A growing number of my clients have questions regarding proving various things about their spouse (or their child’s other parent) using electronic evidence, however obtained via the numerous technological toys out there.
When I listen to a person tell me about the “proof” that person has collected against another, oftentimes my initial reaction is to cringe, thinking of the potential exposure to severe criminal/civil penalties the person might be facing under the Federal and Texas Anti-Wiretapping Statutes.
I’ve come up with a too-simple rule of thumb, which I’ll state, then support. The rule boils down to – Read at Home all you want, but Recording is a No-No. I’ll explain…
In Collins v. Collins, 904 S.W.2d 792, 796 (Tex.App.-Houston [1ST Dist.] 1995), the Court said, “two Texas courts of appeals have held that the interception of a telephone conversation by a spouse is illegal.” (Citing to Kent v. State, 809 S.W.2d 664, 668 (Tex.App.-Amarillo 1991, pet. ref'd) (defendant violated former Tex.Penal Code § 16.02 by placing a wiretap on the wife's telephone); Turner v. PV Int'l Corp., 765 S.W.2d 455, 469-71 (Tex.App.-Dallas 1988), writ denied per curiam,778 S.W.2d 865, 866 (Tex.1989). FN2 The Collins court, in footnote 2, said further, “We recognize the Texas Supreme Court, in denying writ, noted that the denial was not to be construed as approving the holding of the court of appeals on the admissibility of the tape recorded telephone conversations.”
Here’s what the two applicable provisions say specifically about taping, eavesdropping, spying, whatever word used to describe the activity. First, from the Texas Penal Code § 16.02:
(a) In this section, (a huge list of terms, including “intercept”) have the meanings given those terms in Article 18.20, Code of Criminal Procedure.
(b) A person commits an offense if the person:
(1) intentionally intercepts, endeavors to intercept, or procures another person to intercept or endeavor to intercept a wire, oral, or electronic communication;
* * *
So, we turn to the definition of intercept in the Code of Criminal Procedure to find:
(3) “Intercept” means the aural or other acquisition of the contents of a wire, oral, or electronic communication through the use of an electronic, mechanical, or other device. (Art. 18.20. `Definitions’)
The civil side of the above issue is set out in Chapter 123 of the Texas Civil Practices & Remedies Code – Interception of Communication. Reading § 123.001. Definitions; reveals
(2) “ Interception” means the aural acquisition of the contents of a communication through the use of an electronic, mechanical, or other device that is made without the consent of a party to the communication * * *
The above section goes on to carve out exceptions for other telephones (apparently on the same line), televisions, radio programs, hearing aids, etc.
Chapter 123 goes on to state that a person can sue another for intercepting a communication, or causing to be divulged the substance of a intercepted communication, and the recoverable damages are severe, as shown in § 123.004:
(1) an injunction against the interception/behavior;
(2) statutory damages of $10,000 for each occurrence;
(3) all actual damages in excess of $10,000;
(4) punitive damages in an amount determined by the court or jury; and
(5) reasonable attorney's fees and costs.
* NOTE * the $10K damages are for every single occurrence of “interception.” Thus, if one person happened to eavesdrop or record another person’s calls for a week, and the other person received 15 calls that week which were intercepted/recorded, the statutory damages alone are $150,000!
Extrapolate the above to email. If the average person receives 15-20 emails per day, regardless of importance, and another person “intercepts” these emails through use of another spy-software or key-logger program, or by delving by hacking into a server, over a week’s time the exposure to damages in a single week is well over a million dollars (20/day * 7 days = 140 msg * $10K/ea = $1,400,000!).
Keep in mind that the above criminal and civil penalties are both activated by the “interception” of a communication, not merely being aware of it.
The difference is akin to a “Peeping Tom” looking surreptitiously into a person’s window when they believe they are alone and watching them without their knowledge or consent. This is a violation of their expectation of privacy, which is protected in the United States. However, that same sense of visual privacy does not exist within the home itself, unless there were a closed door, etc., to block the view. Likewise, if people are talking in public, they cannot reasonably expect their conversation to remain private, as anyone can easily overhear them. But, the same conversation behind closed doors, with a listening device in the room unbeknownst to all of them, or a “bugged” phone call, these are illegal “interceptions.”
Illustrating the difference, we can look at the New Jersey case of White v. White, 344 N.J.Super. 211, 781 A.2d 85 (N.J.Super.Ch.,2001). In White, In a divorce, husband filed a motion to suppress as evidence against him his e-mail that had been stored on the hard drive of a family computer. The Court held that: (1) wife did not unlawfully access stored electronic communications in violation of the New Jersey Wiretap Act, and (2) wife did not commit tort of intrusion on seclusion by accessing those e-mails.
The computer in White was readily accessible to both parties, with each of them using it from time to time, and there were no passwords other than that necessary to login to the system, encryption, or other indications that the husband wanted privacy for his activities on the computer. The husband had an AOL account, which he was using to email his girlfriend, and viewing pictures. His wife’s suspicions were apparently aroused when she allegedly found a printed letter in her husband’s belongings, so she caused the computer to be investigated.
What boiled out of the above case, which isn’t “law” in Texas but is instructive, is that material simply “stored” on a machine is not “intercepted” merely by the reading of it by one not a direct party to that communication. The computer, if it is not kept in a secure location, or kept secured by passwords and security software/settings, might be considered a community appliance for everyone to use. Therefore, there it would not be “reasonable “ to expect privacy for any actions on that computer from anyone else in the community – the other spouse included.
Thus, if email has already been received, and is residing or is Stored on a computer’s memory, it is not an illegal interception to merely read it. There hasn’t yet been a case as precisely on point as White in Texas that I’ve found, but I’ve every reason to believe that the results will be similar.
So, back to the rule I said earlier, Read all you want, but Recording is a No-No! Even though one can purchase neat little eavesdropping electronics, be very careful how they are used. Not only can a person not use those recordings in court, they could end up causing bankruptcy and/or jail time.
Enjoy the NFL Playoffs!
J3
John Powell, III handles all types of Family Law matters, including, but not limited to, divorce, child custody and support cases, adoptions and paternity matters, grandparent’s rights and access to their grandchildren, sibling interventions, and modifications of previously-issued orders of the court concerning support, possession of, and access to, a person’s children.
