V. Conclusion
Although it may seem difficult to apply existing rules to
discoverable social media evidence, it seems more that a lack of familiarity and understanding of the existing rules results is what likely contributes to the perception that the existing rules are inadequate for new forms of discovery. While it is expected that courts may
initially struggle to uniformly apply existing rules of civil procedure and
rules of evidence, it is also reasonable to expect that courts will ultimately
grow more and more congruent.
Initially, it was unclear how the SCA would impact the discoverability
of social media content; however, litigants have seemed to adapt their legal
strategies to obtain the content despite what initially seemed to be a road
block. Although courts did
initially struggle to reconcile the impact of a user’s privacy settings with
the discoverability of “private” content, it has ultimately been established
that a litigant can’t “hide behind privacy settings” to avoid the discovery of
relevant information. Initially,
courts were quick to point to a social network provider’s user policy to rebut
arguments relating to a litigant’s expectation of privacy; however, it seems
that courts have made an easier path for themselves by resting upon the
existing rules of civil procedure.
Though
it may seem easier to simply adopt new rules to specifically address social media
evidence, it seems unlikely that such rulemaking will occur until it is clear
that the existing rules are insufficient.
Because the current rules of evidence provide judges with sufficient
discretion, judges have been able to fairly accommodate social media evidence
for the most part. The current
rules relating to authentication do not require a one-size-fits-all approach;
therefore, courts should refrain from a one-size-fits-all analysis. Similar to the increasing jurisprudence
involving cyber-law, courts analyzing social media evidence under existing rules
of evidence are forced to find the right analogy that securely fits the social
media evidence into the existing scheme.
Especially when it comes to authentication of social media evidence,
courts who handle reliability concerns similarly to the way that other forms of
evidence are handled provide litigants with the most fair and most uniform
application overall. For example,
analogizing reliability issues relating to a social media post with that of a
potentially forged document can easily illuminate the most appropriate
resolution, which can easily be uniformly applied time after time again. It is the job of the judge to draw
these commonsensical analogies so as to avoid becoming hung up in what seems to
be a novel question, simply because the question arises from a new form of
technology. Instead, by drawing
logical analogies to accommodate new technology, courts can embrace new
technological advancements while still respecting long-established legal rules
and concepts.
Attorneys have an ethical duty to understand how to discover and use social media evidence without fear that it will be undiscoverable, inadmissible, or unethical, thereby forcing courts to regularly employ the existing rules to social media evidence. Essentially, a concrete understanding of the existing rules can offer sufficient protection against ethical traps and discovery battles. Fortunately, the technology barriers that have historically created friction between older attorneys and younger attorneys do not seem to be as much of a challenge because nowadays, both generations are familiar with and frequently use social media sites.