The call usually comes in week three of the divorce. Sometimes week eight. Almost never in week one.
By the time the attorney picks up the phone, the spouse who controls the family Google Workspace has changed the recovery email and disabled access for the other side. The shared iCloud account that held seven years of family photos and location history is now a single-user account. The Venmo history that would have shown the rental payments to the girlfriend’s apartment has been auto-deleted by a 30-day retention setting that nobody thought to suspend.
This is family court e-discovery in 2026. The evidence is overwhelmingly digital. The platforms that hold it are designed to delete it. And the rules of family court — written for a paper era — are still catching up.
This is a working examiner’s field guide to what’s discoverable, what’s defensible, and how to keep evidence from disappearing before the case starts.
Why Family Court E-Discovery Is Different From Civil Litigation
The federal civil rules — Federal Rules of Civil Procedure Rule 26 and 34 — were updated in 2015 to formally recognize Electronically Stored Information (ESI) and add proportionality as a discovery limit. State family courts adopted versions of these rules at different speeds and with different scopes.
In California, family law discovery operates under the Civil Discovery Act (Code of Civil Procedure §§2016.010 et seq.) as adapted by the Family Code. Specifically, Family Code §2030 governs discovery in marital dissolution, and Family Code §2107 establishes ongoing disclosure obligations. The disclosure obligations under §2100 et seq. are continuing — meaning the duty to preserve and produce financial information runs throughout the case, not just at the discovery phase.
Other major states handle this differently. New York family court relies on the CPLR (Civil Practice Law and Rules) for discovery, with family court applying it through Family Court Act §165. Texas operates under the Texas Family Code with Rule 192 of the Texas Rules of Civil Procedure governing scope. Florida uses Family Law Rule of Procedure 12.280, which incorporates much of the Florida Rules of Civil Procedure.
The common thread across jurisdictions: family courts have broader authority to order disclosure of financial information than federal civil courts have over comparable evidence in commercial litigation. A divorcing spouse generally cannot avoid producing bank statements, tax returns, or financial app data by claiming relevance objections that would succeed in commercial discovery.
The harder question is whether non-financial digital evidence — texts between a parent and a child, location history, social media DMs — gets the same broad treatment.
What’s Actually Discoverable
The categories below show up in nearly every family court forensic engagement. The relative importance varies by case type (divorce vs. custody vs. support), but the discovery scope rules are similar.
Text Messages and iMessages
The single most-requested category in modern family court work. iMessages are admissible when properly authenticated, and California courts have consistently held them so under Evidence Code §1400 (authentication) and §1410.5 (which addresses electronic communications specifically).
The technical reality: an iPhone’s Messages database (sms.db) contains not just the visible message content but timestamps with millisecond precision, delivery and read receipts, attachment metadata, edit history, and “unsend” records on iOS 16 and later. A forensic image of the phone preserves all of this. A screenshot, by contrast, is trivially fakeable and routinely challenged.
The procedural answer for opposing counsel is to demand a forensic image — not screenshots — when texts matter to the case.
Gmail dominates personal email in 2026. The relevant discovery questions are usually:
- Did one spouse have access to the other’s account during the marriage?
- Has access been revoked since separation, and if so, when?
- Are there auto-forwarding rules that send copies elsewhere?
- Has the account holder enabled “auto-delete” in the Activity Controls?
A standard Gmail account retains everything until the user deletes it. A Google Workspace account governed by a domain administrator can be subject to retention policies that delete email on a schedule. In family court matters where one spouse owned a small business and ran the family on a Workspace domain, the retention policy itself becomes a discovery issue.
Social Media DMs
Facebook Messenger, Instagram DMs, and Snapchat are the three platforms that drive the most family court forensic requests. Each has different retention and discovery characteristics:
Facebook Messenger preserves messages indefinitely on the server side unless the user deletes them. Meta will produce content with a properly served subpoena or court order, but the wait is typically six to twelve weeks.
Instagram DMs are stored on Meta’s servers similarly, but “vanish mode” messages are not retained on the server side — only on the recipient’s device for the duration of the session.
Snapchat is the hardest. The platform’s design intent is ephemerality. Snap retains “Memories” content (which the user has explicitly saved) but does not retain individual snaps or chats beyond a brief window after delivery. Subpoenas to Snap rarely produce content for this reason.
Financial Apps
Venmo, Cash App, Zelle, PayPal, and the major crypto exchanges all show up routinely. The discoverability questions are:
- Does the user’s account history go back far enough to cover the marriage?
- Are there transactions that were marked “private” (Venmo allows this and most users don’t)?
- Are there hidden accounts the requesting spouse doesn’t know exist?
Crypto adds wallet-level complexity that traditional family law attorneys often miss. A user who held Bitcoin in a custodial exchange (Coinbase, Kraken) leaves a discoverable trail. A user who moved holdings to a self-custody wallet leaves only a blockchain transaction record — and identifying which wallet belongs to which person requires forensic work, not a subpoena.
Cloud Storage
iCloud, Google Drive, Dropbox, and OneDrive contain backups, photos, location data, and documents. The crucial discovery question is timing: cloud accounts can be wiped or have data selectively deleted by the account holder at any time, and standard backup retention is short.
Apple’s iCloud backup is the most consequential for family court work. A current iCloud backup of an iPhone contains the entire Messages database, Photos library (including deleted-but-not-yet-purged items for 30 days), Notes, Voice Memos, and app data. Disabling iCloud backup is a defensive move that opposing parties take routinely once they know they’re being watched.
Location History
Google Maps Timeline (now called “Timeline” within the Google account) and Apple’s “Significant Locations” both record where a device has been. Both can be turned off, and increasingly users do so. But for cases involving infidelity, custody fitness, or domestic violence patterns, historical location data — when preserved — is one of the most powerful pieces of evidence available.
Apple’s Significant Locations are stored only on-device and in iCloud backups, not on Apple’s servers. A subpoena to Apple does not produce them. A forensic image of the phone or the iCloud backup does.
The Proportionality Pushback
The federal proportionality framework — added to FRCP Rule 26(b)(1) in 2015 — requires that discovery be “proportional to the needs of the case, considering the importance of the issues at stake, the amount in controversy, the parties’ relative access to relevant information, the parties’ resources, the importance of the discovery in resolving the issues, and whether the burden or expense of the proposed discovery outweighs its likely benefit.”
State family courts have begun importing this framework, often informally. A request for a full forensic image of a spouse’s phone in a low-asset, no-children divorce is increasingly likely to draw a proportionality objection. The court will weigh the cost of the imaging and analysis against the issues actually in dispute.
Cost-shifting is the related concept. When discovery is proportional but expensive, courts can order the requesting party to bear some or all of the cost. California Code of Civil Procedure §2031.060(c) explicitly authorizes cost-shifting for ESI discovery. The practical effect: a spouse who demands forensic imaging of every device the other side owns may end up paying for it.
A smart family law attorney structures discovery requests with proportionality in mind from the start: targeted requests for specific evidence types, with clear connection to disputed issues, beat shotgun requests for “all electronic records.”
The Single Biggest Mistake Attorneys Make
The biggest preventable problem in family court e-discovery is not a discovery rule. It’s account access.
In a typical marriage, one spouse manages the family’s digital infrastructure. They created the family Google Workspace, they’re the admin on the iCloud Family Sharing, they hold the Venmo password, they set up the kids’ Apple IDs. When the marriage ends, that spouse holds asymmetric access — and within hours of being served, can:
- Change the recovery email and phone on every shared account
- Revoke admin access for the other spouse
- Enable auto-delete settings retroactively
- Disable iCloud backup on devices they still control
- Factory-reset shared family iPads and Apple TVs
- Sign out the other spouse from family Apple ID services
Once any of this happens, the remediation path runs through subpoenas to the platform — which take weeks to months and may not produce historical data the platform has already purged.
The fix is the preservation letter, served on day one of the engagement. A preservation letter from counsel demands that the opposing party preserve all relevant ESI, suspend any auto-delete settings, and make no changes to shared accounts pending discovery. It does not prevent action — it creates the record that supports a spoliation finding if action happens anyway.
For the digital evidence side, the corresponding move is forensic imaging of any device the requesting spouse currently has lawful access to, before that access is revoked. A spouse who jointly owns a family iMac under California community property law can have it imaged today — and that image preserves everything regardless of what happens next week.
The threshold for “lawful access” is jurisdictional and fact-specific. Working with counsel on the authority chain is essential before any imaging happens. CFAA and state computer fraud statutes have been raised in family court contexts and the analysis is not always intuitive — California Penal Code §502 in particular has applications in domestic disputes that catch attorneys off guard.
A Field Workflow
For attorneys engaging a forensic examiner in a family court matter, the order of operations that consistently produces the best evidence record:
Week one:
- Issue preservation letter to opposing counsel
- Identify every device, account, and platform that may hold relevant evidence
- Establish the authority chain for imaging anything in the client’s lawful possession
- Image the client’s own devices first, before opposing party can argue the client altered evidence
Weeks two to four:
- File first wave of discovery requests targeted at specific platforms and date ranges
- Subpoena platforms for content the opposing party can’t produce (Meta, Google, Apple)
- Begin analysis of imaged devices
Discovery phase:
- Move to compel production of devices for imaging if necessary
- Push back on proportionality and cost-shifting objections with a clear case-specific necessity argument
- Document every authentication step for content that will be offered at trial
Pre-trial:
- Produce expert report compliant with state requirements (in California, see Code of Civil Procedure §2034 series for expert disclosure)
- Prepare for foundation testimony on each piece of digital evidence to be offered
The forensic examiner’s role at trial is usually narrow: authenticate the imaging methodology, explain what the data shows, and answer cross-examination on chain of custody. The substantive case is the attorney’s. The evidence record the examiner builds in the first 30 days determines what case the attorney has to make.
What Working Examiners See Changing
Three trends are reshaping family court e-discovery:
First, end-to-end encrypted messaging is shifting where evidence lives. Signal, WhatsApp, and increasingly default-encrypted iMessage conversations are not recoverable from server-side subpoenas. The evidence has to come from the device itself. This pushes more cases toward forensic imaging and away from third-party subpoenas.
Second, AI-generated content is showing up in custody disputes. Fabricated text screenshots, deepfake voice recordings, and altered images are becoming common enough that family court judges are starting to demand authentication of any digital evidence as a matter of course, not just when challenged.
Third, the proportionality framework is migrating from federal civil practice into state family courts. The next five years will see more case law specifically addressing what is and isn’t proportional discovery in divorce, custody, and support proceedings. Practitioners should expect more cost-shifting orders, more limits on shotgun subpoena practice, and more focus on whether the requesting party can articulate a specific evidentiary need.
The underlying truth doesn’t change. The evidence in a modern family court case lives in databases controlled by the person it incriminates. The procedural rules that govern its production are still catching up to that reality. The attorney who understands the technical landscape, engages a forensic examiner early, and structures discovery with proportionality in mind has structural advantages over the attorney who treats e-discovery as an afterthought.