PanicStation.org
us Legal, police, prison & official contact demand for private messages • subpoena for documents • asked to produce emails • request for chat logs • private communications disclosure • unsure what is privileged • attorney client privilege question • work product protection confusion • police request for records • court order to produce documents • third party subpoena received • deadline to respond subpoena • motion to quash subpoena • objection to subpoena • protective order request • social media messages demanded • text messages requested • preserve communications hold • legal demand authenticity check • worried about overdisclosure

What to do if…
you receive a demand to provide documents that include private communications and you are unsure what is protected

Short answer

Do not produce anything yet. First confirm whether it’s a real subpoena/court order (and which court), then preserve everything and get legal advice—especially before sharing anything involving a lawyer.

Do not do these things

  • Don’t “just send everything” to avoid trouble—over-disclosure can permanently waive protections and expose others’ privacy.
  • Don’t delete, edit, backdate, or selectively remove messages. Even “tidying up” can become a serious issue.
  • Don’t ignore deadlines or assume the sender will extend them automatically.
  • Don’t call the opposing party to “explain.” Keep communications minimal and in writing.
  • Don’t assume “private” means “protected.” Privilege and privacy depend on context and jurisdiction.

What to do now

  1. Identify what you received: subpoena, court order, or informal request.
    Check for the issuing court, case caption/number, signature/seal, who served it, what it commands (documents, testimony, both), where/how to comply, and the deadline. If it’s unclear, treat it as potentially real until verified.

  2. Put a preservation hold in place immediately.
    Stop any auto-delete on email/chat apps. Don’t change devices, wipe phones, or “clean up” accounts. If this involves work systems, avoid actions that might trigger retention/purge processes.

  3. Decide whether you are the right “custodian.”
    Some demands are directed to you; others should go to an employer, agency, or the service provider. If you received it at work or it targets company systems, notify your organization’s legal/HR channel promptly (without broadcasting it widely).

  4. Flag anything that may be protected (before you produce).
    Create a simple private list of categories:

    • communications with your attorney (legal advice),
    • documents prepared because of litigation/investigation (potential work product),
    • highly sensitive personal info (medical, minors, intimate images, etc.),
    • third-party communications not related to the stated scope.
      This is to help your lawyer quickly assess risk and protections.
  5. Use the built-in response tools: written objections / motion to quash / protective order (as applicable).
    In federal civil cases, Rule 45 includes a process for serving written objections to document subpoenas, and courts can quash/modify subpoenas or issue protective orders. Even if you intend to cooperate, these tools are how you narrow an overbroad demand and protect private communications.

  6. Ask to narrow scope and set safe handling terms (in writing).
    Request:

    • a narrower date range, specific accounts, or defined search terms,
    • whether redactions are allowed,
    • a secure production method,
    • a confidentiality/protective order if sensitive material is implicated.
      If the demand is urgent, ask for a short extension while you obtain counsel.
  7. Prepare a review copy for your lawyer (not a production dump).
    Make a secure, read-only export or backup to review. Document what you collected (account, date range, device) so you can explain it later. Keep the original data unchanged.

  8. Be careful about “provider vs you” rules for message contents.
    U.S. law can limit when online service providers may disclose the contents of communications, and different legal processes may apply depending on who is requesting (private party vs government) and what is sought (contents vs records). Don’t guess: your lawyer can tell you whether the demand should be directed to you, the provider, or both, and how to respond without over-disclosing.

What can wait

  • You do not need to decide today whether to fully comply versus fight—first you verify the demand and preserve information.
  • You do not need to read every message right now. Start by sorting by account/date range and identifying potentially protected categories.
  • You do not need to craft a detailed narrative or explanation for the requester. Keep it procedural and minimal.

Important reassurance

Getting a subpoena or official demand for private communications is scary, but you’re not expected to instantly know what is protected. Narrowing requests and protecting privileged/sensitive material are normal parts of the process. Moving carefully—preserve first, verify second, produce only after review—helps prevent irreversible mistakes.

Scope note

This guide covers immediate stabilization steps only. The correct strategy depends on the exact issuing authority, the forum (state vs federal), deadlines, and the subject matter of the communications.

Important note

This is general information, not legal advice. If you have a subpoena/court order or a short deadline, consult a licensed attorney in the relevant jurisdiction as soon as possible and follow their guidance.

Additional Resources
Support us