IN THE COURT OF CHANCERY OF THE STATE OF DELAWARE
TWITTER, INC., )
)
Plaintiff and )
Counterclaim-Defendant, )
)
v. ) C.A. No. 2022-0613-KSJM
)
ELON R. MUSK, X HOLDINGS I, )
INC., and X HOLDINGS II, INC., )
)
Defendants and )
Counterclaim-Plaintiffs. )
MEMORANDUM OPINION
Date Submitted: September 6, 2022
Date Decided: September 13, 2022
Peter J. Walsh, Jr., Kevin R. Shannon, Christopher N. Kelly, Mathew A. Golden, Callan
R. Jackson, POTTER ANDERSON & CORROON LLP, Wilmington, Delaware; Brad D.
Sorrels, WILSON SONSINI GOODRICH & ROSATI, P.C., Wilmington, Delaware;
William Savitt, Bradley R. Wilson, Sarah K. Eddy, Ryan A. McLeod, Anitha Reddy, Noah
B. Yavitz, WACHTELL, LIPTON, ROSEN & KATZ, New York, New York; Counsel for
Plaintiff and Counterclaim-Defendant Twitter, Inc.
Edward B. Micheletti, Lauren N. Rosenello, SKADDEN, ARPS, SLATE, MEAGHER &
FLOM LLP, Wilmington, Delaware; Alex Spiro, Andrew J. Rossman, Christopher D.
Kercher, Silpa Maruri, QUINN EMANUEL URQUHART & SULLIVAN LLP, New
York, New York; Counsel for Defendants and Counterclaim-Plaintiffs Elon R. Musk, X
Holdings I, Inc., and X Holdings II, Inc.
McCORMICK, C.
This is an action for specific performance of an April 25, 2022 merger agreement
under which Elon R. Musk and two entities he owns, X Holdings I, Inc. and X Holdings
II, Inc. (with Musk, “Defendants”), agreed to acquire Twitter, Inc. To communicate about
the Twitter transaction, Musk used two sets of email accounts: one sponsored by Space
Exploration Technology Corp. (“SpaceX”) and the other by Tesla, Inc. Musk asserted
attorney-client privilege over emails in the SpaceX and Tesla accounts and withheld them
in discovery. Twitter has moved to compel those documents.
To support a claim of attorney-client privilege, Musk must demonstrate that he had
an objectively reasonable expectation of confidentiality in the SpaceX and Tesla emails.
In certain circumstances, this court had applied the four-factor analysis of In re Asia Global
Crossing, Ltd.1 to determine whether an employee had an objectively reasonable
expectation of privacy in personal communications in their work emails. The Asia Global
analysis looks to whether company policies or practices reduce an employee’s expectation
of privacy in the employee’s work emails.2 SpaceX and Tesla email policies make clear
that employees have no privacy interest in their work emails and warn that the companies
reserve the right to monitor those emails. Citing to the plain language of those policies,
Twitter argues that Musk had no reasonable expectation of privacy in his SpaceX and Tesla
emails.
1
In re Inform. Mgmt. Servs., Inc. Deriv. Litig., 81 A.3d 278, 286–87 (Del. Ch. 2013)
(“IMS”) (applying Asia Global Crossing, Ltd., 322 B.R. 247, 257 (Bankr. S.D.N.Y. 2005)).
2
IMS, 81 A.3d at 286.
Although Twitter’s argument is a compelling one in many ways, Musk nevertheless
prevails on this motion. To support his claim of attorney-client privilege, Defendants
submitted affidavits from Musk, IT managers from SpaceX and Tesla, and the head of
Tesla’s legal department.3 Those affidavits state that each company had a policy of limiting
the circumstances in which they would monitor employee emails. They further state,
unequivocally, that Musk had “unrestricted” personal use of his Tesla email account, that
“no one” at Tesla can access those emails without Musk’s consent or “to the extent legally
necessary,” and that “nobody” at SpaceX can access his email account without Musk’s
express consent.4 These additional facts make Musk’s expectation of privacy objectively
reasonable. Twitter’s motion is denied.
I. FACTUAL BACKGROUND
Musk is CEO of both SpaceX and Tesla,5 but SpaceX and Tesla are third parties
with no involvement in the Twitter transaction.
Both SpaceX and Tesla have internal policies that bear on employees’ expectation
of privacy in information found in company-sponsored email accounts.
3
C.A. No. 2022-0613-KSJM, Docket (“Dkt.”) 394, Aff. of Elon R. Musk (“Musk Aff.”);
Dkt. 395, Aff. of SpaceX Manager of Executive IT Support Alex Stillings (“Stillings
Aff.”); Dkt. 397, Aff. of Twitter Staff Technical Investigator and Digital Forensics Mgr.
John Shumway (“Shumway Aff.”); Dkt. 396, Aff. of Senior Commercial Counsel Dinna
Eskin (“Eskin Aff.”).
4
Shumway Aff. ¶¶ 10, 14; Stillings Aff. ¶ 15; Eskin Aff. ¶¶ 6–8.
5
Musk Aff. ¶¶ 1–2.
2
SpaceX permits its employees to use their SpaceX email accounts for
communications unrelated to their SpaceX work, subject to certain guidelines and
monitoring.6
As to “Email and Internet,” the SpaceX Employee Handbook provides that:
SpaceX allows email/Internet communications and cell phone
usage unrelated to work. However, such communications must
be kept to a minimum, cannot interfere with work performance
or business needs, cannot breach any other Company policy
(such as SpaceX’s policy against harassment), and must
comply with the guidelines discussed in this section.
Company computers, cell phones, tablets, laptops and other
electronic devices provided or paid for by SpaceX are owned
by SpaceX. The Company reserves the right to review all
emails, text messages and other communications that are sent
or received on SpaceX equipment, SpaceX accounts, or the
SpaceX network, and you should have no expectation of
privacy or confidentiality when using these resources.
. . . The rule of thumb when using the SpaceX email system
and computer network is to use them judiciously because
they’re valuable Company resources. Please see Computer
Acceptable Use Policy for more info.7
SpaceX’s Computer Acceptable Use Policy provides that:
[N]etwork accounts providing electronic mail . . . are property
of SpaceX. These systems are to be used for business purposes
in serving the interests of the company. . . .
Employees . . . should be aware that the data they create on the
corporate systems remains the property of SpaceX. The
SpaceX Information Security team cannot guarantee the
6
Stillings Aff. ¶ 8.
7
Stillings Aff., Ex. A at SPACEX_00000035.
3
confidentiality of information stored or accessed on any
network device belonging to SpaceX.8
SpaceX’s Information Security Policy similarly provides:
Employees . . . with network access should be aware that the
data they create or store on corporate systems remains the
property of SpaceX. The SpaceX Information Security team
cannot guarantee the privacy of information stored on any
device belonging to SpaceX.9
The policy further provides that
authorized individuals within SpaceX may monitor equipment,
systems and network traffic at any time.10
Musk believed that communications on his SpaceX accounts were private and that
he was authorized to use each account for personal use on an unrestricted basis. 11 Musk
has stated that the above SpaceX policies do not apply to him. He averred that “SpaceX’s
policy and practice with respect to my communications is that nobody associated with
SpaceX is permitted to access my emails without my express consent.” 12 He further
averred that his SpaceX email accounts “contain emails with sensitive information,
including some whose disclosure could violate the State Department’s International Traffic
in Arms Regulations . . . and could compromise national security. The extreme sensitivity
of my SpaceX Email Accounts is recognized by SpaceX’s security team and leadership.”13
8
Stillings Aff., Ex. B at SPACEX_00000100.
9
Dkt. 375 (“Pl.’s Third Disc. Mot.”), Ex. E at SPACEX_00000093.
10
Stillings Aff., Ex. B at SPACEX_00000100.
11
Musk Aff. ¶¶ 6, 9.
12
Id. ¶ 8.
13
Id. ¶ 11.
4
To Musk’s knowledge, no one at either company has accessed his email accounts except
for pre-authorized purposes, such as producing emails in this litigation. 14 SpaceX’s IT
Manager submitted an affidavit corroborating Musk’s statements.15
Tesla’s policies permit monitoring of Tesla emails accounts and warn employees
that they have no expectation of privacy over information transmitted through Tesla
emails.16
The use of Tesla email accounts is governed by the company’s Global Information
Security Policy, the latest version of which was approved on March 23, 2022.17 That policy
states that it “applies to the entire Tesla organization,” and “[i]t is Tesla’s intent that [it] be
fully implemented and followed.”18
Section 10.2 of Tesla’s Global Information Security Policy “encourage[s]”
employees to use Tesla email accounts for company-related activities.19 It provides that:
Employees of the Company are encouraged to use electronic
mail (e-mail) . . . for Company-related activities and to
facilitate the efficient exchange of useful information. Access
to e-mail, messaging platforms, and Company computers is a
privilege and certain responsibilities accompany that privilege.
By using Tesla’s electronic mail, data, voicemail, messaging
systems and the utilization of other communications equipment
(including company computers, phones, and applications
installed on personal owned devices), users knowingly and
14
Id. ¶¶ 12, 18.
15
Stillings Aff. ¶¶ 15–16.
16
Shumway Aff., Ex. D § 10.2, at TESLA_00000009–10.
17
Id. § 14 at TESLA_00000014.
18
Id. § 2 at TESLA_00000003.
19
Id. § 10.2, at TESLA_00000009–10.
5
voluntarily consent to being monitored by Tesla,
acknowledging Tesla’s right to conduct such monitoring, and
acknowledge that they have no expectation that said systems,
communications, and equipment are private to any employee.
Employees should not use Tesla owned communications
systems and devices as a means of communicating or storing
information about their personal lives. These systems and
devices are monitored for compliance with this and other
policies.
Electronic and phone communications, including electronic
mail . . . and the contents stored locally on computers, cloud
storage, removable media and provided by Company are the
sole property of Tesla.20
Tesla’s Internet Usage Policy expressly states that employees have no expectation
of privacy over their Tesla emails:
[A]ll Tesla employees . . . and all other persons
using/connected to Tesla networks (“users”) must comply with
the following policy whether they are using their own device
or one provided by Tesla.
Users have no expectation of privacy with respect to
information transmitted over, received by, or stored in any
Tesla device, network, server, computer, system, software
platform, or other equipment or device (“Tesla devices or
networks”) owned, leased, or operated by or on behalf of Tesla
or used by users for company purposes.21
Notwithstanding the above policies, a manager in Tesla’s Security Intelligence
Team (“SI Team”), John Shumway, submitted an affidavit stating that “Tesla has written
procedures in place that limit the circumstances under which Tesla email accounts may be
20
Id. § 10.2, at TESLA_00000009–10; see also id. § 9.7 (Personal Monitoring), at
TESLA_00000009 (“Employees may be subject to electronic monitoring when using Tesla
information systems.”).
21
Pl.’s Third Disc. Mot., Ex. C at TESLA_00000071.
6
accessed for employees.”22 He explained that “[a] Tesla employee’s email account may
not be accessed by the SI Team except as duly authorized in an investigation of potential
misconduct . . . or if it was necessary to do so in order to comply with legal obligations.”23
All employee investigations require case-by-case authorization by Musk or the head of
Tesla’s legal department.24 Shumway is unaware of any instance where Tesla has reviewed
an employee’s email based on a suspicion that it was used for purposes “unrelated to
Tesla’s business.”25
Musk believed that communications on Tesla email accounts were private and that
he was authorized to use each account for personal use on an unrestricted basis. 26 To his
knowledge, no one at the company has accessed his email accounts except for pre-
authorized purposes, such as producing emails in this litigation.27 Shumway corroborated
these statements in his affidavit and further averred that “[n]o one at Tesla can review Mr.
Musk’s emails without his consent except to the extent legally necessary.”28 The head of
Tesla’s legal department, Dinna Eskin, submitted an affidavit to the same effect, stating
“that nobody in Tesla’s SI Team can review emails in Mr. Musk’s Tesla email accounts
22
Shumway Aff. ¶ 4.
23
Id. ¶ 5.
24
Id. ¶ 6.
25
Id. ¶ 9.
26
Musk Aff. ¶¶ 13, 16.
27
Id. ¶¶ 15, 18.
28
Shumway Aff. ¶ 14.
7
without first obtaining permission to do so from Mr. Musk or from the General Counsel
(or the person in the role equivalent to General Counsel), unless legally necessary.”29
In this litigation, Defendants asserted attorney-client and work-product privileges
over Musk’s emails in his SpaceX and Tesla accounts. On September 2, 2022, Twitter
moved to compel Musk’s SpaceX and Tesla emails over which Musk asserted attorney-
client privilege.30 Musk opposed the motion.31 The court heard oral argument on
September 6, 2022.32
II. LEGAL ANALYSIS
To be eligible for the protections of the attorney-client privilege under Delaware
Rule of Evidence 502, a communication must be “confidential.”33 “A communication is
‘confidential’ if not intended to be disclosed to third persons other than those to whom
disclosure is made in furtherance of the rendition of professional legal services to the client
or those reasonably necessary for the transmission of the communication.”34
Confidentiality for Rule 502 purposes has subjective and objective aspects. “A party’s
subjective expectation of confidentiality must be objectively reasonable under the
29
Eskin Aff. ¶ 8.
30
Pl.’s Third Disc. Mot.
31
Dkt. 392 (“Defs.’ Opposition”).
32
Dkt. 412.
33
D.R.E. 502(b).
34
D.R.E. 502(a)(2).
8
circumstances.”35 Whether a party had an objectively reasonable expectation of privacy is
decided on a case-by-case basis;36 it is not the sort of analysis that lends itself to “bright-
line rules.”37 The party asserting privilege bears the burden of proving it.38
This court has applied the factors articulated in 2005 by a bankruptcy court of the
Southern District of New York in Asia Global to determine, in certain circumstances,
whether a user had an objectively reasonable expectation of privacy over personal
communications in their work emails.39 Those factors look primarily to whether company
policies and historical practices made it reasonable for employees to expect privacy in
company-sponsored emails.
Twitter argues under Asia Global that, although the policies of both SpaceX and
Tesla state that email accounts are subject to monitoring and Tesla’s policies expressly
state that users have no expectation of privacy, Musk used his SpaceX and Tesla accounts
to communicate about the Twitter transaction. Under these circumstances, Twitter
contends that Musk lacked any reasonable expectation of privacy over his SpaceX and
Tesla emails, and thus Musk cannot support his claim of attorney-client privilege.
35
IMS, 81 A.3d at 285 (emphasis added) (citing Upjohn v. United States, 449 U.S. 383,
389, 395 (1981)).
36
IMS, 81 A.3d at 286–87 (citing Asia Global, 322 B.R. at 257).
37
In re Dell Techs., Inc. Class V S’holders Litig., C.A. No. 2018-0816-JTL at 48:13–18
(Del. Ch. Sept. 17, 2021) (TRANSCRIPT).
38
In re WeWork Litig., 2020 WL 7624636, at *2 (Del. Ch. Dec. 22, 2020) (citing Moyer v.
Moyer, 602 A.2d 68, 72 (Del. 1992)).
39
IMS, 81 A.3d at 285–86 (citing Asia Global, 322 B.R. at 256–57).
9
Defendants advance three arguments in response. Their primary argument is that
Asia Global should not apply where, as here, the party seeking to pierce the privilege is an
outsider to the corporate entity owning the email accounts at issue.40 In the alternative,
Defendants argue that Musk has met his burden under Asia Global.41 As a fallback,
Defendants contend that Twitter’s Asia Global argument does extend to work product.42
Although Defendants’ primary argument urging a course correction in Delaware
law raises interesting issues worthy of extensive discussion,43 the press of time requires a
more direct approach to resolving the parties’ dispute. Defendants’ second argument under
Asia Global prevails. For that reason, this decision does not address Defendants’ primary
or fallback arguments.
Under Asia Global, four factors guide the court’s analysis of whether an employee
had a reasonable expectation of privacy in his work emails:
40
Defs.’ Opposition at 12–15.
41
Id. at 15–25.
42
Id. at 25–27.
43
Compare WeWork, 2020 WL 7624636, at *5–6 (rejecting the argument that Asia Global
should not apply where the party seeking to pierce the privilege is an outsider to the
corporate entity owning the email accounts at issue where the proponent failed to address
federal authorities on point), with IMS, 81 A.3d at 296–98 (cautioning, in dicta motivated
in part by concerns over derivative litigation, against applying Asia Global where the party
seeking to pierce the privilege is an outsider to the corporate entity owning the email
accounts), Dell Tr. at 55:1–13 (applying Asia Global in the outsider context but noting the
outsider or “stranger” status of the movant when denying the motion to compel), and In re
Appraisal of Ancestry.com, C.A. No. 8173-VCG at 18:18–19:1 (Del. Ch. Feb. 19, 2014)
(TRANSCRIPT) (tacitly rejecting the Asia Global framework and instead asking whether
the party asserting privilege was adverse to the corporate entity owning the email
accounts).
10
(1) does the corporation maintain a policy banning personal or
other objectionable use, (2) does the company monitor the use
of the employee’s computer or e-mail, (3) do third parties have
a right of access to the computer or e-mails, and (4) did the
corporation notify the employee, or was the employee aware,
of the use and monitoring policies?44
“No one factor is dispositive,”45 although the first factor is often viewed as the “dominant”
one.46 “Several of the . . . factors have been refined through subsequent application.”47
The first Asia Global factor weighs “in favor of production when the employer has
a clear policy banning or restricting person use, where the employer informs employees
that they have no right of personal privacy in work email communications, or where the
employer advises employees that the employer monitors or reserves the right to monitor
work email communications.”48
The court looks foremost to the language of the policies when applying the first
factor. SpaceX policies do not impose an outright ban on personal use. SpaceX policies
do warn that users have “no expectation of privacy or confidentiality when using [SpaceX]
resources” and also “reserve[] the right to review all emails, text messages and other
communications that are sent or received on SpaceX equipment, SpaceX accounts, or the
SpaceX network.”49
44
Asia Global, 322 B.R. at 257 (internal citation omitted).
45
IMS, 81 A.3d at 287 (citing Asia Global, 322 B.R. at 258–59).
46
Dell Tr. at 55:17–20.
47
IMS, 81 A.3d at 287.
48
Id. at 287; see also WeWork, 2020 WL 7624636, at *2 (same).
49
Stillings Aff., Ex. A at SPACEX_00000035.
11
Similarly, Tesla policies do not impose an outright ban on personal use, although
they discourage it and instruct that “[e]mployees should not use Tesla owned
communications systems and devices as a means of communicating or storing information
about their personal lives.”50 Tesla policies further warn that “[u]sers have no expectation
of privacy with respect to information transmitted over, received by, or stored in any Tesla
device, network, server, computer, system, software platform, or other equipment or
device,” and advise that Tesla “systems and devices are monitored for compliance with
[Tesla policies].”51
Although neither company expressly bans personal use of company emails, each
reserves the right to monitor emails in work accounts and Tesla makes clear that users have
no privacy interest in work emails.
This court has held that comparable policies weigh in favor of production under the
first Asia Global factor. In WeWork, the court treated policies nearly identical to those of
Tesla as weighing in favor of production and effectively dispositive of the Asia Global
analysis.52 In IMS, the court concluded that an email use policy comparable to SpaceX and
less strict than Tesla weighed in favor of production under the first Asia Global factor. The
50
Shumway Aff., Ex. D § 10.2, at TESLA_00000009–10 (“encourag[ing]” Tesla
employees to use Tesla email for Tesla-related activities).
51
Pl.’s Third Disc. Mot., Ex. C at TESLA_00000071; Shumway Aff., Ex. D § 10.2 at
TESLA_00000009–10.
52
WeWork, 2020 WL 7624636, at *2–3 (finding that the first Asia Global factor weighed
in favor of production when the applicable policy did not ban personal use of email but did
reserve the company’s right to review emails and included “an explicit warning that
employees should have no expectation of privacy when using their [workplace] email
accounts”).
12
policy in IMS placed employees on notice that their work emails could be monitored but
stopped short of expressly warning that employees lacked any privacy right in the emails.53
A few mitigating considerations blunt the blow of the SpaceX and Tesla policies to
Defendants’ arguments. The first is that, despite the broad language by which SpaceX and
Tesla reserve the rights to monitor employee emails, both companies have policies limiting
the grounds for monitoring employee emails. SpaceX and Tesla access employee emails
only after securing the approval of the Legal and Human Resources departments, and only
where necessary to investigate an issue or conduct business (such as after an employee has
left the company).54 These policies suggest that an employee might expect privacy over
personal communications unless the employee is acting contrary to company guidelines.
Because the guidelines do not expressly ban personal use, one might reasonably surmise
that the companies would not review personal communications of employees who are
otherwise compliant with company policies. In Dell, the court held that a similar
combination of policies, albeit coupled with the fact that the company granted the user a
company email despite the user’s retired status, supported a reasonable expectation of
privacy over personal emails on the company server.55 Here, although Musk is not retired,
53
IMS, 81 A.3d at 289.
54
See Stillings Aff. ¶¶ 11–14 (discussing SpaceX’s general procedures that limit the
circumstances under which a SpaceX email account may be accessed); Shumway Aff.
¶¶ 4–8 (discussing Tesla’s written procedures that limit the circumstance under which
Tesla email accounts may be accessed for employees).
55
Dell Tr. at 52:16–53:12, 54:9–24.
13
the limitations on monitoring imposed by SpaceX and Tesla make Musk’s expectation of
privacy more reasonable.
As the second and perhaps most forceful mitigating consideration, Defendants argue
that the “default” policies of SpaceX and Tesla do not apply to Musk, and that each
company adopted “Musk-specific” rules.56 For this, Defendants rely exclusively on the
affidavits of Musk, IT managers from SpaceX and Tesla, and the head of Tesla’s legal
department. Those affidavits state, unequivocally, that Musk had “unrestricted” personal
use of his Tesla email account, that “no one” at Tesla can access those emails without
Musk’s consent except “to the extent legally necessary,” and that “nobody” at SpaceX can
access his email account without Musk’s express consent.57
A cynic might doubt that Musk-specific policies exist at SpaceX and Tesla.
Defendants’ factual arguments to that effect rely solely on the affidavits of Musk, who has
a lot at stake in this litigation, and three of his direct reports, and none of the affidavits are
supported by any corporate records reflecting Musk-specific rules. Still, to this jurist, the
evidence rings true. The court has little doubt that neither SpaceX nor Tesla view him as
on par with other employees, that he has the power to direct operational decisions, and that
nobody at either company would access his information without first obtaining his
56
Defs.’ Opposition at 19–20.
57
Musk Aff. ¶¶ 8, 13; Shumway Aff. ¶¶ 10, 14; Stillings Aff. ¶ 15; Eskin Aff. ¶¶ 6–8.
14
approval. One can debate whether this corporate reality makes for good “corporate
hygiene,”58 but it is difficult to discredit the recitation of the facts.59
Taken together, the companies’ policies limiting the circumstance in which
employee emails will be monitored coupled with the evidence of Musk-specific policies
outweighs the generic policies that diminish employee privacy expectations. The first Asia
Global factor weighs against production of documents.
The second Asia Global factor looks to the email sponsor’s historical practice of
monitoring employee emails in accordance with its policies. “[S]ome decisions have held
that if any employer reserves the right to monitor work email, then whether it actually does
so is irrelevant.”60 By contrast, this court views the second factor as probative as a
standalone inquiry. “[T]he employer’s actual conduct with respect to monitoring remains
an appropriate factor to consider, particularly if the employer has made specific
58
Dell Tr. at 42:23.
59
Defendants also point to Musk’s status as an executive/“employer” within the companies
as supportive of his expectation of privacy, relying on a bench ruling applying Asia Global
in In re Shawe & Elting LLC, C.A. No. 9700-CB (Del. Ch. Mar. 2, 2015) (TRANSCRIPT).
There, Chancellor Bouchard denied a motion to compel Elizabeth Elting’s spousal
communications found on the Transperfect Global, Inc. server, observing that the
employee handbook “was not intended to apply to Ms. Elting, who more accurately could
be viewed as an employer and not one of the employees to whom the handbook was
intended to govern.” Id. at 1595:22–1496:3. Elting, however, was not solely a company
executive; she also owned 50% of Transperfect’s stock and was one of only two directors.
Id. at 1597:3–5. It was her stock holdings and board representation that tilted Elting toward
the “employer” side of the analysis. Here, Musk does not rely on stock ownership or board
representation to support his expectation of privacy. For this reason, Shawe does not aid
Defendants’ arguments. For other reasons discussed above the line, Defendants’
arguments nevertheless prevail.
60
IMS, 81 A.3d at 289 (citing cases).
15
representations or taken specific actions inconsistent with the monitoring policy and the
employee can show detrimental reliance.”61
According to Defendants’ affidavits, SpaceX and Tesla personnel have never
monitored, accessed, or reviewed Musk’s email except for purposes he had preauthorized
or as legally necessary.62 The “legally necessary” caveat does not undermine the force of
this factual representation. Just like individuals, companies are required to comply with
legal obligations. Individuals have an expectation of privacy in their home; the mere fact
that a private residence could be searched with an appropriate warrant does not eliminate
an individual’s reasonable expectation of privacy in their home for all purposes. Similarly,
employees have an expectation of privacy at work (subject to office procedures and
practices); the fact that a company may need to access employee data to comply with legal
obligations does not eliminate an employee’s expectation of privacy for all purposes.
The second Asia Global factor weighs against production of documents.
The third Asia Global factor asks whether third parties have a right to access to the
computer or emails at issue. “In a work email case, this factor largely duplicates the first
and second factors, because by definition the employer has the technical ability to access
the employee’s work email account.”63 This factor is most helpful in inapposite scenarios,
“when analyzing webmail or other electronic files that the employer has been able to
61
IMS, 81 A.3d at 289 (citing cases); see also WeWork, 2020 WL 7624636, at *3 (“The
second factor asks whether the company monitors the use of the employee’s computer or
e-mail.”).
62
Stillings Aff. ¶ 16; Shumway Aff. ¶ 11; Musk Aff. ¶¶ 12, 18.
63
IMS, 81 A.3d at 290; see also WeWork, 2020 WL 7624636, at *4 (same).
16
intercept, recover, or otherwise obtain.”64 In that scenario, the court considers employee
efforts to protect the information, such as encryption or deletion efforts.65 This motion
does not involve that scenario. Rather, this motion concerns documents on company-
sponsored email accounts, not other documents intercepted by an employer. In this
circumstance, the third factor is entirely duplicative of the first two factors.
Like the first two factors, the third Asia Global factor weighs against production of
documents.
The fourth Asia Global factor considers the employee’s knowledge regarding the
company’s policies and practices. “If the employee lacked knowledge of the email policy,”
then this factor weighs against production.66 “If the employee had actual or constructive
knowledge of the policy,” then this factor weighs in favor of production.67 “Decisions have
readily imputed knowledge of an employer’s policy to officers and senior employees.”68
Here, it cannot be disputed that Musk had general knowledge of the SpaceX and
Tesla policies and actual knowledge of the policies and practices he described as Musk-
specific. Knowledge of all SpaceX and Tesla policies and practices can be “readily
imputed” to Musk as well given his positions at the companies. But because the policies
64
IMS, 81 A.3d at 290–91.
65
Id. at 291.
66
Id.
67
Id. at 291–92.
68
Id. at 292; see also WeWork, 2020 WL 7624636, at *4 (same).
17
and practices on balance favor Musk’s position, his knowledge of those policies too weighs
in his favor.
The fourth Asia Global factor weighs against production of documents.
III. CONCLUSION AND INSTRUCTION REGARDING PUBLIC FILINGS
Under the Asia Global factors, Musk has demonstrated a reasonable expectation of
privacy over his SpaceX and Tesla emails. Musk has therefore proven the only element of
his claim of attorney-client privilege over those emails challenged by Twitter. Twitter’s
motion to compel production of these documents is therefore denied.
There is another matter. I have reviewed the publicly filed version of Twitter’s
motion and Defendants’ opposition concerning Musk’s SpaceX and Tesla email accounts.
The redactions were too heavy. I discussed some of the redacted information in this
decision. Because the public should have access to information that speaks directly to the
merits of the parties’ discovery dispute,69 I did not omit or redact that information from this
decision. None of the information discussed in this decision is truly sensitive or
confidential under Court of Chancery Rule 5.1 in any event. The parties are instructed to
prepare new public filings, eliminating redactions as to information set forth in this
69
See generally Tornetta v. Musk, 2022 WL 130864, at *3 (Del. Ch. Jan. 14, 2022) (“Court
of Chancery Rule 5.1 exists to protect the public’s right of access to information about
judicial proceedings and makes clear that most information presented to the Court should
be made available to the public. The right of access enables the public to judge the product
of the courts in a given case, which in turn, helps ensure quality, honesty and respect for
our legal system. With these goals in mind, the default presumption under Rule 5.1 is that
proceedings in a civil action are a matter of public record.” (internal quotations and
footnotes omitted) (cleaned up)).
18
decision. Defendants are also instructed to file public versions of the four affidavits on
which Defendants relied.
19