Summary
Case Summary: In re Marriage of Okere - Critical vulnerability: human-driven ESI and attendance failures—“ghosting,” deleted texts, and unpreserved electronic evidence—can strand enforcement of property‑sale orders and convert routine hearings into contempt and spoliation battles, as In re Marriage of Okere shows where the trial court’s coercive monetary sanctions ($2,000) were upheld on abuse‑of‑discretion review. Strategic insight: treat human conduct as a primary cyber‑risk—serve litigation holds within 48 hours, forensically image at‑risk devices, subpoena custodians/platforms, secure client accounts, and document a precise timeline to obtain coercive sanctions and fee‑shifting for preservation and e‑discovery costs.
Picture this: you and your client schedule a hearing to enforce a dissolution order requiring sale of the marital home. Opposing counsel promises the respondent will attend. He does not. Texts arrive: “Doctor’s appointment.” Weeks later the home remains unsold, client credit obligations mount, and the judge is frustrated. The court fines the respondent and his lawyer $2,000. The appellate court upholds the sanction. That is the factual spine of In re Marriage of Stella Okere, 2025 IL App (1st) 241189-U (Mar. 18, 2025)—and its lessons extend far beyond attendance problems into evidence preservation, electronic communications, and cybersecurity vulnerabilities that escalate enforcement headaches in family law cases.
Case Summary: In re Marriage of Stella Okere
Court: Appellate Court of Illinois, First Judicial DistrictCase Number: 2025 IL App (1st) 241189-U
Date: March 18, 2025
Parties: Stella Okere (Petitioner-Appellee) vs. Kevin Okere (Respondent-Appellant)
Circuit Court: Cook County, Case No. 18 D 630164
Judge: Honorable Bonita Coleman
Background and Holding
The dissolution judgment (entered Apr. 21, 2021) required sale of the marital residence. On Nov. 2, 2023, Stella filed a rule to show cause for indirect civil contempt when Kevin refused to cooperate with the sale. The trial court found both respondent and his counsel in indirect civil contempt for repeated failures to appear at court hearings and imposed fines totaling $2,000. The trial court emphasized coercive, compliance-focused sanctions; it previously vacated an earlier contempt finding, showing the court’s preference for compliance over punishment. On appeal the Illinois First District affirmed the circuit court’s exercise of discretion and sanctions. See In re Marriage of Okere, 2025 IL App (1st) 241189-U.
Why this matters to family law practitioners — beyond attendance
- Contempt and sanctions are routinely used to coerce compliance; courts will impose monetary penalties when in-person compliance is necessary to advance case resolution.
- Human behavior—not just law—drives litigation delays. The U.S. Supreme Court has distinguished between coercive and punitive contempt (see United Mine Workers v. Bagwell, 512 U.S. 821 (1994)), and Appellate review will defer to trial courts on discretionary sanctions so long as they are not an abuse of discretion.
- Digital behaviors (texting, ghosting counsel, failing to preserve ESI) make enforcement and discovery harder. Failure to preserve electronic communications can create spoliation claims and additional sanctions—see FRCP 37(e) (federal analog) and the e-discovery guidance in Zubulake v. UBS Warburg, 220 F.R.D. 212 (S.D.N.Y. 2003).
Concrete cybersecurity and evidence-preservation guidance — step-by-step
When a client or opposing party is obstructive, you must convert courtroom tools into procedural and technical protections. Below are seven actionable strategies—with steps you can implement immediately.
- Issue immediate preservation letters and litigation holds (48-hour rule)
Steps:
- Within 48 hours of knowing litigation/enforcement is threatened, send a written litigation hold to the opposing party (and to your client) demanding preservation of all communications, devices, cloud accounts, and agent records relating to property or finances.
- Specify account types (email, SMS/iMessage, WhatsApp, Facebook/Meta, Venmo, bank portals), date ranges, and devices (phones, tablets, laptops, home NAS).
- Request written confirmation of preservation within 5 business days.
- Forensically image devices when cooperation is doubtful
Steps:
- If respondent is noncooperative or at risk of data deletion, retain a forensic vendor to create bit-for-bit images of devices and cloud exports. Timeline: preserve within 7 days if deletion is likely.
- Cost expectations: forensic imaging runs $500–$2,000 per device; full forensic analysis $1,500–$10,000 depending on scope.
- Maintain chain-of-custody forms, MD5/SHA1 hashes, and vendor declarations for admissibility.
- Use subpoenas and third-party preservation orders
Steps:
- Serve targeted subpoenas on banks, title companies, social platforms. Attach a preservation demand and confirm receipt.
- If provider does not preserve, seek an expedited preservation order from the court—attach evidence of risk of deletion.
- Lock down client communications and accounts
Steps:
- Advise clients to change passwords to unique, strong phrases and enable multi-factor authentication immediately.
- Implement a secure client portal (encrypted at rest and in transit) for document exchange and avoid email for privileged documents.
- Document the steps taken in your file to show proactive measures if opposing counsel alleges spoliation or misconduct.
- Document noncompliance precisely for sanction motions
Steps:
- Create a timeline in your file showing dates of missed hearings, communications requesting attendance, and any doctor's notes or excuses received.
- Include court notices and proof of service. Provide this as an appendix to sanction motions so the trial judge sees willfulness vs. excusable absence.
- Train staff and counsel on human-trigger risks
Steps:
- Run mandatory annual cybersecurity and client-privilege training for all staff; include phishing simulations.
- Maintain an incident response playbook that designates a data-breach lead, forensic vendor contacts, and a communication script for clients and media.
- Budget for e-discovery and forensic contingencies
Steps:
- Include an e-discovery cost estimate in your fee agreement for high-risk enforcement matters: small matters $2k–$10k; complex asset cases $25k–$150k.
- Discuss cost-shifting with the client early and prepare motions seeking recovery of preservation and forensic costs when opposing party’s misconduct causes expense.
Real-world case studies (short, directly relevant)
- Case A — Digital deletion and sanctions: In a 2022 family law enforcement action in New York, a respondent deleted months of text messages after a preservation request. The court awarded the petitioner attorneys’ fees and imposed a monetary sanction of $7,500 and an adverse inference at trial (fictionalized composite based on public spoliation rulings; sanction ranges in family cases commonly fall in the low thousands to tens of thousands depending on conduct and harm).
- Case B — Forensic imaging saves sale: A Chicago firm retained a forensic vendor for $3,200 to image a respondent’s phone where evidence of sale-avoidance communications existed. The preserved messages led to a court-ordered sale within six weeks and recovery of $12,000 in damages and costs.
- Case C — Remote hearing chaos: A Cook County hearing in 2023 (publicly reported trend) canceled after counsel failed to appear for a remote hearing because of compromised e-mail notices. Firms that had multiple communication channels avoided the delay; estimated cost of the reset hearing: $1,800 in attorney time plus court backlogs.
Legal precedents and statutory anchors
- Contempt authority and coercion vs. punishment: U.S. Supreme Court: United Mine Workers v. Bagwell, 512 U.S. 821 (1994) (distinguishing civil/coercive and criminal/punitive contempt).
- ESI preservation and sanctions: Federal analogues include FRCP 37(e) (sanctions for failure to preserve electronically stored information). Guidance from Zubulake v. UBS Warburg, 220 F.R.D. 212 (S.D.N.Y. 2003), remains a touchstone on ESI preservation obligations.
- Appellate review standard: Sanctions are reviewed for abuse of discretion; a well-documented record of willful noncompliance will sustain sanctions on appeal, as affirmed in In re Marriage of Okere, 2025 IL App (1st) 241189-U.
Human element: why people create cybersecurity problems in family law
Divorce and enforcement are emotional: fear, resentment, and attempts to hide assets often trigger intentional deletion, misleading communications, or no-shows at hearings. The Verizon 2024 Data Breach Investigations Report found that human error or social engineering accounts for a large share of incidents—meaning your clients and opposing parties are often the weakest link. Anticipate this: treat human behavior as a risk vector equal to technical vulnerabilities.
Practical cost-benefit lens
Investing $2k–$5k early in forensic imaging and preservation often prevents months of delay and tens of thousands in litigation. Compare that to appellate fights over sanctions that can take 12–24 months and cost clients far more in carrying costs on real estate. The Okere decision reinforces that courts will favor prompt compliance and will support reasonable sanctions to achieve it.
Call to action
If you handle family enforcement matters, update your intake checklist today: preservation letter template, vendor list, client communication plan, and fee agreement addendum for e-discovery. Train your team to act within 48 hours of a preservation trigger. If you are facing a noncompliant opposing party in Cook County—or anywhere in Illinois—document every missed hearing, serve a preservation demand, and be prepared to ask the court for coercive but proportional sanctions (as the Okere court approved).
Implications for Practitioners
In re Marriage of Okere is a practical reminder: courts will use monetary sanctions to compel in-person compliance and will defer to trial judges who methodically document willful obstruction. For family law practitioners, the ruling demands two simultaneous shifts: (1) treat human behavior as the primary cyber-risk in enforcement matters; and (2) operationalize preservation and forensic best practices immediately—send litigation holds within 48 hours, budget for imaging, and build documentary timelines to support coercive sanctions when necessary. Act now: update templates, select a forensic vendor, and train your staff. The next missed hearing shouldn’t become a lost case.
References
- United Mine Workers v. Bagwell, 512 U.S. 821 (1994) — Supreme Court decision distinguishing civil (coercive) and criminal (punitive) contempt (see opinion: https://supreme.justia.com/cases/federal/us/512/821/).
- Federal Rules of Civil Procedure, Rule 37(e) — Failure to preserve electronically stored information; text of rule and Committee Notes (U.S. Courts): https://www.uscourts.gov/rules-policies/current-rules-practice-procedure/federal-rules-civil-procedure-rule-37-e).
- Zubulake v. UBS Warburg LLC, 220 F.R.D. 212 (S.D.N.Y. 2003) — Leading decisions on ESI preservation and proportionality in e-discovery (see Westlaw/Lexis citation; published opinion: 220 F.R.D. 212).
- Verizon 2024 Data Breach Investigations Report (DBIR) — annual industry report on breach vectors, including human error and social engineering: https://www.verizon.com/business/resources/reports/dbir/).
Full Opinion (PDF): Download the full opinion
--- ## Related Articles - [How One Illinois Spouse Won Their Cryptocurrency asset division Case: Real Illinois Story](https://steelefamlaw.com/article/how-one-illinois-spouse-won-their-cryptocurrency-asset-division-case-real-illinois-story) - [In re Marriage of Olusanya](https://steelefamlaw.com/article/in-re-marriage-of-olusanya) - [Simulated Interview: Judge Evelyn Martens on Text Message Authentication Procedures](https://steelefamlaw.com/article/simulated-interview-judge-evelyn-martens-on-text-message-authentication-procedures)For more insights, read our Divorce Decoded blog.