메뉴 건너뛰기




Volumn 11, Issue 12, 2006, Pages

MySpace on the record: The admissibility of social website content under the federal rules of evidence

Author keywords

[No Author keywords available]

Indexed keywords


EID: 33845369886     PISSN: 13960466     EISSN: None     Source Type: Journal    
DOI: 10.5210/fm.v11i12.1419     Document Type: Article
Times cited : (1)

References (165)
  • 1
    • 84860044095 scopus 로고    scopus 로고
    • My space to hire safety czar
    • (17 February), accessed 9 May 2006 (citing comScore Networks).
    • "My Space to Hire Safety Czar," Red Herring, (17 February 2006), at http://www.redherring.com/article.aspx?a=15773, accessed 9 May 2006 (citing comScore Networks).
    • (2006) Red Herring
  • 2
    • 84860054492 scopus 로고    scopus 로고
    • accessed 9 May 2006
    • Technorati, "About Technorati," at http://www.technorati.com/ about/, accessed 9 May 2006.
    • About Technorati
  • 3
    • 70049084130 scopus 로고    scopus 로고
    • Data memo: Generations online
    • (December), accessed 9 May 2006.
    • Susannah Fox and Mary Madden, Pew Internet & American Life, "Data Memo: Generations online," (December 2005), at http://www.pewInternet.org/PPF/r/170/report_display.asp, accessed 9 May 2006.
    • (2005) Pew Internet & American Life
    • Fox, S.1    Madden, M.2
  • 5
    • 0011703716 scopus 로고    scopus 로고
    • The electronic paper trail: Evidentiary obstacles to discovery and admission of electronic evidence
    • citing Susan E. Davis, Elementary Discovery, My Dear Watson, CAL. LAW., Mar. 1996, at 53, 53 (discussing different forms of electronic evidence)
    • "As a general rule, 'electronic evidence' can be any information created or stored in digital form whenever a computer is used to accomplish a task. As this broad definition suggests, electronic evidence may exist whenever a person enters information into a computer, a computer generates information in response to a request by an operator, or a computer uses or processes information." Christine Sgarlata Chung and David J. Byer, "The Electronic Paper Trail: Evidentiary Obstacles to Discovery and Admission of Electronic Evidence," 4 B.U. J. Sci. & Tech. L. 5, 8 (1998). (citing Susan E. Davis, Elementary Discovery, My Dear Watson, CAL. LAW., Mar. 1996, at 53, 53 (discussing different forms of electronic evidence)).
    • (1998) 4 B.U. J. Sci. & Tech. L , vol.5 , pp. 8
    • Chung, C.S.1    Byer, D.J.2
  • 6
    • 33845365437 scopus 로고    scopus 로고
    • Looking for a link; when police suspected that a group of young men were beating homeless people, they turned to the web
    • (Fort Lauderdale, Flo.) 21 January
    • Jamie Malernee, "Looking For A Link; When Police Suspected That A Group Of Young Men Were Beating Homeless People, They Turned To The Web," Sun-Sentinel (Fort Lauderdale, Flo.) 21 January 2006, p. 1A.
    • (2006) Sun-sentinel
    • Malernee, J.1
  • 7
    • 84860053140 scopus 로고    scopus 로고
    • Dangers in MySpace.com
    • (3 March), accessed 9 May 2006
    • "Dangers in My Space.com, " Associated Press (3 March 2006), at http://abclocal.go.com/wpvi/story?_section=nation_world&id=3957377, accessed 9 May 2006.
    • (2006) Associated Press
  • 8
    • 33845360460 scopus 로고    scopus 로고
    • Dangers in MySpace.com
    • "Dangers in MySpace.com," supra note 8.
    • Supra Note , vol.8
  • 9
    • 33845360460 scopus 로고    scopus 로고
    • Dangers in MySpace.com
    • "Dangers in MySpace.com," supra note 8.
    • Supra Note , vol.8
  • 10
    • 33845360460 scopus 로고    scopus 로고
    • Dangers in MySpace.com
    • "Dangers in MySpace.com," supra note 8.
    • Supra Note , vol.8
  • 11
    • 33845360460 scopus 로고    scopus 로고
    • Dangers in MySpace.com
    • "Dangers in MySpace.com," supra note 8.
    • Supra Note , vol.8
  • 12
    • 33845366433 scopus 로고    scopus 로고
    • My space to hire safety czar
    • According to this article, "The site prohibits minors 13 and under from joining, discourages users from posting personal information and provides special protections for those 14 and 15." My Space does not have a technological infrastructure that enforces this policy, but encourages users under the age 18 to make their profiles private. "My Space to Hire Safety Czar," supra note 1.
    • Supra Note , vol.1
  • 13
    • 33845360460 scopus 로고    scopus 로고
    • Dangers in MySpace.com
    • "Dangers in MySpace.com," supra note 8.
    • Supra Note , vol.8
  • 14
    • 33845366433 scopus 로고    scopus 로고
    • My Space to Hire Safety Czar
    • "My Space to Hire Safety Czar," supra note 1.
    • Supra Note , vol.1
  • 15
    • 33845365438 scopus 로고    scopus 로고
    • Looking for A Link
    • "Looking For A Link," supra note 6.
    • Supra Note , vol.6
  • 16
    • 13544269531 scopus 로고    scopus 로고
    • Digital evidence and the new criminal procedure
    • See e.g., Orin Kerr, "Digital Evidence and the New Criminal Procedure," 105 Colum. L. Rev. 279-318 (2005).
    • (2005) 105 Colum. L. Rev. , vol.279-318
    • Kerr, O.1
  • 17
    • 33845355184 scopus 로고    scopus 로고
    • Developments in the law: VI. Electronic evidence and the federal rules
    • Summer
    • Leah Voigt Romano, "Developments in the Law: VI. Electronic Evidence and the Federal Rules," 38 Loy. L.A. L. Rev. 1745, 1749 (Summer 2005).
    • (2005) 38 Loy. L.A. L. Rev. , vol.1745 , pp. 1749
    • Romano, L.V.1
  • 18
    • 33845369342 scopus 로고    scopus 로고
    • Fed. R. Evid. 901 (a).
    • Fed. R. Evid. , vol.901 , Issue.A
  • 19
    • 33845367965 scopus 로고    scopus 로고
    • 152 F.3d 1241, (10th Cir.)
    • See also United States v. Simpson, 152 F.3d 1241, 1250 (10th Cir. 1998).
    • (1998) United States v. Simpson , pp. 1250
  • 20
    • 33845362071 scopus 로고    scopus 로고
    • advisory committee's notes
    • Fed. R. Evid. 901(a) advisory committee's notes.
    • Fed. R. Evid. , vol.901 , Issue.A
  • 21
    • 33845371395 scopus 로고    scopus 로고
    • (b) (4)
    • Fed. R. Evid. 901(b) (4);
    • Fed. R. Evid. , vol.901
  • 22
    • 33845357423 scopus 로고
    • 13 F.3d 20, (1st Cir.)
    • See also United States v. Paulino, 13 F.3d 20, 23 (1st Cir. 1994).
    • (1994) United States v. Paulino , pp. 23
  • 23
    • 14544291305 scopus 로고    scopus 로고
    • United States Department of Justice, Computer Crime and Intellectual Property Section Criminal Division, (July), accessed 9 May 2006
    • United States Department of Justice, Computer Crime and Intellectual Property Section Criminal Division, "Searching and Seizing Computers and Obtaining Electronic Evidence in Criminal Investigations," (July 2002), at http://www.cybercrime.gov/s&snianual2002.htm, accessed 9 May 2006
    • (2002) Searching and Seizing Computers and Obtaining Electronic Evidence in Criminal Investigations
  • 24
    • 33845362458 scopus 로고    scopus 로고
    • advisory committee's notes [hereinafter USDOJ]
    • (citing Fed. R. Evid. 901(b), advisory committee's notes) [hereinafter USDOJ].
    • Fed. R. Evid. , vol.901 , Issue.B
  • 25
    • 33845354622 scopus 로고    scopus 로고
    • USDOJ
    • USDOJ, supra note.20
    • Supra Note , vol.20
  • 26
    • 33845359700 scopus 로고
    • 673 F.2d 86, (5th Cir.)
    • (citing United States v. Vela, 673 F.2d 86, 90 (5th Cir. 1982);
    • (1982) United States v. Vela , pp. 90
  • 27
    • 77952432296 scopus 로고
    • 420 F.2d 889, 893 n.11 (9th Cir.)
    • United States v. DeGeorgia, 420 F.2d 889, 893 n.11 (9th Cir. 1969).
    • (1969) United States v. DeGeorgia
  • 28
    • 33845350915 scopus 로고
    • 553 F.2d 1109, (8th Cir.)
    • But see United States v. Scholle, 553 F.2d 1109, 1125 (8th Cir. 1977) (stating in dicta that "the complex nature of computer storage calls for a more comprehensive foundation").
    • (1977) United States v. Scholle , pp. 1125
  • 29
    • 33845354940 scopus 로고    scopus 로고
    • USDOJ
    • USDOJ, supra note 20
    • Supra Note , vol.20
  • 30
    • 33845364942 scopus 로고    scopus 로고
    • 250 F.3d 438, (6th Cir.)
    • (citing United States v. Salgado, 250 F.3d 438, 453 (6th Cir. 2001) (stating that "it is not necessary that the computer programmer testify in order to authenticate computer-generated records");
    • (2001) United States v. Salgado , pp. 453
  • 31
    • 33845353962 scopus 로고    scopus 로고
    • 127 F.3d 595, (7th Cir.)
    • United States v. Whitaker, 127 F.3d 595, 601 (7th Cir. 1997) (FBI agent who was present when the defendant's computer was seized can authenticate seized files);
    • (1997) United States v. Whitaker , pp. 601
  • 32
    • 33845371635 scopus 로고
    • 111 F.2d 1219, (9th Cir.)
    • United States v. Miller, 111 F.2d 1219, 1237 (9th Cir. 1985) (telephone company billing supervisor can authenticate phone company records);
    • (1985) United States v. Miller , pp. 1237
  • 33
    • 33845367719 scopus 로고
    • 923 F.2d 910, (1st Cir.)
    • United States v. Moore, 923 F.2d 910, 915 (1st Cir. 1991) (head of bank's consumer loan department can authenticate computerized loan data).
    • (1991) United States V. Moore , pp. 915
  • 35
    • 33845357301 scopus 로고
    • 448 U.S. 56
    • See Ohio v. Roberts, 448 U.S. 56, 62-66 (1980).
    • (1980) Ohio V. Roberts , pp. 62-66
  • 36
    • 33845366112 scopus 로고    scopus 로고
    • emphasis added
    • Fed. R. Evid. 801 (a) (emphasis added).
    • Fed. R. Evid. , vol.801 , Issue.A
  • 37
    • 33845354822 scopus 로고    scopus 로고
    • emphasis added
    • Fed. R. Evid. 801(b) (emphasis added).
    • Fed. R. Evid. , vol.801 , Issue.B
  • 38
    • 33845352844 scopus 로고    scopus 로고
    • USDOJ
    • USDOJ, supra note 20.
    • Supra Note , vol.20
  • 39
    • 33845368944 scopus 로고    scopus 로고
    • (d)(2)
    • Fed. R. Evid. 801(d)(2).
    • Fed. R. Evid. , vol.801
  • 40
    • 33845363742 scopus 로고    scopus 로고
    • (d)(2)
    • Fed. R. Evid. 801(d)(2) advisory committee's note.
    • Fed. R. Evid. , vol.801
  • 41
    • 33845360860 scopus 로고    scopus 로고
    • Electronic evidence: Law and practice
    • [hereinafter Rice].
    • Paul R. Rice, "Electronic Evidence: Law and Practice," A.B.A. Sec. of Litig. 269 (2005) [hereinafter Rice].
    • (2005) A.B.A. Sec. of Litig. , vol.269
    • Rice, P.R.1
  • 42
    • 33845352987 scopus 로고
    • See also, Edmund M. Morgan, "Basic Problems of Evidence" 265 (1962) ("A party can hardly object that he had no opportunity to cross-examine himself or that he is unworthy of credence save when speaking under sanction of an oath.")
    • (1962) Basic Problems of Evidence , pp. 265
    • Morgan, E.M.1
  • 43
    • 33747040745 scopus 로고    scopus 로고
    • 87 F.3d 695 (5th Cir.)
    • See United States v. Bond, 87 F.3d 695 (5th Cir. 1996) (holding that it was proper to exclude the defendant's tape that made by the defendant and offered as an admission in order to benefit himself, not as evidence of a statement made by a party used against that party).
    • (1996) United States v. Bond
  • 46
    • 33845364941 scopus 로고    scopus 로고
    • Fed. R. Evid. 803(6).
    • Fed. R. Evid. , vol.803 , Issue.6
  • 47
    • 84860057423 scopus 로고
    • advisory committee's note. 2 McCormick on Evidence § 286 (4th ed. John W. Strong ed.) Cf
    • Fed. R. Evid. 803(6) advisory committee's note. 2 McCormick on Evidence § 286 (4th ed. John W. Strong ed. 1992). Cf. "When a computer record contains only computer-generated data untouched by human hands, however, the record cannot contain hearsay. In such cases, the government must establish the authenticity of the record, but does not need to establish that a hearsay exception applies for the records to be admissible in court."
    • (1992) Fed. R. Evid. , vol.803 , Issue.6
  • 48
    • 33845365854 scopus 로고    scopus 로고
    • USDOJ
    • USDOJ, supra note 20.
    • Supra Note , vol.20
  • 50
    • 33845369614 scopus 로고    scopus 로고
    • In some cases, a "duplicate" is permitted under Fed. R. Evid. 1003 "unless (1) a genuine question is raised as to the authenticity of the original or (2) in the circumstances it would be unfair to admit the duplicate in lieu of the original."
    • Fed. R. Evid. , vol.1003
  • 52
    • 33845354621 scopus 로고    scopus 로고
    • 76 F. Supp. 2d 773, (S.D. Tx.)
    • Cf. St. Clair v. Johnny's Oyster & Shrimp, Inc., 76 F. Supp. 2d 773, 775 (S.D. Tx. 1999). ("Instead of relying on the voodoo information taken from the Internet, Plaintiff must hunt for hard copy back-up documentation in admissible form from the United States Coast Guard or discover alternative information verifying what Plaintiff alleges").
    • (1999) Cf. St. Clair v. Johnny's Oyster & Shrimp, Inc. , pp. 775
  • 53
    • 33845356590 scopus 로고    scopus 로고
    • Fed. R. Evid. 1001(1).
    • Fed. R. Evid. , vol.1001 , Issue.1
  • 54
    • 33845354695 scopus 로고    scopus 로고
    • at 1794-95
    • See also Romano, supra note 16, at 1794-95, n. 372.
    • Supra Note , vol.16 , Issue.372
    • Romano1
  • 55
    • 33845352989 scopus 로고    scopus 로고
    • Fed. R. Evid. 1001(3).
    • Fed. R. Evid. , vol.1001 , Issue.3
  • 56
    • 33845358057 scopus 로고
    • 673 F.2d 86 (5th Cir.)
    • United States v. Vela, 673 F.2d 86 (5th Cir. 1982). In fact, the Fifth Circuit noted that computerized telephone bills are "even more reliable than... average business records because they are not even touched by the hand of man."
    • (1982) United States v. Vela
  • 58
    • 77950642758 scopus 로고
    • 836 F.2d 453 457 (9th Cir.)
    • See United States v. Catabran, 836 F.2d 453 457 (9th Cir. 1988) ("It is immaterial that the business record is maintained in a computer rather than in company books' assuming that the proponent lays a proper foundation.")
    • (1988) United States v. Catabran
  • 59
    • 33845373327 scopus 로고    scopus 로고
    • USDOJ
    • USDOJ, supra note 20
    • Supra Note , vol.20
  • 60
    • 33845362196 scopus 로고
    • 858 F.2d 1427, (9th Cir.)
    • (citing United States v. Bonallo, 858 F.2d 1427, 1436 (9th Cir. 1988) ("The fact that it is possible to alter data contained in a computer is plainly insufficient to establish untrustworthiness.");
    • (1988) United States v. Bonallo , pp. 1436
  • 61
    • 33845362329 scopus 로고    scopus 로고
    • Romano, supra note 16, at 1750. This rule reflects an evolution on the court's acceptance of Internet-produced evidence. For example, in 1999 (a mere seven years ago), a District Court in Texas wrote: While some look to the Internet as an innovative vehicle for communication, the Court continues to warily and eerily view it largely as one large catalyst for rumor, innuendo, and misinformation. So as not to mince words, the Court reiterates that this so-called Web provides no way of verifying the authenticity of the alleged contentions... There is no way Plaintiff can overcome the presumption that the information he discovered on the Internet is inherently untrustworthy. Anyone can put anything on the Internet. No web-site is monitored for accuracy and nothing contained therein is under oath or even subject to independent verification absent underlying documentation. Moreover, the Court holds no illusions that hackers can adulterate the content on any web-site from any location at any time. For these reasons, any evidence procured off the Internet is adequate for almost nothing, even under the most liberal interpretation of the hearsay exception rules found in
    • Supra Note , vol.16 , pp. 1750
    • Romano1
  • 64
    • 33845352988 scopus 로고
    • 918 F.2d 1501, (11th Cir.)
    • United States v. Smith, 918 F.2d 1501, 1510 (11th Cir.1990) ("the government may authenticate a document solely through the use of circumstantial evidence, including the document's own distinctive characteristics and the circumstances surrounding its discovery").
    • (1990) United States v. Smith , pp. 1510
  • 65
  • 66
    • 33845350146 scopus 로고    scopus 로고
    • Chain of custody involves verifying that the evidence has not bee altered from the time it became relevant to the time in which it was used in trial. Each custodian of the evidence must established that the evidence was secure from others and that he has not altered the evidence himself. See Rice, supra note 30, at 256-259;
    • Supra Note , vol.30 , pp. 256-259
    • Rice1
  • 67
    • 33845358456 scopus 로고    scopus 로고
    • 127 F.3d 595, (7th Cir.)
    • United States v. Whitaker, 127 F.3d 595, 602 (7th Cir. 1997). While chain of custody issues could arise given the threat of hackers and other network security concerns, the proponent of the evidence is only required to demonstrate to the judge that the proffered evidence is what he claims it is.
    • (1997) United States v. Whitaker , pp. 602
  • 68
    • 33845371258 scopus 로고    scopus 로고
    • Rice, supra note 30, at 258. "Airtight assurances are seldom necessary. Both parties usually can testify to the content of a communications and any changes made because they were involved in the communication's creation."
    • Supra Note , vol.30 , pp. 258
    • Rice1
  • 69
    • 33845371946 scopus 로고    scopus 로고
    • Rice, supra note 30, at 250. Consequently, any issues go to the question of the weight of the evidence, not its admissibility.
    • Supra Note , vol.30 , pp. 250
    • Rice1
  • 70
    • 40749084517 scopus 로고    scopus 로고
    • 200 F.3d 627 (9th Cir.) Id. at 629, n.3
    • United States v. Tank, 200 F.3d 627 (9th Cir. 2000). The defendant only challenged whether a proper foundation was laid for admitting these chat room logs into evidence and did not challenge admissibility under any other rule, including hearsay or best evidence. Id. at 629, n.3.
    • (2000) United States v. Tank
  • 75
    • 33845369746 scopus 로고
    • F.2d 453, (9th Cir.)
    • (citing United States v. Catabran, 836, F.2d 453, 458 (9th Cir. 1988) "Any question as to the accuracy of the printouts... would have affected only the weight of the printouts, not their admissibility.")
    • (1988) United States V. Catabran , vol.836 , pp. 458
  • 76
    • 40749084517 scopus 로고    scopus 로고
    • United States v. Catabran Ibid at 630-31. For a factually similar case affirming the use of circumstantial evidence to show a connection between the evidence at issue and the defendant
    • United States v. Catabran , pp. 630-631
  • 77
    • 77953273310 scopus 로고    scopus 로고
    • 152 F.3d 1241 (10th Cir.)
    • see United States v. Simpson, 152 F.3d 1241 (10th Cir. 1998).
    • (1998) United States v. Simpson
  • 78
    • 33845349527 scopus 로고    scopus 로고
    • USDOJ
    • "Defendants in criminal trials often attempt to challenge the authenticity of computer-generated records by challenging the reliability of the programs." USDOJ, supra note 20
    • Supra Note , vol.20
  • 79
    • 33845367845 scopus 로고    scopus 로고
    • 250 F.3d 438, (6th Cir.)
    • (citing United States v. Salgado, 250 F.3d 438, 452-53 (6th Cir. 2001);
    • (2001) United States v. Salgado , pp. 452-453
  • 80
    • 40749084517 scopus 로고    scopus 로고
    • 519 F.2d 542, (3d Cir.)
    • United States v. Liebert, 519 F.2d 542, 547-48 (3d Cir. 1975)).
    • (1975) United States v. Liebert , pp. 547-548
  • 81
    • 33845363259 scopus 로고
    • 896 F.2d 1476, (7th Cir.)
    • See also United States v. Briscoe, 896 F.2d 1476, 1494-95 (7th Cir. 1990). ("the government provides sufficient facts to warrant a finding that the records are trustworthy and the opposing party is afforded an opportunity to inquire into the accuracy thereof.").
    • (1990) United States v. Briscoe , pp. 1494-1495
  • 88
    • 33845367964 scopus 로고    scopus 로고
    • 235 F.3d 1318, (11th Cir.)
    • See also United States v. Siddiqui, 235 F.3d 1318,1322-23 (11th Cir. 2000) (holding that e-mail messages were properly authenticated where messages included defendant's email address, defendant's nickname, and where defendant followed up messages with phone calls).
    • (2000) United States v. Siddiqui , pp. 1322-1323
  • 89
    • 33845354364 scopus 로고    scopus 로고
    • USDOJ
    • USDOJ, supra note 20
    • Supra Note , vol.20
  • 90
    • 33845358456 scopus 로고    scopus 로고
    • 127 F.3d 595, (7th Cir.)
    • "the mere possibility of tampering does not affect the authenticity of a computer record." (citing United States v. Whitaker, 127 F.3d 595, 602 (7th Cir. 1997)
    • (1997) United States v. Whitaker , pp. 602
  • 91
    • 33845362196 scopus 로고
    • 858 F.2d 1427, (9th Cir.)
    • (declining to disturb trial judge's ruling that computer records were admissible because allegation of tampering was "almost wild-eyed speculation... [without] evidence to support such a scenario"); United States v. Bonallo, 858 F.2d 1427, 1436 (9th Cir. 1988) ("The fact that it is possible to alter data contained in a computer is plainly insufficient to establish untrustworthiness.");
    • (1988) United States v. Bonallo , pp. 1436
  • 92
    • 33845368839 scopus 로고
    • 773 F.2d 1553, (11th Cir.)
    • United States v. Glasser, 773 F.2d 1553,1559 (11th Cir. 1985) ("The existence of an air-tight security system [to prevent tampering] is not, however, a prerequisite to the admissibility of computer printouts. If such a prerequisite did exist, it would become virtually impossible to admit computer-generated records; the party opposing admission would have to show only that a better security system was feasible."). As a result, the rule for authenticating digital evidence is consistent with the rule used to establish the authenticity of other evidence such as narcotics.
    • (1985) United States v. Glasser , pp. 1559
  • 93
    • 33845356028 scopus 로고    scopus 로고
    • USDOJ
    • USDOJ, supra note 20
    • Supra Note , vol.20
  • 94
    • 33845368687 scopus 로고    scopus 로고
    • 106 F.3d 695, (6th Cir.)
    • (citing United States v. Allen, 106 F.3d 695, 700 (6th Cir. 1997) ("Merely raising the possibility of tampering is insufficient to render evidence inadmissible.")
    • (1997) United States v. Allen , pp. 700
  • 95
    • 33845353692 scopus 로고    scopus 로고
    • USDOJ
    • It is important to note how federal courts sometimes skip the step of authenticating business records and immediately evaluate the proposed evidence under a hearsay framework and Fed. R. Evid. 803(6). "Prosecutors may note the conceptual overlap between establishing the authenticity of a computer-generated record and establishing the trustworthiness of a computer record for the business record exception to the hearsay rule. In fact, federal courts that evaluate the authenticity of computer-generated records often assume that the records contain hearsay, and then apply the business records exception." USDOJ, supra note 20
    • Supra Note , vol.20
  • 96
    • 33845367845 scopus 로고    scopus 로고
    • 250 F.3d, 438, (6th Cir.)
    • (citing United States v. Salgado, 250 F.3d, 438, 452-53 (6th Cir. 2001) (applying business records exception to telephone records generated "automatically" by a computer);
    • (2001) United States v. Salgado , pp. 452-453
  • 97
    • 33845371829 scopus 로고
    • 880 F.2d 209, (9th Cir.)
    • United States v. Linn, 880 F.2d 209, 216 (9th Cir. 1989) (same);
    • (1989) United States v. Linn , pp. 216
  • 98
    • 33845361686 scopus 로고
    • 673 F.2d 86, (5th Cir.)
    • United States v. Vela, 673 F.2d 86, 89-90 (5th Cir. 1982)).
    • (1982) United States v. Vela , pp. 89-90
  • 99
    • 33845366780 scopus 로고    scopus 로고
    • 208 F.3d 633, (7th Cir.)
    • United States v. Jackson, 208 F.3d 633, 637 (7th Cir. 2000).
    • (2000) United States v. Jackson , pp. 637
  • 100
    • 33845352135 scopus 로고    scopus 로고
    • USDOJ
    • Cf. USDOJ, supra note 20, noting "Evidence that a computer program is sufficiently trustworthy so that its results qualify as business records according to
    • Supra Note , vol.20
  • 101
    • 33845366545 scopus 로고    scopus 로고
    • Fed. R. Evid. 803(6) also establishes the authenticity of the record."
    • Fed. R. Evid. , vol.803 , Issue.6
  • 102
    • 33845353962 scopus 로고    scopus 로고
    • 127 F.3d 595, (7th Cir.)
    • United States v. Whitaker, 127 F.3d 595, 601 (7th Cir. 1997).
    • (1997) United States v. Whitaker , pp. 601
  • 104
    • 33845351997 scopus 로고    scopus 로고
    • note
    • In addition, the defense may also raise chain of custody issues.
  • 105
    • 33845351871 scopus 로고    scopus 로고
    • If entirely computer-generated, hearsay would not exclude records compiled by a computer should it pass authentication: No sincerity problems exist when statements are recorded mechanically. Perception and memory concerns are addressed if the proponent of the statement: (1) demonstrates that the recording device makes accurate recordings; (2) establishes that the device functioned corrected at the time the evidence was created; and, (3) if an individual was involved in the operation of the device, shows that the person was properly trained and corrected used it at the time the evidence was recorded. Rice, supra note 30, at 275.
    • Supra Note , vol.30 , pp. 275
    • Rice1
  • 106
    • 33845366903 scopus 로고
    • 432 So.2d 837, (La.)
    • Furthermore, by definition, hearsay is limited to the words or conduct of a person. Fed. R. Evid. 801(b). "With a machine, however, there is no possibility of a conscious misrepresentation, and the possibility of inaccurate or misleading data only materializes if the machine is not functioning properly." State v. Armstead, 432 So.2d 837, 840 (La. 1983).
    • (1983) State v. Armstead , pp. 840
  • 109
    • 33845371394 scopus 로고    scopus 로고
    • 208 F.3d
    • Jackson, 208 F.3d at 637.
    • Jackson , pp. 637
  • 110
    • 33845368463 scopus 로고    scopus 로고
    • Jackson, Ibid. 637.
    • Jackson , pp. 637
  • 111
  • 113
    • 33845355896 scopus 로고    scopus 로고
    • 2000 WL 235770
    • Dassouf v. White, 2000 WL 235770 at *4).
    • Dassouf v. White , pp. 4
  • 114
    • 40749084517 scopus 로고    scopus 로고
    • 235 F.3d 1318 (11th Cir.)
    • United States v. Siddiqui, 235 F.3d 1318 (11th Cir. 2000).
    • (2000) United States v. Siddiqui
  • 120
    • 40749084517 scopus 로고    scopus 로고
    • United States v. Siddiqui, Ibid. at 1323. Siddiqui's counsel first argued that the government failed to show with reliability who sent the e-mail. However, the court held that this claim goes to authentication, which the court extensively discussed prior to the hearsay objection. Siddiqui also challenged the government's failure to properly authenticate the e-mail. The Eleventh Circuit found, however, a number of factors to support the e-mail's authenticity, including the Siddiqui's unique e-mail address ("msiddiquo@jajuar1.usouthal.edu") on each of the e-mail messages to his colleagues, as well as testimony from his colleague that when he replied to the e-mail sent by the defendant "the 'reply-function' on [his] e-mail system automatically dialed Siddiqui's e-mail address as the sender."
    • United States v. Siddiqui , pp. 1323
  • 121
    • 40749084517 scopus 로고    scopus 로고
    • United States v. Siddiqui Ibid. at 1322. The e-mail address was also corroborated by another colleague in his deposition and in Siddiqui's attorney's cross-examination of said colleague. Finally, the e-mail bore details that further substantiated the e-mail's authentication.
    • United States v. Siddiqui , pp. 1322
  • 125
    • 33845363882 scopus 로고    scopus 로고
    • 94 F. Supp. 2d 1087 (D. Ore.)
    • Van Westrienen v. Americontinental Collection Corp., 94 F. Supp. 2d 1087 (D. Ore. 2000) (holding that representations made on the Web page of the defendant may be offered by the plaintiff as an admission even if the same statements are inadmissible hearsay when offered by the defendant.)
    • (2000) Van Westrienen v. Americontinental Collection Corp.
  • 127
    • 33845352491 scopus 로고    scopus 로고
    • 213 F. Supp. 2d
    • See also Perfect 10, 213 F. Supp. 2d at 1155 ("The Court treats the communications attributable to Cybernet employees as party admissions and will accept the third party communications only insofar as they indicate notice of infringing or potentially infringing activity.")
    • Perfect , vol.10 , pp. 1155
  • 128
    • 33845357564 scopus 로고    scopus 로고
    • Perfect Ibid. at 821.
    • Perfect , pp. 821
  • 129
    • 33845354486 scopus 로고    scopus 로고
    • Perfect Ibid. at 821.
    • Perfect , pp. 821
  • 130
    • 33845369745 scopus 로고    scopus 로고
    • Perfect Ibid. at 821.
    • Perfect , pp. 821
  • 131
    • 33845359826 scopus 로고    scopus 로고
    • Perfect Ibid. at 821.
    • Perfect , pp. 821
  • 132
    • 33845356027 scopus 로고    scopus 로고
    • Perfect Ibid at 821.
    • Perfect , pp. 821
  • 133
    • 33845364269 scopus 로고    scopus 로고
    • (d)(2)(B)
    • (citing Fed. R. Evid. 801(d)(2)(B) (providing that adoptive admissions by a party are not hearsay);
    • Fed. R. Evid. , vol.801
  • 134
    • 33845360458 scopus 로고    scopus 로고
    • 801.31[3][b], Joseph M. Laughlin ed., 2d ed. 2002
    • see also 5 Jack B. Weinstein & Margaret A. Berger, Weinstein's Federal Evidence §801.31[3][b], at 801-56 (Joseph M. Laughlin ed., 2d ed. 2002) ("A party may adopt a written statement if the party uses the statement or takes action in compliance [with] the statement.");
    • Weinstein's Federal Evidence , pp. 801-856
    • Weinstein, J.B.1    Berger, M.A.2
  • 135
    • 33845354620 scopus 로고
    • 37 F.3d 996, n. 6 (3d Cir.)
    • Alvord-Polk, Inc. v. F. Schumacher & Co., 37 F.3d 996, 1005 n. 6 (3d Cir. 1994) (holding that statements of company president, which were reprinted in company publications, were not hearsay but were instead admissible as adoptive admissions).
    • (1994) Alvord-polk, Inc. v. F. Schumacher & Co. , pp. 1005
  • 138
    • 33845352491 scopus 로고    scopus 로고
    • 213 F. Supp. 2d
    • Perfect 10, 213 F. Supp. 2d at 1155.
    • Perfect , vol.10 , pp. 1155
  • 139
    • 33845352491 scopus 로고    scopus 로고
    • Perfect 10, Ibid. at 1155.
    • Perfect , vol.10 , pp. 1155
  • 140
    • 33845366239 scopus 로고    scopus 로고
    • Fed. R. Evid. 803(6).
    • Fed. R. Evid. , vol.803 , Issue.6
  • 141
    • 33845364006 scopus 로고    scopus 로고
    • See Rice, supra note 30, at 290: "However, internal records of the ISP regarding a customer's account that include information about the time that customer spent on-line - and which exact times different customers were on-line - could be admitted as business records of the ISPs as long as someone within the ISP organization properly qualifies the records as required by the business records exceptions."
    • Supra Note , vol.30 , pp. 290
    • Rice1
  • 142
    • 84860041642 scopus 로고    scopus 로고
    • Craig's list
    • accessed 9 May 2006
    • Craig's List, Craig's List Terms of Use, at http://www.craigslist.org/ about/terms.of.use.html, accessed 9 May 2006.
    • Craig's List Terms of Use
  • 143
    • 33845367593 scopus 로고    scopus 로고
    • 758 So.2d 405, (Miss.)
    • Bower v. Bower, 758 So.2d 405, 411-15 (Miss. 2000) (customer cannot qualify records - must be custodian or some other qualified person).
    • (2000) Bower v. Bower , pp. 411-415
  • 144
    • 84860057342 scopus 로고    scopus 로고
    • Data retention bill expected next week
    • (21 September), accessed 13 November 2006
    • Although relevant to this issue, the question of the retention of online records and the responsibility of ISPs to retain records for a set period of time is beyond the scope of this paper. For more information see Anne Broache and Declan McCullagh, "Data retention bill expected next week," CNET News.com (21 September 2006), at http://news.com.com/ Data+retention+bill+expected+next-week/2100-1028_3-6118283.html?tag=st.ref.go, accessed 13 November 2006.
    • (2006) CNET News.com
    • Broache, A.1    McCullagh, D.2
  • 145
    • 84860039769 scopus 로고    scopus 로고
    • accessed 9 May 2006
    • eBay, "eBay.com Fees," at http://pages.ebav.com/help/sell/fees. html, accessed 9 May 2006.
    • eBay.com Fees
  • 146
    • 33845355898 scopus 로고    scopus 로고
    • Fed. R. Evid. 803(6).
    • Fed. R. Evid. , vol.803 , Issue.6
  • 147
    • 33845367963 scopus 로고    scopus 로고
    • USDOJ
    • USDOJ, supra note 20 supports this analysis: Consider an e-mail harassment case. To help establish that the defendant was the sender of the harassing messages, the prosecution may seek the introduction of records from the sender's ISP showing that the defendant was the registered owner of the account from which the e-mail were sent. Ordinarily, this will require testimony from an employee of the ISP ("the custodian or other qualified witness") that the ISP regularly maintains customer account records for billing and other purposes, and that the records to be offered for admission are such records that were made at or near the time of the events they describe in the regular course of the ISP's business. Again, the key is establishing that the computer system from which the record was obtained is maintained in the ordinary course of business, and that it is a regular practice of the business to rely upon those records for their accuracy.
    • Supra Note , vol.20
  • 148
    • 33845366110 scopus 로고    scopus 로고
    • USDOJ
    • USDOJ, supra note 20.
    • Supra Note , vol.20
  • 149
    • 33845365712 scopus 로고    scopus 로고
    • See Romano, supra note 16, at 1779 ("Yet where Internet or Web postings are offered as business records, courts may need to take a closer look at their trustworthiness. To date, no federal court has held that Web pages or Internet postings are 'business records' according to the Rule 803(6) hearsay exception.")
    • Supra Note , vol.16 , pp. 1779
    • Romano1
  • 150
    • 33845361438 scopus 로고    scopus 로고
    • See Rice, supra note 30, at 288-289.
    • Supra Note , vol.30 , pp. 288-289
    • Rice1
  • 151
    • 77950642758 scopus 로고
    • 836 F.2d 453 (9th Cir.)
    • See United States v. Catabran, 836 F.2d 453 (9th Cir. 1988) In this case, the defendant suggested that the admitted computerized business records contained errors based on data entry. However, witness testified to correctly inputting the data. The defendant also challenged the accuracy of the computer program itself, charging that the computer program created inaccurate inventory figures based on the markup it applied. Even with the extensive cross-examination on this issue, the court concluded that the District Court did not abuse its discretion in admitting the records. "Any question as to the accuracy of the printouts, whether resulting from incorrect data entry or the operation of the computer program, as with inaccuracies in any other type of business records, would have affected only the weight of the printouts, not their admissibility."
    • (1988) United States v. Catabran
  • 154
    • 33747040745 scopus 로고    scopus 로고
    • 966 F. Supp. 90 (D. Mass.)
    • United States v. Ferber, 966 F. Supp. 90 (D. Mass. 1997).
    • (1997) United States v. Ferber
  • 155
    • 33845360334 scopus 로고    scopus 로고
    • See Romano, supra note 16, at 1789. The government also tried to admit the e-mail as a business record under 803(6) and as an excited utterance under 803(2). Neither claim prevailed.
    • Supra Note , vol.16 , pp. 1789
    • Romano1
  • 156
    • 33845359951 scopus 로고    scopus 로고
    • 966 F. Supp. at
    • See Ferber, 966 F. Supp. at 98-99.
    • Ferber , pp. 98-99
  • 157
    • 33845356026 scopus 로고    scopus 로고
    • 966 F. Supp.
    • Ferber, 966 F. Supp. at 98.
    • Ferber , pp. 98
  • 158
    • 33845349897 scopus 로고    scopus 로고
    • Ferber, Ibid. at 98.
    • Ferber , pp. 98
  • 159
    • 33845368239 scopus 로고    scopus 로고
    • Ferber, Ibid. at 98.
    • Ferber , pp. 98
  • 160
    • 33845367846 scopus 로고    scopus 로고
    • Ferber, Ibid. at 99.
    • Ferber , pp. 99
  • 161
    • 33845352985 scopus 로고    scopus 로고
    • Ferber, Ibid at 99
    • Ferber , pp. 99
  • 162
    • 33845370469 scopus 로고
    • 607 F.2d 779, (7th Cir.)
    • (citing United States v. Blakey, 607 F.2d 779, 785 (7th Cir. 1979) (statements made within 23 minutes of event admissible under Rule 803[1]);
    • (1979) United States v. Blakey , pp. 785
  • 163
    • 33845369213 scopus 로고
    • 821 F. Supp. 703, (S.D. Ga.)
    • Miller v. Crown Amusements, Inc., 821 F. Supp. 703, 706-07 (S.D. Ga. 1993) (statements made within 10 minutes of event admissible under Rule 803 [1]); see also Fed. R. Evid. 803(1) advisory committee's note (under Rule 803(1) "in many, if not most, instances precise contemporaneity is not possible and hence a slight lapse [of time] is allowable.").
    • (1993) Miller v. Crown Amusements, Inc. , pp. 706-707
  • 164
    • 33845352491 scopus 로고    scopus 로고
    • 213 F. Supp. n.4
    • Perfect 10, 213 F. Supp. at 1155 n.4.
    • Perfect , vol.10 , pp. 1155
  • 165
    • 33845352491 scopus 로고    scopus 로고
    • Perfect 10, Ibid. at 1155
    • Perfect , vol.10 , pp. 1155


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.