Site icon Thomas J. Daley

CROSSOVER: Spouse’s Access-to-Phone Agreement Defeats Suppression Attack in Child-Sex Case, Offering Civil Discovery and Digital-Privacy Lessons for Family Lawyers

New Texas Court of Appeals Opinion - Analyzed for Family Law Attorneys

Ortego v. State, 01-24-00880-CR, April 14, 2026.

On appeal from 253rd District Court, Chambers County, Texas

Synopsis

The First Court of Appeals held that incriminating evidence a wife found on her husband’s phone was not suppressible because she acted as a private individual, not a state actor, and the husband had given written consent allowing her to inspect the phone if she had concerns. The court also rejected the defendant’s effort to exclude the evidence under Article 38.23 and affirmed the denial of his request to present two defense witnesses remotely by Zoom.

Relevance to Family Law

For Texas family lawyers, Ortego is a digital-access case disguised as a criminal appeal. Its practical significance lies in how courts may evaluate a spouse’s authority to access a device, the evidentiary value of written consent between partners, and the limits of privacy objections when one spouse later uses phone-derived evidence in divorce, SAPCR, protective-order, custody-modification, or property disputes. It also offers a strategic reminder that informal relationship documents, password-sharing practices, and course-of-conduct evidence can become outcome-determinative when parties fight over admissibility, authenticity, and the legality of digital self-help.

Case Summary

Fact Summary

The defendant was prosecuted for multiple sexual offenses involving his minor daughter. The critical evidence included sexual text messages between the defendant and the child, discovered by the child’s mother, Jennifer, when she searched the defendant’s phone in December 2021.

Jennifer testified that after an earlier divorce and later reconciliation, she agreed to resume the relationship only on specified conditions because she did not trust him. One of those conditions was access to his phone. The State introduced a handwritten document authored by the defendant, titled “A Commitment to You,” containing eleven promises. One promise stated: “To let u if u have any concerns to look at my phone for any reasons [sic.].” The defendant stipulated that the writing was his.

Jennifer further testified that this phone-access condition was essential to the resumed relationship, that the defendant never prevented her from inspecting the device, and that he did not conceal his passwords from her. She routinely checked the phone for evidence of cocaine use, pornography, and communications with other women. One evening, while the defendant was showering, she searched the phone and found deleted sexual conversations with their daughter in the trash folder. She took screenshots, texted them to herself, confronted him, and later returned the phone when he left the house.

The defense argued suppression on several theories: that the search was unconstitutional, that Jennifer exceeded the scope of any consent, that retaining the phone temporarily amounted to theft, and that she violated Penal Code section 33.02 by accessing the device without effective consent. The defense also relied on State v. Holloway, where a wife accessed a husband’s phone after he had expressly forbidden access and used his thumb while he slept to unlock it. The trial court distinguished Holloway, found Jennifer had consent to inspect the phone, and denied suppression. It also refused a requested Article 38.23 jury instruction and denied the defendant’s request to present two witnesses remotely by Zoom.

Issues Decided

Rules Applied

The court’s analysis turned on the distinction between government searches and private conduct.

Application

The State’s win was driven by one fact more than any other: written consent. The “Commitment to You” note did not merely suggest a vague atmosphere of openness; it gave the trial court a concrete basis to find that Jennifer had permission to inspect the phone if she had concerns. That finding mattered twice over. First, it defeated the defendant’s attempt to constitutionalize the search, because Jennifer was not law enforcement and there was no evidence the government directed, enlisted, or participated in her initial access. Second, it undercut the argument that she committed an offense in obtaining the evidence, which was the only available path to exclusion under article 38.23.

The defense tried to narrow consent by arguing that even if Jennifer could look at the phone generally, she exceeded the permitted scope by searching while he was showering and by viewing messages in the trash folder. The court was not persuaded. On the record described in the opinion, the trial court was entitled to find broad permission: Jennifer could look at the phone “for any reasons” if she had concerns, she regularly did so, the defendant never stopped her, and he did not hide passwords. That pattern of conduct supported the conclusion that access to deleted messages was still within the consent actually given.

The Holloway comparison failed because the key fact in Holloway was the opposite of the key fact in Ortego. In Holloway, the wife had been explicitly forbidden from accessing the phone and resorted to using the husband’s thumb while he slept to unlock it. In Ortego, the defendant had affirmatively granted access in writing and, according to the evidence the trial court credited, maintained that permission as part of the relationship.

The article 38.23 jury-instruction request failed for essentially the same reason. A defendant is not entitled to that instruction absent a genuine factual dispute material to whether the evidence was illegally obtained. Because the trial court found consent was uncontroverted and the record supported that determination, there was no material fact issue requiring submission to the jury on the legality of Jennifer’s access.

As for Zoom testimony, the appellate court upheld the trial court’s refusal to allow two defense witnesses to appear remotely. While the snippet provided does not include the court’s full reasoning on that point, the affirmance signals continued deference to trial-court control over witness presentation and underscores the need for a robust record when seeking remote testimony in a criminal or quasi-criminal evidentiary setting.

Holding

The court held that the phone evidence was properly admitted because Jennifer acted as a private individual rather than a governmental actor, so the Fourth Amendment did not apply to her conduct. The court further held that article 38.23 did not require exclusion because the trial court could reasonably find Jennifer had the defendant’s consent to access the phone, which defeated the claim that she committed breach of computer security or another predicate offense in obtaining the screenshots.

The court also held that the trial court did not err in refusing the requested article 38.23 jury instruction. Without a material factual dispute over whether Jennifer had lawful access to the phone, there was no basis to submit an exclusionary-rule instruction to the jury.

Finally, the court held that the trial court did not reversibly err in denying the defendant’s request to present two witnesses remotely by Zoom. The convictions and sentences were affirmed.

Practical Application

For family litigators, Ortego should immediately prompt a reassessment of how you plead, prove, attack, and defend digital evidence obtained by a spouse or co-parent. In many family cases, the dispositive threshold issue will not be abstract “privacy,” but rather authority: Did the accessing spouse have actual permission, apparent permission, shared use, password access, account-level authority, or a documented course of conduct showing mutual inspection rights? If so, an illegality argument may collapse before the merits are ever reached.

In divorce litigation, this case can matter when one spouse presents screenshots of deleted messages, hidden applications, financial transfers, dating-app activity, pornography, substance-abuse evidence, or communications bearing on fault, waste, reimbursement, fraud on the community, or conservatorship. Ortego suggests that a signed agreement, reconciliation memo, Rule 11 agreement, counseling-related undertaking, or even repeated tolerated access practices may become critical in defeating objections that the data was unlawfully obtained.

In custody and modification cases, Ortego is especially significant where one parent uncovers communications suggesting grooming, alienation, substance abuse, family violence, or dangerous household conditions. The case does not create a blank check for digital vigilantism, and lawyers should be careful not to induce clients to engage in conduct that could cross into unlawful access. But where the client already had consensual access, shared credentials, or standing authority to inspect a device, Ortego provides a framework for defending admissibility and blunting “suppression” rhetoric imported from criminal practice.

On the defensive side, if you represent the spouse whose device was searched, Ortego teaches that generic privacy objections are often too late. The better attack is factual and granular: Was consent revoked? Was it limited by subject matter, timing, folder, account, or device? Did the spouse bypass security, impersonate the user, use biometric unlocking without permission, or access cloud data beyond the scope of any shared-device authority? Holloway remains the better case for the proposition that express prohibition and technological circumvention can transform a domestic search into unlawful access.

The Zoom-testimony portion also has crossover value for family lawyers. If you want remote testimony at a temporary-orders hearing, final trial, or enforcement proceeding, do not assume convenience arguments will carry the day. Build a record on necessity, reliability, prejudice, confrontation concerns where relevant, and the court’s authority under applicable procedural rules. Trial judges retain broad control, and appellate courts are reluctant to second-guess those calls without a developed record.

Checklists

Vet Digital Access Before You Use the Evidence

Build the Admissibility Record for the Proponent

Attack the Evidence if You Represent the Device Owner

Counsel Family-Law Clients Without Creating Exposure

Use Written Agreements Strategically

Preserve Error on Remote Testimony Requests

Citation

Ortego v. State, Nos. 01-24-00878-CR, 01-24-00879-CR, 01-24-00880-CR, 01-24-00881-CR, ___ S.W.3d ___, 2026 WL ___ (Tex. App.—Houston [1st Dist.] Apr. 14, 2026, no pet. h.).

Full Opinion

Read the full opinion here

Family Law Crossover

Ortego can be weaponized in Texas family litigation in two opposite ways. If you represent the spouse who found the evidence, the case is a roadmap for reframing the dispute from “privacy invasion” to “consensual access confirmed by writing and course of conduct.” That can materially strengthen the admissibility of texts, photos, deleted messages, app data, and account contents relevant to adultery, dissipation, family violence, substance abuse, child endangerment, or parental fitness. If you represent the responding spouse, Ortego tells you exactly where to press back: challenge the existence, continuation, and scope of consent; isolate each device and account; and develop facts showing revocation, circumvention, or access beyond any agreed boundaries. In that sense, the case is less about criminal suppression than about control of the evidentiary narrative in high-conflict family cases.

~~7f291927-f5ad-4292-958d-ffe4c3ae86f9~~

Share this content:

Exit mobile version