top of page

Here's the last installment of my outline of Electronic Discovery and Digital Evidence in a Nutshell, the second edition of the West Academic guide to electronic discovery law in the United States authored by Judge Shira Scheindlin (the judge in the Zubulake v. UBS Warburg) and members of the Sedona Conference. The previous installment was posted on April 10, 2017.

XII. ADMISSIBILITY OF DIGITAL EVIDENCE

  1. INTRODUCTION

  2. FRCP 101(b)(6) – digital evidence is admissible whenever hardcopy evidence of the same type would be admissible.

  3. HOW IS DIGITAL EVIDENCE USED IN COURT?

  4. Electronic Business Records

  5. Computer generated animation – e.g. how an accident occurred.

  6. Digital presentation to illustrate an expert’s opinion.

  7. Pedagogic device – aid in questioning a witness

  8. Digital Enhancement –

  9. Information from the internet –

  10. Emails

  11. Other: GPS data; metadata from Word documents.

  12. WHICH EVIDENTIARY RULES ARE MOST OFTEN INVOKED WHEN DIGITAL EVIDENCE IN PREOFFERED?

  13. Five basic concepts raised by digital evidence

  14. Relevance and Prejudice – Rule 403 – probative value outweighed by danger of prejudice, confusion of issues, misleading the jury, undue delay, waste of time, needless presentation of cumulative evidence.

  15. Authenticity – Rule 901- means to establish

  16. Testimony

  17. Appearance taken in conjunction with the circumstances.

  18. Evidence describing a process used to produce an accurate result.

  19. Hearsay - out of court statement offered to prove the truth of the matter asserted.

  20. Rule 801 exemptions – admissions and prior statements.

  21. Rule 803, 804, and 807 exceptions. – business and public records.

  22. Best Evidence Rule – to prove contents of writing proponent must introduce the original or acceptable duplicate – Rules 1001-1004.

  23. Duplicate can be challenged if genuine issue as to authenticity or use is somehow unfair.

  24. Can forgo if good reason for not having it.

  25. United States v. Bennett (9th Cir. 2004) – testimony by Coast Guard officer of GPS backtrack info not admissible when device was not seized. No evidence presented that it would have been difficult to download GPS data.

  26. Requirements for Admissible Expert Testimony - Rule 702 –

  27. Testimony based on sufficient facts or data

  28. Product of reliable principles and methods

  29. Witness has applied principle and methods reliably to the facts of the case.

  30. GENERAL APPROACH TO DIGITAL EVIDENCE

  31. Digital evidence, like all evidence must be probative, reliable and authentic.

  1. ADMISSIBILITY REQUIREMENTS FOR COMMON TYPES OF DIGITAL EVIDENCE

  2. Business and Public Records

  3. US v. Hassan (4th Cir. 2014) – screenshots of Facebook and YouTube with certificates had been maintained as business records in the regular course of business.

  4. Machine Generated Evidence

  5. Computer generated evidence is not hearsay.

  6. Digital Demonstrative Evidence

  7. Rule 403 applied to determine if reconstruction is substantially similar.

  8. Bowoto v. Chevron – 3D model of accident not allowed under Rule 403 if not as accurate as possible.

  9. Digital Presentation to Illustrate Expert’s Opinion or Party’s Theory of a Case

  10. People v. Duenas (Cal. 2012) – computer animation showing party’s theory of how shooting occurred can be admitted if limiting instruction given to the jury.

  11. Pedagogical Devices

  12. Argument should be confined to facts introduced in evidence, facts of common knowledge and logical inferences.

  13. Summary of Voluminous Evidence

  14. Evaluate under Rule 1006.

  15. Digital Enhancements

  16. U.S. v. Seifert (8th Cir. 2006) – digitally enhance surveillance tape admissible – expert real timed a time lapse video, zoomed in, and brightened it.

  17. Internet Evidence

  18. Web site data

  19. Data posted by others with owner’s consent (e.g. chat room)

  20. Data posted without consent (hacking material)

  21. Authentication of Internet Evidence

  22. Web sites

  23. Rule 901(a) – What was on the web site? Does the exhibit accurately reflect it? Is the exhibit attributable to the owner?

  24. Court will review the totality of the circumstances –

  25. Length of time data was on the site.

  26. Data published elsewhere

  27. Distinctive design.

  28. Self-Authentication

  29. Internal publication of a government document constitutes official publication by Rule 902(5).

  30. Rule 902(6) online newspapers and periodicals are self-authenticating.

  31. Courts may take judicial notice of government sites, or map sites.

  32. Internet Archives –

  33. Temporary internet files – expert testimony about retrieval process sufficient to authenticate.

  34. Search engines – testimony or certification as to results is required.

  35. Hearsay Issues with Respect to Internet Evidence\

  36. Every extrajudicial statement drawn from a web site has been made out of court and must satisfy exception or exemption

  37. Data Entry – hearsay – act of data entry considered separate from content of posted declaration.

  38. Only assertive non-verbal conduct raises hearsay issues – e.g. punching price into checkout computer – assertive; scanning bar code non-assertive.

  39. Business and Public Records on a Web Site – hearsay exception under Rule 803.

  40. Market Reports and Tables – Rule 803 exception

  41. Admissions – published website data by litigation is a hearsay exemption.

  42. Non-hearsay proffers – No hearsay issues if offered to show only that the data was published on the web, e.g. in punitive damages proceeding.

  43. Email Evidence

  44. Authentication of Email – low standard. Rule 901(b) can authenticate by its appearance and contents.

  45. US v. Siddiqui (11th Cir. 2000) and US v . Fluker (7th Cir. 2012) – email authentication by circumstantial evidence.

  46. Domain in email address is a mark of origin under Rule 902(7) that can be used to authenticate.

  47. Circumstantial indicia include replies to email; address consistent with that on other emails; email contained full name of recipient; recited matters know only to sender or recipient.

  48. Authenticity of text messages are a question of fact for the jury as long as there is circumstantial evidence of source.

  49. Hearsay issues – don’t fall under business records exception.

  50. Email may contain hearsay with hearsay –

  51. Admission by Party Opponent – email from opponent not excluded by hearsay rule.

  52. Social Media and Chat Room Evidence

  53. US v. Gatson (D.N.J. 2014) – no search warrant required for use of undercover account on social media

  54. Social media content can be authenticated by testimony of creator, someone who saw an item be posted; expert testimony concerns results of a search, or methods of access.

  55. People v. Valdez (Cal. 2011) – government had sufficiently authenticated postings from MySpace by showing use of password and user name and nature of content – despite defendant position that he was hacked.


 
 

Here's another installment of my outline of Electronic Discovery and Digital Evidence in a Nutshell, the second edition of the West Academic guide to electronic discovery law in the United States authored by Judge Shira Scheindlin (the judge in the Zubulake v. UBS Warburg) and members of the Sedona Conference. An outline of the previous chapter was posted on March 20, 2017.

XI. PRIVILEGE ISSUES ARISING DURING ELECTRONIC DISOCVERY

A. RISKS OF WAIVER AND THE COST OF PRE-PRODUCTION PRIVLEGE REVIEW OF ELECTRONIC DATA a. Mohawk Indus. v. Carpenter (U.S. 2009) adverse ruling in the privilege question is not immediately appealable. b. FRE 502 adopted in September 2008 i. Mistaken disclosure never constitutes subject matter waiver. ii. No waiver if party took reasonable steps to prevent disclosure and rectified once discovered. 1. Review process more likely to be reasonable if only a small portion disclosed. 2. Was there an accelerated deadline? 3. Were search terms reasonable? 4. Efficient records management system before litigation arises. 5. Levels of review and amount of eyes-on review. iii. Coburn Group v. Whitecap Advisors (N.D. Ill. 2009) – 1. Use of paralegals closely supervised by a lawyer was not unreasonable. 2. Not unreasonable to forgo post-production review. iv. FRE 502(c) privileged docs disclosed in state proceeding then admissibility in federal proceeding determined by law that is most protective against waiver. v. FRE 502(d) – if fed. ct. orders that disclosure of privileged communications is not waiver then order enforceable against all parties in any state or federal proceeding. vi. Rajala v. McGuire Woods, (D. Kan. 2010) 1. Court can issue 502(d) order sua sponte. 2. Good cause if volume of production high, risk of inadvertent disclosure great, and order would expedite the e-discovery process. vii. 502(d) order only extends to proceeding in which it is entered. viii. 502 (e ) parties can enter into a confidentiality agreement that provides protection against waiver.

B. AGREEMENTS BETWEEN THE PARTIES TO CONTROL THE COST OF PRE-PRODUCTION PRIVILEGE REVIEW OF ELECTRONIC DATA. a. Quick peek agreements – requested materials provided for initial examination without any privilege. Requesting party designates the documents it wants produced. b. Clawback agreement – no waiver if producing party identifies the documents; they must be returned. c. Clawback and quick peek agreements do not bind non-parties absent a 502(d) order.

C. WHAT PRECAUTIONS SHOLD BE EMPLOYED? a. Victor Stanley v. Creative Pipe (D. Md. 2008) – party requesting inadvertently produced documents has the burden of showing its review was reasonable. Burden not met because: i. No information on keywords used. ii. No Rationale for keyword selection. iii. No qualification to design information retrieval method. iv. No analysis to test reliability of results. b. in some states— Texas for example— there is no risk of inadvertent waiver, because those states hold that any waiver of privilege must be intentional.

D. ETHICAL QUESTIONS INVOLVED IN RECEIVING MISTAKENLY DISCLOSED PRIVILEGE INFORMATION a. FRCP 26(b)(5)(B) – if no confidentiality agreement, if receiving party is notified of mistaken disclosure by adversary it must promptly return or destroy the data. Party can ask a court if the data is protected. b. If it would be cost prohibitive for the receiving party to retrieve the information court may find that privilege was waived. c. Rule 26 does not require the receiving party to tell the producing party that privileged information was disclosed, but ABA Model Rule 4.4 says receiving party must notify the producing party of the mistake.


 
 

Here's another installment of my outline of Electronic Discovery and Digital Evidence in a Nutshell, the second edition of the West Academic guide to electronic discovery law in the United States authored by Judge Shira Scheindlin (the judge in the Zubulake v. UBS Warburg) and members of the Sedona Conference. An outline of the previous chapter was posted on March 10, 2017.

CHAPTER X – ELECTRONIC DISCOVERY IN CRIMINAL CASES Fed. R. Crim. P. 16 and Brady v. Maryland (1963) require the government to disclose exculpatory evidence to defendants or impeach the prosecution witnesses.

A. COLLECTION OF ESI BY LAW ENFORCEMENT

a. Surveillance and Warrantless Searches of ESI i. Riley v. California (2014) – search incident to arrest, re: cell phones. Officers must secure a warrant before searching a phone. Remote wiping or geofencing (programmed to delete data when moved outside a certain area) can be prevented by disconnecting from a network or removing a battery. Prevent remote encryption by placing in Faraday bag. Court emphasized the range of data that can be stored on a smart phone in considering such a search unreasonable. ii. City of Ontario v. Quon (2010) – okay for government to search pager with text allotment given to police officer – search necessary for a work related purpose. Not the case that only the least intrusive search should be permitted. iii. United States v. Jones (2012) – GPS device attached to a suspect’s car – placing the device on the car constituted a trespass and thus was an illegal search under the Fourth Amendment. Sotomayor concurrence – GPS monitoring makes available at low cost a high amount of information so as to alter the relationship between citizen and government in a way that is inimical to democratic society. Questions appropriateness of use of such a tool without oversight from a coordinate branch and reconsider the premise that an individual has no reasonable expectation of privacy in information disclosed to third parties in age where so much data is disclosed to cellular providers, etc. iv. Courts seldom recognize the voluntary privacy settings on a social media application as establishing a reasonable expectation of privacy.

b. Search and Seizure of ESI Pursuant to a Warrant i. U.S. v. Comprehensive Drug Testing (9th Cir. 2010) – 1. Government has obligation to cull evidence down to bounds of Fourth Amendment authorization. 2. Fed. R. Crim. P. 41(g) – obligation to return evidence outside scope of 4th amendment authorization. 3. Can’t apply plain view doctrine to ESI search. ii. U.S. v. Richards (6th Cir. 2011) - a requirement of reasonable particularity will not shield most information stored in a computer from inspection, where police have probable cause to believe that incriminating evidence is somewhere on the hard drive.

B. FIFTH AMENDMENT PROTECTIONS AGAINST SELF-INCRIMINATION

a. Hubbell v. U.S. (2000) – person may be required to produce certain documents event if they are incriminating because the creation of those documents was not compelled within the meaning of the privilege against self-incrimination.

b. Comm. of Va. v. Baust (Va. Cir. 2014) – defendant could not be compelled to produce password he had memorized but could be compelled to produce fingerprint that would provide access to a cell phone.

C. PRESERVATION OBLIGATION AND PRE-TRIAL DISCOVERY

a. General Obligation of Discovery Under Rule 16 and the Jencks Act i. Fed. R. Crim. P. 16(a)(1) – government must disclose as a matter of right upon request: 1. Oral statements at interrogation 2. Written or recorded statements in the custody of government 3. Statements of agents attributable to an organization. 4. Defendants’ prior criminal record 5. Documents that are material to defense 6. Reports of physical, mental and scientific tests material to defense 7. Summary of expert witness testimony ii. Jencks Act – defines statements of government witnesses as those that reproduce exact words verbatim. iii. U.S. v. Warshak (6th Cir. 2010) – federal civil rule requiring data to be turned over in a searchable form is not applicable to criminal cases. iv. U.S. v. Graham (S.D. Ohio 2008) – sheer volume of data produced by the government, combined with erratic method of turning it over, prejudiced defendants by delay necessary to review all of the material. Indictment dismissed on the basis of the Speedy Trial Act.

b. Constitutional Duty to Provide Exculpatory and Impeachment Material Under Brady i. Brady v. Maryland (1963) – prosecutor must disclose all exculpatory evidence. ii. U.S. v. Skilling (5th Cir. 2009) – government is under no duty to direct a defendant to exculpatory evidence within a larger mass of disclosed evidence, but there would be a Brady violation if government did a document dump in attempt to hide exculpatory evidence, but this not applicable with ESI.

c. Trigger of the Duty to Preserve by the Government and the Defendant i. Cal. v. Trombetta (1984) – duty to preserve limited to evidence that is to play a role in a defendant’s defense. ii. Ariz. v. Youngblood (1988) – defendant must show bad faith on part of police when failure to preserve, or no denial of due process. iii. Sarbanes-Oxley Act 18 U.S.C. 1519 – criminalizes destruction of relevant evidence by defendants. iv. U.S. v. Atkinson (11th Cir. 2013) – conviction under 18 U.S.C. 1519 – for deletion of digital video footage. v. U.S. v. Katskis (E.D. Cal. 2014) – section 1519 covered the deletion of emails. vi. U.S. v. Kernell (E.D. Tenn. 2010) section 1519 covers the deletion of personal ESI.

d. Management of ESI Leading Up to Trial i. Joint Electronic Technology Group – (includes DOJ) – basic principles: 1. Lawyers must have an adequate understanding of e-discovery. 2. Parties should include experts on with technical knowledge to assist with resolving ESI disuptes. 3. Parties should meet and confer on the nature, volume and mechanics of producing ESI. 4. Parties should discuss what formats should be used for production 5. Party should not be required to take on expensive conversion techniques. 6. After the meet and confer parties should notify the court of ESI discovery production issues. 7. Discuss ESI discovery transmission methods and media. 8. Multiple defendants should appoint one to act as discovery coordinator. 9. Consult with supervisor on discovery disputes before consulting judicial resolution. 10. Limit dissemination of ESI to members of litigation team. ii. Consult the JETWG E-Discovery Checklist. iii. United States v. Hernandez (S.D.N.Y. 2014) – court refused to appoint a Coordinating Discovery Attorney – because eight defendants were not similarly situated. Non-attorney vendor might be preferable.


 
 

Sean O'Shea has more than 20 years of experience in the litigation support field with major law firms in New York and San Francisco.   He is an ACEDS Certified eDiscovery Specialist and a Relativity Certified Administrator.

The views expressed in this blog are those of the owner and do not reflect the views or opinions of the owner’s employer.

If you have a question or comment about this blog, please make a submission using the form to the right. 

Your details were sent successfully!

© 2015 by Sean O'Shea . Proudly created with Wix.com

bottom of page