Feeds

Judge orders turnover of woman's deleted Facebook posts

Does content ever die online?

The Power of One eBook: Top reasons to choose HP BladeSystem

A New York state judge has ruled that a woman's deleted postings on Facebook and MySpace must be turned over to a company fighting allegations she suffered “permanent injuries” that have prevented her from living an active lifestyle.

Last week's decision from the Supreme Court of New York's Suffolk County said that under the state's court rules, Kathleen Romano had no reasonable expectation that the information she posted to restricted parts of the social networking sites would remain private, even if she had previously deleted it. Because the postings may contradict claims she made about the injuries she sustained, they are fair game under New York's discovery procedures.

“The information sought by defendant regarding plaintiff's Facebook and MySpace accounts is both material and necessary to the defense of this action and/or could lead to admissible evidence,” Judge Jeffrey Arlen Spinner wrote. “In this regard, it appears that plaintiff's public profile page on Facebook shows her smiling happily in a photograph outside the confines of her home despite her claim that she has sustained permanent injuries and is largely confined to her house and bed.”

His order grants the defendant "access to plaintiff's current and historical Facebook and MySpace pages and accounts, including all deleted pages and related information ... in all respects."

The case is the latest reminder that, contrary to assurances from Facebook and other services, the online scribblings we leave are long lasting and can't always be restricted to a set number of friends. Facebook in particular has sought to assure users they can delete postings or accounts and can control who gets to see various user content.

But as Santa Clara University law professor Eric Goldman notes here, Facebook's privacy policy is anything but clear.

It states that “Removed and deleted information may persist in backup copies for up to 90 days, but will not be available to others.”

It goes on to warn that information may live on in various forms, including content shared with other users or Facebook applications. Then, there's the caveat that, “We cannot guarantee that only authorized persons will view your information. We cannot ensure that information you share on Facebook will not become publicly available. We are not responsible for third party circumvention of any privacy settings or security measures on Facebook.”

Parsing the legalese, it would seem that deleted posts might eventually escape a court's reach, provided enough time passes between the time they are deleted and the time the discovery request is made. But then again, maybe not.

As we've said before and Goldman says again:

“This case only tells us what we already knew – never post anything online that will be inconsistent with the story you're planning to tell others. The inconsistent material can surface even if the post is made in a non-public venue and even if you delete it later.” ®

Designing a Defense for Mobile Applications

More from The Register

next story
DARPA-derived secure microkernel goes open source tomorrow
Hacker-repelling, drone-protecting code will soon be yours to tweak as you see fit
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Don't look, Snowden: Security biz chases Tails with zero-day flaws alert
Exodus vows not to sell secrets of whistleblower's favorite OS
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
Four fake Google haxbots hit YOUR WEBSITE every day
Goog the perfect ruse to slip into SEO orfice
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.