Category Archives: Admissibility

Two-Face(d)book: Who Owns your Content ‘Today’?

An globe of the Earth sits perilously on a steel-jaw trapThe latest is a flap between Facebook and their users over who owns the content of their pages.  Facebook quietly modified their Terms of Use policy to state that they own your content.  That didn’t go over well with their user community.  Thousands closed their accounts and others actually prepared to sue over the change.  Then, shock-of-all-shocks, Facebook backed down.

It seems to me this is standard practice lately; quietly modify agreements, then wait to see if anyone notices.  People noticed.  But before you crack open the champagne, two important things to consider:

  • Facebook left wiggle room as to what they’ll do in the future.  To quote from the WSJ article above:

“Because of the feedback we received, we have decided to return to our previous Terms of Use while we resolve the issues that people have
raised
.”  (Italics added)

Resolve ‘what’, exactly?

  • This issue is entirely beside the point because to me, it isn’t about who owns the content, it’s about who has access to it.

Every day that your information is up on Facebook, it may be available to everybody, everywhere.  Maybe you should swap that champagne for tranquilizers…

e-Evidence: Legoland or Humpty Dumpty?

Part II of a two-part series.  Part I appeared 12/03/08.

Forgive me – I’m in a mischievous mood today…

PART II – LEGAL RELEVANCE

j0403058“All the king’s horses and all the king’s men couldn’t put Humpty together again!”

This is a humorous nursery rhyme from my childhood.  Others, like Ring around the Rosey or London Bridge might have illustrated my point well, but those are missing the most important part; with e-discovery, once the opportunity is lost, it’s likely a permanent result.

Let’s say you’ve made it all the way through to this stage,  If that is so, then not only have you located evidence, you’ve established that it’s logically relevant (which in law-speak generally means that the evidence is material to prove or disprove a disputed fact that is of consequence to the action, and has probative value).  That takes care of that, right?

Not so fast.  Now, you have to persuade the court that it’s legally relevant to your case; and that means laying a foundation of admissibility.  Your adversary is going to use every tool at his or her disposal to knock out items that exculpate your client.  Did you take care to make sure that all technical aspects have been satisfied?  A paper trail is one thing, but an electronic trail?  Maybe a game of Twister would be easier.

In law school, we had a ‘mini-checklist’ that would help us remember all the things we had to think about when addressing this type of evidence:

  1. Is it Relevant?j0385258
  2. Is it Authentic?
  3. Does it violate the Best Evidence Rule?
  4. Is it Hearsay?
  5. Is it Privileged?
  6. Is it Parol Evidence?

Techies, take a deep breath.

For our purposes today, I’m not concerned with three through six.  Lawyers will determine the disposition of the evidence once it’s produced.  But what about one and two?  There are a lot of steps leading up to production.  The data may pass through several hands before it makes its way to the legal department.  Let’s take a look.

RELEVANCE (LEGAL)

We discussed logical relevance above.  We have, theoretically, material evidence.  Now, we must lay the foundation (also mentioned above).

AUTHENTICATION

We have to establish that the evidence is what it purports to be.  That’s not simple, even when it’s paper.  We need an electronic trail to follow – and that’s the east part.

First, we have to establish chain of custody.  That means we need to link together the source and all phases it passed through – kind of like a Barrel of Monkeys. If a cutting-edge method was used to procure the data, there could be a scientific challenge to the process. We’ll need expert testimony to walk the court through how the evidence was obtained.

The lawyers aren’t likely to be doing it.  They don’t have the technical know-how, plus, there are ethics issues with lawyers testifying in trials they’re working on.

Techies, let out that deep breath.  If they won’t be doing it, you will!  It means you’d better document everything, then be prepared to testify about it in court.

EPILOGUE

If this exercise proves one thing, it’s that attorneys and technology professionals have separate and distinct – and extremely important – jobs to do.  But in certain areas, they depend on each other.  If IT can’t get access to data, the attorneys may have to file a motion.  If IT establishes that there will be a punitive cost to comply, the attorneys may have to push back – or seek cost-shifting.  As an attorney, if I don’t explain to IT that every step of their process must be documented, am I hurting them?  No – ultimately I’m hurting myself, because I’m the one who will have to establish authenticity in court.

As you can see, the process of bringing ESI to it’s proper form is a series of building blocks, not unlike stacking Lego bricks.  In fact, in evidence law we have a saying; “A brick is not a wall“.

Take care.  Failure to stack the bricks carefully and your wall will likely end up like Jenga or Kerplunk.

Darn…I should have been able to work in Operation

What is Electronic Evidence? Answer: A lot more than you might Think!

Part I of a two-part series.  Part II will appear 12/04/08.

PART I – LOGICAL RELEVANCE

A cardinal rule, known to law students everywhere, was broken.  “When on a break from the bar exam, don’t discuss a specific part of it with anyone – and if you absolutely must, ask permission first!”  The reasoning behind this rule; to prevent students from freaking out because inevitably the other student will point out something they themselves missed, thus setting off a chain reaction of worry, panic and distraction.

There I was, on a break from the California Bar Exam, and another student really wanted to discuss the evidence question with me.  We had a pleasant conversation – as pleasant as it could be between two stressed-out bar candidates in the middle of a three-day exam.  We discussed the facts as they pertained to the question and the issue of whether each piece of evidence put before us was authentic.

Signature:2a0f6d0366f291694bd9cc422bff24b12e1d3afd88bc0ed09c9a8814df3c0837

All was going well until I pointed out the ones that were legit, but weren’t admissible in court.  The pallor of my counterpart changed noticeably.  That’s when he realized that he’d done a great job analyzing whether each piece of evidence was authentic, but forgot the next step – determining whether each was admissible.

Finding evidence is just the beginning.  If all of your dominoes don’t line up properly, it will never be admitted.  The technology gurus have a huge role to play and may not even be aware of it.

A few years ago, if you explained to the average person what electronic evidence – or e-evidence was, then asked them to give you an example, 99% of them would have given you the same answer – e-mail.  We’ve all read news stories about this individual or that one who was caught red-handed through his or her e-mail messages.

Later, another example started showing up more often – text messages.  Just ask the former Mayor of Detroit how that turned out for him…

ESTATUAS DE JARDIM

In law school and on the bar exam, the testers took pride in finding ways to slip a piece of written evidence right by a student by putting it into a form that he or she wouldn’t normally think of as “written”; engraving on a tombstone, label on a medicine bottle, a license plate.  We’re conditioned to think of written evidence as something more mainstream, like a letter, a book or a bill of receipt.

A lot of e-evidence is still written – but now it’s written to computer hard drives, DVDs and cellular phones.  Just like law school students, we have to broaden our thinking and remember that virtually any device that can save, store – or even process electronic information (e.g. RAM in printers/fax machines) may qualify. Then, we have to remember the really tough part – many of these devices are mobile.  They could be virtually anywhere in the world.

Let’s take a hypothetical look at Jane Doe.  She works for a multi-national corporation, “Multi-Corp”.  She has an office in Los Angeles and one in Tokyo, and an apartment in each city as well.  She has a desktop computer in each office, plus a laptop to use when she’s out in the field, at home or traveling.  She stores some of her work on the company file servers.  She’s taken to transferring work from her laptop to her home computers in both Tokyo and L.A. – because she likes them better (the boss doesn’t know).  It’s annoying for her to connect the machines directly, so she either hooks up wirelessly through her router or uses her thumb drive.  She has two cellular phones (one is personal) and a PDA.

Multi-Corp is sued by Uni-Corp, and the Plaintiffs subpoena Jane’s correspondences.  Am I the only one with a headache?  Probably not.

If I’m in the IT department at Multi-Corp, I have to think of every possible device – and the location of each – where relevant data may be stored (let’s hope Jane remembers to tell me about the thumb drive).  Then, once I do, I have to locate the data on the device itself.  What if I need to retrieve it from back-up media?  What happens if a device – and the data it contains – is owned/managed/outsourced to a third party (e.g. the file servers or the cellular phones)?  How do I get them to grant me access when they don’t want to be dragged into a lawsuit?  Do they have to do so?  I might have to ask the legal department.

If I’m in the Legal department at Multi-Corp – or in their outside counsel’s office – I’m depending on the expertise of my IT resources, but I’m also worried about issues that IT doesn’t normally think about; chain-of-custody being a prime example.  I’m looking for data that will exonerate the defendant and relevance is only one issue.  I’m also responsible for making sure it’s admissible and I don’t want it thrown out on a technicality.  How can I impress this and other concepts upon people who don’t work directly for me?

Meanwhile, both departments – and management – are thinking about the costs and whether the Plaintiff’s subpoena is too broad in its scope.

A lot of questions.  A lot of concerns.  I will endeavor to address all of them in tomorrow’s post.