This page contains a Flash digital edition of a book.
Managed IT Support Take the worry, time and costs out of managing your systems and applications. Give your workforce the freedom to do what it does best—pursue your business goals.


Backups Make viruses, corruptions, hardware and user errors a thing of the past. Our reliable backup system and solutions are versatile and customized to fit your business and budget. We know how to protect your data!


Email Email solutions are our specialty! From Exchange and hosted email to archiving and encrypted email, we’ll improve your communication.


Network Security Data and network security are mandatory and the variables are constantly changing. We routinely search, update and install technology solutions with security features that protect your information and your company.


IT Consulting and Design Let our technical engineers assess your existing system and your needs. We’ll design a system that keeps you running smoothly and is scalable for future growth.


www .choicetech.com


Ask us about a FREE network assessment 410.527.0072 | 800.718.1762


what the Ledbetter defendant did when its subpoenas to three social networking websites failed.8


It requested the court to


order plaintiffs to sign an authorization allowing the third- party sites to release the requested information. Despite arguing that the proper course of action was to attempt to force the third-party sites to provide the information, and arguing that the authorizations contained waivers of liability that plaintiffs were not comfortable signing, the court ordered plaintiffs to execute the consents so that defendant could obtain the information. A different result in Mackelprang favored the plaintiff.


Tere, plaintiff sued her employer for sexual harassment.9 Te defendant filed a motion to compel plaintiff to execute consent forms to obtain e-mail communications from two MySpace accounts allegedly set up by Plaintiff.10


Te court


agreed that “Defendant is engaging in a fishing expedition since, at this time, it has nothing more than suspicion or speculation as to what information might be contained in the private messages.”11


8 See Ledbetter v. Wal-Mart Stores, Inc., et al., n.14, infra. 9 See n.7, supra. 10 Id. at *4. 11 Id. at *7.


50 Trial Reporter / Winter 2010


and determined that intrusion into Plaintiff ’s privacy did not warrant wholesale production of messages where there was no indication of relevance, and no indication that the messages contained sexually related communications between plaintiff and co-employees.12


Subpoenas to Hosts of Social Networking Site Defendants’ subpoenas directly to the social networking


companies will oftentimes be unsuccessful because the site administrators fiercely object to providing this information. In Ledbetter v. Wal-Mart Stores, Inc., et al., the U.S. District Court for the District of Colorado denied plaintiffs’ motion for protective order from defendant’s subpoenas of Facebook, MySpace, and Meetup.com.13


Tere, plaintiffs filed a suit


alleging permanent physical and psychological treatment. While the parties were battling over the plaintiffs’ motion for protective order, some of the social networking administrators refused to play ball.14


Tough the Court went so far as to Te court examined the relevance and discoverability of evidence in sexual harassment lawsuits,


12 Id. at *19. 13 Order Denying Plaintiff ’s Motion for Protective Order, docket entry 179, Ledbetter v. Wal-Mart Stores, Inc., et al., No. 1:06-cv-01958-WYD-MJW, (D. Colo. Apr. 21, 2009).


14 Id. Te court denied the motion for protective order, opining that plaintiffs’ privacy rights were sufficiently protected by an earlier stipulated confidential order that precluded public dissemination of private information.


conclude that “the information sought within the four corners


Page 1  |  Page 2  |  Page 3  |  Page 4  |  Page 5  |  Page 6  |  Page 7  |  Page 8  |  Page 9  |  Page 10  |  Page 11  |  Page 12  |  Page 13  |  Page 14  |  Page 15  |  Page 16  |  Page 17  |  Page 18  |  Page 19  |  Page 20  |  Page 21  |  Page 22  |  Page 23  |  Page 24  |  Page 25  |  Page 26  |  Page 27  |  Page 28  |  Page 29  |  Page 30  |  Page 31  |  Page 32  |  Page 33  |  Page 34  |  Page 35  |  Page 36  |  Page 37  |  Page 38  |  Page 39  |  Page 40  |  Page 41  |  Page 42  |  Page 43  |  Page 44  |  Page 45  |  Page 46  |  Page 47  |  Page 48  |  Page 49  |  Page 50  |  Page 51  |  Page 52  |  Page 53  |  Page 54  |  Page 55  |  Page 56  |  Page 57  |  Page 58  |  Page 59  |  Page 60  |  Page 61  |  Page 62  |  Page 63  |  Page 64  |  Page 65  |  Page 66  |  Page 67  |  Page 68