Authentication of Social Media
In his State E-Discovery column, Mark Berman uses case law to demonstrate how courts have been flexible as to the manner of authenticating electronic evidence, with often comes from a combination of sources.
August 31, 2018 at 03:00 PM
7 minute read
Social media communications are becoming increasingly important evidence in litigation and the New York State Court of Appeals in People v. Price, 29 N.Y.3d 472 (2017), made it clear that there is no strict rule or formula that must be met in order to have social media communications authenticated in order to be admitted into evidence. However, what is clear is that, whether for purposes of summary judgment or for trial, when a party denies that the actual social media post or picture, frequently offered in the form of a “screen shot,” was his or hers, there must be sufficient indicia, which may not be that difficult to obtain, that the communication came from the author in order to be properly authenticated.
Case Law Provides Guidance
As demonstrated by the cases described below, “courts have been flexible as to the manner of authenticating electronic evidence. Often the authentication comes from a combination of sources. Also, the evidence is frequently authenticated circumstantially, such as through the distinctive nature of the contents of the messages.” Matter of R.D. (C.L.), 58 Misc. 3d 780 (Fam. Ct. N.Y. Co. 2017).
The concurrence in Price noted:
[g]iven the general population's mass consumption and use of social media, “[p]redictably, social media postings are becoming an important source of evidence.” Courts have recognized that this evidence presents unique challenges as some commentators have noted, “social media is often stored on remote servers, is accessed through unique interfaces, can be dynamic and collaborative in nature, and is uniquely susceptible to alteration and fabrication.” Arguably, traditional approaches to authentication are inadequate because these new online platforms “can complicate the application of those traditional concepts, and we must be prepared to deal with these complications.” On this appeal, we are squarely presented with the question of how our flexible authentication standard applies to social media images. Therefore, we have the opportunity to resolve an evidentiary issue of growing concern given the proliferation and ubiquitousness of social media.
(citations omitted) The majority in Price was clear in that it was not
adopting a general and comprehensive test for authentication to be applied, not only in this case, but in all cases involving authentication of photographs found on a social network web page…. In our view, it is more prudent to proceed with caution in a new and unsettled area of law such as this. We prefer to allow the law to develop with input from the courts below and with a better understanding of the numerous factual variations that will undoubtedly be presented to the trial courts.
In Price, the People failed to establish that it was defendant's web page through direct or circumstantial evidence, or with proof establishing “reasonable inferential linkages [that] ordinarily supply foundational prerequisites.” However, the concurrence noted that such evidence may have existed in that the “People had knowledge of personal information posted on the web page which might have established the necessary link to defendant, but the People did not present that evidence as part of the proffer” and that “other evidence arguably addresse[d] the authentication of the web page and the depiction therein, such as proof that the defendant posted or adopted the photograph, or knew of the photograph and allowed it to remain on the profile page without objection.”
In Matter of R.D. (C.L.), the lower court found that a “screen shot” of text messages sent by a mother to an unknown party agreeing to engage in sex for money was authenticated through the following evidence. The father testified that: (a) he observed the incriminating messages on a cell phone and that the screen shot, although he did not personally take it, was an accurate representation of the messages that he saw on the cell phone; (b) the cell phone belonged to the mother based on his familiarity with the make, model and color of the cell phone; (c) he had seen the mother use the cell phone many times; (d) while he was visiting his daughters, he picked up the cell phone after it rang and the mother asked him to hand it to her; and (e) the cell phone was password protected, making it unlikely that someone, other than the mother, was able to send the messages sought to be introduced.
On the other hand, in Lantigua v. Goldstein, 149 A.D.3d 1057 (2d Dept. 2017), where the party seeking to use social media posts against the alleged author of them was unable to produce the person who obtained such printouts and where plaintiff denied that the printouts were from his Facebook account and that he made the statements therein, the Appellate Division precluded their use because plaintiff “had no other means to prove or disprove their authenticity.”
Further Guidance
The below recent cases provide further guidance as to the various representations courts look for before they will authenticate a social media post or picture:
People v. Cotto, 2018 N.Y. App. Div. LEXIS 5820, 2018 NY Slip Op 05861 (2d Dept. Aug. 22, 2018) (“Photographs of text messages between the defendant and the complainant were properly admitted into evidence” where “complainant's testimony that the photographs of the text messages fairly and accurately depicted the text message conversation between her and the defendant was sufficient to authenticate the photographs”).
People v. Khan, 2018 NYLJ LEXIS 2563 (Crim. Ct. Queens Co. July 27, 2018), (“text messages in this case were properly admitted as a party admission, and only one was admitted for the truth of its contents” where “complainant testified that the messages were actual photographs taken of her phone” and “were received from the defendant's number and the content of the messages would have made no sense unless the originated from the defendant”).
People v. Shortell, 155 A.D.3d 1442 (3d 2017), (private Facebook message authenticated where the second confidential informant “had been Facebook friends with defendant for two years prior to trial and stated that she knew the message came from defendant's account because an icon of defendant's picture was displayed next to it” and that “she had firsthand knowledge of the content of the Facebook message”).
Matter of Montalbano v. Babcock, 155 A.D.3d 1636 (4th Dept. 2017), (screen shot of Facebook post admitted based on the mother's testimony that it accurately represented the father's Facebook page on the date in question and that she had communicated with the father through his Facebook page in the past).
People v. Franzese, 154 A.D.3d 706 (2d Dept. 2017), (YouTube video was “authenticated by a YouTube certification, which indicated when the video was posted online, by a police officer who viewed the video at or about the time that it was posted online, and by the defendant's own admissions about the video made in a phone call while he was housed at Rikers Island Detention Center” and the court, citing Federal Rule of Evidence Rule 901(b)(4), noted that further authenticated was through “its appearance, contents, substance, internal patterns, and other distinctive characteristics”).
Holgado De Vera v. 243 Suydam, 2018 N.Y. Misc. LEXIS 3546, 2018 NY Slip Op 51222(U) (Sup. Ct. Kings Co. April 24, 2018), (text messages authenticated for purposes of summary judgment through an affidavit attesting to an email containing snapshots of text messages with tenant showing the date and time of the messages, and that the tenant identified herself as such).
Mark A. Berman is a partner at Ganfer Shore Leeds & Zauderer and chair of the New York State Bar Association's Committee on Technology and the Legal Profession.
This content has been archived. It is available through our partners, LexisNexis® and Bloomberg Law.
To view this content, please continue to their sites.
Not a Lexis Subscriber?
Subscribe Now
Not a Bloomberg Law Subscriber?
Subscribe Now
NOT FOR REPRINT
© 2025 ALM Global, LLC, All Rights Reserved. Request academic re-use from www.copyright.com. All other uses, submit a request to [email protected]. For more information visit Asset & Logo Licensing.
You Might Like
View AllThe Unraveling of Sean Combs: How Legislation from the #MeToo Movement Brought Diddy Down
When It Comes to Local Law 97 Compliance, You’ve Gotta Have (Good) Faith
8 minute readTrending Stories
- 1No Two Wildfires Alike: Lawyers Take Different Legal Strategies in California
- 2Poop-Themed Dog Toy OK as Parody, but Still Tarnished Jack Daniel’s Brand, Court Says
- 3Meet the New President of NY's Association of Trial Court Jurists
- 4Lawyers' Phones Are Ringing: What Should Employers Do If ICE Raids Their Business?
- 5Freshfields Hires Ex-SEC Corporate Finance Director in Silicon Valley
Who Got The Work
J. Brugh Lower of Gibbons has entered an appearance for industrial equipment supplier Devco Corporation in a pending trademark infringement lawsuit. The suit, accusing the defendant of selling knock-off Graco products, was filed Dec. 18 in New Jersey District Court by Rivkin Radler on behalf of Graco Inc. and Graco Minnesota. The case, assigned to U.S. District Judge Zahid N. Quraishi, is 3:24-cv-11294, Graco Inc. et al v. Devco Corporation.
Who Got The Work
Rebecca Maller-Stein and Kent A. Yalowitz of Arnold & Porter Kaye Scholer have entered their appearances for Hanaco Venture Capital and its executives, Lior Prosor and David Frankel, in a pending securities lawsuit. The action, filed on Dec. 24 in New York Southern District Court by Zell, Aron & Co. on behalf of Goldeneye Advisors, accuses the defendants of negligently and fraudulently managing the plaintiff's $1 million investment. The case, assigned to U.S. District Judge Vernon S. Broderick, is 1:24-cv-09918, Goldeneye Advisors, LLC v. Hanaco Venture Capital, Ltd. et al.
Who Got The Work
Attorneys from A&O Shearman has stepped in as defense counsel for Toronto-Dominion Bank and other defendants in a pending securities class action. The suit, filed Dec. 11 in New York Southern District Court by Bleichmar Fonti & Auld, accuses the defendants of concealing the bank's 'pervasive' deficiencies in regards to its compliance with the Bank Secrecy Act and the quality of its anti-money laundering controls. The case, assigned to U.S. District Judge Arun Subramanian, is 1:24-cv-09445, Gonzalez v. The Toronto-Dominion Bank et al.
Who Got The Work
Crown Castle International, a Pennsylvania company providing shared communications infrastructure, has turned to Luke D. Wolf of Gordon Rees Scully Mansukhani to fend off a pending breach-of-contract lawsuit. The court action, filed Nov. 25 in Michigan Eastern District Court by Hooper Hathaway PC on behalf of The Town Residences LLC, accuses Crown Castle of failing to transfer approximately $30,000 in utility payments from T-Mobile in breach of a roof-top lease and assignment agreement. The case, assigned to U.S. District Judge Susan K. Declercq, is 2:24-cv-13131, The Town Residences LLC v. T-Mobile US, Inc. et al.
Who Got The Work
Wilfred P. Coronato and Daniel M. Schwartz of McCarter & English have stepped in as defense counsel to Electrolux Home Products Inc. in a pending product liability lawsuit. The court action, filed Nov. 26 in New York Eastern District Court by Poulos Lopiccolo PC and Nagel Rice LLP on behalf of David Stern, alleges that the defendant's refrigerators’ drawers and shelving repeatedly break and fall apart within months after purchase. The case, assigned to U.S. District Judge Joan M. Azrack, is 2:24-cv-08204, Stern v. Electrolux Home Products, Inc.
Featured Firms
Law Offices of Gary Martin Hays & Associates, P.C.
(470) 294-1674
Law Offices of Mark E. Salomone
(857) 444-6468
Smith & Hassler
(713) 739-1250