CROSSOVER: Spouse’s Access-to-Phone Agreement Defeats Suppression Attack in Child-Sex Case, Offering Civil Discovery and Digital-Privacy Lessons for Family Lawyers
Ortego v. State, 01-24-00880-CR, April 14, 2026.
On appeal from 253rd District Court, Chambers County, Texas
Synopsis
The First Court of Appeals held that incriminating evidence a wife found on her husband’s phone was not suppressible because she acted as a private individual, not a state actor, and the husband had given written consent allowing her to inspect the phone if she had concerns. The court also rejected the defendant’s effort to exclude the evidence under Article 38.23 and affirmed the denial of his request to present two defense witnesses remotely by Zoom.
Relevance to Family Law
For Texas family lawyers, Ortego is a digital-access case disguised as a criminal appeal. Its practical significance lies in how courts may evaluate a spouse’s authority to access a device, the evidentiary value of written consent between partners, and the limits of privacy objections when one spouse later uses phone-derived evidence in divorce, SAPCR, protective-order, custody-modification, or property disputes. It also offers a strategic reminder that informal relationship documents, password-sharing practices, and course-of-conduct evidence can become outcome-determinative when parties fight over admissibility, authenticity, and the legality of digital self-help.
Case Summary
Fact Summary
The defendant was prosecuted for multiple sexual offenses involving his minor daughter. The critical evidence included sexual text messages between the defendant and the child, discovered by the child’s mother, Jennifer, when she searched the defendant’s phone in December 2021.
Jennifer testified that after an earlier divorce and later reconciliation, she agreed to resume the relationship only on specified conditions because she did not trust him. One of those conditions was access to his phone. The State introduced a handwritten document authored by the defendant, titled “A Commitment to You,” containing eleven promises. One promise stated: “To let u if u have any concerns to look at my phone for any reasons [sic.].” The defendant stipulated that the writing was his.
Jennifer further testified that this phone-access condition was essential to the resumed relationship, that the defendant never prevented her from inspecting the device, and that he did not conceal his passwords from her. She routinely checked the phone for evidence of cocaine use, pornography, and communications with other women. One evening, while the defendant was showering, she searched the phone and found deleted sexual conversations with their daughter in the trash folder. She took screenshots, texted them to herself, confronted him, and later returned the phone when he left the house.
The defense argued suppression on several theories: that the search was unconstitutional, that Jennifer exceeded the scope of any consent, that retaining the phone temporarily amounted to theft, and that she violated Penal Code section 33.02 by accessing the device without effective consent. The defense also relied on State v. Holloway, where a wife accessed a husband’s phone after he had expressly forbidden access and used his thumb while he slept to unlock it. The trial court distinguished Holloway, found Jennifer had consent to inspect the phone, and denied suppression. It also refused a requested Article 38.23 jury instruction and denied the defendant’s request to present two witnesses remotely by Zoom.
Issues Decided
- Whether evidence obtained from the defendant’s phone by his wife should have been suppressed under the Fourth Amendment.
- Whether the evidence should have been excluded under Texas Code of Criminal Procedure article 38.23 on the theory that the wife obtained it through criminal conduct, including alleged breach of computer security or theft.
- Whether the defendant was entitled to an Article 38.23 jury instruction directing the jury to disregard the evidence if it believed it was illegally obtained.
- Whether the trial court erred in denying the defendant’s request to have two witnesses testify remotely by Zoom.
Rules Applied
The court’s analysis turned on the distinction between government searches and private conduct.
- The Fourth Amendment and parallel Texas constitutional protections restrain governmental action, not purely private action.
- Under Texas Code of Criminal Procedure article 38.23, evidence obtained by a private person is excluded only if it was obtained in violation of a criminal law.
- Consent defeats a claim that access to a device constituted unlawful access under Penal Code section 33.02, the breach-of-computer-security statute.
- A trial court’s ruling on a motion to suppress is reviewed under the familiar bifurcated standard: almost total deference to supported fact findings and de novo review of pure legal questions.
- The court relied on authority including State v. Ruiz, 577 S.W.3d 543 (Tex. Crim. App. 2019), for the proposition that constitutional search-and-seizure protections do not apply to private individuals, and discussed State v. Holloway, 714 S.W.3d 153 (Tex. App.—Austin 2024, no pet.), as a contrasting case involving express prohibition on phone access.
Application
The State’s win was driven by one fact more than any other: written consent. The “Commitment to You” note did not merely suggest a vague atmosphere of openness; it gave the trial court a concrete basis to find that Jennifer had permission to inspect the phone if she had concerns. That finding mattered twice over. First, it defeated the defendant’s attempt to constitutionalize the search, because Jennifer was not law enforcement and there was no evidence the government directed, enlisted, or participated in her initial access. Second, it undercut the argument that she committed an offense in obtaining the evidence, which was the only available path to exclusion under article 38.23.
The defense tried to narrow consent by arguing that even if Jennifer could look at the phone generally, she exceeded the permitted scope by searching while he was showering and by viewing messages in the trash folder. The court was not persuaded. On the record described in the opinion, the trial court was entitled to find broad permission: Jennifer could look at the phone “for any reasons” if she had concerns, she regularly did so, the defendant never stopped her, and he did not hide passwords. That pattern of conduct supported the conclusion that access to deleted messages was still within the consent actually given.
The Holloway comparison failed because the key fact in Holloway was the opposite of the key fact in Ortego. In Holloway, the wife had been explicitly forbidden from accessing the phone and resorted to using the husband’s thumb while he slept to unlock it. In Ortego, the defendant had affirmatively granted access in writing and, according to the evidence the trial court credited, maintained that permission as part of the relationship.
The article 38.23 jury-instruction request failed for essentially the same reason. A defendant is not entitled to that instruction absent a genuine factual dispute material to whether the evidence was illegally obtained. Because the trial court found consent was uncontroverted and the record supported that determination, there was no material fact issue requiring submission to the jury on the legality of Jennifer’s access.
As for Zoom testimony, the appellate court upheld the trial court’s refusal to allow two defense witnesses to appear remotely. While the snippet provided does not include the court’s full reasoning on that point, the affirmance signals continued deference to trial-court control over witness presentation and underscores the need for a robust record when seeking remote testimony in a criminal or quasi-criminal evidentiary setting.
Holding
The court held that the phone evidence was properly admitted because Jennifer acted as a private individual rather than a governmental actor, so the Fourth Amendment did not apply to her conduct. The court further held that article 38.23 did not require exclusion because the trial court could reasonably find Jennifer had the defendant’s consent to access the phone, which defeated the claim that she committed breach of computer security or another predicate offense in obtaining the screenshots.
The court also held that the trial court did not err in refusing the requested article 38.23 jury instruction. Without a material factual dispute over whether Jennifer had lawful access to the phone, there was no basis to submit an exclusionary-rule instruction to the jury.
Finally, the court held that the trial court did not reversibly err in denying the defendant’s request to present two witnesses remotely by Zoom. The convictions and sentences were affirmed.
Practical Application
For family litigators, Ortego should immediately prompt a reassessment of how you plead, prove, attack, and defend digital evidence obtained by a spouse or co-parent. In many family cases, the dispositive threshold issue will not be abstract “privacy,” but rather authority: Did the accessing spouse have actual permission, apparent permission, shared use, password access, account-level authority, or a documented course of conduct showing mutual inspection rights? If so, an illegality argument may collapse before the merits are ever reached.
In divorce litigation, this case can matter when one spouse presents screenshots of deleted messages, hidden applications, financial transfers, dating-app activity, pornography, substance-abuse evidence, or communications bearing on fault, waste, reimbursement, fraud on the community, or conservatorship. Ortego suggests that a signed agreement, reconciliation memo, Rule 11 agreement, counseling-related undertaking, or even repeated tolerated access practices may become critical in defeating objections that the data was unlawfully obtained.
In custody and modification cases, Ortego is especially significant where one parent uncovers communications suggesting grooming, alienation, substance abuse, family violence, or dangerous household conditions. The case does not create a blank check for digital vigilantism, and lawyers should be careful not to induce clients to engage in conduct that could cross into unlawful access. But where the client already had consensual access, shared credentials, or standing authority to inspect a device, Ortego provides a framework for defending admissibility and blunting “suppression” rhetoric imported from criminal practice.
On the defensive side, if you represent the spouse whose device was searched, Ortego teaches that generic privacy objections are often too late. The better attack is factual and granular: Was consent revoked? Was it limited by subject matter, timing, folder, account, or device? Did the spouse bypass security, impersonate the user, use biometric unlocking without permission, or access cloud data beyond the scope of any shared-device authority? Holloway remains the better case for the proposition that express prohibition and technological circumvention can transform a domestic search into unlawful access.
The Zoom-testimony portion also has crossover value for family lawyers. If you want remote testimony at a temporary-orders hearing, final trial, or enforcement proceeding, do not assume convenience arguments will carry the day. Build a record on necessity, reliability, prejudice, confrontation concerns where relevant, and the court’s authority under applicable procedural rules. Trial judges retain broad control, and appellate courts are reluctant to second-guess those calls without a developed record.
Checklists
Vet Digital Access Before You Use the Evidence
- Determine who owned the device, account, and phone number.
- Identify whether the parties shared the device, passcodes, cloud accounts, or family-plan access.
- Ask whether there was express written permission to inspect the device or account.
- Collect any texts, emails, notes, Rule 11 agreements, reconciliation agreements, or counseling documents reflecting access rights.
- Pin down whether the alleged consent was ongoing, conditional, revoked, or limited.
- Confirm whether the client accessed only what was viewable with existing permission or bypassed a security barrier.
Build the Admissibility Record for the Proponent
- Preserve screenshots with metadata where possible.
- Obtain testimony describing when, how, and why the device was accessed.
- Establish course-of-dealing evidence showing regular permitted inspections.
- Offer documentary proof of consent, including handwritten notes or signed agreements.
- Show that no law enforcement officer directed or participated in the initial search.
- Distinguish any facts suggesting circumvention, impersonation, or revoked permission.
- Prepare authentication testimony for messages, screenshots, deletions, and trash-folder recovery.
Attack the Evidence if You Represent the Device Owner
- Identify any express revocation of access before the search.
- Show any limits on the scope of permission, including subject matter, timing, or account restrictions.
- Develop facts showing the opposing party guessed passwords, used biometrics without permission, or bypassed technical protections.
- Separate device access from account access; consent to one does not always equal consent to all linked platforms.
- Argue that deleted, archived, or cloud-stored data fell outside any limited permission.
- Preserve objections based on authenticity, completeness, hearsay, and chain of custody even if illegality arguments fail.
- Consider whether Holloway-type facts better fit your record than Ortego.
Counsel Family-Law Clients Without Creating Exposure
- Instruct clients not to hack, guess passwords, install spyware, or use biometric unlocking without clear authority.
- Tell clients not to delete, alter, or forward data in ways that could create spoliation or authenticity problems.
- Encourage clients to preserve what they have already lawfully accessed rather than expanding the search.
- Document the source of every screenshot or export immediately.
- Advise clients that “we share the same house” is not the same as lawful access to every device or account.
- Where appropriate, obtain evidence through formal discovery, temporary orders, subpoenas, or forensic protocols instead of self-help.
Use Written Agreements Strategically
- In reconciliation, cohabitation, or mediated settlement contexts, consider whether digital-access terms should be expressly addressed.
- Define whether access applies to devices, accounts, apps, cloud backups, and deleted-content folders.
- State whether consent is continuing or revocable and how revocation must occur.
- Clarify whether access is for safety, sobriety monitoring, fidelity concerns, co-parenting, or financial transparency.
- Warn clients that broad written consent may later be used against them in collateral proceedings.
Preserve Error on Remote Testimony Requests
- File a written motion identifying the witness, testimony, necessity, and legal basis for remote appearance.
- Explain why live testimony is impracticable and why remote testimony is reliable.
- Address prejudice, credibility assessment, exhibit handling, and cross-examination logistics.
- Make an offer of proof on the substance and importance of the testimony.
- Obtain a clear ruling on the record.
- If denied, preserve harm by showing why the witness mattered to a contested issue.
Citation
Ortego v. State, Nos. 01-24-00878-CR, 01-24-00879-CR, 01-24-00880-CR, 01-24-00881-CR, ___ S.W.3d ___, 2026 WL ___ (Tex. App.—Houston [1st Dist.] Apr. 14, 2026, no pet. h.).
Full Opinion
Family Law Crossover
Ortego can be weaponized in Texas family litigation in two opposite ways. If you represent the spouse who found the evidence, the case is a roadmap for reframing the dispute from “privacy invasion” to “consensual access confirmed by writing and course of conduct.” That can materially strengthen the admissibility of texts, photos, deleted messages, app data, and account contents relevant to adultery, dissipation, family violence, substance abuse, child endangerment, or parental fitness. If you represent the responding spouse, Ortego tells you exactly where to press back: challenge the existence, continuation, and scope of consent; isolate each device and account; and develop facts showing revocation, circumvention, or access beyond any agreed boundaries. In that sense, the case is less about criminal suppression than about control of the evidentiary narrative in high-conflict family cases.
~~7f291927-f5ad-4292-958d-ffe4c3ae86f9~~
Share this content:
