                                                                                           04/12/2017




        IN THE COURT OF CRIMINAL APPEALS OF TENNESSEE
                         AT KNOXVILLE
                               December 20, 2016 Session

 STATE OF TENNESSEE v. ALEXANDER JOHNSON AND MICHAEL F.
                         WILLIAMS

                  Appeal from the Criminal Court for Knox County
                       No. 104964A, B    Bob McGee, Judge


                             No. E2015-02486-CCA-R9-CD


In this interlocutory appeal, the defendants, Alexander Johnson and Michael F. Williams,
challenge the ruling of the Knox County Criminal Court granting the State’s motion to
quash subpoenas duces tecum issued to four State’s witnesses. The State challenges that
portion of the court’s ruling denying its motion to quash subpoenas duces tecum issued to
various electronic communications service providers. Because the State lacks standing to
challenge any of the subpoenas issued in this case, we reverse that portion of the court’s
ruling granting the State’s motion to quash the subpoenas issued to the witnesses. We
affirm that portion of the trial court’s ruling that the State lacks standing to challenge the
subpoenas issued to the service providers. In the interest of judicial economy and to
facilitate further appellate review, we have examined the preempted issues related to the
subpoenas duces tecum issued in this case and have concluded that: (1) although nothing
prevents the defendants in this case, generally, from obtaining the type of electronic
communications at issue via a subpoena issued under the terms of Tennessee Rule of
Criminal Procedure 17 to the witnesses themselves, the defendants have failed to
establish entitlement to all of the requested communications as discussed more fully
below; and (2) under the terms of the Stored Communications Act, see 18 U.S.C. §§ 2701
- 2703, the defendants cannot obtain the contents of the electronic communications from
any of the service providers via a Rule 17 subpoena duces tecum. Accordingly, the trial
court’s November 3, 2015 order relative to the subpoenas duces tecum issued in this case
is affirmed in part and reversed in part. The case is remanded to the trial court for
proceedings consistent with this opinion.

Tenn. R. App. P. 3; Judgment of the Criminal Court Affirmed in Part; Reversed in
                                Part; Remanded

JAMES CURWOOD WITT, JR., J., delivered the opinion of the court, in which THOMAS T.
WOODALL, P.J., and NORMA MCGEE OGLE, J., joined.
Steven Ross Johnson and W. Thomas Dillard, Knoxville, Tennessee, for the appellant,
Alexander Johnson.

David Eldridge and Loretta G. Cravens, Knoxville, Tennessee, for the appellant, Michael
F. Williams.

Herbert H. Slatery III, Attorney General and Reporter; Nicholas W. Spangler, Assistant
Attorney General; Charme P. Allen, District Attorney General; and Leslie Nassios and
Kyle Hixson, Assistant District Attorneys General, for the appellee, State of Tennessee.

                                                 OPINION

              On February 12, 2015, the Knox County Grand Jury charged both of the
defendants with two counts each of the November 2014 aggravated rape of C.C.1 As is
relevant to this appeal, the presentment lists as witnesses C.C., Bridget Boland, and
cellular telephone service providers New Cingular Wireless/AT&T Wireless and
Sprint/Nextel Communications. Witnesses Anna Lawn and Natalie Tavares were later
added to the presentment by order. The case proceeded, and discovery materials were
exchanged by the parties.

               On August 21, 2015, Mr. Johnson moved the trial court for an order to
accompany subpoenas duces tecum for the production and pretrial inspection of
“specified cellular telephone and social media communications and information.”2 He
argued that the “requested communications are evidentiary and relevant,” that the
communications were “not otherwise reasonably procurable in advance of trial by due
dilligence,” that he could not prepare for trial in the absence of this information, and that
the motion was “made in good faith” and was “not intended as any general ‘fishing
expedition.’” In support of his motion, Mr. Johnson alleged that discovery materials
already provided by the State “confirm[ed] the existence of social media information and
communications material and relevant to the events at issue.” He stated that interviews
with several of the State’s witnesses indicated that many of those witnesses, including
C.C., had communicated with both of the defendants and with each other via text
message, iMessage,3 and social media before and after the alleged offenses occurred.

       1
           We utilize initials in keeping with the policy of this court.
       2
          Mr. Williams later moved the court to adopt each of the relevant motions filed by Mr. Johnson.
       3
           “You can use the Messages app on your iPhone, iPad, or iPod touch to send messages. Those
messages are sent as iMessage or SMS/MMS.” https://support.apple.com/en-us/HT207006 (last visited
February 1, 2017). “iMessages are texts, photos, or videos that you send to iOS devices and Macs over
Wi-Fi or cellular-data networks. These messages are always encrypted and appear in blue text bubbles.”
Id. “If you aren’t using iMessage, you can use SMS/MMS. These messages are texts and photos that you
                                                       -2-
According to Mr. Johnson, Ms. Lawn indicated to the police that she “‘immediately’”
began texting C.C.’s roommates after Ms. Lawn left Mr. Johnson’s bedroom, leaving
C.C. in the company of both defendants. Mr. Johnson also alleged that interviews with
the police indicated that the police “may have even instructed, advised, or at the very
least insinuated to” C.C. and other State’s witnesses that they should remove social media
information “from public view” and should refrain from communicating about the
offenses via social media. Mr. Johnson indicated that he had learned from the State that
the police had searched, but had not preserved, any social media communications. He
also noted that the police had preserved all the data from Mr. Johnson’s cellular
telephone but had preserved none from cellular telephones belonging to C.C. or any other
State witness.

              At the August 24, 2015 hearing on the defendants’ motion, counsel for Mr.
Johnson indicated that after learning that the Knoxville Police Department (“KPD”) had
“sent preservation letters under the Electronic Stored Communications Act to
communication providers to preserve information from certain witnesses, namely, [C.C.]
and Ms. Lawn,” the defendants sent a specific discovery request for that information. In
its response to the specific discovery motion, the State related that the KPD “did not, in
fact, obtain the messaging information of its witnesses.” Counsel insisted that the
information was necessary to ensure that Mr. Johnson received a fair trial and moved the
court to provide an order “that compels, along with the subpoenas that will be issued, the
various service providers to provide the . . . data communications” to the trial court under
seal.

               The State opposed the motion on grounds that the motion, which was filed
on the Friday before the first trial was set to begin,4 was untimely, noting that the State
had “incurred a large expense . . . in preparing for this trial” and that several of the State’s
witnesses had obligations related to their status as student athletes that presented
scheduling difficulties. The State also argued that the defendants had failed to allege
specific facts to support the issuance of the subpoenas, describing the subpoena request as
“nothing more than an 11th-hour fishing expedition.” The State observed that the
defendants had also failed to identify any particular piece of admissible evidence that
would be uncovered.


send to other cell phones or iOS devices. SMS/MMS messages aren’t encrypted and appear in green text
bubbles on your device.” Id. “When you send a text message to someone that has an Apple ID, the
Messages app automatically recognizes that person’s Apple ID and routes the message through Apple’s
servers instead of using the cell phone carrier. This is done automatically and avoids any texting charges
from the cell phone carrier.” http://www.ianswerguy.com/imessage-difference/ (last visited February 1,
2017).
         4
           The trial court had previously granted Mr. Johnson’s motion to sever his trial from that of Mr.
Williams.
                                                   -3-
              With regard to timing, counsel for Mr. Johnson stated that the State had
provided them with Mr. Johnson’s cellular telephone data in the week before trial and
that he had only learned two days before filing the motion that the State had not obtained
any electronic communications from anyone other than Mr. Johnson. Citing United
States v. Nixon, 418 U.S. 683 (1974), counsel argued that Mr. Johnson need only
“establish that there could be information that’s material and relevant on there.” He
observed that the discovery materials were replete with information that “there was a lot
of text messaging and social media communications that were going on about this party
that night” and that, Ms. Lawn in particular, participated in social media and text
messaging communications immediately after leaving C.C. in Mr. Johnson’s bedroom in
the company of the defendants. Counsel also pointed to KPD interviews where C.C. and
other witnesses discussed with KPD detectives “about whether or not they should have
their social media taken down.”

              The State argued that the defendants had failed to satisfy the Nixon standard
and argued that the information sought by the defendants qualified as witness statements,
which would not be discoverable prior to trial under the terms of Tennessee Rule of
Criminal Procedure 26.2. The defendants countered that the information could not be
covered by Rule 26.2 because that rule, by its terms, is restricted to information in
possession of the parties.

               At the conclusion of the hearing, the court granted the motion, stating that it
felt “compelled to give the defendant[s] a full opportunity to gain any information that
may be helpful to their case.” The court ordered that the materials be returned to
chambers by September 8, 2015. In the written order, the court found “that specific and
articulable facts establish[ed] reasonable grounds to believe that records and information
pertaining to designated cellular telephone and social media communications are relevant
and material to a pending criminal matter.” On that same day, the court entered a
protective order that provided that “all materials produced to the court subject to the said
Order and subpoenas duces tecum are to be filed under seal and made a part of the
technical record in this matter.” The protective order also provided for “[e]xact
duplicates of all materials . . . to be provided in their entirety to counsel for the parties.”

            Immediately following the hearing, the defendant issued and served 21
subpoenas duces tecum:

Provider                 Information Requested             Persons Covered Timeframe
AT&T Mobility            “[a]ll stored electronic          C.C.            11/1/2014 -
                         communications” “and the          Ms. Lawn        present
                         related account records,
                                              -4-
                            including but not limited to
                            the call detail records
                            (including all incoming and
                            outgoing calls, the duration
                            of said calls, the time and
                            date of said calls, and the cell
                            site addresses and/or cell
                            tower information associated
                            with said calls), audio
                            recordings, saved contacts,
                            geolocation data, text
                            messages or iMessages sent
                            or received, photographs,
                            video recordings, and
                            voicemail messages”
Instagram5                  “[a]ll stored electronic             C.C.                   1/1/2014 -
                            communications” including            Ms. Lawn               present
                            “basic subscriber information        Ms. Boland
                            (including Instagram                 Ms. Tavares
                            username, e-mail address,
                            telephone number, and
                            timestamps and IP addresses
                            for account logins/logouts),
                            photographs, photo captions,
                            and other posts from the
                            subscriber’s Instagram
                            accounts(s), and the content
                            of messages, photos,
                            comments, and location
                            information”
Twitter6                    “[a]ll stored electronic             C.C.                   1/1/2014 -
        5
           “Instagram is a social networking app made for sharing photos and videos from a smartphone.”
“It’s like a simplified version of Facebook, with an emphasis on mobile use and visual sharing. Just like
other social networks, you can interact with other users on Instagram by following them, being followed
by them, commenting, liking, tagging and private messaging.” https://www.lifewire.com/what-is-
instagram-3486316 (last visited February 8, 2017).
        6
           “Twitter is a free micro-blogging tool that allows users to publish short messages (140
characters or less) through their computers and mobile phones.” “People who use Twitter write short
messages, called Tweets, which they publish either publicly (for all Twitterers to see) or privately (for
only certain Twitterers to see).” https://www.lifewire.com/twitter-basics-3476455 (last visited February
8, 2017).
                                                  -5-
                           communications” including            Ms. Lawn              present
                           “account/user information            Ms. Boland
                           (including username(s)), the         Ms. Tavares
                           associated ‘Twitter archive,’
                           communications and/or
                           content (including following,
                           followed, muted, and blocked
                           accounts, status updates
                           (‘tweets’) posted and replies
                           received, ‘tweets’ marked as
                           a ‘favorite,’ direct messages
                           sent and received, list
                           memberships, lists subscribed
                           to, and uploaded files
                           (including photographs and
                           video files and whether
                           through pic.twitter.com,
                           Periscope, Vine, or any other
                           means)), and geolocation
                           data”
Snapchat7                  “[a]ll stored electronic             C.C.                  1/1/2014 –
                           communications” including            Ms. Lawn              present
                           “basic subscriber information        Ms. Boland
                           (including Snapchat                  Ms. Tavares
                           username, e-mail address,
                           telephone number, and
                           timestamps and IP addresses
                           for account logins/logouts),
                           logs (including sender,
                           recipient, date, and time) of
                           ‘snaps,’ ‘stories,’ and/or
                           ‘chats’ sent to or from the
                           subscriber’s Snapchat
                           account(s), and the content of
                           ‘snaps,’ ‘stories,’ and/or
                           ‘chats’ sent to or from the

       7
         “Snapchat is both a messaging platform and a social network” that “exists only as a mobile app
you can download to your iPhone or Android smartphone.” Snapchat “[p]hotos and videos essentially
disappear a few seconds after they’ve been viewed by their recipients” unlike “other social networks,
which keep your content online forever unless you decide to delete it.” https://www.lifewire.com/what-
is-snapchat-3485908 (last visited February 8, 2017).
                                                 -6-
                         subscriber’s Snapchat
                         account(s)”
Facebook                 “[a]ll stored electronic           C.C.             1/1/2014 -
                         communications” including          Ms. Lawn         present
                         “basic account/user                Ms. Boland
                         information (including user        Ms. Tavares
                         identification number(s)
                         and/or username(s), e-mail
                         address(es), registered mobile
                         telephone number, etc.),
                         expanded subscriber content
                         (including profile contact
                         information, status update
                         history, shares, notes, wall
                         postings, list of ‘friends and
                         other accounts ‘followed,’
                         list of ‘pages’ ‘liked,’ list of
                         groups joined, future and past
                         events, video files, etc.), user
                         photos (whether uploaded by
                         the user or by other users),
                         private messages sent and
                         received, activity logs, and
                         geolocation data”
Yik Yak, Inc. 8          “[a]ll stored electronic           C.C.             1/1/2014 -
                         communications” including          Ms. Lawn         present
                         “each message posted, the IP       Ms. Boland
                         address from which each            Ms. Tavares
                         message was posted, the
                         Global Positioning System
                         (‘GPS’) coordinates of the
                         location from which each
                         message was posted, the time
                         and date when each message
                         was posted, and the user-
                         agent string associated with
                         the device from which each

       8
          “Yik Yak is basically an anonymous location-based status posting app for your local
community, which shows you anonymous posts from people around your geographical area.”
https://www.lifewire.com/what-is-yik-yak-3485928 (last visited February 2, 2017).
                                             -7-
                            message was posted”

               On September 11, 2015, Mr. Johnson filed a motion asking the trial court
“to set a date certain for the pretrial inspection of specified cellular telephone and social
media communications and information sufficiently in advance of trial to permit the
parties’ meaningful inspection and analysis” of the materials and “to issue the necessary
process to secure the attendance at the pretrial inspection of the out-of-state witnesses
with custody of said communications and information.” In support of his motion,
counsel for Mr. Johnson indicated that they were “actively working” to obtain the
requested materials from Yik Yak, which counsel deemed “likely to comply” with the
subpoena. Additionally, counsel averred that AT&T had marked the subpoena as
“‘urgent’” to assure quick compliance. Counsel averred that Facebook, Instagram,
Snapchat, and Twitter had “responded to the Court’s Order and subpoenas with
objections” in the form of a letter sent to defense counsel. Those providers
“recommended” that the defendants “obtain the subpoenaed communications and
information directly from the” account holders.

               Without accepting the validity of the service providers’ objections, Mr.
Johnson informed the court of his intention to issue additional subpoenas duces tecum to
the four individual account holders requesting “the same communications and
information previously subpoenaed from their service providers.” To facilitate this
process for the three witnesses9 who were, at that time, residing out of state, Mr. Johnson
moved the court to issue the necessary process to secure the attendance of each witness at
the pretrial inspection of the materials.

              Three days later, on September 14, 2015, Mr. Johnson moved the trial court
to hold Facebook, Instagram, Snapchat, and Twitter in contempt for failing to comply
with the court’s order and subpoenas. Mr. Johnson noted that although those service
providers had objected to the subpoenas via letter, none had filed a motion to quash. On
the following day, Mr. Johnson moved the court “to compel the state to request search
warrants to obtain the specified social media communications and information previously
subpoenaed pursuant to the Court’s Order of August 24, 2015.” Mr. Johnson claimed
that responses from Facebook, Instagram, Snapchat, and Twitter indicated that those
providers would release the subpoenaed information pursuant to a search warrant. Mr.
Johnson also moved the court on September 15, 2015, “to issue the necessary process [to]
secure the compliance of out-of-state service providers with the Court’s previous Order
and accompanying Subpoenas Duces Tecum regarding specific social media
communications” and “to reset the date for compliance with the same to September 28,
2015.” In a supplemental motion also filed on September 15, 2015, Mr. Johnson

       9
           C.C., Ms. Boland, and Ms. Lawn.
                                             -8-
informed the court that counsel for Facebook, Instagram, and Twitter had informed
counsel for Mr. Johnson that those entities planned to secure local counsel to file
responsive pleadings and “to address the multiple matters of first impression presented in
this case surrounding the [F]ederal Stored Communications Act.” Mr. Johnson also
noted that counsel for those providers indicated during a telephone conversation “that
some of the communications at issue are no longer available possibly due to deletion by
the content subscriber.”

              Following a hearing on September 17, 2015, the trial court held in abeyance
the motion to hold the service providers in contempt. The court also modified the time
for compliance with the subpoenas to September 28, 2015. Also on that date, the
defendants issued subpoenas to the four witnesses that required production of each
witness’ current and former cellular telephone handsets and copies “in native format” of
all the data “associated with any and all” current and former Facebook, Instagram,
Twitter, Snapchat, and Yik Yak accounts for the period between May 15, 2014, and
December 31, 2014. Each subpoena contained directions for obtaining the necessary
information from Facebook, Instagram, Twitter, and Snapchat. None explained how the
data could be retrieved from Yik Yak. The trial court issued certificates of materiality to
accompany the subpoenas.

               On September 28, 2015, the State moved to quash the subpoenas issued to
C.C., Ms. Boland, Ms. Lawn, and Ms. Tavares, claiming that “[c]ompliance with these
[s]ubpoenas is unreasonable and oppressive” and that “the [s]ubpoenas are cumulative in
that they seek information and records that are already being sought by subpoenas issued
to various communications/social media providers.” In its motion, the State averred that
“[i]n some instances, the witnesses never had social media accounts with the companies
listed in the [s]ubpoenas,” that “[i]n some instances, the witnesses have found it
impossible to limit data retrieval to the time period listed in the [s]ubpoenas,” and that
“the [a]ttachment to the [s]ubpoenas provides no instructions at all for retrieving data
from Snapchat or Yik Yak.” The State attached to its motion an email from Ms. Boland’s
mother that it claimed “detail[ed] the onerous nature of the data-retrieval portion of the
[s]ubpoenas.” The State also noted that the attachment to the subpoenas issued to the
four witnesses contained a requirement that the witnesses “provide for inspection any
cellular telephone handset that they used primarily or exclusively between May 15, 2014
through December 31, 2014” when the trial court’s order did not cover these cellular
telephone handsets.

             Also on September 28, 2015, the State moved the trial court “to modify all
subpoenas issued concerning the communications/social media accounts of” C.C., Ms.
Lawn, Ms. Boland, and Ms. Tavares, arguing that “the time frame for most of the
subpoenaed materials is overly broad.” The State asked that the subpoenas issued to the
                                            -9-
social media service providers regarding C.C.’s accounts be modified to cover
communications between May 15, 2014, and December 31, 2014. The State asked that
the subpoenas issued to the social media service providers regarding the remaining
witnesses’ accounts be modified to cover communications from November 15, 2014, to
December 31, 2014. In support of its request, the State posited that there had “been no
showing that social media or telephonic activity concerning the event in question actually
occurred before the offense.”

              On October 20, 2015, Mr. Johnson moved the trial court to compel the four
witnesses to show cause as to why they should not be held in contempt for failing to
comply with the subpoenas. Mr. Johnson indicated that he had sent the subpoenas to the
three out-of-state witnesses on September 21, 2015, “by FedEx priority overnight service
with adult signature required.” C.C. and Ms. Boland received and signed for the
packages on the following day. C.C. was served with domesticated Florida process on
September 24, 2015. Delivery to Ms. Lawn was attempted on “three consecutive days
until September 24, 2015, when someone requested that the package be held at the local
FedEx facility.” After three more days passed without anyone retrieving the package, it
was returned to counsel for Mr. Johnson. Mr. Johnson then sent a second package to Ms.
Lawn without a signature requirement, and that package was delivered on September 29,
2015.

               According to Mr. Johnson, on September 22, 2015, C.C. sent a letter along
with “an assortment of printouts from various social media service providers” to the trial
court. This assortment did not include any electronic communications made during the
week surrounding the alleged offenses in this case. It did include printouts from
Instagram, Twitter, and Snapchat that appeared to explain why she had been unable to
retrieve the subpoenaed information. The letter, which was filed under seal but appended
to Mr. Johnson’s motion, does support Mr. Johnson’s statement that C.C. upgraded to a
new cellular telephone handset on January 27, 2015. She claimed that the older handset
had malfunctioned but stated that she had sold the telephone through a website after
restoring it to the default factory settings. As of October 20, 2015, none of the remaining
witnesses had returned any of the subpoenaed materials to the court. Mr. Johnson asked
that the witnesses be made to show cause for their failure to comply and that the court
enforce the statutory forfeiture for their noncompliance.

             Mr. Johnson also stated that the responsive documents received from
AT&T indicated that both C.C. and Ms. Lawn had disposed of their cellular telephone
handsets “within 24 hours of one another on January 27 and 28, 2015.” In the letter,
which was appended to the pleading, AT&T indicated that it had not stored the content of
text messages for either C.C. or Ms. Lawn but that iMessages might be retrieved from

                                           -10-
either witness’s iCloud10 account. AT&T also stated that it could not provide access to
voicemail within a certain timeframe; that, generally, it retained voicemails only for 14 to
30 days; and that voicemails deleted by the customer could not be recovered at all. Mr.
Johnson moved the court to require both C.C. and Ms. Lawn to provide their iCloud login
credentials to Sword & Shield Enterprise Security, Inc., “to download the witnesses’ data,
limit the data retrieved to the time periods stated in the [s]ubpoenas, and provide the
responsive data to the Court and all counsel.”

               On October 20, 2015, local counsel for Facebook, Instagram, Snapchat, and
Twitter (hereinafter collectively “the social media providers”)11 filed a “Notice” of the
status of the subpoenas issued to those parties. In the notice, the social media providers
indicated that the subpoenas issued to all but Snapchat had been domesticated in
California but nevertheless maintained that the Stored Communications Act (“SCA”) did
not authorize them to release the contents of electronic communications to criminal
defendants. The social media providers contended that the appropriate procedure was to
subpoena the information directly from the users. Twitter, in particular, “confirmed and
advised” local counsel “that it has no records to produce in response to any” of the
subpoenas. Facebook and Instagram agreed “to produce non-content records . . . as
permitted under the SCA, after giving the users 21 days’ notice and an opportunity to
object.” The social media providers did not take any position regarding the State’s
motion to quash but did “reserve any and all objections that may be asserted to the
subpoenas.” The social media providers also noted that “any objections that cannot be
consensually resolved” would be “properly litigated in the California court from which
the [s]ubpoenas issued.” The notice also indicated that counsel for Mr. Johnson had
agreed to stay compliance with the subpoenas and to withdraw his motion for contempt.12

              On October 23, 2015, Mr. Johnson moved the court to dismiss the
presentment, exclude the testimony of the witnesses, or issue an adverse inference
instruction based upon the State’s failure to preserve the electronic communications that
were the subject of the subpoenas. He argued that because the police were aware that
several of the witnesses in this case used text messaging and social media to
communicate before and after the alleged offenses, they should have endeavored to
        10
            “At its most basic level, ‘the cloud’ is the Internet, or more accurately, a piece of the Internet.”
https://www.lifewire.com/what-is-icloud-3972867 (last visited on February 3, 2017). “The ‘iCloud’ is the
generic name for . . . . Apple’s ‘cloud-based’ or Internet-based services.” Id. The “iCloud automatically
backs up the information” stored on Apple “devices—iPhone, iPad, and iPod touch—over Wi-Fi every
day when they are turned on, locked, and connected to a power source.” This daily backup covers
“iMessage, text (SMS), and MMS messages.” https://support.apple.com/kb/ph12519?locale=en_US (last
visited on February 3, 2017).
         11
            Yik Yak has not objected to the subpoenas at any point.
         12
            Mr. Johnson, in other pleadings, indicates that the motion for contempt was held in abeyance
rather than withdrawn.
                                                     -11-
preserve those communications. Mr. Johnson also noted that, following the alleged
offenses, C.C. gave conflicting statements and that, following her interviews with KPD
detectives, she had reset her cellular telephone to its factory settings, thereby deleting her
text messages and contact information. Although she claimed that she disposed of the
cellular telephone because it no longer worked, she stated that she sold the device on a
website. She also deleted her Twitter and Instagram accounts and deactivated her
Facebook account. Ms. Lawn similarly disposed of her cellular telephone. In that same
pleading, Mr. Johnson indicated that he would not contest the State’s motion to modify
the timeframe of the subpoena.

             On October 27, 2015, the State filed an amended motion to quash. In its
amended motion, the State challenged the subpoenas issued to AT&T, the social media
providers (including Yik Yak), and the four witnesses. The State argued that the
defendants had failed to show that the subpoenas will produce material evidence and that
compliance with the subpoenas was unreasonable and oppressive. The State asserted that
the subpoena to C.C. violated her rights as a victim. Finally, the State claimed that
granting subpoenas would have a chilling effect on rape reporting.

             In his response to the State’s amended motion to quash, Mr. Johnson
argued that the court had already determined, following a contested hearing, that the
information covered by the subpoenas was both relevant and material. He stated that the
information already disclosed pursuant to the subpoenas confirmed the court’s finding.
Mr. Johnson also claimed that the State lacked standing to challenge the subpoenas
because the State had no “personal right, privilege, or proprietary interest” in the
subpoenaed materials. Finally, Mr. Johnson argued that, even if the State had standing to
challenge the subpoenas, it could not establish that the subpoenas were unreasonable or
oppressive.

              Neither party presented evidence at the November 3, 2015 hearing on the
motion to quash. The State argued that the defendants had made “no showing that these
subpoenas will lead to material and admissible evidence,” explaining that materiality was
“the main reason that we’re here in court today.” The State claimed that the defendants
had failed to make even a showing that each of the witnesses had accounts with each of
the social media providers. The State insisted that the defendants could obtain text
messages exchanged between them and any of the witnesses from the defendants’ cellular
telephones. The State asserted that the defendants had presented no proof of the need to
confiscate the cellular telephones of C.C. and Ms. Lawn. The State emphasized that the
“main issue” as far as the State was concerned was “that these subpoenas are unsupported
by material or admissible evidence.” The State also argued, however, that “these
subpoenas are oppressive and unreasonable, under Rule 17,” citing as proof the email
sent to the prosecutor by Ms. Boland’s mother as exhibited to their motion to quash, in
                                            -12-
which Ms. Boland’s mother claimed that she and her husband had spent several hours
attempting to assist Ms. Boland in complying with the subpoena and that compliance had
been more time consuming than anticipated, to support its assertion that compliance with
the subpoenas was unreasonable. Finally, the State asserted, as it had in its amended
motion to quash, that requiring C.C. to comply with the subpoenas would create a
chilling effect on rape reporting and prosecuting.

               The defendants argued that the State had failed to establish any need for the
court to revisit its earlier ruling that the subpoenaed materials were material and relevant.
The defendants also asserted that the State’s motion to quash was untimely because some
of the witnesses and some of the providers had already begun to comply with the
subpoenas. Finally, the defendants maintained that the subpoenas were not unreasonable
or oppressive and that there was no practical or legal reason to stop the subpoena process
after compliance had begun and so close to trial. The defendants suggested that if the
witnesses were experiencing technical difficulties, then the court should appoint an expert
to help them at the defendants’ expense.

              At the conclusion of the hearing, the trial court granted the motion to quash
as to the four witnesses and denied the motion as to all the service providers, ruling as
follows:

                    As we said over and over, we’re plowing new ground
              here. This is new territory. We’re faced with the reality of
              the computer age and the generation of incredible amounts of
              communication and the ability to store these communications
              and access them. It is a new world and there’s much more
              information available now than there has been in the past.

                     And the way that legal principles concerning the
              acquisition of information in litigation is – is struggling to
              keep up. We are not – our legal processes have not fully
              embraced and resolved the manner in which this immense
              amount of information is to be shared, distributed. So we are
              without a great deal of guidance and authority in making
              these decisions and in managing this case.

                    In the beginning, this started with the defense
              argument – which the Court accepted. The Court accepted
              defense counsel’s representations that Federal case law and
              Federal statutes are advancing the proposition that stored
              media communication should be made available to defendants
                                            -13-
in criminal prosecutions. That’s how all of this started. The
Court accepted that proposition. The Court reviewed 18
United States Code Annotated, 2701 et seq. And this is the
Stored Wire and Electronic Communications and
Transactional Records and Access Act. And that’s how we
began this journey into the business of computer recorded and
stored communication information.

       In . . . accord with that finding, and with that
proposition, this Court did approve the subpoena duces tecum
and the accompanying orders to cause social media service
providers to provide to the Court the social media
communication information relevant to this case. That was
the next step.

        Some information was provided to the Court pursuant
to the subpoenas from some of the providers. Other servers
reported that it was their policy to leave it to the end users, or
customers, to provide the communication information to
others.

       In response, counsel for the defense sought approval
by this Court for subpoenas and orders directed to the end
users, or customers, identified in this case as [C.C.], Bridget
Boland, Anna Lawn and Natalie Tavares.

       At this point, it appeared to the Court that there was
some consensus between the State and the defense that it was
appropriate for the end users, or customers, to provide this
information to the Court. There was some agreement that the
State’s attorneys would attempt to help these end users
provide this information.

       In the attempt to do so, however, it became apparent
that the end users, or customers, were not able to access the
information in spite of what appeared to be sincere efforts to
do so.

      At this point, the State filed the motion to quash the
subpoena. Under these circumstances, this Court finds that
those circumstances justify the extension of the time
                              -14-
allowable to the State to file its motion. There w[ere]
circumstances that developed after – during the attempt to
comply with the subpoena that the State learned that this, in
their view, was oppressive and the subpoena should be
quashed.

       At this point today, this morning . . . the defense is
asking the Court to enforce the subpoenas and the State is
asking the Court to quash the subpoenas.

       It now falls to this Court, in this case, to try to find the
proper response of a State trial court to evolving Federal law
pertaining to access for both the prosecution and the defense
to the expediential increase of stored social media
communication information available today.

       First, this Court is going to distinguish between two
types of social media communication information. The first
type the Court will refer to as structural information. By this,
the Court means the existence of communications, their
duration, the identities of the end users, or customers, who are
sending or receiving the communications and, where possible,
the location of the senders and receivers. Other types of
information might also be considered as structure.

      The second type of social media communication
information this Court will recognize is content.

       The Court now considers the four subpoenas on the
individuals, [C.C.], Ms. Boland, Ms. Lawn and Ms. Tavares.
First of all, the Court does find that the State has standing to
move to quash subpoenas that are being used to try to seize
information from their witnesses or potential witnesses.

       In considering the relationship between Tennessee law
and the Federal statutes and case law pertaining to subpoenas,
this Court finds as follows:

          Part A. In the context of this case, the term “content,”
. . . is equivalent to the legal phrase “statements of witnesses.”

                               -15-
                    Tennessee Rule of Procedure, Rule 17, clearly
              excludes statements of witnesses from the subpoena power.
              The Federal statute deals only with the production of
              information by service providers and not by end users, or
              customers. That’s the second part.

                     The third part – the third finding of the Court is: That
              this Court does find that the subpoenas on the individuals in
              this case are oppressive and unreasonably demanding. The
              contention made by the State – rather by the defense, that the
              Court should appoint a computer expert to assist compliance
              with the subpoena only underscores the unreasonableness of
              the subpoena obligation as to those private end users.

                     And for those three reasons, the fact that Tennessee
              Rule of Procedure, Rule 17, excludes statements of witnesses,
              and the Federal law deals only with the service providers and
              not the end users, and in this case, certainly, the Court is
              finding that the subpoenas turn out to be oppressive and
              unreasonably demanding. For these three reasons, the Court
              does now grant the State’s motion to quash the subpoenas that
              have been issued to [C.C.], Bridget Boland, Anna Lawn and
              Natalie Tavares.

                    The Court does find that the State lacks standing to
              move to quash the subpoenas that were issued to the service
              providers themselves.

In response to questions by the defense, the court stated that the subpoenas issued to the
service providers “remain intact,” explaining, “Those people truly are third . . . parties to
this litigation. And they’re all perfectly capable of hiring lawyers and moving to quash if
they choose to.” The court specifically did not rule on whether the providers had to
provide the content of the communications.

                Following the trial court’s November 3, 2015 order, both parties moved the
trial court for permission to seek interlocutory appeal. The trial court granted permission,
and this court agreed to interlocutory review, framing the scope of review as follows:

              To be clear, this interlocutory review concerns only the trial
              court’s November 3, 2015 order granting, in part, and
              denying, in part, the State’s motion to quash subpoenas of the
                                            -16-
              alleged victim, witnesses, and social media service providers,
              as limited by the trial court’s November 3 order and order
              granting permission to seek interlocutory appeal.

Thus, we review the trial court’s conclusion that the State had standing to quash the
subpoenas duces tecum issued to the witnesses, the court’s ruling quashing those
subpoenas, and the court’s ruling that the State did not have standing to quash the
subpoenas duces tecum issued to the various service providers.

                                        I. Standing

               The defendants argue that the State lacks standing to file a motion to quash
any of the subpoenas issued in this case because the State lacks “a personal right,
privilege, or proprietary interest” in the materials the defendants seek via the subpoenas.
The State asserts that it has standing based upon its legitimate interests in preventing an
unnecessary delay of the trial and protecting the State’s witnesses. The State also
contends that because it bears a constitutional and statutory “duty to protect the rights of
crime victims and prosecution witnesses alike,” it has standing to contest subpoenas that
“threaten” the rights or interests of the victim and the State’s witnesses.

               As the defendants correctly observe, the trial court did not apply the test for
standing to challenge a third party subpoena adopted in State v. Harrison, 270 S.W.3d 21
(Tenn. 2008), and instead concluded, without any analysis, “that the State has standing to
move to quash subpoenas that are being used to try to seize information from their
witnesses or potential witnesses.” Similarly, the court found, in conclusory fashion, “that
the State lacks standing to move to quash the subpoenas that were issued to the service
providers themselves.” In response to a question from defense counsel, the court
clarified that the service providers “truly are third . . . parties to this litigation. And
they’re all perfectly capable of hiring lawyers and moving to quash if they choose to.”

              The subpoenas in this case were issued pursuant to Rule 17 of the
Tennessee Rules of Criminal Procedure, which rule provides that “[a] subpoena may
order a person to produce the books, papers, documents, or other objects the subpoena
designates” either “in court before trial or before they are to be offered in evidence.”
Tenn. R. Crim. P. 17(d)(1). “On motion made promptly and in any event by the time
specified in the subpoena for compliance therewith, the court may quash or modify the
subpoena if compliance would be unreasonable or oppressive.” Tenn. R. Crim. P.
17(d)(2). The rule is silent on the issue of who may move to quash a subpoena.

             Absent a showing that the State had standing to challenge the subpoenas,
the controversy is not justiciable. West v. Schofield, 468 S.W.3d 482, 490 (Tenn. 2015)
                                            -17-
(“To determine whether a particular case involves a legal controversy, Tennessee courts
use justiciability doctrines that ‘mirror the justiciability doctrines employed by the United
States Supreme Court and the federal courts,’ and these doctrines ‘include: (1) the
prohibition against advisory opinions, (2) standing, (3) ripeness, (4) mootness, (5) the
political question doctrine, and (6) exhaustion of administrative remedies.’” (citations
omitted)); City of Memphis v. Hargett, 414 S.W.3d 88, 96 (Tenn. 2013) (“Justiciability
encompasses several distinct doctrines, two of which are . . . mootness and standing.”).
As the moving party, the State bore the burden of establishing its standing to challenge
the subpoenas in this case. ACLU of Tenn. v. Darnell, 195 S.W.3d 612, 620 (Tenn.
2006). Because standing presents a question of law, we review the issue de novo with no
presumption of correctness afforded to the trial court. Massengale v. City of East Ridge,
399 S.W.3d 118, 123 (Tenn. Ct. App. 2012) (citing Cox v. Shell Oil Co., 196 S.W.3d 747,
758 (Tenn. Ct. App. 2005)).

               Standing, “‘a judge-made doctrine,’” Fannon v. City of LaFollette, 329
S.W.3d 418, 424 (Tenn. 2010) (quoting Knierim v. Leatherwood, 542 S.W.2d 806, 808
(Tenn. 1976)), is designed “to determine whether a particular litigant is entitled to have a
court decide the merits of a dispute or of particular issues,” Darnell, 195 S.W.3d at 619.
“Grounded upon ‘concern about the proper—and properly limited—role of the courts in a
democratic society,’ the doctrine of standing precludes courts from adjudicating ‘an
action at the instance of one whose rights have not been invaded or infringed.’” Id.
(quoting Warth v. Seldin, 422 U.S. 490, 498 (1975); Mayhew v. Wilder, 46 S.W.3d 760,
767 (Tenn. Ct. App. 2001)). “Every standing inquiry requires a ‘careful judicial
examination of a complaint’s allegations to ascertain whether the particular plaintiff is
entitled to an adjudication of the particular claims asserted.’” Hargett, 414 S.W.3d at 97
(quoting Allen v. Wright, 468 U.S. 737, 752 (1984)).

              In Harrison, the supreme court considered whether Harrison had standing
to challenge a subpoena directing Dr. Dennis Wilson, a clinical psychologist who had
conducted a forensic examination of Harrison, “to produce ‘[a]ny and all records’
retained by him related to his psychological evaluation.” State v. Harrison, 270 S.W.3d
21, 26 (Tenn. 2008). Although the Harrison court was examining a judicial subpoena
issued under the terms of Code section 40-17-123, which prescribes the procedure to “be
employed when a law enforcement officer, as defined in § 39-11-106,” requests “the
production of books, papers, records, documents, tangible things, or information and data
electronically stored for the purpose of establishing, investigating or gathering evidence
for the prosecution of a criminal offense,” T.C.A. § 40-17-123(a), we see no reason that
the court’s analysis is inapplicable to subpoenas issued pursuant to Rule 17.

              In keeping with the general rule reached by numerous courts that “[a] party
has standing to move to quash a subpoena addressed to another if the subpoena infringes
                                            -18-
upon the movant’s legitimate interests,” see United States v. Raineri, 670 F.2d 702, 712
(7th Cir. 1982), our supreme court concluded that “[a] person who does not have a legally
protectable interest in subpoenaed materials has no standing to challenge either the form
of a subpoena issued to a third party or the manner in which the subpoena was issued,”
see Harrison, 270 S.W.3d at 28. In consequence, the court held that only “a person who
has a personal right, privilege, or proprietary interest in materials subject to a third-party
subpoena has standing to challenge the subpoena.” Harrison, 270 S.W.3d at 28-29.
Accordingly, the court held that Harrison had standing to challenge the subpoena.

              Citing Ranieri, the State argues that it has a legally protectable interest in
the subpoenas arising from its “interests in preventing undue lengthening of the trial,
undue harassment of its witness, and prejudicial over-emphasis on [witness] credibility.”
See Raineri, 670 F.2d at 712. The State also asserts that it has standing to advocate the
four witnesses’ personal rights to the subpoenaed materials by virtue of its statutory and
constitutional duty to protect the privacy rights of the victims and witnesses of crime.
We consider each claim in turn.

                                A. The State’s Own Interest

               The State, because of its unique position as “the representative not of an
ordinary party to a controversy” but of the people of the State of Tennessee, see Berger v.
United States, 295 U.S. 78, 88 (1935), will often lack standing in a criminal case “to
challenge a subpoena issued to a third party because of the absence of a claim of
privilege, or the absence of a proprietary interest in the subpoenaed material or of some
other interest in the subpoenaed documents,” United States v. Beckford, 964 F. Supp.
1010, 1023 (E.D. Va. 1997). That is the case here. The State has no personal right,
privilege, or proprietary interest in the electronic communications at issue. That being
said, courts have recognized that the State does have legitimate interests that may, under
certain circumstances, provide it with standing to challenge a third party subpoena issued
by a criminal defendant. The legitimate State interests most often cited come from
Ranieri: “preventing undue lengthening of the trial, undue harassment of its witness, and
prejudicial over-emphasis on [witness] credibility.” See Raineri, 670 F.2d at 712.

              In Ranieri, the Seventh Circuit Court of Appeals concluded that the
government had standing to challenge a subpoena issued by Ranieri to a government
witness during trial. The prosecution presented out-of-state witness Cira Gasbarri as its
first witness during Ranieri’s trial on charges that he ran a prostitution ring. The
defendant subjected her to two days’ cross-examination. Id. Nearly three weeks later,
Ranieri issued an ex parte subpoena for Gasbarri to appear as a defense witness. Id. The
prosecution successfully moved to quash the subpoena. The court stated, without
analysis, discussion, or citation to any authority, that “[t]he prosecution’s standing rested
                                            -19-
upon its interest in preventing undue lengthening of the trial, undue harassment of its
witness, and prejudicial over-emphasis on Gasbarri’s credibility.” Id. A number of state
and federal courts have applied the holding in Ranieri to the determination whether the
prosecution in a criminal case has standing to challenge a subpoena issued by the
defendant to a third party. See, e.g., United States v. Segal, 276 F. Supp. 2d 896, 900
(N.D. Ill. 2003); United States v. Daniels, 95 F. Supp. 2d 1160, 1164 (D. Kan. 2000);
United States v. Nachamie, 91 F. Supp. 2d 552, 558 (S.D.N.Y. 2000); Schreibvogel v.
State, 228 P.3d 874, 880 (Wyo. 2010); Com. v. Lam, 827 N.E.2d 209, 214 (Mass. 2005);
State v. DeCaro, 745 A.2d 800, 816 (2000).

               Because Harrison involved the defendant’s challenge to a third party
subpoena, our supreme court had no occasion to determine when the State would have
standing to challenge a third party subpoena. Thus, Harrison’s holding is expressed in
terms of what “a person” must show to establish standing: “a personal right, privilege, or
proprietary interest.” As indicated above, it will be difficult if not impossible for the
State in a criminal case to establish specifically “a personal right, privilege, or proprietary
interest.” The Harrison court made it clear, however, that its holding was grounded in
the conclusion that “[a] person who does not have a legally protectable interest in
subpoenaed materials has no standing to challenge either the form of a subpoena issued to
a third party or the manner in which the subpoena was issued.” Harrison, 270 S.W.3d at
28 (emphasis added). That the high court cited Ranieri in support of that conclusion
suggests that “a legally protectable interest,” as applied to the State in a criminal case,
may extend beyond the concepts of “personal right, privilege, or proprietary interest” to
cover the State’s legitimate interests in “preventing undue lengthening of the trial, undue
harassment of its witness, and prejudicial over-emphasis on [witness] credibility,” as
described in Ranieri. Id. at 29; Ranieri, 670 F.2d at 712.

              In our view, none of the interests identified in Ranieri are implicated by the
third party subpoenas issued in this case.

              First, because the subpoenas were issued prior to trial, there is no danger of
undue lengthening of the trial. “To the contrary, a subpoena returnable before trial will
avoid delay in the government’s prosecution of the case.” United States v. Tomison, 969
F. Supp. 587, 596 (E.D. Cal. 1997) (citing Bowman Dairy Co. v. United States, 341 U.S.
214, 220 (1951)). The Supreme Court has observed that the “chief innovation” of Rule
17 was, in fact, “to expedite the trial by providing a time and place before trial for the
inspection of the subpoenaed materials.” See Bowman Dairy Co., 341 U.S. at 220. The
record indicates that the defendants sought the subpoenas for the service providers as
soon as it became clear that the desired information would not be produced during the
discovery process. Then, when the service providers indicated that the defendants should
seek the information from the end users, the defendants asked for subpoenas to be issued
                                             -20-
to the witnesses. In short, the record gives no indication that the defendants acted with
anything other than urgency in acquiring the subpoenas at issue. In Ranieri, “the
Government’s legitimate interest . . . involved preventing a redundant and time-
consuming reexamination of a witness who had already been subjected to a lengthy and
effective cross-examination.” Nachamie, 91 F. Supp. 2d at 559. No such concerns exist
here.

              Second, nothing in the record suggests that the subpoenas issued to the
witnesses in this case caused “undue harassment” of the witnesses or that any of the
witnesses, including C.C., was in a particularly vulnerable position. Asking a witness to
provide his or her evidence to the court in compliance with a validly issued subpoena,
standing alone, cannot qualify as “undue harassment.” In our adversarial system of
justice, “[t]he need to develop all relevant facts . . . is both fundamental and
comprehensive.” United States v. Nixon, 418 U.S. 683, 709 (1974). To this end, “it is
imperative to the function of courts that compulsory process be available for the
production of evidence needed either by the prosecution or by the defense.” Id.
Consequently, it is “a fundamental maxim that the public . . . has a right to every man’s
evidence.” United States v. Bryan, 339 U.S. 323, 332 (1950). “The defendant’s right to
compulsory process is itself designed to vindicate the principle that the ‘ends of criminal
justice would be defeated if judgments were to be founded on a partial or speculative
presentation of the facts.’” Taylor v. Illinois, 484 U.S. 400, 411-12 (1988) (quoting
Nixon, 418 U.S. at 709); see also Nixon, 418 U.S. at 711 (“The right to the production of
all evidence at a criminal trial similarly has constitutional dimensions.”). To be sure,
complying with the subpoenas in this case will require some sacrifice on the part of the
witnesses, but “[t]he personal sacrifice involved is a part of the necessary contribution of
the individual to the welfare of the public.” Blair v. United States, 250 U.S. 273, 282
(1919); see also Blackmer v. United States, 284 U.S. 421, 438 (1932) (“It is also beyond
controversy that one of the duties which the citizen owes to his government is to support
the administration of justice by attending its courts and giving his testimony whenever he
is properly summoned.”).

              Although the State argues otherwise, there has been no showing that any of
the witnesses are “peculiarly vulnerable.” Other courts have concluded that the
prosecution has standing to challenge a subpoena issued to a “peculiarly” or
“particularly” vulnerable witness such as the minor victim of a sexual assault, see Com. v.
Lam, 27 N.E.2d 209, 214 (2005) (subpoena issued to the father of the minor victim);
People v. Spykstra, 234 P.3d 662, 667 (Colo. 2010) (subpoena issued to the parents of the
minor victim), or witnesses in a case where there exists a real potential for violence or
threats of violence to the witnesses, see United States v. Orena, 883 F. Supp. 849, 853
(E.D.N.Y. 1995) (subpoena issued to the cooperating witnesses in the witness protection
program and their families in a case where the defendants were “alleged to be aligned
                                            -21-
with the Orena faction of the Colombo Organized Crime family” in a plot “to murder
members of the Persico faction” of the same crime family); United States v. Joseph
Anthony Giampa, a/k/a “Joey G.,” a/k/a “Big Joe,” and Santo Giampapa, Jr., a/k/a
“Jay,” a/k/a “Jay G.,” a/k/a “Jr.,”, No. S 92 CR. 437 (PKL), 1992 WL 296440, at *1
(S.D.N.Y. Oct. 7, 1992) (subpoenas issued to cooperating witness, his wife, and minor
son, all of whom were in the witness protection program, by defendants “charged with
the murder of Michael Salerno, conspiracy to murder Mr. Salerno, and conspiracy to
assault Warren Ulrich in aid of a racketeering enterprise known as the Luchese Organized
Crime Family of La Cosa Nostra”). Instead, the witnesses here are adults with no
demonstrated vulnerabilities that would give rise to the State’s standing to challenge the
subpoenas as a means of protection. That they have been identified as potential witnesses
by the State could not be sufficient, in and of itself, to provide the State with standing.
As the Nachamie court recognized, if the State “had standing to move to quash whenever
a subpoena was served on a potential witness, then it could move to quash virtually every
Rule 17(c) subpoena merely by claiming that the recipient might become a witness.”
Nachamie, 91 F. Supp. 2d at 560. We agree with that court that, “[s]urely, the concept of
standing,” a concept that goes to the very jurisdiction of the court, “was not meant to be
so elastic.” Id.

              That the defendants moved the court to hold the witnesses in contempt for
failure to comply with the subpoenas does not alter our analysis. The State implies,
without any evidence, that the motion for contempt was designed to harass, intimidate, or
retaliate against the witnesses. As indicated, “there is a general duty to give what
[evidence] one is capable of giving,” see Bryan, 339 U.S. at 332, and the appropriate
recourse when a party fails to comply with a subpoena, absent some showing of an
adequate excuse for failure to comply, is a motion for contempt, see Tenn. R. Crim. P.
17(g) (“When a subpoena is served on a person, the court issuing the subpoena may deem
the person’s refusal to obey the subpoena to be contempt of court unless the person has
an adequate excuse.”); see, e.g., Blair, 250 U.S. at 282. We cannot characterize the
defendants’ attempt to pursue the only remedy available to them as “threatening.” “A
subpoena has never been treated as an invitation to a game of hare and hounds, in which
the witness must [provide evidence] only if cornered at the end of the chase.” Bryan, 339
U.S. at 331.

                Finally, there is no evidence to suggest that the subpoenas in this case will
lead to “a prejudicial over-emphasis on [witness] credibility.” Indeed, in a case such as
this, in which the determination of the defendants’ guilt or innocence will depend solely
on the credibility of the witnesses, we cannot fathom that the credibility of the State’s
witnesses could be overemphasized. That being said, because the subpoenas were issued
prior to the trial, issues of credibility of the witnesses or the emphasis thereon are not ripe
for our review.
                                             -22-
              Aside from the three interests mentioned in Ranieri, the State will have
standing to challenge a subpoena issued to a third party when compliance with the
subpoena is “unreasonable or oppressive” as applied to the State. See, e.g., United States
v. Daniels, 95 F. Supp. 2d 1160, 1164 (D. Kan. 2000); Tomison, 969 F. Supp. 587, 596
(E.D. Cal. 1997). Nothing in this case, however, suggests that compliance with the
subpoenas will work any particular hardship on the State or indicates that the materials
subpoenaed include any work product of the State that might give rise to a proprietary
interest in the materials. See Nachamie, 91 F. Supp. 2d at 560 (observing that
prosecution would have standing to challenge subpoena that requested prosecution work
product).

                    B. The State as Proxy for the Witnesses’ Interests

               The State also asserts that its statutory and constitutional duty “to protect
the interests of victims and witnesses” in criminal cases creates in the State a legal
interest giving rise to standing to challenge the subpoenas in this case. In support of its
position, the State points to the supreme court’s statement in Harrison that a legal right or
interest in subpoenaed materials “may, but not must, be created or defined by statute.”
Harrison, 270 S.W.3d at 27. “‘[I]n cases where a party is seeking to vindicate a statutory
right of interest, the doctrine of standing requires the party to demonstrate that its claim
falls within the zone of interests protected or regulated by the statute in question.’” Id. at
28 (quoting Wood v. Metro. Gov’t of Nashville & Davidson Cnty., 196 S.W.3d 152, 158
(Tenn. Ct. App. 2005)).

               The State notes that article one, section 35 of our state constitution confers
on crime victims the rights “to justice and due process” and entitles them to, among other
“basic rights,” “confer with the prosecution.” Tenn. Const. art. I, § 35. The State argues
that because Code section 8-7-401 places “at the discretion of the district attorney
general” the decision on the “extent of participation” of private counsel employed by “[a]
victim of crime or the family members of a victim of crime,” see T.C.A. § 8-7-401(a),
prosecutors are “the de facto advocates for victim rights and interests in criminal
proceedings.”

               In our view, the State’s argument misapprehends the role of the district
attorney general in a criminal prosecution. The prosecutor is not an advocate for the
victim of a crime or the witnesses for the State but is instead the representative of the
sovereign state of Tennessee charged with “safeguarding and advocating the rights of the
people.” Quillen v. Crockett, 928 S.W.2d 47, 51 (Tenn. Crim. App. 1995). “District
attorneys general are officers of the executive branch, who are entrusted by the citizens of
this state with the duty to seek justice.” State v. Head, 971 S.W.2d 49, 51 (Tenn. Crim.
                                            -23-
App. 1997) (citing State v. Gilliam, 901 S.W.2d 385, 389 (Tenn. Crim. App. 1995); State
v. Mario Pendergrass, No. 01C01-9504-CR–00121, 1997 WL 83777 (Tenn. Crim. App.,
Nashville, Feb. 28, 1997)); see also State v. Griffis, 964 S.W.2d 577, 598 (Tenn. Crim.
App. 1997) (“The district attorney general is a ‘quasi-judicial officer,’ who represents the
state in criminal prosecutions. However, it is as much the district attorney general’s
responsibility to enforce the laws as it is to see the accused receives a fair and impartial
trial.”). Thus, the prosecutor “is in a peculiar and very definite sense the servant of the
law, the twofold aim of which is that guilt shall not escape or innocence suffer.” Berger,
295 U.S. at 88.

               Neither the codification of the duties of the district attorney general nor the
statutory and constitutional provisions conferring certain rights upon the victims of crime
alters the prosecutor’s role as the representative of the people of Tennessee. Nor do they
endow the State with the power to represent the victim or the witnesses proffered by the
State. The State “cannot undertake to act as counsel to its witnesses,” even the victim,
because the State’s “interests and that of its witnesses are not identical.” Nachamie, 91 F.
Supp. 2d at 560–61. The prosecutor’s highest interest “in a criminal prosecution is not
that it shall win a case, but that justice shall be done.” Berger, 295 U.S. at 88.

               Additionally, the State lacked a sufficient legal relationship with any of the
witnesses in this case to allow the State to assert the witnesses’ own interests in the
subpoenaed material. It is well-established that “a victim in a criminal case does not
meet the definition of a ‘party’” in a criminal trial. State v. Flood, 219 S.W.3d 307, 314
(Tenn. 2007) (citing City of Chattanooga v. Swift, 442 S.W.2d 257, 258 (Tenn. 1969));
see also State v. Brown, 29 S.W.3d 427, 442 (Tenn. 2000) (“A victim in a sexual assault
case is not a party for purposes of a party opponent admission.”). Even though the four
women have been identified as State’s witnesses, “[i]t is hornbook law that generally no
party ‘owns’ a witness.” State v. Womack, 591 S.W.2d 437, 444 (Tenn. Ct. App. 1979).
We also note that the Harrison court did not factor Harrison’s psychologist’s potential as
a witness for either party into its analysis of Harrison’s standing to challenge the
subpoena issued to his psychologist. Harrison, 270 S.W.3d at 26. In fact, the court
found that Harrison had standing to challenge the subpoena despite the fact that he “did
not intend to call Dr. Wilson as a witness at trial or to rely on Dr. Wilson’s records as
evidence in his case-in-chief at trial,” id., because he had “a legitimate personal interest
in the report and records of the clinical psychologist he retained to ascertain whether he is
competent to stand trial and whether he could viably assert an insanity defense,” id. at 29.

              Finally, we disagree with the State that it has standing to challenge the
subpoenas because it is in “the best position to assist the trial court” in determining
whether the subpoenas amount to an impermissible “fishing expedition.” The record
establishes that the information that is the subject of the subpoenas is and always has
                                            -24-
been in the exclusive control of the witnesses and the providers. Indeed, the record
suggests that the State has gone to great lengths to avoid collecting the requested
information. Under these circumstances, we cannot see how the State is in a unique
position to comment on the content of the information requested. Indeed, the State
appears to have engaged in a “hide the ball” strategy which is inimical to the
constitutional rights laboriously described above.

              Because the State has failed to establish that it has a legitimate interest in
the subpoenas at issue, we conclude that the State lacks standing to challenge the
subpoenas. In consequence, we reverse the trial court’s ruling that the State had standing
to challenge the subpoenas issued to the witnesses in this case and affirm the trial court’s
ruling that the State did not have standing to challenge the subpoenas issued to the
service providers.

             Although our conclusion that the State lacks standing to challenge the
subpoenas renders the remaining issues nonjusticiable, in the interests of judicial
economy and potential further appellate review, we address the merits of each party’s
claim regarding the subpoenas.

                                    II. Remaining Issues

                At this point we provide a brief reminder of the events that led to this
appeal. The defendants moved the trial court in August 2015 for a court order to
accompany subpoenas duces tecum issued to AT&T, Facebook, Twitter, Instagram,
Snapchat, and Yik Yak to obtain the electronic communications of four State’s witnesses.
The defendants argued that the information was relevant, material, necessary to prepare
for trial, and not obtainable from any other source. At the hearing, the defendants did not
suggest the time period to be covered by the subpoenas or the precise scope of the
information requested, asking generally for “social media information and
communications material and relevant to the events at issue.” Following the hearing, the
trial court granted the defendants’ request, finding “that specific and articulable facts
establish[ed] reasonable grounds to believe that records and information pertaining to
designated cellular telephone and social media communications are relevant and material
to a pending criminal matter.” The subpoenas issued to AT&T demanded essentially
every piece of data associated with the cellular telephone accounts of C.C. and Ms. Lawn,
including “account records, . . . call detail records . . . , audio recordings, saved contacts,
geolocation data, text messages or iMessages sent or received, photographs, video
recordings, and voicemail messages” for the period beginning on November 1, 2014, and
ending with the date of subpoena compliance. The subpoenas issued to the social media
providers similarly asked for every piece of data associated with the accounts of all four
witnesses, both the basic non-content information related to the account and the entirety
                                             -25-
of the contents of the electronic communications, for the period beginning January 1,
2014, and ending with the date of subpoena compliance.

               After the defendants received pushback from four of the social media
providers and after learning that AT&T did not possess the content information the
defendants desired, the defendants notified the trial court of their intention to issue
subpoenas directly to the four witnesses asking for identical information. Those
subpoenas issued in September 2015. Only C.C. attempted to comply with the
subpoenas, sending printouts from some social media sites accompanied by a letter to the
trial court explaining why she was unable to provide more information.

               The defendants asked that the witnesses be held in contempt for their
failure to fully comply with the subpoenas, and the State moved to quash the subpoenas.
The trial court granted the State’s motion to quash the subpoenas issued to the four
witnesses on grounds that the materials covered by the subpoenas qualified as
“statements of witnesses,” which cannot be obtained by a Rule 17 subpoena. The court
also concluded that the subpoenas were unreasonable and oppressive because the
witnesses had been unable to comply despite their best efforts to do so.

              In this appeal, the State maintains that the trial court correctly concluded
that the requested information qualified as witness statements, rendering them
undiscoverable by subpoena, and that the subpoenas were unreasonable and oppressive.
The State also contends that the trial court’s decision to quash the subpoenas to the
witnesses did not violate the defendants’ constitutional rights to compulsory process and
to present a defense. The defendants assert that the trial court erred on all points.

                         A. What Can the Defendants Obtain?

             Both the state and federal constitutions guarantee a criminal accused the
right to compulsory process for obtaining evidence in his favor. See U.S. Const. Amend.
VI (“In all criminal prosecutions, the accused shall enjoy the right . . . to have
compulsory process for obtaining witnesses in his favor, and to have the Assistance of
Counsel for his defence.”); Tenn. Const. art. I, § 9.

             Because [Sixth Amendment] rights are basic to our adversary
             system of criminal justice, they are part of the ‘due process of
             law’ that is guaranteed by the Fourteenth Amendment to
             defendants in the criminal courts of the States. The rights to
             notice, confrontation, and compulsory process, when taken
             together, guarantee that a criminal charge may be answered in
             a manner now considered fundamental to the fair
                                           -26-
              administration of American justice—through the calling and
              interrogation of favorable witnesses, the cross-examination of
              adverse witnesses, and the orderly introduction of evidence.
              In short, the Amendment constitutionalizes the right in an
              adversary criminal trial to make a defense as we know it.

Faretta v. California, 422 U.S. 806, 818 (1975); see also Washington v. Texas, 388 U.S.
14, 18 (1967) (“The right of an accused to have compulsory process for obtaining
witnesses in his favor stands on no lesser footing than the other Sixth Amendment rights
that we have previously held applicable to the States.”).

               In constitutional law, as in all things in life, however, there are limits. “The
accused does not have an unfettered right to offer [evidence] that is incompetent,
privileged, or otherwise inadmissible under standard rules of evidence. The Compulsory
Process Clause provides him with an effective weapon, but it is a weapon that cannot be
used irresponsibly.” Taylor, 484 U.S. at 410; Chambers v. Mississippi, 410 U.S. 284,
295 (1973) (observing that the criminal defendant’s right to present evidence “is not
absolute and may, in appropriate cases, bow to accommodate other legitimate interests in
the criminal trial process”). Indeed, “[t]he adversary process could not function
effectively without adherence to rules of procedure that govern the orderly presentation
of facts and arguments to provide each party with a fair opportunity to assemble and
submit evidence to contradict or explain the opponent’s case.” Taylor, 484 U.S. at 410-
11. “Rules that provide for pretrial discovery . . . . minimize[] the risk that a judgment
will be predicated on incomplete, misleading, or even deliberately fabricated” evidence.
Id. at 411-12.

              In addition to the constitutional right to compulsory process, our Code
contains a statutory right to compulsory process, see T.C.A. § 40-17-105 (“As provided
by the Constitution of Tennessee, the accused, in all criminal prosecutions, has a right to
meet the witnesses face to face, and to have compulsory process for obtaining witnesses
in the accused’s favor.”), and provides that Rule 17 of the Tennessee Rules of Criminal
Procedure “shall govern when a clerk or other authorized officer of the court is required
to issue a subpoena in a criminal case in criminal court and the consequences of a
person’s refusal to appear, testify or produce evidence when subpoenaed,” see id. § 40-
17-122.

              Tennessee Rule of Criminal Procedure 17 provides, in pertinent part, as
follows:




                                             -27-
              (d) Documents and Objects. A subpoena may order a person
              to produce the books, papers, documents, or other objects the
              subpoena designates.

              (1) Production to Permit Inspection. The court may direct
              that the designated items be produced in court before trial or
              before they are to be offered in evidence. When the items
              arrive, the court may permit the parties and their attorneys to
              inspect all or part of them.

              (2) Compliance Unreasonable. On motion made promptly
              and in any event by the time specified in the subpoena for
              compliance therewith, the court may quash or modify the
              subpoena if compliance would be unreasonable or oppressive.
              The court may condition denial of the motion on the
              advancement by the party in whose behalf the subpoena is
              issued of the reasonable cost of producing the books, papers,
              documents, or other objects.

                     ....

              (g) Contempt. When a subpoena is served on a person, the
              court issuing the subpoena may deem the person’s refusal to
              obey the subpoena to be contempt of court unless the person
              has an adequate excuse.

              (h) Information not Subject to Subpoena. Statements by
              witnesses or prospective witnesses may not be subpoenaed
              from the state or the defendant under this rule, but are subject
              to production only in accordance with the provisions of Rule
              26.2.

Tenn. R. Crim. P. 17(d), (g)-(h).

               Against this backdrop, we begin our analysis with the claim we believe to
be the easiest to dispose of: that the subpoenaed materials were “statements by witnesses”
and were thus undiscoverable pursuant to the rules of criminal procedure. Rule 17 is
“similar to its federal counterpart” in that it “makes it clear that the proper method to
secure witness statements from the opposing side--either at trial or at a pretrial hearing
under Rule 12(b)--is as set forth in Rule 26.2.” Tenn. R. Crim. P. 17, Advisory Comm’n
Comments (emphasis added). Rule 26.2 provides that
                                            -28-
              [a]fter a witness other than the defendant has testified on
              direct examination, the court, on motion of a party who did
              not call the witness, shall order the attorney for the state or
              the defendant and the defendant’s attorney to produce, for the
              examination and use of the moving party, any statement of
              the witness that is in their possession and that relates to the
              subject matter of the witness’s testimony.

Tenn. R. Crim. P. 26.2(a). As used in Rule 26.2, and by extension, Rule 17, the term
“witness’s statement” means: “(1) A written statement that the witness makes and signs,
or otherwise adopts or approves; or (2) A substantially verbatim, contemporaneously
recorded recital of the witness’s oral statement that is contained in a stenographic,
mechanical, electrical, or other recording or a transcription of such a statement.” Tenn.
R. Crim. P. 26.2(f).

              Based upon the plain language of the two rules, neither operates to bar the
subpoenas for the electronic communications in this case. First, the defendants did not
attempt to subpoena any of the electronic communications “from the [S]tate” as
prohibited by Rule 17 because, as the State has made clear, none of the desired
communications has ever been in the possession of the State. See Tenn. R. Crim. P.
17(h). Additionally, because the communications have never been in the possession of
the State, they do not fall within the purview of Rule 26.2, which only governs the
production of “any statement of the witness that is in the[] possession [of the non-moving
party] and that relates to the subject matter of the witness’s testimony.” Tenn. R. Crim.
P. 26.2(a). As indicated earlier, the record suggests that the State has gone to great
lengths to avoid collecting any of the communications sought by the defendants. Second,
the communications do not fall within the definition of “witness’s statement[s]” provided
in Rule 26.2. Nothing in the record suggests that any of the electronic communications
consists of either “[a] written statement that the witness makes and signs, or otherwise
adopts or approves” or “[a] substantially verbatim, contemporaneously recorded recital of
the witness’s oral statement that is contained in a stenographic, mechanical, electrical, or
other recording or a transcription of such a statement.” See Tenn. R. Crim. P. 26.2(f).

             Our conclusion that the rules of criminal procedure do not expressly
prohibit the defendants from seeking the electronic communications via Rule 17
subpoena does not end our inquiry.

              The Supreme Court has “recognized” that “the subpoena duces tecum”
provided for in the federal counterpart to Rule 17 “was not intended to provide a means
of discovery for criminal cases” and that “its chief innovation was to expedite the trial by
                                            -29-
providing a time and place before trial for the inspection of subpoenaed materials.”13
Nixon, 418 U.S. at 698-99 (citing Bowman Dairy Co., 341 U.S. at 220). Importantly, “[a]
subpoena for documents may be quashed if their production would be ‘unreasonable or
oppressive,’ but not otherwise.” Id. at 698. In consequence, the party seeking production
of evidence via the federal rule prior to trial must show:

               (1) that the documents are evidentiary and relevant; (2) that
               they are not otherwise procurable reasonably in advance of
               trial by exercise of due diligence; (3) that the party cannot
               properly prepare for trial without such production and
               inspection in advance of trial and that the failure to obtain
               such inspection may tend unreasonably to delay the trial; and
               (4) that the application is made in good faith and is not
               intended as a general ‘fishing expedition.’

Nixon, 418 U.S. at 699-700. To carry this burden, the moving party “must clear three
hurdles: (1) relevancy; (2) admissibility; (3) specificity.” Id. at 700. The defendants
argue that they have met this burden. The State argues that they have not.

              The decision whether to enforce “a pretrial subpoena duces tecum must
necessarily be committed to the sound discretion of the trial court since the necessity for
the subpoena most often turns upon a determination of factual issues.” Id., 418 U.S. at
702.

              In Nixon, the Special Prosecutor handling the indictment of John N.
Mitchell, H. R. Haldeman, John D. Ehrlichman, Charles W. Colson, Robert C. Mardian,
Kenneth W. Parkinson, and Gordon Strachan on charges of conspiracy to defraud the
United States and obstruction of justice caused to be issued a subpoena directed at
President Nixon, who had been named in the indictment as an unindicted co-conspirator,
to produce “in advance of the September 9 trial date . . . certain tapes, memoranda,
papers, transcripts or other writings relating to certain precisely identified meetings
between the President and others.” Nixon, 418 U.S. at 686, 689. “The Special Prosecutor
was able to fix the time, place, and persons present at these discussions because the
White House daily logs and appointment records had been delivered to him.” Id. at 689.

       13
            Given that Tennessee Rule of Criminal Procedure 17 is adapted from and therefore similar to
Federal Rule of Criminal Procedure 17, we see no reason to treat the application of our rule any
differently. See State v. Lori A. Little, No. M1999-00858-CCA-R3-CD (Tenn. Crim. App., Nashville,
Nov. 22, 2000) (stating that Tennessee Rule of Criminal Procedure 17 “is essentially identical to the
federal counterpart in the Federal Rules of Criminal Procedure”).


                                                 -30-
The Supreme Court determined that although “the contents of the subpoenaed tapes could
not at that stage be described fully by the Special Prosecutor,” the evidence offered by the
Special prosecutor in the form of “the sworn testimony or statements of one or more of
the participants in the conversations as to what was said at the time” as well as “the
identity of the participants and the time and place of the conversations,” evinced “a
sufficient likelihood that each of the tapes contains conversations relevant to the offenses
charged in the indictment.” Id. at 700. The Court also concluded that the Special
Prosecutor had made “a sufficient preliminary showing that each of the subpoenaed tapes
contains evidence admissible with respect to the offenses charged in the indictment.” Id.
In addition to “valid potential evidentiary uses” for the requested materials, the Supreme
Court noted that “the analysis and possible transcription of the tapes may take a
significant period of time,” which supported their being produced prior to trial. Id. at
702.

              With this foundation, we turn to the present case.

              With regard to relevancy, the evidence presented by the defendants
supports a conclusion that the four witnesses named in the subpoenas communicated
electronically, either via text message or social media, about the party where the events
transpired and the offenses themselves. Although the defendants cannot describe fully
the contents of the electronic communications, the ubiquitous nature of electronic
communication and the type of “smart phones” used to send text messages and engage in
social media, see Riley v. California, 134 S. Ct. 2473, 2484 (2014) (observing that
“modern cell phones . . . are now such a pervasive and insistent part of daily life that the
proverbial visitor from Mars might conclude they were an important feature of human
anatomy”), coupled with the admissions by various witnesses about their electronic
communications relevant to the offenses, “permit a rational inference that at least part of
the conversations relate to the offenses charged in the indictment,” Nixon, 418 U.S. at
700.

              With regard to admissibility, we observe, as did the Court in Nixon, that the
requested communications are “a collection of out-of-court statements by declarants who
will not be subject to cross-examination.” Id. That being said, the rules of evidence do
not bar the admission of all out-of-court statements so long as they fit within an exception
to the hearsay rule. Additionally, as was the case in Nixon, the requested materials “may
also be admissible for the limited purpose of impeaching the credibility of” any witness
who testifies at trial. Id. at 701 (observing that “[g]enerally, the need for evidence to
impeach witnesses is insufficient to require its production in advance of trial” but pretrial
production is justified when “there are other valid potential evidentiary uses for the same
material” and the production “may take a significant period of time”).

                                            -31-
               This brings us to the demand included in the subpoenas that C.C. and Ms.
Lawn produce their cellular telephones for inspection and examination. Nothing at the
hearing on the defendants’ motion suggested that the defendants were seeking production
of the cellular telephones themselves, and the trial court made no findings in this regard.
The defendants presented no evidence of a need for production of the cellular telephones.
Indeed, the evidence presented at the hearing and other evidence included in the record
indicates that both women had replaced their cellular telephone handsets within days of
one another in January 2015 and that C.C. had sold her old handset online, despite
expressing to the police that the handset was not in working order, and that Ms. Lawn had
disposed of hers as well. Based on these facts, the defendants have failed to establish that
pretrial production of the cellular telephone handsets is likely to produce relevant,
admissible evidence.14

              Finally, we observe that although the defendants’ arguments, both in their
motion and at the hearing, suggested subpoenas for the production of electronic
communications about the offenses made during the period of time surrounding the
offenses and the ensuing investigation, the subpoenas actually issued in this case lack that
same specificity. The subpoenas request from the social media providers and the four
witnesses every piece of both content-related and non-content-related electronic
communications generated by the four witnesses for the 18-month period prior to the
issuance of the subpoenas. This broad, general request spanning a lengthy and open-
ended time frame finds no support in either the case law or the record. As indicated, the
defendants have established that some of the witnesses’ electronic communications are
likely to contain relevant, admissible evidence. The relevant time frame for the

        14
            We also question whether the type of inspection of the cellular telephone handsets
contemplated by the subpoenas in this case is permissible via a Rule 17 subpoena following the Supreme
Court’s decision in Riley. There, the Court observed that “[t]oday . . . it is no exaggeration to say that
many of the more than 90% of American adults who own a cell phone keep on their person a digital
record of nearly every aspect of their lives—from the mundane to the intimate,” Riley, 134 S. Ct. at 2490
(citing Ontario v. Quon, 560 U.S. 746, 760 (2010)), and concluded that the government could not search
the contents of a cellular telephone seized incident to an arrest without either obtaining a search warrant
or proving that exigent circumstances required the warrantless search of the phone:

                Modern cell phones are not just another technological convenience.
                With all they contain and all they may reveal, they hold for many
                Americans “the privacies of life.” The fact that technology now allows
                an individual to carry such information in his hand does not make the
                information any less worthy of the protection for which the Founders
                fought. Our answer to the question of what police must do before
                searching a cell phone seized incident to an arrest is accordingly
                simple—get a warrant.

Riley, 134 S. Ct. at 2494-95.
                                                   -32-
electronic communications of Ms. Lawn, Ms. Boland, and Ms. Tavares, based upon the
evidence and argument presented at this stage in the proceedings, would be the period
beginning the day of the party and ending when the witnesses were cautioned by the KPD
to avoid discussing the offenses on social media. Because of the nature of the
relationship alleged between C.C. and Mr. Johnson, the relevant time frame for her
electronic communications would be broader, spanning from the beginning of their
relationship until she closed her social media accounts.

              In summary, the defendants established, under the Nixon standard, an
entitlement to pretrial production of the electronic communications of each of the
witnesses within the above-described relevant time frames. Because the subpoenas
actually issued lack specificity as discussed, rendering them overly broad, we would have
concluded that the subpoenas should be modified to require the production only of those
materials as outlined above had we not previously concluded that the State lacked
standing to challenge the subpoenas.

                B. From Whom Can the Defendants Obtain Information?

            Having determined what the defendants are entitled to, we now consider
from whom they may acquire it.

                                  1. Service Providers

                In the trial court, the social media providers responded to the subpoena by
letter stating that the terms of the Stored Communications Act (“SCA”), which is part of
the Electronic Communications Protection Act (“ECPA”), forbade the disclosure of the
contents of the witnesses’ electronic communications to the defendants via a Rule 17
subpoena. The record does not contain any objections from either AT&T or YikYak.
AT&T did indicate via letter that it did not possess any electronic communications.
YikYak indicated that it would comply with the subpoenas. None of the providers joined
the State’s motion to quash. The trial court concluded that the State lacked standing to
challenge the subpoenas to the service providers, and we agree with this ruling, as we
held above. Because the trial court found that the State lacked standing to challenge
those subpoenas, those subpoenas remain intact, and the court did not consider the
application of the SCA at the November 3 hearing that is the subject of this interlocutory
appeal. The trial court did, however, conclude following the August 24, 2015 hearing
that the defendants could obtain the electronic communications from the service
providers under the terms of the SCA. As we indicated before, we are addressing those
issues for which the record is adequate for our review both to promote judicial efficiency
in this case, which has already been pending for more than two years, and to facilitate
potential further appellate review. For those same reasons and to provide guidance to the
                                           -33-
trial court upon remand, we will address the application of the SCA to the subpoenas
issued to the service providers in this case.

               The trial court, the parties, and the providers assumed without analysis that
the SCA applied to the social media communications requested by the defendants. As we
discuss more fully below, the application of the SCA to these communications is not
quite so clear.

              “The privacy of stored Internet communications in the United States is
governed by” the SCA, which “was enacted in 1986 as part of the Electronic
Communications Privacy Act.” Orin S. Kerr, A User’s Guide to the Stored
Communications Act, and A Legislator’s Guide to Amending It, 72 Geo. Wash. L. Rev.
1208 (2004). Because electronic communication development has far outpaced the
development of the law in the area of constitutionally-based privacy protections for those
communications, Congress passed the SCA to bridge the gap by “creat[ing] a set of
Fourth Amendment-like privacy protections by statute, regulating the relationship
between government investigators and service providers in possession of users’ private
information.” Id. at 1212. The SCA accomplishes this by limiting “the government’s
ability to compel providers to disclose information in their possession about their
customers and subscribers” and by limiting “the ability of [internet service providers] to
voluntarily disclose information about their customers and subscribers to the
government.” Id. at 1212–13. “The SCA provides privacy protection to communications
held” in electronic storage by “providers of electronic communication service . . . and
providers of remote computing service.” Id. at 1213–14.15

              “The Stored Communications Act is best understood by considering its
operation and purpose in light of the technology that existed in 1986” because it “is not
built around clear principles that are intended to easily accommodate future changes in
technology; instead, Congress chose to draft a complex statute based on the operation of
early computer networks.” William Jeremy Robison, Free at What Cost?: Cloud
Computing Privacy Under the Stored Communications Act, 98 Geo. L.J. 1195, 1204–05
(2010). For this reason, it is necessary to understand how computing operated at that
time in order to understand how the SCA might be applied to more recent innovations
such as social media networks.

              The United States Code defines “electronic communication service”
(“ECS”) as “any service which provides to users thereof the ability to send or receive
wire or electronic communications.” 18 U.S.C. § 2510(15). Electronic storage is both

       15
          As the author points out, “the distinction that the SCA draws reflects the technology of the
1980s.” Id. at 1213.
                                                -34-
“any temporary, intermediate storage of a wire or electronic communication incidental to
the electronic transmission thereof” and “any storage of such communication by an
electronic communication service for purposes of backup protection of such
communication.” Id. § 2510(17). Because “Congress explored” the ECS category
“primarily through the lens of early electronic mail systems,” which “[a]t the time, . . .
operated through a fragmented delivery system in which communications were slowly
transmitted between the computer servers operated by e-mail providers,” the resulting
definition of electronic storage is “rather odd” and “much narrower than its name
suggests.” Robison, supra, 1205-06.

              The Code defines “remote computing service” (“RCS”) as “the provision to
the public of computer storage or processing services by means of an electronic
communications system.” Id. § 2711(2). “Congress created” this category “to address
third-party service providers that offered ‘sophisticated and convenient computing
services to subscribers and customers from remote facilities.’” Robison, supra, 1206
(quoting S. REP. NO. 99-541, at 10 (1986), reprinted in 1986 U.S.C.C.A.N. 3555). At
the time Congress adopted the SCA, “outsourced computing was a service marketed to
‘businesses of all sizes--hospitals, banks and many others,’ rather than individual
consumers,” and, as a result, “[t]he requirements for RCS precisely describe the nature of
the commercial relationship that existed at the time of the Act’s adoption between the
outsourced computing providers and their business clientele.” Robison, supra, 1207.

              A few remaining definitions are in order. Electronic communication is
defined as

              any transfer of signs, signals, writing, images, sounds, data, or
              intelligence of any nature transmitted in whole or in part by a
              wire, radio, electromagnetic, photoelectronic or photooptical
              system that affects interstate or foreign commerce, but does
              not include—
                      (A) any wire or oral communication;
                      (B) any communication made through a tone-only
              paging device;
                      (C) any communication from a tracking device (as
              defined in section 3117 of this title); or
                      (D) electronic funds transfer information stored by a
              financial institution in a communications system used for the
              electronic storage and transfer of funds.

18 U.S.C. § 2510(12). “‘[G]overnmental entity’ means a department or agency of the
United States or any State or political subdivision thereof.” Id. § 2711(4). “‘[C]ontents’,
                                            -35-
when used with respect to any wire, oral, or electronic communication, includes any
information concerning the substance, purport, or meaning of that communication.” Id. §
2510(8).

               The SCA makes it a crime for anyone to “intentionally access[] without
authorization a facility through which an electronic communication service is provided”
or “intentionally exceed[] an authorization to access that facility” and use that access to
“obtain[], alter[], or prevent[] authorized access to a wire or electronic communication
while it is in electronic storage in such system.” Id. § 2701(a). This provision is
inapplicable “to conduct authorized . . . by the person or entity providing a wire or
electronic communications service; . . . by a user of that service with respect to a
communication of or intended for that user; or . . . in section 2703, 2704 or 2518 of this
title.” Id. § 2701(c).

              Code section 2702, which regulates the voluntary disclosure of information
provides, in pertinent part, as follows:

             (a) Prohibitions.--Except as provided in subsection (b) or (c)--
                 (1) a person or entity providing an electronic
                 communication service to the public shall not knowingly
                 divulge to any person or entity the contents of a
                 communication while in electronic storage by that service;
                 and
                 (2) a person or entity providing remote computing service
                 to the public shall not knowingly divulge to any person or
                 entity the contents of any communication which is carried
                 or maintained on that service--
                     (A) on behalf of, and received by means of electronic
                     transmission from (or created by means of computer
                     processing of communications received by means of
                     electronic transmission from), a subscriber or customer
                     of such service;
                     (B) solely for the purpose of providing storage or
                     computer processing services to such subscriber or
                     customer, if the provider is not authorized to access the
                     contents of any such communications for purposes of
                     providing any services other than storage or computer
                     processing; and
                 (3) a provider of remote computing service or electronic
                 communication service to the public shall not knowingly
                 divulge a record or other information pertaining to a
                                           -36-
               subscriber to or customer of such service (not including
               the contents of communications covered by paragraph (1)
               or (2)) to any governmental entity.

            (b) Exceptions for disclosure of communications.-- A
            provider described in subsection (a) may divulge the contents
            of a communication--
                (1) to an addressee or intended recipient of such
                communication or an agent of such addressee or intended
                recipient;
                (2) as otherwise authorized in section 2517, 2511(2)(a), or
                2703 of this title;
                (3) with the lawful consent of the originator or an
                addressee or intended recipient of such communication, or
                the subscriber in the case of remote computing service;

                   ....

            (c) Exceptions for disclosure of customer records.--A
            provider described in subsection (a) may divulge a record or
            other information pertaining to a subscriber to or customer of
            such service (not including the contents of communications
            covered by subsection (a)(1) or (a)(2))--
               (1) as otherwise authorized in section 2703;
               (2) with the lawful consent of the customer or subscriber;

                   ....


Id. § 2702(a)-(c). Section 2703, which governs compelled disclosure of electronic
communications, provides:

            (a) Contents of wire or electronic communications in
            electronic storage.--A governmental entity may require the
            disclosure by a provider of electronic communication service
            of the contents of a wire or electronic communication, that is
            in electronic storage in an electronic communications system
            for one hundred and eighty days or less, only pursuant to a
            warrant issued using the procedures described in the Federal
            Rules of Criminal Procedure (or, in the case of a State court,
            issued using State warrant procedures) by a court of

                                         -37-
competent jurisdiction. A governmental entity may require
the disclosure by a provider of electronic communications
services of the contents of a wire or electronic communication
that has been in electronic storage in an electronic
communications system for more than one hundred and
eighty days by the means available under subsection (b) of
this section.

(b) Contents of wire or electronic communications in a
remote computing service.--(1) A governmental entity may
require a provider of remote computing service to disclose the
contents of any wire or electronic communication to which
this paragraph is made applicable by paragraph (2) of this
subsection--
    (A) without required notice to the subscriber or customer,
    if the governmental entity obtains a warrant issued using
    the procedures described in the Federal Rules of Criminal
    Procedure (or, in the case of a State court, issued using
    State warrant procedures) by a court of competent
    jurisdiction; or
    (B) with prior notice from the governmental entity to the
    subscriber or customer if the governmental entity--
        (i) uses an administrative subpoena authorized by a
        Federal or State statute or a Federal or State grand jury
        or trial subpoena; or
        (ii) obtains a court order for such disclosure under
        subsection (d) of this section;
    except that delayed notice may be given pursuant to
    section 2705 of this title.
(2) Paragraph (1) is applicable with respect to any wire or
electronic communication that is held or maintained on that
service--
    (A) on behalf of, and received by means of electronic
    transmission from (or created by means of computer
    processing of communications received by means of
    electronic transmission from), a subscriber or customer of
    such remote computing service; and
    (B) solely for the purpose of providing storage or
    computer processing services to such subscriber or
    customer, if the provider is not authorized to access the
    contents of any such communications for purposes of
                              -38-
   providing any services other than storage or computer
   processing.

(c) Records concerning electronic communication service or
remote computing service.--(1) A governmental entity may
require a provider of electronic communication service or
remote computing service to disclose a record or other
information pertaining to a subscriber to or customer of such
service (not including the contents of communications) only
when the governmental entity—
    (A) obtains a warrant issued using the procedures
    described in the Federal Rules of Criminal Procedure (or,
    in the case of a State court, issued using State warrant
    procedures) by a court of competent jurisdiction;
    (B) obtains a court order for such disclosure under
    subsection (d) of this section;
    (C) has the consent of the subscriber or customer to such
    disclosure;
    (D) submits a formal written request relevant to a law
    enforcement investigation concerning telemarketing fraud
    for the name, address, and place of business of a
    subscriber or customer of such provider, which subscriber
    or customer is engaged in telemarketing (as such term is
    defined in section 2325 of this title); or
    (E) seeks information under paragraph (2).
(2) A provider of electronic communication service or remote
computing service shall disclose to a governmental entity the-
    (A) name;
    (B) address;
    (C) local and long distance telephone connection records,
    or records of session times and durations;
    (D) length of service (including start date) and types of
    service utilized;
    (E) telephone or instrument number or other subscriber
    number or identity, including any temporarily assigned
    network address; and
    (F) means and source of payment for such service
    (including any credit card or bank account number),
of a subscriber to or customer of such service when the
governmental entity uses an administrative subpoena
authorized by a Federal or State statute or a Federal or State
                             -39-
             grand jury or trial subpoena or any means available under
             paragraph (1).
             (3) A governmental entity receiving records or information
             under this subsection is not required to provide notice to a
             subscriber or customer.

             (d) Requirements for court order.--A court order for
             disclosure under subsection (b) or (c) may be issued by any
             court that is a court of competent jurisdiction and shall issue
             only if the governmental entity offers specific and articulable
             facts showing that there are reasonable grounds to believe that
             the contents of a wire or electronic communication, or the
             records or other information sought, are relevant and material
             to an ongoing criminal investigation. In the case of a State
             governmental authority, such a court order shall not issue if
             prohibited by the law of such State. A court issuing an order
             pursuant to this section, on a motion made promptly by the
             service provider, may quash or modify such order, if the
             information or records requested are unusually voluminous in
             nature or compliance with such order otherwise would cause
             an undue burden on such provider.


18 U.S.C. § 2703(a)-(d).

             Importantly, the SCA draws a distinction between content, “the
communication that a person wishes to share or communicate with another person,” and
non-content, “information about the communication that the network uses to deliver and
process the content information” such as basic subscriber information. Kerr, supra,
1227-28. Kerr explains that “[t]he rules for compelled disclosure operate like an upside-
down pyramid” such that “[t]he higher up the pyramid you go, the more information the
government can obtain.” Id. at 1222.

             At the lowest threshold, only a simple subpoena is needed to
             compel basic subscriber information. Higher up the pyramid,
             a 2703(d) order compels all noncontent records. A simple
             subpoena combined with prior notice compels three
             categories of information: basic subscriber information, plus
             any opened e-mails or other permanently held files (covered
             by the RCS rules), plus any contents in temporary “electronic
             storage” such as unretrieved e-mails in storage for more than
                                          -40-
                180 days. A 2703(d) order plus prior notice is sufficient to
                compel all noncontent records, plus any opened e-mails or
                other permanently held files (covered by the RCS rules), plus
                any contents in temporary “electronic storage” such as
                unretrieved e-mails in storage for more than 180 days. Put
                another way, a 2703(d) order plus prior notice compels
                everything except contents in temporary “electronic storage”
                180 days or less. Finally, a search warrant is needed to
                compel everything stored in an account.

Id. at 1222-23 (footnotes omitted); see also Matter of Warrant to Search a Certain E–
Mail Account Controlled & Maintained by Microsoft Corp., 829 F.3d 197, 207-08 (2d
Cir. 2016) (hereinafter “Microsoft”).16 “Data stored by a remote computing service
(RCS) . . . receives fewer privacy protections than communications held by an ECS.”
Robison, supra, 1208.

              Because the framework created in the SCA relies entirely on 1986
computing technology, determining the precise scope of its application to the type of
social media communications at issue in this case presents difficulties. See Konop v.
Hawaiian Airlines, Inc., 302 F.3d 868, 874 (9th Cir. 2002) (observing that application of
the SCA “‘is a complex, often convoluted, area of the law’” and that “the existing
statutory framework is ill-suited to address modern forms of communication”). Those
        16
         The Second Circuit Court of Appeals echoed Kerr’s observation that section 2703 “sets up a
pyramidal structure governing conditions under which service providers must disclose stored
communications to the government.” The court explained,

                Basic subscriber and transactional information can be obtained simply
                with an administrative subpoena. Other non-content records can be
                obtained by a court order (a “§ 2703(d) order”) . . . . The government
                may also obtain some user content with an administrative subpoena or a
                § 2703(d) order, but only if notice is provided to the service provider’s
                subscriber or customer. § 2703(b)(1)(B). To obtain “priority stored
                communications” (our phrase), as described below, the Act generally
                requires that the government first secure a warrant that has been issued
                “using the procedures described in the Federal Rules of Criminal
                Procedure,” or using State warrant procedures, both of which require a
                showing of probable cause. Priority stored communications fall into two
                categories: For electronic communications stored recently (that is, for
                less than 180 days) by an ECS, the government must obtain a warrant. §
                2703(a). For older electronic communications and those held by an
                RCS, a warrant is also required, unless the Government is willing to
                provide notice to the subscriber or customer.”).

Microsoft, 829 F.3d at 207-08.
                                                  -41-
courts faced with the issue have concluded that the SCA is applicable to social media
sites and that the SCA prohibits social media sites “from disclosing nonpublic contents
without the user’s consent.” Steven S. Gensler, Special Rules for Social Media
Discovery?, 65 Ark. L. Rev. 7, 26–28 (2012); see also Matter of Application of State for
Commc’ns Data Warrants To Obtain the Contents of Stored Commc’ns From Twitter,
Inc., From Users @ _ & @ _, ESS-147-CDW-16 & ESS-148-CDW-16., No. A-3651-
15T4, 2017 WL 476218, at *7 (N.J. Super. Ct. App. Div. Feb. 2, 2017) (observing that
“courts have uniformly concluded that communications sent to social media platforms or
even private websites are clearly ‘electronic communications’ under the” SCA). The
nuances of that application, however, have varied based upon the facts and circumstances
of each individual case. For example, in Crispin v. Christian Audigier, Inc., the court
concluded that the SCA applied to Facebook but that Facebook was an ECS as to some
electronic communications on Facebook and an RCS as to others. See Crispin v.
Christian Audigier, Inc., 717 F. Supp. 2d 965, 980-82 (C.D. Cal. 2010). In Ehling v.
Monmouth-Ocean Hosp. Serv. Corp., the court concluded that “Facebook wall posts that
are configured to be private meet all four criteria” to qualify as electronic
communications held by an ECS. Ehling v. Monmouth-Ocean Hosp. Serv. Corp., 961 F.
Supp. 2d 659, 667 (D.N.J. 2013). Other courts have concluded without detailed analysis
that the SCA applies to social media websites and that those sites may not produce
information except as provided by the SCA. See, e.g., People v. Harris, 945 N.Y.S.2d
505, 511 (Crim. Ct. 2012) (“If you look at the purpose and method of Twitter, it is clear
to this court that Twitter is a service provider of electronic communication.”).

              We agree with those courts that have concluded that the SCA is applicable
to communications shared on social media websites. Thus, the defendants could only
obtain the witnesses’ communications from the social media providers if they satisfied
the terms of the SCA. Analyzing the defendants’ requests using the pyramidal structure
outlined above, we easily conclude that the defendants cannot obtain the contents of the
witnesses’ social media accounts from the social media providers via a Rule 17 subpoena
because the SCA requires a warrant to obtain those communications. Microsoft, 829 F.3d
at 207-08 (“For electronic communications stored recently (that is, for less than 180 days)
by an ECS, the government must obtain a warrant. For older electronic communications
and those held by an RCS, a warrant is also required, unless the Government is willing to
provide notice to the subscriber or customer.” (citations omitted)); see also Ryan A.
Ward, Discovering Facebook: Social Network Subpoenas and the Stored
Communications Act, 24 Harv. J.L. & Tech. 563, 568 (2011) (“[T]he government cannot
obtain content information from public ECS or RCS providers without a search
warrant.”).

             To obtain any information other than “[b]asic subscriber and transactional
information,” which “can be obtained simply with an administrative subpoena,”
                                           -42-
Microsoft, 829 F.3d at 207, the defendants had to show that (1) a defendant in a criminal
case qualifies as a “governmental entity” under the terms of the SCA and (2) that the
subpoena and order issued in this case satisfies the requirements of Code section 2703(d).
Marc J. Zwillinger, Christian S. Genetski, Criminal Discovery of Internet
Communications Under the Stored Communications Act: It’s Not A Level Playing Field,
97 J. Crim. L. & Criminology 569, 587–88 (2007) (stating that “the court order exception
contained in 18 U.S.C. § 2703(d) pertains only to the government and comes into play
only when a governmental entity ‘offers specific and articulable facts showing that there
are reasonable grounds to believe that the contents of a wire or electronic communication
. . . are relevant and material to an ongoing criminal investigation.’ By definition, no
criminal defendant or party to civil litigation could make this showing.”). At least one
court has concluded that “[t]he SCA provides no direct mechanism for access by a
criminal defendant to private communication content.” Facebook, Inc. v. Superior Court,
192 Cal. Rptr. 3d 443, 450, review granted and opinion superseded sub nom. Facebook v.
S.C., 362 P.3d 430 (Cal. 2015). Another court has concluded that “the Office of the
Federal Public Defender is not a ‘government entity’ within the meaning of § 2703.”
United States v. Amawi, 552 F. Supp. 2d 679, 680 (N.D. Ohio 2008). Observing that the
SCA defines that term “as ‘a department or agency of the United States or any State or
political subdivision thereof,’” the Amawi court concluded that “[t]he judiciary is not a
department or agency of the United States; thus, the judiciary and its components,
including the Federal Public Defender, cannot obtain a court order under § 2703(d).” Id.;
see also Zwillinger, supra, 594 (“The purpose and plain text of the SCA make clear that
the exceptions for governmental entities apply only to Fourth Amendment government
actors--investigative agencies and prosecuting attorneys-- and not to criminal defendants,
irrespective of whether they happen to be represented by a publicly funded criminal
defender’s office.”). The Amawi court also observed that the SCA “distinguishes
between courts, which issue orders, and government entities, which can apply for orders.”
Id. We find this reasoning sound. Consequently, we would have held, had the issue been
justiciable, that the defendants could not obtain any information directly from the social
media providers under the terms of the SCA because they do not meet the definition of
“governmental entity.” See 18 U.S.C. § 2711(4) (“‘[G]overnmental entity’ means a
department or agency of the United States or any State or political subdivision thereof.”);
id. at § 2703(d) (stating that a court of competent jurisdiction may issue an order upon an
application by a governmental entity); see also Zwillinger, supra, at 584 (“None of the[]
exceptions [in the SCA] provide a basis for a disclosure in response to a subpoena served
by a criminal defendant, nor a court order secured at the defendant’s request.”).17

                                               2. Witnesses

17
  We caution that our review of the SCA in this part is limited to the issue that has thus far arisen in the
present case. We do not mean to suggest that the SCA passes constitutional scrutiny in all respects.
                                                    -43-
              Although the defendants cannot obtain the witnesses’ electronic
communications directly from the social media providers, nothing prevents them from
obtaining the information as outlined above directly from the witnesses themselves. See
John G. Browning, Digging for the Digital Dirt: Discovery and Use of Evidence from
Social Media Sites, 14 SMU Sci. & Tech. L. Rev. 465, 473 (2011) (“The most effective
methods of obtaining discovery of the contents of a party’s social networking profile are
propounding specific, well-tailored discovery requests to the party himself . . . .”). By its
terms, the SCA places limitations only on the service providers and not on the users of
social media websites. See 18 U.S.C. § 2702(a); § 2703(a). The vast majority of cases
make it clear that the type of electronic communications sought in this case fall clearly
within the ambit of civil discovery when obtained from the account holder or user, and
we see no reason that the same information should not also be available to criminal
defendants via a Rule 17 subpoena, provided that they are able to make the showing
required by Nixon.

              Although courts have indicated that privacy considerations may be
implicated when dealing with electronic communications, see, e.g., United States v.
Warshak, 631 F.3d 266, 283-88 (6th Circ. 2010), a privacy claim cannot place those
communications totally beyond the reach of a criminal defendant who has shown that the
communications are likely to contain relevant, material evidence. To hold otherwise
would be to apply a sort of privilege to electronic communications that does not exist for
other forms of communication, a privilege that would serve only “to withhold evidence
that is demonstrably relevant in a criminal trial” and “cut deeply into the guarantee of due
process of law and gravely impair the basic function of the courts.” Nixon, 418 U.S. at
712. “Certain exemptions from” providing evidence “are recognized by all courts,”
“[b]ut every such exemption is grounded in a substantial individual interest which has
been found, through centuries of experience, to outweigh the public interest in the search
for truth.” Bryan, 339 U.S. at 332. As the Supreme Court observed,

              We have elected to employ an adversary system of criminal
              justice in which the parties contest all issues before a court of
              law. The need to develop all relevant facts in the adversary
              system is both fundamental and comprehensive. The ends of
              criminal justice would be defeated if judgments were to be
              founded on a partial or speculative presentation of the facts.
              The very integrity of the judicial system and public
              confidence in the system depend on full disclosure of all the
              facts, within the framework of the rules of evidence. To
              ensure that justice is done, it is imperative to the function of
              courts that compulsory process be available for the
                                            -44-
                production of evidence needed either by the prosecution or by
                the defense.

Nixon, 418 U.S. at 709. Privileges erected by the Court to place evidence beyond the
reach of compulsory process “are designed to protect weighty and legitimate competing
interests. . . . Whatever their origins, these exceptions to the demand for every man’s
evidence are not lightly created nor expansively construed, for they are in derogation of
the search for truth.” Id. at 709-10. Even where a privilege exists, such as in the case of
the presidential communications at issue in Nixon, “[t]he generalized assertion of
privilege must yield to the demonstrated, specific need for evidence in a pending criminal
trial.” Id. at 713.

              The defendants have satisfied the Nixon requirements with regard to those
electronic communications falling within the relevant time frames outlined above. No
evidence suggests that the witnesses enjoy a blanket privilege with regard to their
electronic communications.18

               Moreover, we disagree with the trial court’s finding that the subpoenas
issued to the witnesses were oppressive. First, the evidence relied on by the court to
support this finding, the letter from Ms. Boland’s mother, does not indicate anything
more than a minor difficulty in obtaining the requested information experienced by one
of the witnesses. Ms. Boland’s mother complained to the assistant district attorney via
email that Ms. Boland and her parents had had to spend several hours during a weekend
visit attempting to comply with the subpoena. We hardly think this too onerous a burden
when juxtaposed with the defendants’ constitutional trial rights. When put in perspective,
the expense of a few hours’ time and a few dollars are less than “oppressive.” Courts
have recognized that complying with that “fundamental maxim that the public . . . has a
right to every man’s evidence,” Bryan, 339 U.S. at 332, will necessarily involve
“personal sacrifice” but that the sacrifice “is a part of the necessary contribution of the
individual to the welfare of the public,” even when “onerous,” Blair, 250 U.S. at 281.

                                              Conclusion

              We hold that the State lacks standing to challenge the subpoenas issued to
C.C., Ms. Lawn, Ms. Boland, and Ms. Tavares. The State also lacks standing to
challenge the subpoenas issued to any of the service providers in this case. Accordingly,
we affirm in part and reverse in part the trial court’s November 3 order.

        18
          We note that although Federal Rule of Criminal Procedure 17 places additional requirements
on requests for “the production of personal or confidential information about a victim,” see generally Fed.
R. Crim. P. 17(c), Tennessee Rule of Criminal Procedure 17 does not contain similar requirements.
                                                   -45-
        _________________________________
       JAMES CURWOOD WITT, JR., JUDGE




-46-
