Unsurprisingly, this has led to the use of Snapchat for sexting[11] since its launch in September 2011.[12]      

[4]        This comment explores sexting between minors and its inseparable link to Snapchat.  Part II provides background information on the practice and prevalence of sexting.  Part III explains the Snapchat application and its various uses.  Part IV discusses the implications of sexting, legal and otherwise.  Part V examines how Snapchat directly conflicts with current law.[13]  Lastly, Part VI proposes possible solutions.

 

II.  Background

[5]        Sexting has been defined as “[t]he practice of sending or posting sexually suggestive text messages and images, including nude or semi-nude photographs, via cellular phones . . . or over the Internet.”[14]  Typically, a person takes a digital photo of himself or herself and sends it via mobile phone as a text message.[15]  Children as young as twelve years old have engaged in the practice.[16]

 [6]       Between 2004 and 2009 the portion of teenagers[17] who owned cell phones increased from forty-five to seventy-five percent.[18]  Of those teens, four percent admitted to having sent a sext to another person and fifteen percent said they had received a sext of someone they know.[19]  Those figures nearly parallel the percentage of adults who have sent and received sexts,[20] and have increased significantly since 2009.[21]

[7]        A 2012 survey of over six hundred private high school students revealed that nearly twenty percent of students had sent a sext via cell phone, and nearly twice as many had received a sext.[22]  Over a third of those who had sent a sext had done so “despite believing that there could be serious consequences.”[23]  More than a quarter had forwarded a sext that they had received to others.[24]

[8]        The National Campaign to Prevent Teen and Unplanned Pregnancy sponsored a similar survey of 1,280 teenagers and young adults, which largely uncovered the same figures.[25]  Nearly twenty percent of teenagers found nothing wrong with text messages containing images of full nudity, while forty percent considered being topless acceptable.[26]  In addition, “[s]ending and posting nude or semi-nude photos or videos starts at a young age and becomes even more frequent as teens become young adults.”[27]

[9]        Sexting itself is strongly linked to sexual behavior.[28]  According to the Archives of Pediatrics and Adolescent Medicine, “[a]bout 77% of girls aged 14 to 19 who had sent a sext reported having had intercourse, compared with 42% of those who hadn’t sexted.  For boys, 82% of those who had sexted had had sex, while 46% of non-sexters had done so.”[29]  Finally, girls who sext are also more likely to engage in unsafe sex.[30] 

 

III.  Snapchat

A.  Application, Terms, and Loopholes

[10]      Snapchat was born in the spring of 2011 in a Kappa Sigma fraternity house.[31]  Stanford alum Bobby Murphy and Stanford dropout Evan Spiegel created the picture and video messaging application as a project for a product design class.[32]  The company’s description of the application, which is rated for users twelve and older, is short:

Snapchat is the fastest way to share a moment with friends.  You control how long your friends can view your message—simply set the timer up to ten seconds and send.  They’ll have that long to view your message and then it disappears forever.  We’ll let you know if they take a screenshot!  Build relationships, collect points, and view your best friends.  Snapchat is instantly fun and insanely playful.  Show your friends how clever you can be and enjoy the lightness of being![33]

[11]      Once Snapchat is downloaded from Apple’s iTunes or Google Play, a user must register a username and set a password.[34]  Snapchat then “accesses your contacts on your cell phone to load friends to the application, or you can add other friends beyond your contact list.”[35]  After two users approve each other, they can begin messaging.[36]

[12]      Pictures and videos are sent the same way: “by taking the picture or video, setting a timer from 1-10 seconds for the content to disappear after the user opens it, and sending it to another user.”[37]  Messages can be sent to one or more persons at a time.[38]  But with pictures, there are  additional options; they can be edited with captions or doodles, saved to a user’s phone, or uploaded directly to Instagram.[39]  Snapchat also tracks who each person messages, creating a “best friends” group for those messaged most,[40] with the top three people listed in order on each user’s public Snapchat profile.[41]

[13]      What makes the application so unique, however, is what happens to messages after they are viewed.  Pictures and videos sent via Snapchat are not just deleted from the recipient’s phone, but also from Snapchat’s network.[42]  “[T]he company deletes any videos or photos off of its servers after the content has been viewed. . . . [T]he data is completely deleted and could not be recalled even if law enforcement came looking for the information.”[43] 

[14]      But Snapchat does not and cannot entirely live up to this claim, giving users a false sense of security.  Indeed, the company’s privacy policy acknowledges a
s much:

Although we attempt to delete image data as soon as possible after the message is received and opened by the recipient . . . we cannot guarantee that the message contents will be deleted in every case. . . . Messages, therefore, are sent at the risk of the user.[44]          

[15]      There are additional loopholes.  For example, recipients can simply take a screenshot of the message, although this will notify the sender.[45]  Alternatively, recipients can take a picture of their phone, thereby circumventing the screenshot notification.  Even then, a more complicated approach exists.  “Snapchat saves [videos] on the phone’s local memory, which you can then recall by installing a file browser, such as iFunBox, and plugging the phone into a computer.  You then search through the file browser, copy and save the content to a computer, and you’re done.”[46]

[16]      Nevertheless, Snapchat has risen rapidly in popularity since its launch in September 2011.[47]  By the end of December 2012, the application was being used fifty million times a day,[48] up from thirty million in November and ten million in October.[49]  In 2012 alone, more than five billion messages were sent through Snapchat.[50]  In February 2013, the application “was the second-most popular free photo and video app for the iPhone . . . just behind YouTube and ahead of Instagram.”[51]  Snapchat is especially popular among individuals under twenty-five, and in December 2012 the company received eight million dollars from Benchmark Capital, the financial backer behind Instagram.[52] 

[17]      The application’s success has led other companies to copy the concept.[53]  In December 2012, for example, Facebook created the Poke app, which allows users to “send self-destructing photos, videos, and Facebook messages.”[54]  Unlike Snapchat, however, Facebook “keeps data you’ve deleted for a certain amount of time on its servers.”[55]  The new Facebook application has been largely unsuccessful, even being derided as “an obvious ripoff,” and appears to have launched Snapchat to new heights.[56]

 

 B.  Uses

[18]      Snapchat is meant to bring fun and spontaneity back into the digital world.  “People are living with this massive burden of managing a digital version of themselves,” co-founder Evan Spiegel explained.[57]  “It’s taken all of the fun out of communicating.”[58]  The application gives users a strong sense of inconsequentiality to their actions, enabling them to take “the ugliest, silliest, most compromising photos they want.”[59]  But emphasis should be placed on compromising.  The company’s deletion of messages from its servers has led to a widespread alternative use for Snapchat: sexting.[60]

[19]      Snapchat has been recognized as a sexting application since its inception.[61]  Because messages are ultimately deleted from the company’s servers, Snapchat has even been dubbed “the greatest tool for sexting since the front-facing camera.”[62]  The New York Times put it aptly: “All of this sexting . . . creates an opening for technology that might make the photos less likely to end up in wide circulation.  This is where a free and increasingly popular iPhone app called Snapchat comes in.”[63] 

[20]      Spiegel is unpersuaded, saying, “I’m not convinced that the whole sexting thing is as big as the media makes it out to be. . . . I just don’t know people who do that.  It doesn’t seem that fun when you can have real sex.”[64]  Yet the application is rated for users twelve years of age and older due, in part, to “suggestive themes” and “mild sexual content or nudity.”[65]

[21]      Proof of Snapchat’s use for sexting is found in “Snapchat Sluts,” a website featuring photos of naked women that were taken using Snapchat.[66]  The website was created in early December 2012 by party photographer Kirill Bichutsky and was “born from an open call for submissions posted on Bichutsky’s Twitter account.”[67]  All participants submitted pictures willingly and were over eighteen.[68]  The photos have since been removed, but the website clearly demonstrates that Snapchat “is being used in ways not intended by its creators.”[69]

[22]      Snapchat is also used for other improper purposes, such as for “crude drawings” and “to flaunt underage drinking.”[70]  In addition, “a growing number of teens [are] using Snapchat for cheating on tests.”[71] 

 

IV.  Implications of Sexting

A.  Legal Implications

[23]      In New York v. Ferber, the Supreme Court held that “[s]tates are entitled to greater leeway in the regulation of pornographic depictions of children.”[72]  Because the child pornography laws of most states classify a child as someone under the age of eighteen, a teenager who sexts may commit four different crimes: solicitation, production, distribution, and possession of child pornography.[73]  In effect, such laws criminalize a large fraction of American teenagers’ behavior.

[24]      The nature of sexting, however, makes “typical legal questions about the action, the actors, and the consequences difficult if not impossible to answer.”[74]  Thus state legislatures, while not ignoring the problem, have been slow to make progress.[75]  States have taken a variety of approaches to regulating teenagers who sext.[76]  Vermont, for example, created a total exception for consensual sexting between teenagers of specific ages.[77]  Vermont Senate Bill 125 amended child pornography laws to exclude persons “less than 19 years old, [when] the child is at least 13 years old, and the child knowingly and voluntarily and without threat of coercion used an electronic communication device to transmit an image of himself or herself to the person.”[78]

[25]      Other states established entirely new sex offender laws in response to sexting.  In February 2012, South Dakota criminalized a minor’s intentional creation, transmission, possession, or distribution of “any visual depiction of a minor in any condition of nudity . . . or involved in any prohibited sexual act.”[79]  With the exception of two affirmative defenses, any violation constitutes the offense of juvenile sexting, which is a class one misdemeanor.[80]

[26]      Diversionary programs are an alternative approach.  New York Assembly Bill 8131 “[d]irects the attorney general to establish a 2 year juvenile sexting and cyberbullying education demonstration program in not less than 3 counties as a diversionary program for persons under 16 who have engaged in cyberbullying or sexting, in lieu of juvenile delinquency or criminal proceedings.”[81]

[27]      Many state laws, however, do not adequately address the problem of sexting and how to punish it.  Illinois’ sexting law, for example, does not punish persons who repeatedly request sexts nor does it provide persons who receive unwanted sexts with a means to stop the sender.[82]  Further, the law fails to “go far enough to punish minors who recklessly send sext images on to unintended third parties and . . . to prevent the images from being created in the first place.”[83]  

[28]      In those states without  sexting laws, prosecutors are left to follow the laws already in place.  These laws are “mainly child pornography or obscenity laws, and some legislators have followed in turn with sex offender punishment guidelines. . . . [A] conviction . . . could result in teens being labeled sex offenders and subject to lifetime registration and reporting requirements.”[84]

[29]      Section 2256(8) of the Protection of Children Against Sexual Exploitation Act of 1977, for example, provides that child pornography “is any visual depiction of sexually explicit conduct when the visu
al depiction is a digital image, computer image, or computer-generated image of a minor engaging in sexually explicit conduct.”[85]  Although many sexts do not fall within the purview of “sexually explicit,”[86] teenagers across the United States have been charged with child pornography offenses.[87]  Such teenagers may face a difficult choice: “either mount a case-by-case ‘as applied’ challenge to a prima facie valid law (and risk decades in jail) or plead guilty to a lesser charge.”[88]

 

B.  Non-Legal Implications

[30]      Sexting also has non-legal implications, such as damaging careers and future job prospects.[89]  “According to a recent survey by Microsoft, 75 percent of U.S. recruiters and human-resource professionals report that their companies require them to do online research about candidates, and many use a range of sites when scrutinizing applicants—including. . . photo- and video-sharing sites.”[90]  Further, “[s]eventy percent of U.S. recruiters report that they have rejected candidates because of information found online.”[91]

[31]      More importantly, the distribution of pictures and videos depicting juveniles engaged in sexual activity is “intrinsically related to the sexual abuse of children” in two notable ways.[92]  “First, the materials produced are a permanent record of the children’s participation and the harm to the child is exacerbated by their circulation.  Second, the distribution network for child pornography must be closed if the production of [such] material   . . . is to be effectively controlled.”[93]

[32]      Sexting may also lead to bullying.[94]  Eighteen-year-old Jessica Logan of Cincinnati, for example, was harassed after an ex-boyfriend forwarded nude pictures of her to other high school girls.[95]  A few months later, Logan took her own life.[96]

 

V.  Conflicts with the Law

[33]      With all the risks associated with the application’s improper use, Snapchat has added limited liability and indemnification clauses.[97]  Its limitation of liability states, in relevant part, that the company will not be held liable for any damages resulting from “the conduct of other users of the application, even if Snapchat has been advised of the possibility of such damages.  You assume total responsibility for your use of the application.”[98]

[34]      Damages aside, Snapchat itself may be illegal because it functions as a distribution network for child pornography.  The Supreme Court has held that a state’s interest in “safeguarding the physical and psychological well-being of a minor” is “compelling.”[99]  “A democratic society rests, for its continuance, upon the healthy, well-rounded growth of young people into full maturity as citizens . . . .”[100]  Accordingly, the Court has “sustained legislation aimed at protecting the physical and emotional well-being of youth even when the laws have operated in the sensitive area of constitutionally protected rights.”[101]

[35]      One concern articulated in Ferber applies directly to teen sexting: the creation of a “permanent record.”[102]  As explained in Osbourne v. Ohio, “pornography’s continued existence causes the child victims continuing harm by haunting the children in years to come.”[103]  This “haunting” presupposes underlying sexual abuse, but abuse is not required:

[P]ornography poses an even greater threat to the child victim than does sexual abuse or prostitution.  Because the child’s actions are reduced to a recording, the pornography may haunt him in future years . . . . A child who has posed for a camera must go through life knowing that the recording is [or could be] circulate[ed] . . . .[104]

[36]      Similarly, “it is the fear of exposure and the tension of keeping the act secret that seems to have the most profound emotional repercussions.”[105]  Sexting itself is also harmful to teenagers.[106]  These harms justify the suppression of self-made pornography, even if it interferes with teenagers’ interest in expressing themselves as they wish. 

[37]      In practice, however, courts treat sexting differently than traditional child pornography.  Between 2008 and 2009, for example:

nearly 3,500 cases of sexual images produced by teens came to the attention of law enforcement agencies in the U.S. . . . . Two-thirds of these cases, however, had “aggravating” factors — such as involvement of an adult or use of the images by a teen to harass, bully or intimidate the victim.  Teens were arrested in 18% of cases where there was no aggravating factor, and registration as a sex offender occurred in only 10 cases, nine of which involved actual sexual assault . . . .[107] 

Forty-five-year-old Randy T. Davis Jr., by contrast, was sentenced to almost fourteen years in federal prison for downloading traditional child pornography from the Internet. [108]

[38]      Even if sexting by minors is distinguishable from traditional child pornography,[109] it is still illegal under prima facie valid law.[110]  Snapchat’s self-destructing messages make users feel immune from repercussions.  This has encouraged and led directly to the application’s widespread use for sexting.  Thus, Snapchat is “directed to inciting or producing imminent lawless action and is likely to incite or produce such action.”[111] 

[39]      But the application adds an additional layer of complexity.  Because Snapchat deletes photos and videos from senders’ phones, recipients’ phones, and its servers,[112] there is no “permanent record of the children’s participation.”[113]  On the one hand, Snapchat functions like contraception, protecting teenagers who are going to sext regardless of the consequences.[114]  On the other hand, it is used to both distribute child pornography and destroy the evidence.

[40]      Once deleted from Snapchat’s network, messages cannot be recovered, putting them beyond the reach of any subsequent investigation.[115]  Thus, short of real-time interception by law enforcement, Snapchat’s use deprives victims of recourse, even when aggravating factors are present.[116] 

[41]      Such aggravating factors are becoming increasingly common.  One reason is trends like “revenge porn,” in which males post naked pictures of their ex-girlfriends online to websites such as PinkMeth.[117]  Again, these harms greatly outweigh the benefits of freely taking “the ugliest, silliest, most compromising photos.”[118]

 

VI.  Conclusion

[42]      All states should create educational programs for teenagers about sexting.[119]  These programs should be taught using “gist”-based reasoning because “teens who are taught to focus on potential catastrophic, negative outcomes, rather than the odds, make fewer risky [ ] decisions.”[120]  These outcomes should include, among other things, bullying and career implications.  The curriculum can be incorporated into both Family Life Education and rehabilitation programs.

[43]      In addition, applications such as Snapchat must be made less readily available to minors.  Accordingly, Snapchat should be restricted to adults age eighteen and older, and the application’s content rating should be changed on Apple’s iTunes and Google Play.  As to the former, Snapchat should implement a customer protection block until a user confirms that he or she is eighteen years of age or older.[121]  As to the latter, a changed rating will put parents on alert on the front end, decreasing the need to look through their children’s phone records to unearth red flags. 

[44]      States should also pass legislation imposing fines on minors who use Snapchat.[122]  Authorities can uncover the age and identity of many Snapchat users simply through their usernames: “[s]ince Sn
apchat presents itself as private—basically offline—many people use the same username as they use for other social media accounts. . . . [A] quick Google search of [people’s] usernames pulled their Instagram and Twitter accounts right up.”[123]  A user’s operation of the application can then be monitored in part through his or her public Snapchat profile.[124]  Over time, such fines would reduce Snapchat’s network effect and use amongst minors.[125]

[45]      Alternatively, Snapchat could be ordered to implement nudity detection software such as Snitch[126] or PORNsweeper.[127]  Such software searches files “for the color of human pigmentation in the pixels, since nude or pornographic images contain more skin pixels than other images where skin is present.”[128]  This would detect most sexts, though the software may also flag “[b]aby pictures and pictures of people on vacation at the beach . . . because they contain large amounts of skin.”[129]

[46]      Once a message is flagged as containing nudity, Snapchat can do one of three things: delete the message, pixelate the message, or forward the message to authorities.[130]  Of these three options, deletion is the most practical.[131]  Moreover, deletion would allow teenagers to continue to use Snapchat while simultaneously reducing its ability to be used for sexting.[132]

[47]      In conclusion, many legislatures are failing to keep pace with sexting amongst minors.  The legal implications are problematic, and are only compounded by applications like Snapchat.  The above steps to prevent the baring of one’s bare essentials via Snapchat are not exclusive or exhaustive.  But they are steps in the right direction.


* B.S. Commerce and B.A. German Language and Literature, University of Virginia, J.D. Candidate, University of Richmond School of Law.  I would like to thank Michael Poltash, Spencer Martin, and Tina Hoellerer for the invaluable roles they played in the publishing of this comment.

 

[1] Riva Richmond, Can You Protect Your Image While on Facebook?, N.Y. Times (July 24, 2009, 7:17 PM), http://gadgetwise.blogs.nytimes.com/2009/07/24/can-you-protect-your-image-while-on-facebook/; Lee Mathews, Facebook Sez, “Don’t Mind Us, We’re Just Whoring Out Your Photos”, Huffington Post Tech (July 16, 2009, 9:00 PM), http://downloadsquad.switched.com/2009/07/16/facebook-sez-dont-mind-us-were-just-whoring-out-your-photos?icid=sphere_blogsmith_inpage_downloadsquad.

[2] David Griner, Mom Blogger Shocked to See Her Photo in Ad for Spanish Psychic, Adweek (Nov. 12, 2012, 9:23 AM), http://www.adweek.com/adfreak/mom-blogger-shocked-see-her-photo-ad-spanish-psychic-145134.

[3] Chloe Johnson, Teen’s Pictures Stolen for Site, New Zealand Herald (Dec. 8, 2012, 5:30 AM), http://www.nzherald.co.nz/nz/news/article.cfm?c_id=1&objectid=10852809.

[4] Casey Chan, What Facebook Deals with Everyday: 2.7 Billion Likes, 300 Million Photos Uploaded and 500 Terabytes of Data, Gizmodo (Aug. 22, 2012, 10:30 PM), http://gizmodo.com/5937143/what-facebook-deals-with-everyday-27-billion-likes-300-million-photos-uploaded-and-500-terabytes-of-data.

[5] Data Use Policy, Facebook (Dec. 11, 2012), http://www.facebook.com/full_data_use_policy (“[I]nformation you share on Facebook can be re-shared.  This means that if you share something on Facebook, anyone who can see it can share it with others.”).

[6] McMillen v. Hummingbird Speedway, Inc., No. 113-2010 CD, 2010 Pa. Dist. & Cnty. Dec. LEXIS 270, at *7  (Pa. Cnty. Ct. 2010).

[7] Christina Warren, Facebook Starts Sending Out Notices for Sponsored Stories Settlement, Mashable (Jan. 3, 2013), http://mashable.com/2013/01/03/facebook-settlement-email/; Kashmir Hill, Yes, That Legal Notice You Got From Facebook Is Real, Yahoo Fin. (Jan. 28, 2013), http://finance.yahoo.com/news/yes–that-legal-notice-you-got-from-facebook-is-real-190343914.html.

[8] See generally Snapchat, Inc., Snapchat: Description, Google Play (Dec. 17, 2012), https://play.google.com/store/apps/details?id=com.snapchat.android.

[9] Id.

[10] Meghan Kelly, Sorry, Guys—Snapchat Videos Can be Saved (Updated), Venture Beat (Dec. 28, 2012, 7:52 AM), http://venturebeat.com/2012/12/28/save-snapchat-content/.

[11] See Nick Bilton, Disruptions: Indiscreet Photos, Glimpsed Then Gone, N.Y. Times (May 6, 2012, 5:24 PM), http://bits.blogs.nytimes.com/2012/05/06/disruptions-indiscreet-photos-glimpsed-then-gone/ (“All of this sexting . . . creates an opening for technology that might make the photos less likely to end up in wide circulation.  This is where a free and increasingly popular iPhone app called Snapchat comes in.”); see also Kate Knibbs, What’s So Special (and So Dangerous) About Snapchat, Digital Trends (Dec. 12, 2012), http://www.digitaltrends.com/mobile/whats-so-special-and-so-dangerous-about-snapchat/ (noting Snapchat is “the greatest tool for sexting since the front-facing camera”).

[12] See, e.g., J.J. Colao, Snapchat: The Biggest No-Revenue Mobile App Since Instagram, Forbes (Nov. 27, 2012), http://www.forbes.com/sites/jjcolao/2012/11/27/snapchat-the-biggest-no-revenue-mobile-app-since-instagram/.

[13] Snapchat touches many areas of law, including intellectual property, contract, tort, and constitutional law.  The scope of this Comment is limited to Snapchat’s relationship to sexting.

[14] Complaint 7, Miller v. Skumanick, 605 F. Supp. 2d 634 (M.D. Pa. 2009) (No. 3:09cv540).

[15] See id. ¶¶ 8-9.

[16] Sexting Occurring as Young as 5th Grade (CBS television broadcast Aug. 1, 2012), available at http://health.usnews.com/health-news/articles/2012/09/17/health-buzz-sexting-teens-more-likely-to-have-risky-sex.

[17] A teenager has been defined as a person between the ages of twelve and seventeen.  See Amanda Lenhart et al., Teens, Adults & Sexting: Data on Sending & Receipt of Sexually Suggestive Nude or Nearly Nude Images by American Adolescents & Adults, Pew Internet & Am. Life Project 1, 2 (Oct. 23, 2010), available at http://www.pewinternet.org/Presentations/2010/Oct/Teens-Adults-and-Sexting.aspx.

[18] Id. at 3.

[19] Id. at 6.

[20] Six percent of adults have sent a sext and fifteen percent of adults have received a sext.  Id. at 7.

[21] Cf. id. at 3.

[22] Donald Strassburg & Valoree Dowell, U Study Finds ‘Sexting’ More Common Among Teens Than You Might Think, U News Center: The U. of Utah (June 14, 2012), http://unews.utah.edu/news_releases/u-study-finds-sending-sexually-explicit-photos-by-cell-phone-more-common-among-teen-than-you-might-think/.

 

[23] Id.

[24] Id.

[25] See Cosmogirl.com & The Nat’l Campaign to Prevent Teen and Unplanned Pregnancy, Sex and Tech, Results from a Survey of Teens and Young Adults 1-2 (2008), available at http://www.thenationalcampaign.org/sextech/pdf/sextech_summary.pdf [hereinafter Cosmogirl Survey].  This survey defines a teenager and young adult as ages 13-19 and 20-26, respectively.  Id. at 1.

[26] Glenda Cooper, Sexting: A New Teen Cyber-Bullying ‘Epidemic’, The Telegraph  (Apr. 12, 2012), http://www.telegraph.co.uk/technology/facebook/9199126/Sexting-a-new-teen-cyber-bullying-epidemic.html.

[27] Cosmogirl Survey, supra note 25, at 1.

[28] Laura McMullen, Health Buzz: Sexting Teens More Likely to H
ave Risky Sex
, U.S. News & World Rep. Health (Sept. 17. 2012), http://health.usnews.com/health-news/articles/2012/09/17/health-buzz-sexting-teens-more-likely-to-have-risky-sex.

[29] Maia Szalavitz, Nearly 1 in 3 Teens Sext, Study Says. Is This Cause for Worry?, Time (July 2, 2012), http://healthland.time.com/2012/07/02/nearly-1-in-3-teens-sext-study-says-is-this-cause-for-worry/?.

[30] See id. (including unprotected sex, more sexual partners, and using drugs or alcohol before sex); see also McMullen, supra note 28. 

[31] Felix Gillette, Snapchat and the Erasable Future of Social Media, Bus. Wk. (Feb. 7, 2013), available at http://www.businessweek.com/articles/2013-02-07/snapchat-and-the-erasable-future-of-social-media.

[32] Colao, supra note 12.

[33] Snapchat Inc., supra note 8; iTunes Preview: Snapchat, Apple, https://itunes.apple.com/us/app/snapchat/id447188370?mt=8 (last visited Mar. 28, 2013).

[34] Wayne Parker, Snapchat – A Popular App for Teens but with a Dark Side, About.com, http://fatherhood.about.com/od/fathers-social-media/p/Snapchat.htm (last visited Mar. 26, 2013).

[35] Id.

[36] J.J. Colao, Snapchat Adds Video, Now Seeing 50 Million Photos a Day, Forbes (Dec. 14, 2012), available at http://www.forbes.com/sites/jjcolao/2012/12/14/snapchat-adds-video-now-seeing-50-million-photos-a-day/ (“The update introduces a new ‘friending’ process that requires users to approve each other before exchanging photos.”) .

[37] Billy Gallagher, Snapchat Releases Video Sharing, Is Prototyping Monetization Features (Oh, and It’s Still Not for Sexting), TechCrunch (Dec. 14, 2012), http://techcrunch.com/2012/12/14/snapchat-does-video/. 

[38] Joey Creighton, What Is Snapchat?, Infospace (Nov. 29, 2012), http://infospace.ischool.syr.edu/2012/11/29/what-is-snapchat/.

[39] Id.

[40] Id.

[41] Katie Notopoulos, The Snapchat Feature That Will Ruin Your Life, BuzzFeed  (Dec. 2012), http://www.buzzfeed.com/katienotopoulos/the-snapchat-feature-that-will-ruin-your-life.

[42] Kelly, supra note 10.

[43] Id; see also How Snaps Are Stored and Deleted, Snapchat (May 9, 2013, 7:23 P.M.), blog.snapchat.com (“When a snap is viewed and the timer runs out, the app notifies our servers, which in turn notify the sender that the snap has been opened.  Once we’ve been notified that a snap has been opened by all of its recipients, it is deleted from our servers.  If a snap is still unopened after 30 days, it too is deleted from our servers.”).

[44] Privacy Policy, Snapchat, http://www.snapchat.com/privacy (last updated Feb. 20, 2013).

[45] Id.

[46] Kelly, supra note 10 (“A hole in its iPhone version . . . lets you grab video content before it’s viewed.”); see also Katie Notopoulos, How Anybody Can Secretly Save Your Snapchat Videos Forever, BuzzFeed (Dec. 27, 2012, 6:22 PM), http://www.buzzfeed.com/katienotopoulos/how-anybody-can-secretly-save-your-snapchat-videos (providing the exact steps on how to save Snapchat videos).

[47] Colao, supra note 12.

[48] Our Biggest Update Yet: v4.0 Phantom!, Snapchat (Dec. 14, 2012: 12:54 PM), blog.snapchat.com/post/37898594536/our-biggest-update-yet-v4-0-phantom; Laurie Segall, Snapchat’s ‘Disappearing’ Videos Don’t Actually Vanish, CNN Money (Dec. 28, 2012, 3:27 PM),  http://money.cnn.com/2012/12/28/technology/security/snapchat-security-flaw/index.html.

[49] Colao, supra note 12.

[50] Willard Foxton, Revenge Porn and Snapchat: How Young Women Are Being Lured into Sharing Naked Photos and Videos With Strangers, The Telegraph (Feb. 13, 2013), http://blogs.telegraph.co.uk/technology/willardfoxton2/100008808/revenge-porn-and-snapchat-how-young-women-are-being-lured-into-sharing-naked-photos-and-videos-with-strangers/.

[51] Gillette, supra note 31.

[52] Knibbs, supra note 11.

[53] Jared Keller, Facebook’s Poke Is a Wild Success—for Rival Snapchat, Bus. Wk. (Dec. 28, 2012), available at http://www.businessweek.com/articles/2012-12-28/facebooks-poke-is-a-wild-success-for-rival-snapchat.

[54] Id.

[55] Meghan Kelly, This Snapchat Video Will Destruct in 5… 4… 3… 2… Haha Took a Screenshot, VentureBeat (Dec. 14, 2012, 2:53 PM), http://venturebeat.com/2012/12/14/snapchat-video/.

[56] Keller, supra note 53.

[57] Colao, supra note 12.

[58] Id.

[59] Id.

[60] See generally Billy Gallagher, No, Snapchat Isn’t About Sexting, Says Co-Founder Evan Spiegel, Tech Crunch (May 12, 2012), http://techcrunch.com/2012/05/12/snapchat-not-sexting/.

[61] See, e.g., Kashmir Hill, ‘This Sext Message Will Self Destruct in Five Seconds, Forbes (May 7, 2012, 12:51 PM), http://www.forbes.com/sites/kashmirhill/2012/05/07/

fantastic-theres-a-quick-erase-app-for-sending-your-nude-photos/; Katie Heaney, Snapchat Adding Video To Allow Longer Sexts, BuzzFeed (Dec. 14, 2012, 12:54 PM), http://www.buzzfeed.com/katieheaney/snapchat-adding-video-to-allow-longer-sexts.

[62] Knibbs, supra note 11.

[63] See, e.g., Bilton, supra note 11.

[64] Gallagher, supra note 60 (internal citations omitted).

[65] iTunes Preview: Snapchat, Apple, https://itunes.apple.com/us/app/snapchat/id447188370?mt=8 (last visited Mar. 28, 2013).

[66] See Max Read, ‘Snapchat Sluts’ Shows Why Snapchat Isn’t the Consequence-Free Sexting App We’d All Hoped For, Gawker (Dec. 10, 2012, 6:30PM), http://gawker.com/5967303/snap

chat-sluts-shows-why-snapchat-isnt-the-consequence+free-sexting-app-wed-all-hoped-for (describing Snapchat as “a new way for teens to send each other nudes”); Andrew Couts, Terms & Conditions: Snapchat’s Privacy Policy Has Too Many Secrets, Digital Trends (Dec. 16, 2012), http://www.digitaltrends.com/mobile/terms-conditions-snapchat/.

[67] ‘Snapchat Sluts’ Hit the Internet on New Website, The Inquisitr (Dec. 11, 2012), http://www.inquisitr.com/433154/snapchat-sluts-hit-the-internet-on-new-website/.

[68] Id.

[69] Id.; see also Couts, supra note 66.

[70] Grace Jensen, Snapchat Screenshots Reveal Teens Acting Like Teens, BuzzFeed (Dec. 3, 2012, 5:02PM), http://www.buzzfeed.com/googlegracie/snapchat-screenshots-reveal-teens-acting-like-teen-7d2i.

[71] Snapchat: Online Photos that Self-Destruct, Your Teen for Parents (Mar. 25, 2013), http://yourteenmag.com/2013/snapchat-teens-photos/ (“Students quickly take pictures of their test answers and snapchat it to other students in the class.”).  On the extreme end, Snapchat could also be used in the commission of crimes and terrorism.

[72] 458 U.S. 747, 756 (1982).

[73] Carrie L. M. Thompson, Let’s Talk About Sext: Illinois’ Legislative Response to Sexting, 24 DCBA Brief 22, 22-23 (2011); see, e.g., Child Pornography, 720 Ill. Comp. Stat. 5/11-20.1(a) (2009).

[74] Thompson, supra note 73, at 23.

[75] Cf. 2012 Sexting Legislation, Nat’l Conf. of St. Legislatures (Dec. 14, 2012), http://ncsl.org/issues-research/telecom/sexting-legislation-2012.aspx.

[76] See generally id.

[77] S. 125, 2009 Leg., Reg. Sess. (Vt. 2009), available at http://www.leg.state.vt.us/docs/2010/Acts/ACT058.pdf.

[78] Id.

[79] S. 183, 2012 Leg., 87th Sess. (S.D. 2012), available at http://legis.state.sd.us/sessions/2012/Bill.aspx?File=SB183P.htm.

[80] Id.  (“It is an affirmative defense to the offense of juvenile sexting that the minor has not solicited the visual depiction, that the minor does not subsequently distribute, present, transmit, post, print, disseminate, or exchange the visual depiction, and that the minor deletes or destroys the visual depiction upon receipt.  It is an affirmative defense . . . that the visual depiction is of a single minor, created by that minor, who does not subsequently distribute, present, transmit, post, print, disseminate, or exchange the visual depiction.”).

[81] See Assemb. B. No. A08131, 2011 Leg., Reg. Sess. (N.Y. 2012), available at http://assembly.state.ny.us/leg/?default_fld=&bn=A08131&term=2011&Summary=Y&Text=Y.

[82] See Thompson, supra note 73, at 25.

[83] Id.

[84] Id. at 22-23.

[85] Isaac A. McBeth, Prosecute the Cheerleader, Save the World?: Asserting Federal Jurisdiction Over Child Pornography Crimes Committed Through “Sexting”, 44 U. Rich. L. Rev. 1327, 1330 (2012).

[86] “Sexually explicit conduct includes (1) all forms of sexual intercourse (including oral or anal) where the genitals, breasts, or pubic area of any person is exhibited; (2) bestiality; (3) masturbation; (4) sadistic or masochistic abuse; and (5) lascivious exhibition of the genitals or pubic area.”  Id.

[87] See, e.g., John A. Humbach, ‘Sexting’ and the First Amendment, 37 Hastings Const. L.Q. 433, 433-35 (2010) (“Two Florida teenagers took over one hundred photographs of themselves engaging in unspecified but lawful ‘sexual behavior.’  The two were subsequently charged with ‘promoting a sexual performance of a child,’ a second degree felony under Florida law . . . . In Ohio, a fifteen-year-old girl used her cell phone to send nude photos of herself and was charged with ‘illegal use of a minor in nudity-oriented material.’ . . . Factual situations like these are not isolated.”).

[88] Id. at 451.

[89] See Jeffrey Rosen, The Web Means the Ending of Forgetting, N.Y. Times (July 21, 2010), http://www.nytimes.com/2010/07/25/magazine/25privacy-t2.html?pagewanted=all&_r=0.

[90] Id.

[91] Id.

[92] New York v. Ferber, 458 U.S. 747, 759 (1982).

[93] Id.

[94] See Cooper, supra note 26.

 [95] Mike Celizic, Her Teen Committed Suicide Over ‘Sexting’, Today (Mar. 6, 2009, 9:26 AM), http://today.msnbc.msn.com/id/29546030/ns/today-parenting_and_family/t/her-teen-committed-suicide-over-sexting/#.UN8jHInjn_V; Phuong Ly, The Lowdown on Sexting, GreatSchools, http://www.greatschools.org/parenting/behavior-discipline/2079-sexting.gs (last visited June 3, 2013).

[96] Id.

[97] See Terms of Use, snapchat, www.snapchat.com/# (last updated Feb. 20, 2013) (under the “Terms” tab).

[98] Id.

[99] Globe Newspaper Co. v. Superior Court, 457 U.S. 596, 607 (1982).

[100] Prince v. Massachusetts, 321 U.S. 158, 168 (1944).

[101] New York v. Ferber, 458 U.S. 747, 757 (1982) (denying child pornography films constitutional protection); see also FCC v. Pacifica Found., 438 U.S. 726, 749-50 (1978) (holding that the government’s interest in the youths’ well-being justified special treatment of indecent broadcasting received by both adults and children); Prince, 321 U.S. at 167-70 (holding valid a statute prohibiting the use of a child to distribute literature on the street despite its effect on a First Amendment activity).

[102] 458 U.S. at 759; see also Ashcroft v. Free Speech Coal., 535 U.S. 234, 249 (2002).

[103] 495 U.S. 103, 111 (1990).

[104] Ferber, 458 U.S. at 759 n.10 (quoting David P. Shouvlin, Preventing the Sexual Exploitation of Children: A Model Act, 17 Wake Forest L. Rev. 535, 545 (1981)).

[105] Ulrich C. Schoettle, Child Exploitation: A Study of Child Pornography, 19 J. Am. Acad. Child Psychiatry 289, 292 (1980)).

[106] See supra Part IV.B.

[107] Szalavitz, supra note 29.

[108] Man Gets Nearly 14 Years for Downloading Child Porn, Journal Star (Jan. 10, 2013, 9:30 PM), http://www.pjstar.com/news/x1671799911/Man-gets-nearly-14-years-for-downloading-child-porn.

[109] See Szalavitz, supra note 29 (“In an adolescent period characterized by identity development and formation, sexting should not be considered equivalent to childhood sexual assault, molestation and date rape.”).  See generally, Humbach, supra note 87 (arguing that sexting and autopornography should not be categorically excluded from First Amendment protection).

[110] See, e.g., Child Pornography, 720 Ill. Comp. Stat. 5/11-20.1(a) (2009);

S. 125, 2009 Leg., Reg. Sess. (Vt. 2009), available at http://www.leg.state.vt.us/docs/2010/Acts/ACT058.pdf.  As noted previously, sexting may induce four different crimes: solicitation, production, distribution, and possession of child pornography. 

[111] Ashcroft v. Free Speech Coal., 535 U.S. 234, 253 (2002) (citing Brandenburg v. Ohio, 395 U.S. 444, 447 (1969) (per curiam)).

[112] Kelly, supra note 10.

[113] New York v. Ferber, 458 U.S. 747, 759 (1982).

[114] See Nicholas Carlson, Sexting with Snapchat, Teenagers Prove They Aren’t as Dumb as We Thought, Bus. Insider (Dec. 31, 2012, 8:25 AM), http://www.businessinsider.com/sexting-with-snapchat-teenagers-prove-they-arent-as-dumb-as-we-thought-2012-12.

[115] Kelly, supra note 10.

[116] Szalavitz, supra note 29.  This is also true in cases involving an adult who sexually exploits a minor.  For example, someone can set up a group to which persons subscribe via their Snapchat username.  These users are then sent multiple, short child pornography videos. 

[117] Foxton, supra note 50 (“[H]osted in the US, [sites like PinkMeth] are protected by laws which state that companies cannot be prosecuted for user-generated content. Only the (usually anonymous) individual who posted the pictures can be fined.  So, if the woman wanted her pictures removed from the site, she would have to work out who shared her pictures, then prosecute them. The site owners won’t lift a finger—and they are making millions of dollars from young women’s pain.”).

[118] Colao, supra note 12.

[119] The primary purpose of this comment is to draw attention to the legal issues Snapchat poses.  This section introduces possible solutions to the sexting problem, but is not intended to be exclusive or exhaustive.

[120] Maia Szalavitz , Why the Teen Brain Is Drawn to Risk, Time (Oct. 2, 2012), http://healthland.time.com/2012/10/02/why-the-teen-brain-is-drawn-to-risk/.

[121] Practically speaking, a customer protection block is unlikely to have a great impact on restricting Snapchat’s use by minors.

[122] The fines should be significant enough to act as a deterrent, but not so substantial that parents must come to their child’s assistance in paying them (i.e., minors will pay the fines using their own money).  

[123] Notopoulos,
supra
note 41.

[124] This also eliminates the need for real-time interception and monitoring of the messages.

[125] Network Effect, Investopedia, http://www.investopedia.com/terms/n/network-effect.asp#axzz2IHv0IokI (last visited Mar. 29, 2013) (network effect is “a phenomenon whereby a good or service becomes more valuable when more people use it”).

[126] Snitch, Hyperdyne Software, http://www.hyperdynesoftware.com (last visited Mar. 20, 2013).

[127] Software Blocks Nudity: Content Technologies’ Software Detects Nude Photos on E-Mails, Blocks E-Mails, CNN Money (Sept. 20, 2000, 12:41 PM), http://money.cnn.com/2000/09/20/technology/porn_sweep/.

[128] Id.

[129] Id.

[130] Only one of the alternatives should be implemented, and once implemented should be automatic. 

[131] Notifying authorities would have the most profound impact, but also carries the risk of tying up valuable executive and judicial resources.  Pixilation is similar to deletion, but pixilated messages may still possess an allure similar to sexts.

[132] The implementing of nudity detection software would interfere with adults’ right to use Snapchat for sexting, but this comment does not address that issue.

No Implied Effect: The “Safe” FCC Cell Phone Radiation Standard and Tort Immunity by Implied Conflict Preemption

Information Governance: It's a Duty and It's Smart Business

Blog: Social Media Files and the Stored Communications Act

By:  Adam Young, Associate Survey and Symposium Editor

 

            We, as a society, have entered into an era in which electronic communications has become the preferred way of communicating with friends, co-workers and loved ones.  A recent study has shown that Americans spend over 20% of their online time on social networking sites alone.[1]  Although the majority of social networking sites originated as those where you could find friends, they have exploded into increasingly complex sites.  Most social networking sites, today, allow users to upload photographs and videos, post status updates, comment on friends’ posts, play games, send messages to other users and even tag themselves at specific places where they have been.  As these sites have become more popular, the number of users and the amount of content shared has increased significantly.  For example, Facebook has one billion active users as of October 2012.[2]  604 million of those monthly users use Facebook mobile products, making social networking even more convenient for, and pervasive in, people’s lives. [3]

 

            As technology advances over time, it forces all professional fields, specifically that of the law, to keep up with it.  One way in which the law is struggling to understand the changes in technology is the discoverability of social media files.  As Americans share more personal information on social networking sites, lawyers are increasingly turning to these social networks as resources when confronted with litigation.  Social media are not just limited to certain types of litigation – they can be found in various litigated issues.

 

            Social media differ from other media outlets and websites that one might mistake them for being.  Unlike traditional media outlets like newspapers, television, or books, social media’s distinctive characteristic is ease of access.  While it takes significant effort to publish a magazine or broadcast a television program, social media allow users to publish content for wide distribution at little to no cost.  Additionally, social media are different from typical websites.  Unlike a website that can be accessed simply by entering a URL, the information on social networks is not always public because users have power to control access to the content that they publish.  This notion of privacy is not only present in the mind of a social media user.  The companies that own social networking sites are concerned about the privacy of the user as well, which creates the problems lawyers face in the discovery process of social media files.  Many social media providers, as well as other holders of electronic communications, refuse to produce the content of electronic communications of their users based upon the SCA.

 

            The SCA was enacted as Title II of the Electronic Communications Privacy Act (“ECPA”).[4]  Part of the reason why the act was adopted was to address privacy concerns created by the rise of new technologies that the Fourth Amendment might not be able to adequately address.  In passing the SCA, Congress hoped to “protect privacy interests in personal and proprietary information” that may be stored online.[5]  At the time in which the SCA was passed, internet users were very limited to what they could do.  Therefore, the language of the SCA does not take into account advanced technology due to the very limited version of the internet that existed in 1986.  Since there have been no updates to this piece of legislation, courts have struggled on how to apply it as the internet continues to grow.

 

            There is a mixture of cases supporting the protection of social media sites under the SCA and those that choose to ignore the SCA completely.  The prominent case that supports protection under the SCA comes from the U.S. District Court for the Central District of California.[6]  The Crispin court walked through the language of the SCA and considered what could be protected (putting emphasis on security settings) with regards to each aspect of social media information that was to be discovered (wall posts, private messages, etc.)  The other line cases, that disregard the SCA, allow overbroad discovery requests and subsequently fail to explain why the SCA does not protect any of the information contained in the requests.

 

            With some viewing the currently unrevised SCA as falling into antiquity, many questions remain as to how to apply it to cases involving technologically advanced companies.  Social networking sites present one of the largest challenges for courts to tackle when it comes to apply the SCA.  Because social media providers continue to raise the SCA as a defense to third party subpoenas, courts cannot ignore the SCA forever.  In coming years, many courts will have to address whether the SCA actually offers protection to social media providers from third party subpoenas.


[1] What Americans Do Online:  Social Media and Games Dominate Activity, Neilson Wire (Aug. 2, 2010), http://blog.nielsen.com/nielsenwire/online_ mobile/what-americans-do-online-social-media-and-games-dominate-activity.

[2] Statistics, Facebook, http://www.facebook.com/press/info.php? statistics (last visited Jan. 20, 2013).

[3] Id.

[4] Pub. L. No. 99-508, 100 Stat. 1848 (1986).

[5] S. Rep. No. 99-541, at 3 (1986).

[6] Crispin v. Christian Audigier, Inc., 717 F. Supp. 2d 965 (C.D. Cal. 2010).

Databases Lie! Successfully Managing Structured Data, the Oft-Overlooked ESI

pdf_iconDownload PDF

Cite as: Conrad Jacoby, Jim Vint & Michael Simon, Databases Lie! Successfully Managing Structured Data, The Oft-Overlooked ESI, 19 RICH. J.L. & TECH 9 (2013), available at http://jolt.richmond.edu/v19i3/article9.pdf.

 

By Conrad Jacoby,* Jim Vint,** & Michael Simon***

 

[1]        Legal professionals regularly advise clients to ensure that the storage, retention, and accessibility of their Electronically-Stored Information (“ESI”) is in full compliance with all legal and regulatory requirements in the event this information becomes relevant in civil, criminal, or regulatory disputes.  However, what many practitioners may not realize is that the ESI that clients are required to produce for e-discovery includes both “unstructured” and “structured” data.  Searching and producing only one of these types of ESI may well not fully satisfy a client’s full discovery obligations.  Even worse, it might not present a full understanding of the factual issues in the matter and how to best prove them to the legal team.

 

I.  What Is “Structured Data?”

[2]        Most legal professionals are extremely familiar with “unstructured” or “loose” data, even if they do not necessarily know it by these terms.  Simply put, unstructured data refers to e-mail messages, word processing documents, spreadsheets, and presentations, among other things—in other words, human-readable information that is commonly sought as potentially relevant ESI in discovery.[1]  Structured data, on the other hand, refers to information residing in electronic repositories or silos, such as transactional and financial databases.[2]  Unlike unstructured data, which typically exists as static and self-contained files that are preserved, collected, processed, reviewed, authenticated, and admitted into evidence as stand alone documents, structured data exists as segments of information inside a larger system, one that is often quite complex and contains many parts.[3]  A database record, the closest analog that structured data has to a “document,” may not actually exist until a user performs some action through the database system to assemble a number of separate fields that could reside in many different parts of the system.  For this reason, information stored in a database cannot be placed into a standard e-discovery review system that has been optimized to view and categorize unstructured data.

[3]        The ESI stored in databases and other structured data repositories is every bit as relevant and discoverable as the loose files that are more commonly requested.  Federal Rule of Civil Procedure (“FRCP”) 34 is clear and unambiguous on this point:

Rule 34.  Producing Documents, Electronically Stored Information, and Tangible Things, or Entering onto Land, for Inspection and Other Purposes

(a) In General.  A party may serve on any other party a request within the scope of Rule 26(b):

(1) to produce and permit the requesting party or its representative to inspect, copy, test, or sample the following items in the responding party’s possession, custody, or control:

(A) any designated documents or electronically stored information—including writings, drawings, graphs, charts, photographs, sound recordings, images, and other data or data compilations—stored in any medium from which information can be obtained either directly or, if necessary, after translation by the responding party into a reasonably usable form[.][4]

[4]        Unlike the discovery of unstructured data, for which a number of best practices have emerged, it has been difficult for the legal industry to develop best practices for the treatment of structured data in civil discovery due to the vast diversity of size, scope, and features found in different database systems.  The Sedona Conference®, a non-partisan legal think-tank founded in 1997, formed a group in early 2009 to study the issues surrounding the discovery of structured data—culminating in the publication of The Sedona Conference® Database Principles Addressing the Preservation and Production of Databases and Database Information in Civil Litigation (hereinafter the “Sedona Database Principles”) in April 2011.[5]  The Sedona Database Principles expand upon the original publication, The Sedona Principles: Best Practices Recommendations & Principles for Addressing Electronic Document Production (hereinafter the “Sedona Principles”),[6] as they specifically apply to databases and set out six additional precepts that provide practical suggestions for simplifying the discovery of structured data and clarifying the obligations of both the requesting and producing parties.[7]  An overarching theme of the Sedona Database Principles is that better communication between parties, their legal advisors and agents, and information technology professionals will substantially improve the management of this type of specialized ESI in legal disputes.[8]  To that end, the Sedona Database Principles specifically reference many of the precepts of the Sedona Principles that address and encourage cooperation between the parties.[9]

 

II.  How Does Structured Data Become Relevant?

[5]        Databases frequently record historical transactions and information that is relevant in litigation and investigations.  One would certainly expect that enterprise-level systems like Oracle and SAP, not to mention financial and transactional systems, human resource tracking systems, data warehouses, and content management systems (“CRM”), would all contain structured data.  However, other commonly used systems, including Cloud-based “Software-As-A-Service” (“SaaS”) systems, also feature the same back-end structured data systems as more obvious “database” systems.  Thus, structured data has largely replaced loose documents for tracking information for these and other similar functions: accident/incident reporting systems, call center records and associated data analytics, world wide web servers, point of sale systems, and social media.

[6]        The cumulative volume of data in business-related structured data repositories is immense and is projected to grow at an estimated annual rate of nearly twenty percent.[10]  Perhaps even more important to e-discovery practitioners, a recent survey about the state of discovery in civil litigation has shown that e-mail, the central focus of e-discovery requests for over fifteen years, is no longer the leading requested item.[11]  Instead, database and application data are now more often requested.[12]

[7]        An increasing number of litigation disputes involving “high profile” companies have made demands upon litigants to review, disclose, and produce at least portions of their databases.  Several examples are explored below.

[8]        The plaintiffs in In re eBay Seller Antitrust Litigation, an antitrust class action, sought production of transactional data from defendant eBay.[13]  The court granted the motion in part and eBay objected, claiming that the information sought did not already exist in easily compiled form, requiring eBay “to spend hundreds of thousands of dollars to dedicate a highly specialized engineering resource for a period of more than six months to create new data
” solely for the matter.[14]  However, eBay’s own submissions in support of the objection contained three different estimates, ranging from a low of $179,000 to a high of $300,000.[15]  Moreover, eBay’s employee in charge of data warehouse development declared that the provided estimate could vary “by as much as five hundred percent.”[16]  The court first disposed of eBay’s argument that it could not be required to create anything new, finding that FRCP 34(a)(1)(A) supported the magistrate’s finding that the technical burden of creating the new material did not excuse production.[17]  In light of the hundreds of millions of dollars at stake in the action involving a defendant with billions of dollars in annual gross profits, and considering that the magistrate had already scaled back the scope of discovery, the court found no clear error in the magistrate’s determination that the potential costs and technical requirements were not unduly burdensome.[18]

[9]        In another case, a plaintiff injured by a sink that fell from a high storeroom shelf sought production of the database that the defendant, Lowe’s, used to record and track accident and injury claims.[19]  The trial court ordered Lowe’s to present a witness with knowledge and access to the system and to print out all requests for accidents occurring before the date of the plaintiff’s injury.[20]  Notably, Lowe’s objected that: (1) it had already produced a printout from the database of all falling merchandise claims for its stores within the state for the last five years; (2) the remaining portions of the database were not relevant; (3) the manner in which accident information was gathered and stored was a trade secret; (4) the purpose of the database was not for safety-related information; and (5) there was no way to restrict production of privileged or non-relevant information.[21]  The appellate court agreed with Lowe’s in part and limited the plaintiffs from accessing data without limitation as to time, place, or subject matter.[22]

[10]      In Procter & Gamble v. Haugen a plaintiff appealed from the dismissal of his Lanham Act and tortious interference claims which resulted in part from the court sanctioning it for failing to preserve relevant database information.[23]  Procter & Gamble (“P&G”) claimed that agents of a competitor spread false rumors that the company supported Satanism, using the profits from forty-three products to do so.[24]  P&G and its expert witnesses used the services of a third party vendor, Information Resources Incorporated (“IRI”), to track potential lost sales of the forty-three involved products.[25]  IRI used a database that gathered purchase information from retail stores into electronic market share databases.[26]  IRI’s databases stored data on a “rolling” basis so that data was kept only for a period of time before it was deleted from the system to make room for more data.[27]  Defendants requested production of all of the information that P&G used from the IRI databases and when P&G was unable to produce all of this information, the court found that P&G had spoliated the data and dismissed the matter as a sanction.[28]  On appeal, P&G focused on the fact that it was only a subscriber to the IRI database, did not own or control the system, and therefore could not have practicably provided the information to defendants.[29]  P&G could have provided direct access to the system to defendants, but this would not have covered all of the information they sought.[30]  P&G would have had to pay over thirty million dollars to obtain all of the information from IRI and even if it had, it would not have had sufficient storage capacity for the data.[31]  The court of appeals found that the district court had failed to address the fact that P&G did not “possess” the data and along with the defendants’ failure to prove prejudice, reversed the sanctions order.[32]

[11]      In another case involving a Lanham Act claim, a plaintiff sought discovery about the defendants’ sales of an alleged infringing product. [33]  One of those defendants, Wal-Mart, responded with 1,771 pages of Bates-stamped documents that represented a print-out of the tabular view of the raw data within its sales database.[34]  Plaintiff claimed that the printouts, with line item data arranged by columns and UPC codes, was “indecipherable” and thereby an insufficient response.[35]  The court was “convinced” that Wal-Mart’s burden in deriving the information from the database was “significantly less” than on the plaintiff since Wal-Mart controlled the system.[36]  For this reason, the court granted plaintiff’s motion to compel a more sufficient response from Wal-Mart.[37]

[12]      Finally, in an Americans with Disabilities Act claim, the Equal Employment Opportunity Commission (“EEOC”) sought to compel production of portions of the human resources database of a Supervalu and Jewel-Osco, major national food retailers.[38]  The EEOC originally sought broad production of information from the human resources database, but narrowed its requests after a meet and confer session to employee hiring, transfer, and termination records, along with job postings for the subject time period.[39]  The EEOC premised its request on the defendants’ own FRCP 30(b)(6) testimony that “this sort of analysis could be completed” and that defendants’ “types of database are designed for this sort of production at minimal expense.”[40]  Defendants first claimed that they did not have the particular database tool activated in their system to allow them to provide the information requested by the EEOC.[41]  Defendants then objected to the scope and burden of the request, claiming that the information would cover over 180 locations and 100,000 employees (when there were only 108 claimants) and that it would take their IT personnel over a week to write the code necessary to obtain the data.[42]  The court found that the EEOC had not established that the relevance or benefit of the information outweighed the burden and expense of producing it and thus denied the motion to compel.[43]

 

III.  Can a Party Wait to Deal with Structured Data until that Information Has Been Requested?

[13]      The information contained in databases can make the difference between winning and losing a case.  The Sedona Database Principles makes this statement as a matter of
plain fact: “Information contained in databases may be the best source for establishing certain facts in a legal dispute.  Information stored in this format also may be useful, if not essential, for analyses such as sorting, calculating, and linking to answer quantitative questions presented in a case.”[44]

[14]      It is a simple matter to move from the abstract language of the Sedona Database Principles to concrete situations.  Unstructured data, particularly e-mail, instant messages (“IM”), and typical “office” documents (i.e., Microsoft Word, Excel, and PowerPoint) provides evidence of the communication of activities—who knew what and when.  People will write e-mail and text messages to others concerning what they did.  Similarly, they will draft documents to memorialize actions that they have taken.  In contrast, the structured data in transactional and financial databases provides direct evidence of the action—how, how much, and how often.  The financial system will show that money was moved and the time and accounts involved.  A transactional application will record the supervisor’s approval of the money transfer.  Thus, the database systems provide a way to “follow the money” and recreate what happened, even if the communications record is incomplete or, in the case of fraud or shady dealing, deliberately obscured.  For this reason, some have called structured data “forgotten data”—“perhaps the single biggest missed opportunity for de
fense in e-discovery.”[45]

 

IV.  Planning for Discovery of Structured Data

[15]      Databases, especially major, enterprise, or department-level systems, are often highly complex and highly customized.  The discovery of structured data typically requires specific expertise with experience in deciphering data structures, relationships, and connections to other systems.  The Sedona Database Principles is filled with warnings about the need for expert assistance,[46] and it likens the act of trying to handle discovery requests involving structured data without such knowledge as “akin to seeing a thousand-piece jigsaw puzzle without an illustration that shows the final completed puzzle.”[47]

[16]      Seeking information stored in structured data repositories also requires more planning—and often more efforts at cooperation between the parties—than traditional e-discovery.  Parties that do not meet and confer before commencing structured data requests may well find that the court sends them back to square one.[48]  Many reasons exist for this heightened need for additional proactive planning and discussion, but none may be more pressing than the fact that downstream production requirements will control the early stage EDRM work conducted in Preservation, Collection, and Processing, and even potentially as far back as the critical Identification phase of e-discovery.

[17]      It should come as no surprise that the Sedona Database Principles places particular emphasis on one of the core principles from the original Sedona Principles:

Sedona Principle 3: The Early “Meet and Confer”

“Parties should confer early in discovery regarding the preservation and production of electronically stored information when these matters are at issue in the litigation and seek to agree on the scope of each party’s rights and responsibilities.”

Sedona Principle 3 is especially applicable in the context of database discovery because of the complicated technical and logistical questions raised by the storage of information in databases.  Database discovery may entail some of the most expensive and complex discovery in a litigation matter, and meaningful conversations between the parties early in the litigation can substantially reduce confusion and waste of resources.[49]

[18]      Challenges to the discovery of information stored in structured data repositories can occur from both opposing parties and litigants.  Many of the solutions for best using data from databases require the creation of a new view or analysis that differs from the way that the information is used in the ordinary course of business.  Responding to structured data requests is likely to require new reports, new extracts directly from the systems, or even entirely new systems to analyze data.  Attorneys are often not comfortable with this process, especially since information about how these new views of structured data were created may have to be disclosed to the other side if challenges arise as to the adequacy of the proffered discovery response.  Thus, it is critical to complete a full and frank discussion, between all stakeholders—each side and each role (Legal, IT, outside expert)—that clearly sets out all expectations before any work begins.

[19]      The first issue that practitioners are likely to confront during the e-discovery process involves the specific elements that will be extracted from the database.  In some situations, it may be necessary to preserve and collect elements that would not normally be considered “content,” such as reports, formulas, pick lists, reports, queries, and the like.[50]  For example, FLSA class action litigation often revolves around issues of how companies determined which employees were exempt from overtime and which were non-exempt; formulas within the HR and payroll systems applying these standards become critical.[51]  Fraud cases that center around who knew what and when could require the recreation of standard reports and views that were used at the time of the alleged suspicious activity.[52]  Such elements will almost certainly require rigorous preservation and collection methods, such as a complete database copy or a restored full back up, as outlined below.

[20]      In most cases, practitioners will need to focus solely on database content: the fields and records.  With this approach, legal teams must anticipate potential issues as they either use or produce this information.  Concerns include: (1) a need for completeness and usability of the data set; (2) availability of the data and technical feasibility of any planned search and retrieval Methods; and (3) cost.  Each concern is explored in turn below.

A.  A Need for Completeness and Usability of the Data Set

[21]      The fact that some of the data within a database may be relevant does not mean that the entire database must be produced.  Sedona Database Principle 1: Scope of Discovery clearly speaks to this point: “Absent a specific showing of need or relevance, a requesting party is entitled only to database fields that contain relevant information, not the entire database in which the information resides or the underlying database application or database engine.”[53]

[22]      Will legal teams require a complete set of data or merely an extensive subset of potentially relevant records?  For a small subset of data, a surgical approach will likely suffice.  However, if a complete dataset will be required for further analysis, the scope of database preservation, collection, and production will be much more extensive.  Date ranges for activity or database information creation may be helpful at this stage.

[23]      Does the team require a picture of the information present at a particular point in time?  If so, a snapshot of the data or the system will likely accomplish these objectives.  To create a historical record, a trend line, or to illustrate changes over time, more comprehensive preservation and collection will be required.

B.  Availability of the Data and Technical Feasibility of any Planned Search and Retrieval Methods

[24]      Structured data systems have a variety of capabilities and technical capacity.  Many of the older legacy systems can be very limited in how one can manipulate and export data.  Thus, before making any plans—or worse, commit to a regulator or the other side in litigation as to a methodology or deliverable data—it is critical to determine whether the target system includes the necessary capabilities.  The answer to this question will vary by the circumstances of each case, but some of the questions highlighted in Comment 2B of the Sedona Database Principles[54] provide a good starting point:

Can a user run searches within the system, other than those built specifically for the intended business uses of the database?[55]

Will the searches bring back complete information (i.e., all the requested data)?[56]

Is there information stored outside of  fielded tables?[57]

Does the producing party have custody and control of the database, such that it can access the “back end” of the system to export data, create custom reports, or otherwise access the system outside of normal business use?[58]

Does the system support third party tools that might be more efficient at querying the data?[59]

Does the system have reporting capabilities?[60]

Does the system support the creation of custom reports?

[25]      The answers to these and other questions will directly impact the extent to which a case team can preserve, collect, and ultimately produce the data stored w
ithin a database system.  It is crucial that qualified personnel correctly provide this essential foundational information.  It may be necessary to support such statements with documented expert evidence.  Given a lesser evidentiary showing, the courts have shown little sympathy for such claims, particularly when made by sophisticated corporations.[61]

C.  Cost

[26]      Structured data discovery has the potential to be more costly than “standard” requests.  It is imperative that parties have a strong understanding of the potential costs associated with structured data discovery.  Courts have become particularly sensitive over recent years to knee-jerk undue burden and cost claims under FRCP 26(b)(2)(B) that lack concrete documented support.[62]  This concern is yet one more reason why retaining experienced experts, who can attest to costs encountered in similar situations, may be critical to adequately educate both courts and requesting parties.

 

V.  Handling Structured Data within the EDRM

[27]      The Electronic Discovery Reference Model (“EDRM”) has come to provide an industry-accepted workflow for e-discovery across the litigation lifecycle.  Discovery of structured data can generally proceed within the EDRM framework, though a number of modifications may be required because of the unique requirements inherent in handling this type of ESI.  Virtually all structured data projects will require the application of an IT concept known as “ETL,” which is the acronym for Extract, Transform, and Load.  A good working definition for ETL is:

ETL is short for extract, transform, load, three database functions that are combined into one tool to pull data out of one database and place it into another database.  [Extract] is the process of reading data from a database.  [Transform] is the process of converting the extracted data from its previous form into the form it needs to be in so that it can be placed into another database.  Transformation occurs by using rules or lookup tables or by combining the data with other data.  [Load] is the process of writing the data into the target database.[63]

[28]      ETL is required in e-discovery for the simple reason that most business-oriented database systems (e.g., Peoplesoft, Cognos, Oracle Financials, specialized procurement software, and SQL databases) are designed to meet specific business needs and do not inherently “speak” to each other.  Hence, ETL permits different data formats to be assimilated or aggregated in a unified source for analysis.  This saves time querying multiple databases in various coding languages to try to quantify an impact, establishing relationships with the data across systems, and providing meaningful results to counsel and client.

[29]      For structured data, a typical workflow involves an ETL overlay of several EDRM phases, beginning with Identification and typically running through Preservation and Collection, and at times into the Processing phase.  This process is illustrated in the figure reproduced in the Appendix.

A.  Identification

[30]      The Identification phase for structured data is likely to require substantially more experience than it normally would for unstructured data systems.  Large-scale enterprise database systems, such as Oracle, SAP and PeopleSoft, are highly complicated and customized, requiring advisors with specialized expertise to understand them.  This complexity may even be considered a trade secret and thus protected by the software vendor.[64]  Even small-scale systems as simple as Microsoft Access databases are often customized and connected to other systems in ways that are both unexpected and poorly documented.  Older structured data repositories that fall into the categories of legacy data, obsolete hardware, and retired systems may present particular concerns since the documentation that existed at one time may no longer be available or accurate.  Further, the employees who created and maintained these systems may be long gone from the company, having taken with them any institutional knowledge about these systems.

[31]      For all of the above reasons, Sedona Principle 6: Responsibilities of Responding Parties is particularly applicable to and significant for the discovery of structured data.  Sedona Principle 6 reads: “Responding parties are best situated to evaluate the procedures, methodologies, and technologies appropriate for preserving and producing their own electronically stored information.”[65]  The Sedona Database Principles further apply this guidance to the discovery of structured data in Database Principle 2: Accessibility and Proportionality, which states: “Due to the differences in the way that information is stored or programmed into a database, not all information in a database may be equally accessible, and a party’s request for such information must be analyzed for relevance and proportionality.”[66]

[32]      However, the fact that a producing party is generally better situated to evaluate methodologies and burdens does not mean that the responding party can and should examine and evaluate such information unilaterally.  In accord with the Sedona Database Principles’ focus on cooperation between the parties, Database Principle 3: Use of Test Queries and Pilot Projects recommends that the parties work together, starting with the sharing of database and system documentation or even going so far as to create test queries and pilot projects.  It states: “Requesting and responding parties should use empirical information, such as that generated from test queries and pilot projects, to ascertain the burden to produce information stored in databases and to reach consensus on the scope of discovery.”[67]

[33]      Key goals in the identification phase should include:

Determining which systems are likely to include data that might need to be used or produced;

Establishing the current status and availability of the data, such as whether it is still within live data systems, in legacy systems, in archives, on backup media, offline, legacy or retired systems;[68]

Locating the data, as many database systems have parts spread out among many physical locations, often in remote server farms or co-location facilities;[69]

Ascertaining who controls those systems (a vendor, such as SalesForce or other third party, rather than the client/litigant, may actually have possession and day-to-day control over the database itself);

Understanding the functional purpose of those systems, both for which they were created and potentially for any later purpose or purposes for which they may be currently used;[70]

Determining the capabilities and limitations of the current system or media holding the data—an important step that will set practical boundaries for how data can be preserved, collected and processed;

Assessing the costs and burdens of obtaining—and if necessary restoring—the data from its current storage repository; and

Evaluating the potential benefit of obtaining the data.

[34]      Data flow and entity relationship diagrams can be particularly useful in tracking down database connections, assuming the company has taken the time to create such documentation.  This documentation augments the more technical documentation involved with data mapping and a data dictionary or schema.  Data mapping, which is a list of how enterprise systems interconnect (sometimes prepared as a list, but sometimes created as an actual graphical map),[71] can make the difference between the success and failure of the project.  Structured data systems connect to other systems within
the enterprise, often to many systems and in surprising ways.  Missing those connections can mean missing necessary inputs, outputs, and related or relevant data.

[35]      A data dictionary or schema shows the type of data that is in a system, how it is organized and named, and the relationships between that data as it sits in fields and tables.[72]  Since structured data systems are often complicated and expensive, these tools tend to have long lives and may have changed purpose or focus over time.  As it can be burdensome to modify an underlying data table structure, newer data may be stored in repurposed fields or tables that may not be properly named or intended for the current use.  Such informal modifications are rarely fully documented unless a conscious (and recent) effort has been made to build a schema.  However, as underscored by Comment 1B of the Sedona Database Principles, data that could initially appear to be irrelevant may in fact be relevant because of its relationship and connection to other data fields.[73]  Thus, it is no surprise that the Sedona Database Principles propose that the responding party has a duty to provide the requestor with the information needed to convey a “basic understanding” of the database system.[74]

[36]      A final challenge in the identification phase is that the most common users of these structured data systems, the end-users or “customers” who query the substantive information stored in the database, are unlikely to be experienced IT professionals.  These users rarely have the time, knowledge, or ability to wade through technically confusing scenarios that a legal case team may pose.  A case team must take this into account and plan to interview a mix of end-users and database-knowledgeable IT professionals in order to build a reasonable understanding of a complex structured data repository in active use.

B.  Preservation and Collection

[37]      One of the most troubling aspects of e-discovery is that ESI has a tendency to disappear unless properly preserved.  Backup tapes get recycled, e-mail servers are purged of ex-employee accounts, and hard drives from the laptops of ex-employees are reformatted and reused.  Depending on the specific system at issue, some structured data repositories may be even worse in this regard.  While much unstructured data is lost due to human action, certain types of common structured data systems are specifically designed to eliminate or overwrite data regularly and automatically, without anyone’s direction or oversight.

[38]      These repositories stand in contrast to databases comprised of historical information, such as customer relationship management systems, complaint or incident databases, and financial systems used to determine trends, which are typically designed to log all inputted information.  In these systems, where one of their intended uses is long-term “data mining” for analytical purposes, the danger that information will disappear is appreciably less.

[39]      High volume transactional systems tend to overwrite data or regularly purge old data as the need for historical data is often limited and the volume of data that would build up over time would become prohibitively expensive to store.[75]  This problem is well known and the drafters of the 2006 FRCP Amendments who added the rules on ESI specifically noted that “many database programs automatically create, discard, or update information” and “that suspending or interrupting these features can be prohibitively expensive and burdensome.”[76]  Thus, practitioners assisting in a matter that touches these types of data systems will need to act quickly to preserve this type of system to avoid being left with incomplete data or none at all.[77]

[40]      Another unique wrinkle to the discovery of structured data is that the lines between the Preservation and Collection phases tend to blur.  For structured data, the information that is preserved is often exactly what is collected.  Most unstructured formats include potentially responsive files that are moved from at-risk locations (laptop hard drives, USB flash drives, unsecured network file stores, e-mail inboxes, etc.) to secure, locked down media or formats, pending further analysis.  In contrast, non-purging structured data typically needs to be collected from the underlying system to be preserved.  Thus, an already deadline-intensive e-discovery process can become more fraught with difficult-to-make and far-ranging early decisions.

[41]      It is important, however, to reemphasize that the fact that a database contains relevant information does not mean that the entire system must be locked down under a legal hold.  Sedona Conference Principle 5: Duty of Preservation places a practical limit on the expectations of the parties: “The obligation to preserve electronically stored information requires reasonable and good faith efforts to retain information that may be relevant to pending or threatened litigation.  However, it is unreasonable to expect parties to take every conceivable step to preserve all potentially relevant electronically stored information.”[78]  Thus, parties can use a number of different methods to collect and preserve structured data; the choice will be driven not by the impossible expectation of perfection, but by the circumstances of the case and the project scope questions previously discussed in “Planning for Discovery of Structured Data.”[79]  Each of these collection methodologies has advantages and disadvantages.  Improperly applied, some methodologies have the potential to harm the information integrity of the underlying database and therefore, need to be used carefully or may need to be discussed more fully with the requesting party before moving forward.

1.  Forensic Collection of the Live Database

[42]      Some disputes may require preservation and production of a complete copy of the database system.  For example, this may be necessary where questions exist about the integrity or functionality of the database as a whole or if there is a need to manipulate the data in some way other than just as a historical record.

[43]      Collecting an entire database has some advantages, such as in situations where the complete dataset or evidence must be preserved.  This method presents the path of least resistance to key issues of data verification and authentication in that data can be verified through MD5 or SHA-1 hash codes to authenticate it as the basis for its admissibility as factual evidence.  Complete collection also presents the safest route against spoliation as any changes to a database in active service will not impact the version that was collected and is now out of tinkering hands.

[44]      That said, copying an entire structured data repository also has disadvantages when compared to other information collection methodologies.  The first disadvantage is cost.  Unless the system is small (e.g., desktop computer-based), the sheer size of a data repository may require large amounts of storage media, significant IT investment, and costly disruption to corporate operations.  In addition, accessing a collected data repository may require building a comparable hardware and software environment to load, search, and otherwise manipulate the data.  Enterprise-level infrastructure for this task is likely to be quite costly, even on a short-term leased basis.  For older legacy systems, it might not even be possible to copy the system and even if were possible, duplicating the computer systems on which the information resides might have long become unavailable.  Contractual rights may prevent this collection methodology.  In the case of databases accessed over “the Cloud,” copying the database as a whole is strictly forbidden both by license and deliberately-created technical constraints.[80]

[45]      It is im
portant to note that the preservation and collection of an entire database is rarely required for most legal disputes.  Most e-discovery requests involve only a subset of structured data.  Thus, collecting an entire database to preserve only a small amount of information within it incurs additional time and expense to search, cull, and select data, all of which will have to be done outside of the easy confines of an e-discovery review tool.

2.  Restoration of Backups from the Database

[46]      Similar in outcome, but potentially less burdensome, disaster recovery backups of a structured data repository may be used to preserve and collect databases.  Most organizations have regular business continuity backups of their key systems and it may be less onerous to divert one of these data snapshots than it would be to make a full copy of the live database.  However, the same disadvantages apply as making a copy of the system, along with some additional challenges that may make this potential methodology inappropriate in many situations.

[47]      Backup media may contain not just data regarding the database at issue, but also data from completely different systems as well.  Separating this information will require additional time and expense and may be complicated by data privacy requirements, such as HIPAA, that require the enactment of significant security measures for the removal of data.[81]  In addition to these costs, backup media must be restored, again requiring time, IT expertise, and suitable hardware to which the system image can be restored.[82]  Finally, backup systems are far from perfect and failure rates, while not as high as they have been even in the recent past, are still in the words of a highly-respected industry analyst, “not acceptable.”[83]

3.  Extracting Select Information from the Database

i.  All Fields/Data

[48]      A more selective and thus more efficient alternative to collecting an entire repository is extracting the substantive data from the system and exporting it into a generic data format that can be read by multiple databases.  The success of data collection using this methodology is relatively simple to test, using one of several established techniques.  In addition, if the extraction process is handled according to IT industry standard practices and properly documented, authentication should also be relatively straightforward.  Capturing a full set of the underlying data permits a case team to defer filtering and culling decisions to a later date, pushing back some expense until it is truly necessary.

[49]      Collecting database information through data extraction has some drawbacks.  As with other techniques that capture the entire data set, much of what is collected will be irrelevant and will need to be filtered out before any review or production.  This can be a lengthy, disruptive, and expensive process.  It is important to note that extracting the complete data set does not mean that all of the capabilities of the original database will be available.  Much of the value of many database systems stems from the computed values and analysis obtained by applying algorithms to source data.  Capturing raw data alone is often not adequate to collect this high-value relational information as well.[84]  The full extract, transform, and load process may be required to derive potentially critical information.

ii.  Selected Fields

[50]      Because databases typically track much more information than is relevant to a particular legal matter, it may be possible to extract select information stored within it.  Such selection can be applied along two axes: (1) limiting data extraction to a subset of database records and selecting them through an appropriate search query; and (2) limiting data extraction to only a subset of fields within a database record.  Often, both limitations are applied in the same export.  This approach has clear advantages in terms of cost, data volume, and amount of time required to complete the requested data extraction.  However, by the same token, leaving behind some of the validating information found in a database field may make the extracted information more difficult to authenticate.

[51]      Identifying and extracting the relevant data depends on three things: (1) knowledge of the system; (2) understanding of the matter; and (3) skill at creating queries.  Deficiencies in any one of these areas may complicate this effort.  In addition, because not all of the data in a database is collected using this methodology, there is some risk if the database has an information purging function built into it.  It may not be possible to fix mistakes if the initial selection criteria turn out to be incomplete.  Fortunately, when cooperation exists between all participants and parties in the process, this collection methodology can be both efficient and cost-effective for everyone.

iii.  Sample Fields (and Potentially Reiterations as Needed)

[52]      When the existence or non-existence of potentially relevant information is an open question, a final form of data extraction is to export sample database records.  The process can be repeated reiteratively, even incorporating suggestions from the requesting parties.  Properly conducted, this approach may permit a structured data repository to be dismissed as a source of potentially relevant information or it may hone the criteria required to identify and extract appropriate information.  Either way, approaching such an investigation cooperatively, rather than unilaterally, may enhance the defensibility of this approach.[85]

[53]      Selected sampling incorporates the risk factors that arise when extracting only select information from a database.  This approach adds a fourth potential failure point: the need for competence in generating appropriate sample sets and testing them for potential relevance.  Because of the highly selective nature of this approach, rigorous documentation is required to answer questions that may arise later as to the adequacy of how this methodology was applied.

4.  Reports

i.  Using Existing Reports

[54]      Existing (i.e., “canned”) database reports that are used for business purposes can be a useful first step for collecting structured data.  First, the total data volume will be much lower than other methods unless the reports are themselves massive.  However, as Comment 1F of the Sedona Database Principles highlights, even voluminous reports may still be appropriate to produce even with the inclusion of additional non-responsive information, as this could be the easiest, least expensive, and least burdensome way to obtain and produce the information so long as the producing party is not doing so for any improper purpose.[86]  Second, existing reports were created and generated for business purposes and thus have typically been “pre-validated.”  The accuracy of the information presented has been accepted as accurate and reliable as the basis for business decisions.[87]  This can greatly simplify post-production validation and authentication.  Third, these reports are typically minimally intrusive for an organization.  The report templates and underlying queries have already been created and used in the ordinary course of business so no custom workflow must be developed.  Fourth, especially with respect to Cloud-based/SaaS type proprietary systems, reports may be the only way to retrieve data from a system.

[55]      Unfortunately, the use of existing reports is not a perfect collection solution.  These reports were designed for specific business needs, not the needs specific to a legal dispute.  For this reason, existing reports rare
ly provide the information that is specifically requested.  They typically provide too much or too little.  A troubling problem, and one that is less well understood, is the fact that reports tend to not be “pure” output from the system.  Many database reports are compilations and aggregations of information that are more than raw information output from stored information.  Instead, this raw information may be added, reformatted, or otherwise “tweaked” from the pure source information in the database, sometimes to the point of showing significant deviation from source information.  For purposes of validation and authentication, this can create obvious problems.

[56]      Often, requesting parties do not automatically accept database reports in lieu of direct discovery of the source database.  In addition, it would be unwise to assume that the courts will side with the producing party over this issue without first examining the underlying facts leading to the creation of specific reports.[88]

ii.  Creating Customized Reports

[57]      Another option for data extraction from structured data repositories is to design a custom report.  Custom reports provide greater flexibility than existing reports due to their ability to be limited to relevant data, data fields, and time periods.  Custom reports also help to limit inadvertent disclosure of irrelevant data and can even be used on privileged, confidential, or protected personally identifiable information.

[58]      As a word of caution, not every system allows for the creation of custom reports, and even when this functionality is available, it may be difficult or expensive to use.  Custom reports may face a greater evidentiary hurdle than canned reports used in day-to-day business operations.  However, courts have been somewhat more sympathetic to production objections based on the undue burden of creating expensive custom database reports to comply with incoming discovery requests.[89]

5.  TIFF Image Snapshots

[59]      An older, and now less commonly accepted, way to produce structured data is to capture database output sent to the monitor or to reports and to render these “snapshots” to TIFF image.  This creates an easily preserved form that can be Bates-stamped and for which authenticity can easily be stipulated.[90]  While appropriate in some situations, this production method has fallen out of favor compared to other alternatives since it tends to reduce the fielded nature of the underlying data, thereby turning structured data into flat, inflexible unstructured documents that may or may not contain searchable text.  That being said, certain database systems have such limited data output capabilities that capture of data in this manner may be one of the only options currently available.

6.  Direct Access to the System

[60]      A final method for producing information from a database is to simply let the requesting party or its expert have direct access to that system to run its own queries or reports.  However, most litigants highly disfavor this method as it allows the opposing party potential access to privileged and confidential information within the database.  Courts that have addressed this situation have tended to be receptive to such concerns, requiring that limits be set.[91]  This direct access approach also has significant potential to disrupt in-house IT infrastructure and staff who are likely to be unhappy at opening a controlled organization’s asset to interlopers.  Indeed, the Committee Notes to the 2006 Amendments to FRCP 34 make it quite clear:

The addition of testing and sampling to Rule 34(a) with regard to documents and electronically stored information is not meant to create a routine right of direct access to a party’s electronic information system, although such access might be justified in some circumstances.  Courts should guard against undue intrusiveness resulting from inspecting or testing such systems.[92]

[61]      In addition, granting outsiders access to data repositories containing certain personally identifiable information may violate data privacy laws and create significant (albeit unrelated) liability for the producing party.  For these reasons, direct access to databases and other such systems tends to be granted over objection “only in extraordinary circumstances.” [93]

[62]      No matter what process is used to preserve and collect a database, proper documentation and testing is critical as many of these processes are complicated and mistakes can occur.  Proper documentation and a record of testing will help to demonstrate good faith efforts if these procedures are later called into question.[94]

C.  ECA and Processing

[63]      Once the data has been extracted from its repository, it typically undergoes further transformation so that it can be used in the investigation or litigation context prior to attorneys’ review for substance.  For loose documents, litigants typically apply early case assessment techniques, such as key word or concept filtering, to reduce the data volume.[95]  Unfortunately, such techniques do not apply well to structured data, as this information is largely centered around transactions rather than words and phrases.  Properly processing and limiting the volume of such systems can instead profile the transactions using specific fields, dates, and general ledger codes.  A strong understanding of the system at hand becomes even more important in such situations.

[64]      Traditional culling methods may be more helpful when the extracted data includes free-form text entry fields such as “comment” fields.  Even here, though, because the unified extracted data exists as a single mass of (fielded) information, culling this glob of information can raise evidentiary challenges unless all changes are well documented and ideally, negotiated at least in principle with the requesting party.

D.  Review and Analysis

[65]      Once the data has been processed and preliminary analytics have been applied, it may still need to be reviewed for responsiveness and privilege.  Some structured data can be managed within standard review platforms, especially flat-file reports and data tables rendered as Microsoft Excel spreadsheets.  On the other hand, data extracted from enterprise-grade relational databases cannot be loaded into a review platform with any genuine hope of validly reviewing this information.  As described in the Sedona Database Principles:

Analyzing email messages and discrete electronic files typically involves a team (sometimes a large team) of reviewers and takes place through a document review platform.  Such review and analytical tools, however, are a poor fit for the matrices of information found in tables of extracted database information.  Instead, review of this information may require technically sophisticated analysts to query the data and extract the meaning of its aggregated information.[96]

[66]      A more straightforward approach to reviewing structured data looks not to the data’s abstract relevance, but instead to the significance of its data values.  Certain field information, such as protected private information, may be redacted or stripped, but this is the closest analogy to the parallel review process that takes place in a document review platform.  Otherwise, extracted data is manipulated, queried, and explored.  In addition, once protected and privileged data fields are removed from extracted structured data, no further attorney review of individual data fields is typically required.

[67]      When the content of individual data fields, such as notes or memo fields, require attorney review, the review par
adigm must be further adjusted.  Such a review is complicated by the fact that the information that requires review tends to be stored in a structured manner, but contains unstructured data, such as free text that lacks parameter constraints on length or format.  Technical specialists are typically enlisted to develop secure web-based database review tools that present this information in a reviewable format for redaction purposes.  Certain profiling and culling methods can be employed to reduce the overall volume of information that requires attorney review, but generally, some “eyes-on” attorney review will be required.

E.  Production

[68]      Extraction and Transformation processes largely set the production of structured data.  Information that has been shed as a by-product of transformation processes may now be non-replicable since many forms of extraction do not allow conversion back “upstream.”  You cannot, for example, extract data as reports and then reconstitute the data to produce it as a complete database.  Such is the reason that Sedona Database Principle 6: Form of Production reminds us that: “The way in which a requesting party intends to use database information is an important factor in determining an appropriate format of production.[97]  Comment 6A of the Sedona Database Principles takes this even further by underscoring that “it may be impossible for a responding party to take appropriate steps to provide database information in a reasonably useful format if it has no idea how the requesting party intends to use it.”[98]

[69]      Even if the parties do not avail themselves of the warnings of the Sedona Principles and the Sedona Database Principles and decline to work together to determine a reasonably usable production format, this lack of agreement does not mean that parties are free to produce data in any format they choose.  FRCP 34(b)(2)(E) requires:

(E) Producing the Documents or Electronically Stored Information.  Unless otherwise stipulated or ordered by the court, these procedures apply to producing documents or electronically stored information:

(i) A party must produce documents as they are kept in the usual course of business or must organize and label them to correspond to the categories in the request;

(ii) If a request does not specify a form for producing electronically stored information, a party must produce it in a form or forms in which it is ordinarily maintained or in a reasonably usable form or forms; and

(iii) A party need not produce the same electronically stored information in more than one form.[99]

[70]      Courts have shown that they will be alert to production formats that are not usable.[100]  Courts can also order parties to produce data in particular formats even if it requires the creation of entirely new data sets.[101]  However, at the same time, the full cost of producing structured data does not always fall entirely on the producing party.  In some circumstances, a requesting party may be required to bear the burden and expense of some degree of transformation of the data from the producing party so long as the format of the production was in fact reasonable.[102]

[71]      The Sedona Principles echo the concerns of the courts in Principle 12: Form of Production and Metadata:

Absent party agreement or court order specifying the form or forms of production, production should be made in the form or forms in which the information is ordinarily maintained or in a reasonably usable form, taking into account the need to produce reasonably accessible metadata that will enable the receiving party to have the same ability to access, search, and display the information as the producing party where appropriate or necessary in light of the nature of the information and needs of the case.[103]

[72]      Difficulties can arise when an opposing party requests that structured data be produced in “native format”—that is, the original file format in which producing party keeps the ESI.  Courts have sometimes shown an un-nuanced willingness to enforce general demands for native format production if it is properly and timely requested, or even if that is lacking, if good cause can be shown[104] or absent a showing of undue burden or hardship.[105]  At times, the courts have even required such native file productions from database systems.[106]  Many parties indirectly request this by requesting production of “the entire database.”[107]

[73]      Unfortunately, a “native file” production for structured data can present a number of difficult and unique problems.  First, and most obvious, the proprietary database format in which relevant data is stored may not be readable and thus, not “reasonably usable” to the requesting party.  Handing over to the other side a complete copy of a database system, particularly a world-class enterprise system, is also not a sufficient solution.  The recipient may well need to obtain a licensed copy of the system—a potentially very expensive proposition in the case of high-end database systems—or a near impossible proposition in the case of legacy or obsolete systems that are no longer commercially available (even as they remain protected by copyright and license restrictions from free copying).  Even if a license for the system can be obtained, installation of the system could take weeks or months and success is not always a given.[108]  Finally, even once such hurdles are successfully overcome, the very first use or view of a copied database system is likely to change the information therein, as such systems typically have tracking capabilities that are difficult or even impossible to turn off, making the copy no longer an accurate copy.[109]

[74]      For all of these reasons, more transformative production formats, which change the data from the way it is stored in the ordinary course of business, have become a commonly accepted discovery practice.[110]  In addition, a strong argument can be made that the fielded nature of the raw data, not the proprietary container in which it is stored, is the essential element that provides “native format” flexibility to this information.  If this argument is accepted, further transformation of the data may provide increased accessibility without compromising essential functionality.

 

VI.  Issues Beyond the EDRM

[75]      Because structured data does not fit squarely within an EDRM that was implicitly designed for unstructured data types, it should come as no surprise that additional issues often arise in working with structured data in discovery.

A.  Custody and Control

[76]      A respondent in discovery is only required to turn over what is in their possession, custody, and control.[111]  This obligation extends to traditional materials and ESI alike as well as to unstructured and structured data alike.  Complex databases, however, can challenge the issue of where data is stored and the extent to which it is “owned” by the content creator.  For example, a database may be housed entirely within a corporation and serviced by company IT professionals, so there would be no possession, custody, or control issue.  However, when the database is provided by a service provider, questions about information ownership can and do arise.  The licensing provisions for many Cloud-based SaaS providers hold that while information entered into the outsourced database may be the exclusive property of the database service client, many of the internal database elements that create relationships between this client provided data are proprietary to the point that a client does not have permission to view these
relationships, much less export them in response to a discovery request.[112]  As a consequence, the “owner” of information in these systems—the SaaS client—may not have custody or control over a portion of the ESI that it would have to provide if it hosted the database itself.

B.  Verifying that the Data Collected is Accurate

[77]      Structured data has the unusual property of appearing accurate and precise, even if the substantive information that the database reports is riddled with errors.  This issue can occur because the precision of a database search query or report is separate and distinct from the way in which the source data was created or entered into the system.  For example, operators at a call center may be asked to enter their recollections and remarks about customer questions and complaints.  This information is likely entered quickly as the operators focus on handling as many calls as possible during their shift and it may contain errors.  Yet, when this same information appears in a database report, it is likely to have the appearance of an accurate and truthful statement.

[78]      Sedona Database Principle 5: Data Integrity, Authenticity, and Admissibility considers this issue: “Verifying information that has been correctly exported from a larger database or repository is a separate analysis from establishing the accuracy, authenticity, or admissibility of the substantive information contained within the data.”[113]  Thus, in working with structured data, many practitioners have found it useful to separate these two competing questions about “accuracy.”  It is possible to validate the accuracy of a mechanical data export.  For example, certain reference fields or reference values can be exported with the substantive data and those values verified against the source information in the database itself.  Even something as simple as comparing the number of database records exported against the number of database records returned by a search query is a step in this direction.

[79]      Conversely, practitioners can reserve the right to further challenge the accuracy of the information contained within a structured data repository.  In evidentiary terms, the authenticity of the information—that is to say, the information was accurately exported from a database—can be the subject of a stipulation, but the truthful nature of the information remains subject to standard challenges as to hearsay and general reliability.[114]

C.  Validating Structured Data so that It Can Be Admissible as Substantive Evidence

[80]      Validating structured data is an important consideration when working with this form of ESI.  As noted previously, many practitioners are able to find common ground and negotiate a stipulation that ESI has been accurately exported or copied from the source database.  Authenticity can be mechanically established even though the exported form of the data is unlikely to be identical to the way that the structured data was maintained inside a larger database.  The Sedona Database Principles recognize and address this problem, in Principle 4: Validation: “A responding party must use reasonable measures to validate ESI collected from database systems to ensure completeness and accuracy of the data acquisition.”[115]

[81]      The larger issue, though, is finding a consistent workflow for establishing the reliability of structured data so that it may be admissible for the truth of the information contained therein.  Because structured data is typically exchanged in the form of data exports or reports, at least one court has found that the business record exception to the hearsay rule is inapplicable as grounds for admitting this information for the truth of the matter asserted.[116]  In the case of Vinhee, the court required a detailed showing of how information was entered into a database, including all efforts to identify and correct errors.[117]  The court further required additional foundation about how the underlying database was managed.[118]

[82]      A majority of other courts have imposed a less onerous set of requirements to admit extracted structured data for the truth of the matter concerned.[119]  A key point of argument remains the degree to which substantive information entered into a database has been validated as accurate near or at the time of its creation as structured data.  Systems that include such validation will have their information more easily ruled admissible than more open and less regulated databases.  In such cases, courts may begin to look at some of the Vinhee factors as additional extrinsic evidence required to lay a sufficient evidentiary foundation.

D.  Privacy

[83]      There are many types of database systems that contain vast amounts of private and personally-identifiable information (“PII”) such as HR systems, financial systems, healthcare systems, and customer transaction systems to name a few.  PII resides in some unexpected databases that most would not expect to contain confidential PII.  Web-logging systems, for example, capture unique IP addresses that could be used to track down the identity and location of users.  Such protected information will need to be identified and redacted prior to release of this data to a requesting party.  On the plus side, the same analytical measures that can assist with the extraction of the data can often also be used to locate and redact the confidential data, whether by removing it or replacing it with dummy data.  However, while such systems cannot always be perfect, many privacy laws are written with such perfection in mind so as to be rather unforgiving even as towards minor violations.  Thus, the parties are advised to carefully discuss putting into place protocols, potentially including protective orders, against the possibility of the inadvertent disclosure of PII.[120]

[84]      Unfortunately, that is not the end to the potential problems.  Because database systems tend to be distributed, portions of a system or systems to which it connects may well physically be located across jurisdictions, such as the European Union, that have strict privacy regulations.[121]  Other jurisdictions may not be concerned with the physical location of the data, but instead as to whether the data subjects—those whose information has been collected and stored—live within that jurisdiction.[122]  The penalties for violations of these laws and regulations can be severe, so careful legal consideration of the issues before taking action is well advised.[123]

 

VII.  Conclusion

[85]      Dealing with structured data in e-discovery is something that should neither be ignored nor treated lightly.  A case team may be required to handle structured data because an investigator, regulator or the opposing party requests it, or a case team may need to deal with it just to try to understand and prove its case.  Situations will arise where the proper expert use of structured data is the best or the only way “to follow the money” and figure out what actually happened.  When that situation arises, case teams are likely to need expert assistance to handle the myriad of issues both technical and legal, within the EDRM, and without.

 

Appendix

ETL As Applied to the EDRM Model

 Simon Appendix

*Derived from the Electronic Discovery Reference Model v 2.0, which are used under See Creative Commons Attribution 3.0 United States License. | © 2005-2012 EDRM, LLC.


The Sedona Conference® Database Principles Addressing the Preservation and Production of Databases and Database Information in Civil Litigation[124]

Principle 1: Scope of Discovery

Absent a specific showing of need or relevance, a requesting party is entitled only to database fields that contain relevant information, not the entire database in which the information resides or the underlying database application or database engine.

Principle 2: Accessibility and Proportionality

Due to the differences in the way that information is stored or programmed into a database, not all information in a database may be equally accessible, and a party’s request for such information must be analyzed for relevance and proportionality.

Principle 3: Use of Test Queries and Pilot Projects

Requesting and responding parties should use empirical information, such as that generated from test queries and pilot projects, to ascertain the burden to produce information stored in databases and to reach consensus on the scope of discovery.

Principle 4: Validation

A responding party must use reasonable measures to validate ESI collected from database systems to ensure completeness and accuracy of the data acquisition.

Principle 5: Data Integrity, Authenticity, and Admissibility

Verifying information that has been correctly exported from a larger database or repository is a separate analysis from establishing the accuracy, authenticity, or admissibility of the substantive information contained within the data.

Principle 6: Form of Production

The way in which a requesting party intends to use database information is an important factor in determining an appropriate format of production.

 


* Conrad Jacoby is a Senior Attorney at Winston & Strawn LLP, where his practice focuses on e-discovery issues and litigation information management.  Since 2009, he has served as the founding Editor-in-Chief of The Sedona Conference® Database Principles: Addressing the Preservation & Production of Databases & Database Information in Civil Litigation.  The opinions expressed are those of the authors and do not necessarily reflect the views of their respective firms or clients. This article is for general information purposes and is not intended to be and should not be taken as legal advice

** Jim Vint is a Managing Director at Navigant Consulting, Inc. and runs the Structured Data and Development team within the Technology Solutions group.  He focuses on discovery and disclosure of non-traditional ESI data sources including structured databases.  His clients include global organizations facing regulatory investigations, cross border discovery issues, and general commercial disputes.

*** Michael Simon is Director of Strategic Development for Navigant Consulting, Inc.  Michael, a former practicing attorney, has worked with and counseled clients regarding e-discovery issues and best practices for over a decade.  He frequently lectures on e-discovery, legal technology and Internet law in venues across the United States, including Tufts University, where he has taught as a visiting lecturer.

 

[1] See The Sedona Conference®, The Sedona Conference® Glossary: E-Discovery and Information Management 52 (Sherry B. Harris ed., 3d ed. 2010) [hereinafter Sedona Glossary].

[2] See id. at 49.

[3] See id. at 13, 49, 52 (definitions of “database,” “database management system,” “structured data,” and “unstructured data”).

[4] Fed. R. Civ. P. 34(a)(1)(A) (emphasis added).

[5] See The Sedona Conference®, The Sedona Conference® Database Principles: Addressing the Preservation & Production of Databases & Database Information in Civil Litigation 21 (Conrad J. Jacoby et al. eds., 2011) [hereinafter Sedona Database Principles].

[6] See The Sedona Conference®, The Sedona Principles: Best Practices Recommendations & Principles for Addressing Electronic Document Production 30 (Jonathan M. Redgrave et. al ed., 2d eds. 2007) [hereinafter Sedona Principles].

[7] See Sedona Database Principles, supra note 5, at ii, 8.

[8] See id. at ii.

[9] See id at ii, 8-9.

[10] Nexsan Corp., Registration Statement (Form S-1), at 61 (Jan. 25, 2011), available at http://www.sec.gov/Archives/edgar/data/1133448/000104746911000283/a2200385zex-99_2.htm.

[11] See Information Retention and eDiscovery Survey Global Findings, Symantec 1, 8 (2011), https://www4.symantec.com/mktginfo/whitepaper/InfoRetention_eDiscovery_Survey_Report_cta54646.pdf.

[12] Id.

[13] In re eBay Seller Antitrust Litig., No. C 07-1882 JF (RS), 2009 WL 3613511, at *1 (N.D. Cal. Oct. 28, 2009).

[14] Id.

[15] Id. at *2.

[16] Id.

[17] See id.

[18] See In re eBay Seller Antitrust Litig., 2009 WL 3613511, at *3.

[19] In re Lowe’s Cos., 134 S.W.3d 876, 877 (Tex. App. 2004).

[20] See id. at 877.

[21] Id. at 878.

[22] See id. at 880.

[23] Procter & Gamble Co. v. Haugen, 427 F.3d 727, 730, 732-37 (10th Cir. 2005).

[24] Id. at 731.

[25] Id. at 731-32.

[26] Id. at 731.

[27] Id.

[28] See Procter & Gamble Co., 427 F.3d at 732-33, 735-37.

[29] See id. at 739.

[30] See id.

[31] See id.  In 2013, it may seem unbelievable that a major corporation, like P&G would be unable to afford sufficient storage capacity for this data.  However, when this case was decided in 1995, the court recognized $30 million as a prohibitive storage cost.  See id.

[32] Id. at 739-41.

[33] See Powerhouse Marks, L.L.C. v. Chi Hsin Impex, Inc., No. Civ.A.04CV73923DT, 2006 WL 83477, at *1-2 (E.D. Mich. Jan. 12, 2006).

[34] See id. at *1, *3.

[35] Id. at *3.

[36] Id.

[37] See id. at *4.

[38] EEOC v. Supervalu, Inc., No. 09 CV 5637, 2010 WL 5071196, at *1 (N.D. Ill. Dec. 7, 2010).

[39] Id. at *6-7.

[40] Id. at *6.

[41] Id. at *7.

[42] Id.

[43] Supervalu, Inc., 2010 WL 5071196, at *8, *12.

[44] Sedona Database Principles, supra note 5, at 4.

[45] Courtney Fletcher & Liam Ferguson, E-Discovery: Remembering Forgotten Data, Wall Street & Tech. (Oct. 21, 2009), http://www.wallstreetandtech.com/regulatory-compliance/e-discovery-remembering-forgotten-data/220900032.

[46] See Sedona Database Principles, supra note 5, at 2, 6, 12, 17; see also Douglas Herman, Digital Investigations – Where You Forgot To Look: Why Databases Often Are Overlooked When It Comes Time To Harvest Electronic Data, Metro. Corp. Couns., (Aug. 2006), http://www.metrocorpcounsel.com/pdf/2006/August/22.pdf (“To extract data from a relational structure[,] such as a CRM or ERP database, requires specific expertise and a solid understanding
of the underlying bases of how these databases work.”).

[47] Sedona Database Principles, supra note 5, at 2.

[48] See Rebman v. Follet Higher Educ. Grp., Inc., No. 6:06-CV-1476-ORL-28KRS, 2007 WL 1303031, at *3 (M.D. Fla. May 3, 2007) (Plaintiff’s broad request for data from a database with over 200 million records denied by the court as overbroad; court ordered parties to meet and confer under Rule 26(f) to narrow the request and determine the need versus the burden on the defendant).

[49] Sedona Database Principles, supra note 5, at 8 (quoting Sedona Principles, supra note 6, at 21).

[50] See id. at 24.

[51] See, e.g., Ojeda-Sanchez v. Bland Farms, LLC, No. CV608-096, 2009 WL 2365976, at *3 (S.D. Ga. July 31, 2009) (requiring production of entire database as “metadata” where the formulas within the system were relevant to the issues in a wage and hour class action); see also Sedona Database Principles, supra note 5, at 25 illus. iii.

[52] See, e.g., Goshawk Dedicated Ltd. v. Am. Viatical Servs., LLC, No. 1:05CV2343-RWS, 2007 WL 3492762, at *1 (N.D. Ga. Nov. 5, 2007) (requiring production of database in fraud and truth in lending case required despite respondent’s claim that it was confidential and “the single greatest asset” of the party because the accuracy of the data and algorithms therein was highly relevant to the claims and defenses of the case).

[53] Sedona Database Principles, supra note 5, at 21.

[54] See id. at 27-30.

[55] See id. at 28.  The problem of database systems designed for particular purposes, which are not accessible in the ways required for discovery, was specifically recognized by the Standing Committee of the Judicial Conference in its September 2005 Report Recommending the Adoption of the 2006 Amendments, as a potential form or not “readily accessible” ESI under Rule 26(b): “[D]atabases that were designed to create certain information in certain ways and that cannot readily create very different kinds or forms of information.”  Report of Judicial Conference of the United States on Rules of Practice and Procedure C-42 (Sept. 2005), available at http://www.uscourts.gov/uscourts/RulesAndPolicies/rules/Reports/ST09-2005.pdf [hereinafter Judicial Conference Report].

[56] To optimize database performance, some database systems will only index portions of long, free-form text fields—such as the first few hundred characters—so that search results from such systems may not be complete.  See Sedona Database Principles, supra note 5, at 17, 28.

[57] Some database systems use “look up” tables or “drop down” menus to create pre-defined data entry fields which contain information hard-coded into the system itself, not in any searchable fields.  See id. at 28.

[58] See id. at 29.  With the increasing popularity of SaaS systems, such as Salesforce.com, the business user of a system may no longer have any access to a system beyond their usual user interface.  Id.

[59] See id. at 6 (IT departments are likely to require extensive and time-consuming testing of any third-party system that would be installed inside the corporation, especially if it would connect to a mission-critical system).

[60] See id. at 29.

[61] See, e.g., Zurich Am. Ins. Co. v. Ace Am. Reinsurance Co., No. 05 Civ. 9170 RMB JCF, 2006 WL 3771090 (S.D.N.Y. Dec. 22, 2006); Static Control Components, Inc. v. Lexmark Int’l, Inc., No. 04-84-KSF, 2006 WL 897218 (E.D. Ky. Apr. 5, 2006).  However, this does not mean that the courts will necessarily unreasonable requests.  See, e.g., In re Ex Parte Application of Apotex Inc., No. M12-160, 2009 WL 618243 (S.D.N.Y. Mar. 9, 2009) (two weeks before scheduled trial, a party in patent litigation sent a broad subpoena for data to a competitor, involving data from over 30 years ago; court denied the request after the competitor demonstrated the difficulty of obtaining the data).

[62] See, e.g., Cartel Asset Mgmt. v. Ocwen Fin. Corp., No. 01-cv-01644-REB-CBS, 2010 WL 502721 (D. Colo. Feb. 8, 2010) (rejecting claim that ESI was inaccessible due to burdensomeness after respondents failed to provide specific information regarding their storage practices, the number of storage systems that they would need to search, and their capability to retrieve information from those systems).

[63] What is ETL (Extract, Transform, and Reload)?, Webopedia, http://www.webopedia.com/TERM/E/ETL.html (last visited Mar. 12, 2013).

[64] See Sedona Principles, supra note 6, at 30.

[65] Id. at 38.

[66] Sedona Database Principles, supra note 5, at 26.

[67] Id. at 31.

[68] Legacy and retired systems are commonly found in corporate acquisitions, where an acquired company’s IT systems tend to be, at best only partially migrated over to the acquiring company or simply taken offline.  There may be no current users or administrators of such systems at the current company.  See id. at 14; Herman, supra note 46 (“Some systems, especially those that are older, may have been grouped together as a result of certain corporate mergers and acquisitions and may not be operating efficiently or may not be stable . . . .”).

[69] See Sedona Database Principles, supra note 5, at 13.

[70] See id. at 12.

[71] See Sedona Glossary, supra note 1, at 13.

[72] See Data dictionary, Dictonary.com, http://www.dictionary.reference.com/browse/data+dictionary (last visited Mar. 16, 2013).

[73] Sedona Database Principles, supra note 5, at 23.

[74] Id. at 25.

[75] See, e.g., Procter & Gamble Co. v. Haugen, 427 F.3d 727, 739 (10th Cir. 2005) (finding that the responding party would have to purchase a mainframe computer to download and archive the data at its own facilities or purchase the archival data from the third-party at a great cost).

[76] Judicial Conference Report, supra note 55, at C-83.

[77] However, even if portions of the data from such overwriting systems have disappeared by the time respondent acts, the court may still require production of what remains.  See, e.g., Burkybile v. Mitsubishi Motors Corp., No. 04 C 4932, 2006 WL 3191541, at *4 (N.D. Ill. Oct. 17, 2006).

[78] Sedona Principles, supra note 6, at 28.

[79] See supra Part IV.

[80] See, e.g., Conditions of Use, Sorenson Molecular Genealogy Foundation, http://www.smgf.org/terms/jspx (last visited Mar. 11, 2013); Copyright Information, HyperGeertz, http://hypergeertz.jku.at/Geertzcopyrightinformation.htm (last visited March 11, 2013); Terms of Use, massinvestor, http://www.massinvestordatabase.com/terms.php (last visited Mar. 11, 2013).

[81] See infra Part VI.D.

[82] For these reasons, the Sedona Database Principles actively discourage the use of backup tapes as a methodology.  See Sedona Database Principles, supra note 5, at 11.

[83] Dave Russell, The Broken State of Backup, Gartner, 1, 5-6, http://www.cornerstonetelephone.com/sites/default/files/resources/Gartner_-_The_Broken_State_of_Backup_(6-09).pdf (last visited Mar. 23, 2013).

[
84] See Sedona Database Principles, supra note 5, at 20.

[85] See id. at 31.

[86] Id. at 26.

[87] Id. at 19.

[88] See, e.g., Margel v. E.G.L. Gem Lab Ltd., No. 04 Civ. 1514(PAC)(HBP), 2008 WL 2224288, at *4-6 (S.D.N.Y. May 29, 2008) (ordering respondent to produce the database as well as the reports from the database because the database was not in the same form, under FRCP 34, as the reports).  But see, e.g., EEOC v. Supervalu, Inc., No. 09 CV 5637, 2010 WL 5071196, at *8 (N.D. Ill. Dec. 7, 2010) (rejecting a request that would have required creation of custom report that would have taken two weeks work where requestor could not prove that the relevancy of the data to be obtained was greater than the burden on the respondent).

[89] See, e.g., Soto v. Genentech, Inc., No. 08-60331-CIV, 2008 WL 4621832, at *12 (S.D. Fla. Oct. 17, 2008) (allowing responding party to produce detailed log of data contents in lieu of creation of custom reports that would have required approximately 64 hours of work); see also Getty Props. Corp. v. Raceway Petroleum, Inc., No. Civ. A. 99-CV-4395DMC, 2005 WL 1412134, at *4 (D.N.J. June 14, 2005).

[90] This method was originally suggested by Thomas Allman in an early and seminal review of the then brand-new 2006 ESI FRCP Amendments.  See Thomas Y. Allman, Managing Preservation Obligations After The 2006 Federal E-Discovery Amendments, 13 Rich. J.L. & Tech.. 9, 48 (2007), available at http://law.richmond.edu/jolt/v13i3/article9.pdf.

[91] See, e.g., In re Ford Motor Co., 345 F.3d 1315, 1316-17 (11th Cir. 2003); In re Lowe’s Cos., Inc., 134 S.W.3d 876, 879-80 (Tex. App. 2004).

[92] Fed. R. Civ. P. 34(a) advisory committee’s note.

[93] Sedona Database Principles, supra note 5, at 16.

[94] Id. at 17.

[95] See id. at 3.

[96] Id. at 10.

[97] Id. at 36.

[98] Sedona Database Principles, supra note 5, at 36.

[99] Fed. R. Civ. P. 34(b)(2)(E).

[100] See, e.g., Powerhouse Marks, L.L.C. v. Chi Hsin Impex, Inc., No. Civ.A.04CV73923DT, 2006 WL 83477 (E.D. Mich. Jan. 12, 2006) (showing that the defendant produced financial database by delivering 1,771 Bates stamped pages of print outs of the raw field data).

[101] See, e.g., In re eBay Seller Antitrust Litig., No. C 07–1882 JF, 2009 WL 2524502, at *2 (N.D. Cal. Aug. 17, 2009) (ordering eBay to create a new data set to produce additional responsive documents, despite its Senior Director of Data Warehouse Development’s representation that “it would take an engineer forty-eight hours to format a query, at a cost of $7,200” in order to do so).

[102] See Sedona Database Principles, supra note 5, at 37.

[103] Sedona Principles, supra note 6, at 60.

[104] See, e.g., In re Netbank Sec. Litig., 259 F.R.D. 656, 681-82, 683 (N.D. Ga. 2009); Hagenbuch v. 3B6 Sistemi Elettronici Industriali S.R.L., No. 04 C 3109, 2006 WL 665005, at *3-4 (N.D. Ill. Mar. 8, 2006).

[105] See, e.g., Camesi v. Univ. Pittsburgh Med. Ctr., No. 09–85J, 2010 WL 2104639, at *7 (W.D. Pa. May 24, 2010); see also, e.g., Chevron Corp. v. Stratus Consulting, Inc., No. 10–cv–00047-MSK-MEH, 2010 WL 3489922, at *2-4 (D. Colo. Aug. 31, 2010).

[106] See, e.g., Ojeda-Sanchez v. Bland Farms, LLC, No. CV608-096, 2009 WL 2365976, at *3 (S.D. Ga. July 31, 2009); Perez-Farias v. Global Horizons, Inc., No. CV-05-3061-MWL, 2007 WL 991747, at *3 (E.D. Wash. Mar. 30, 2007).

[107] Michael Spencer & Diana Fasching, Less Production Can be More in Database Discovery, L. Tech. News, Oct. 26, 2012.

[108] Even highly sophisticated corporations have at times experienced disastrous failures in attempting to install and use high-end database systems.  See Ericka Chickowski, Five ERP Disasters Explained, Baseline Mag., Apr. 4, 2009, available at http://www.baselinemag.com/c/a/ERP/Five-ERP-Disasters-Explained-878312/.

[109] See Sedona Principles, supra note 6, at 5.

[110] See id. at 7.

[111] See Tomlinson v. El Paso Corp., 245 F.R.D. 474, 477 (D. Colo. 2007) (requiring a party to turn over data from third-party database of ERISA information because ERISA created clear duties for the employer that negated any claim that such third party data could not be within its possession, custody or control).

[112] See Alberto G. Araiza, Electronic Discovery in the Cloud, 2011 Duke L. & Tech. Rev. 8, 33 (2011).

[113] Sedona Database Principles, supra note 5, at 34.

[114] See Lorraine v. Markel Am. Ins. Co., 241 F.R.D. 534, 538 (D. Md. 2007).

[115] Sedona Database Principles, supra note 5, at 32.

[116] See, e.g., In re Vee Vinhee, 336 B.R. 437, 447-49 (B.A.P. 9th Cir. 2005).

[117] Id. at 448-49.

[118] Id. at 448.

[119] Compare R.I. Managed Eye Care, Inc. v. Blue Cross & Blue Shield of R.I., 996 A.2d 684, 691 (R.I. 2010) (reiterating a four part test for determining the admissibility of business records under the hearsay rule), with In re Vee Vinhee, 336 B.R. at 446 (defining an eleven part test for determining the admissibility of electronic records under the hearsay rule).

[120] See Sedona Database Principles, supra note 5, at 8-9.

[121] See generally Council Directive 90/46/EC, 1995 O.J. (L 281) 39-45 (defining specific privacy protections to be afforded to personal information).

[122] See, e.g., U.S. Dept. of Commerce, Safe Harbor Privacy Principles, export.gov (July 21, 2000), http://export.gov/safeharbor/eu/eg_main_018475.asp (defining protections for U.S. citizens’ data exported to the European Union); see also Commission Decision 2000/520/EC, 2000 O.J. (L 215) 7-9 (accepting U.S. Safe Harbor Privacy Principles).

[123] See, e.g., Datenschutzgesetz 2000 [DSG 2000] Bundesgesetzblatt [BGBl] No. 165/1999, §§ 51-52 (Austria) (imposing up to a year in prison and 25,000 Euro fine per violation).

[124] Sedona Database Principles, supra note 5, 21-38.

Page 81 of 84

Powered by WordPress & Theme by Anders Norén