Introduction
The past few years have witnessed a dramatic increase in the number of companies permitting (and in some cases, even encouraging) employees’ use of personal devices for work purposes. This practice—often referred to as “Bring Your Own Device,” or BYOD—potentially benefits employers and employees alike. BYOD, however, also poses both practical and legal challenges.
A threshold question in discovery is whether a litigant has “possession, custody, or control” of the information sought.
Potential Benefits
BYOD can benefit companies in various ways. For example, corporate IT departments face lower long-term support costs if employees bear at least some of the responsibility for purchasing and maintaining their devices. Employees may also feel a greater sense of ownership and be more productive and engaged when they can work on their personal devices, rather than having to carry separate work and personal devices.
Potential Challenges
Federal Rule of Civil Procedure 34 refers to documents “in the responding party’s possession, custody, or control.”
Practical considerations seem to abound as well. For example, even if a company might legitimately assert control over its employees’ devices or data, the risk of demoralizing employees (who may resent an employer who copies data from their cell phones) may deter the company from implementing such a practice. Moreover, a company that frequently finds itself in litigation may hesitate to declare in a policy that it “owns” data on employees’ personal devices, lest it draw an argument that the company should be required to produce that data.
Some of companies’ most significant concerns, of course, relate to security: companies need to protect their trade secrets, financial data and other sensitive information. Various device manufacturers make increased security available on their devices for enterprise use.
But unless a company is willing to invest in security software and mandate its use by employees, the levels of security on employees’ devices will differ. And some devices may be less capable of implementing the full range of security that a company may want.
Although security issues have not come up squarely in any case, they may add another layer of complexity to whether companies can “control” the data on their employees’ devices. For example, an employee may put a password on her device, effectively preventing any third party, including her employer, from accessing it.
Conversely, a company may demand that employees install certain security software that provides the company with the ability to access (and/or delete) data on a device, regardless of the employee’s own settings.
Case Law: Use of Personal Devices
The case law relating to BYOD is relatively thin. In recent months, however, two cases have addressed the discoverability of text messages on personal devices. One permitted the discovery of such data, and the other did not.
The cases are distinguishable—in one, at least some of the cell phones at issue were company-issued and were used for work purposes, and in the other, there was no showing to that effect. Going forward, the analysis may turn on these factors.
In In re Pradaxa,
In re Petition of Boehringer Ingelheim Pharm., Inc., & Boehringer Ingelheim Int’l GmbH, in Pradaxa (Dabigatran Etexilate) Products Liab. Litig., 13-3898,
Plaintiffs had requested text messages that were sent by the defendant pharmaceutical company’s employees. As characterized in the opinion, the company acknowledged “that some [of its] employees use[d] their personal cell phones while on business and utilize[d] the texting feature of those phones for business purposes,” notwithstanding the company’s policy against doing so, “yet balk[ed] at the request of litigation lawyers to examine these personal phones.”
Just a few months earlier, in Cotton v. Costco Wholesale Corporation, the District of Kansas held that a company did not have “possession, custody, or control” over text messages sent by its employees.
The decisions in Pradaxa and Cotton appear to follow a trend. With regard to personal computers, courts have been willing to order data collection from personal devices when a showing has been made that the device was used for work purposes. For example, in Genworth Financial Wealth Management v. McMullan,
Both Genworth Financial and Pradaxa suggest that discovery of personal devices will be allowed (or, at least, that courts will conclude that the data on personal devices should have been subjected to a legal hold) where the requesting party can make some showing that potentially relevant data is located on the device, regardless of whether that device is a personal computer or a personal cell phone containing text messages.
The decision in Cotton is consistent: in that case, Plaintiff did not contend “that the employees used the cell phones for any work-related purpose,” and the court denied discovery of personal text messages.
One also can reasonably infer from these cases that a litigant cannot use the “possession, custody, or control” standard as both a sword and a shield. A company with a BYOD policy that (i) provides that the company controls all data on an employee’s personal device, (ii) requires employees to synchronize certain data with the company’s servers, and (iii) requires installation of an application that permits the company to remotely “wipe” the device if it were lost, for example, might find it challenging to argue, in response to a motion to compel, that it did not “control” the data in question. This may suggest that companies should exercise caution in broadly asserting control over employee data, absent an effective means of exercising that control.
Conclusions
While there is not yet perfect clarity in judicial decisions regarding the discoverability of information on personal devices, some trends are emerging. First, courts are probably unlikely to order discovery of information on personal devices absent any showing that the personal devices were used for work purposes (or were in some other way relevant to the litigation).
Second, actual or perceived spoliation may make a court more likely to order broader preservation or production of electronic data.
Just as courts have begun to confront certain issues related to BYOD, other novel questions have started to arise. For example, some device manufacturers allow a user to run two different interfaces on the same device. How much, if any, discovery should be permitted on the “personal side” of such a device?
The principles addressed in this article may be relevant to resolving these and related questions. Although predicting the future is tricky business, it seems safe to say that issues like those surrounding BYOD will be with us for some time to come.
Learn more about Bloomberg Law or Log In to keep reading:
See Breaking News in Context
Bloomberg Law provides trusted coverage of current events enhanced with legal analysis.
Already a subscriber?
Log in to keep reading or access research tools and resources.