Johannesburg High Court rules on Facebook defamation

The innocuous looking case of H v W which was handed down in the South Gauteng High Court on 30 January 2013 is anything but. Judge Willis’ 30 page judgment recognises the harm a Facebook post can do to a person’s reputation and throws the weight of the Court behind the person defamed (and who can afford the legal fees).

Update: Here are a few thoughts which are partly a summary and partly what I think is really interesting about this case. Be sure to read the post itself, though, there is a lot to unpack in this case.

Back to Wits with Aaron and Ashley-19

The innocuous looking case of H v W which was handed down in the South Gauteng High Court on 30 January 2013 is anything but. Judge Willis’ 30 page judgment recognises the harm a Facebook post can do to a person’s reputation and throws the weight of the Court behind the person defamed (and who can afford the legal fees).

What the judgment says


Judge Willis’ judgment begins with some background information (the names of the parties were redacted to prevent further harm). W (the “respondent”) published an open letter to H (the “applicant”) on Facebook “for public consumption” which included the following paragraph:

I wonder too what happened to the person who I counted as a best friend for 15 years, and how this behaviour is justified. Remember I see the broken hearted faces of your girls every day. Should we blame the alcohol, the drugs, the church, or are they more reasons to not have to take responsibility for the
consequences of your own behaviour? But mostly I wonder whether, when you look in the mirror in your drunken testosterone haze, do you still see a man?

Judge Willis continues and explains that –

The applicant is an insurance broker who is separated from his wife. The respondent had been a close friend of the applicant. This friendship extends back from the time before the applicant married his wife. In terms of a Deed of Trust, the applicant and his wife had jointly appointed the respondent to be the guardian of their three minor children in the event that both the applicant and his wife died or became incapacitated before their children attained their majority. The applicant had provided the respondent with guidance in starting her current business venture. The respondent had lent the applicant money to tide him over certain financial difficulties.

The applicant and his estranged wife are engaged in a divorce action. The applicant’s estranged wife is presently residing with the respondent. The applicant’s wife left him to stay with the respondent on 14 January, 2012. The applicant pays for the children’s medical aid, extra mural classes, stationery and a full time tutor to assist them. The three minor children born of the marriage between the applicant and his estranged wife are Z, born in 1997, M, born in 1999 and C, born in 2001. These minor children have been residing with the applicant for the last few months. The two minor daughters are both ‘friends’ on Facebook with the respondent. A ‘friend on Facebook’ is a ‘term of art’ to which I shall later refer. The applicant and the respondent were friends on Facebook but, consequent upon the applicant’s wife leaving him and moving into the home of the respondent, the applicant has ‘defriended’ the respondent.

The applicant complains that the posting in question publishes information which portrays him as:

(i) A father who does not provide financially for his family;

(ii) A father who would rather go out drinking than caring for his family;

(iii) A person who has a problem with drugs and alcohol.

The applicant’s attorney, in her letter dated 28 February 2012 addressed to the respondent, referred to the possibility of a claim for damages. The respondent claims that she posted the posting not to defame the applicant but in order for the applicant to reflect on his life and on the road he had chosen.

The law the Court relied on

The lawyers involved in the matter conducted what appears to be fairly substantial research on the law on defamation online and with reference to Facebook. Judge Willis relied fairly heavily on two academic articles by –

The Court quoted extensively from Roos’ article, largely as a means to understand Facebook and its mechanics. Although reliance on Roos’ article and her explanation of how Facebook works may not be integral to the judgment, it is unfortunate. Roos appears to have a fairly limited understanding of how Facebook and its privacy settings work and this gives the impression that activity on Facebook is unavoidably more public than it need be. One example of this is Roos’ explanation of Facebook’s primary privacy options:

In Facebook there are three privacy settings to choose from for information other than the user’s name, profile picture, gender and networks. Users can choose to make other information visible to “everyone”, or to “friends of friends”, or to “friends only”. It is important to recognise that a “friend” on Facebook is someone you have listed as a “contact” – such persons are not necessarily friends in real life.

Users can control their visibility to some extent by using the privacy settings to make personal information available only to friends, and of course by limiting the number of friends or contacts they add to their networks. In general, however, most users give out an extraordinary amount of information.

The last part about people sharing a lot of information is true, of course, but what Roos missed is that users can also share fairly selectively using Facebook lists which stand apart from the default “Public”, “Friends”, “Friends except acquaintances” and “Only me”. To be fair to Roos, though, her article was published in 2012 and Facebook’s privacy controls have changed since then and, in many respect, have become somewhat more secure in some respects, and have eroded protections like users’ privacy by obscurity. That said, she made a few good remarks about what I see as privacy’s contextual nature:

In the context of SNSs, one could argue that subscribing to an SNS and completing your profile information is similar to appearing in a public place. The Internet is a very public place, and Facebook clearly warns subscribers that their privacy cannot be guaranteed. However, in my opinion the privacy settings that one choose, should also be taken into account when considering whether a person has really chosen to disclose his or her information to an indeterminate number of persons. If you chose to reveal your personal information to “Friends Only” and if you limited the number of friends that you added, it could be argued in my opinion that you did NOT choose to reveal your information to an indeterminate number of persons. You have, in fact, revealed your personal information to a limited number of people. If one of your Facebook Friends then further discloses personal information that was provided by you in these circumstances, I would argue that you should have a delictual claim for infringement of privacy.

Roos made another important point to bear in mind when considering whether a person’s right to privacy has been infringed is similar to a defamation analysis (and which Judge Willis touched on in his judgment):

It should also be remembered that the wrongfulness of an infringement of privacy is negated by the presence of a ground of justification. Neethling identifies the following traditional grounds of justification as relevant to the right to privacy: necessity, private defence, consent to injury, and performance in a statutory or official capacity. Another ground of justification which is relevant to privacy is the protection of legitimate interests, including the public interest.

In the context of SNSs, consent is a particularly relevant ground of justification. Whenever the user discloses personal information on his webpage, he or she consents to the publication of that private information. However, in order to be valid the consent must meet certain criteria.

She then went on to discuss the parameters of the consent required to justify a privacy infringement. Essentially, consent must be informed although in light of the Protection of Personal Information Bill, we can adopt the Protection of Personal Information Bill’s defintion of “consent” as –

any voluntary, specific and informed expression of will in terms of which permission is given for the processing of personal information

Unfortunately Roos’ understanding of Facebook’s privacy controls and how it works, generally, is limited as expressed by her article and Judge Willis has accepted her explanation as a complete and accurate exposition of privacy on Facebook. This will likely, and unfortunately, colour future Court judgments regarding Facebook privacy issues. One inaccurate statement is Judge Willis’ understanding that –

Accordingly, although one can control one’s own Facebook profile but there is no method, within the Facebook system itself, by which one can control what other people place on their profiles about
oneself and who can look at that.

This is not really correct. Users have the ability to exercise a fair amount of control over whether other users can post their personal information and tag them (Roos seems to have largely misconstrued how tags can be restricted and controlled by the person being tagged).

After exploring Twitter briefly, Judge Willis turned to established case law in South Africa including authority for the proposition Roos expressed that a privacy infringement can be justified in a similar way that defamation can be justified and a more recent Supreme Court of Appeal judgment in the 2004 Mthembi-Mahanyele v Mail & Guardian case which, according to Judge Willis –

affirmed the principle that the test for determining whether the words in respect of which there is a
complaint have a defamatory meaning is whether a reasonable person of ordinary intelligence might reasonably understand the words concerned to convey a meaning defamatory of the litigant concerned

The Court, in the Mthembi-Mahanyele case set out the test for defamation as follows (and cited a 1993 case in the then-Appellate Division of Argus Printing and Publishing Co Ltd v Esselen’s Estate) –

The test for determining whether words published are defamatory is to ask whether a ‘reasonable person of ordinary intelligence might reasonably understand the words . . . to convey a meaning defamatory of the plaintiff. . . . The test is an objective one. In the absence of an innuendo, the reasonable person of ordinary intelligence is taken to understand the words alleged to be defamatory in their natural and ordinary meaning. In determining this natural and ordinary meaning the Court must take account not only of what the words expressly say, but also of what they imply’

Referencing one of the justifications for (or defences to) defamation, namely that the defamatory material be true and to the public benefit or in the public interest, Judge Willis drew an important distinction that is worth bearing in mind –

A distinction must always be kept between what ‘is interesting to the public’ as opposed to ‘what it is in the public interest to make known’. The courts do not pander to prurience.

The Court moved on to explore another justification, fair comment. In order to qualify as “fair comment” –

the comment “must be based on facts expressly stated or clearly indicated and admitted or proved to be true”

The person relying on this justification must prove that the comment is, indeed, fair comment and “malice or improper motive” will defeat this justification or defence, regardless of its demonstrably factual nature. In this particular case, the Court found that W acted maliciously and she was unable to prevail with this defence.

The Court’s finding

Flowing from the Court’s finding that W’s Facebook post was defamatory and unlawful, Judge Willis considered a procedural issue. H instituted proceedings on motion, which means that H used an expedited approach relative to the more conventional trial action and sought a court order requiring W to remove the post and stop posting about H (the very simplied and incomplete version). Normally an applicant instituting motion proceedings would be asked to explain to he Court whether there is “an absence of similar protection by any other ordinary remedy”. W’s legal team pointed out (as respondents frequently do) that H could have sued her for damages (monetary losses) through a trial action.

Judge Willis considered this argument and took a pretty important step in developing the common law that governs these sorts of proceedings. He said the following:

It is in respect of the remedy where infringements of privacy take place in the social media that the common law needs to develop. The social media form a subset of the electronic media but are not coextensive with it: the social media are all part of the electronic media but not all the electronic media are social media. The electronic media were, almost certainly, beyond the imagination of the court when Setlogelo v Setlogelo was decided in 1914. Not only can items be posted and travel on the electronic media at a click on a computer in a moment, in an instant, at the twinkling of an eye, but also they can, with similar facility, be removed therefrom. This can also be done at minimal cost. The situation is qualitatively different from the scenario where newspapers have been or are about printed in hardcopy and distributed. The law has to take into account changing realities not only technologically but also socially or else it will lose credibility in the eyes of the people. Without credibility, law loses legitimacy. If law loses legitimacy, it loses acceptance. If it loses acceptance, it loses obedience. It is imperative that the courts respond appropriately to changing times, acting cautiously and with wisdom.

He went on to explain that –

[t]he historical reluctance of the courts to interdict publication in the media has its roots only in the issues relating to technology and economics that arise from ‘stopping the press’ but also a concern about the social consequences of stopping the free flow of news and information. This concern about the ‘chilling effect’ of court orders on freedom of expression has been manifested in the case of National Media Limited v Bogoshi recently decided in the SCA.

This is an interesting perspective. Just as social media accelerates the rate at which people can share (and remove) their thoughts, it also addresses the courts’ concerns about ordering that defamatory materials be removed from these social services because the costs involved are minimal. Ironically, though, litigation remains a pretty costly exercise so this must also factor into litigants’ cost analysis. For the courts, though, it would seem that the social Web removes an obstacle to judicial activism when it comes to defamation. Of course it isn’t just about the economics involved, courts will continue to assess the relative value of one party’s right to freedom of expression when weighed against the other other’s right to dignity, for example. As Judge Willis points out –

resolving the tensions between every human being’s constitutionally enshrined rights both to freedom of expression and to dignitas is all about balance. In the case of Le Roux v Dey Freedom of Expression Institute and Another as amici curiae) the Constitutional Court emphasized the need to take into account the context in which a publication occurs.

W’s advocate attempted to argue that H could take the matter up with Facebook itself as a violation of its terms and conditions but Judge Willis wasn’t convinced. He didn’t feel there was anything before him to “assure me that Facebook would comply with such a request”. He further noted James Grimmelmann’s argument that “it is better for the courts to focus on users rather than Facebook itself if intrusions on privacy are effectively to be curbed”. Essentially, “if one wants to stop wrongdoing, it is best to act against the wrongdoers themselves”.

Media reports about this case referenced the orders H sought against W which included a prohibition on W “posting any information pertaining to the applicant on Facebook or any other social media”. Judge Willis refused to grant this order as he said he has “no way of knowing for certain that there will be no cicumstances in the future that may justify publication about the applicant”. I think he made the correct decision there and this means that these complaints will have to be dealt with on a case by case basis with careful consideration of each case’s merits.

The Court also refused to grant orders placing W under arrest if she fails to comply with the order and that the Sheriff of the court be ordered to remove the offending post. Instead W was ordered to remove the posts and pay H’s costs. As a practical matter, Judge Willis made the following point:

Those who make postings about others on the social media would be well advised to remove such postings immediately upon the request of an offended party. It will seldom be worth contesting one’s obligation to do so. After all, the social media is about building friendships around the world, rather than offending fellow human beings. Affirming bonds of affinity is what being ‘social’ is all about.

A few more interesting points

Judge Willis went on to deal with public figures and the prospect of having to deal with a flurry of relatively minor complaints after this judgment.

With respect to public figures, he pointed out that while they enjoy a right to privacy, “[t]here is legitimate public interest in the affairs of public figures” and this means that they may not enjoy the same degree of protection as citizens not in the public spotlight when it comes to defamation online. As Judge Willis put it –

Trenchant commentaries on the performances of politicians as politicians, entertainers as entertainers, musicians as musicians, artists as artists, writers as writers, poets as poets, sports stars as sports stars will generally pass legal muster, even if posted in the social media. When it comes to freedom of expression in South Africa, there are oceans in which to swim and upon which to sail as freely as the wind blows.

When it comes to the prospect of being inundated by defamation claims (my words), the Court referenced the National Media Limited v Jooste case and Judge of Appeal Harms’ comments that –

the question of whether private facts are worthy of protection is determined by reference to ‘ordinary or reasonable sensibilities and not to hypersensitivities’.

Similarly, Grimmelmann has referenced the legal maxim de minimis non curat lex which Judge Willis translated as “the law is not concerned with trivia”. Ultimately, the cost of litigating, even when it comes to motion court proceedings of this nature, will stem the flow of applications to court. Litigation remains a costly exercise and this cost may not always be warranted, regardless of how hurtful the comments may be. This is especially so in the context of motion court proceedings where courts tend not to grant damages as relief because of how these motion court proceedings work.

Lastly, the judgment didn’t deal with another complication: the infamous Streisand Effect. This phenomenon kicks in regardless of your entitlement to protect legitimate rights. It has the ability to effectively negate the practical value of a court order such as the one Judge Willis granted and should always be carefully considered and weighed up against the risks in any matter. There are going to be cases where it is better to walk away and focus on damage control and other cases where it is worth risking the phenomenon and going to court. A critical factor will be whether the legal advice you take is adequately informed about not only the law but the social Web dynamics to form a better risk assessment before you pull the trigger.

This case is an important one. It advances the law dealing with social Web issues and, if it is upheld or applied by other (and higher) courts, it will change the tone for how courts will deal with issues like online defamation and privacy.

Employer appropriates an ex-employee’s LinkedIn account

LinkedIn Centipede Participants in the 2010 ING Bay to Breakers

An American executive unsuccessfully sought to have her LinkedIn profile restored to her after her former employer appropriated her profile when she left the company. According to Internet Cases:  

After plaintiff was fired as an executive, her former employer (using the password known by another employee) took over plaintiffs LinkedIn account. It kept all of plaintiff’s contacts and recommendations but switched out plaintiff’s name and photo with those of the new CEO.

Plaintive sued in federal court under the Computer Fraud and Abuse Act, the Lanham Act, and a slew of state law claims including identity theft, conversion and tortious interference. The former employer moved for summary judgment on the CFAA and Lanham Act claims. the court granted the motion, but continued to exercise supplemental jurisdiction over the state law claims. 

The court described the facts as follows:

Eagle used her account to promote Edcomm’s banking education services; foster her reputation as a businesswoman; reconnect with family, friends, and colleagues; and build social and professional relationships. [Another employee] assisted Eagle in maintaining her LinkedIn account and had access to Dr. Eagle’s password.

Venkat Balasubramani, writing on the Technology & Marketing Law blog, added the following:

After Edcomm got acquired, the new owner eventually terminated Dr. Eagle. The company immediately took over her LinkedIn account, changing the account’s login credentials and substituting in the name and photo of Dr. Eagle’s replacement. Unfortunately for Dr. Eagle, the court grants defendants’ motion to dismiss her federal claims based on the Computer Fraud and Abuse Act and the Lanham Act. 

This case raises a few interesting questions and although the court did not deal with the remaining claims (and may arrive at different conclusions were considers those claims in due course), I found myself wondering what the legal position would be if a local employer attempted to appropriate a former employee’s LinkedIn profile when an employee leaves the company. This hypothetical employee would probably have 2 causes of action based on the LinkedIn User Agreement and the Electronic Communications and Transactions Act. A claim based on the LinkedIn User Agreement word, primarily, be directed at LinkedIn itself in the form of a complaint based on a violation of the User Agreement’s terms and conditions. A claim based on the Electronic Communications and Transactions Act would likely be based on the chapter 8 Cyber Crime provisions.

LinkedIn User Agreement

The User Agreement contains a number of provisions dealing with the basis on which a person may make use of the LinkedIn service and restrictions imposed on those usage rights. One of the initial provisions under the heading, Scope and Intent, states the following: 

If you are using LinkedIn on behalf of a company or other legal entity, you are nevertheless individually bound by this Agreement even if your company has a separate agreement with us. If you do not want to register an account and become a LinkedIn User, do not conclude the Agreement, do NOT click “Join LinkedIn” and do not access, view, download or otherwise use any LinkedIn webpage, information or services. By clicking “Join Now,” you acknowledge that you have read and understood the terms and conditions of this Agreement and that you agree to be bound by all of its provisions. By clicking “Join Now,” you also consent to use electronic signatures and acknowledge your click of the “Join Now” button as one. Please note that the LinkedIn User Agreement and Privacy Policy are also collectively referred to as LinkedIn’s “Terms of Service.”

The User Agreement also requires users to agree to keep their passwords secure and confidential; not permit others to use their accounts as well as to refrain from using other users’ accounts. It goes on to further incorporate these restrictions into the rights LinkedIn grants users –

On the condition that you comply with all your obligations under this Agreement, including, but not limited to, the Do’s and Don’ts listed in Section 10, we grant you a limited, revocable, nonexclusive, nonassignable, nonsublicenseable license and right to access the Services … 

The User Agreement doesn’t allow for much of what happened in this particular case. Dr Eagle should not have shared her login credentials with her colleague (during this was a violation of the User Agreement and would have entitled LinkedIn to remove her account or otherwise deny her access to the service) and her colleague was not entitled to assist the company in taking over her account and changing the profile’s details to the new CEO’s.

The Electronic Communications and Transactions Act

Section 86 deals with “Unauthorised access to, interception of or interference with data”. This section criminalises efforts to overcome security measures designed to protect data, which includes password to access codes, or accessing that date. This is, arguably, what Dr Eagle’s colleague did on Dr Eagle’s former employer’s behalf. Although Dr Eagle gave her colleague access to her LinkedIn profile, it appears that the extent of that authorisation (although not permissible in terms of the User Agreements) was to assist in managing their profile on Dr Eagle’s behalf.

Appropriating Dr Eagle’s LinkedIn account for the benefit of a new CEO exceeds the parameters of this authorisation Dr Eagle granted to her colleague, is likely a criminal act under the Electronic Communications and Transactions Act (were this case to be adjudicated by a local court under this Act) and may even be a violation of a number of other rights Dr Eagle had in the profile content. Depending on the content of the profile after its misappropriation, the company may even have attracted liability on the basis of unlawful competition, privacy violation and so on.

This scenario touches on concerns companies have regarding employees who establish prominent profiles using social services like LinkedIn, who subsequently leave the company and may be in a position to leveraged those profiles for the benefit of a competitor or even for their own benefit as they engage in potentially competitive business activities. The actions taken by the company in this particular case or highly problematic for a number of reasons which I have mentioned in this post and highlight the importance of some sort of agreed contractual framework between employers and their employees regarding ownership of the social profiles and the extent to which a company may wish to lay claim to those profiles. From an employee’s perspective, it is a good idea to draw a distinction between a personal profile and a profile dedicated to promoting the employer’s business. In some respects, this is similar to employees limiting their personal correspondence to personal email accounts and only making use of their business email accounts for business purposes.

I’m interested to find out how the court in this particular case rules on the additional state law claims Dr Eagles has brought against her former employer. Although this sort of case is yet to reach our courts (although our courts have already dealt with a situation where a former employee breached the terms of his restraint of trade and this was partly evidenced by his activity recorded in his LinkedIn profile). Employers are seeking to appropriate their employees’ LinkedIn profiles may well encounter a number of difficulties ranging from violations of LinkedIn’s User Agreement to unlawful conduct and various pieces of legislation and infringements of employees’ rights, generally.

Image credit: LinkedIn Centipede Participants in the 2010 ING Bay to Breakers by smi23le, licensed CC BY 2.0

SA Judge approves service of court papers using Facebook

Railway Post Office Clerks at Work

Judge Esther Steyn, sitting in the Durban High Court, made history yesterday when she approved service of court documents on Peter Odendaal, a defendant in a trial action in that court. It appears from a report on IOL that Mr Odendaal’s attorneys withdrew from the matter and did not leave a current address for Mr Odendaal for further service. What is supposed to happen is that the other parties to the proceedings should be advised where they can serve further court documents on a party whose attorneys have withdrawn from the case.

This left the plaintiff, CMC Woodworking Machine (Pty) Ltd, in a difficult position. It had no apparent way of serving further court documents on Mr Odendaal who appeared to be evading service in the hopes that this would scuttle the litigation against him. I wrote about the possibility of courts allowing court documents to be served on litigants using social services like Facebook in a post titled “Serving court process via Facebook” about 2 years ago. If you are interested in the procedural issues involved, take a look at that post.

What has changed since then is that the court rules for the High Courts have been changed with effect from 27 July 2012. One of the changes is to extend Chapter 3 of the Electronic Communications and Transactions Act to service of court documents on litigants by email or fax. Chapter 3 deals with the legal requirements of data messages and communications using data messages. Section 11 states the following:

“Legal recognition of data messages

11. (1) Information is not without legal force and effect merely on the grounds that it is wholly or partly in the form of a data message.

(2) Information is not without legal force and effect merely on the grounds that it is not contained in the data message purporting to give rise to such legal force and effect, but is merely referred to in such data message.

(3) Information incorporated into an agreement and that is not in the public domain is regarded as having been incorporated into a data message if such information is –

(a) referred to in a way in which a reasonable person would have noticed the reference thereto and incorporation thereof; and

(b) accessible in a form in which it may be read, stored and retrieved by the other party, whether electronically or as a computer printout as long as such information is reasonably capable of being reduced to electronic form by the party incorporating it.”

A “data message”, in turn, is defined pretty broadly and “means data generated. sent. received or stored by electronic means”. It includes voice recordings where they are used in an automated transaction and a “stored object”. When it comes to serving court documents on litigants, I’ll quote from my previous post:

As you can see, these rules are pretty specific and are designed to ensure that court process reaches the relevant party’s attention while, at the same time, not making it too difficult for the party bringing the proceedings to actually serve the court process. On a related point, some of my clients sometimes find themselves on the receiving end of court process and ask whether they should accept the documents from the sheriff. I usually advise them to accept the documents because it is generally far more beneficial to receive the documents and be in a position to deal with them than have them served on some address or in some form that doesn’t being them to your attention. The result of not being made aware of service can be default judgment.

The rules also deal with the procedure to be followed if service can’t be achieved in the ordinary course. This alternate process is called substituted service. The party trying to serve the court process must obtain the court’s permission to serve court process in some other way and this means bringing an application to the court concerned in which the applicant must make a series of allegations. These allegations are usually the following:

  1. nature and extent of claim;
  2. grounds upon which the claim is based;
  3. grounds upon which the court has jurisdiction;
  4. method of service;
  5. last known location;
  6. that the applicant has tried the usual methods and has tried to locate the respondent but without success.

If the court is satisfied that the applicant has done what it can to locate the other party and serve the court process on it, the court can permit the applicant to serve the court process using another medium. These alternatives often include the Government Gazette, local papers or even by delivering the court process to family members. These methods can also include some form of digital notification or delivery if the court is satisfied they would be effective and appropriate.

Given one of the rationales for the rules regarding service being to bring court documents to the other party’s attention and the amendments to the rules to incorporate recognition of data messages, extending the rules to service using Facebook makes a lot of sense:

Service using a social media service like Facebook has a number of advantages. For one thing, many Facebook users probably spend more time in Facebook than reading newspapers or checking the Government Gazette for ads mentioning them. A notification via Facebook is very targeted (well, assuming you have the right Facebook profile which is maintained by the person you seek) and perhaps more likely to reach that person’s attention than an ad in the legal classifieds. Another benefit to using Facebook is that there is a good chance a person with decent access to the Internet has a Facebook account.

Service using Facebook could involve sending a message to the person with a link to the court papers (Facebook messaging doesn’t really allow for attachments). Service using Facebook should probably be done in conjunction with other service options like email, newspaper ads and so on but it could be the most effective in the right circumstances.

In this particular case, Judge Steyn also ordered a publication in the local newspaper, which is common practice for substituted service. I look forward to Judge Steyn’s reasoning on Friday and wouldn’t be surprised if she follows a similar thought process. Whatever her reasoning, this is an important decision and we can look forward to more innovations in our court procedure going forward.

Update (2012-08-06): Gavin McLaughlan at Randles Attorneys very kindly sent me a copy of Judge Steyn’s judgment this morning. It makes for interesting reading and the judge seems to follow similar reasoning to the reasoning I outlined in this and my previous post. I recorded a quick explanation of the judgment here:

I also published the judgment on Scribd and you can read it below: