State of Tennessee v. Alexander Johnson and Michael F. Williams , 538 S.W.3d 32 ( 2017 )


Menu:
  •                                                                                            04/12/2017
    IN THE COURT OF CRIMINAL APPEALS OF TENNESSEE
    AT KNOXVILLE
    December 20, 2016 Session
    STATE OF TENNESSEE v. ALEXANDER JOHNSON AND MICHAEL F.
    WILLIAMS
    Appeal from the Criminal Court for Knox County
    No. 104964A, B    Bob McGee, Judge
    No. E2015-02486-CCA-R9-CD
    In this interlocutory appeal, the defendants, Alexander Johnson and Michael F. Williams,
    challenge the ruling of the Knox County Criminal Court granting the State’s motion to
    quash subpoenas duces tecum issued to four State’s witnesses. The State challenges that
    portion of the court’s ruling denying its motion to quash subpoenas duces tecum issued to
    various electronic communications service providers. Because the State lacks standing to
    challenge any of the subpoenas issued in this case, we reverse that portion of the court’s
    ruling granting the State’s motion to quash the subpoenas issued to the witnesses. We
    affirm that portion of the trial court’s ruling that the State lacks standing to challenge the
    subpoenas issued to the service providers. In the interest of judicial economy and to
    facilitate further appellate review, we have examined the preempted issues related to the
    subpoenas duces tecum issued in this case and have concluded that: (1) although nothing
    prevents the defendants in this case, generally, from obtaining the type of electronic
    communications at issue via a subpoena issued under the terms of Tennessee Rule of
    Criminal Procedure 17 to the witnesses themselves, the defendants have failed to
    establish entitlement to all of the requested communications as discussed more fully
    below; and (2) under the terms of the Stored Communications Act, see 18 U.S.C. §§ 2701
    - 2703, the defendants cannot obtain the contents of the electronic communications from
    any of the service providers via a Rule 17 subpoena duces tecum. Accordingly, the trial
    court’s November 3, 2015 order relative to the subpoenas duces tecum issued in this case
    is affirmed in part and reversed in part. The case is remanded to the trial court for
    proceedings consistent with this opinion.
    Tenn. R. App. P. 3; Judgment of the Criminal Court Affirmed in Part; Reversed in
    Part; Remanded
    JAMES CURWOOD WITT, JR., J., delivered the opinion of the court, in which THOMAS T.
    WOODALL, P.J., and NORMA MCGEE OGLE, J., joined.
    Steven Ross Johnson and W. Thomas Dillard, Knoxville, Tennessee, for the appellant,
    Alexander Johnson.
    David Eldridge and Loretta G. Cravens, Knoxville, Tennessee, for the appellant, Michael
    F. Williams.
    Herbert H. Slatery III, Attorney General and Reporter; Nicholas W. Spangler, Assistant
    Attorney General; Charme P. Allen, District Attorney General; and Leslie Nassios and
    Kyle Hixson, Assistant District Attorneys General, for the appellee, State of Tennessee.
    OPINION
    On February 12, 2015, the Knox County Grand Jury charged both of the
    defendants with two counts each of the November 2014 aggravated rape of C.C.1 As is
    relevant to this appeal, the presentment lists as witnesses C.C., Bridget Boland, and
    cellular telephone service providers New Cingular Wireless/AT&T Wireless and
    Sprint/Nextel Communications. Witnesses Anna Lawn and Natalie Tavares were later
    added to the presentment by order. The case proceeded, and discovery materials were
    exchanged by the parties.
    On August 21, 2015, Mr. Johnson moved the trial court for an order to
    accompany subpoenas duces tecum for the production and pretrial inspection of
    “specified cellular telephone and social media communications and information.”2 He
    argued that the “requested communications are evidentiary and relevant,” that the
    communications were “not otherwise reasonably procurable in advance of trial by due
    dilligence,” that he could not prepare for trial in the absence of this information, and that
    the motion was “made in good faith” and was “not intended as any general ‘fishing
    expedition.’” In support of his motion, Mr. Johnson alleged that discovery materials
    already provided by the State “confirm[ed] the existence of social media information and
    communications material and relevant to the events at issue.” He stated that interviews
    with several of the State’s witnesses indicated that many of those witnesses, including
    C.C., had communicated with both of the defendants and with each other via text
    message, iMessage,3 and social media before and after the alleged offenses occurred.
    1
    We utilize initials in keeping with the policy of this court.
    2
    Mr. Williams later moved the court to adopt each of the relevant motions filed by Mr. Johnson.
    3
    “You can use the Messages app on your iPhone, iPad, or iPod touch to send messages. Those
    messages are sent as iMessage or SMS/MMS.” https://support.apple.com/en-us/HT207006 (last visited
    February 1, 2017). “iMessages are texts, photos, or videos that you send to iOS devices and Macs over
    Wi-Fi or cellular-data networks. These messages are always encrypted and appear in blue text bubbles.”
    
    Id. “If you
    aren’t using iMessage, you can use SMS/MMS. These messages are texts and photos that you
    -2-
    According to Mr. Johnson, Ms. Lawn indicated to the police that she “‘immediately’”
    began texting C.C.’s roommates after Ms. Lawn left Mr. Johnson’s bedroom, leaving
    C.C. in the company of both defendants. Mr. Johnson also alleged that interviews with
    the police indicated that the police “may have even instructed, advised, or at the very
    least insinuated to” C.C. and other State’s witnesses that they should remove social media
    information “from public view” and should refrain from communicating about the
    offenses via social media. Mr. Johnson indicated that he had learned from the State that
    the police had searched, but had not preserved, any social media communications. He
    also noted that the police had preserved all the data from Mr. Johnson’s cellular
    telephone but had preserved none from cellular telephones belonging to C.C. or any other
    State witness.
    At the August 24, 2015 hearing on the defendants’ motion, counsel for Mr.
    Johnson indicated that after learning that the Knoxville Police Department (“KPD”) had
    “sent preservation letters under the Electronic Stored Communications Act to
    communication providers to preserve information from certain witnesses, namely, [C.C.]
    and Ms. Lawn,” the defendants sent a specific discovery request for that information. In
    its response to the specific discovery motion, the State related that the KPD “did not, in
    fact, obtain the messaging information of its witnesses.” Counsel insisted that the
    information was necessary to ensure that Mr. Johnson received a fair trial and moved the
    court to provide an order “that compels, along with the subpoenas that will be issued, the
    various service providers to provide the . . . data communications” to the trial court under
    seal.
    The State opposed the motion on grounds that the motion, which was filed
    on the Friday before the first trial was set to begin,4 was untimely, noting that the State
    had “incurred a large expense . . . in preparing for this trial” and that several of the State’s
    witnesses had obligations related to their status as student athletes that presented
    scheduling difficulties. The State also argued that the defendants had failed to allege
    specific facts to support the issuance of the subpoenas, describing the subpoena request as
    “nothing more than an 11th-hour fishing expedition.” The State observed that the
    defendants had also failed to identify any particular piece of admissible evidence that
    would be uncovered.
    send to other cell phones or iOS devices. SMS/MMS messages aren’t encrypted and appear in green text
    bubbles on your device.” 
    Id. “When you
    send a text message to someone that has an Apple ID, the
    Messages app automatically recognizes that person’s Apple ID and routes the message through Apple’s
    servers instead of using the cell phone carrier. This is done automatically and avoids any texting charges
    from the cell phone carrier.” http://www.ianswerguy.com/imessage-difference/ (last visited February 1,
    2017).
    4
    The trial court had previously granted Mr. Johnson’s motion to sever his trial from that of Mr.
    Williams.
    -3-
    With regard to timing, counsel for Mr. Johnson stated that the State had
    provided them with Mr. Johnson’s cellular telephone data in the week before trial and
    that he had only learned two days before filing the motion that the State had not obtained
    any electronic communications from anyone other than Mr. Johnson. Citing United
    States v. Nixon, 
    418 U.S. 683
    (1974), counsel argued that Mr. Johnson need only
    “establish that there could be information that’s material and relevant on there.” He
    observed that the discovery materials were replete with information that “there was a lot
    of text messaging and social media communications that were going on about this party
    that night” and that, Ms. Lawn in particular, participated in social media and text
    messaging communications immediately after leaving C.C. in Mr. Johnson’s bedroom in
    the company of the defendants. Counsel also pointed to KPD interviews where C.C. and
    other witnesses discussed with KPD detectives “about whether or not they should have
    their social media taken down.”
    The State argued that the defendants had failed to satisfy the Nixon standard
    and argued that the information sought by the defendants qualified as witness statements,
    which would not be discoverable prior to trial under the terms of Tennessee Rule of
    Criminal Procedure 26.2. The defendants countered that the information could not be
    covered by Rule 26.2 because that rule, by its terms, is restricted to information in
    possession of the parties.
    At the conclusion of the hearing, the court granted the motion, stating that it
    felt “compelled to give the defendant[s] a full opportunity to gain any information that
    may be helpful to their case.” The court ordered that the materials be returned to
    chambers by September 8, 2015. In the written order, the court found “that specific and
    articulable facts establish[ed] reasonable grounds to believe that records and information
    pertaining to designated cellular telephone and social media communications are relevant
    and material to a pending criminal matter.” On that same day, the court entered a
    protective order that provided that “all materials produced to the court subject to the said
    Order and subpoenas duces tecum are to be filed under seal and made a part of the
    technical record in this matter.” The protective order also provided for “[e]xact
    duplicates of all materials . . . to be provided in their entirety to counsel for the parties.”
    Immediately following the hearing, the defendant issued and served 21
    subpoenas duces tecum:
    Provider                 Information Requested             Persons Covered Timeframe
    AT&T Mobility            “[a]ll stored electronic          C.C.            11/1/2014 -
    communications” “and the          Ms. Lawn        present
    related account records,
    -4-
    including but not limited to
    the call detail records
    (including all incoming and
    outgoing calls, the duration
    of said calls, the time and
    date of said calls, and the cell
    site addresses and/or cell
    tower information associated
    with said calls), audio
    recordings, saved contacts,
    geolocation data, text
    messages or iMessages sent
    or received, photographs,
    video recordings, and
    voicemail messages”
    Instagram5                  “[a]ll stored electronic             C.C.                   1/1/2014 -
    communications” including            Ms. Lawn               present
    “basic subscriber information        Ms. Boland
    (including Instagram                 Ms. Tavares
    username, e-mail address,
    telephone number, and
    timestamps and IP addresses
    for account logins/logouts),
    photographs, photo captions,
    and other posts from the
    subscriber’s Instagram
    accounts(s), and the content
    of messages, photos,
    comments, and location
    information”
    Twitter6                    “[a]ll stored electronic             C.C.                   1/1/2014 -
    5
    “Instagram is a social networking app made for sharing photos and videos from a smartphone.”
    “It’s like a simplified version of Facebook, with an emphasis on mobile use and visual sharing. Just like
    other social networks, you can interact with other users on Instagram by following them, being followed
    by them, commenting, liking, tagging and private messaging.” https://www.lifewire.com/what-is-
    instagram-3486316 (last visited February 8, 2017).
    6
    “Twitter is a free micro-blogging tool that allows users to publish short messages (140
    characters or less) through their computers and mobile phones.” “People who use Twitter write short
    messages, called Tweets, which they publish either publicly (for all Twitterers to see) or privately (for
    only certain Twitterers to see).” https://www.lifewire.com/twitter-basics-3476455 (last visited February
    8, 2017).
    -5-
    communications” including            Ms. Lawn              present
    “account/user information            Ms. Boland
    (including username(s)), the         Ms. Tavares
    associated ‘Twitter archive,’
    communications and/or
    content (including following,
    followed, muted, and blocked
    accounts, status updates
    (‘tweets’) posted and replies
    received, ‘tweets’ marked as
    a ‘favorite,’ direct messages
    sent and received, list
    memberships, lists subscribed
    to, and uploaded files
    (including photographs and
    video files and whether
    through pic.twitter.com,
    Periscope, Vine, or any other
    means)), and geolocation
    data”
    Snapchat7                  “[a]ll stored electronic             C.C.                  1/1/2014 –
    communications” including            Ms. Lawn              present
    “basic subscriber information        Ms. Boland
    (including Snapchat                  Ms. Tavares
    username, e-mail address,
    telephone number, and
    timestamps and IP addresses
    for account logins/logouts),
    logs (including sender,
    recipient, date, and time) of
    ‘snaps,’ ‘stories,’ and/or
    ‘chats’ sent to or from the
    subscriber’s Snapchat
    account(s), and the content of
    ‘snaps,’ ‘stories,’ and/or
    ‘chats’ sent to or from the
    7
    “Snapchat is both a messaging platform and a social network” that “exists only as a mobile app
    you can download to your iPhone or Android smartphone.” Snapchat “[p]hotos and videos essentially
    disappear a few seconds after they’ve been viewed by their recipients” unlike “other social networks,
    which keep your content online forever unless you decide to delete it.” https://www.lifewire.com/what-
    is-snapchat-3485908 (last visited February 8, 2017).
    -6-
    subscriber’s Snapchat
    account(s)”
    Facebook                 “[a]ll stored electronic           C.C.             1/1/2014 -
    communications” including          Ms. Lawn         present
    “basic account/user                Ms. Boland
    information (including user        Ms. Tavares
    identification number(s)
    and/or username(s), e-mail
    address(es), registered mobile
    telephone number, etc.),
    expanded subscriber content
    (including profile contact
    information, status update
    history, shares, notes, wall
    postings, list of ‘friends and
    other accounts ‘followed,’
    list of ‘pages’ ‘liked,’ list of
    groups joined, future and past
    events, video files, etc.), user
    photos (whether uploaded by
    the user or by other users),
    private messages sent and
    received, activity logs, and
    geolocation data”
    Yik Yak, Inc. 8          “[a]ll stored electronic           C.C.             1/1/2014 -
    communications” including          Ms. Lawn         present
    “each message posted, the IP       Ms. Boland
    address from which each            Ms. Tavares
    message was posted, the
    Global Positioning System
    (‘GPS’) coordinates of the
    location from which each
    message was posted, the time
    and date when each message
    was posted, and the user-
    agent string associated with
    the device from which each
    8
    “Yik Yak is basically an anonymous location-based status posting app for your local
    community, which shows you anonymous posts from people around your geographical area.”
    https://www.lifewire.com/what-is-yik-yak-3485928 (last visited February 2, 2017).
    -7-
    message was posted”
    On September 11, 2015, Mr. Johnson filed a motion asking the trial court
    “to set a date certain for the pretrial inspection of specified cellular telephone and social
    media communications and information sufficiently in advance of trial to permit the
    parties’ meaningful inspection and analysis” of the materials and “to issue the necessary
    process to secure the attendance at the pretrial inspection of the out-of-state witnesses
    with custody of said communications and information.” In support of his motion,
    counsel for Mr. Johnson indicated that they were “actively working” to obtain the
    requested materials from Yik Yak, which counsel deemed “likely to comply” with the
    subpoena. Additionally, counsel averred that AT&T had marked the subpoena as
    “‘urgent’” to assure quick compliance. Counsel averred that Facebook, Instagram,
    Snapchat, and Twitter had “responded to the Court’s Order and subpoenas with
    objections” in the form of a letter sent to defense counsel. Those providers
    “recommended” that the defendants “obtain the subpoenaed communications and
    information directly from the” account holders.
    Without accepting the validity of the service providers’ objections, Mr.
    Johnson informed the court of his intention to issue additional subpoenas duces tecum to
    the four individual account holders requesting “the same communications and
    information previously subpoenaed from their service providers.” To facilitate this
    process for the three witnesses9 who were, at that time, residing out of state, Mr. Johnson
    moved the court to issue the necessary process to secure the attendance of each witness at
    the pretrial inspection of the materials.
    Three days later, on September 14, 2015, Mr. Johnson moved the trial court
    to hold Facebook, Instagram, Snapchat, and Twitter in contempt for failing to comply
    with the court’s order and subpoenas. Mr. Johnson noted that although those service
    providers had objected to the subpoenas via letter, none had filed a motion to quash. On
    the following day, Mr. Johnson moved the court “to compel the state to request search
    warrants to obtain the specified social media communications and information previously
    subpoenaed pursuant to the Court’s Order of August 24, 2015.” Mr. Johnson claimed
    that responses from Facebook, Instagram, Snapchat, and Twitter indicated that those
    providers would release the subpoenaed information pursuant to a search warrant. Mr.
    Johnson also moved the court on September 15, 2015, “to issue the necessary process [to]
    secure the compliance of out-of-state service providers with the Court’s previous Order
    and accompanying Subpoenas Duces Tecum regarding specific social media
    communications” and “to reset the date for compliance with the same to September 28,
    2015.” In a supplemental motion also filed on September 15, 2015, Mr. Johnson
    9
    C.C., Ms. Boland, and Ms. Lawn.
    -8-
    informed the court that counsel for Facebook, Instagram, and Twitter had informed
    counsel for Mr. Johnson that those entities planned to secure local counsel to file
    responsive pleadings and “to address the multiple matters of first impression presented in
    this case surrounding the [F]ederal Stored Communications Act.” Mr. Johnson also
    noted that counsel for those providers indicated during a telephone conversation “that
    some of the communications at issue are no longer available possibly due to deletion by
    the content subscriber.”
    Following a hearing on September 17, 2015, the trial court held in abeyance
    the motion to hold the service providers in contempt. The court also modified the time
    for compliance with the subpoenas to September 28, 2015. Also on that date, the
    defendants issued subpoenas to the four witnesses that required production of each
    witness’ current and former cellular telephone handsets and copies “in native format” of
    all the data “associated with any and all” current and former Facebook, Instagram,
    Twitter, Snapchat, and Yik Yak accounts for the period between May 15, 2014, and
    December 31, 2014. Each subpoena contained directions for obtaining the necessary
    information from Facebook, Instagram, Twitter, and Snapchat. None explained how the
    data could be retrieved from Yik Yak. The trial court issued certificates of materiality to
    accompany the subpoenas.
    On September 28, 2015, the State moved to quash the subpoenas issued to
    C.C., Ms. Boland, Ms. Lawn, and Ms. Tavares, claiming that “[c]ompliance with these
    [s]ubpoenas is unreasonable and oppressive” and that “the [s]ubpoenas are cumulative in
    that they seek information and records that are already being sought by subpoenas issued
    to various communications/social media providers.” In its motion, the State averred that
    “[i]n some instances, the witnesses never had social media accounts with the companies
    listed in the [s]ubpoenas,” that “[i]n some instances, the witnesses have found it
    impossible to limit data retrieval to the time period listed in the [s]ubpoenas,” and that
    “the [a]ttachment to the [s]ubpoenas provides no instructions at all for retrieving data
    from Snapchat or Yik Yak.” The State attached to its motion an email from Ms. Boland’s
    mother that it claimed “detail[ed] the onerous nature of the data-retrieval portion of the
    [s]ubpoenas.” The State also noted that the attachment to the subpoenas issued to the
    four witnesses contained a requirement that the witnesses “provide for inspection any
    cellular telephone handset that they used primarily or exclusively between May 15, 2014
    through December 31, 2014” when the trial court’s order did not cover these cellular
    telephone handsets.
    Also on September 28, 2015, the State moved the trial court “to modify all
    subpoenas issued concerning the communications/social media accounts of” C.C., Ms.
    Lawn, Ms. Boland, and Ms. Tavares, arguing that “the time frame for most of the
    subpoenaed materials is overly broad.” The State asked that the subpoenas issued to the
    -9-
    social media service providers regarding C.C.’s accounts be modified to cover
    communications between May 15, 2014, and December 31, 2014. The State asked that
    the subpoenas issued to the social media service providers regarding the remaining
    witnesses’ accounts be modified to cover communications from November 15, 2014, to
    December 31, 2014. In support of its request, the State posited that there had “been no
    showing that social media or telephonic activity concerning the event in question actually
    occurred before the offense.”
    On October 20, 2015, Mr. Johnson moved the trial court to compel the four
    witnesses to show cause as to why they should not be held in contempt for failing to
    comply with the subpoenas. Mr. Johnson indicated that he had sent the subpoenas to the
    three out-of-state witnesses on September 21, 2015, “by FedEx priority overnight service
    with adult signature required.” C.C. and Ms. Boland received and signed for the
    packages on the following day. C.C. was served with domesticated Florida process on
    September 24, 2015. Delivery to Ms. Lawn was attempted on “three consecutive days
    until September 24, 2015, when someone requested that the package be held at the local
    FedEx facility.” After three more days passed without anyone retrieving the package, it
    was returned to counsel for Mr. Johnson. Mr. Johnson then sent a second package to Ms.
    Lawn without a signature requirement, and that package was delivered on September 29,
    2015.
    According to Mr. Johnson, on September 22, 2015, C.C. sent a letter along
    with “an assortment of printouts from various social media service providers” to the trial
    court. This assortment did not include any electronic communications made during the
    week surrounding the alleged offenses in this case. It did include printouts from
    Instagram, Twitter, and Snapchat that appeared to explain why she had been unable to
    retrieve the subpoenaed information. The letter, which was filed under seal but appended
    to Mr. Johnson’s motion, does support Mr. Johnson’s statement that C.C. upgraded to a
    new cellular telephone handset on January 27, 2015. She claimed that the older handset
    had malfunctioned but stated that she had sold the telephone through a website after
    restoring it to the default factory settings. As of October 20, 2015, none of the remaining
    witnesses had returned any of the subpoenaed materials to the court. Mr. Johnson asked
    that the witnesses be made to show cause for their failure to comply and that the court
    enforce the statutory forfeiture for their noncompliance.
    Mr. Johnson also stated that the responsive documents received from
    AT&T indicated that both C.C. and Ms. Lawn had disposed of their cellular telephone
    handsets “within 24 hours of one another on January 27 and 28, 2015.” In the letter,
    which was appended to the pleading, AT&T indicated that it had not stored the content of
    text messages for either C.C. or Ms. Lawn but that iMessages might be retrieved from
    -10-
    either witness’s iCloud10 account. AT&T also stated that it could not provide access to
    voicemail within a certain timeframe; that, generally, it retained voicemails only for 14 to
    30 days; and that voicemails deleted by the customer could not be recovered at all. Mr.
    Johnson moved the court to require both C.C. and Ms. Lawn to provide their iCloud login
    credentials to Sword & Shield Enterprise Security, Inc., “to download the witnesses’ data,
    limit the data retrieved to the time periods stated in the [s]ubpoenas, and provide the
    responsive data to the Court and all counsel.”
    On October 20, 2015, local counsel for Facebook, Instagram, Snapchat, and
    Twitter (hereinafter collectively “the social media providers”)11 filed a “Notice” of the
    status of the subpoenas issued to those parties. In the notice, the social media providers
    indicated that the subpoenas issued to all but Snapchat had been domesticated in
    California but nevertheless maintained that the Stored Communications Act (“SCA”) did
    not authorize them to release the contents of electronic communications to criminal
    defendants. The social media providers contended that the appropriate procedure was to
    subpoena the information directly from the users. Twitter, in particular, “confirmed and
    advised” local counsel “that it has no records to produce in response to any” of the
    subpoenas. Facebook and Instagram agreed “to produce non-content records . . . as
    permitted under the SCA, after giving the users 21 days’ notice and an opportunity to
    object.” The social media providers did not take any position regarding the State’s
    motion to quash but did “reserve any and all objections that may be asserted to the
    subpoenas.” The social media providers also noted that “any objections that cannot be
    consensually resolved” would be “properly litigated in the California court from which
    the [s]ubpoenas issued.” The notice also indicated that counsel for Mr. Johnson had
    agreed to stay compliance with the subpoenas and to withdraw his motion for contempt.12
    On October 23, 2015, Mr. Johnson moved the court to dismiss the
    presentment, exclude the testimony of the witnesses, or issue an adverse inference
    instruction based upon the State’s failure to preserve the electronic communications that
    were the subject of the subpoenas. He argued that because the police were aware that
    several of the witnesses in this case used text messaging and social media to
    communicate before and after the alleged offenses, they should have endeavored to
    10
    “At its most basic level, ‘the cloud’ is the Internet, or more accurately, a piece of the Internet.”
    https://www.lifewire.com/what-is-icloud-3972867 (last visited on February 3, 2017). “The ‘iCloud’ is the
    generic name for . . . . Apple’s ‘cloud-based’ or Internet-based services.” 
    Id. The “iCloud
    automatically
    backs up the information” stored on Apple “devices—iPhone, iPad, and iPod touch—over Wi-Fi every
    day when they are turned on, locked, and connected to a power source.” This daily backup covers
    “iMessage, text (SMS), and MMS messages.” https://support.apple.com/kb/ph12519?locale=en_US (last
    visited on February 3, 2017).
    11
    Yik Yak has not objected to the subpoenas at any point.
    12
    Mr. Johnson, in other pleadings, indicates that the motion for contempt was held in abeyance
    rather than withdrawn.
    -11-
    preserve those communications. Mr. Johnson also noted that, following the alleged
    offenses, C.C. gave conflicting statements and that, following her interviews with KPD
    detectives, she had reset her cellular telephone to its factory settings, thereby deleting her
    text messages and contact information. Although she claimed that she disposed of the
    cellular telephone because it no longer worked, she stated that she sold the device on a
    website. She also deleted her Twitter and Instagram accounts and deactivated her
    Facebook account. Ms. Lawn similarly disposed of her cellular telephone. In that same
    pleading, Mr. Johnson indicated that he would not contest the State’s motion to modify
    the timeframe of the subpoena.
    On October 27, 2015, the State filed an amended motion to quash. In its
    amended motion, the State challenged the subpoenas issued to AT&T, the social media
    providers (including Yik Yak), and the four witnesses. The State argued that the
    defendants had failed to show that the subpoenas will produce material evidence and that
    compliance with the subpoenas was unreasonable and oppressive. The State asserted that
    the subpoena to C.C. violated her rights as a victim. Finally, the State claimed that
    granting subpoenas would have a chilling effect on rape reporting.
    In his response to the State’s amended motion to quash, Mr. Johnson
    argued that the court had already determined, following a contested hearing, that the
    information covered by the subpoenas was both relevant and material. He stated that the
    information already disclosed pursuant to the subpoenas confirmed the court’s finding.
    Mr. Johnson also claimed that the State lacked standing to challenge the subpoenas
    because the State had no “personal right, privilege, or proprietary interest” in the
    subpoenaed materials. Finally, Mr. Johnson argued that, even if the State had standing to
    challenge the subpoenas, it could not establish that the subpoenas were unreasonable or
    oppressive.
    Neither party presented evidence at the November 3, 2015 hearing on the
    motion to quash. The State argued that the defendants had made “no showing that these
    subpoenas will lead to material and admissible evidence,” explaining that materiality was
    “the main reason that we’re here in court today.” The State claimed that the defendants
    had failed to make even a showing that each of the witnesses had accounts with each of
    the social media providers. The State insisted that the defendants could obtain text
    messages exchanged between them and any of the witnesses from the defendants’ cellular
    telephones. The State asserted that the defendants had presented no proof of the need to
    confiscate the cellular telephones of C.C. and Ms. Lawn. The State emphasized that the
    “main issue” as far as the State was concerned was “that these subpoenas are unsupported
    by material or admissible evidence.” The State also argued, however, that “these
    subpoenas are oppressive and unreasonable, under Rule 17,” citing as proof the email
    sent to the prosecutor by Ms. Boland’s mother as exhibited to their motion to quash, in
    -12-
    which Ms. Boland’s mother claimed that she and her husband had spent several hours
    attempting to assist Ms. Boland in complying with the subpoena and that compliance had
    been more time consuming than anticipated, to support its assertion that compliance with
    the subpoenas was unreasonable. Finally, the State asserted, as it had in its amended
    motion to quash, that requiring C.C. to comply with the subpoenas would create a
    chilling effect on rape reporting and prosecuting.
    The defendants argued that the State had failed to establish any need for the
    court to revisit its earlier ruling that the subpoenaed materials were material and relevant.
    The defendants also asserted that the State’s motion to quash was untimely because some
    of the witnesses and some of the providers had already begun to comply with the
    subpoenas. Finally, the defendants maintained that the subpoenas were not unreasonable
    or oppressive and that there was no practical or legal reason to stop the subpoena process
    after compliance had begun and so close to trial. The defendants suggested that if the
    witnesses were experiencing technical difficulties, then the court should appoint an expert
    to help them at the defendants’ expense.
    At the conclusion of the hearing, the trial court granted the motion to quash
    as to the four witnesses and denied the motion as to all the service providers, ruling as
    follows:
    As we said over and over, we’re plowing new ground
    here. This is new territory. We’re faced with the reality of
    the computer age and the generation of incredible amounts of
    communication and the ability to store these communications
    and access them. It is a new world and there’s much more
    information available now than there has been in the past.
    And the way that legal principles concerning the
    acquisition of information in litigation is – is struggling to
    keep up. We are not – our legal processes have not fully
    embraced and resolved the manner in which this immense
    amount of information is to be shared, distributed. So we are
    without a great deal of guidance and authority in making
    these decisions and in managing this case.
    In the beginning, this started with the defense
    argument – which the Court accepted. The Court accepted
    defense counsel’s representations that Federal case law and
    Federal statutes are advancing the proposition that stored
    media communication should be made available to defendants
    -13-
    in criminal prosecutions. That’s how all of this started. The
    Court accepted that proposition. The Court reviewed 18
    United States Code Annotated, 2701 et seq. And this is the
    Stored Wire and Electronic Communications and
    Transactional Records and Access Act. And that’s how we
    began this journey into the business of computer recorded and
    stored communication information.
    In . . . accord with that finding, and with that
    proposition, this Court did approve the subpoena duces tecum
    and the accompanying orders to cause social media service
    providers to provide to the Court the social media
    communication information relevant to this case. That was
    the next step.
    Some information was provided to the Court pursuant
    to the subpoenas from some of the providers. Other servers
    reported that it was their policy to leave it to the end users, or
    customers, to provide the communication information to
    others.
    In response, counsel for the defense sought approval
    by this Court for subpoenas and orders directed to the end
    users, or customers, identified in this case as [C.C.], Bridget
    Boland, Anna Lawn and Natalie Tavares.
    At this point, it appeared to the Court that there was
    some consensus between the State and the defense that it was
    appropriate for the end users, or customers, to provide this
    information to the Court. There was some agreement that the
    State’s attorneys would attempt to help these end users
    provide this information.
    In the attempt to do so, however, it became apparent
    that the end users, or customers, were not able to access the
    information in spite of what appeared to be sincere efforts to
    do so.
    At this point, the State filed the motion to quash the
    subpoena. Under these circumstances, this Court finds that
    those circumstances justify the extension of the time
    -14-
    allowable to the State to file its motion. There w[ere]
    circumstances that developed after – during the attempt to
    comply with the subpoena that the State learned that this, in
    their view, was oppressive and the subpoena should be
    quashed.
    At this point today, this morning . . . the defense is
    asking the Court to enforce the subpoenas and the State is
    asking the Court to quash the subpoenas.
    It now falls to this Court, in this case, to try to find the
    proper response of a State trial court to evolving Federal law
    pertaining to access for both the prosecution and the defense
    to the expediential increase of stored social media
    communication information available today.
    First, this Court is going to distinguish between two
    types of social media communication information. The first
    type the Court will refer to as structural information. By this,
    the Court means the existence of communications, their
    duration, the identities of the end users, or customers, who are
    sending or receiving the communications and, where possible,
    the location of the senders and receivers. Other types of
    information might also be considered as structure.
    The second type of social media communication
    information this Court will recognize is content.
    The Court now considers the four subpoenas on the
    individuals, [C.C.], Ms. Boland, Ms. Lawn and Ms. Tavares.
    First of all, the Court does find that the State has standing to
    move to quash subpoenas that are being used to try to seize
    information from their witnesses or potential witnesses.
    In considering the relationship between Tennessee law
    and the Federal statutes and case law pertaining to subpoenas,
    this Court finds as follows:
    Part A. In the context of this case, the term “content,”
    . . . is equivalent to the legal phrase “statements of witnesses.”
    -15-
    Tennessee Rule of Procedure, Rule 17, clearly
    excludes statements of witnesses from the subpoena power.
    The Federal statute deals only with the production of
    information by service providers and not by end users, or
    customers. That’s the second part.
    The third part – the third finding of the Court is: That
    this Court does find that the subpoenas on the individuals in
    this case are oppressive and unreasonably demanding. The
    contention made by the State – rather by the defense, that the
    Court should appoint a computer expert to assist compliance
    with the subpoena only underscores the unreasonableness of
    the subpoena obligation as to those private end users.
    And for those three reasons, the fact that Tennessee
    Rule of Procedure, Rule 17, excludes statements of witnesses,
    and the Federal law deals only with the service providers and
    not the end users, and in this case, certainly, the Court is
    finding that the subpoenas turn out to be oppressive and
    unreasonably demanding. For these three reasons, the Court
    does now grant the State’s motion to quash the subpoenas that
    have been issued to [C.C.], Bridget Boland, Anna Lawn and
    Natalie Tavares.
    The Court does find that the State lacks standing to
    move to quash the subpoenas that were issued to the service
    providers themselves.
    In response to questions by the defense, the court stated that the subpoenas issued to the
    service providers “remain intact,” explaining, “Those people truly are third . . . parties to
    this litigation. And they’re all perfectly capable of hiring lawyers and moving to quash if
    they choose to.” The court specifically did not rule on whether the providers had to
    provide the content of the communications.
    Following the trial court’s November 3, 2015 order, both parties moved the
    trial court for permission to seek interlocutory appeal. The trial court granted permission,
    and this court agreed to interlocutory review, framing the scope of review as follows:
    To be clear, this interlocutory review concerns only the trial
    court’s November 3, 2015 order granting, in part, and
    denying, in part, the State’s motion to quash subpoenas of the
    -16-
    alleged victim, witnesses, and social media service providers,
    as limited by the trial court’s November 3 order and order
    granting permission to seek interlocutory appeal.
    Thus, we review the trial court’s conclusion that the State had standing to quash the
    subpoenas duces tecum issued to the witnesses, the court’s ruling quashing those
    subpoenas, and the court’s ruling that the State did not have standing to quash the
    subpoenas duces tecum issued to the various service providers.
    I. Standing
    The defendants argue that the State lacks standing to file a motion to quash
    any of the subpoenas issued in this case because the State lacks “a personal right,
    privilege, or proprietary interest” in the materials the defendants seek via the subpoenas.
    The State asserts that it has standing based upon its legitimate interests in preventing an
    unnecessary delay of the trial and protecting the State’s witnesses. The State also
    contends that because it bears a constitutional and statutory “duty to protect the rights of
    crime victims and prosecution witnesses alike,” it has standing to contest subpoenas that
    “threaten” the rights or interests of the victim and the State’s witnesses.
    As the defendants correctly observe, the trial court did not apply the test for
    standing to challenge a third party subpoena adopted in State v. Harrison, 
    270 S.W.3d 21
    (Tenn. 2008), and instead concluded, without any analysis, “that the State has standing to
    move to quash subpoenas that are being used to try to seize information from their
    witnesses or potential witnesses.” Similarly, the court found, in conclusory fashion, “that
    the State lacks standing to move to quash the subpoenas that were issued to the service
    providers themselves.” In response to a question from defense counsel, the court
    clarified that the service providers “truly are third . . . parties to this litigation. And
    they’re all perfectly capable of hiring lawyers and moving to quash if they choose to.”
    The subpoenas in this case were issued pursuant to Rule 17 of the
    Tennessee Rules of Criminal Procedure, which rule provides that “[a] subpoena may
    order a person to produce the books, papers, documents, or other objects the subpoena
    designates” either “in court before trial or before they are to be offered in evidence.”
    Tenn. R. Crim. P. 17(d)(1). “On motion made promptly and in any event by the time
    specified in the subpoena for compliance therewith, the court may quash or modify the
    subpoena if compliance would be unreasonable or oppressive.” Tenn. R. Crim. P.
    17(d)(2). The rule is silent on the issue of who may move to quash a subpoena.
    Absent a showing that the State had standing to challenge the subpoenas,
    the controversy is not justiciable. West v. Schofield, 
    468 S.W.3d 482
    , 490 (Tenn. 2015)
    -17-
    (“To determine whether a particular case involves a legal controversy, Tennessee courts
    use justiciability doctrines that ‘mirror the justiciability doctrines employed by the United
    States Supreme Court and the federal courts,’ and these doctrines ‘include: (1) the
    prohibition against advisory opinions, (2) standing, (3) ripeness, (4) mootness, (5) the
    political question doctrine, and (6) exhaustion of administrative remedies.’” (citations
    omitted)); City of Memphis v. Hargett, 
    414 S.W.3d 88
    , 96 (Tenn. 2013) (“Justiciability
    encompasses several distinct doctrines, two of which are . . . mootness and standing.”).
    As the moving party, the State bore the burden of establishing its standing to challenge
    the subpoenas in this case. ACLU of Tenn. v. Darnell, 
    195 S.W.3d 612
    , 620 (Tenn.
    2006). Because standing presents a question of law, we review the issue de novo with no
    presumption of correctness afforded to the trial court. Massengale v. City of East Ridge,
    
    399 S.W.3d 118
    , 123 (Tenn. Ct. App. 2012) (citing Cox v. Shell Oil Co., 
    196 S.W.3d 747
    ,
    758 (Tenn. Ct. App. 2005)).
    Standing, “‘a judge-made doctrine,’” Fannon v. City of LaFollette, 
    329 S.W.3d 418
    , 424 (Tenn. 2010) (quoting Knierim v. Leatherwood, 
    542 S.W.2d 806
    , 808
    (Tenn. 1976)), is designed “to determine whether a particular litigant is entitled to have a
    court decide the merits of a dispute or of particular issues,” 
    Darnell, 195 S.W.3d at 619
    .
    “Grounded upon ‘concern about the proper—and properly limited—role of the courts in a
    democratic society,’ the doctrine of standing precludes courts from adjudicating ‘an
    action at the instance of one whose rights have not been invaded or infringed.’” 
    Id. (quoting Warth
    v. Seldin, 
    422 U.S. 490
    , 498 (1975); Mayhew v. Wilder, 
    46 S.W.3d 760
    ,
    767 (Tenn. Ct. App. 2001)). “Every standing inquiry requires a ‘careful judicial
    examination of a complaint’s allegations to ascertain whether the particular plaintiff is
    entitled to an adjudication of the particular claims asserted.’” 
    Hargett, 414 S.W.3d at 97
    (quoting Allen v. Wright, 
    468 U.S. 737
    , 752 (1984)).
    In Harrison, the supreme court considered whether Harrison had standing
    to challenge a subpoena directing Dr. Dennis Wilson, a clinical psychologist who had
    conducted a forensic examination of Harrison, “to produce ‘[a]ny and all records’
    retained by him related to his psychological evaluation.” State v. Harrison, 
    270 S.W.3d 21
    , 26 (Tenn. 2008). Although the Harrison court was examining a judicial subpoena
    issued under the terms of Code section 40-17-123, which prescribes the procedure to “be
    employed when a law enforcement officer, as defined in § 39-11-106,” requests “the
    production of books, papers, records, documents, tangible things, or information and data
    electronically stored for the purpose of establishing, investigating or gathering evidence
    for the prosecution of a criminal offense,” T.C.A. § 40-17-123(a), we see no reason that
    the court’s analysis is inapplicable to subpoenas issued pursuant to Rule 17.
    In keeping with the general rule reached by numerous courts that “[a] party
    has standing to move to quash a subpoena addressed to another if the subpoena infringes
    -18-
    upon the movant’s legitimate interests,” see United States v. Raineri, 
    670 F.2d 702
    , 712
    (7th Cir. 1982), our supreme court concluded that “[a] person who does not have a legally
    protectable interest in subpoenaed materials has no standing to challenge either the form
    of a subpoena issued to a third party or the manner in which the subpoena was issued,”
    see 
    Harrison, 270 S.W.3d at 28
    . In consequence, the court held that only “a person who
    has a personal right, privilege, or proprietary interest in materials subject to a third-party
    subpoena has standing to challenge the subpoena.” 
    Harrison, 270 S.W.3d at 28
    -29.
    Accordingly, the court held that Harrison had standing to challenge the subpoena.
    Citing Ranieri, the State argues that it has a legally protectable interest in
    the subpoenas arising from its “interests in preventing undue lengthening of the trial,
    undue harassment of its witness, and prejudicial over-emphasis on [witness] credibility.”
    See 
    Raineri, 670 F.2d at 712
    . The State also asserts that it has standing to advocate the
    four witnesses’ personal rights to the subpoenaed materials by virtue of its statutory and
    constitutional duty to protect the privacy rights of the victims and witnesses of crime.
    We consider each claim in turn.
    A. The State’s Own Interest
    The State, because of its unique position as “the representative not of an
    ordinary party to a controversy” but of the people of the State of Tennessee, see Berger v.
    United States, 
    295 U.S. 78
    , 88 (1935), will often lack standing in a criminal case “to
    challenge a subpoena issued to a third party because of the absence of a claim of
    privilege, or the absence of a proprietary interest in the subpoenaed material or of some
    other interest in the subpoenaed documents,” United States v. Beckford, 
    964 F. Supp. 1010
    , 1023 (E.D. Va. 1997). That is the case here. The State has no personal right,
    privilege, or proprietary interest in the electronic communications at issue. That being
    said, courts have recognized that the State does have legitimate interests that may, under
    certain circumstances, provide it with standing to challenge a third party subpoena issued
    by a criminal defendant. The legitimate State interests most often cited come from
    Ranieri: “preventing undue lengthening of the trial, undue harassment of its witness, and
    prejudicial over-emphasis on [witness] credibility.” See 
    Raineri, 670 F.2d at 712
    .
    In Ranieri, the Seventh Circuit Court of Appeals concluded that the
    government had standing to challenge a subpoena issued by Ranieri to a government
    witness during trial. The prosecution presented out-of-state witness Cira Gasbarri as its
    first witness during Ranieri’s trial on charges that he ran a prostitution ring. The
    defendant subjected her to two days’ cross-examination. 
    Id. Nearly three
    weeks later,
    Ranieri issued an ex parte subpoena for Gasbarri to appear as a defense witness. 
    Id. The prosecution
    successfully moved to quash the subpoena. The court stated, without
    analysis, discussion, or citation to any authority, that “[t]he prosecution’s standing rested
    -19-
    upon its interest in preventing undue lengthening of the trial, undue harassment of its
    witness, and prejudicial over-emphasis on Gasbarri’s credibility.” 
    Id. A number
    of state
    and federal courts have applied the holding in Ranieri to the determination whether the
    prosecution in a criminal case has standing to challenge a subpoena issued by the
    defendant to a third party. See, e.g., United States v. Segal, 
    276 F. Supp. 2d 896
    , 900
    (N.D. Ill. 2003); United States v. Daniels, 
    95 F. Supp. 2d 1160
    , 1164 (D. Kan. 2000);
    United States v. Nachamie, 
    91 F. Supp. 2d 552
    , 558 (S.D.N.Y. 2000); Schreibvogel v.
    State, 
    228 P.3d 874
    , 880 (Wyo. 2010); Com. v. Lam, 
    827 N.E.2d 209
    , 214 (Mass. 2005);
    State v. DeCaro, 
    745 A.2d 800
    , 816 (2000).
    Because Harrison involved the defendant’s challenge to a third party
    subpoena, our supreme court had no occasion to determine when the State would have
    standing to challenge a third party subpoena. Thus, Harrison’s holding is expressed in
    terms of what “a person” must show to establish standing: “a personal right, privilege, or
    proprietary interest.” As indicated above, it will be difficult if not impossible for the
    State in a criminal case to establish specifically “a personal right, privilege, or proprietary
    interest.” The Harrison court made it clear, however, that its holding was grounded in
    the conclusion that “[a] person who does not have a legally protectable interest in
    subpoenaed materials has no standing to challenge either the form of a subpoena issued to
    a third party or the manner in which the subpoena was issued.” 
    Harrison, 270 S.W.3d at 28
    (emphasis added). That the high court cited Ranieri in support of that conclusion
    suggests that “a legally protectable interest,” as applied to the State in a criminal case,
    may extend beyond the concepts of “personal right, privilege, or proprietary interest” to
    cover the State’s legitimate interests in “preventing undue lengthening of the trial, undue
    harassment of its witness, and prejudicial over-emphasis on [witness] credibility,” as
    described in Ranieri. 
    Id. at 29;
    Ranieri, 670 F.2d at 712
    .
    In our view, none of the interests identified in Ranieri are implicated by the
    third party subpoenas issued in this case.
    First, because the subpoenas were issued prior to trial, there is no danger of
    undue lengthening of the trial. “To the contrary, a subpoena returnable before trial will
    avoid delay in the government’s prosecution of the case.” United States v. Tomison, 
    969 F. Supp. 587
    , 596 (E.D. Cal. 1997) (citing Bowman Dairy Co. v. United States, 
    341 U.S. 214
    , 220 (1951)). The Supreme Court has observed that the “chief innovation” of Rule
    17 was, in fact, “to expedite the trial by providing a time and place before trial for the
    inspection of the subpoenaed materials.” See Bowman Dairy 
    Co., 341 U.S. at 220
    . The
    record indicates that the defendants sought the subpoenas for the service providers as
    soon as it became clear that the desired information would not be produced during the
    discovery process. Then, when the service providers indicated that the defendants should
    seek the information from the end users, the defendants asked for subpoenas to be issued
    -20-
    to the witnesses. In short, the record gives no indication that the defendants acted with
    anything other than urgency in acquiring the subpoenas at issue. In Ranieri, “the
    Government’s legitimate interest . . . involved preventing a redundant and time-
    consuming reexamination of a witness who had already been subjected to a lengthy and
    effective cross-examination.” 
    Nachamie, 91 F. Supp. 2d at 559
    . No such concerns exist
    here.
    Second, nothing in the record suggests that the subpoenas issued to the
    witnesses in this case caused “undue harassment” of the witnesses or that any of the
    witnesses, including C.C., was in a particularly vulnerable position. Asking a witness to
    provide his or her evidence to the court in compliance with a validly issued subpoena,
    standing alone, cannot qualify as “undue harassment.” In our adversarial system of
    justice, “[t]he need to develop all relevant facts . . . is both fundamental and
    comprehensive.” United States v. Nixon, 
    418 U.S. 683
    , 709 (1974). To this end, “it is
    imperative to the function of courts that compulsory process be available for the
    production of evidence needed either by the prosecution or by the defense.” 
    Id. Consequently, it
    is “a fundamental maxim that the public . . . has a right to every man’s
    evidence.” United States v. Bryan, 
    339 U.S. 323
    , 332 (1950). “The defendant’s right to
    compulsory process is itself designed to vindicate the principle that the ‘ends of criminal
    justice would be defeated if judgments were to be founded on a partial or speculative
    presentation of the facts.’” Taylor v. Illinois, 
    484 U.S. 400
    , 411-12 (1988) (quoting
    
    Nixon, 418 U.S. at 709
    ); see also 
    Nixon, 418 U.S. at 711
    (“The right to the production of
    all evidence at a criminal trial similarly has constitutional dimensions.”). To be sure,
    complying with the subpoenas in this case will require some sacrifice on the part of the
    witnesses, but “[t]he personal sacrifice involved is a part of the necessary contribution of
    the individual to the welfare of the public.” Blair v. United States, 
    250 U.S. 273
    , 282
    (1919); see also Blackmer v. United States, 
    284 U.S. 421
    , 438 (1932) (“It is also beyond
    controversy that one of the duties which the citizen owes to his government is to support
    the administration of justice by attending its courts and giving his testimony whenever he
    is properly summoned.”).
    Although the State argues otherwise, there has been no showing that any of
    the witnesses are “peculiarly vulnerable.” Other courts have concluded that the
    prosecution has standing to challenge a subpoena issued to a “peculiarly” or
    “particularly” vulnerable witness such as the minor victim of a sexual assault, see Com. v.
    Lam, 
    27 N.E.2d 209
    , 214 (2005) (subpoena issued to the father of the minor victim);
    People v. Spykstra, 
    234 P.3d 662
    , 667 (Colo. 2010) (subpoena issued to the parents of the
    minor victim), or witnesses in a case where there exists a real potential for violence or
    threats of violence to the witnesses, see United States v. Orena, 
    883 F. Supp. 849
    , 853
    (E.D.N.Y. 1995) (subpoena issued to the cooperating witnesses in the witness protection
    program and their families in a case where the defendants were “alleged to be aligned
    -21-
    with the Orena faction of the Colombo Organized Crime family” in a plot “to murder
    members of the Persico faction” of the same crime family); United States v. Joseph
    Anthony Giampa, a/k/a “Joey G.,” a/k/a “Big Joe,” and Santo Giampapa, Jr., a/k/a
    “Jay,” a/k/a “Jay G.,” a/k/a “Jr.,”, No. S 92 CR. 437 (PKL), 
    1992 WL 296440
    , at *1
    (S.D.N.Y. Oct. 7, 1992) (subpoenas issued to cooperating witness, his wife, and minor
    son, all of whom were in the witness protection program, by defendants “charged with
    the murder of Michael Salerno, conspiracy to murder Mr. Salerno, and conspiracy to
    assault Warren Ulrich in aid of a racketeering enterprise known as the Luchese Organized
    Crime Family of La Cosa Nostra”). Instead, the witnesses here are adults with no
    demonstrated vulnerabilities that would give rise to the State’s standing to challenge the
    subpoenas as a means of protection. That they have been identified as potential witnesses
    by the State could not be sufficient, in and of itself, to provide the State with standing.
    As the Nachamie court recognized, if the State “had standing to move to quash whenever
    a subpoena was served on a potential witness, then it could move to quash virtually every
    Rule 17(c) subpoena merely by claiming that the recipient might become a witness.”
    
    Nachamie, 91 F. Supp. 2d at 560
    . We agree with that court that, “[s]urely, the concept of
    standing,” a concept that goes to the very jurisdiction of the court, “was not meant to be
    so elastic.” 
    Id. That the
    defendants moved the court to hold the witnesses in contempt for
    failure to comply with the subpoenas does not alter our analysis. The State implies,
    without any evidence, that the motion for contempt was designed to harass, intimidate, or
    retaliate against the witnesses. As indicated, “there is a general duty to give what
    [evidence] one is capable of giving,” see 
    Bryan, 339 U.S. at 332
    , and the appropriate
    recourse when a party fails to comply with a subpoena, absent some showing of an
    adequate excuse for failure to comply, is a motion for contempt, see Tenn. R. Crim. P.
    17(g) (“When a subpoena is served on a person, the court issuing the subpoena may deem
    the person’s refusal to obey the subpoena to be contempt of court unless the person has
    an adequate excuse.”); see, e.g., 
    Blair, 250 U.S. at 282
    . We cannot characterize the
    defendants’ attempt to pursue the only remedy available to them as “threatening.” “A
    subpoena has never been treated as an invitation to a game of hare and hounds, in which
    the witness must [provide evidence] only if cornered at the end of the chase.” 
    Bryan, 339 U.S. at 331
    .
    Finally, there is no evidence to suggest that the subpoenas in this case will
    lead to “a prejudicial over-emphasis on [witness] credibility.” Indeed, in a case such as
    this, in which the determination of the defendants’ guilt or innocence will depend solely
    on the credibility of the witnesses, we cannot fathom that the credibility of the State’s
    witnesses could be overemphasized. That being said, because the subpoenas were issued
    prior to the trial, issues of credibility of the witnesses or the emphasis thereon are not ripe
    for our review.
    -22-
    Aside from the three interests mentioned in Ranieri, the State will have
    standing to challenge a subpoena issued to a third party when compliance with the
    subpoena is “unreasonable or oppressive” as applied to the State. See, e.g., United States
    v. Daniels, 
    95 F. Supp. 2d 1160
    , 1164 (D. Kan. 2000); Tomison, 
    969 F. Supp. 587
    , 596
    (E.D. Cal. 1997). Nothing in this case, however, suggests that compliance with the
    subpoenas will work any particular hardship on the State or indicates that the materials
    subpoenaed include any work product of the State that might give rise to a proprietary
    interest in the materials. See 
    Nachamie, 91 F. Supp. 2d at 560
    (observing that
    prosecution would have standing to challenge subpoena that requested prosecution work
    product).
    B. The State as Proxy for the Witnesses’ Interests
    The State also asserts that its statutory and constitutional duty “to protect
    the interests of victims and witnesses” in criminal cases creates in the State a legal
    interest giving rise to standing to challenge the subpoenas in this case. In support of its
    position, the State points to the supreme court’s statement in Harrison that a legal right or
    interest in subpoenaed materials “may, but not must, be created or defined by statute.”
    
    Harrison, 270 S.W.3d at 27
    . “‘[I]n cases where a party is seeking to vindicate a statutory
    right of interest, the doctrine of standing requires the party to demonstrate that its claim
    falls within the zone of interests protected or regulated by the statute in question.’” 
    Id. at 28
    (quoting Wood v. Metro. Gov’t of Nashville & Davidson Cnty., 
    196 S.W.3d 152
    , 158
    (Tenn. Ct. App. 2005)).
    The State notes that article one, section 35 of our state constitution confers
    on crime victims the rights “to justice and due process” and entitles them to, among other
    “basic rights,” “confer with the prosecution.” Tenn. Const. art. I, § 35. The State argues
    that because Code section 8-7-401 places “at the discretion of the district attorney
    general” the decision on the “extent of participation” of private counsel employed by “[a]
    victim of crime or the family members of a victim of crime,” see T.C.A. § 8-7-401(a),
    prosecutors are “the de facto advocates for victim rights and interests in criminal
    proceedings.”
    In our view, the State’s argument misapprehends the role of the district
    attorney general in a criminal prosecution. The prosecutor is not an advocate for the
    victim of a crime or the witnesses for the State but is instead the representative of the
    sovereign state of Tennessee charged with “safeguarding and advocating the rights of the
    people.” Quillen v. Crockett, 
    928 S.W.2d 47
    , 51 (Tenn. Crim. App. 1995). “District
    attorneys general are officers of the executive branch, who are entrusted by the citizens of
    this state with the duty to seek justice.” State v. Head, 
    971 S.W.2d 49
    , 51 (Tenn. Crim.
    -23-
    App. 1997) (citing State v. Gilliam, 
    901 S.W.2d 385
    , 389 (Tenn. Crim. App. 1995); State
    v. Mario Pendergrass, No. 01C01-9504-CR–00121, 
    1997 WL 83777
    (Tenn. Crim. App.,
    Nashville, Feb. 28, 1997)); see also State v. Griffis, 
    964 S.W.2d 577
    , 598 (Tenn. Crim.
    App. 1997) (“The district attorney general is a ‘quasi-judicial officer,’ who represents the
    state in criminal prosecutions. However, it is as much the district attorney general’s
    responsibility to enforce the laws as it is to see the accused receives a fair and impartial
    trial.”). Thus, the prosecutor “is in a peculiar and very definite sense the servant of the
    law, the twofold aim of which is that guilt shall not escape or innocence suffer.” 
    Berger, 295 U.S. at 88
    .
    Neither the codification of the duties of the district attorney general nor the
    statutory and constitutional provisions conferring certain rights upon the victims of crime
    alters the prosecutor’s role as the representative of the people of Tennessee. Nor do they
    endow the State with the power to represent the victim or the witnesses proffered by the
    State. The State “cannot undertake to act as counsel to its witnesses,” even the victim,
    because the State’s “interests and that of its witnesses are not identical.” Nachamie, 91 F.
    Supp. 2d at 560–61. The prosecutor’s highest interest “in a criminal prosecution is not
    that it shall win a case, but that justice shall be done.” 
    Berger, 295 U.S. at 88
    .
    Additionally, the State lacked a sufficient legal relationship with any of the
    witnesses in this case to allow the State to assert the witnesses’ own interests in the
    subpoenaed material. It is well-established that “a victim in a criminal case does not
    meet the definition of a ‘party’” in a criminal trial. State v. Flood, 
    219 S.W.3d 307
    , 314
    (Tenn. 2007) (citing City of Chattanooga v. Swift, 
    442 S.W.2d 257
    , 258 (Tenn. 1969));
    see also State v. Brown, 
    29 S.W.3d 427
    , 442 (Tenn. 2000) (“A victim in a sexual assault
    case is not a party for purposes of a party opponent admission.”). Even though the four
    women have been identified as State’s witnesses, “[i]t is hornbook law that generally no
    party ‘owns’ a witness.” State v. Womack, 
    591 S.W.2d 437
    , 444 (Tenn. Ct. App. 1979).
    We also note that the Harrison court did not factor Harrison’s psychologist’s potential as
    a witness for either party into its analysis of Harrison’s standing to challenge the
    subpoena issued to his psychologist. 
    Harrison, 270 S.W.3d at 26
    . In fact, the court
    found that Harrison had standing to challenge the subpoena despite the fact that he “did
    not intend to call Dr. Wilson as a witness at trial or to rely on Dr. Wilson’s records as
    evidence in his case-in-chief at trial,” 
    id., because he
    had “a legitimate personal interest
    in the report and records of the clinical psychologist he retained to ascertain whether he is
    competent to stand trial and whether he could viably assert an insanity defense,” 
    id. at 29.
    Finally, we disagree with the State that it has standing to challenge the
    subpoenas because it is in “the best position to assist the trial court” in determining
    whether the subpoenas amount to an impermissible “fishing expedition.” The record
    establishes that the information that is the subject of the subpoenas is and always has
    -24-
    been in the exclusive control of the witnesses and the providers. Indeed, the record
    suggests that the State has gone to great lengths to avoid collecting the requested
    information. Under these circumstances, we cannot see how the State is in a unique
    position to comment on the content of the information requested. Indeed, the State
    appears to have engaged in a “hide the ball” strategy which is inimical to the
    constitutional rights laboriously described above.
    Because the State has failed to establish that it has a legitimate interest in
    the subpoenas at issue, we conclude that the State lacks standing to challenge the
    subpoenas. In consequence, we reverse the trial court’s ruling that the State had standing
    to challenge the subpoenas issued to the witnesses in this case and affirm the trial court’s
    ruling that the State did not have standing to challenge the subpoenas issued to the
    service providers.
    Although our conclusion that the State lacks standing to challenge the
    subpoenas renders the remaining issues nonjusticiable, in the interests of judicial
    economy and potential further appellate review, we address the merits of each party’s
    claim regarding the subpoenas.
    II. Remaining Issues
    At this point we provide a brief reminder of the events that led to this
    appeal. The defendants moved the trial court in August 2015 for a court order to
    accompany subpoenas duces tecum issued to AT&T, Facebook, Twitter, Instagram,
    Snapchat, and Yik Yak to obtain the electronic communications of four State’s witnesses.
    The defendants argued that the information was relevant, material, necessary to prepare
    for trial, and not obtainable from any other source. At the hearing, the defendants did not
    suggest the time period to be covered by the subpoenas or the precise scope of the
    information requested, asking generally for “social media information and
    communications material and relevant to the events at issue.” Following the hearing, the
    trial court granted the defendants’ request, finding “that specific and articulable facts
    establish[ed] reasonable grounds to believe that records and information pertaining to
    designated cellular telephone and social media communications are relevant and material
    to a pending criminal matter.” The subpoenas issued to AT&T demanded essentially
    every piece of data associated with the cellular telephone accounts of C.C. and Ms. Lawn,
    including “account records, . . . call detail records . . . , audio recordings, saved contacts,
    geolocation data, text messages or iMessages sent or received, photographs, video
    recordings, and voicemail messages” for the period beginning on November 1, 2014, and
    ending with the date of subpoena compliance. The subpoenas issued to the social media
    providers similarly asked for every piece of data associated with the accounts of all four
    witnesses, both the basic non-content information related to the account and the entirety
    -25-
    of the contents of the electronic communications, for the period beginning January 1,
    2014, and ending with the date of subpoena compliance.
    After the defendants received pushback from four of the social media
    providers and after learning that AT&T did not possess the content information the
    defendants desired, the defendants notified the trial court of their intention to issue
    subpoenas directly to the four witnesses asking for identical information. Those
    subpoenas issued in September 2015. Only C.C. attempted to comply with the
    subpoenas, sending printouts from some social media sites accompanied by a letter to the
    trial court explaining why she was unable to provide more information.
    The defendants asked that the witnesses be held in contempt for their
    failure to fully comply with the subpoenas, and the State moved to quash the subpoenas.
    The trial court granted the State’s motion to quash the subpoenas issued to the four
    witnesses on grounds that the materials covered by the subpoenas qualified as
    “statements of witnesses,” which cannot be obtained by a Rule 17 subpoena. The court
    also concluded that the subpoenas were unreasonable and oppressive because the
    witnesses had been unable to comply despite their best efforts to do so.
    In this appeal, the State maintains that the trial court correctly concluded
    that the requested information qualified as witness statements, rendering them
    undiscoverable by subpoena, and that the subpoenas were unreasonable and oppressive.
    The State also contends that the trial court’s decision to quash the subpoenas to the
    witnesses did not violate the defendants’ constitutional rights to compulsory process and
    to present a defense. The defendants assert that the trial court erred on all points.
    A. What Can the Defendants Obtain?
    Both the state and federal constitutions guarantee a criminal accused the
    right to compulsory process for obtaining evidence in his favor. See U.S. Const. Amend.
    VI (“In all criminal prosecutions, the accused shall enjoy the right . . . to have
    compulsory process for obtaining witnesses in his favor, and to have the Assistance of
    Counsel for his defence.”); Tenn. Const. art. I, § 9.
    Because [Sixth Amendment] rights are basic to our adversary
    system of criminal justice, they are part of the ‘due process of
    law’ that is guaranteed by the Fourteenth Amendment to
    defendants in the criminal courts of the States. The rights to
    notice, confrontation, and compulsory process, when taken
    together, guarantee that a criminal charge may be answered in
    a manner now considered fundamental to the fair
    -26-
    administration of American justice—through the calling and
    interrogation of favorable witnesses, the cross-examination of
    adverse witnesses, and the orderly introduction of evidence.
    In short, the Amendment constitutionalizes the right in an
    adversary criminal trial to make a defense as we know it.
    Faretta v. California, 
    422 U.S. 806
    , 818 (1975); see also Washington v. Texas, 
    388 U.S. 14
    , 18 (1967) (“The right of an accused to have compulsory process for obtaining
    witnesses in his favor stands on no lesser footing than the other Sixth Amendment rights
    that we have previously held applicable to the States.”).
    In constitutional law, as in all things in life, however, there are limits. “The
    accused does not have an unfettered right to offer [evidence] that is incompetent,
    privileged, or otherwise inadmissible under standard rules of evidence. The Compulsory
    Process Clause provides him with an effective weapon, but it is a weapon that cannot be
    used irresponsibly.” 
    Taylor, 484 U.S. at 410
    ; Chambers v. Mississippi, 
    410 U.S. 284
    ,
    295 (1973) (observing that the criminal defendant’s right to present evidence “is not
    absolute and may, in appropriate cases, bow to accommodate other legitimate interests in
    the criminal trial process”). Indeed, “[t]he adversary process could not function
    effectively without adherence to rules of procedure that govern the orderly presentation
    of facts and arguments to provide each party with a fair opportunity to assemble and
    submit evidence to contradict or explain the opponent’s case.” 
    Taylor, 484 U.S. at 410
    -
    11. “Rules that provide for pretrial discovery . . . . minimize[] the risk that a judgment
    will be predicated on incomplete, misleading, or even deliberately fabricated” evidence.
    
    Id. at 411-12.
    In addition to the constitutional right to compulsory process, our Code
    contains a statutory right to compulsory process, see T.C.A. § 40-17-105 (“As provided
    by the Constitution of Tennessee, the accused, in all criminal prosecutions, has a right to
    meet the witnesses face to face, and to have compulsory process for obtaining witnesses
    in the accused’s favor.”), and provides that Rule 17 of the Tennessee Rules of Criminal
    Procedure “shall govern when a clerk or other authorized officer of the court is required
    to issue a subpoena in a criminal case in criminal court and the consequences of a
    person’s refusal to appear, testify or produce evidence when subpoenaed,” see 
    id. § 40-
    17-122.
    Tennessee Rule of Criminal Procedure 17 provides, in pertinent part, as
    follows:
    -27-
    (d) Documents and Objects. A subpoena may order a person
    to produce the books, papers, documents, or other objects the
    subpoena designates.
    (1) Production to Permit Inspection. The court may direct
    that the designated items be produced in court before trial or
    before they are to be offered in evidence. When the items
    arrive, the court may permit the parties and their attorneys to
    inspect all or part of them.
    (2) Compliance Unreasonable. On motion made promptly
    and in any event by the time specified in the subpoena for
    compliance therewith, the court may quash or modify the
    subpoena if compliance would be unreasonable or oppressive.
    The court may condition denial of the motion on the
    advancement by the party in whose behalf the subpoena is
    issued of the reasonable cost of producing the books, papers,
    documents, or other objects.
    ....
    (g) Contempt. When a subpoena is served on a person, the
    court issuing the subpoena may deem the person’s refusal to
    obey the subpoena to be contempt of court unless the person
    has an adequate excuse.
    (h) Information not Subject to Subpoena. Statements by
    witnesses or prospective witnesses may not be subpoenaed
    from the state or the defendant under this rule, but are subject
    to production only in accordance with the provisions of Rule
    26.2.
    Tenn. R. Crim. P. 17(d), (g)-(h).
    Against this backdrop, we begin our analysis with the claim we believe to
    be the easiest to dispose of: that the subpoenaed materials were “statements by witnesses”
    and were thus undiscoverable pursuant to the rules of criminal procedure. Rule 17 is
    “similar to its federal counterpart” in that it “makes it clear that the proper method to
    secure witness statements from the opposing side--either at trial or at a pretrial hearing
    under Rule 12(b)--is as set forth in Rule 26.2.” Tenn. R. Crim. P. 17, Advisory Comm’n
    Comments (emphasis added). Rule 26.2 provides that
    -28-
    [a]fter a witness other than the defendant has testified on
    direct examination, the court, on motion of a party who did
    not call the witness, shall order the attorney for the state or
    the defendant and the defendant’s attorney to produce, for the
    examination and use of the moving party, any statement of
    the witness that is in their possession and that relates to the
    subject matter of the witness’s testimony.
    Tenn. R. Crim. P. 26.2(a). As used in Rule 26.2, and by extension, Rule 17, the term
    “witness’s statement” means: “(1) A written statement that the witness makes and signs,
    or otherwise adopts or approves; or (2) A substantially verbatim, contemporaneously
    recorded recital of the witness’s oral statement that is contained in a stenographic,
    mechanical, electrical, or other recording or a transcription of such a statement.” Tenn.
    R. Crim. P. 26.2(f).
    Based upon the plain language of the two rules, neither operates to bar the
    subpoenas for the electronic communications in this case. First, the defendants did not
    attempt to subpoena any of the electronic communications “from the [S]tate” as
    prohibited by Rule 17 because, as the State has made clear, none of the desired
    communications has ever been in the possession of the State. See Tenn. R. Crim. P.
    17(h). Additionally, because the communications have never been in the possession of
    the State, they do not fall within the purview of Rule 26.2, which only governs the
    production of “any statement of the witness that is in the[] possession [of the non-moving
    party] and that relates to the subject matter of the witness’s testimony.” Tenn. R. Crim.
    P. 26.2(a). As indicated earlier, the record suggests that the State has gone to great
    lengths to avoid collecting any of the communications sought by the defendants. Second,
    the communications do not fall within the definition of “witness’s statement[s]” provided
    in Rule 26.2. Nothing in the record suggests that any of the electronic communications
    consists of either “[a] written statement that the witness makes and signs, or otherwise
    adopts or approves” or “[a] substantially verbatim, contemporaneously recorded recital of
    the witness’s oral statement that is contained in a stenographic, mechanical, electrical, or
    other recording or a transcription of such a statement.” See Tenn. R. Crim. P. 26.2(f).
    Our conclusion that the rules of criminal procedure do not expressly
    prohibit the defendants from seeking the electronic communications via Rule 17
    subpoena does not end our inquiry.
    The Supreme Court has “recognized” that “the subpoena duces tecum”
    provided for in the federal counterpart to Rule 17 “was not intended to provide a means
    of discovery for criminal cases” and that “its chief innovation was to expedite the trial by
    -29-
    providing a time and place before trial for the inspection of subpoenaed materials.”13
    
    Nixon, 418 U.S. at 698-99
    (citing Bowman Dairy 
    Co., 341 U.S. at 220
    ). Importantly, “[a]
    subpoena for documents may be quashed if their production would be ‘unreasonable or
    oppressive,’ but not otherwise.” 
    Id. at 698.
    In consequence, the party seeking production
    of evidence via the federal rule prior to trial must show:
    (1) that the documents are evidentiary and relevant; (2) that
    they are not otherwise procurable reasonably in advance of
    trial by exercise of due diligence; (3) that the party cannot
    properly prepare for trial without such production and
    inspection in advance of trial and that the failure to obtain
    such inspection may tend unreasonably to delay the trial; and
    (4) that the application is made in good faith and is not
    intended as a general ‘fishing expedition.’
    
    Nixon, 418 U.S. at 699-700
    . To carry this burden, the moving party “must clear three
    hurdles: (1) relevancy; (2) admissibility; (3) specificity.” 
    Id. at 700.
    The defendants
    argue that they have met this burden. The State argues that they have not.
    The decision whether to enforce “a pretrial subpoena duces tecum must
    necessarily be committed to the sound discretion of the trial court since the necessity for
    the subpoena most often turns upon a determination of factual issues.” 
    Id., 418 U.S.
    at
    702.
    In Nixon, the Special Prosecutor handling the indictment of John N.
    Mitchell, H. R. Haldeman, John D. Ehrlichman, Charles W. Colson, Robert C. Mardian,
    Kenneth W. Parkinson, and Gordon Strachan on charges of conspiracy to defraud the
    United States and obstruction of justice caused to be issued a subpoena directed at
    President Nixon, who had been named in the indictment as an unindicted co-conspirator,
    to produce “in advance of the September 9 trial date . . . certain tapes, memoranda,
    papers, transcripts or other writings relating to certain precisely identified meetings
    between the President and others.” 
    Nixon, 418 U.S. at 686
    , 689. “The Special Prosecutor
    was able to fix the time, place, and persons present at these discussions because the
    White House daily logs and appointment records had been delivered to him.” 
    Id. at 689.
    13
    Given that Tennessee Rule of Criminal Procedure 17 is adapted from and therefore similar to
    Federal Rule of Criminal Procedure 17, we see no reason to treat the application of our rule any
    differently. See State v. Lori A. Little, No. M1999-00858-CCA-R3-CD (Tenn. Crim. App., Nashville,
    Nov. 22, 2000) (stating that Tennessee Rule of Criminal Procedure 17 “is essentially identical to the
    federal counterpart in the Federal Rules of Criminal Procedure”).
    -30-
    The Supreme Court determined that although “the contents of the subpoenaed tapes could
    not at that stage be described fully by the Special Prosecutor,” the evidence offered by the
    Special prosecutor in the form of “the sworn testimony or statements of one or more of
    the participants in the conversations as to what was said at the time” as well as “the
    identity of the participants and the time and place of the conversations,” evinced “a
    sufficient likelihood that each of the tapes contains conversations relevant to the offenses
    charged in the indictment.” 
    Id. at 700.
    The Court also concluded that the Special
    Prosecutor had made “a sufficient preliminary showing that each of the subpoenaed tapes
    contains evidence admissible with respect to the offenses charged in the indictment.” 
    Id. In addition
    to “valid potential evidentiary uses” for the requested materials, the Supreme
    Court noted that “the analysis and possible transcription of the tapes may take a
    significant period of time,” which supported their being produced prior to trial. 
    Id. at 702.
    With this foundation, we turn to the present case.
    With regard to relevancy, the evidence presented by the defendants
    supports a conclusion that the four witnesses named in the subpoenas communicated
    electronically, either via text message or social media, about the party where the events
    transpired and the offenses themselves. Although the defendants cannot describe fully
    the contents of the electronic communications, the ubiquitous nature of electronic
    communication and the type of “smart phones” used to send text messages and engage in
    social media, see Riley v. California, 
    134 S. Ct. 2473
    , 2484 (2014) (observing that
    “modern cell phones . . . are now such a pervasive and insistent part of daily life that the
    proverbial visitor from Mars might conclude they were an important feature of human
    anatomy”), coupled with the admissions by various witnesses about their electronic
    communications relevant to the offenses, “permit a rational inference that at least part of
    the conversations relate to the offenses charged in the indictment,” 
    Nixon, 418 U.S. at 700
    .
    With regard to admissibility, we observe, as did the Court in Nixon, that the
    requested communications are “a collection of out-of-court statements by declarants who
    will not be subject to cross-examination.” 
    Id. That being
    said, the rules of evidence do
    not bar the admission of all out-of-court statements so long as they fit within an exception
    to the hearsay rule. Additionally, as was the case in Nixon, the requested materials “may
    also be admissible for the limited purpose of impeaching the credibility of” any witness
    who testifies at trial. 
    Id. at 701
    (observing that “[g]enerally, the need for evidence to
    impeach witnesses is insufficient to require its production in advance of trial” but pretrial
    production is justified when “there are other valid potential evidentiary uses for the same
    material” and the production “may take a significant period of time”).
    -31-
    This brings us to the demand included in the subpoenas that C.C. and Ms.
    Lawn produce their cellular telephones for inspection and examination. Nothing at the
    hearing on the defendants’ motion suggested that the defendants were seeking production
    of the cellular telephones themselves, and the trial court made no findings in this regard.
    The defendants presented no evidence of a need for production of the cellular telephones.
    Indeed, the evidence presented at the hearing and other evidence included in the record
    indicates that both women had replaced their cellular telephone handsets within days of
    one another in January 2015 and that C.C. had sold her old handset online, despite
    expressing to the police that the handset was not in working order, and that Ms. Lawn had
    disposed of hers as well. Based on these facts, the defendants have failed to establish that
    pretrial production of the cellular telephone handsets is likely to produce relevant,
    admissible evidence.14
    Finally, we observe that although the defendants’ arguments, both in their
    motion and at the hearing, suggested subpoenas for the production of electronic
    communications about the offenses made during the period of time surrounding the
    offenses and the ensuing investigation, the subpoenas actually issued in this case lack that
    same specificity. The subpoenas request from the social media providers and the four
    witnesses every piece of both content-related and non-content-related electronic
    communications generated by the four witnesses for the 18-month period prior to the
    issuance of the subpoenas. This broad, general request spanning a lengthy and open-
    ended time frame finds no support in either the case law or the record. As indicated, the
    defendants have established that some of the witnesses’ electronic communications are
    likely to contain relevant, admissible evidence. The relevant time frame for the
    14
    We also question whether the type of inspection of the cellular telephone handsets
    contemplated by the subpoenas in this case is permissible via a Rule 17 subpoena following the Supreme
    Court’s decision in Riley. There, the Court observed that “[t]oday . . . it is no exaggeration to say that
    many of the more than 90% of American adults who own a cell phone keep on their person a digital
    record of nearly every aspect of their lives—from the mundane to the intimate,” 
    Riley, 134 S. Ct. at 2490
    (citing Ontario v. Quon, 
    560 U.S. 746
    , 760 (2010)), and concluded that the government could not search
    the contents of a cellular telephone seized incident to an arrest without either obtaining a search warrant
    or proving that exigent circumstances required the warrantless search of the phone:
    Modern cell phones are not just another technological convenience.
    With all they contain and all they may reveal, they hold for many
    Americans “the privacies of life.” The fact that technology now allows
    an individual to carry such information in his hand does not make the
    information any less worthy of the protection for which the Founders
    fought. Our answer to the question of what police must do before
    searching a cell phone seized incident to an arrest is accordingly
    simple—get a warrant.
    
    Riley, 134 S. Ct. at 2494-95
    .
    -32-
    electronic communications of Ms. Lawn, Ms. Boland, and Ms. Tavares, based upon the
    evidence and argument presented at this stage in the proceedings, would be the period
    beginning the day of the party and ending when the witnesses were cautioned by the KPD
    to avoid discussing the offenses on social media. Because of the nature of the
    relationship alleged between C.C. and Mr. Johnson, the relevant time frame for her
    electronic communications would be broader, spanning from the beginning of their
    relationship until she closed her social media accounts.
    In summary, the defendants established, under the Nixon standard, an
    entitlement to pretrial production of the electronic communications of each of the
    witnesses within the above-described relevant time frames. Because the subpoenas
    actually issued lack specificity as discussed, rendering them overly broad, we would have
    concluded that the subpoenas should be modified to require the production only of those
    materials as outlined above had we not previously concluded that the State lacked
    standing to challenge the subpoenas.
    B. From Whom Can the Defendants Obtain Information?
    Having determined what the defendants are entitled to, we now consider
    from whom they may acquire it.
    1. Service Providers
    In the trial court, the social media providers responded to the subpoena by
    letter stating that the terms of the Stored Communications Act (“SCA”), which is part of
    the Electronic Communications Protection Act (“ECPA”), forbade the disclosure of the
    contents of the witnesses’ electronic communications to the defendants via a Rule 17
    subpoena. The record does not contain any objections from either AT&T or YikYak.
    AT&T did indicate via letter that it did not possess any electronic communications.
    YikYak indicated that it would comply with the subpoenas. None of the providers joined
    the State’s motion to quash. The trial court concluded that the State lacked standing to
    challenge the subpoenas to the service providers, and we agree with this ruling, as we
    held above. Because the trial court found that the State lacked standing to challenge
    those subpoenas, those subpoenas remain intact, and the court did not consider the
    application of the SCA at the November 3 hearing that is the subject of this interlocutory
    appeal. The trial court did, however, conclude following the August 24, 2015 hearing
    that the defendants could obtain the electronic communications from the service
    providers under the terms of the SCA. As we indicated before, we are addressing those
    issues for which the record is adequate for our review both to promote judicial efficiency
    in this case, which has already been pending for more than two years, and to facilitate
    potential further appellate review. For those same reasons and to provide guidance to the
    -33-
    trial court upon remand, we will address the application of the SCA to the subpoenas
    issued to the service providers in this case.
    The trial court, the parties, and the providers assumed without analysis that
    the SCA applied to the social media communications requested by the defendants. As we
    discuss more fully below, the application of the SCA to these communications is not
    quite so clear.
    “The privacy of stored Internet communications in the United States is
    governed by” the SCA, which “was enacted in 1986 as part of the Electronic
    Communications Privacy Act.” Orin S. Kerr, A User’s Guide to the Stored
    Communications Act, and A Legislator’s Guide to Amending It, 72 Geo. Wash. L. Rev.
    1208 (2004). Because electronic communication development has far outpaced the
    development of the law in the area of constitutionally-based privacy protections for those
    communications, Congress passed the SCA to bridge the gap by “creat[ing] a set of
    Fourth Amendment-like privacy protections by statute, regulating the relationship
    between government investigators and service providers in possession of users’ private
    information.” 
    Id. at 1212.
    The SCA accomplishes this by limiting “the government’s
    ability to compel providers to disclose information in their possession about their
    customers and subscribers” and by limiting “the ability of [internet service providers] to
    voluntarily disclose information about their customers and subscribers to the
    government.” 
    Id. at 1212–13.
    “The SCA provides privacy protection to communications
    held” in electronic storage by “providers of electronic communication service . . . and
    providers of remote computing service.” 
    Id. at 1213–14.15
    “The Stored Communications Act is best understood by considering its
    operation and purpose in light of the technology that existed in 1986” because it “is not
    built around clear principles that are intended to easily accommodate future changes in
    technology; instead, Congress chose to draft a complex statute based on the operation of
    early computer networks.” William Jeremy Robison, Free at What Cost?: Cloud
    Computing Privacy Under the Stored Communications Act, 98 Geo. L.J. 1195, 1204–05
    (2010). For this reason, it is necessary to understand how computing operated at that
    time in order to understand how the SCA might be applied to more recent innovations
    such as social media networks.
    The United States Code defines “electronic communication service”
    (“ECS”) as “any service which provides to users thereof the ability to send or receive
    wire or electronic communications.” 18 U.S.C. § 2510(15). Electronic storage is both
    15
    As the author points out, “the distinction that the SCA draws reflects the technology of the
    1980s.” 
    Id. at 1213.
                                                    -34-
    “any temporary, intermediate storage of a wire or electronic communication incidental to
    the electronic transmission thereof” and “any storage of such communication by an
    electronic communication service for purposes of backup protection of such
    communication.” 
    Id. § 2510(17).
    Because “Congress explored” the ECS category
    “primarily through the lens of early electronic mail systems,” which “[a]t the time, . . .
    operated through a fragmented delivery system in which communications were slowly
    transmitted between the computer servers operated by e-mail providers,” the resulting
    definition of electronic storage is “rather odd” and “much narrower than its name
    suggests.” 
    Robison, supra
    , 1205-06.
    The Code defines “remote computing service” (“RCS”) as “the provision to
    the public of computer storage or processing services by means of an electronic
    communications system.” 
    Id. § 2711(2).
    “Congress created” this category “to address
    third-party service providers that offered ‘sophisticated and convenient computing
    services to subscribers and customers from remote facilities.’” 
    Robison, supra
    , 1206
    (quoting S. REP. NO. 99-541, at 10 (1986), reprinted in 1986 U.S.C.C.A.N. 3555). At
    the time Congress adopted the SCA, “outsourced computing was a service marketed to
    ‘businesses of all sizes--hospitals, banks and many others,’ rather than individual
    consumers,” and, as a result, “[t]he requirements for RCS precisely describe the nature of
    the commercial relationship that existed at the time of the Act’s adoption between the
    outsourced computing providers and their business clientele.” 
    Robison, supra
    , 1207.
    A few remaining definitions are in order. Electronic communication is
    defined as
    any transfer of signs, signals, writing, images, sounds, data, or
    intelligence of any nature transmitted in whole or in part by a
    wire, radio, electromagnetic, photoelectronic or photooptical
    system that affects interstate or foreign commerce, but does
    not include—
    (A) any wire or oral communication;
    (B) any communication made through a tone-only
    paging device;
    (C) any communication from a tracking device (as
    defined in section 3117 of this title); or
    (D) electronic funds transfer information stored by a
    financial institution in a communications system used for the
    electronic storage and transfer of funds.
    18 U.S.C. § 2510(12). “‘[G]overnmental entity’ means a department or agency of the
    United States or any State or political subdivision thereof.” 
    Id. § 2711(4).
    “‘[C]ontents’,
    -35-
    when used with respect to any wire, oral, or electronic communication, includes any
    information concerning the substance, purport, or meaning of that communication.” 
    Id. § 2510(8).
    The SCA makes it a crime for anyone to “intentionally access[] without
    authorization a facility through which an electronic communication service is provided”
    or “intentionally exceed[] an authorization to access that facility” and use that access to
    “obtain[], alter[], or prevent[] authorized access to a wire or electronic communication
    while it is in electronic storage in such system.” 
    Id. § 2701(a).
    This provision is
    inapplicable “to conduct authorized . . . by the person or entity providing a wire or
    electronic communications service; . . . by a user of that service with respect to a
    communication of or intended for that user; or . . . in section 2703, 2704 or 2518 of this
    title.” 
    Id. § 2701(c).
    Code section 2702, which regulates the voluntary disclosure of information
    provides, in pertinent part, as follows:
    (a) Prohibitions.--Except as provided in subsection (b) or (c)--
    (1) a person or entity providing an electronic
    communication service to the public shall not knowingly
    divulge to any person or entity the contents of a
    communication while in electronic storage by that service;
    and
    (2) a person or entity providing remote computing service
    to the public shall not knowingly divulge to any person or
    entity the contents of any communication which is carried
    or maintained on that service--
    (A) on behalf of, and received by means of electronic
    transmission from (or created by means of computer
    processing of communications received by means of
    electronic transmission from), a subscriber or customer
    of such service;
    (B) solely for the purpose of providing storage or
    computer processing services to such subscriber or
    customer, if the provider is not authorized to access the
    contents of any such communications for purposes of
    providing any services other than storage or computer
    processing; and
    (3) a provider of remote computing service or electronic
    communication service to the public shall not knowingly
    divulge a record or other information pertaining to a
    -36-
    subscriber to or customer of such service (not including
    the contents of communications covered by paragraph (1)
    or (2)) to any governmental entity.
    (b) Exceptions for disclosure of communications.-- A
    provider described in subsection (a) may divulge the contents
    of a communication--
    (1) to an addressee or intended recipient of such
    communication or an agent of such addressee or intended
    recipient;
    (2) as otherwise authorized in section 2517, 2511(2)(a), or
    2703 of this title;
    (3) with the lawful consent of the originator or an
    addressee or intended recipient of such communication, or
    the subscriber in the case of remote computing service;
    ....
    (c) Exceptions for disclosure of customer records.--A
    provider described in subsection (a) may divulge a record or
    other information pertaining to a subscriber to or customer of
    such service (not including the contents of communications
    covered by subsection (a)(1) or (a)(2))--
    (1) as otherwise authorized in section 2703;
    (2) with the lawful consent of the customer or subscriber;
    ....
    
    Id. § 2702(a)-(c).
    Section 2703, which governs compelled disclosure of electronic
    communications, provides:
    (a) Contents of wire or electronic communications in
    electronic storage.--A governmental entity may require the
    disclosure by a provider of electronic communication service
    of the contents of a wire or electronic communication, that is
    in electronic storage in an electronic communications system
    for one hundred and eighty days or less, only pursuant to a
    warrant issued using the procedures described in the Federal
    Rules of Criminal Procedure (or, in the case of a State court,
    issued using State warrant procedures) by a court of
    -37-
    competent jurisdiction. A governmental entity may require
    the disclosure by a provider of electronic communications
    services of the contents of a wire or electronic communication
    that has been in electronic storage in an electronic
    communications system for more than one hundred and
    eighty days by the means available under subsection (b) of
    this section.
    (b) Contents of wire or electronic communications in a
    remote computing service.--(1) A governmental entity may
    require a provider of remote computing service to disclose the
    contents of any wire or electronic communication to which
    this paragraph is made applicable by paragraph (2) of this
    subsection--
    (A) without required notice to the subscriber or customer,
    if the governmental entity obtains a warrant issued using
    the procedures described in the Federal Rules of Criminal
    Procedure (or, in the case of a State court, issued using
    State warrant procedures) by a court of competent
    jurisdiction; or
    (B) with prior notice from the governmental entity to the
    subscriber or customer if the governmental entity--
    (i) uses an administrative subpoena authorized by a
    Federal or State statute or a Federal or State grand jury
    or trial subpoena; or
    (ii) obtains a court order for such disclosure under
    subsection (d) of this section;
    except that delayed notice may be given pursuant to
    section 2705 of this title.
    (2) Paragraph (1) is applicable with respect to any wire or
    electronic communication that is held or maintained on that
    service--
    (A) on behalf of, and received by means of electronic
    transmission from (or created by means of computer
    processing of communications received by means of
    electronic transmission from), a subscriber or customer of
    such remote computing service; and
    (B) solely for the purpose of providing storage or
    computer processing services to such subscriber or
    customer, if the provider is not authorized to access the
    contents of any such communications for purposes of
    -38-
    providing any services other than storage or computer
    processing.
    (c) Records concerning electronic communication service or
    remote computing service.--(1) A governmental entity may
    require a provider of electronic communication service or
    remote computing service to disclose a record or other
    information pertaining to a subscriber to or customer of such
    service (not including the contents of communications) only
    when the governmental entity—
    (A) obtains a warrant issued using the procedures
    described in the Federal Rules of Criminal Procedure (or,
    in the case of a State court, issued using State warrant
    procedures) by a court of competent jurisdiction;
    (B) obtains a court order for such disclosure under
    subsection (d) of this section;
    (C) has the consent of the subscriber or customer to such
    disclosure;
    (D) submits a formal written request relevant to a law
    enforcement investigation concerning telemarketing fraud
    for the name, address, and place of business of a
    subscriber or customer of such provider, which subscriber
    or customer is engaged in telemarketing (as such term is
    defined in section 2325 of this title); or
    (E) seeks information under paragraph (2).
    (2) A provider of electronic communication service or remote
    computing service shall disclose to a governmental entity the-
    (A) name;
    (B) address;
    (C) local and long distance telephone connection records,
    or records of session times and durations;
    (D) length of service (including start date) and types of
    service utilized;
    (E) telephone or instrument number or other subscriber
    number or identity, including any temporarily assigned
    network address; and
    (F) means and source of payment for such service
    (including any credit card or bank account number),
    of a subscriber to or customer of such service when the
    governmental entity uses an administrative subpoena
    authorized by a Federal or State statute or a Federal or State
    -39-
    grand jury or trial subpoena or any means available under
    paragraph (1).
    (3) A governmental entity receiving records or information
    under this subsection is not required to provide notice to a
    subscriber or customer.
    (d) Requirements for court order.--A court order for
    disclosure under subsection (b) or (c) may be issued by any
    court that is a court of competent jurisdiction and shall issue
    only if the governmental entity offers specific and articulable
    facts showing that there are reasonable grounds to believe that
    the contents of a wire or electronic communication, or the
    records or other information sought, are relevant and material
    to an ongoing criminal investigation. In the case of a State
    governmental authority, such a court order shall not issue if
    prohibited by the law of such State. A court issuing an order
    pursuant to this section, on a motion made promptly by the
    service provider, may quash or modify such order, if the
    information or records requested are unusually voluminous in
    nature or compliance with such order otherwise would cause
    an undue burden on such provider.
    18 U.S.C. § 2703(a)-(d).
    Importantly, the SCA draws a distinction between content, “the
    communication that a person wishes to share or communicate with another person,” and
    non-content, “information about the communication that the network uses to deliver and
    process the content information” such as basic subscriber information. 
    Kerr, supra
    ,
    1227-28. Kerr explains that “[t]he rules for compelled disclosure operate like an upside-
    down pyramid” such that “[t]he higher up the pyramid you go, the more information the
    government can obtain.” 
    Id. at 1222.
    At the lowest threshold, only a simple subpoena is needed to
    compel basic subscriber information. Higher up the pyramid,
    a 2703(d) order compels all noncontent records. A simple
    subpoena combined with prior notice compels three
    categories of information: basic subscriber information, plus
    any opened e-mails or other permanently held files (covered
    by the RCS rules), plus any contents in temporary “electronic
    storage” such as unretrieved e-mails in storage for more than
    -40-
    180 days. A 2703(d) order plus prior notice is sufficient to
    compel all noncontent records, plus any opened e-mails or
    other permanently held files (covered by the RCS rules), plus
    any contents in temporary “electronic storage” such as
    unretrieved e-mails in storage for more than 180 days. Put
    another way, a 2703(d) order plus prior notice compels
    everything except contents in temporary “electronic storage”
    180 days or less. Finally, a search warrant is needed to
    compel everything stored in an account.
    
    Id. at 1222-23
    (footnotes omitted); see also Matter of Warrant to Search a Certain E–
    Mail Account Controlled & Maintained by Microsoft Corp., 
    829 F.3d 197
    , 207-08 (2d
    Cir. 2016) (hereinafter “Microsoft”).16 “Data stored by a remote computing service
    (RCS) . . . receives fewer privacy protections than communications held by an ECS.”
    
    Robison, supra
    , 1208.
    Because the framework created in the SCA relies entirely on 1986
    computing technology, determining the precise scope of its application to the type of
    social media communications at issue in this case presents difficulties. See Konop v.
    Hawaiian Airlines, Inc., 
    302 F.3d 868
    , 874 (9th Cir. 2002) (observing that application of
    the SCA “‘is a complex, often convoluted, area of the law’” and that “the existing
    statutory framework is ill-suited to address modern forms of communication”). Those
    16
    The Second Circuit Court of Appeals echoed Kerr’s observation that section 2703 “sets up a
    pyramidal structure governing conditions under which service providers must disclose stored
    communications to the government.” The court explained,
    Basic subscriber and transactional information can be obtained simply
    with an administrative subpoena. Other non-content records can be
    obtained by a court order (a “§ 2703(d) order”) . . . . The government
    may also obtain some user content with an administrative subpoena or a
    § 2703(d) order, but only if notice is provided to the service provider’s
    subscriber or customer. § 2703(b)(1)(B). To obtain “priority stored
    communications” (our phrase), as described below, the Act generally
    requires that the government first secure a warrant that has been issued
    “using the procedures described in the Federal Rules of Criminal
    Procedure,” or using State warrant procedures, both of which require a
    showing of probable cause. Priority stored communications fall into two
    categories: For electronic communications stored recently (that is, for
    less than 180 days) by an ECS, the government must obtain a warrant. §
    2703(a). For older electronic communications and those held by an
    RCS, a warrant is also required, unless the Government is willing to
    provide notice to the subscriber or customer.”).
    
    Microsoft, 829 F.3d at 207-08
    .
    -41-
    courts faced with the issue have concluded that the SCA is applicable to social media
    sites and that the SCA prohibits social media sites “from disclosing nonpublic contents
    without the user’s consent.” Steven S. Gensler, Special Rules for Social Media
    Discovery?, 
    65 Ark. L
    . Rev. 7, 26–28 (2012); see also Matter of Application of State for
    Commc’ns Data Warrants To Obtain the Contents of Stored Commc’ns From Twitter,
    Inc., From Users @ _ & @ _, ESS-147-CDW-16 & ESS-148-CDW-16., No. A-3651-
    15T4, 
    2017 WL 476218
    , at *7 (N.J. Super. Ct. App. Div. Feb. 2, 2017) (observing that
    “courts have uniformly concluded that communications sent to social media platforms or
    even private websites are clearly ‘electronic communications’ under the” SCA). The
    nuances of that application, however, have varied based upon the facts and circumstances
    of each individual case. For example, in Crispin v. Christian Audigier, Inc., the court
    concluded that the SCA applied to Facebook but that Facebook was an ECS as to some
    electronic communications on Facebook and an RCS as to others. See Crispin v.
    Christian Audigier, Inc., 
    717 F. Supp. 2d 965
    , 980-82 (C.D. Cal. 2010). In Ehling v.
    Monmouth-Ocean Hosp. Serv. Corp., the court concluded that “Facebook wall posts that
    are configured to be private meet all four criteria” to qualify as electronic
    communications held by an ECS. Ehling v. Monmouth-Ocean Hosp. Serv. Corp., 961 F.
    Supp. 2d 659, 667 (D.N.J. 2013). Other courts have concluded without detailed analysis
    that the SCA applies to social media websites and that those sites may not produce
    information except as provided by the SCA. See, e.g., People v. Harris, 
    945 N.Y.S.2d 505
    , 511 (Crim. Ct. 2012) (“If you look at the purpose and method of Twitter, it is clear
    to this court that Twitter is a service provider of electronic communication.”).
    We agree with those courts that have concluded that the SCA is applicable
    to communications shared on social media websites. Thus, the defendants could only
    obtain the witnesses’ communications from the social media providers if they satisfied
    the terms of the SCA. Analyzing the defendants’ requests using the pyramidal structure
    outlined above, we easily conclude that the defendants cannot obtain the contents of the
    witnesses’ social media accounts from the social media providers via a Rule 17 subpoena
    because the SCA requires a warrant to obtain those communications. 
    Microsoft, 829 F.3d at 207-08
    (“For electronic communications stored recently (that is, for less than 180 days)
    by an ECS, the government must obtain a warrant. For older electronic communications
    and those held by an RCS, a warrant is also required, unless the Government is willing to
    provide notice to the subscriber or customer.” (citations omitted)); see also Ryan A.
    Ward, Discovering Facebook: Social Network Subpoenas and the Stored
    Communications Act, 24 Harv. J.L. & Tech. 563, 568 (2011) (“[T]he government cannot
    obtain content information from public ECS or RCS providers without a search
    warrant.”).
    To obtain any information other than “[b]asic subscriber and transactional
    information,” which “can be obtained simply with an administrative subpoena,”
    -42-
    
    Microsoft, 829 F.3d at 207
    , the defendants had to show that (1) a defendant in a criminal
    case qualifies as a “governmental entity” under the terms of the SCA and (2) that the
    subpoena and order issued in this case satisfies the requirements of Code section 2703(d).
    Marc J. Zwillinger, Christian S. Genetski, Criminal Discovery of Internet
    Communications Under the Stored Communications Act: It’s Not A Level Playing Field,
    97 J. Crim. L. & Criminology 569, 587–88 (2007) (stating that “the court order exception
    contained in 18 U.S.C. § 2703(d) pertains only to the government and comes into play
    only when a governmental entity ‘offers specific and articulable facts showing that there
    are reasonable grounds to believe that the contents of a wire or electronic communication
    . . . are relevant and material to an ongoing criminal investigation.’ By definition, no
    criminal defendant or party to civil litigation could make this showing.”). At least one
    court has concluded that “[t]he SCA provides no direct mechanism for access by a
    criminal defendant to private communication content.” Facebook, Inc. v. Superior Court,
    
    192 Cal. Rptr. 3d 443
    , 450, review granted and opinion superseded sub nom. Facebook v.
    S.C., 
    362 P.3d 430
    (Cal. 2015). Another court has concluded that “the Office of the
    Federal Public Defender is not a ‘government entity’ within the meaning of § 2703.”
    United States v. Amawi, 
    552 F. Supp. 2d 679
    , 680 (N.D. Ohio 2008). Observing that the
    SCA defines that term “as ‘a department or agency of the United States or any State or
    political subdivision thereof,’” the Amawi court concluded that “[t]he judiciary is not a
    department or agency of the United States; thus, the judiciary and its components,
    including the Federal Public Defender, cannot obtain a court order under § 2703(d).” Id.;
    see also 
    Zwillinger, supra
    , 594 (“The purpose and plain text of the SCA make clear that
    the exceptions for governmental entities apply only to Fourth Amendment government
    actors--investigative agencies and prosecuting attorneys-- and not to criminal defendants,
    irrespective of whether they happen to be represented by a publicly funded criminal
    defender’s office.”). The Amawi court also observed that the SCA “distinguishes
    between courts, which issue orders, and government entities, which can apply for orders.”
    
    Id. We find
    this reasoning sound. Consequently, we would have held, had the issue been
    justiciable, that the defendants could not obtain any information directly from the social
    media providers under the terms of the SCA because they do not meet the definition of
    “governmental entity.” See 18 U.S.C. § 2711(4) (“‘[G]overnmental entity’ means a
    department or agency of the United States or any State or political subdivision thereof.”);
    
    id. at §
    2703(d) (stating that a court of competent jurisdiction may issue an order upon an
    application by a governmental entity); see also 
    Zwillinger, supra
    , at 584 (“None of the[]
    exceptions [in the SCA] provide a basis for a disclosure in response to a subpoena served
    by a criminal defendant, nor a court order secured at the defendant’s request.”).17
    2. Witnesses
    17
    We caution that our review of the SCA in this part is limited to the issue that has thus far arisen in the
    present case. We do not mean to suggest that the SCA passes constitutional scrutiny in all respects.
    -43-
    Although the defendants cannot obtain the witnesses’ electronic
    communications directly from the social media providers, nothing prevents them from
    obtaining the information as outlined above directly from the witnesses themselves. See
    John G. Browning, Digging for the Digital Dirt: Discovery and Use of Evidence from
    Social Media Sites, 14 SMU Sci. & Tech. L. Rev. 465, 473 (2011) (“The most effective
    methods of obtaining discovery of the contents of a party’s social networking profile are
    propounding specific, well-tailored discovery requests to the party himself . . . .”). By its
    terms, the SCA places limitations only on the service providers and not on the users of
    social media websites. See 18 U.S.C. § 2702(a); § 2703(a). The vast majority of cases
    make it clear that the type of electronic communications sought in this case fall clearly
    within the ambit of civil discovery when obtained from the account holder or user, and
    we see no reason that the same information should not also be available to criminal
    defendants via a Rule 17 subpoena, provided that they are able to make the showing
    required by Nixon.
    Although courts have indicated that privacy considerations may be
    implicated when dealing with electronic communications, see, e.g., United States v.
    Warshak, 
    631 F.3d 266
    , 283-88 (6th Circ. 2010), a privacy claim cannot place those
    communications totally beyond the reach of a criminal defendant who has shown that the
    communications are likely to contain relevant, material evidence. To hold otherwise
    would be to apply a sort of privilege to electronic communications that does not exist for
    other forms of communication, a privilege that would serve only “to withhold evidence
    that is demonstrably relevant in a criminal trial” and “cut deeply into the guarantee of due
    process of law and gravely impair the basic function of the courts.” 
    Nixon, 418 U.S. at 712
    . “Certain exemptions from” providing evidence “are recognized by all courts,”
    “[b]ut every such exemption is grounded in a substantial individual interest which has
    been found, through centuries of experience, to outweigh the public interest in the search
    for truth.” 
    Bryan, 339 U.S. at 332
    . As the Supreme Court observed,
    We have elected to employ an adversary system of criminal
    justice in which the parties contest all issues before a court of
    law. The need to develop all relevant facts in the adversary
    system is both fundamental and comprehensive. The ends of
    criminal justice would be defeated if judgments were to be
    founded on a partial or speculative presentation of the facts.
    The very integrity of the judicial system and public
    confidence in the system depend on full disclosure of all the
    facts, within the framework of the rules of evidence. To
    ensure that justice is done, it is imperative to the function of
    courts that compulsory process be available for the
    -44-
    production of evidence needed either by the prosecution or by
    the defense.
    
    Nixon, 418 U.S. at 709
    . Privileges erected by the Court to place evidence beyond the
    reach of compulsory process “are designed to protect weighty and legitimate competing
    interests. . . . Whatever their origins, these exceptions to the demand for every man’s
    evidence are not lightly created nor expansively construed, for they are in derogation of
    the search for truth.” 
    Id. at 709-10.
    Even where a privilege exists, such as in the case of
    the presidential communications at issue in Nixon, “[t]he generalized assertion of
    privilege must yield to the demonstrated, specific need for evidence in a pending criminal
    trial.” 
    Id. at 713.
    The defendants have satisfied the Nixon requirements with regard to those
    electronic communications falling within the relevant time frames outlined above. No
    evidence suggests that the witnesses enjoy a blanket privilege with regard to their
    electronic communications.18
    Moreover, we disagree with the trial court’s finding that the subpoenas
    issued to the witnesses were oppressive. First, the evidence relied on by the court to
    support this finding, the letter from Ms. Boland’s mother, does not indicate anything
    more than a minor difficulty in obtaining the requested information experienced by one
    of the witnesses. Ms. Boland’s mother complained to the assistant district attorney via
    email that Ms. Boland and her parents had had to spend several hours during a weekend
    visit attempting to comply with the subpoena. We hardly think this too onerous a burden
    when juxtaposed with the defendants’ constitutional trial rights. When put in perspective,
    the expense of a few hours’ time and a few dollars are less than “oppressive.” Courts
    have recognized that complying with that “fundamental maxim that the public . . . has a
    right to every man’s evidence,” 
    Bryan, 339 U.S. at 332
    , will necessarily involve
    “personal sacrifice” but that the sacrifice “is a part of the necessary contribution of the
    individual to the welfare of the public,” even when “onerous,” 
    Blair, 250 U.S. at 281
    .
    Conclusion
    We hold that the State lacks standing to challenge the subpoenas issued to
    C.C., Ms. Lawn, Ms. Boland, and Ms. Tavares. The State also lacks standing to
    challenge the subpoenas issued to any of the service providers in this case. Accordingly,
    we affirm in part and reverse in part the trial court’s November 3 order.
    18
    We note that although Federal Rule of Criminal Procedure 17 places additional requirements
    on requests for “the production of personal or confidential information about a victim,” see generally Fed.
    R. Crim. P. 17(c), Tennessee Rule of Criminal Procedure 17 does not contain similar requirements.
    -45-
    _________________________________
    JAMES CURWOOD WITT, JR., JUDGE
    -46-