Examples of how Facebook, Craigslist, eBay, and other popular web destinations are used in legal practice Ethical and practical matters that lawyers need.

Slides:



Advertisements
Similar presentations
Don’t be bullied, or be a bully.
Advertisements

Wolfpack Advocacy Hour January 10, 2012 Grade 10.
Jurors Gone Wild? Chief Judge Leonard Stark (Delaware) Judge Ron Clark (E.D. Tex) Judge Roy Payne (E.D. Tex) Douglas A. Cawley, McKool Smith.
CYBERBULLYING The internet has created a new world for people from alla parts of the world to meet, connect and exchange information Unfortunately, it.
Campbell County Middle School
Establish Access To, Making Contact With, and Selecting Participants A Sharon A Jamie.
What you don’t know CAN hurt you!
This week is anti-bullying week.
Chapter 13: Criminal Justice Process ~ Proceedings Before Trial Objective: The student should be able to identify the required procedures before a trial.
Hypotheticals for Discussion.  You are appointed to represent Jamie, age 10 and Jenny, age six, in a child custody dispute. In a private meeting, James.
Comparative Law Spring 2002 Professor Susanna Fischer CLASS 29 GERMAN CRIMINAL PROCEDURE III FRENCH CIVIL PROCEDURE March 26, 2002.
Guided notes provided Chapter 16 Sections 1 & 2.  Courtrooms job is to provide a place for the plaintiff and defendant to resolve their differences.
1 “Technology and Social Networking”. 2 Objectives 1.Describe technology that youth are using for social networking. 2.Recognize benefits and dangers.
Level 2 Award in Social Networking for Business Day 4 Tutor: Alan Jarvis.
Growing up Digital Opportunities and challenges for parents.
Copyright Laws.
Internet Safety Mrs Bhayat How Much Do You Know?.
How To Protect Your Privacy and Avoid Identity Theft Online.
Raising a 21 st Century Learner; Shining a Light on the Technology Native Presented by Leslie Watnik MA/MST, PD/SDA, Parent.
LAWYERS ETHICS Poverty Law II Irene M. Opsahl. APPLICABLE PROFESSIONAL RULES  Minnesota Rules of Professional Conduct 
SEO Toolkit – Part 1: Keyword Research. SEO Has 3 Main Legs: Copyright , Subscription Site Insider a division of Anne Holland Ventures, Inc.
Stop the Creepers and Cyberbullies! 5 Easy Ways to keep yourself safer online!
SUU CSIS 1000 Created by: Dave Barney, Semantic Discovery.
JMU GenCyber Boot Camp Summer, Cyberspace Risks and Defenses Facebook Snapchat P2P filesharing Apps Craigslist Scams JMU GenCyber Boot Camp© 2015.
Use and Regulation of Social Media April 5, 2011 – Destin, Florida.
By: Brandee Burke.  This is an interactive slideshow that is going to teach you all about how to be safe while using the internet and also other kinds.
Sexting Criminal Teen Trend
Broadcasting News Trivia "LESSON PLANS." BBC News. BBC, 30 Jan Web. 19 Nov
This Presentation Evening is designed to inform you about any potential threats that your children could find themselves when online. At no point is it.
Social Networks Cyberbullying Techno Addiction Digital footprint Spam Internet shopping The positive side Netiquette.
Chloe Miles IMPROVING PRODUCTIVITY USING IT. Menu Using Word Advantages Disadvantages Conclusion E-Safety Social Media Dangers of Social Media Sites Staying.
Unit 2 Lesson 2.05 Social Networking Ethics & Responsibility.
Chapter 1 The Pursuit of Justice Unit #1 Notes Packet.
Sexting Risks and Consequences Middle Secondary Lesson plan.
6/5/ SAI 2015 Superintendent– Mentor/Mentee Meeting Top 5 Legal Issues this Fall Matt Carver, J.D., Director of Legal Services tel
By: Max Lau. First of all, it can affect you in the future when you apply for college or university. Such as when they look at your digital footprint,
Which of the five types of crimes are shown in the pie chart? Bell Ringer.
PA203 Unit 8 INVESTIGATIONS INVESTIGATIONS. Questions so far?  Get any late assignments in by Tuesday night for credit. Late assignments cannot be accepted.
MY ONLINE CODE In the last 2 years of digital literacy I have learned the proper ways to act and why to act that way online, I have also learned other.
Internet Safety How To Keep Your Children Safe As They Use The Web.
My Good Deed for Safer Internet Day Calum - 4W My good deed for Safer Internet Day 2015 is: Always try to help others and teach your parents or.
WEB 2.0 PATTERNS Carolina Marin. Content  Introduction  The Participation-Collaboration Pattern  The Collaborative Tagging Pattern.
E-Safety. A great place… Image by: Shutterstock/nasirkhan As we have discussed over the last few lessons, the Internet is a great tool for sharing information,
Lauren Sayah, Abby Wills, Sara Stahl. What is Cyber Bullying?  Is the use of electronic means by a minor to torment, threaten, harass, humiliate, embarrass.
MY DIGITAL FOOTPRINT. WHAT IS A DIGITAL FOOTPRINT? Each time you log onto social media, you leave a trail behind you, mostly based on what you search.
Net Cetera Chatting with Kids About Being Online.
PGHS Advocacy Digital Citizenship Lesson 2
Internet Safety Krista Sell IST 525 Kutztown University Summer 2011.
DIGITAL LAW. SEXTING – A Modern Phenomena Sample scenario: A 17 yr old boy and a 15 yr old girl meet at a party. The girl sends a playful, but sexually.
PRIVACY BOOTCAMP Jack Vale - Social Media Experiement.
Drafting Boyd. Online exercise Look the term up on Wikipedia or Google, make note of how it is referenced, etc.), then search for the same term on google.
YOU GOT THEM, NOW WHAT DO YOU DO?.  Facebook began in 2004  Facebook, LinkedIn, Twitter, Snapchat, Kik, Instagram, Youtube, Tumbler, Text ‘em  Given.
Social Networks are a website or other application which enables users to communicate with each other by posting information, comments, messages, images,
Alexis McGillivray All gifs from giphy.com. How Might Your Digital Footprint Effect Your Future Opportunities? You have ticked the Box that says “seen.
Awareness raising session for Parents and Carers June Todd Awareness raising session for Parents and Carers June Todd.
Classic Connections: Innovative Methods for Making Education Work.
E-SAFETY. LYNDON B. JOHNSON (FORMER US PRESIDENT) “Every man (sic) should know that his conversations, his correspondence, and his personal life are private.”
Sharing Personal Data ‘What you need to know’ Corporate Information Governance Team Strategic Intelligence.
Digital Footprints By: Devon Nicholson. What is a digital footprint? A digital footprint is an online footprint in which people can look at what you have.
Cybersafety 4 Kids: Smart Moves in an Online World.
Sexting Risks and Consequences Upper Secondary Students.
Pretrial and Courtroom Procedures Principles of LPSCS.
Southington Police Department
Online safety may 2017.
Sharing on the Internet
Cyberspace Risks and Defenses
“We don’t have a choice on whether we DO social media, the question is how well we DO it” Erik Qualman For example we don’t have a choice sometimes if.
Legal and Ethical Issues
CCE Week 5 Agendas.
Online Safety Assembly.
Presentation transcript:

Examples of how Facebook, Craigslist, eBay, and other popular web destinations are used in legal practice Ethical and practical matters that lawyers need to consider when attempting to use social media evidence in court How you can bring this timely topic into the classroom and help your students develop a valuable skill set PREPARING FUTURE LAWYERS TO FIND THEIR INNER VERONICA MARS: TEACHING STUDENTS HOW TO USE FACEBOOK, TWITTER, AND OTHER SOCIAL MEDIA FOR INVESTIGATIVE PURPOSES IN LEGAL PRACTICE

THIS IS HAPPENING. AND IT’S IMPORTANT.

Griffin v. State, 419 Md. 343 (2011): authentication of electronic communications (MySpace messages) based on the content and circumstances of those communications is acceptable Tienda v. State, 358 S.W.3d 633 (2012): Defendant convicted of murder due in part to postings he had made on his MySpace page Dexter v. Dexter, 2007 WL (Ohio Ct. App. May 25, 2007)): Postings on MySpace page by Defendant discussing drug use were significant factor in loss of custody Lalonde v. Lalonde, 2011 WL (Ky. Ct. App. Feb. 25, 2011): Facebook photos showing mother drinking were properly admitted into evidence in a child custody dispute with father, even though she had not posted them or given permission to be tagged in them, because they accurately reflected her activities THIS IS HAPPENING. AND IT’S IMPORTANT

NOW, HOW CAN YOU HELP YOUR STUDENTS UNDERSTAND THIS NEW KIND OF LEGAL RESEARCH? 1.Demonstrate relevance 2.Provide strategies 3.Frame issues in both practical and ethical terms

How can attorneys use this type of information? Research potential jurors during voir dire Look for photos of undisclosed assets during bankruptcy proceedings Evidence of activities in personal injury cases Evidence of relationships or questionable activities in divorce or custody cases Documentation of criminal activities—theft, assault, or illicit activities Metadata can help establish location for alibis (or not!) 1. DEMONSTRATE RELEVANCE

THIS ACTUALLY HAPPENED: “Joe,” an adult male, was taunting the younger sister of “Bill,” a teenager. Bill went outside and punched Joe in the face, knocking him off his bike. Joe pressed charges, and a public defender was representing Bill when she went on the local Topix board…

A sampling of the Ada, Ohio Topix board on March 27, 2013.

Depending on an attorney’s clients, cases, areas of law, these topics might be worth checking out.

And admit it– you’re probably going to look at this one because you’re just wondering– why do people in Ada have so much to say about Dollar General?

Boyfriend, a sex offender, was in jail and had a (recorded!) phone call with Girlfriend, whose children were under the purview of a Guardian ad Litem. Boyfriend and Girlfriend agreed that Girlfriend would raise bail money for Boyfriend by entering the World’s Oldest Profession. The Guardian ad Litem did some investigating and made her way to the digital streetcorner, a.k.a. the Casual Encounters section on Craigslist.

From the Lima-Findlay Craigslist Casual Encounters section on March 28, Censored because there are some legitimately filthy people on Craigslist. Seriously, move along. Nothing to see here. Unless you’re trying to find out if someone is prostituting herself to pay her boyfriend’s bail, in which case, there might be something to see here after all.

SPEAKING OF SELLING THINGS ON THE INTERNET, EBAY IS THE NEW PAWN SHOP.

This is actually SO common that we couldn’t narrow it down to just one good example.

Attorneys will probably need to do searches that are slightly more sophisticated than this one.

AND OF COURSE, FACEBOOK

YET ANOTHER THING THAT SERIOUSLY HAPPENED: Mother was dating a convicted sex offender; Baby was being represented by a GAL. Mother had multiple Facebook accounts, including one for Baby (and “Baby” Liked both a bar and a porn site). At her hearing, Mother swore she was no longer dating Sex Offender, and that he was therefore nowhere near Baby. Facebook, however, told a different story… “Afterglow” *shudder*

LESSONS FROM STEUBENVILLE  Evidence can be gathered from myriad social media sites, such as those already mentioned and others like Instagram, YouTube, Twitter  Vigilante justice is both a blessing and a curse in the internet age– without blogger Alexandra Goddard, the case might never have garnered the national attention that pressed local authorities into cracking down on the rapists. But innocent Steubenville residents might have been hurt by Local Leaks (a WikiLeaks-style site that addressed the case).  Cast a wide net in terms of not just social media sites but also networks of friends. While one person might have adequately protected their postings, one of their friends might not have, giving you access to pictures, videos, etc.

 Are your actions in pursuing evidence morally and ethically defensible?  Have you taken all necessary steps to preserve and authenticate the evidence?  Can you get the evidence admitted in court? PRACTICAL AND ETHICAL CONSIDERATIONS

Social media research ties in with traditional legal research skills and competencies. Make a research plan Keep a research log Organize your saved research TEACHING IT!

Applying the (slightly modified) Rombauer Framework to Social Media Research: Preliminary Analysis is not a waste of time Following your Search Strategy will help make sure you don’t miss anything Refine, Double Check, & Update MAKE A RESEARCH PLAN

1.Facts 2.Search Terms 3.Issue & Jurisdiction 4.Search Strategy/Knowledge Assessment 5.Secondary Sources PRELIMINARY ANALYSIS

MAKE A RESEARCH PLAN Facts: What do you know? Hometown? Alma Mater? Employer? John Smith

MAKE A RESEARCH PLAN Issue & Jurisdiction: What? (photos, video, writings) Where? When?

Think about your search terms. Then think about synonyms. MAKE A RESEARCH PLAN “Ellen Richardson” “Ellen M. Richardson” “Ellen Minot Richardson”

Then, think about related terms: MAKE A RESEARCH PLAN

Finally, develop your research strategy. “I did a few Google searches and wasn't able to come up with much so I went to the high school football Web site and made a list of names. I read a few local high school forums to get a gist of who was who and then started searching Twitter. I figured I'd see what the other kids were saying about the case. You can learn a lot through these conversations.” -Alexandra Goddard MAKE A RESEARCH PLAN

Consult your secondary sources. MAKE A RESEARCH PLAN Got a photo? Try Google Reverse Image Search or TinEye

1.Print/save everything. 2.Make sure the item has the date and web address. 3.Where/how did you find it? What parts of your strategy were successful? 4.Keep it clean. Stick to publicly available info without a discovery request. KEEP A RESEARCH LOG found photos of your ^ When did you find it? What’s the URL? A printout containing the above info & notes on how you found & saved it.

REFINE, DOUBLE CHECK, & UPDATE ? Photo not obviously ripped from the headlines Postings going back more than a day Suspiciously low number of people following as compared to followed— where are his friends?

Seek out alums or local attorneys with practical experience Social media is constantly evolving—don’t get too hung up on one search strategy Do a live example (but check with the person first!) ADDITIONAL THOUGHTS ON TEACHING:

QUESTIONS? COMMENTS? “[Social media evidence is] the wave of the future…It's going to change the way evidence is gathered in cases. It's already happening.” - Harvard Law School professor and criminal defense lawyer Alan Dershowitz

THANK YOU!