As we reported last week, both chambers of the Texas legislature unanimously passed a shield law giving journalists qualified protection from disclosure of their sources and other confidential and non-confidential unpublished information collected as part of their newsgathering activities. On Thursday, Governor Perry signed the Texas Free Flow of Information Act, H.B. 670, making it law in Texas. The shield statute became effective immediately, and its enactment makes Texas the 37th state to pass some form of protection for journalists from state-court subpoenas.
Free press and journalist advocacy groups praised the move. The Executive Director of The Reporters Committee for Freedom of the Press stated that “[p]opular wisdom had it that Texas would never pass a shield law. It is remarkable that the Texas media, local prosecutors, state legislators and statewide elected officials agreed upon an innovative bill that will ensure information flows to the people of Texas."
Governor Perry issued a statement in which he praised the legislature's efforts in crafting the shield law, describing it as "a complex issue that required thoughtful consideration." Governor Perry continued, "I am pleased that lawmakers were able to strike a balance between protecting the rights of the people and the press."
One feature of the Texas statute that distinguishes it from some other shield laws is that it treats civil and criminal proceedings differently. We discussed the privilege in civil proceedings in a prior post. In criminal proceedings, a party seeking the identity of a confidential source may overcome the privilege if that party makes a clear and specific showing that:
- the journalist observed the source committing a felony and the party seeking the source's identity has exhausted all other alternative sources for the information;
- the source confessed a felony to the journalist and the party seeking the source's identity has exhausted all other alternative sources for the information;
- there is probable cause to believe that the source committed a felony and the party seeking the source's identity has exhausted all other alternative sources for the information; or
- disclosure of the course is reasonably necessary to stop or prevent reasonably certain death or bodily harm.
In criminal proceedings, when the party that issued the subpoena seeks unpublished information gathered by a journalist (as opposed to a confidential source of such information), in order to overcome the privilege the party must make a clear and specific showing that:
- all reasonable efforts have been exhausted to obtain the information from alternative sources; and
- the unpublished information, document, or item:
- is relevant and material to the proper administration of the official proceeding for which the testimony, production, or disclosure is sought and is essential to the maintenance of a claim or defense of the person seeking the testimony, production, or disclosure; or
- is central to the investigation or prosecution of a criminal case and based on something other than the assertion of the person requesting the subpoena, reasonable grounds exist to believe that a crime has occurred.
When considering an order to compel the disclosure of such information, the court should consider the following factors:
- the subpoena is overbroad, unreasonable, or oppressive;
- reasonable and timely notice was given of the demand for the information, document, or item;
- in this instance, the interest of the party subpoenaing the information outweighs the public interest in gathering and dissemination of news, including the concerns of the journalist; and
- the subpoena or compulsory process is being used to obtain peripheral, nonessential, or speculative information.
Add a comment
Archives
- January 2022
- June 2021
- March 2020
- August 2019
- March 2019
- October 2018
- July 2016
- June 2016
- May 2016
- February 2016
- November 2015
- September 2015
- July 2015
- April 2015
- March 2015
- February 2015
- January 2015
- December 2014
- November 2014
- October 2014
- July 2014
- March 2014
- July 2013
- June 2013
- April 2013
- March 2013
- October 2012
- September 2012
- August 2012
- April 2012
- March 2012
- February 2012
- January 2012
- November 2011
- September 2011
- June 2011
- May 2011
- April 2011
- February 2011
- January 2011
- December 2010
- October 2010
- September 2010
- August 2010
- July 2010
- June 2010
- May 2010
- April 2010
- March 2010
- February 2010
- January 2010
- December 2009
- November 2009
- October 2009
- September 2009
- August 2009
- July 2009
- June 2009
- May 2009
- April 2009
- March 2009
- February 2009
- January 2009
- December 2008
- November 2008
- October 2008
- September 2006
- February 2006
Recent Posts
- Rethinking Your Cyber Insurance Needs as Your Workplace Evolves
- Data Breach Defense for Educational Institutions
- COVID-19 and the Increased Cybersecurity Risk in a Work-From-Home World
- Like Incorporating Facebook into your Website? EU Decision Raises New Issues
- Lessons Learned: Key Takeaways for Every Business from the Capital One Data Breach
- Will Quick Talks to WRAL About Privacy Issues Related to Doorbell Cameras
- About Us
- Not in My House - California to Regulate IoT Device Security
- Ninth Circuit Says You’re Going to Jail for Visiting That Website without Permission
- Ninth Circuit Interprets “Without Authorization” under the Computer Fraud and Abuse Act
Topics
- Data Security
- Data Breach
- Privacy
- Defamation
- Public Records
- Cyberattack
- FCC Matters
- Reporters Privilege
- Political Advertising
- Newsroom Subpoenas
- Shield Laws
- Internet
- Miscellaneous
- Digital Media and Data Privacy Law
- Indecency
- First Amendment
- Anti-SLAPP Statutes
- Fair Report Privilege
- Prior Restraints
- Wiretapping
- Education
- Access to Courtrooms
- FOIA
- HIPAA
- Drone Law
- Access to Court Dockets
- Access to Search Warrants
- Intrusion
- First Amendment Retaliation
- Mobile Privacy
- Newsroom Search Warrants
- About This Blog
- Disclaimer
- Services