DiscoveryMaster

Deconstructing Social Media Discovery

This post was written by our friend Helen Geib, who played a large role in designing our Custodian Manager product (currently in beta). Enjoy!

Three-quarters of Americans use social media and most use several platforms. Many people visit their favorite sites at least once a day. Some social media users are passive consumers but more are actively creating content. That all adds up to a whole lot of potentially discoverable data.

Social media content is exceptionally varied:

  • Posts
  • Photos, multimedia, files
  • Comments, likes and shares
  • Links
  • Profile data
  • Metadata
  • Messages

The non-messaging content types give rise to most of the legal and practical challenges of social media discovery. Social media content such as posts, comments and multi-media files is important in these areas of civil litigation:

  • Family law
  • Personal injury, medical malpractice and workers compensation
  • Employment lawsuits and investigations
  • Copyright and trademark infringement
  • Product liability

Social media is dynamic, interactive and informal. Recognizing the challenges created by social media’s unique characteristics is the first step to overcoming them.

Social media’s dynamic nature creates identification and preservation challenges

The dynamic quality of social media creates barriers to identification and preservation that don’t arise with traditional sources of ESI such as computers and email systems. In contrast to those relatively static sources, social media is in a constant state of flux. The best strategy for meeting the eDiscovery challenges of identifying and preserving social media evidence is to act quickly.

Custodian questionnaires and interviews should include targeted questions about social media. Ask if relevant data exists in any social media site.

The opposing party’s social media may also be at issue, particularly in employment and personal injury cases. There are several legal tools available to learn about the existence of discoverable social media. These include discovery letters following up on initial disclosures, raising social media in the discovery conference and asking about it in interrogatories.

In addition, it can be helpful to perform internet searches of publicly available social media content. These searches may themselves locate relevant data, or they may supply information needed to make a threshold showing of relevance necessary to obtain discovery of non-public data.

Most types of ESI can be defensibly preserved in place with a properly managed litigation hold. Social media is different. Not only is it constantly changing, many of the changes are outside the account holder’s control.

Accordingly, best practice is to make a preservation collection. Typically the entire user account is captured for a preservation collection. A targeted capture of relevant data may be warranted in order to exclude non-relevant, private information. Supplemental preservation collections can be made to capture relevant content created on an ongoing basis.

Interactive content creates collection challenges

One of the striking features of social media is the many different data types found in one account or even one post. The interactive nature of social media creates content that is dissimilar, complex and stored in multiple locations. This diversity of content creates technical hurdles to collection.

One solution for meeting these collection challenges is to partner with a digital forensics service provider. A qualified provider will provide competent advice on technology issues and options.

In addition, providers use forensic software developed specifically for social media collections. Forensic software has several advantages:

  1. It’s specifically designed to collect all types of social media content, including multimedia files and metadata. The date and time that a social media post was created may be as important as the content.
  2. Forensic software has the capability to follow links and collect the linked content, even if it is found on a third-party website.
  3. Social media forensic collection software uses hash value verification, the industry standard means of validating that the collection is a complete and accurate copy of the original.

There are two self-collection alternatives to using forensic software. The obvious advantage of self-collection is its modest price tag. But be aware that self-collection has significant limitations that often outweigh the immediate cost-savings.

First, some platforms, including Facebook and Twitter, offer a “download my account” feature that permits account holders to request downloadable versions of their accounts from the social media provider. A user (or authorized proxy) must be logged in to request a download.

Second, screen captures are an alternative when the platform doesn’t offer a “download my account” option or the party making the collection doesn’t have login access to the account. If you take screen captures, use a vetted capture program with a timestamp feature.

Informality of social media creates review challenges

The informality of social media requires a different approach to analysis and review than standard ESI.

Standard eDiscovery tools and workflows are designed for business documents. Business documents are self-contained. They are typically at least a paragraph or longer in length. Business writing is characterized by complete sentences, proper grammar and correct spelling and punctuation. It uses a small universe of widely recognized symbols, most found on the qwerty keyboard.

Social media is unlike business documents in pretty much every way. It’s characterized by:

  • Very short text
  • Misspellings
  • Acronyms
  • Abbreviations
  • Insider lingo
  • Emoji
  • Multimedia
  • Links

To make matters worse, social media acronyms, abbreviations, insider lingo and emoji are continually developing, carry multiple meanings and are used to mean different things by different people. Complicating the situation even more emoji are platform-dependent, meaning the same emoji may look different when viewed on two different devices.

While keyword searching is many lawyers’ default starting point for eDiscovery review, it’s not necessarily a viable option with social media. As an initial matter, electronic files are indexed during eDiscovery processing to make them text searchable. There is a threshold text requirement for indexing. Some social media content does not have enough text to meet this requirement.

Moreover, it’s difficult to formulate effective keyword searches for social media. The text content of social media simply does not lend itself to word searches. Many social media posts replace words with graphics, symbols or links. Non-standard English is commonplace.

So long as these significant limitations are recognized, keyword searches can still be very useful. An example is names of individuals and companies, which are important search terms in most matters. Unlike other social media content, names are likely to be written out in full and spelled correctly.

Another useful standard review technique is filtering. Filtering is a simple technique to create a review set based on criteria such as date range and file type. For instance, photos are critical social media evidence in many employment and personal injury cases. Filtering is a quick and easy way to focus review on the file types typically created by digital cameras and smartphone cameras.

Social media is on the leading edge of eDiscovery and review strategy is still developing. The greatest challenge may be adopting a mindset that words are relatively unimportant. The informal, non-text content of social media requires creative approaches to analysis and review. In many instances, it will also require old school linear (i.e., record-by-record) review.

Social media’s distinctive characteristics create practical challenges in discovery from identification through review. Successfully navigating this shifting and unfamiliar landscape demands an understanding of how social media is different from traditional data sources and the eDiscovery implications of those differences.

SHARE ON SOCIAL
Share on facebook
Facebook
Share on twitter
Twitter
Share on linkedin
LinkedIn