Takeaway

  • Upload
    lyneth

  • View
    28

  • Download
    1

Embed Size (px)

DESCRIPTION

In a time of dramatic change it is the learners who inherit the future. The learned usually find themselves equipped to live in a world that no longer exists. Eric Hoffer, American Writer (1920-1983). 2. Takeaway. - PowerPoint PPT Presentation

Citation preview

  • In a time of dramatic change it is the learners who inherit the future. The learned usually find themselves equipped to live in a world that no longer exists.

    Eric Hoffer,American Writer (1920-1983)*

  • Takeaway* ESI raises distinct evidentiary issues (because it can be altered from its original form)

    Traditional rules of evidence are flexible enough to deal with ESI

    The evidentiary rules as applied to ESI

    Suggested pre-trial procedures Metadata can be helpful in determining the authenticity of ESI

    11 Step Foundation for Computer Records

    Differences between ESI and EGI and why it matters

  • Elements of E-Discovery*

  • DefinitionElectronically-stored information (ESI) =

    Information created, manipulated, communicated, stored, and best utilized in digital form, requiring the use of computer hardware and software.

    *

  • How E-Discovery is Different1. Volume2. Variety of sources3. Dynamic quality4. Hidden information: Metadata5. Environment: Dependence and Obsolescence6. Deleting doesnt delete it*

  • 1.ESI Volume is High95% of the worlds information is generated in digital format.

    79% of American adults used the Internet in 2009.

    An employee at a large company will receive and send 50-100 emails daily.

    *

  • 2. Variety of SourcesWord processing documents, emails, voice mails, instant message logs, backup tapes, blogs, database files

    Computer hard drives, network servers, personal digital assistants

    Magnetic tapes, CD-ROMs, floppy discs, zip drives, digital phones, iPads and iPods*

  • **

  • **

  • 2. Variety of SourcesRecent Trend: Social/Professional Networking Sites*

  • Facebook

    More than 500 million active users 50% of active users log on to Facebook in any given day Users spend over 700 billion minutes per month on FacebookFacebook users upload about 3 billion photos per month

    *2. Variety of Sources

  • MySpaceMore than 122 million monthly active users around the globe (70 million in US)100,000 signups every day Processes 46 million activities and updates daily

    *2. Variety of Sources

  • LinkedIn Professional networking siteOver 75 million usersExecutives from all Fortune 500 companies are LinkedIn members*2. Variety of Sources

  • TwitterOver 100 million users300,000 new users each day65 million tweets posted each day*2. Variety of Sources

  • 3. Dynamic QualityPaper documents are in effect immutable once put on paper, but

    ESI is not fixed or in a final form

    Modifications can happen without human intervention and are not easily detectable

    As a result, there is not always a clear original version of ESI

    *

  • 4. Hidden Information:MetadataDefinition: data about data; not readily apparent on the screen view of the file.

    Information about the document that is recorded by the computer to assist in storing and retrieving.

    Usually not created by or easily accessible to the computer user.

    *

  • ESI can often be read only with special software.

    Raw data without the special structure will appear incomprehensible

    But to make comprehensible, it might lose functionality

    Legacy data might have been retained, but is now difficult to access*5. Environment: Dependence and Obsolescence

  • Deleted or backup information may still be available, just not easily accessible.

    Deleting from a hard drive is like removing a card from the card catalog the book (the information itself) remains until its removed to make room for a new book.*6. Deleting ESI Doesnt Delete It

  • II. Evidentiary Issues raised by ESI*

  • Admissibility of Electronically Stored Information*Little has been written about what is required to ensure that ESI obtained in discovery will be admitted in trial

    It makes little sense to go to the cost and effort to obtain ESI in discovery if a sufficient foundation cannot be established to get it admitted.

  • We see no justification for constructing unique rules for admissibility of electronic communications such as instant messages; they are to be evaluated on a case-by-case basis as any other document to determine whether or not there has been an adequate foundational showing of their relevance and authenticity. In Re F.P., 878 A.2d 91, 96 (Pa. Super. Ct. 2005).

    *No Need For Special ESI Evidence Rules

  • *

    In general, the Federal Rules of Evidence apply to computerized data as they do to other types of evidence. Computerized data, however, raise unique issues concerning accuracy and authenticity.Manual for Complex Litigation (4th) 11.446

  • *

    Accuracy may be impaired by incomplete data entry, mistakes in output instructions, programming errors, damage and contamination of storage media, power outages, and equipment malfunctions.Manual for Complex Litigation (4th) 11.446

  • Impaired Accuracy of ESI*Incomplete data entryMistakes in output instructionsProgramming errorsDamage and contaminationPower outagesEquipment malfunctions

  • *

    The integrity of data may also be compromised in the course of discovery by improper search and retrieval techniques, data conversion, or mishandling.Manual for Complex Litigation (4th) 11.446

  • *

    The proponent of computerized evidence has the burden of laying a proper foundation by establishing its accuracy. The judge should therefore consider the accuracy and reliability of computerized evidence, including any necessary discovery during pretrial proceedings, so that challenges to the evidence are not made for the first time at trial.Manual for Complex Litigation (4th) 11.446

  • The existing rules were adopted before ESI issues existed

    The forms of digital and electronic evidence regularly and quickly change

    Evidence can be altered from its original form

    *The Evidentiary Challenges Raised by ESI

  • Evidentiary Rules Triggered By ESIPreliminary and Conditional RulingsRelevanceAuthenticationHearsayOriginal WritingCompare Probative Value and Risk of Prejudice*

  • Evidentiary Rules (Federal)

    F.R.E. 104(a) and (b)

    F.R.E. 401

    F.R.E. 901(a)

    F.R.E. 801, et seq.

    F.R.E. 1000-1008

    F.R.E. 403

    *

  • III. Preliminary Rulings*

  • F.R.E. 104 (a) and (b)HOW THEY WORK TOGETHER

    *RULE 104 Preliminary Questions (a) Questions of admissibility generally. Preliminary questions concerning the qualification of a person to be a witness, existence of a privilege, or the admissibility of evidence shall be determined by the court, subject to the provisions of subdivision (b). In making its determination it is not bound by the rules of evidence except those with respect to privileges.

  • F.R.E. 104(a) and (b)HOW THEY WORK TOGETHER

    *RULE 104(a)Do facts presented support preliminary admissibility?Its a preliminary determination of admissibilityMade by the CourtNot required to apply rules of evidence (except privilege)Qualified by Rule 104(b)

  • F.R.E. 104 (a) and (b)HOW THEY WORK TOGETHER

    *RULE 104(b) Relevancy conditioned on fact.

    When the relevancy of evidence depends upon the fulfillment of a condition of fact, the court shall admit it upon, or subject to, the introduction of evidence sufficient to support a finding of the fulfillment of the condition.

  • F.R.E. 104(a) and (b)HOW THEY WORK TOGETHER

    *RULE 104(b):- Jury makes factual findings necessary to determine admissibility- The facts introduced must be admissible under rules of evidence

  • F.R.E. 104(a) and (b)HOW THEY WORK TOGETHER

    *

    Example Counsel offers E-mail into evidence

    104(a) Judge decides whether e-mail is : hearsay: an admission of party opponent: business record 104(b) Jury decides whether e-mail is : authentic (what it purports to be)

  • IV. Authentication*

  • Authenticating ESIArguably the biggest evidentiary challenge for ESI

    Why?Because ESI is easily created, altered, and manipulated, either accidentally or intentionally*

  • Authenticating ESI[I]t is possible to create a Web page on a social networking site in another persons name or to send an e-mail or post a message in anothers name. Therefore, it is difficult to show who actually is responsible for creating material on the Internet.Levine & Swatski-Lebson, "Social Networking And Litigation," e-Commerce Law & Strategy (Jan. 2009)*

  • Authentication is a threshold preliminary standard to test the reliability of the evidence, subject to later review by . . . cross-examination. Lorraine v. Markel Am. Ins. Co., 241 F.R.D. 534, 544 (D. Md. 2007)*Authenticating ESI

  • Fed. R. Evid. 901(a) proponent must offer evidence sufficient to support a finding that the matter in question is what the proponent claims.*Authenticating ESI

  • Its a low hurdleCould a reasonable juror find in favor of authenticity? United States v. Gagliardi, 506 F.3d 140, 151 (2d Cir. 2007)Is there a rational basis for fact finder to conclude the matter is authentic? People v. Downin, 828 N.E.2d 341, 350 (Ill. Ct. App. 2005)*Authenticating ESI

  • [T]he inability to get evidence admitted because of a failure to authenticate it almost always is a self-inflicted injury which can be avoided by thoughtful advance preparation. Lorraine, 241 F.R.D. at 542*Authenticating ESI

  • Courts have wrestled with authentication of electronic evidenceDecisions on both sides of almost any question

    *Authenticating ESI

  • Authenticating ESIBest-case scenario: StipulationEncourage (pressure) parties to stipulate to authenticity of ESIOften no legitimate challenge to authenticitySaves time/money for the Court and parties*

  • Authenticating ESINext-best alternative: AdmissionExpress admission (request for admission, in deposition, at trial)Failure to object (courts generally have discretion to consider evidence where there is no objection)*

  • Useful ESI Evidentiary Procedures*All ESI identified pre-trialESI evidence highlighted to opposing side before trial Parties directed to stipulate where appropriatePre-trial offers of proof on disputed ESI exhibitsFoundational witnesses identified on ESI exhibits Parties directed to confer to submit joint cautionary jury instructionsIn camera proceedings during trial

  • *ESI In Camera1.In camera hearing addressing authenticity does not replace the presentation of authenticating evidence before the jury.

    2.The Court must revisit the authenticating evidence at trial.

    3.Even though the Court may have ruled in camera that the proponent has presented sufficient evidence to support a finding that the evidence is authentic, that authenticating evidence must be presented again to the jury before the evidence may be admitted. United States v. Branch, 970 F.2d 1368 (4th Cir. 1992).

  • Authenticating ESIE-mail and electronic communication

    Testimony of a witness with knowledge - FRE 901(b)(1) No special expert or computer knowledge needed (witness need not have programmed or even understand technical operation of computer)A witness who sent or received an email can identify it as suchOther witnesses who have seen the email in electronic form can testify that it is an accurate reproduction*

  • Authenticating ESIE-mail and electronic communication

    Comparison by trier or expert -FRE 901(b)(3) Expert or fact finder may compare the offered document with one that has been independently authenticated.*

  • Authenticating ESIE-mail and electronic communication

    Comparison by trier or expert -FRE 901(b)(3) E-mail messages that are not clearly identifiable on their own can be authenticated . . . by comparison by the trier of fact (the jury) with . . . those e-mails that already have been independently authenticated.- United States v. Safavian, 435 F. Supp. 2d 36, 40 (D.D.C. 2006)*

  • Authenticating ESIE-mail and electronic communication

    Distinctive Characteristics -FRE 901(b)(4) Frequently used to authenticate e-mail.Authentication based on [a]ppearance, contents, substance, internal patterns, or other distinctive characteristics, taken in conjunction with circumstances.Examples: listed as sender/recipient, email address, information that only the purported sender would know, use of nicknames, etc.

    *

  • Authenticating ESIE-mail and electronic communication

    Other approachesTechnical expert to trace e-mail through servers that handled it. FRE 901(b)(9)Technical expert to explain encryption process for encrypted emails. FRE 901(b)(9)Reply doctrine purported reply to an earlier email is likely authored by original recipientFor text messages (Short Message Service or SMS) subpoena records kept by transmitting communications company for comparison

    *

  • Authenticating ESIInternet Websites (print-outs)

    Three steps (establish with 901(b)(1), (3), or (4)):Printed page accurately reflects computer image of the website as of a certain dateWebsite is owned or controlled by a particular person or entityAuthorship is reasonably attributed to that person or entity

    *

  • Authenticating ESIInternet Websites (print-outs)

    Whealan v. Hartford Life & Accident Ins. Co., 2007 WL 1891175 (C.D. Cal. 2007) (court held that URL address and date stamp insufficient.) Bowers v. Rector and Visitors of Univ. of Va., 2007 WL 2963818 (W.D. Va. 2007) (court rejected counsels personal affidavit which attempted to authenticate webpages)

    *

  • Authenticating ESIInternet Websites (print-outs)

    Corroboration: witness who viewed the website; internet archive (wayback machine) plus an expert; evidence of partys similar postings elsewhere; 901(b)(4) evidence

    *

  • *Using the Way-Back Machine TM, plaintiff wishes to admit printout of the web pages of a company as they appeared years earlier.

    Ruling: Plaintiff needs an affidavit of www.archive.org representative with personal knowledge, verifying that the tendered printouts are accurate copy of Internet Archives (IA) records. A general affidavit of IA works is not enough. St. Lukes Cataract & Laser Institute v. Sanderson, 2006 WL 1320242 (M.D. Fla. 2006)Authenticating ESI

  • Authenticating ESISocial Networking Sites

    Essentially identical to Web page authenticationTestimony of witness with knowledge can authenticate -Adams v. Disbennett 2008 WL 4615623Further substantiation with technological markers (Internet address, date & time stamp, etc.)At least one court has quashed subpoenas seeking private messages from Facebook and MySpace host companies as protected by Stored Communications Act, 18 U.S.C. 2701-12. Crispin v. Christian Audigier Inc., 2010 WL 2293238 (C.D. Cal. May 26, 2010)

    *

  • *IssuePlaintiff attempts to use the metadata on relevant emails (data about data) to authenticate the emails.

  • * RuleMetadata, commonly described as data about data, is defined as information describing the history, tracking, or management of an electronic document. Lorraine, 241 F.R.D. at 547.

  • *F.R.E. 901(b)(4)An adequate authentication can be made through the identification of distinctive characteristics, such as appearance, contents, substance, internal patterns, or other distinctive characteristics, taken in conjunction with circumstances.

  • *Authenticity of Computer-stored Records (EXAMPLE)Witness testifies:

    1.That the subject exhibit was printed from the companys computer system.

    2.That he knows the computer equipment is DELL equipment.

    3.That he knows the name of the computer program used by the company is MS Office.

    That he used the companys program and the companys computer to print out the subject exhibit.

    Proponent Moves: for admission of computer printout.

    Opponent Objects: hearsay, lack of foundation, lack of authenticity.

  • *Voir Dire on Computer-stored Records

    1.You did not enter any of the data on the printout into the computer system?

    2.You do not know who did enter the data into the computer system?

    You cannot testify as to the accuracy of the data entered into the system?

    4.You do not know how the computer program works?

    5.You are not the custodian of the computer records?

    Its true that:

  • *Voir Dire on Computer-stored Records (2)

    6.You do not know the companys policies or procedures for the use of the computer?

    7.You do not know how access to the computer is controlled?

    8.You do not know whether there have been any changes in the database or whether any such changes are logged or recorded?

    9.You do not know whether the company has any type of audit program to ensure the continuing integrity of the database?

  • *Eleven-step Foundation forComputer Records

    (a la Professor Imwinkelried)

    1. The business uses a computer.2. The computer is reliable.3. The business has developed a procedure for inserting data into the computer.4. The procedure has built-in safeguards to ensure accuracy and identify errors.5. The business keeps the computer in a good state of repair.6. The witness had the computer read out certain data.7. The witness used the proper procedures to obtain the readout.8. The computer was in working order at the time the witness obtained the readout.9. The witness recognizes the exhibit as the readout.10. The witness explains how he or she recognizes the readout.11. If the readout contains strange symbols or terms, the witness explains the meaning of the symbols or terms for the trier of fact. Imwinkelried, Evidentiary Foundations 4.03 [2].

  • V. Hearsay*

  • HearsayFour Steps to Evaluating ESI HearsayIs it a statement by a declarant?Is it offered for its truth?Is it excluded from hearsay by 801(d)?Prior statement of testifying witnessAdmission by party opponentIs there an applicable exception?*

  • Statement = (1) oral or written assertion or (2) nonverbal conduct of a person intended as assertion. Fed. R. Evid. 801(a)Declarant must be a person. Fed. R. Evid. 801(b)

    *Hearsay - statement by declarant?

  • Important distinction: Electronically stored v. electronically generated informationNot always recognized by courtsUnited States v. Blackburn, 992 F.2d 666 (7th Cir. 1993) (court assumed computer-generated printout was hearsay but found it admissible under hearsay exception)

    *Hearsay - statement by declarant?

  • Hearsay - statement by declarant?

    [N]othing said by a machine . . . is hearsay. United States v. Washington, 498 F.3d 225, 231 (4th Cir. 2007) (quoting 4 Mueller & Kirkpatrick, Federal Evidence 380 (2d ed. 1994)).

    *

  • Hearsay - statement by declarant?Electronically stored information = human-created, stored electronicallyMay be hearsayExamples: Email textLetters and other word processing documentsSocial network messages or postsFacebook messages raises issues of hearsay. Maldonado v. Municipality of Barceloneta, 2009 U.S. Dist. LEXIS 19842 at *2 n.2 (DPR 2009)Chat room conversationsText messages

    *

  • Hearsay - statement by declarant?Electronically generated information = created by a computer process or systemExamples: Most metadataEmail headersGPS dataA fax machine generated report of transmission

    A list of calls made from a cellphone showing time of call, phone number called, length of call.

    *

  • Hearsay - statement by declarant?Some electronic information is a mixture of electronically stored and electronically generated informationSpreadsheets with automatic calculationsChat room logsEmails with content and headerThis mixed information implicates hearsay rules, at least as to the human-generated statements

    *

  • *The Threshold Issue of Admissibility of EGI: Is it exempt from the hearsay rule? Is it hearsay? Does it fall within a hearsay exemption?

  • *Argument why EGI is not hearsay: It is not a statement of a person

    Argument why EGI is hearsay: It is an out-of-court statement (of a machine) being introduced to prove the matter asserted.

  • *Issue

    The theory that EGI is not hearsay is not based on a notion that it is more reliable than other types of information.

    In fact, if no person is required to testify to its creation, who is cross-examined on the broad issues of reliability?

  • *If EGI is Treated as Non-hearsay:

    It is treated as if it is trustworthy, when it may not be. It escapes the gate-keeping function of hearsay rules. EGI thereby becomes a prime candidate for E-discovery. It becomes admissible against a person or corporation that may not have created it even known or was created. Note: Statements must still be reliable under authentication rules (e.g., product of a system capable of producing reliable result)

  • *Issue

    If EGI is treated as hearsay: It is the machine that is the Declarant Who should be the witness? A person knowledgeable about how this computer compiled and generated this information? The software or a software programmer who created the instructions allegedly followed by the machine? A person from the business or home who haspossession of the document? Nobody treated as hearsay within the business record or treated as a business record?

  • *Problems with Using the Business Records Exception to Admit EGI Against a Party: The party did not create the EGI The party may not have even known it was created The machines programming was created by a non-agent non-employee not responsible to the party The record is often not knowingly kept by the business The EGI may serve no business purpose

  • *EGI is an Admission Under: Application of 801(d)(2)

    While a partys e-mail might come in as a statement against interest, why would that apply to a computer-generated information?

    (A)Not the partys statement; or(B)Party has not necessarily adopted it; or Not made by a person authorized to make that statement; or(D)Not made by a partys agent?

  • * The owner had virtually zero to do with the creation of data or software.

    The owner cannot be said to be responsible for the information the machine is not his agent or employee.

    If the computer is not the Declarant of EGI, there is no statement of a witness. What is the admissibility based on?If we treat the machine as a Declarant, why should the machines testimony be attributed to its owner?

  • *Are we ready to call ourcomputers our agents?

  • Hearsay ESI ExceptionsBusiness Records Exemption Fed. R. Evid. 803(6)Record must be (1) contemporaneously made and (2) kept in the normal and ordinary course of businessMust relate to the business, not the individuals personal use

    Note: the actual physical printout can be created in anticipation of litigation; the exemption refers to the underlying data*

  • Hearsay ESI ExceptionsBusiness Records Exemption

    Caveat unless the source of the information or the method or circumstances of preparation indicate lack of trustworthinessEasily overlookedMust show reliability of the system producing the information*

  • *IssuePlaintiff offers e-mail chain. Witness says its his regular practice to send an e-mail summarizing phone calls he receives.No showing that it was the regular practice of the employer to require that the employee make and maintain such e-mails.No testimony that this was the practice of all others in the chain. E-mail chains as business records. F.R.E. 803(6)

  • * How would you rule?What if the source of the original information was an outsider?

  • *New York v. Microsoft Corp., 2002 WL 649951 (D.D.C. 2002) Analyzed the admissibility of series of exhibits including e-mail and e-mail chains under various hearsay exceptions, and ruling that an e-mail prepared several days after a telephone call that described the call did not qualify as a present sense impression under Rule 803(1) because the requirement of contemporaneity was not met.

  • *Rambus, Inc. v. Infineon Techs. AG, 348 F.Supp.2d 698 (E.D. Va. 2004) (each participant in an e-mail chain must be acting in the course of regularly conducted business)

  • *In contrast to the demanding approach taken in Rambus and New York v. Microsoft, the court in United States v. Safavian took a more flexible approach to the admissibility of e-mail chains. 435 F.Supp.2d 36, 40-41 (D.D.C.2006). The defendant objected to the admissibility of e-mail chains, arguing that they were not trustworthy because they contained e-mails embedded within e-mails. The court overruled this objection, stating:[t]he defendants argument is more appropriately directed to the weight the jury should give the evidence, not its authenticity. While the defendant is correct that earlier e-mails that are included in a chain-either as ones that have been forwarded or to which another has replied-may be altered, this trait is not specific to e-mail evidence. It can be true of any piece of documentary evidence, such as a letter, a contract or an invoice. . . . The possibility of alteration does not and cannot be the basis for excluding e-mails as unidentified or unauthenticated as a matter of course. . . . We live in an age of technology and computer use where e-mail communication now is a normal and frequent fact for the majority of the nations population and is of particular importance in the professional world. . . . Absent specific evidence showing alteration, however, the Court will not exclude any embedded e-mails because of the mere possibility that it can be done.

  • Hearsay ESI ExceptionsPublic Records Exemption Fed. R. Evid. 803(8)Documents prepared by public office or agency deemed trustworthyParticularly important as to information from government websites*

  • Hearsay ESI ExceptionsPresent Sense Impression, Excited Utterance, or Then-Existing ConditionFed. R. Evid. 803(1), (2), and (3)Particularly important as to social networking messages and text messages[We should be able to find some good Facebook or Twitter examples for this]*

  • Summary* ESI raises distinct evidentiary issues (because it can be altered from its original form)

    Traditional rules of evidence are flexible enough to deal with ESI

    The evidentiary rules as applied to ESI

    Suggested pre-trial procedures Metadata can be helpful in determining the authenticity of ESI

    11 Step Foundation for Computer Records

    Differences between ESI and EGI and why it matters

    ********Will you allow this enhancement? Can you place any limitations on this situation? Are there any due process considerations?

    *Do you allow the computer-simulated recreation based on the testimony of the engineer?***Will you allow this enhancement? Can you place any limitations on this situation? Are there any due process considerations?

    *Will you allow this enhancement? Can you place any limitations on this situation? Are there any due process considerations?

    *Will you allow this enhancement? Can you place any limitations on this situation? Are there any due process considerations?

    *Will you allow this enhancement? Can you place any limitations on this situation? Are there any due process considerations?

    *Will you allow this enhancement? Can you place any limitations on this situation? Are there any due process considerations?

    *Will you allow this enhancement? Can you place any limitations on this situation? Are there any due process considerations?

    *Will you allow this enhancement? Can you place any limitations on this situation? Are there any due process considerations?

    *Will you allow this enhancement? Can you place any limitations on this situation? Are there any due process considerations?

    *Will you allow this enhancement? Can you place any limitations on this situation? Are there any due process considerations?

    *Will you allow this enhancement? Can you place any limitations on this situation? Are there any due process considerations?

    *****