Bingham v. BayCare Health System
Filing
113
ORDER granting 94 Motion for a Determination That Certain E-Mail Communications Are Not Privileged or Otherwise Protected from Discovery. Signed by Magistrate Judge Julie S. Sneed on 7/20/2016. (JR)
UNITED STATES DISTRICT COURT
MIDDLE DISTRICT OF FLORIDA
TAMPA DIVISION
THOMAS BINGHAM,
Plaintiff,
v.
Case No: 8:14-cv-73-T-23JSS
BAYCARE HEALTH SYSTEM,
Defendant.
___________________________________/
ORDER ON MOTION FOR DETERMINATION OF PRIVILEGE
THIS MATTER is before the Court on Defendant’s Motion for a Determination That
Certain E-Mail Communications Are Not Privileged or Otherwise Protected from Discovery
(“Motion”). (Dkt. 94.) Defendant seeks a determination that certain e-mails exchanged between
Plaintiff and his attorneys and thereafter forwarded by Plaintiff to his work e-mail account are not
protected from discovery by the attorney-client privilege. The Court held a hearing on this matter
on June 30, 2016. For the reasons that follow, Defendant’s Motion is granted.
BACKGROUND
On January 29, 2016, Defendant served a subpoena on Plaintiff’s employer, Holladay
Properties Services Midwest, Inc. (“Holladay”), seeking documents related to the allegations in
this lawsuit. In response, Holladay produced the responsive documents, which included e-mails
and attachments between Plaintiff and his attorneys that Plaintiff forwarded from his personal email account to his work e-mail account at Holladay. (Dkt. 96 at 2.) Upon receiving Holladay’s
production, Defendant notified Plaintiff of its receipt of the e-mails, and Plaintiff asserted a claim
of privilege as to the e-mails. (Dkt. 94.) Defendant now seeks a determination that the e-mails
from Plaintiff’s work e-mail account are not confidential and thus not privileged or otherwise
protected from discovery.
APPLICABLE STANDARDS
When the court’s jurisdiction is premised on a federal question in a civil case, federal law
of privilege applies. Hancock v. Hobbs, 967 F.2d 462, 467 (11th Cir. 1992); see Fed. R. Evid. 501
(providing that federal common law governs a claim of privilege unless the United States
Constitution, federal statute, or rules prescribed by the Supreme Court provide otherwise). This
lawsuit was brought in federal court based on federal question jurisdiction as an action under the
False Claims Act, 31 U.S.C. §§ 3729–3733. (Dkt. 32.) Therefore, federal common law applies in
analyzing the attorney-client privilege. The attorney-client privilege protects the disclosures that
a client makes to his attorney, in confidence, for the purpose of securing legal advice or assistance.
Cox v. Adm’r U.S. Steel & Carnegie, 17 F.3d 1386, 1414 (11th Cir. 1994).
To determine if a particular communication is confidential and protected by the attorneyclient privilege, the privilege holder must prove that the communication was intended to remain
confidential and, under the circumstances, was reasonably expected and understood to be
confidential. Bogle v. McClure, 332 F.3d 1347, 1358 (11th Cir. 2003); see also United States v.
Schaltenbrand, 930 F.2d 1554, 1562 (11th Cir. 1991) (“The party invoking the attorney-client
privilege has the burden of proving that an attorney-client relationship existed and that the
particular communications were confidential.”). Thus, the relevant inquiry is not whether the
individual expected his or her communications to remain confidential but rather whether that
expectation was reasonable. United States v. Bell, 776 F.2d 965, 971 (11th Cir. 1985).
-2-
ANALYSIS
In this case, the e-mails at issue represent communications between Plaintiff and his
attorneys that were exchanged on Plaintiff’s personal e-mail account.1 The e-mails contained a
link to a cloud storage account where Plaintiff’s attorneys had uploaded documents for Plaintiff’s
review. Plaintiff then forwarded certain e-mails from his personal e-mail account to his work email account so that he could access the links from work. (Dkt. 94 at 2; Dkt. 96 at 2.) The
forwarded e-mails contain discussions between Plaintiff and his attorneys, as well as links to
documents. (Dkt. 96 at 2.)
Based on the written submissions of the parties and the arguments advanced at the hearing,
the parties agree that the e-mails consist of communications between Plaintiff and his attorneys
regarding this lawsuit. The parties dispute only whether the e-mails in question are protected by
the attorney-client privilege when they were accessed by Plaintiff on his work e-mail account on
Holladay’s “communications system,” which is described in Holladay’s policy as “including email and voice mail systems and Intranet/Internet connections.” (Dkt. 94-1.) As such, the Court
must determine the confidential nature of the e-mails transmitted over Holladay’s communications
systems.
A. Application of Attorney-Client Privilege to Workplace E-Mails
Courts addressing this issue have focused primarily on whether the employer maintains a
policy regarding the use of its computer or e-mail systems. Specifically, courts consider the
specificity of the policy and the extent to which the policy diminishes an employee’s reasonable
expectation of privacy in communications transmitted over the employer’s systems. However,
because the overarching consideration in determining whether a communication is privileged is
1
At the hearing, Plaintiff stated that there were only a few e-mails produced by Holladay over which the instant
dispute arises.
-3-
whether the individual had an objectively reasonable expectation that his or her communications
were confidential, privilege determinations of this nature are extremely fact-specific and often
depend on the particular policy language, if any, adopted by the employer.
Notably, courts have adopted a four-factor test to determine whether a reasonable
expectation of privacy exists in the context of e-mail transmitted over and maintained on a
company server. In re Asia Global Crossing, Ltd., 322 B.R. 247, 257 (Bankr. S.D.N.Y. 2005); see
In re Reserve Fund Sec. & Derivative Litig., 275 F.R.D. 154, 159–60 (S.D.N.Y. 2011) (listing
cases adopting the four-factor test); Leor Expl. & Prod. LLC v. Aguiar, No. 09-60136-CIV, 2009
WL 3097207, at *4 (S.D. Fla. Sept. 23, 2009) (applying the four-factor test). In determining this
issue, courts have considered the following four factors: (1) whether the corporation maintains a
policy banning personal or other objectionable use; (2) whether the company monitors the use of
the employee’s computer or e-mail; (3) whether third parties have a right of access to the computer
or e-mails; and (4) whether the corporation notifies the employee, or whether the employee was
aware, of the use and monitoring policies. See Asia Global, 322 B.R. at 257. The four-factor test
provides persuasive guidance in evaluating whether an individual’s expectation of confidentiality
is reasonable in light of the existence of other factors that tend to cast doubt on the reasonableness
of that expectation, namely the scope of an employer’s policy. See id. at 258 (“[T]he question of
privilege comes down to whether the intent to communicate in confidence was objectively
reasonable.”).
The determination of whether a communication is confidential is somewhat similar to the
search-and-seizure determination under the Fourth Amendment. See id. at 256 (comparing the
Fourth Amendment analysis to the attorney-client privilege analysis); see also cases cited infra
note 2. Under the Fourth Amendment analysis, the court considers whether an individual’s
-4-
expectation of privacy is objectively reasonable. See O’Connor v. Ortega, 480 U.S. 709, 715
(1987) (providing that an individual’s Fourth Amendment rights are implicated only if the conduct
at issue infringes an expectation of privacy “that society is prepared to accept as reasonable”).
Similarly, under the attorney-client privilege analysis, the court must consider whether a
communication was reasonably expected and understood to be confidential. Bell, 776 F.2d at 971.
As such, courts addressing the issue of attorney-client privilege refer to Fourth Amendment cases
addressing an individual’s reasonable expectation of privacy in the context of electronic
communications, as the analysis under both standards requires consideration of whether one’s
expectation of privacy was objectively reasonable.2
Courts also seek guidance from cases
addressing invasion of privacy claims in the context of the workplace, as those cases also consider
an individual’s reasonable expectation of privacy.3
2
For a discussion of an employee’s reasonable expectation of privacy in the workplace under the Fourth Amendment,
see O’Connor, 480 U.S. at 714; United States v. Ziegler, 456 F.3d 1138, 1146 (9th Cir. 2006); Biby v. Bd. of Regents,
of Univ. of Neb. at Lincoln, 419 F.3d 845, 850 (8th Cir. 2005); United States v. Angevine, 281 F.3d 1130, 1135 (10th
Cir. 2002); United States v. Slanina, 283 F.3d 670, 676 (5th Cir. 2002); Muick v. Glenayre Elecs., 280 F.3d 741, 743
(7th Cir. 2002); Leventhal v. Knapek, 266 F.3d 64, 73 (2d Cir. 2001); United States v. Simons, 206 F.3d 392, 398 (4th
Cir. 2000); United States v. DiTomasso, 56 F. Supp. 3d 584, 591 (S.D.N.Y. 2014); United States v. Yudong Zhu, 23
F. Supp. 3d 234, 238 (S.D.N.Y. 2014); United States v. Linder, No. 12 CR 22-1, 2012 WL 3264924, at *8 (N.D. Ill.
Aug. 9, 2012); United States v. Busby, No. CR 11-00188 SBA, 2011 WL 6303367, at *4 (N.D. Cal. Dec. 16, 2011);
Keck v. Virginia, No. 3:10-CV-555, 2011 WL 4589997, at *12 (E.D. Va. Sept. 9, 2011); United States v. Elmquist,
No. 07-00245-01-CR-W-ODS, 2008 WL 3895971, at *10 (W.D. Mo. Aug. 18, 2008) (following the reasoning of
United States v. Thorn, 375 F.3d 679 (8th Cir. 2004)); United States v. Mosby, No. CRIM. A. 3:08-CR-127, 2008 WL
2961316, at *5 (E.D. Va. July 25, 2008); United States v. Hassoun, No. 04 60001 CR BROWN, 2007 WL 141151, at
*1 (S.D. Fla. Jan. 17, 2007); Haynes v. Attorney Gen. of Kan., No. 03-4209-RDR, 2005 WL 2704956, at *4 (D. Kan.
Aug. 26, 2005); United States v. Scrushy, No. CR-03-BE-0530-S, 2005 WL 4149004, at *5 (N.D. Ala. Jan. 21, 2005);
United States v. Bailey, 272 F. Supp. 2d 822, 835 (D. Neb. 2003); United States v. Sims, No. CR 00-193 MV, 2001
WL 36498440, at *7 (D. N.M. Apr. 19, 2001); Wasson v. Sonoma Cty. Jr. Coll. Dist., 4 F. Supp. 2d 893, 905 (N.D.
Cal. 1997); Bohach v. City of Reno, 932 F. Supp. 1232, 1234 (D. Nev. 1996). In this context, the majority of courts
have found that employees do not have a reasonable expectation of privacy in their work computers or in e-mails
exchanged using a work account, especially when the employer retains a policy or otherwise notifies employees that
their equipment or accounts are subject to monitoring.
3
For a discussion of an employee’s reasonable expectation of privacy in materials transmitted over an employer’s
computer system under a claim for invasion of privacy, see Metzler v. XPO Logistics, Inc., No. 4:13-CV-278, 2014
WL 4792984, at *6 (E.D. Tex. Sept. 25, 2014); Lazette v. Kulmatycki, 949 F. Supp. 2d 748, 761 (N.D. Ohio 2013);
Mintz v. Mark Bartelstein & Assocs., Inc., 885 F. Supp. 2d 987, 997 (C.D. Cal. 2012); Gauntlett v. Ill. Union Ins. Co.,
No. 5:CV 11-00455-EJD, 2011 WL 5191808, at *9 (N.D. Cal. Nov. 1, 2011); Yarborough v. King, No. CA 2:112602-MBS-BHH, 2011 WL 5238920, at *5 n.5 (D. S.C. Oct. 3, 2011); Shefts v. Petrakis, 758 F. Supp. 2d 620, 633
(C.D. Ill. 2010); Miller v. Blattner, 676 F. Supp. 2d 485, 497 (E.D. La. 2009); Sporer v. UAL Corp., No. C 08-02835
JSW, 2009 WL 2761329, at *5 (N.D. Cal. Aug. 27, 2009); Thygeson v. U.S. Bancorp, No. CV-03-467-ST, 2004 WL
-5-
In applying the four factors discussed above, courts diverge on the issue of whether there
must be evidence of actual monitoring or whether a policy reserving the right to monitor employee
communications is sufficient to meet the second factor. For example, some courts weigh the act
of enforcement more heavily than the existence of a limiting policy. As such, these courts have
required some evidence that the employer in fact monitored the employee’s communications. E.g.,
Flatworld Interactives v. Apple Inc., No. C1201956JSWEDL, 2013 WL 11319071, at *1 (N.D.
Cal. Dec. 24, 2013); In re High-Tech Employee Antitrust Litig., No. 11-CV-2509-LHK-PSG, 2013
WL 772668, at *7 (N.D. Cal. Feb. 28, 2013); United States v. Hatfield, No. 06-CR-0550 (JS), 2009
WL 3806300, at *9 (E.D.N.Y. Nov. 13, 2009); Brown-Criscuolo v. Wolfe, 601 F. Supp. 2d 441,
450 (D. Conn. 2009).
Other courts, however, have been satisfied with the finding that the employer’s policy
provided a right to access and monitor the employee’s use, regardless of whether the policy was
consistently enforced. These courts have found it sufficient that the employer’s policy reserved
the right—or permitted the employer—to monitor the employee’s communications, without
requiring evidence or a showing of actual monitoring. E.g., L-3 Commc’ns Corp. v. Jaxon Eng’g
& Maint., Inc., No. 10-CV-02868-MSK-KMT, 2014 WL 183303, at *6 (D. Colo. Jan. 12, 2014);
United States v. Finazzo, No. 10-CR-457 RRM RML, 2013 WL 619572, at *9 (E.D.N.Y. Feb. 19,
2013); Chechele v. Ward, No. CIV-10-1286-M, 2012 WL 4481439, at *2 (W.D. Okla. Sept. 28,
2012); Dombrowski v. Governor Mifflin Sch. Dist., No. CIV.A. 11-1278, 2012 WL 2501017, at *6
(E.D. Pa. June 29, 2012); Aventa Learning, Inc. v. K12, Inc., 830 F. Supp. 2d 1083, 1109 (W.D.
2066746, at *18 (D. Or. Sept. 15, 2004); Kelleher v. City of Reading, No. CIV.A.01-3386, 2002 WL 1067442, at *7
(E.D. Pa. May 29, 2002); Garrity v. John Hancock Mut. Life Ins. Co., No. CIV.A. 00-12143-RWZ, 2002 WL 974676,
at *1 (D. Mass. May 7, 2002); Smyth v. Pillsbury Co., 914 F. Supp. 97, 100 (E.D. Pa. 1996). The majority of these
cases have concluded that an employee has no reasonable expectation of privacy in computer files, e-mails, or
electronic data maintained at his or her workplace.
-6-
Wash. 2011); Hanson v. First Nat’l Bank, No. 5:10–0906, 2011 WL 5201430, at *6 (S.D. W. Va.
Oct. 31, 2011); In re Reserve Fund, 275 F.R.D. at 164; In re Oil Spill by the Oil Rig “Deepwater
Horizon” in the Gulf of Mexico, on Apr. 20, 2010, No. MDL 2179, 2011 WL 1193030, at *3 (E.D.
La. Mar. 28, 2011); Alamar Ranch, LLC v. Cty. of Boise, No. CV-09-004-S-BLW, 2009 WL
3669741, at *4 (D. Idaho Nov. 2, 2009); Leor Expl., 2009 WL 3097207, at *4; Smith v. United
Salt Corp., No. 1:08CV00053, 2009 WL 2929343, at *9 (W.D. Va. Sept. 9, 2009); United States
v. Etkin, No. 07-CR-913(KMK), 2008 WL 482281, at *4 (S.D.N.Y. Feb. 20, 2008); Sims v.
Lakeside Sch., No. C06-1412RSM, 2007 WL 2745367, at *1 (W.D. Wash. Sept. 20, 2007); Long
v. Marubeni Am. Corp., No. 05CIV.639 (GEL)(KNF), 2006 WL 2998671, at *3 (S.D.N.Y. Oct.
19, 2006); Kaufman v. SunGard Inv. Sys., No. 05-CV-1236 (JLL), 2006 WL 1307882, at *4 (D.
N.J. May 10, 2006); see also United States v. Hamilton, 778 F. Supp. 2d 651, 655 (E.D. Va. 2011)
(focusing on an employer’s policy reserving the right to inspect and monitor employee accounts).
Upon review of the applicable caselaw, it appears that the majority of courts have found
that an employee has no reasonable expectation of privacy in workplace e-mails when the
employer’s policy limits personal use or otherwise restricts employees’ use of its system and
notifies employees of its policy.4 See Pure Power, 587 F. Supp. 2d at 559–60 (“Courts have
4
The specific facts of this case establish that Holladay maintained a formal policy that limited personal use. As such,
in considering the applicable caselaw, cases in which the employer did not maintain a policy regarding electronic
communications or did not otherwise ban or limit personal use are distinguishable from the present case. E.g., Quon
v. Arch Wireless Operating Co., 529 F.3d 892, 897, 904 (9th Cir. 2008); United States v. Heckenkamp, 482 F.3d 1142,
1147 (9th Cir. 2007); United States v. Hudson, No. CRIM.A. 13-20063-01, 2013 WL 4768084, at *9 (D. Kan. Sept.
5, 2013); Maxtena, Inc. v. Marks, No. CIV.A. DKC 11-0945, 2013 WL 1316386, at *5 (D. Md. Mar. 26, 2013); United
States v. Nagle, No. 1:09-CR-384, 2010 WL 3896200, at *4 (M.D. Pa. Sept. 30, 2010); Convertino v. U.S. Dep’t of
Justice, 674 F. Supp. 2d 97, 110 (D. D.C. 2009); Sprenger v. Rector & Bd. of Visitors of Virginia Tech, No. CIV.A.
7:07CV502, 2008 WL 2465236, at *4 (W.D. Va. June 17, 2008); Hilderman v. Enea TekSci, Inc., 551 F. Supp. 2d
1183, 1203 (S.D. Cal. 2008); see also Orbit One Commc’ns, Inc. v. Numerex Corp., 255 F.R.D. 98, 108 n.11 (S.D.N.Y.
2008) (noting the limited right of disclosure in company policy); Mason v. ILS Techs., LLC, No. CIVA304CV139RJC-DCK, 2008 WL 731557, at *4 (W.D.N.C. Feb. 29, 2008) (declining to find waiver of privilege when no
evidence established that the employee was aware of the employer’s policy and no one alleged that he agreed to abide
by it). Similarly, because this case involves the use of a work computer and e-mails sent and retrieved on a work email account, cases addressing an employee’s use of a personal computer or use of personal or web-based e-mail
accounts are distinguishable. E.g., Warshak v. United States, 490 F.3d 455, 473 (6th Cir. 2007) (commercial Internet
-7-
routinely found that employees have no reasonable expectation of privacy in their workplace
computers, where the employer has a policy which clearly informs employees that company
computers cannot be used for personal e-mail activity, and that they will be monitored.”). Further,
the majority of courts have relied on the existence of a workplace policy reserving the right to
access and monitor employee communications rather than a showing that employee accounts were
routinely monitored. Upon consideration, the Court is persuaded by these authorities and agrees
under the circumstances presented in this case, that a policy reserving the right to access and
monitor employee accounts is sufficient to support a finding that an employee has no reasonable
expectation of confidentiality in e-mails transmitted over an employer’s e-mail system.
B. Holladay’s Policy on Electronic Access
Under Holladay’s Personnel Handbook, employees have access to the company’s
communications systems, including the e-mail system, to conduct “legitimate company business.”
(Dkt. 94-1.) Holladay’s policy also allows “de minimus (very limited) personal use,” but it
provides that Holladay’s communications systems may not be used for the operation of personal
business or for personal gain. (Dkt. 94-2.) The policy further provides that the “communications
systems, including all correspondence, is company property.” (Dkt. 94-1.) Specifically, the policy
states that “all communications composed, sent, received, or stored on Holladay’s communications
system are, and remain, the property of Holladay” and “are not the private property of any
service provider); Hoofnagle v. Smyth-Wythe Airport Comm’n, No. 1:15CV00008, 2016 WL 3014702, at *8 (W.D.
Va. May 24, 2016) (personal e-mail account and no policy limiting personal use); Billups v. Penn State Milton S.
Hershey Med. Ctr., No. 1-11-CV-01784, 2015 WL 7871029, at *3 n.2 (M.D. Pa. Dec. 3, 2015) (no ban on personal
use and limited right to access); Wellin v. Wellin, No. 2:13-CV-1831-DCN, 2015 WL 5785709, at *26 (D. S.C. July
31, 2015) (personal e-mail account); Pure Power Boot Camp v. Warrior Fitness Boot Camp, 587 F. Supp. 2d 548,
559 (S.D.N.Y. 2008) (personal e-mail from a third party e-mail provider); Sims, 2007 WL 2745367, at *2 (web-based
e-mail); Geer v. Gilman Corp., No. 306 CV 889 JBA, 2007 WL 1423752, at *3 (D. Conn. Feb. 12, 2007) (employee’s
use of e-mail and computer of her fiancé); Curto v. Med. World Commc’ns, Inc., No. 03CV6327 DRH MLO, 2006
WL 1318387, at *5 (E.D.N.Y. May 15, 2006) (home office); Fischer v. Mt. Olive Lutheran Church, 207 F. Supp. 2d
914, 927 (W.D. Wis. 2002) (web-based e-mail account).
-8-
employee, even if the employee has used his or her own personal computer, tablet, cell phone or
other personal device.” (Dkt. 94-2.)
In regard to the monitoring of electronic communications, Holladay’s policy provides that
Holladay “reserves and intends to exercise the right to monitor, review, audit, intercept, access and
disclose all electronic and telephone communications created, received or sent over the company’s
communication system for any purpose.” (Dkt. 94-1.) The policy explicitly warns that it “creates
no expectation of privacy concerning such messages” and that the “confidentiality of any message
should not be assumed,” regardless of password protection. (Dkt. 94-1, 94-2.) Indeed, the policy
notes that “the use of passwords for security does not guarantee confidentiality,” and “[a]ll e-mail
and voicemail passwords for access to information on Holladay’s communications system must
be disclosed to Holladay.” (Dkt. 94-2.)
C. Application of Attorney-Client Privilege to Plaintiff’s E-Mails
Upon consideration of the applicable facts and caselaw, the Court finds that the factors
weigh in favor of a finding that Plaintiff did not have a reasonable expectation of confidentiality
in his workplace e-mails. First, it is clear that Holladay maintained a policy that allowed
employees to have “very limited personal use” of Holladay’s communications systems and
explicitly banned certain personal use. Second, Holladay reserved the right to monitor employees’
computer and e-mail. Third, Holladay reserved the right to access, read, and disclose any
electronic communication sent or received over its communications systems.
And fourth,
Holladay made its employees, including Plaintiff, aware of its policy. Indeed, Plaintiff admits
awareness of the policy, and Plaintiff certified his acknowledgment of and compliance with the
policy. (Dkt. 94-3.) This sufficiently establishes his awareness of the policy, including the
provision requiring that all e-mail passwords be disclosed to Holladay.
-9-
With regard to Holladay’s practice of monitoring employee e-mails, neither party specified
whether Holladay regularly monitored its employee’s e-mails or electronically stored information.
According to Plaintiff, he was “not aware that anyone at Holladay ever actually accessed [his]
Holladay account emails, other than for IT Department operational support and/or maintenance,”
and his understanding was that Holladay rarely monitored employee e-mails. (Dkt. 96, Ex. 1 ¶¶
7–8.) Likewise, Plaintiff argues that although he was aware of Holladay’s policy regarding the
potential for monitoring and accessing employees’ emails, “[t]he ‘operational reality’ was that [he]
was not aware of Holladay accessing or auditing employee e-mail accounts for purposes unrelated
to Holladay’s business needs.” (Dkt. 96 at 9–10.) Plaintiff therefore admits that he was aware that
Holladay did in fact monitor and access employee accounts but only for certain purposes. This
distinction, however, is insufficient to establish that Plaintiff was unaware of Holladay’s policy or
that Holladay did not enforce its policy.
The explicit language in Holladay’s policy further undermines Plaintiff’s argument, as the
policy expressly reserves the right to monitor, access, and disclose all electronic communications
received or sent over Holladay’s communications systems for any purpose. (Dkt. 94-1.) Under
the circumstances, it is clear that Plaintiff was aware that Holladay could access and monitor
employee e-mails and that Holladay did in fact access and monitor employee accounts for at least
some purpose. See Goldstein v. Colborne Acquisition Co., LLC, 873 F. Supp. 2d 932, 938 (N.D.
Ill. 2012) (finding that the employees’ “subjective belief that their communications were
confidential was not a reasonable one in light of the company policy in place, and in light of their
failure to assert that they were unaware of it”).
It is well-settled that the party invoking the attorney-client privilege bears the burden of
proving that the particular communications are confidential. See In re Grand Jury Proceedings in
- 10 -
Matter of Freeman, 708 F.2d 1571, 1575 (11th Cir. 1983) (stating that the party invoking the
privilege has the burden of establishing the confidential nature of the communication). In this
case, Plaintiff has asserted that the e-mails are privileged, and therefore he bears the burden of
proving the confidentiality of the communications. Plaintiff’s subjective belief that Holladay
rarely monitored employee e-mails, standing alone, is insufficient to meet his burden. See Alamar
Ranch, 2009 WL 3669741, at *4 (rejecting the employee’s assertion that she was not aware of any
company monitoring and finding the assertion unreasonable).
In support of his assertion that his communications were confidential, Plaintiff refers to a
provision in Holladay’s policy that communications should be treated as confidential and accessed
only by the intended recipient. (Dkt. 94-1.) This provision, however, only indicates that
employees are to regard e-mail communications of other employees as confidential, specifying
that “[e]mployees are not authorized to retrieve or read any communications that are not sent to
them.” (Dkt. 94-1.) It does not qualify or restrict Holladay’s reservation of the right to access and
monitor e-mail communications. See Hanson, 2011 WL 5201430, at *6 (analyzing a similar
provision and finding that it applied to the receipt of communications by other employees, not the
employer).
Plaintiff’s argument relies primarily on his subjective belief that e-mails he accessed on his
workplace account were confidential. However, as noted above, the question is not whether he
thought or believed his communications were confidential but rather whether his expectation was
reasonable under the circumstances. See Pensacola Firefighters’ Relief Pension Fund Bd. of
Trustees v. Merrill Lynch Pierce Fenner & Smith, Inc., No. 3:09CV53/MCR/MD, 2011 WL
3512180, at *8 (N.D. Fla. July 7, 2011) (emphasizing that the dispositive question is whether,
under the circumstances, the individual reasonably believed that his or her communications were
- 11 -
confidential despite the existence of a workplace policy and despite the individual’s subjective
belief that the communications were exchanged in confidence).
In light of the explicit provisions in Holladay’s policy and Plaintiff’s awareness of these
provisions, the Court finds that Plaintiff did not have a reasonable expectation that the handful of
e-mails he sent or received over Holladay’s communications systems were confidential.
Specifically, as noted above, the policy expressly limited personal use of Holladay’s
communications systems, banned the use of the system for the operation of personal business or
personal gain, reserved the right to access and monitor employee use for any purpose, warned
employees that they had no expectation of privacy in e-mails transmitted over the company system,
and required that employees—including Plaintiff—certify compliance with its provisions by
signing an acknowledgment form. Plaintiff was well aware of Holladay’s policy, including the
unequivocal notice that his communications were not to be regarded as confidential, and the risk
that his e-mail account would be monitored and accessed. As such, Plaintiff has not met his burden
of showing that his communications were reasonably expected and understood to be confidential.
Accordingly, it is
ORDERED that Defendant’s Motion for a Determination That Certain E-Mail
Communications Are Not Privileged or Otherwise Protected from Discovery (Dkt. 94) is
GRANTED.
DONE and ORDERED in Tampa, Florida, on July 20, 2016.
Copies furnished to:
- 12 -
Counsel of Record
- 13 -
Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.
Why Is My Information Online?