Back to Results

HOUSE_OVERSIGHT_017668.jpg

Source: HOUSE_OVERSIGHT  •  Size: 0.0 KB  •  OCR Confidence: 85.0%
View Original Image

Extracted Text (OCR)

Page 33 of 78 2007 Utah L. Rev. 861, *907 if it is the prosecution who subpoenas confidential victim information. Due process is satisfied as long as the prosecution and 257 the defense have reciprocal rights and courts apply the Rules consistently. The objectionable feature of the Advisory Committee proposal is that the subpoena could be issued without notice to a crime victim. A narrower issue is whether certain pleadings could be filed on this question on an ex parte basis. Such ex parte filing might be appropriate, in the sense that once the court gives notice that it is considering whether to issue a subpoena, then the defendant, the government, or, indeed, the victim might wish to file parts of their pleadings under seal for good cause shown. Requests for such sealing could be handled in the ordinary course of litigation - once the victim knew that such litigation was occurring. Even if there is some tangential defense interest in conceding strategy, the Advisory Committee proposal addresses it in the most haphazard way. Consider the Elizabeth Smart example mentioned earlier, in which the defense sent ex parte subpoenas to Elizabeth's school and hospital. Under the Advisory Committee's proposal, a court could still decide to approve those subpoenas ex parte to prevent disclosure of some secret defense "strategy." But once the school and the hospital received the subpoenas, nothing would bar them from revealing the subpoenas’ existence to the victim - and, indeed, the world. Thus, the interest the Advisory Committee purports to protect (concealing defense trial strategy) would actually be [*908] protected only when the third party, for whatever reason, chose not reveal the subpoena. In the Smart case, for instance, the school did not reveal the defense "strategy" ?°° because it simply handed the materials over to the defense - in possible contravention of the Family Educational Rights and Privacy Act. 7°? But the hospital refused to hand over Elizabeth's records and contacted the Smart family, which ultimately led to a public outcry over the subpoenas. There is no rhyme or reason to a procedure that is supposed to protect defense strategy but that actually turns on the happenstance of whether third parties choose to notify crime victims or the public about subpoenas they receive. The haphazardness of the Advisory Committee's approach becomes even clearer when one realizes that defense "strategy" can be protected only where the confidential information happens to rest in the hands of a third party rather than the victim herself. Consider, for example, a rape victim who has talked to a rape crisis counselor, who takes notes of the meeting. A defendant might attempt to subpoena those notes from the counselor. 7° But if the counselor had previously transferred the notes back to the rape victim, then the subpoena would have to be directed to the victim herself - and the victim could then move to quash the subpoena. This is not some academic hypothetical, as rape counselors in Pennsylvania in the 1980s used precisely this procedure to protect their clients against abusive defense subpoenas. 7°! Moreover, rape counselors - and, indeed, most third parties involved in maintaining the personal and confidential information of victims - will probably have very strong incentives 257 See Wardius v. Oregon, 412 U.S. 470, 475-76 (1973); United States v. Bahamonde, 445 F.3d 1225, 1229 (9th Cir. 2006); Newman v. Hopkins, 192 F.3d 1132, 1135 (8th Cir. 1999), vacated 529 U.S. 1084 (2000); United States ex rel. Veal v. DeRobertis, 693 F.2d 642, 646- 47 (7th Cir. 1982). Indeed, such reciprocity may not even be required if "significant governmental interests" support its omission. See Wardius, 412 U.S. at 476. 258 Such as it was - apparently the only reason for the subpoenas was to try and dig up some dirt on the young kidnapping victim. See Stephen Hunt, Defense Blasted for Obtaining Smart's School Records, Salt Lake Trib., Jan. 14, 2005, at B2. 259 20 U.S.C. § 1232g(b) (2006). 260 As will be discussed shortly in the next Section of this Article, such a subpoena would likely be inappropriate for substantive reasons as well. See supra Part IV, § 3. 261 The Pennsylvania Supreme Court initially found that records held by rape counseling centers were subject to only limited protection from defense subpoenas. See Jn re Pittsburgh Action Against Rape, 428 A.2d 126, 132 (Pa. 1981). The results of that unfortunate decision were swift. Rape victims requested the return of their records from the center and, in some cases, even requested termination of the counseling relationship. Commonwealth v. Wilson, 602 A.2d 1290, 1294 n.6 (Pa. 1992); Tera Jckowski Peterson, Comment, Distrust and Discovery: The Impending Debacle in Discovery of Rape Victims' Counseling Records in Utah, 2007 Utah L. Rev. 695; Beth Stouder, Note, Pennsylvania Establishes New Privilege for Communications Made to a Rape Crisis Center Counselor - In re Pittsburgh Action Against Rape, 55 Temp. L.Q. 1124, 1146 (1982). In light of this serious problem, the Pennsylvania legislature enacted a new, absolute privilege protecting communications to rape crisis counselors from any disclosure without the consent of the victim. See 42 Pa. Cons. Stat. § 5945.1(b) (2000) (upheld against constitutional attack in Wilson, 602 A.2d at 1297). DAVID SCHOEN HOUSE_OVERSIGHT_017668

Document Preview

HOUSE_OVERSIGHT_017668.jpg

Click to view full size

Document Details

Filename HOUSE_OVERSIGHT_017668.jpg
File Size 0.0 KB
OCR Confidence 85.0%
Has Readable Text Yes
Text Length 5,411 characters
Indexed 2026-02-04T16:32:36.869435