html5-img
1 / 145

HOW TO MANAGE Electronic EVIDENCE AND discovery

HOW TO MANAGE Electronic EVIDENCE AND discovery. Agenda . Why Does Electronic Evidence Require Special Attention? Managing “Your” Evidence Managing Opposing Party Evidence. WHY DOES ELECTRONIC EVIDENCE REQUIRE SPECIAL ATTENTION?. Electronic v. “Traditional”.

zeph-jensen
Download Presentation

HOW TO MANAGE Electronic EVIDENCE AND discovery

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. HOW TO MANAGE Electronic EVIDENCE AND discovery

  2. Agenda Why Does Electronic Evidence Require Special Attention? Managing “Your” Evidence Managing Opposing Party Evidence

  3. WHY DOES ELECTRONIC EVIDENCE REQUIRE SPECIAL ATTENTION?

  4. Electronic v. “Traditional” • Unique Properties of Electronic Data • Attorney Obligations • E-Discovery • Admissibility, Other Issues

  5. Properties Of Electronic Data Volume Duplicability Fragile, Yet Persistent Ease of Undetected Alteration Metadata Hardware/Software Dependent Searchability

  6. Discovery Implications Cost Privilege

  7. A Day In The Digital Life …

  8. A Day In The Digital Life …

  9. A Day In The Digital Life …

  10. A Day In The Digital Life …

  11. A Day In The Digital Life …

  12. A Day In The Digital Life …

  13. A Day In The Digital Life …

  14. A Day In The Digital Life …

  15. A Day In The Digital Life …

  16. A Day In The Digital Life …

  17. A Day In The Digital Life …

  18. A Day In The Digital Life …

  19. A Day In The Digital Life …

  20. A Day In The Digital Life …

  21. A Day In The Digital Life …

  22. A Day In The Digital Life …

  23. A Day In The Digital Life …

  24. Other Electronic Evidence Implications Acquisition Admissibility

  25. MANAGING “YOUR” ELECTRONIC EVIDENCE

  26. “Your” Electronic Evidence In Your Client’s Possession Third-Party Sources

  27. In Your Client’s Possession • “Management” Begins Before The Lawsuit Is Filed • Litigation Hold Protocols • Data Retention Policies • Computer Use Policies • Incident Response Plan

  28. Third-Party Sources Where Is “The Smoking Gun”? Thinking Outside The Box

  29. Third-Party Sources Acquisition Admissibility (Weight)

  30. Acquisition Legal Process Voluntary Production

  31. The DIGITAL Smoking Gun …

  32. Meets the Wild, Wild West Lorraine v. Markel

  33. Lorraine v. Markel 241 F.R.D. 534, E.D. Md. (2007) “ … research has failed to locate a comprehensive analysis of the many interrelated evidentiary issues associated with electronic evidence …

  34. Lorraine v. Markel “ … this opinion undertakes a broader and more detailed analysis of these issues than would be required simply to resolve the specific issues presented in this case …

  35. Lorraine v. Markel • Five Evidentiary Rules to Consider: • Relevance • Authenticity • Hearsay • Original Writing/Best Evidence • Probative Value/Unfair Prejudice

  36. Lorraine v. Markel • Authenticity • “As the foregoing cases illustrate, there is a wide disparity between the most lenient positions courts have taken in accepting electronic records as authentic and the most demanding requirements that have been imposed ...”

  37. Lorraine v. Markel • Authenticity • “ … although it may be better to be lucky than good, as the saying goes, counsel would be wise not to test their luck unnecessarily …”

  38. Federal Rule 901 • Requirement of Authentication or Identification • (a) General provision. • The requirement of authentication or identification as a condition precedent to admissibility is satisfied by evidence sufficient to support a finding that the matter in question is what its proponent claims.

  39. Federal Rule 901 • Requirement of Authentication or Identification • (a) General provision. • “ … sufficient to support a finding …”

  40. Federal Rule 901 • Requirement of Authentication or Identification • (a) General provision. • “ … sufficient to support a finding …” Don’t set the bar too low!

  41. Authenticity As technology and the legal landscape continue to change … Distilling concepts down to their very core becomes more important than ever

  42. Authenticity Is … … the tip of the iceberg of persuasiveness Meaning of authenticity may change over time, and may vary wildly from courtroom to courtroom …. The importance of persuading the 12 members of your jury of the credibility of your evidence NEVER changes

  43. Digital Evidence Received from party opponent via discovery Received from third party Criminal cases

  44. Authenticating Digital Evidence • “Work smarter, not harder” • Judicial Notice • Discovery techniques • Requests for stipulations • Request to admit genuineness of documents • Requests to admit facts which would establish authenticity • Depositions • Well-drafted interrogatories, production requests

  45. Authenticating Digital Evidence Discovery materials not resolved pretrial Third party materials Evidence in criminal prosecutions

  46. Smoking Gun-I: Email

  47. Smoking gun-I: Email • U.S. v. Siddiqui, 235 F.3d 1318 (11th Cir. 2006) • Defendant’s email address identified him • Witness testimony as to use of “reply function” • Content revealed author’s familiarity with Defendant’s relevant conduct • Use of Defendant’s nickname in body • Defendant reiterated request made within email during telephone conversation soon after email receipt

  48. Illinois Appellate Court • State v. Downin, 357 Ill.App.3d 193, 828 N.E.2d 341, 293 Ill.Dec. 371 (3rd Dist. 2005) Absence of evidence from ISP linking Defendant to email “ … finding of authentication … does not preclude the opponent from contesting genuineness of the writing after the basic authentication requirements are satisfied …”

  49. Illinois Appellate Court • State v. Downin, 357 Ill.App.3d 193, 828 N.E.2d 341, 293 Ill.Dec. 371 (3rd Dist. 2005) “ … [proponent] need only prove a rational basis upon which the fact finder may conclude that the [email] did in fact belong to the defendant …”

  50. Illinois Appellate Court • State v. Downin, 357 Ill.App.3d 193, 828 N.E.2d 341, 293 Ill.Dec. 371 (3rd Dist. 2005) • Victim testimony that she met defendant via Internet • Email communication before and after in-person meeting • Same email addressed as used previously • Reply responsive • Reply contained information known exclusively to victim and defendant

More Related