Site icon Thomas J. Daley

CROSSOVER: Spouse’s consensual access to accused parent’s phone defeats suppression challenge, preserving child-abuse texts for use in related family-law proceedings

New Texas Court of Appeals Opinion - Analyzed for Family Law Attorneys

Ortego v. State, 01-24-00879-CR, April 14, 2026.

On appeal from 253rd District Court, Chambers County, Texas

Synopsis

A spouse’s review of an accused parent’s cell phone was not suppressible where the spouse acted as a private actor and the record showed prior written consent allowing her to inspect the phone. The First Court also held the trial court did not abuse its discretion by refusing to allow two defense witnesses to testify remotely by Zoom.

Relevance to Family Law

For Texas family-law litigators, Ortego matters because it sharpens the line between governmental searches and private-party evidence collection in intra-family disputes. In divorce, SAPCR, modification, and protective-order litigation, electronically stored communications obtained by a spouse may be highly usable where the access was consensual or otherwise lawfully authorized, and the case provides a strong appellate framework for defeating “suppression-style” attacks imported from criminal law into custody and property disputes. It also underscores that family lawyers should develop the consent record early—password sharing, written device-access agreements, routine historical access, and the absence of concealment may become outcome-determinative when text messages, deleted communications, and screenshots migrate from a domestic conflict into parallel civil and criminal proceedings.

Case Summary

Fact Summary

The appellant was convicted of continuous sexual abuse of a young child and multiple counts of indecency by contact involving his minor daughter. The evidentiary fight centered on text messages discovered by his wife, Jennifer, on his cell phone. According to Jennifer, the parties had resumed living together after a prior divorce, but only on conditions designed to address trust concerns. One of those conditions was her access to his phone.

At the suppression hearing, the State introduced a handwritten document authored by the appellant titled “A Commitment to You.” One listed commitment stated: “To let u if u have any concerns to look at my phone for any reasons [sic.].” Jennifer testified that this agreement was a necessary condition of reconciliation, that the appellant never revoked it, never hid his password from her, and never prevented her from inspecting the device.

Jennifer further testified that she routinely checked the phone for evidence of cocaine use, pornography, and communications with other women. One night, while the appellant was showering, she reviewed the phone and located sexual communications between him and their daughter in the trash folder. She took screenshots, sent them to herself, confronted him, and later turned the information over. The defense argued that the search exceeded the scope of any consent, that retention of the phone for a period of time amounted to theft, and that the conduct constituted breach of computer security under Penal Code section 33.02.

The trial court denied suppression, finding it uncontroverted that Jennifer had consent to look at the phone and that no law-enforcement actor was involved in the initial search. The court later rejected a renewed suppression argument based on State v. Holloway, where a wife accessed a phone after being expressly forbidden from doing so. At trial, the text messages came in, and the court also refused the defense request for an Article 38.23 jury instruction.

Issues Decided

Rules Applied

The court’s analysis turned on several familiar but strategically important principles:

The opinion specifically situates itself within the line of authority recognizing that constitutional search-and-seizure protections are aimed at the State, while private-party acquisition is tested through statutory illegality rather than direct Fourth Amendment analysis.

Application

The First Court treated the suppression dispute as a consent case, not a digital-privacy case in the constitutional sense urged by the defense. That framing mattered. Once the court accepted the trial court’s supported factual finding that Jennifer had prior written permission to inspect the appellant’s phone “for any reasons,” the defense theories largely collapsed. The appellant attempted to narrow or condition that consent by arguing that messages in the trash folder were somehow beyond the permitted scope, and that Jennifer’s choosing to inspect the phone while he was in the shower rendered the access unlawful. But the court viewed those arguments as incompatible with the record the trial court was entitled to credit: a standing agreement, password access, a history of routine inspections, and no evidence that the consent had been revoked or limited in the way the defense proposed.

That factual distinction also neutralized the appellant’s reliance on Holloway. In Holloway, the wife acted contrary to an explicit prohibition and exploited the husband’s body to unlock the phone while he slept. Here, by contrast, the wife acted under an existing written arrangement authorizing phone review. The trial court could therefore conclude that the access was consensual rather than unauthorized. The same logic defeated the theory that she committed breach of computer security.

The effort to recast the temporary retention of the phone as theft likewise failed to generate an exclusion issue. Jennifer testified that she reviewed the phone, transmitted screenshots to herself, confronted the appellant, and returned the device shortly thereafter. On this record, the trial court had no obligation to find a criminal taking that would trigger article 38.23. And because the material historical facts were not genuinely disputed in a way material to illegality, the requested article 38.23 jury instruction was properly denied.

As to Zoom testimony, the court held the trial judge acted within the zone of reasonable disagreement in requiring in-person presentation rather than remote testimony from the two defense witnesses. Although the excerpted opinion text does not recite the full details of that analysis, the stated holding confirms no abuse of discretion was shown.

Holding

The First Court affirmed the denial of the motion to suppress. It held that the wife’s search of the appellant’s phone did not implicate the Fourth Amendment because she was acting as a private individual rather than as an agent of law enforcement. It further held that article 38.23 did not require exclusion because the record supported the trial court’s finding that the appellant had previously given written consent for her to inspect the phone, defeating the claim that the evidence was obtained through criminal or otherwise unlawful conduct.

The court also affirmed the denial of the requested article 38.23 jury instruction. Because there was no material fact issue requiring jury resolution on whether the wife had obtained the evidence illegally, the trial court did not err by refusing to submit the instruction.

Finally, the court held that the trial court did not abuse its discretion in denying the defense request to present two witnesses remotely by Zoom. The convictions were therefore affirmed in full.

Practical Application

For family-law practitioners, Ortego is less about criminal procedure than about evidentiary positioning in parallel proceedings. When one spouse, conservator, or household member discovers texts, photos, app messages, or deleted content on another party’s device, the first strategic question is no longer simply “Was this invasive?” but “What is the source and scope of the access?” If you represent the proponent of the evidence, you should build a record showing preexisting permission, shared-device practices, password sharing, household norms, written reconciliation terms, or any other fact demonstrating effective consent. If you represent the target, your work begins with proving revocation, limitation, express prohibition, biometric circumvention, deception, or surreptitious access beyond the parties’ established course of dealing.

In custody litigation, the implications are obvious. Communications suggesting abuse, grooming, substance use, pornography exposure, family violence, parental alienation, or concealed relationships may become central to temporary orders, emergency relief, supervised access, and final conservatorship determinations. Ortego gives the proponent a useful appellate answer when the opposing party tries to convert an evidentiary admissibility dispute into a broad constitutional privacy claim.

The case also has real force in divorce and property litigation. Parties often access phones, tablets, cloud accounts, and message backups in the period immediately before separation. If there is documentary evidence that access was mutually contemplated or historically permitted, Ortego supports the argument that the evidence was not “illegally obtained” merely because it was later used in litigation. But the inverse is equally important: where access was expressly forbidden, a practitioner should expect Holloway-type arguments and should avoid relying on questionable self-help when formal discovery, temporary restraining orders, or forensic protocols are available.

A few strategic takeaways stand out:

Checklists

When You Want to Use a Spouse’s Phone Evidence

When You Need to Attack the Admissibility of Phone Evidence

For Custody and SAPCR Cases Involving Abuse-Related Communications

For Drafting Reconciliation or Cohabitation Agreements

For Remote Testimony Requests

Citation

Ortego v. State, Nos. 01-24-00878-CR, 01-24-00879-CR, 01-24-00880-CR, 01-24-00881-CR, ___ S.W.3d ___, 2026 WL ___ (Tex. App.—Houston [1st Dist.] Apr. 14, 2026, no pet. h.).

Full Opinion

Read the full opinion here

Family Law Crossover

This case can be weaponized effectively in Texas divorce and custody litigation by reframing damaging digital evidence as the product of authorized private access rather than unlawful interception. If your client obtained incriminating texts from the other spouse’s phone under a standing transparency arrangement, shared-password practice, or written reconciliation term, Ortego supplies a disciplined argument that the opposing party’s “privacy” objection is miscast and that the evidence is admissible for temporary-orders hearings, custody trials, disproving parental fitness, tracing waste or dissipation, or establishing deception relevant to conservatorship and credibility. Conversely, if you represent the spouse whose device was searched, Ortego tells you exactly where to attack: revoke consent clearly, document the revocation, prohibit access expressly, and create a record that any later entry was unauthorized, technologically manipulated, or beyond the historical scope of permitted access.

~~ae0fe010-f0e4-49d7-bf44-957736c2fb6a~~

Share this content:

Exit mobile version