-
1
-
-
84860044095
-
My space to hire safety czar
-
(17 February), accessed 9 May 2006 (citing comScore Networks).
-
"My Space to Hire Safety Czar," Red Herring, (17 February 2006), at http://www.redherring.com/article.aspx?a=15773, accessed 9 May 2006 (citing comScore Networks).
-
(2006)
Red Herring
-
-
-
2
-
-
84860054492
-
-
accessed 9 May 2006
-
Technorati, "About Technorati," at http://www.technorati.com/ about/, accessed 9 May 2006.
-
About Technorati
-
-
-
3
-
-
70049084130
-
Data memo: Generations online
-
(December), accessed 9 May 2006.
-
Susannah Fox and Mary Madden, Pew Internet & American Life, "Data Memo: Generations online," (December 2005), at http://www.pewInternet.org/PPF/r/170/report_display.asp, accessed 9 May 2006.
-
(2005)
Pew Internet & American Life
-
-
Fox, S.1
Madden, M.2
-
5
-
-
0011703716
-
The electronic paper trail: Evidentiary obstacles to discovery and admission of electronic evidence
-
citing Susan E. Davis, Elementary Discovery, My Dear Watson, CAL. LAW., Mar. 1996, at 53, 53 (discussing different forms of electronic evidence)
-
"As a general rule, 'electronic evidence' can be any information created or stored in digital form whenever a computer is used to accomplish a task. As this broad definition suggests, electronic evidence may exist whenever a person enters information into a computer, a computer generates information in response to a request by an operator, or a computer uses or processes information." Christine Sgarlata Chung and David J. Byer, "The Electronic Paper Trail: Evidentiary Obstacles to Discovery and Admission of Electronic Evidence," 4 B.U. J. Sci. & Tech. L. 5, 8 (1998). (citing Susan E. Davis, Elementary Discovery, My Dear Watson, CAL. LAW., Mar. 1996, at 53, 53 (discussing different forms of electronic evidence)).
-
(1998)
4 B.U. J. Sci. & Tech. L
, vol.5
, pp. 8
-
-
Chung, C.S.1
Byer, D.J.2
-
6
-
-
33845365437
-
Looking for a link; when police suspected that a group of young men were beating homeless people, they turned to the web
-
(Fort Lauderdale, Flo.) 21 January
-
Jamie Malernee, "Looking For A Link; When Police Suspected That A Group Of Young Men Were Beating Homeless People, They Turned To The Web," Sun-Sentinel (Fort Lauderdale, Flo.) 21 January 2006, p. 1A.
-
(2006)
Sun-sentinel
-
-
Malernee, J.1
-
7
-
-
84860053140
-
Dangers in MySpace.com
-
(3 March), accessed 9 May 2006
-
"Dangers in My Space.com, " Associated Press (3 March 2006), at http://abclocal.go.com/wpvi/story?_section=nation_world&id=3957377, accessed 9 May 2006.
-
(2006)
Associated Press
-
-
-
8
-
-
33845360460
-
Dangers in MySpace.com
-
"Dangers in MySpace.com," supra note 8.
-
Supra Note
, vol.8
-
-
-
9
-
-
33845360460
-
Dangers in MySpace.com
-
"Dangers in MySpace.com," supra note 8.
-
Supra Note
, vol.8
-
-
-
10
-
-
33845360460
-
Dangers in MySpace.com
-
"Dangers in MySpace.com," supra note 8.
-
Supra Note
, vol.8
-
-
-
11
-
-
33845360460
-
Dangers in MySpace.com
-
"Dangers in MySpace.com," supra note 8.
-
Supra Note
, vol.8
-
-
-
12
-
-
33845366433
-
My space to hire safety czar
-
According to this article, "The site prohibits minors 13 and under from joining, discourages users from posting personal information and provides special protections for those 14 and 15." My Space does not have a technological infrastructure that enforces this policy, but encourages users under the age 18 to make their profiles private. "My Space to Hire Safety Czar," supra note 1.
-
Supra Note
, vol.1
-
-
-
13
-
-
33845360460
-
Dangers in MySpace.com
-
"Dangers in MySpace.com," supra note 8.
-
Supra Note
, vol.8
-
-
-
14
-
-
33845366433
-
My Space to Hire Safety Czar
-
"My Space to Hire Safety Czar," supra note 1.
-
Supra Note
, vol.1
-
-
-
15
-
-
33845365438
-
Looking for A Link
-
"Looking For A Link," supra note 6.
-
Supra Note
, vol.6
-
-
-
16
-
-
13544269531
-
Digital evidence and the new criminal procedure
-
See e.g., Orin Kerr, "Digital Evidence and the New Criminal Procedure," 105 Colum. L. Rev. 279-318 (2005).
-
(2005)
105 Colum. L. Rev.
, vol.279-318
-
-
Kerr, O.1
-
17
-
-
33845355184
-
Developments in the law: VI. Electronic evidence and the federal rules
-
Summer
-
Leah Voigt Romano, "Developments in the Law: VI. Electronic Evidence and the Federal Rules," 38 Loy. L.A. L. Rev. 1745, 1749 (Summer 2005).
-
(2005)
38 Loy. L.A. L. Rev.
, vol.1745
, pp. 1749
-
-
Romano, L.V.1
-
18
-
-
33845369342
-
-
Fed. R. Evid. 901 (a).
-
Fed. R. Evid.
, vol.901
, Issue.A
-
-
-
19
-
-
33845367965
-
-
152 F.3d 1241, (10th Cir.)
-
See also United States v. Simpson, 152 F.3d 1241, 1250 (10th Cir. 1998).
-
(1998)
United States v. Simpson
, pp. 1250
-
-
-
20
-
-
33845362071
-
-
advisory committee's notes
-
Fed. R. Evid. 901(a) advisory committee's notes.
-
Fed. R. Evid.
, vol.901
, Issue.A
-
-
-
21
-
-
33845371395
-
-
(b) (4)
-
Fed. R. Evid. 901(b) (4);
-
Fed. R. Evid.
, vol.901
-
-
-
22
-
-
33845357423
-
-
13 F.3d 20, (1st Cir.)
-
See also United States v. Paulino, 13 F.3d 20, 23 (1st Cir. 1994).
-
(1994)
United States v. Paulino
, pp. 23
-
-
-
23
-
-
14544291305
-
-
United States Department of Justice, Computer Crime and Intellectual Property Section Criminal Division, (July), accessed 9 May 2006
-
United States Department of Justice, Computer Crime and Intellectual Property Section Criminal Division, "Searching and Seizing Computers and Obtaining Electronic Evidence in Criminal Investigations," (July 2002), at http://www.cybercrime.gov/s&snianual2002.htm, accessed 9 May 2006
-
(2002)
Searching and Seizing Computers and Obtaining Electronic Evidence in Criminal Investigations
-
-
-
24
-
-
33845362458
-
-
advisory committee's notes [hereinafter USDOJ]
-
(citing Fed. R. Evid. 901(b), advisory committee's notes) [hereinafter USDOJ].
-
Fed. R. Evid.
, vol.901
, Issue.B
-
-
-
25
-
-
33845354622
-
-
USDOJ
-
USDOJ, supra note.20
-
Supra Note
, vol.20
-
-
-
26
-
-
33845359700
-
-
673 F.2d 86, (5th Cir.)
-
(citing United States v. Vela, 673 F.2d 86, 90 (5th Cir. 1982);
-
(1982)
United States v. Vela
, pp. 90
-
-
-
27
-
-
77952432296
-
-
420 F.2d 889, 893 n.11 (9th Cir.)
-
United States v. DeGeorgia, 420 F.2d 889, 893 n.11 (9th Cir. 1969).
-
(1969)
United States v. DeGeorgia
-
-
-
28
-
-
33845350915
-
-
553 F.2d 1109, (8th Cir.)
-
But see United States v. Scholle, 553 F.2d 1109, 1125 (8th Cir. 1977) (stating in dicta that "the complex nature of computer storage calls for a more comprehensive foundation").
-
(1977)
United States v. Scholle
, pp. 1125
-
-
-
29
-
-
33845354940
-
-
USDOJ
-
USDOJ, supra note 20
-
Supra Note
, vol.20
-
-
-
30
-
-
33845364942
-
-
250 F.3d 438, (6th Cir.)
-
(citing United States v. Salgado, 250 F.3d 438, 453 (6th Cir. 2001) (stating that "it is not necessary that the computer programmer testify in order to authenticate computer-generated records");
-
(2001)
United States v. Salgado
, pp. 453
-
-
-
31
-
-
33845353962
-
-
127 F.3d 595, (7th Cir.)
-
United States v. Whitaker, 127 F.3d 595, 601 (7th Cir. 1997) (FBI agent who was present when the defendant's computer was seized can authenticate seized files);
-
(1997)
United States v. Whitaker
, pp. 601
-
-
-
32
-
-
33845371635
-
-
111 F.2d 1219, (9th Cir.)
-
United States v. Miller, 111 F.2d 1219, 1237 (9th Cir. 1985) (telephone company billing supervisor can authenticate phone company records);
-
(1985)
United States v. Miller
, pp. 1237
-
-
-
33
-
-
33845367719
-
-
923 F.2d 910, (1st Cir.)
-
United States v. Moore, 923 F.2d 910, 915 (1st Cir. 1991) (head of bank's consumer loan department can authenticate computerized loan data).
-
(1991)
United States V. Moore
, pp. 915
-
-
-
35
-
-
33845357301
-
-
448 U.S. 56
-
See Ohio v. Roberts, 448 U.S. 56, 62-66 (1980).
-
(1980)
Ohio V. Roberts
, pp. 62-66
-
-
-
36
-
-
33845366112
-
-
emphasis added
-
Fed. R. Evid. 801 (a) (emphasis added).
-
Fed. R. Evid.
, vol.801
, Issue.A
-
-
-
37
-
-
33845354822
-
-
emphasis added
-
Fed. R. Evid. 801(b) (emphasis added).
-
Fed. R. Evid.
, vol.801
, Issue.B
-
-
-
38
-
-
33845352844
-
-
USDOJ
-
USDOJ, supra note 20.
-
Supra Note
, vol.20
-
-
-
39
-
-
33845368944
-
-
(d)(2)
-
Fed. R. Evid. 801(d)(2).
-
Fed. R. Evid.
, vol.801
-
-
-
40
-
-
33845363742
-
-
(d)(2)
-
Fed. R. Evid. 801(d)(2) advisory committee's note.
-
Fed. R. Evid.
, vol.801
-
-
-
41
-
-
33845360860
-
Electronic evidence: Law and practice
-
[hereinafter Rice].
-
Paul R. Rice, "Electronic Evidence: Law and Practice," A.B.A. Sec. of Litig. 269 (2005) [hereinafter Rice].
-
(2005)
A.B.A. Sec. of Litig.
, vol.269
-
-
Rice, P.R.1
-
42
-
-
33845352987
-
-
See also, Edmund M. Morgan, "Basic Problems of Evidence" 265 (1962) ("A party can hardly object that he had no opportunity to cross-examine himself or that he is unworthy of credence save when speaking under sanction of an oath.")
-
(1962)
Basic Problems of Evidence
, pp. 265
-
-
Morgan, E.M.1
-
43
-
-
33747040745
-
-
87 F.3d 695 (5th Cir.)
-
See United States v. Bond, 87 F.3d 695 (5th Cir. 1996) (holding that it was proper to exclude the defendant's tape that made by the defendant and offered as an admission in order to benefit himself, not as evidence of a statement made by a party used against that party).
-
(1996)
United States v. Bond
-
-
-
46
-
-
33845364941
-
-
Fed. R. Evid. 803(6).
-
Fed. R. Evid.
, vol.803
, Issue.6
-
-
-
47
-
-
84860057423
-
-
advisory committee's note. 2 McCormick on Evidence § 286 (4th ed. John W. Strong ed.) Cf
-
Fed. R. Evid. 803(6) advisory committee's note. 2 McCormick on Evidence § 286 (4th ed. John W. Strong ed. 1992). Cf. "When a computer record contains only computer-generated data untouched by human hands, however, the record cannot contain hearsay. In such cases, the government must establish the authenticity of the record, but does not need to establish that a hearsay exception applies for the records to be admissible in court."
-
(1992)
Fed. R. Evid.
, vol.803
, Issue.6
-
-
-
48
-
-
33845365854
-
-
USDOJ
-
USDOJ, supra note 20.
-
Supra Note
, vol.20
-
-
-
50
-
-
33845369614
-
-
In some cases, a "duplicate" is permitted under Fed. R. Evid. 1003 "unless (1) a genuine question is raised as to the authenticity of the original or (2) in the circumstances it would be unfair to admit the duplicate in lieu of the original."
-
Fed. R. Evid.
, vol.1003
-
-
-
52
-
-
33845354621
-
-
76 F. Supp. 2d 773, (S.D. Tx.)
-
Cf. St. Clair v. Johnny's Oyster & Shrimp, Inc., 76 F. Supp. 2d 773, 775 (S.D. Tx. 1999). ("Instead of relying on the voodoo information taken from the Internet, Plaintiff must hunt for hard copy back-up documentation in admissible form from the United States Coast Guard or discover alternative information verifying what Plaintiff alleges").
-
(1999)
Cf. St. Clair v. Johnny's Oyster & Shrimp, Inc.
, pp. 775
-
-
-
53
-
-
33845356590
-
-
Fed. R. Evid. 1001(1).
-
Fed. R. Evid.
, vol.1001
, Issue.1
-
-
-
54
-
-
33845354695
-
-
at 1794-95
-
See also Romano, supra note 16, at 1794-95, n. 372.
-
Supra Note
, vol.16
, Issue.372
-
-
Romano1
-
55
-
-
33845352989
-
-
Fed. R. Evid. 1001(3).
-
Fed. R. Evid.
, vol.1001
, Issue.3
-
-
-
56
-
-
33845358057
-
-
673 F.2d 86 (5th Cir.)
-
United States v. Vela, 673 F.2d 86 (5th Cir. 1982). In fact, the Fifth Circuit noted that computerized telephone bills are "even more reliable than... average business records because they are not even touched by the hand of man."
-
(1982)
United States v. Vela
-
-
-
58
-
-
77950642758
-
-
836 F.2d 453 457 (9th Cir.)
-
See United States v. Catabran, 836 F.2d 453 457 (9th Cir. 1988) ("It is immaterial that the business record is maintained in a computer rather than in company books' assuming that the proponent lays a proper foundation.")
-
(1988)
United States v. Catabran
-
-
-
59
-
-
33845373327
-
-
USDOJ
-
USDOJ, supra note 20
-
Supra Note
, vol.20
-
-
-
60
-
-
33845362196
-
-
858 F.2d 1427, (9th Cir.)
-
(citing United States v. Bonallo, 858 F.2d 1427, 1436 (9th Cir. 1988) ("The fact that it is possible to alter data contained in a computer is plainly insufficient to establish untrustworthiness.");
-
(1988)
United States v. Bonallo
, pp. 1436
-
-
-
61
-
-
33845362329
-
-
Romano, supra note 16, at 1750. This rule reflects an evolution on the court's acceptance of Internet-produced evidence. For example, in 1999 (a mere seven years ago), a District Court in Texas wrote: While some look to the Internet as an innovative vehicle for communication, the Court continues to warily and eerily view it largely as one large catalyst for rumor, innuendo, and misinformation. So as not to mince words, the Court reiterates that this so-called Web provides no way of verifying the authenticity of the alleged contentions... There is no way Plaintiff can overcome the presumption that the information he discovered on the Internet is inherently untrustworthy. Anyone can put anything on the Internet. No web-site is monitored for accuracy and nothing contained therein is under oath or even subject to independent verification absent underlying documentation. Moreover, the Court holds no illusions that hackers can adulterate the content on any web-site from any location at any time. For these reasons, any evidence procured off the Internet is adequate for almost nothing, even under the most liberal interpretation of the hearsay exception rules found in
-
Supra Note
, vol.16
, pp. 1750
-
-
Romano1
-
64
-
-
33845352988
-
-
918 F.2d 1501, (11th Cir.)
-
United States v. Smith, 918 F.2d 1501, 1510 (11th Cir.1990) ("the government may authenticate a document solely through the use of circumstantial evidence, including the document's own distinctive characteristics and the circumstances surrounding its discovery").
-
(1990)
United States v. Smith
, pp. 1510
-
-
-
65
-
-
33845351871
-
-
Rice, supra note 30, at 275.
-
Supra Note
, vol.30
, pp. 275
-
-
Rice1
-
66
-
-
33845350146
-
-
Chain of custody involves verifying that the evidence has not bee altered from the time it became relevant to the time in which it was used in trial. Each custodian of the evidence must established that the evidence was secure from others and that he has not altered the evidence himself. See Rice, supra note 30, at 256-259;
-
Supra Note
, vol.30
, pp. 256-259
-
-
Rice1
-
67
-
-
33845358456
-
-
127 F.3d 595, (7th Cir.)
-
United States v. Whitaker, 127 F.3d 595, 602 (7th Cir. 1997). While chain of custody issues could arise given the threat of hackers and other network security concerns, the proponent of the evidence is only required to demonstrate to the judge that the proffered evidence is what he claims it is.
-
(1997)
United States v. Whitaker
, pp. 602
-
-
-
68
-
-
33845371258
-
-
Rice, supra note 30, at 258. "Airtight assurances are seldom necessary. Both parties usually can testify to the content of a communications and any changes made because they were involved in the communication's creation."
-
Supra Note
, vol.30
, pp. 258
-
-
Rice1
-
69
-
-
33845371946
-
-
Rice, supra note 30, at 250. Consequently, any issues go to the question of the weight of the evidence, not its admissibility.
-
Supra Note
, vol.30
, pp. 250
-
-
Rice1
-
70
-
-
40749084517
-
-
200 F.3d 627 (9th Cir.) Id. at 629, n.3
-
United States v. Tank, 200 F.3d 627 (9th Cir. 2000). The defendant only challenged whether a proper foundation was laid for admitting these chat room logs into evidence and did not challenge admissibility under any other rule, including hearsay or best evidence. Id. at 629, n.3.
-
(2000)
United States v. Tank
-
-
-
75
-
-
33845369746
-
-
F.2d 453, (9th Cir.)
-
(citing United States v. Catabran, 836, F.2d 453, 458 (9th Cir. 1988) "Any question as to the accuracy of the printouts... would have affected only the weight of the printouts, not their admissibility.")
-
(1988)
United States V. Catabran
, vol.836
, pp. 458
-
-
-
76
-
-
40749084517
-
-
United States v. Catabran Ibid at 630-31. For a factually similar case affirming the use of circumstantial evidence to show a connection between the evidence at issue and the defendant
-
United States v. Catabran
, pp. 630-631
-
-
-
77
-
-
77953273310
-
-
152 F.3d 1241 (10th Cir.)
-
see United States v. Simpson, 152 F.3d 1241 (10th Cir. 1998).
-
(1998)
United States v. Simpson
-
-
-
78
-
-
33845349527
-
-
USDOJ
-
"Defendants in criminal trials often attempt to challenge the authenticity of computer-generated records by challenging the reliability of the programs." USDOJ, supra note 20
-
Supra Note
, vol.20
-
-
-
79
-
-
33845367845
-
-
250 F.3d 438, (6th Cir.)
-
(citing United States v. Salgado, 250 F.3d 438, 452-53 (6th Cir. 2001);
-
(2001)
United States v. Salgado
, pp. 452-453
-
-
-
80
-
-
40749084517
-
-
519 F.2d 542, (3d Cir.)
-
United States v. Liebert, 519 F.2d 542, 547-48 (3d Cir. 1975)).
-
(1975)
United States v. Liebert
, pp. 547-548
-
-
-
81
-
-
33845363259
-
-
896 F.2d 1476, (7th Cir.)
-
See also United States v. Briscoe, 896 F.2d 1476, 1494-95 (7th Cir. 1990). ("the government provides sufficient facts to warrant a finding that the records are trustworthy and the opposing party is afforded an opportunity to inquire into the accuracy thereof.").
-
(1990)
United States v. Briscoe
, pp. 1494-1495
-
-
-
88
-
-
33845367964
-
-
235 F.3d 1318, (11th Cir.)
-
See also United States v. Siddiqui, 235 F.3d 1318,1322-23 (11th Cir. 2000) (holding that e-mail messages were properly authenticated where messages included defendant's email address, defendant's nickname, and where defendant followed up messages with phone calls).
-
(2000)
United States v. Siddiqui
, pp. 1322-1323
-
-
-
89
-
-
33845354364
-
-
USDOJ
-
USDOJ, supra note 20
-
Supra Note
, vol.20
-
-
-
90
-
-
33845358456
-
-
127 F.3d 595, (7th Cir.)
-
"the mere possibility of tampering does not affect the authenticity of a computer record." (citing United States v. Whitaker, 127 F.3d 595, 602 (7th Cir. 1997)
-
(1997)
United States v. Whitaker
, pp. 602
-
-
-
91
-
-
33845362196
-
-
858 F.2d 1427, (9th Cir.)
-
(declining to disturb trial judge's ruling that computer records were admissible because allegation of tampering was "almost wild-eyed speculation... [without] evidence to support such a scenario"); United States v. Bonallo, 858 F.2d 1427, 1436 (9th Cir. 1988) ("The fact that it is possible to alter data contained in a computer is plainly insufficient to establish untrustworthiness.");
-
(1988)
United States v. Bonallo
, pp. 1436
-
-
-
92
-
-
33845368839
-
-
773 F.2d 1553, (11th Cir.)
-
United States v. Glasser, 773 F.2d 1553,1559 (11th Cir. 1985) ("The existence of an air-tight security system [to prevent tampering] is not, however, a prerequisite to the admissibility of computer printouts. If such a prerequisite did exist, it would become virtually impossible to admit computer-generated records; the party opposing admission would have to show only that a better security system was feasible."). As a result, the rule for authenticating digital evidence is consistent with the rule used to establish the authenticity of other evidence such as narcotics.
-
(1985)
United States v. Glasser
, pp. 1559
-
-
-
93
-
-
33845356028
-
-
USDOJ
-
USDOJ, supra note 20
-
Supra Note
, vol.20
-
-
-
94
-
-
33845368687
-
-
106 F.3d 695, (6th Cir.)
-
(citing United States v. Allen, 106 F.3d 695, 700 (6th Cir. 1997) ("Merely raising the possibility of tampering is insufficient to render evidence inadmissible.")
-
(1997)
United States v. Allen
, pp. 700
-
-
-
95
-
-
33845353692
-
-
USDOJ
-
It is important to note how federal courts sometimes skip the step of authenticating business records and immediately evaluate the proposed evidence under a hearsay framework and Fed. R. Evid. 803(6). "Prosecutors may note the conceptual overlap between establishing the authenticity of a computer-generated record and establishing the trustworthiness of a computer record for the business record exception to the hearsay rule. In fact, federal courts that evaluate the authenticity of computer-generated records often assume that the records contain hearsay, and then apply the business records exception." USDOJ, supra note 20
-
Supra Note
, vol.20
-
-
-
96
-
-
33845367845
-
-
250 F.3d, 438, (6th Cir.)
-
(citing United States v. Salgado, 250 F.3d, 438, 452-53 (6th Cir. 2001) (applying business records exception to telephone records generated "automatically" by a computer);
-
(2001)
United States v. Salgado
, pp. 452-453
-
-
-
97
-
-
33845371829
-
-
880 F.2d 209, (9th Cir.)
-
United States v. Linn, 880 F.2d 209, 216 (9th Cir. 1989) (same);
-
(1989)
United States v. Linn
, pp. 216
-
-
-
98
-
-
33845361686
-
-
673 F.2d 86, (5th Cir.)
-
United States v. Vela, 673 F.2d 86, 89-90 (5th Cir. 1982)).
-
(1982)
United States v. Vela
, pp. 89-90
-
-
-
99
-
-
33845366780
-
-
208 F.3d 633, (7th Cir.)
-
United States v. Jackson, 208 F.3d 633, 637 (7th Cir. 2000).
-
(2000)
United States v. Jackson
, pp. 637
-
-
-
100
-
-
33845352135
-
-
USDOJ
-
Cf. USDOJ, supra note 20, noting "Evidence that a computer program is sufficiently trustworthy so that its results qualify as business records according to
-
Supra Note
, vol.20
-
-
-
101
-
-
33845366545
-
-
Fed. R. Evid. 803(6) also establishes the authenticity of the record."
-
Fed. R. Evid.
, vol.803
, Issue.6
-
-
-
102
-
-
33845353962
-
-
127 F.3d 595, (7th Cir.)
-
United States v. Whitaker, 127 F.3d 595, 601 (7th Cir. 1997).
-
(1997)
United States v. Whitaker
, pp. 601
-
-
-
104
-
-
33845351997
-
-
note
-
In addition, the defense may also raise chain of custody issues.
-
-
-
-
105
-
-
33845351871
-
-
If entirely computer-generated, hearsay would not exclude records compiled by a computer should it pass authentication: No sincerity problems exist when statements are recorded mechanically. Perception and memory concerns are addressed if the proponent of the statement: (1) demonstrates that the recording device makes accurate recordings; (2) establishes that the device functioned corrected at the time the evidence was created; and, (3) if an individual was involved in the operation of the device, shows that the person was properly trained and corrected used it at the time the evidence was recorded. Rice, supra note 30, at 275.
-
Supra Note
, vol.30
, pp. 275
-
-
Rice1
-
106
-
-
33845366903
-
-
432 So.2d 837, (La.)
-
Furthermore, by definition, hearsay is limited to the words or conduct of a person. Fed. R. Evid. 801(b). "With a machine, however, there is no possibility of a conscious misrepresentation, and the possibility of inaccurate or misleading data only materializes if the machine is not functioning properly." State v. Armstead, 432 So.2d 837, 840 (La. 1983).
-
(1983)
State v. Armstead
, pp. 840
-
-
-
109
-
-
33845371394
-
-
208 F.3d
-
Jackson, 208 F.3d at 637.
-
Jackson
, pp. 637
-
-
-
110
-
-
33845368463
-
-
Jackson, Ibid. 637.
-
Jackson
, pp. 637
-
-
-
111
-
-
33845350657
-
-
Rice, supra note 30, at 279.
-
Supra Note
, vol.30
, pp. 279
-
-
Rice1
-
113
-
-
33845355896
-
-
2000 WL 235770
-
Dassouf v. White, 2000 WL 235770 at *4).
-
Dassouf v. White
, pp. 4
-
-
-
114
-
-
40749084517
-
-
235 F.3d 1318 (11th Cir.)
-
United States v. Siddiqui, 235 F.3d 1318 (11th Cir. 2000).
-
(2000)
United States v. Siddiqui
-
-
-
120
-
-
40749084517
-
-
United States v. Siddiqui, Ibid. at 1323. Siddiqui's counsel first argued that the government failed to show with reliability who sent the e-mail. However, the court held that this claim goes to authentication, which the court extensively discussed prior to the hearsay objection. Siddiqui also challenged the government's failure to properly authenticate the e-mail. The Eleventh Circuit found, however, a number of factors to support the e-mail's authenticity, including the Siddiqui's unique e-mail address ("msiddiquo@jajuar1.usouthal.edu") on each of the e-mail messages to his colleagues, as well as testimony from his colleague that when he replied to the e-mail sent by the defendant "the 'reply-function' on [his] e-mail system automatically dialed Siddiqui's e-mail address as the sender."
-
United States v. Siddiqui
, pp. 1323
-
-
-
121
-
-
40749084517
-
-
United States v. Siddiqui Ibid. at 1322. The e-mail address was also corroborated by another colleague in his deposition and in Siddiqui's attorney's cross-examination of said colleague. Finally, the e-mail bore details that further substantiated the e-mail's authentication.
-
United States v. Siddiqui
, pp. 1322
-
-
-
125
-
-
33845363882
-
-
94 F. Supp. 2d 1087 (D. Ore.)
-
Van Westrienen v. Americontinental Collection Corp., 94 F. Supp. 2d 1087 (D. Ore. 2000) (holding that representations made on the Web page of the defendant may be offered by the plaintiff as an admission even if the same statements are inadmissible hearsay when offered by the defendant.)
-
(2000)
Van Westrienen v. Americontinental Collection Corp.
-
-
-
127
-
-
33845352491
-
-
213 F. Supp. 2d
-
See also Perfect 10, 213 F. Supp. 2d at 1155 ("The Court treats the communications attributable to Cybernet employees as party admissions and will accept the third party communications only insofar as they indicate notice of infringing or potentially infringing activity.")
-
Perfect
, vol.10
, pp. 1155
-
-
-
128
-
-
33845357564
-
-
Perfect Ibid. at 821.
-
Perfect
, pp. 821
-
-
-
129
-
-
33845354486
-
-
Perfect Ibid. at 821.
-
Perfect
, pp. 821
-
-
-
130
-
-
33845369745
-
-
Perfect Ibid. at 821.
-
Perfect
, pp. 821
-
-
-
131
-
-
33845359826
-
-
Perfect Ibid. at 821.
-
Perfect
, pp. 821
-
-
-
132
-
-
33845356027
-
-
Perfect Ibid at 821.
-
Perfect
, pp. 821
-
-
-
133
-
-
33845364269
-
-
(d)(2)(B)
-
(citing Fed. R. Evid. 801(d)(2)(B) (providing that adoptive admissions by a party are not hearsay);
-
Fed. R. Evid.
, vol.801
-
-
-
134
-
-
33845360458
-
-
801.31[3][b], Joseph M. Laughlin ed., 2d ed. 2002
-
see also 5 Jack B. Weinstein & Margaret A. Berger, Weinstein's Federal Evidence §801.31[3][b], at 801-56 (Joseph M. Laughlin ed., 2d ed. 2002) ("A party may adopt a written statement if the party uses the statement or takes action in compliance [with] the statement.");
-
Weinstein's Federal Evidence
, pp. 801-856
-
-
Weinstein, J.B.1
Berger, M.A.2
-
135
-
-
33845354620
-
-
37 F.3d 996, n. 6 (3d Cir.)
-
Alvord-Polk, Inc. v. F. Schumacher & Co., 37 F.3d 996, 1005 n. 6 (3d Cir. 1994) (holding that statements of company president, which were reprinted in company publications, were not hearsay but were instead admissible as adoptive admissions).
-
(1994)
Alvord-polk, Inc. v. F. Schumacher & Co.
, pp. 1005
-
-
-
138
-
-
33845352491
-
-
213 F. Supp. 2d
-
Perfect 10, 213 F. Supp. 2d at 1155.
-
Perfect
, vol.10
, pp. 1155
-
-
-
139
-
-
33845352491
-
-
Perfect 10, Ibid. at 1155.
-
Perfect
, vol.10
, pp. 1155
-
-
-
140
-
-
33845366239
-
-
Fed. R. Evid. 803(6).
-
Fed. R. Evid.
, vol.803
, Issue.6
-
-
-
141
-
-
33845364006
-
-
See Rice, supra note 30, at 290: "However, internal records of the ISP regarding a customer's account that include information about the time that customer spent on-line - and which exact times different customers were on-line - could be admitted as business records of the ISPs as long as someone within the ISP organization properly qualifies the records as required by the business records exceptions."
-
Supra Note
, vol.30
, pp. 290
-
-
Rice1
-
142
-
-
84860041642
-
Craig's list
-
accessed 9 May 2006
-
Craig's List, Craig's List Terms of Use, at http://www.craigslist.org/ about/terms.of.use.html, accessed 9 May 2006.
-
Craig's List Terms of Use
-
-
-
143
-
-
33845367593
-
-
758 So.2d 405, (Miss.)
-
Bower v. Bower, 758 So.2d 405, 411-15 (Miss. 2000) (customer cannot qualify records - must be custodian or some other qualified person).
-
(2000)
Bower v. Bower
, pp. 411-415
-
-
-
144
-
-
84860057342
-
Data retention bill expected next week
-
(21 September), accessed 13 November 2006
-
Although relevant to this issue, the question of the retention of online records and the responsibility of ISPs to retain records for a set period of time is beyond the scope of this paper. For more information see Anne Broache and Declan McCullagh, "Data retention bill expected next week," CNET News.com (21 September 2006), at http://news.com.com/ Data+retention+bill+expected+next-week/2100-1028_3-6118283.html?tag=st.ref.go, accessed 13 November 2006.
-
(2006)
CNET News.com
-
-
Broache, A.1
McCullagh, D.2
-
145
-
-
84860039769
-
-
accessed 9 May 2006
-
eBay, "eBay.com Fees," at http://pages.ebav.com/help/sell/fees. html, accessed 9 May 2006.
-
eBay.com Fees
-
-
-
146
-
-
33845355898
-
-
Fed. R. Evid. 803(6).
-
Fed. R. Evid.
, vol.803
, Issue.6
-
-
-
147
-
-
33845367963
-
-
USDOJ
-
USDOJ, supra note 20 supports this analysis: Consider an e-mail harassment case. To help establish that the defendant was the sender of the harassing messages, the prosecution may seek the introduction of records from the sender's ISP showing that the defendant was the registered owner of the account from which the e-mail were sent. Ordinarily, this will require testimony from an employee of the ISP ("the custodian or other qualified witness") that the ISP regularly maintains customer account records for billing and other purposes, and that the records to be offered for admission are such records that were made at or near the time of the events they describe in the regular course of the ISP's business. Again, the key is establishing that the computer system from which the record was obtained is maintained in the ordinary course of business, and that it is a regular practice of the business to rely upon those records for their accuracy.
-
Supra Note
, vol.20
-
-
-
148
-
-
33845366110
-
-
USDOJ
-
USDOJ, supra note 20.
-
Supra Note
, vol.20
-
-
-
149
-
-
33845365712
-
-
See Romano, supra note 16, at 1779 ("Yet where Internet or Web postings are offered as business records, courts may need to take a closer look at their trustworthiness. To date, no federal court has held that Web pages or Internet postings are 'business records' according to the Rule 803(6) hearsay exception.")
-
Supra Note
, vol.16
, pp. 1779
-
-
Romano1
-
150
-
-
33845361438
-
-
See Rice, supra note 30, at 288-289.
-
Supra Note
, vol.30
, pp. 288-289
-
-
Rice1
-
151
-
-
77950642758
-
-
836 F.2d 453 (9th Cir.)
-
See United States v. Catabran, 836 F.2d 453 (9th Cir. 1988) In this case, the defendant suggested that the admitted computerized business records contained errors based on data entry. However, witness testified to correctly inputting the data. The defendant also challenged the accuracy of the computer program itself, charging that the computer program created inaccurate inventory figures based on the markup it applied. Even with the extensive cross-examination on this issue, the court concluded that the District Court did not abuse its discretion in admitting the records. "Any question as to the accuracy of the printouts, whether resulting from incorrect data entry or the operation of the computer program, as with inaccuracies in any other type of business records, would have affected only the weight of the printouts, not their admissibility."
-
(1988)
United States v. Catabran
-
-
-
154
-
-
33747040745
-
-
966 F. Supp. 90 (D. Mass.)
-
United States v. Ferber, 966 F. Supp. 90 (D. Mass. 1997).
-
(1997)
United States v. Ferber
-
-
-
155
-
-
33845360334
-
-
See Romano, supra note 16, at 1789. The government also tried to admit the e-mail as a business record under 803(6) and as an excited utterance under 803(2). Neither claim prevailed.
-
Supra Note
, vol.16
, pp. 1789
-
-
Romano1
-
156
-
-
33845359951
-
-
966 F. Supp. at
-
See Ferber, 966 F. Supp. at 98-99.
-
Ferber
, pp. 98-99
-
-
-
157
-
-
33845356026
-
-
966 F. Supp.
-
Ferber, 966 F. Supp. at 98.
-
Ferber
, pp. 98
-
-
-
158
-
-
33845349897
-
-
Ferber, Ibid. at 98.
-
Ferber
, pp. 98
-
-
-
159
-
-
33845368239
-
-
Ferber, Ibid. at 98.
-
Ferber
, pp. 98
-
-
-
160
-
-
33845367846
-
-
Ferber, Ibid. at 99.
-
Ferber
, pp. 99
-
-
-
161
-
-
33845352985
-
-
Ferber, Ibid at 99
-
Ferber
, pp. 99
-
-
-
162
-
-
33845370469
-
-
607 F.2d 779, (7th Cir.)
-
(citing United States v. Blakey, 607 F.2d 779, 785 (7th Cir. 1979) (statements made within 23 minutes of event admissible under Rule 803[1]);
-
(1979)
United States v. Blakey
, pp. 785
-
-
-
163
-
-
33845369213
-
-
821 F. Supp. 703, (S.D. Ga.)
-
Miller v. Crown Amusements, Inc., 821 F. Supp. 703, 706-07 (S.D. Ga. 1993) (statements made within 10 minutes of event admissible under Rule 803 [1]); see also Fed. R. Evid. 803(1) advisory committee's note (under Rule 803(1) "in many, if not most, instances precise contemporaneity is not possible and hence a slight lapse [of time] is allowable.").
-
(1993)
Miller v. Crown Amusements, Inc.
, pp. 706-707
-
-
-
164
-
-
33845352491
-
-
213 F. Supp. n.4
-
Perfect 10, 213 F. Supp. at 1155 n.4.
-
Perfect
, vol.10
, pp. 1155
-
-
-
165
-
-
33845352491
-
-
Perfect 10, Ibid. at 1155
-
Perfect
, vol.10
, pp. 1155
-
-
|