JULIE S. SNEED, Magistrate Judge.
THIS MATTER is before the Court on Defendant's Motion for a Determination That Certain E-Mail Communications Are Not Privileged or Otherwise Protected from Discovery ("Motion"). (Dkt. 94.) Defendant seeks a determination that certain e-mails exchanged between Plaintiff and his attorneys and thereafter forwarded by Plaintiff to his work e-mail account are not protected from discovery by the attorney-client privilege. The Court held a hearing on this matter on June 30, 2016. For the reasons that follow, Defendant's Motion is granted.
On January 29, 2016, Defendant served a subpoena on Plaintiff's employer, Holladay Properties Services Midwest, Inc. ("Holladay"), seeking documents related to the allegations in this lawsuit. In response, Holladay produced the responsive documents, which included e-mails and attachments between Plaintiff and his attorneys that Plaintiff forwarded from his personal e-mail account to his work e-mail account at Holladay. (Dkt. 96 at 2.) Upon receiving Holladay's production, Defendant notified Plaintiff of its receipt of the e-mails, and Plaintiff asserted a claim of privilege as to the e-mails. (Dkt. 94.) Defendant now seeks a determination that the e-mails from Plaintiff's work e-mail account are not confidential and thus not privileged or otherwise protected from discovery.
When the court's jurisdiction is premised on a federal question in a civil case, federal law of privilege applies. Hancock v. Hobbs, 967 F.2d 462, 467 (11th Cir. 1992); see Fed. R. Evid. 501 (providing that federal common law governs a claim of privilege unless the United States Constitution, federal statute, or rules prescribed by the Supreme Court provide otherwise). This lawsuit was brought in federal court based on federal question jurisdiction as an action under the False Claims Act, 31 U.S.C. §§ 3729-3733. (Dkt. 32.) Therefore, federal common law applies in analyzing the attorney-client privilege. The attorney-client privilege protects the disclosures that a client makes to his attorney, in confidence, for the purpose of securing legal advice or assistance. Cox v. Adm'r U.S. Steel & Carnegie, 17 F.3d 1386, 1414 (11th Cir. 1994).
To determine if a particular communication is confidential and protected by the attorney-client privilege, the privilege holder must prove that the communication was intended to remain confidential and, under the circumstances, was reasonably expected and understood to be confidential. Bogle v. McClure, 332 F.3d 1347, 1358 (11th Cir. 2003); see also United States v. Schaltenbrand, 930 F.2d 1554, 1562 (11th Cir. 1991) ("The party invoking the attorney-client privilege has the burden of proving that an attorney-client relationship existed and that the particular communications were confidential."). Thus, the relevant inquiry is not whether the individual expected his or her communications to remain confidential but rather whether that expectation was reasonable. United States v. Bell, 776 F.2d 965, 971 (11th Cir. 1985).
In this case, the e-mails at issue represent communications between Plaintiff and his attorneys that were exchanged on Plaintiff's personal e-mail account.
Based on the written submissions of the parties and the arguments advanced at the hearing, the parties agree that the e-mails consist of communications between Plaintiff and his attorneys regarding this lawsuit. The parties dispute only whether the e-mails in question are protected by the attorney-client privilege when they were accessed by Plaintiff on his work e-mail account on Holladay's "communications system," which is described in Holladay's policy as "including e-mail and voice mail systems and Intranet/Internet connections." (Dkt. 94-1.) As such, the Court must determine the confidential nature of the e-mails transmitted over Holladay's communications systems.
Courts addressing this issue have focused primarily on whether the employer maintains a policy regarding the use of its computer or e-mail systems. Specifically, courts consider the specificity of the policy and the extent to which the policy diminishes an employee's reasonable expectation of privacy in communications transmitted over the employer's systems. However, because the overarching consideration in determining whether a communication is privileged is whether the individual had an objectively reasonable expectation that his or her communications were confidential, privilege determinations of this nature are extremely fact-specific and often depend on the particular policy language, if any, adopted by the employer.
Notably, courts have adopted a four-factor test to determine whether a reasonable expectation of privacy exists in the context of e-mail transmitted over and maintained on a company server. In re Asia Global Crossing, Ltd., 322 B.R. 247, 257 (Bankr. S.D.N.Y. 2005); see In re Reserve Fund Sec. & Derivative Litig., 275 F.R.D. 154, 159-60 (S.D.N.Y. 2011) (listing cases adopting the four-factor test); Leor Expl. & Prod. LLC v. Aguiar, No. 09-60136-CIV, 2009 WL 3097207, at *4 (S.D. Fla. Sept. 23, 2009) (applying the four-factor test). In determining this issue, courts have considered the following four factors: (1) whether the corporation maintains a policy banning personal or other objectionable use; (2) whether the company monitors the use of the employee's computer or e-mail; (3) whether third parties have a right of access to the computer or e-mails; and (4) whether the corporation notifies the employee, or whether the employee was aware, of the use and monitoring policies. See Asia Global, 322 B.R. at 257. The four-factor test provides persuasive guidance in evaluating whether an individual's expectation of confidentiality is reasonable in light of the existence of other factors that tend to cast doubt on the reasonableness of that expectation, namely the scope of an employer's policy. See id. at 258 ("[T]he question of privilege comes down to whether the intent to communicate in confidence was objectively reasonable.").
The determination of whether a communication is confidential is somewhat similar to the search-and-seizure determination under the Fourth Amendment. See id. at 256 (comparing the Fourth Amendment analysis to the attorney-client privilege analysis); see also cases cited infra note 2. Under the Fourth Amendment analysis, the court considers whether an individual's expectation of privacy is objectively reasonable. See O'Connor v. Ortega, 480 U.S. 709, 715 (1987) (providing that an individual's Fourth Amendment rights are implicated only if the conduct at issue infringes an expectation of privacy "that society is prepared to accept as reasonable"). Similarly, under the attorney-client privilege analysis, the court must consider whether a communication was reasonably expected and understood to be confidential. Bell, 776 F.2d at 971. As such, courts addressing the issue of attorney-client privilege refer to Fourth Amendment cases addressing an individual's reasonable expectation of privacy in the context of electronic communications, as the analysis under both standards requires consideration of whether one's expectation of privacy was objectively reasonable.
In applying the four factors discussed above, courts diverge on the issue of whether there must be evidence of actual monitoring or whether a policy reserving the right to monitor employee communications is sufficient to meet the second factor. For example, some courts weigh the act of enforcement more heavily than the existence of a limiting policy. As such, these courts have required some evidence that the employer in fact monitored the employee's communications. E.g., Flatworld Interactives v. Apple Inc., No. C1201956JSWEDL, 2013 WL 11319071, at *1 (N.D. Cal. Dec. 24, 2013); In re High-Tech Employee Antitrust Litig., No. 11-CV-2509-LHK-PSG, 2013 WL 772668, at *7 (N.D. Cal. Feb. 28, 2013); United States v. Hatfield, No. 06-CR-0550 (JS), 2009 WL 3806300, at *9 (E.D.N.Y. Nov. 13, 2009); Brown-Criscuolo v. Wolfe, 601 F.Supp.2d 441, 450 (D. Conn. 2009).
Other courts, however, have been satisfied with the finding that the employer's policy provided a right to access and monitor the employee's use, regardless of whether the policy was consistently enforced. These courts have found it sufficient that the employer's policy reserved the right—or permitted the employer—to monitor the employee's communications, without requiring evidence or a showing of actual monitoring. E.g., L-3 Commc'ns Corp. v. Jaxon Eng'g & Maint., Inc., No. 10-CV-02868-MSK-KMT, 2014 WL 183303, at *6 (D. Colo. Jan. 12, 2014); United States v. Finazzo, No. 10-CR-457 RRM RML, 2013 WL 619572, at *9 (E.D.N.Y. Feb. 19, 2013); Chechele v. Ward, No. CIV-10-1286-M, 2012 WL 4481439, at *2 (W.D. Okla. Sept. 28, 2012); Dombrowski v. Governor Mifflin Sch. Dist., No. CIV.A. 11-1278, 2012 WL 2501017, at *6 (E.D. Pa. June 29, 2012); Aventa Learning, Inc. v. K12, Inc., 830 F.Supp.2d 1083, 1109 (W.D. Wash. 2011); Hanson v. First Nat'l Bank, No. 5:10-0906, 2011 WL 5201430, at *6 (S.D. W. Va. Oct. 31, 2011); In re Reserve Fund, 275 F.R.D. at 164; In re Oil Spill by the Oil Rig "Deepwater Horizon" in the Gulf of Mexico, on Apr. 20, 2010, No. MDL 2179, 2011 WL 1193030, at *3 (E.D. La. Mar. 28, 2011); Alamar Ranch, LLC v. Cty. of Boise, No. CV-09-004-S-BLW, 2009 WL 3669741, at *4 (D. Idaho Nov. 2, 2009); Leor Expl., 2009 WL 3097207, at *4; Smith v. United Salt Corp., No. 1:08CV00053, 2009 WL 2929343, at *9 (W.D. Va. Sept. 9, 2009); United States v. Etkin, No. 07-CR-913(KMK), 2008 WL 482281, at *4 (S.D.N.Y. Feb. 20, 2008); Sims v. Lakeside Sch., No. C06-1412RSM, 2007 WL 2745367, at *1 (W.D. Wash. Sept. 20, 2007); Long v. Marubeni Am. Corp., No. 05CIV.639 (GEL)(KNF), 2006 WL 2998671, at *3 (S.D.N.Y. Oct. 19, 2006); Kaufman v. SunGard Inv. Sys., No. 05-CV-1236 (JLL), 2006 WL 1307882, at *4 (D. N.J. May 10, 2006); see also United States v. Hamilton, 778 F.Supp.2d 651, 655 (E.D. Va. 2011) (focusing on an employer's policy reserving the right to inspect and monitor employee accounts).
Upon review of the applicable caselaw, it appears that the majority of courts have found that an employee has no reasonable expectation of privacy in workplace e-mails when the employer's policy limits personal use or otherwise restricts employees' use of its system and notifies employees of its policy.
Under Holladay's Personnel Handbook, employees have access to the company's communications systems, including the e-mail system, to conduct "legitimate company business." (Dkt. 94-1.) Holladay's policy also allows "de minimus (very limited) personal use," but it provides that Holladay's communications systems may not be used for the operation of personal business or for personal gain. (Dkt. 94-2.) The policy further provides that the "communications systems, including all correspondence, is company property." (Dkt. 94-1.) Specifically, the policy states that "all communications composed, sent, received, or stored on Holladay's communications system are, and remain, the property of Holladay" and "are not the private property of any employee, even if the employee has used his or her own personal computer, tablet, cell phone or other personal device." (Dkt. 94-2.)
In regard to the monitoring of electronic communications, Holladay's policy provides that Holladay "reserves and intends to exercise the right to monitor, review, audit, intercept, access and disclose all electronic and telephone communications created, received or sent over the company's communication system for any purpose." (Dkt. 94-1.) The policy explicitly warns that it "creates no expectation of privacy concerning such messages" and that the "confidentiality of any message should not be assumed," regardless of password protection. (Dkt. 94-1, 94-2.) Indeed, the policy notes that "the use of passwords for security does not guarantee confidentiality," and "[a]ll e-mail and voicemail passwords for access to information on Holladay's communications system must be disclosed to Holladay." (Dkt. 94-2.)
Upon consideration of the applicable facts and caselaw, the Court finds that the factors weigh in favor of a finding that Plaintiff did not have a reasonable expectation of confidentiality in his workplace e-mails. First, it is clear that Holladay maintained a policy that allowed employees to have "very limited personal use" of Holladay's communications systems and explicitly banned certain personal use. Second, Holladay reserved the right to monitor employees' computer and e-mail. Third, Holladay reserved the right to access, read, and disclose any electronic communication sent or received over its communications systems. And fourth, Holladay made its employees, including Plaintiff, aware of its policy. Indeed, Plaintiff admits awareness of the policy, and Plaintiff certified his acknowledgment of and compliance with the policy. (Dkt. 94-3.) This sufficiently establishes his awareness of the policy, including the provision requiring that all e-mail passwords be disclosed to Holladay.
With regard to Holladay's practice of monitoring employee e-mails, neither party specified whether Holladay regularly monitored its employee's e-mails or electronically stored information. According to Plaintiff, he was "not aware that anyone at Holladay ever actually accessed [his] Holladay account emails, other than for IT Department operational support and/or maintenance," and his understanding was that Holladay rarely monitored employee e-mails. (Dkt. 96, Ex. 1 ¶¶ 7-8.) Likewise, Plaintiff argues that although he was aware of Holladay's policy regarding the potential for monitoring and accessing employees' emails, "[t]he `operational reality' was that [he] was not aware of Holladay accessing or auditing employee e-mail accounts for purposes unrelated to Holladay's business needs." (Dkt. 96 at 9-10.) Plaintiff therefore admits that he was aware that Holladay did in fact monitor and access employee accounts but only for certain purposes. This distinction, however, is insufficient to establish that Plaintiff was unaware of Holladay's policy or that Holladay did not enforce its policy.
The explicit language in Holladay's policy further undermines Plaintiff's argument, as the policy expressly reserves the right to monitor, access, and disclose all electronic communications received or sent over Holladay's communications systems for any purpose. (Dkt. 94-1.) Under the circumstances, it is clear that Plaintiff was aware that Holladay could access and monitor employee e-mails and that Holladay did in fact access and monitor employee accounts for at least some purpose. See Goldstein v. Colborne Acquisition Co., LLC, 873 F.Supp.2d 932, 938 (N.D. Ill. 2012) (finding that the employees' "subjective belief that their communications were confidential was not a reasonable one in light of the company policy in place, and in light of their failure to assert that they were unaware of it").
It is well-settled that the party invoking the attorney-client privilege bears the burden of proving that the particular communications are confidential. See In re Grand Jury Proceedings in Matter of Freeman, 708 F.2d 1571, 1575 (11th Cir. 1983) (stating that the party invoking the privilege has the burden of establishing the confidential nature of the communication). In this case, Plaintiff has asserted that the e-mails are privileged, and therefore he bears the burden of proving the confidentiality of the communications. Plaintiff's subjective belief that Holladay rarely monitored employee e-mails, standing alone, is insufficient to meet his burden. See Alamar Ranch, 2009 WL 3669741, at *4 (rejecting the employee's assertion that she was not aware of any company monitoring and finding the assertion unreasonable).
In support of his assertion that his communications were confidential, Plaintiff refers to a provision in Holladay's policy that communications should be treated as confidential and accessed only by the intended recipient. (Dkt. 94-1.) This provision, however, only indicates that employees are to regard e-mail communications of other employees as confidential, specifying that "[e]mployees are not authorized to retrieve or read any communications that are not sent to them." (Dkt. 94-1.) It does not qualify or restrict Holladay's reservation of the right to access and monitor e-mail communications. See Hanson, 2011 WL 5201430, at *6 (analyzing a similar provision and finding that it applied to the receipt of communications by other employees, not the employer).
Plaintiff's argument relies primarily on his subjective belief that e-mails he accessed on his workplace account were confidential. However, as noted above, the question is not whether he thought or believed his communications were confidential but rather whether his expectation was reasonable under the circumstances. See Pensacola Firefighters' Relief Pension Fund Bd. of Trustees v. Merrill Lynch Pierce Fenner & Smith, Inc., No. 3:09CV53/MCR/MD, 2011 WL 3512180, at *8 (N.D. Fla. July 7, 2011) (emphasizing that the dispositive question is whether, under the circumstances, the individual reasonably believed that his or her communications were confidential despite the existence of a workplace policy and despite the individual's subjective belief that the communications were exchanged in confidence).
In light of the explicit provisions in Holladay's policy and Plaintiff's awareness of these provisions, the Court finds that Plaintiff did not have a reasonable expectation that the handful of e-mails he sent or received over Holladay's communications systems were confidential. Specifically, as noted above, the policy expressly limited personal use of Holladay's communications systems, banned the use of the system for the operation of personal business or personal gain, reserved the right to access and monitor employee use for any purpose, warned employees that they had no expectation of privacy in e-mails transmitted over the company system, and required that employees—including Plaintiff—certify compliance with its provisions by signing an acknowledgment form. Plaintiff was well aware of Holladay's policy, including the unequivocal notice that his communications were not to be regarded as confidential, and the risk that his e-mail account would be monitored and accessed. As such, Plaintiff has not met his burden of showing that his communications were reasonably expected and understood to be confidential. Accordingly, it is