CROSSOVER: Spouse’s consensual access to accused parent’s phone defeats suppression challenge, preserving child-abuse texts for use in related family-law proceedings
Ortego v. State, 01-24-00879-CR, April 14, 2026.
On appeal from 253rd District Court, Chambers County, Texas
Synopsis
A spouse’s review of an accused parent’s cell phone was not suppressible where the spouse acted as a private actor and the record showed prior written consent allowing her to inspect the phone. The First Court also held the trial court did not abuse its discretion by refusing to allow two defense witnesses to testify remotely by Zoom.
Relevance to Family Law
For Texas family-law litigators, Ortego matters because it sharpens the line between governmental searches and private-party evidence collection in intra-family disputes. In divorce, SAPCR, modification, and protective-order litigation, electronically stored communications obtained by a spouse may be highly usable where the access was consensual or otherwise lawfully authorized, and the case provides a strong appellate framework for defeating “suppression-style” attacks imported from criminal law into custody and property disputes. It also underscores that family lawyers should develop the consent record early—password sharing, written device-access agreements, routine historical access, and the absence of concealment may become outcome-determinative when text messages, deleted communications, and screenshots migrate from a domestic conflict into parallel civil and criminal proceedings.
Case Summary
Fact Summary
The appellant was convicted of continuous sexual abuse of a young child and multiple counts of indecency by contact involving his minor daughter. The evidentiary fight centered on text messages discovered by his wife, Jennifer, on his cell phone. According to Jennifer, the parties had resumed living together after a prior divorce, but only on conditions designed to address trust concerns. One of those conditions was her access to his phone.
At the suppression hearing, the State introduced a handwritten document authored by the appellant titled “A Commitment to You.” One listed commitment stated: “To let u if u have any concerns to look at my phone for any reasons [sic.].” Jennifer testified that this agreement was a necessary condition of reconciliation, that the appellant never revoked it, never hid his password from her, and never prevented her from inspecting the device.
Jennifer further testified that she routinely checked the phone for evidence of cocaine use, pornography, and communications with other women. One night, while the appellant was showering, she reviewed the phone and located sexual communications between him and their daughter in the trash folder. She took screenshots, sent them to herself, confronted him, and later turned the information over. The defense argued that the search exceeded the scope of any consent, that retention of the phone for a period of time amounted to theft, and that the conduct constituted breach of computer security under Penal Code section 33.02.
The trial court denied suppression, finding it uncontroverted that Jennifer had consent to look at the phone and that no law-enforcement actor was involved in the initial search. The court later rejected a renewed suppression argument based on State v. Holloway, where a wife accessed a phone after being expressly forbidden from doing so. At trial, the text messages came in, and the court also refused the defense request for an Article 38.23 jury instruction.
Issues Decided
- Whether evidence obtained by the appellant’s wife from his cell phone was subject to suppression under the Fourth Amendment.
- Whether Article 38.23 required exclusion because the wife allegedly committed theft, tampering, breach of computer security, or another legal violation in accessing and copying the phone contents.
- Whether the appellant was entitled to an Article 38.23 jury instruction directing jurors to disregard the phone evidence if they believed it was illegally obtained.
- Whether the trial court abused its discretion by denying the defense request to permit two witnesses to testify remotely via Zoom.
Rules Applied
The court’s analysis turned on several familiar but strategically important principles:
- The Fourth Amendment restrains governmental action, not conduct by a purely private individual.
- Under Code of Criminal Procedure article 38.23, evidence obtained by a private person is excluded only if it was obtained in violation of a criminal law or other law triggering the statute’s exclusionary mechanism.
- Appellate review of suppression rulings is bifurcated: factual findings supported by the record receive almost total deference, while legal questions not dependent on credibility are reviewed de novo.
- Consent defeats many unauthorized-access theories; where the factfinder credits evidence of prior authorization to inspect a device, claims under Penal Code section 33.02 become significantly weaker.
- State v. Granville, addressing privacy interests in cell phones, concerns governmental searches and does not control where the search is undertaken by a private actor.
- State v. Holloway, in which the wife had been expressly forbidden from searching the phone and surreptitiously used the husband’s thumb to unlock it, is distinguishable when the record shows standing consent.
The opinion specifically situates itself within the line of authority recognizing that constitutional search-and-seizure protections are aimed at the State, while private-party acquisition is tested through statutory illegality rather than direct Fourth Amendment analysis.
Application
The First Court treated the suppression dispute as a consent case, not a digital-privacy case in the constitutional sense urged by the defense. That framing mattered. Once the court accepted the trial court’s supported factual finding that Jennifer had prior written permission to inspect the appellant’s phone “for any reasons,” the defense theories largely collapsed. The appellant attempted to narrow or condition that consent by arguing that messages in the trash folder were somehow beyond the permitted scope, and that Jennifer’s choosing to inspect the phone while he was in the shower rendered the access unlawful. But the court viewed those arguments as incompatible with the record the trial court was entitled to credit: a standing agreement, password access, a history of routine inspections, and no evidence that the consent had been revoked or limited in the way the defense proposed.
That factual distinction also neutralized the appellant’s reliance on Holloway. In Holloway, the wife acted contrary to an explicit prohibition and exploited the husband’s body to unlock the phone while he slept. Here, by contrast, the wife acted under an existing written arrangement authorizing phone review. The trial court could therefore conclude that the access was consensual rather than unauthorized. The same logic defeated the theory that she committed breach of computer security.
The effort to recast the temporary retention of the phone as theft likewise failed to generate an exclusion issue. Jennifer testified that she reviewed the phone, transmitted screenshots to herself, confronted the appellant, and returned the device shortly thereafter. On this record, the trial court had no obligation to find a criminal taking that would trigger article 38.23. And because the material historical facts were not genuinely disputed in a way material to illegality, the requested article 38.23 jury instruction was properly denied.
As to Zoom testimony, the court held the trial judge acted within the zone of reasonable disagreement in requiring in-person presentation rather than remote testimony from the two defense witnesses. Although the excerpted opinion text does not recite the full details of that analysis, the stated holding confirms no abuse of discretion was shown.
Holding
The First Court affirmed the denial of the motion to suppress. It held that the wife’s search of the appellant’s phone did not implicate the Fourth Amendment because she was acting as a private individual rather than as an agent of law enforcement. It further held that article 38.23 did not require exclusion because the record supported the trial court’s finding that the appellant had previously given written consent for her to inspect the phone, defeating the claim that the evidence was obtained through criminal or otherwise unlawful conduct.
The court also affirmed the denial of the requested article 38.23 jury instruction. Because there was no material fact issue requiring jury resolution on whether the wife had obtained the evidence illegally, the trial court did not err by refusing to submit the instruction.
Finally, the court held that the trial court did not abuse its discretion in denying the defense request to present two witnesses remotely by Zoom. The convictions were therefore affirmed in full.
Practical Application
For family-law practitioners, Ortego is less about criminal procedure than about evidentiary positioning in parallel proceedings. When one spouse, conservator, or household member discovers texts, photos, app messages, or deleted content on another party’s device, the first strategic question is no longer simply “Was this invasive?” but “What is the source and scope of the access?” If you represent the proponent of the evidence, you should build a record showing preexisting permission, shared-device practices, password sharing, household norms, written reconciliation terms, or any other fact demonstrating effective consent. If you represent the target, your work begins with proving revocation, limitation, express prohibition, biometric circumvention, deception, or surreptitious access beyond the parties’ established course of dealing.
In custody litigation, the implications are obvious. Communications suggesting abuse, grooming, substance use, pornography exposure, family violence, parental alienation, or concealed relationships may become central to temporary orders, emergency relief, supervised access, and final conservatorship determinations. Ortego gives the proponent a useful appellate answer when the opposing party tries to convert an evidentiary admissibility dispute into a broad constitutional privacy claim.
The case also has real force in divorce and property litigation. Parties often access phones, tablets, cloud accounts, and message backups in the period immediately before separation. If there is documentary evidence that access was mutually contemplated or historically permitted, Ortego supports the argument that the evidence was not “illegally obtained” merely because it was later used in litigation. But the inverse is equally important: where access was expressly forbidden, a practitioner should expect Holloway-type arguments and should avoid relying on questionable self-help when formal discovery, temporary restraining orders, or forensic protocols are available.
A few strategic takeaways stand out:
- Put consent in writing whenever device transparency is part of a reconciliation, cohabitation agreement, or informal marital arrangement.
- Preserve metadata, screenshots, and chain-of-custody details immediately; family-law courts care about authenticity even when suppression doctrines do not fit neatly.
- Do not assume “trash” or deleted folders are categorically off-limits if the access itself is consensual.
- In abuse-adjacent family cases, coordinate early with criminal counsel because the evidentiary posture in one proceeding will affect leverage in the other.
- If remote testimony is important, build a concrete necessity record rather than relying on convenience-based requests.
Checklists
When You Want to Use a Spouse’s Phone Evidence
- Identify every fact showing prior consent to access the device.
- Obtain and preserve any written agreement, text exchange, email, or note reflecting permission.
- Document whether passwords were shared voluntarily.
- Establish whether the parties had a routine practice of reviewing each other’s devices.
- Determine whether the access occurred before any express revocation of consent.
- Preserve screenshots in original form and maintain metadata where possible.
- Create a clean chain-of-custody chronology: when accessed, what was found, what was copied, and when the device was returned.
- Separate private-party conduct from any later police involvement to avoid agency arguments.
When You Need to Attack the Admissibility of Phone Evidence
- Look for evidence of express revocation or limitation of any prior consent.
- Develop facts showing the access was covert, deceptive, or technologically forced.
- Determine whether biometrics, spoofing, guessed passwords, or account recovery tools were used without authorization.
- Compare the facts to Holloway, not just to general digital-privacy cases.
- Identify whether the proponent is overstating a general transparency agreement into unlimited digital consent.
- Probe whether a private actor was functioning as an instrument or agent of law enforcement.
- Raise authenticity, completeness, and alteration challenges even if exclusion is unlikely on search-and-seizure grounds.
- Consider civil remedies, protective orders, or sanctions theories where suppression is unavailable.
For Custody and SAPCR Cases Involving Abuse-Related Communications
- Move quickly to secure temporary orders protecting the child once credible digital evidence surfaces.
- Tie the communications directly to best-interest factors and risk-of-harm analysis.
- Consider whether forensic extraction is needed to corroborate screenshots.
- Preserve the context of the messages, including dates, participants, and surrounding exchanges.
- Coordinate with CPS, law enforcement, and criminal counsel without turning your client into a state agent unnecessarily.
- Evaluate whether the messages support restrictions on possession, supervised access, or no-contact provisions.
- Prepare for privilege and Fifth Amendment complications in overlapping proceedings.
For Drafting Reconciliation or Cohabitation Agreements
- State clearly whether device access is mutual, limited, conditional, or revocable.
- Define whether access includes messages, deleted items, cloud backups, social-media accounts, and app-based communications.
- Specify whether passwords must be disclosed or kept current.
- Include a revocation mechanism and require revocation to be in writing.
- Address how copied information may be used if future litigation arises.
- Avoid vague language that invites later fights over scope.
- Revisit and update the agreement if the relationship status changes.
For Remote Testimony Requests
- File the request early.
- Provide specific reasons remote testimony is necessary, not merely convenient.
- Show materiality of the witness and why live in-person testimony is impracticable.
- Address reliability, oath administration, exhibit handling, and cross-examination logistics.
- Offer a concrete technological plan.
- Preserve the ruling and make a detailed bill if the request is denied.
Citation
Ortego v. State, Nos. 01-24-00878-CR, 01-24-00879-CR, 01-24-00880-CR, 01-24-00881-CR, ___ S.W.3d ___, 2026 WL ___ (Tex. App.—Houston [1st Dist.] Apr. 14, 2026, no pet. h.).
Full Opinion
Family Law Crossover
This case can be weaponized effectively in Texas divorce and custody litigation by reframing damaging digital evidence as the product of authorized private access rather than unlawful interception. If your client obtained incriminating texts from the other spouse’s phone under a standing transparency arrangement, shared-password practice, or written reconciliation term, Ortego supplies a disciplined argument that the opposing party’s “privacy” objection is miscast and that the evidence is admissible for temporary-orders hearings, custody trials, disproving parental fitness, tracing waste or dissipation, or establishing deception relevant to conservatorship and credibility. Conversely, if you represent the spouse whose device was searched, Ortego tells you exactly where to attack: revoke consent clearly, document the revocation, prohibit access expressly, and create a record that any later entry was unauthorized, technologically manipulated, or beyond the historical scope of permitted access.
~~ae0fe010-f0e4-49d7-bf44-957736c2fb6a~~
Share this content:
