The Metadata Danger in Court Filings
Court filings are public records, which makes metadata in them permanently accessible. Learn what metadata court documents carry and how to protect your practice.
Court filings are permanent public records
When you file a document with a court, it becomes part of the public record. In most jurisdictions, anyone can access it through PACER, state court portals, or in-person requests. The document you filed is the document the public receives — metadata included.
Unlike a document shared with opposing counsel that stays between two parties, a court filing can be downloaded by journalists, researchers, competitors, litigants in unrelated cases, and the general public. Whatever metadata is in that filing is permanently accessible.
This creates a category of metadata risk that is distinct from other forms of document sharing. The exposure is broader, the duration is indefinite, and the consequences are harder to predict.
What metadata court documents typically carry
Court filings are overwhelmingly PDFs, either generated from Word or produced by print-to-PDF. Both pathways embed metadata.
Word-to-PDF metadata inheritance
When a Word document is saved or printed as a PDF, metadata from the original Word file carries over into the PDF. This typically includes:
- Author field — the name of the person whose Word license created the file, which may be a paralegal, a junior associate, or someone at a completely different firm if the document was adapted from a template
- Company field — the organization name configured in Word, which may reveal the firm or the firm's client if the document was prepared on a client's system
- Creator and Producer fields — identifying the exact software and version used (e.g., "Microsoft Word 16.78" or "Adobe Acrobat Pro 2024.004")
- Creation and modification timestamps — revealing when the document was first drafted and when it was last edited, which can contradict representations about when work was performed
- Title field — often inherited from the Word document's title, which may contain internal naming conventions like "DRAFT - Motion to Dismiss v3 - JK edits"
Scanned document metadata
Documents scanned from paper add another layer. Scanner metadata can include the scanner make and model, scanning software, resolution settings, and sometimes the operator's name or the device's network hostname. If the scanner embeds OCR text layers, the OCR software name and version also appear.
Embedded image metadata
Exhibits attached to court filings frequently include photographs. If those photographs were taken with smartphones, they may contain EXIF data with GPS coordinates, device serial numbers, and timestamps — data that can identify where and when a photo was taken and on what device.
Real-world consequences
The Pellicano case
In the Anthony Pellicano wiretapping investigation, metadata in court filings helped identify the drafter of specific documents, revealing connections between parties that were not apparent from the document text alone. Metadata analysis became part of the investigative toolkit, not just for law enforcement but for opposing counsel studying publicly available filings.
Opposing counsel metadata mining
Sophisticated litigation teams routinely download opposing counsel's court filings and extract metadata. This is not unethical — it is analyzing publicly available information. The metadata can reveal:
- Who actually drafted the document — the author field may show a name different from the attorney of record, indicating which team members are working on the case
- When drafting occurred — timestamps can show whether a motion was prepared well in advance (suggesting a strategic filing schedule) or drafted the night before the deadline
- What software environment the firm uses — potentially useful for understanding the firm's technological sophistication and resources
- Template origins — if a motion was adapted from a template used in a prior case, the metadata may contain references to the prior matter
Confidential information in internal titles
One of the most common metadata exposures in court filings is the Title field. Lawyers frequently use internal document titles that contain case strategy shorthand, client code names, or draft version notes. When the document is converted to PDF and filed, the Title field persists in the PDF metadata — visible to anyone who checks File > Properties.
State court e-filing requirements
Several states have recognized the metadata problem and addressed it in their e-filing rules.
States requiring metadata removal: Some jurisdictions now explicitly require that electronically filed documents be stripped of metadata before submission. The rules vary — some require removal of "all metadata," while others specify categories like comments, tracked changes, and author information.
States with guidance but not requirements: Other jurisdictions have issued best-practice advisories or ethics opinions recommending metadata removal but not mandating it as a filing requirement.
Federal courts (PACER/CM/ECF): The federal court system does not automatically strip metadata from filed documents. What you upload is what gets served and stored.
The inconsistency across jurisdictions means that relying on the court's e-filing system to handle metadata is not a reliable strategy. The responsibility falls on the filing attorney.
Ethics opinions on metadata
Multiple state bar associations have issued ethics opinions addressing metadata in shared documents. While most focus on the ethical obligations around mining opposing counsel's metadata, several also address the affirmative duty to remove metadata before sharing — including filing.
The general consensus: attorneys have a duty of competence that extends to understanding the technology they use. Failing to remove metadata that reveals privileged or confidential information can constitute a breach of that duty.
Best practices for litigation teams
Pre-filing workflow
- Draft in Word, but do not file the Word-to-PDF output without inspection. The default Save As PDF preserves metadata from the Word file.
- Run Document Inspector in Word before conversion. This catches comments, tracked changes, and document properties — but does not catch everything.
- After conversion to PDF, inspect the PDF's metadata separately. The PDF may contain metadata that the Word inspection did not address, including inherited fields and PDF-specific properties.
- Check embedded exhibits. If your filing includes photo exhibits, inspect each image for EXIF data, especially GPS coordinates.
- Verify after cleaning. Run a second scan on the final PDF to confirm that metadata removal was successful.
Firm-level policies
- Establish a standard operating procedure for metadata removal before any external document sharing, with court filings treated as the highest-risk category
- Configure Word templates with generic author and company information rather than individual attorney names
- Train staff on the difference between "accepting tracked changes" (which removes the visual markup) and actually purging revision data from the file's XML structure
- Use automated tools for metadata scanning and removal rather than relying on manual inspection, especially for high-volume litigation
What to do about past filings
If you have already filed documents with problematic metadata, the options are limited. Court filings are part of the permanent record. In some jurisdictions, you can file a motion to substitute a redacted version, but this draws attention to the issue. Prevention is significantly easier than remediation.
Purgit scans court filings and legal documents for hidden metadata — author names, timestamps, tracked changes, GPS coordinates in exhibits, and internal document titles. It removes findings at the structural level and verifies removal by re-scanning the output before filing.
[Scan a File Free]