A client walks in with printouts of their spouse’s affair — texts, emails, location data, even private Instagram messages. They found everything by logging into the spouse’s accounts while the spouse was asleep, using a password they’d watched the spouse type a hundred times.
Now what?
The evidence may be explosive. It may be accurate. And depending on how it was obtained, it may also expose your client to criminal liability under the Stored Communications Act, civil claims for invasion of privacy, and exclusion of the very evidence they went to such lengths to collect.
California divorce proceedings have some of the most complex digital evidence issues in American family law, and they’re getting more complex every year. Shared Apple IDs, joint Amazon accounts, family location sharing, and home security cameras create genuine gray areas about who has access to what — and whether access for personal purposes translates into authorization for forensic investigation.
Community Property and Digital Assets
California is a community property state. Under California Family Code § 760, property acquired during marriage is presumed to be community property. That presumption extends to digital assets, although California courts have only recently begun working through exactly what it means in practice.
Community property digital assets can include:
- Joint financial accounts and the digital records of transactions
- Email accounts used for household management
- Cloud storage accounts containing family photos and documents
- Social media accounts that function as joint family accounts
- Business accounts for jointly owned businesses
- Digital files on shared household devices
- Cryptocurrency wallets funded with community property
Separate property digital assets:
- Accounts created before marriage with premarital content (though post-marriage content on the same account may become community property)
- Accounts used exclusively by one spouse for clearly separate-property activities
- Inherited digital assets
- Personal accounts not commingled with community resources
The community property characterization matters for discovery purposes. One spouse generally has a right to discovery of the community estate’s records, which may support compelling access to shared accounts through proper legal process. But “I have a community property interest in this account” is not the same as “I have authorization to access my spouse’s personal account” for SCA purposes.
The Consent Problem with Shared Accounts
The most common misunderstanding in divorce digital forensics is that sharing a household means sharing authorization to access any device or account in the household.
It doesn’t.
Joint accounts with shared credentials: If both spouses created an account together, use it together, and both know the credentials, access by either spouse is probably authorized. A jointly owned Amazon account, a family Netflix account, a shared Google Photos library — these are genuinely joint, and either party’s access to them is unlikely to raise SCA issues.
One spouse’s account on a shared device: A more common situation is that one spouse uses their personal Gmail on the family iPad. The other spouse knows the device passcode. The device is community property. But the Gmail account is not — it’s in one spouse’s name, tied to their personal identity, and was created for their individual use. Accessing it without the account holder’s explicit consent is problematic regardless of who owns the device.
The “they gave me the password once” issue: Spouses often share passwords for practical reasons — “here’s my password in case you need to log in and check something while I’m traveling.” Courts have generally not treated this as ongoing authorization for unlimited access. The authorization was for a specific purpose, and access beyond that purpose may exceed the scope of the original consent.
The practical advice: when in doubt, get proper legal process. A subpoena to the account provider, or a family court order requiring disclosure, is far safer than self-help access.
Device Access: Community Property vs. Authorization
This distinction is crucial and frequently confused.
A device can be community property — purchased during the marriage with community funds — while the data on it remains subject to access restrictions based on who created and controls that data.
If your client owns a Samsung Galaxy they purchased with marital funds, it’s community property and your client may have property rights to the device itself. That doesn’t mean your client can access their spouse’s personal accounts, personal messages, or personal data on that device without the spouse’s consent.
Conversely, if one spouse has their own separate property device — bought before marriage or with separate funds — but uses it to access joint accounts or communicate about community property matters, the device may not be community property, but the relevant communications on it may be discoverable through proper process.
California Penal Code § 502 prohibits unauthorized computer access regardless of property ownership. The community property character of a device doesn’t create an exemption. See our detailed piece on [California Penal Code 502 and what forensic examiners need to know](/california-penal-code-502-examiners/) for more on this.
Social Media Evidence in California Divorce Cases
Social media is a rich source of divorce evidence and a constant source of evidentiary problems.
What social media can prove:
- Asset concealment (photos of purchased items, travel, lifestyle inconsistent with claimed income)
- Business activities relevant to income calculation for support purposes
- Parenting fitness issues (posts showing substance use, inappropriate behavior, or relevant lifestyle choices)
- Relationship status and cohabitation (relevant to support modification)
- Undisclosed income streams (paid partnerships, sponsored posts, freelance work promoted online)
Authentication challenges: Social media evidence faces all the authentication challenges discussed in our article on [authenticating text messages under FRE 901](/authenticating-text-messages-fre-901/), plus some platform-specific ones. Profiles can be deleted. Posts can be made private. Screenshots without metadata don’t prove the account belongs to the person you say it does.
Proper collection methods: Screenshot evidence from social media is weakest. Better options include:
- Platform-specific legal process (Instagram, Facebook, and Twitter all have processes for legal requests)
- Third-party social media preservation tools that capture not just the visible content but underlying HTML metadata
- Forensic extraction from the opposing party’s own device, if ordered by the court
Public vs. private content: Courts have generally held that publicly available social media posts are discoverable without court order — they’re not protected by the SCA because they’re not stored communications in any meaningful sense of “stored.” Private messages and content visible only to specific followers are a different matter and require either consent or proper legal process.
Forensic Examination in California Divorce Cases
Forensic examination of devices in divorce proceedings raises specific questions about scope, custody, and authorization that differ from civil or criminal contexts.
Court-ordered examinations: The cleanest path to forensic examination in family court is a court order. Either party can seek a court order allowing forensic examination of devices, and family courts in California have broad discretionary authority to order such examinations when relevant to property characterization, support, or custody issues.
A court-ordered examination should specify: which devices, examined by whom (typically a neutral or jointly selected examiner), for what categories of information, with what privacy protections for non-relevant personal data, and how results are to be shared.
Neutral examiner protocols: Many California family courts prefer or require the use of a neutral forensic examiner — someone not engaged by either side — to protect against bias claims and handle the privacy concerns that arise when one spouse’s personal data is examined. If you’re a forensic examiner appointed as a neutral, document your neutrality, your fee arrangement, and the scope of your engagement carefully.
Custody matters: When digital evidence relates to custody — parenting fitness, communication between co-parents, child’s device activity — courts may order in camera review of sensitive materials before deciding what enters the record. Be prepared for the examining judge to review materials that may not ultimately be admitted.
Location Data and Tracking
Location tracking is a specific category of digital evidence with its own legal issues in divorce proceedings.
Shared family location services: If both spouses agreed to share location through Apple’s Find My, Google’s family sharing, or a parental control app, that data is accessible to both parties without privacy concerns. It was voluntarily shared and both parties know about it.
Installed tracking software: Installing tracking software on a spouse’s device without their knowledge is not legal in California. California Penal Code § 637.7 prohibits installing an electronic tracking device on another person’s vehicle or property to track their movements without consent. GPS stalkerware installed on a phone is covered. Evidence obtained this way will face serious admissibility challenges and may expose the installing spouse to criminal liability.
Carrier location records: Carriers maintain location data associated with phone usage. This data is obtainable through legal process — subpoena or court order. The process takes time but produces clean, authenticated records that are far more reliable in court than evidence from covertly installed tracking software.
Email Forensics in Divorce
Email is frequently the most valuable source of digital evidence in divorce proceedings, and also one of the most legally sensitive to collect.
What to look for: Emails to financial advisors and accountants (asset concealment), emails to attorneys (may be privileged but the existence of the communication may be discoverable), business emails showing unreported income, personal emails evidencing relevant facts.
Work email complications: If a spouse uses a work email account — provided by their employer — that employer controls the account, not the spouse. The employer may cooperate with a subpoena. The employer may assert privilege over business communications. And the employer may have its own retention policies that have already deleted relevant messages.
iCloud email and Apple ecosystem: In highly integrated Apple households, iCloud email, iMessages synced to multiple devices, and shared Family Sharing features create a complex web of what each spouse can access. Forensic examination of any Apple device in the household may surface data that synced from the other spouse’s device — not because of unauthorized access, but because of how iCloud sync works.
Practical Recommendations for Family Law Attorneys
Get a forensic expert involved early. Devices get wiped, traded in, or lost. Data gets deleted. The sooner a forensic examiner images relevant devices, the better the evidentiary record.
Don’t let your client do self-help forensics. The client who logs into their spouse’s accounts, copies their files, and hands them to you has potentially created SCA liability, state law claims, and evidence admissibility problems. Instruct clients clearly: preserve your own devices and accounts, don’t access your spouse’s accounts, let the legal process handle it.
Issue a preservation letter immediately. The moment you anticipate litigation, send a preservation letter covering devices and accounts. Include specific platforms — especially cloud storage and social media — and specifically instruct the opposing party to disable auto-delete features.
Use court process for the hard stuff. Device inspection orders, subpoenas to cloud providers, third-party discovery — these processes exist for good reason. They create clean evidentiary records and protect both parties.
FAQ
My client has their spouse’s password. Can they access the spouse’s email to look for hidden assets?
No. Knowing a password doesn’t mean you’re authorized to access the account for any purpose. Using that password to access an account without consent likely violates the Stored Communications Act (18 U.S.C. § 2701) and potentially California Penal Code § 502. The right approach is a subpoena to the provider or a family court discovery order. The evidence you obtain through that process is clean. Evidence obtained through unauthorized access may be excluded and may expose your client to counterclaims.
Is a spouse’s social media profile discoverable in a California divorce?
Yes, to a substantial extent. Public posts are discoverable without court order. Private posts and messages may be obtained through subpoena to the platform, with the scope limited to what’s relevant to issues in the proceeding. California courts have ordered production of private social media content in divorce cases where it’s relevant to financial disclosure or custody matters, though courts also apply proportionality principles to limit fishing expeditions.
Can we demand that our spouse produce their phone for forensic examination?
You can request it through discovery, and if the opposing party refuses, you can seek a court order compelling production for forensic examination. Courts weigh the relevance and proportionality of the examination against privacy concerns. They often order examinations with specific scope limitations and a neutral examiner protocol to address privacy concerns about non-relevant personal data. The stronger your showing of relevance and the more specific your scope request, the more likely the court will grant the order.
Does community property ownership of a device give me the right to forensically examine it?
Partial ownership of community property doesn’t automatically give you authorization to conduct a forensic examination. You have property rights; your spouse also has privacy interests. Courts in California have generally required court authorization for forensic examination of devices even when the device is community property. The community property character of the device may strengthen your argument for why the court should order examination — but it’s not a substitute for the court order.
What if my spouse wiped their phone after I filed for divorce?
Document everything you can about what the device was like before the wipe — prior iCloud backups, any cloud-synced content, carrier records, communications that reference content that should have been on the device. Retain a forensic expert to attempt recovery from the device even after a wipe, as data is often recoverable. Then file a spoliation motion under California discovery rules, which allow sanctions for destruction of evidence. If you can show the wipe occurred after the duty to preserve attached, you may be entitled to adverse inference or other sanctions.