Digital Evidence Discovery Requests: What to Ask For and How


Most discovery requests for digital evidence are too broad to be enforceable and too vague to be useful.

“All electronic communications” gets you a fight. A targeted request for specific device data from a defined time period gets you results.

Here’s how to approach digital evidence discovery in a way that actually surfaces what you need.


Start With a Forensic Consultation Before Drafting Requests
Each evidence source provides a different perspective on digital activity, strengthening forensic conclusions when correlated.

Start With a Forensic Consultation Before Drafting Requests

Before you write a single discovery request, talk to a forensic examiner.

An examiner can tell you:

  • What data is realistically recoverable from the device types at issue
  • Which data categories are most likely to contain the evidence you need
  • Whether the data may already be at risk (no backup, high device usage, approaching storage capacity)
  • What format the data should be produced in to be most useful
  • Ten minutes with an examiner before drafting can save weeks of fighting about production format and scope.


    Categories of Digital Evidence to Request

    Smartphone Data

    Request production of:

  • All SMS, iMessage, and third-party messaging app communications (specify apps: WhatsApp, Signal, Telegram, Facebook Messenger)
  • Call logs including direction, duration, and timestamp for all calls
  • Voicemail recordings and transcripts
  • Location data including GPS coordinates from photos, app location history, and significant locations database
  • Contact list with associated data
  • Photos and videos with EXIF metadata intact
  • App usage history (screen time logs)
  • Specify the time period and insist on forensically extracted data, not screenshots or self-collected exports.

    Cloud Account Data

    Request:

  • iCloud backup contents for the account associated with the device
  • Google Takeout data for Gmail, Drive, Location History, and Google Photos
  • Microsoft OneDrive and Outlook records
  • Social media data (Facebook, Instagram, TikTok) via their data download portals
  • Dating app data where relevant (Tinder, Bumble)
  • Any cloud-based messaging data
  • Subpoena directly to the cloud provider if the opposing party is unlikely to produce completely.

    Email

    Request:

  • Full email headers on all relevant messages (not just body text — headers show routing, originating IP, and authentication data)
  • Deleted email folder contents
  • Email metadata showing read receipts, forward history, and attachment access
  • Computer Data

    If computers are at issue:

  • Browser history and bookmarks
  • Downloaded files with metadata
  • Deleted file logs
  • Any relevant documents with version history and timestamps

  • How to Phrase Discovery Requests That Work
    Forensic analysis requires systematic documentation and cross-referencing of multiple artifact sources.

    How to Phrase Discovery Requests That Work

    Avoid:
    “Produce all electronic communications from any device.”

    This is overbroad, will draw objections, and doesn’t tell opposing counsel (or their IT department) what format to produce in.

    Use instead:
    “Produce all SMS, iMessage, WhatsApp, and Facebook Messenger communications from [Party’s] primary smartphone(s) between [start date] and [end date], produced as a forensic extraction in UFDR format or as a PDF export with timestamps and sender/recipient metadata intact, with hash values documented.”

    The more specific the request, the harder it is to claim they don’t know what you’re asking for.


    Requesting Forensic Examination of the Opposing Party’s Device

    When self-collection isn’t enough — and it usually isn’t for smartphones — you can request court-ordered forensic examination of the opposing party’s device.

    Your motion should include:

  • A declaration from your forensic expert explaining why self-collection is insufficient
  • Specific description of what data categories are sought and why they’re relevant
  • A proposed examination protocol (neutral examiner, defined scope, privilege review process)
  • Time and cost parameters
  • Courts routinely grant these motions in civil litigation when there’s good cause. The key is specificity — vague motions asking to “examine the phone” get denied; motions with a defined protocol and justification get granted.


    Handling ESI Protocols in Digital Forensics Cases

    If the case involves significant digital evidence, negotiate an ESI (Electronically Stored Information) protocol early.

    The protocol should address:

  • Who performs the forensic examination (neutral examiner or party-retained)
  • What devices and accounts are in scope
  • What time period applies
  • What format data must be produced in
  • How privilege review works before production
  • What happens with inadvertently produced privileged material
  • An agreed ESI protocol cuts motion practice significantly. Courts love them. Get a forensic examiner involved in drafting.


    Preservation Letters and Litigation Holds

    Before any formal discovery request, send a litigation hold letter demanding the opposing party preserve all potentially relevant digital evidence.

    Be specific: “You are directed to preserve all electronic communications, including but not limited to SMS, iMessage, WhatsApp, and email, stored on any personal or business device used to communicate with [party/topic], for the period [date range].”

    Then send one to any cloud providers who may have relevant data. Most providers have legal process portals for these requests.

    Document when the hold letter was sent and received. If evidence is destroyed after that date, you have a spoliation argument.


    FAQ

    Can I subpoena iMessage content directly from Apple?

    No. Apple’s iMessage uses end-to-end encryption. Apple cannot produce iMessage content because they don’t have it. You must obtain messages from the device itself or from an iCloud backup (which stores some iMessage data depending on backup settings).

    What if the opposing party claims they don’t have the phone anymore?

    “I lost it” or “I traded it in” after litigation was foreseeable is a spoliation issue, not a dead end. Subpoena the carrier for metadata. Request iCloud backup records from Apple. Get cell tower records. The conversation exists in multiple places.

    How long do courts give parties to produce forensic data?

    Standard discovery deadlines (30 days) are usually unrealistic for forensic productions. Courts regularly allow 60-90 days for device examinations. Build this into your scheduling order from the start.


    Work With a Forensic Examiner Who Handles Discovery

    Octo Digital Forensics consults with attorneys on discovery strategy and performs court-ordered device examinations in San Diego.

    We also draft examination protocols and prepare expert declarations in support of forensic discovery motions.

    Visit octodf.com or call 858-692-3306.


    See also: Community Property Digital Evidence | Divorce Digital Evidence | Spoliation Preservation Letters Digital Evidence

    Need Professional Digital Forensics?

    Octo Digital Forensics provides expert mobile forensics, data recovery, and digital investigation services for attorneys, insurance companies, and private investigators. Court-admissible reports. Certified examiners.

    Contact: octodf.com | info@derickdowns.com | (858) 692-3306