The Basics of E-Discovery & How To Effectively Authenticate ESI and

OLD WINE, NEW BOTTLE:
The Basics of E-Discovery &
How To Effectively Authenticate ESI and
Get It Admitted
Chicago Volunteer Legal Services
Dara Chevlin Tarkowski
Litigation Associate & E-Discovery Practice
Katten Muchin Rosenman LLP
0
Basic Familiarity with ESI Practices & Pitfalls
is Essential to Modern Practice of Law
•
Electronically stored information is everywhere and growing,
and it takes many forms, with only more on the way.
– ESI encompasses far more than just email, documents, photos
and instant messages.
– ESI = “any information created, stored, or best utilized with
computer technology of any type.”
•
Important to know how to properly handle your client’s ESI.
•
Also important to know how to get your opponent’s ESI and
use it effectively.
•
Advance planning and preparation will equip you to more
efficiently navigate the rules and can give you the upper
hand in pursuing e-discovery.
1
Key Steps in the E-Discovery Process
2
Much Ado About Something
•
Amendments to the federal rules established a practical and
philosophical framework for the conduct of electronic discovery.
•
Mandate earlier and more extensive involvement by counsel and
clients to timely and successfully meet discovery obligations.
•
Mishandling e-discovery matters can have serious -- even
disastrous -- consequences.
•
Failing to request the proper ESI
•
High-profile examples include:
– Qualcomm v. Broadcom -- $8.5M in attorneys’ fees, referral of
certain counsel to state bar association, and other sanctions
– In re Hawaiian Airlines – Award of $80M in damages plus costs
– Coleman v. Morgan Stanley – Adverse inference = $1.57B
verdict
3
Amended Federal Rules Framework
•
FRCP 16(b) encourages initial scheduling order to include provisions for
addressing e-discovery disclosures and discovery.
•
FRCP 26(a)(1)(B) adds “ESI” to the list of required initial disclosures.
•
FRCP 26(b)(2)(B) draws distinction between accessible and inaccessible
data and creates cost-shifting opportunities.
•
FRCP 26(b)(5)(B) & 26(f)(4) authorize “claw back” and “quick peek”
provisions in discovery orders.
•
FRCP 26(f) adds e-discovery disclosure and discovery to the list of topics to
be discussed at the initial planning conference.
•
FRCP 34(b) establishes protocols regarding the form of production of ESI.
•
Form 35 adds a description of the parties’ e-discovery proposals.
•
FRCP 37(f) says ESI lost as result of routine, good faith operation of an
electronic information system should not result in sanctions.
•
FRCP 45 clarifies that records subpoenas include ESI.
4
What -- Me worry?
5
Understanding the Amended Federal Rules is
Just the First Step
•
Some federal courts have adopted even more detailed
protocols or procedures regarding disclosure and discovery
of ESI.
– 7th Circuit E-Discovery Pilot Program
•
Many state courts have since adopted rules similar to the
federal amendments or plan to issue guidelines to state
court judges.
•
Illinois law is relatively silent on ESI and has not adopted its
own version of the Federal Amendments.
6
E-Discovery in Illinois State Courts
•
Supreme Court Rule 201(b)(1): “The word ‘documents,’ as used in
these rules, includes, but is not limited to, papers, photographs,
films, recordings, memoranda, books, records, accounts,
communications and all retrievable information in computer
storage.”
•
Committee Comment: Amendment leaves “no question but that a
producing party must search its computer storage when responding
to a request to produce documents pursuant to [Rule 214].”
•
Committee Comment: Definition of “documents” expanded to
recognize “the increasing reliability on computer technology and
thus obligates a party to produce on paper those relevant materials
which have been stored electronically.”
7
It pays to “be prepared” and can cost you if
you’re not.
•
E-discovery “preparedness” is mostly
about:
– Understanding your client's
information technology and records
management operations and
environment;
– Being able to accurately describe
and document them in required
meet & confers and disclosures; and
– Knowing how to properly request
ESI and knowing how to introduce it
in court.
8
Determine What’s There (Requesting Party)
•
Know what to expect
– Determine from your client what forms of relevant ESI
should be there – e.g., emails and other
communications, documents drafted or exchanged, data,
programs, applications, etc.
– Remember, ESI lives in many places other than central
servers – PDAs, cell phones, home computers, external
hard drives, flash drives, etc.
•
Initial Case Management Conferences – these are great
opportunities to discuss any potentially relevant ESI to the
case
•
Newest form of requested ESI  SOCIAL MEDIA
9
Determine What’s There (Requesting Party)
•
Take full advantage of the rules governing initial disclosures
•
Initial obligations require disclosure of discoverable ESI
– FRCP 16(b) -- requires disclosure of a party’s inform
technology architecture and environment at the very beginning
of the lawsuit
– FRCP 26(f) – ESI disclosure and discovery now on list of topics
discussed at initial planning conference
•
Judicial attitudes are changing. Perfunctory discussions are
insufficient
•
Be prepared and aggressive
10
Illinois Best Practices
•
Illinois circuit judges can pursue case management
conferences under Illinois Supreme Court Rule 218.
•
Such conferences can produce orders that address
“disclosures or discovery” of ESI and that incorporate any
agreements the parties reach for asserting claims of
privilege or of protection of trial-preparation material after
production.
11
Determine if the Sources of ESI are Reasonably
Accessible (Responding Party)
•
Reasonably accessible ESI follows standard discovery rules,
with the responding party bearing costs of production.
– And yes, Social Media ESI is reasonably accessible in
most cases!
•
Not reasonably accessible ESI is not typically searched or
produced, but may need to be preserved.
•
Burden is on responding party to show that sources of ESI
are not reasonably accessible because of undue burden or
cost.
•
Requesting party can still discover inaccessible sources for
“good cause,” although costs may be shifted.
12
What is “Not Reasonably Accessible”?
•
Court rejected contention that production of emails of officers and
employees other than plaintiff (kept in LotusNotes rather than less
accessible backup media) would constitute an undue burden and expense,
in light of the Court’s ability to apportion costs between parties. Court
compared $20,000 cost of producing plaintiff’s email to those in Zubulake,
where 5 sample disks alone cost $19,000. Parkdale America, LLC v.v
Travelers Cas. And Sur. Co.
•
3 to 4 year-old back up tapes stored in the City Attorney’s Office were “not
currently accessible” since defendant did not have the hardware needed to
access them. The cost of restoration outweighed the possible yield of
relevant and probative information. Palgut v. City of Colorado Springs
•
HYPOTHETICAL – What happens if your client’s phone does not retain
text messages?
13
Preservation & Collection
14
Obligation to Preserve ESI (Federal)
•
The identification of ESI as “not reasonably accessible” does
not relieve a party of its common law or statutory duties to
preserve potentially discoverable evidence. Advisory
Committee Notes, FRCP 26(b)(2)(B).
•
“A party to litigation has an obligation to preserve relevant
evidence. While a litigant is under no duty to keep or retain
every document in its possession ... it is under a duty to
preserve what it knows, or reasonably should know, is
relevant in the action, is reasonably calculated to lead to the
discovery of admissible evidence, is reasonably likely to be
requested during discovery and/or is the subject of a
pending discovery request.” Healthcare Advocates, Inc. v.
Harding, Earley, Follmer & Frailey
15
Obligation to Preserve ESI (Federal)
•
Scope of what must be preserved is often significantly
beyond what might be retrieved, reviewed and/or produced
in discovery. Oklahoma, ex rel. Edmonson
•
Although Advisory Committee Notes provide for cost-shifting
with respect to the production of not reasonably accessible
ESI, no provision exists for shifting costs of preserving such
ESI
16
Obligation to Preserve ESI (Illinois)
•
General rule is that there is no obligation to preserve evidence absent some
duty to do so. See Jones v. O’Brien Tire & Battery Service Center, Inc., 374
Ill.App.3d 918, 924 (5th Dist. 2007)
•
Two-prong test as to whether duty exists (see Dardeen v. Kuehling, 213
Ill.2d 329 (2004); Boyd v. Travelers Ins. Co., 166 Ill.2d 188 (1995):
– Relationship Prong: Determine whether duty to preserve evidence
arises by agreement, contract, statute, special circumstances, or
voluntary assumption
– Foreseeability Prong: If so, determine whether duty extends to
evidence at issue – i.e., whether a reasonable person should have
foreseen that the evidence was material to potential litigation.
•
When a party fails to preserve evidence despite a duty to do so, a cause of
action exists for spoliation of evidence. This is not an independent tort, but
rather a type of negligence. Stoner v. Wal-Mart Stores, Inc., 2008 WL
3876077 (C.D. Ill. 2008)
•
This cause of action requires the existence of a duty, a breach of duty,
causation, and damages. Dardeen, 213 Ill.2d at 336.
17
Obligation to Preserve ESI (Illinois)
•
Scope of the Duty: The duty arises during litigation, but also
extends to that period before the litigation when a party reasonably
should know that the evidence may be relevant to anticipated
litigation. The duty remains as long as the party in possession of
the evidence should reasonably foresee that further evidence,
material to a potential civil action, could be derived from the
physical evidence.
•
Breach of Duty: The evidence has been lost, altered, or destroyed.
•
Causation: To plead causation, a plaintiff must allege sufficient
facts to support a claim that the loss or destruction of the evidence
caused the plaintiff to be unable to prove an underlying lawsuit.
•
Damages: A threat of harm not yet realized is not actionable. The
plaintiff must allege that a defendant’s loss or destruction of the
evidence caused the plaintiff to be unable to prove an otherwise
valid cause of action.
18
When Does the Duty to Preserve Arise?
•
As soon as a potential claim is identified, a litigant is under a
duty to preserve evidence which it knows or reasonably
should know is relevant to the action.
•
However, a party’s duty to preserve certain evidence “must
be based on more than an equivocal statement of
discontent.” Cache La Poudre Feeds, LLC v. Land O’Lakes,
Inc.
•
Propounding of demand letter held to be point in time when
litigation should have become “reasonably anticipated.”
Consolidated Aluminum Corp. v. Alcoa, Inc.
•
Court held that duty to preserve was triggered by
conversations with a supervisor one year prior to filing of
EEOC complaint. Broccoli v. Echostar Communications
19
When Does the Duty to Preserve Arise?
•
Given existing infringement litigation against music-downloading
service, investor in service should have known litigation against it
was probable, and duty to preserve arose upon receipt of warning
from copyright holder that recording industry would be targeting
service's investors. In re Napster, Inc. Copyright Litig.
•
Defendant found to be on notice of potential lawsuit when counsel
for plaintiff wrote letter stating it had been retained to investigate
personal injury that had some connection with defendant’s store.
Stallings v. Bil-Jax, Inc.
•
Mere request that a party preserve evidence found insufficient to
impose a duty to do so absent some further special relationship.
Andersen v. Mack Trucks, Inc., 341 Ill.App.3d 212, 217 (2nd Dist.
2003).
20
Preservation Notices
•
Zubulake v. UBS Warburg, 220 F.R.D. 212 (S.D.N.Y. 2003)
– Duty to preserve ESI commences when litigation is
“reasonably anticipated”
•
So, why bother to send a preservation notice?
– Zubulake not binding precedent
– “reasonably anticipated” is subjective
– opportunity to identify important ESI
– first step in creating a record
•
Other factors to consider
– Nature of the dispute
– Polarizing effect/impact on pre-dispute resolution
21
Litigation Hold Notices
•
Automatic or manual?
•
Written notice to each person reasonably likely to have information or
documents related to dispute
– Description of reason for preservation/collection
– Time period covered; is it on-going?
– Definition of types of documents to include (email, folders, shared
drives, hard copies, etc.)
– Description of scope of documents covered
– Include “how to” instructions
– “Attorney-client privilege” designation
– Statement that compliance is a corporate and individual obligation
– Admonition regarding consequences of failing to abide by hold directive
•
Follow-up and affirmations required
•
Reminders are necessary
•
Plan for computers of departing employees
22
Don’t Take “No” For An Answer
What if the other side claims “it’s gone?”
•
Dig deeper – “deleted” data often is recoverable
– How? Take IT deposition
•
Seek order permitting more invasive discovery measures
– e.g., inspection/imaging of servers, hard drives, etc.
•
Move for sanctions
– Not all loss is sanctionable (FRCP 37(f) Safe Harbor)
23
Rule 37(e) “Safe Harbor”
•
“Absent exceptional circumstances, a court may not impose
sanctions under these rules on a party for failing to provide
electronically stored information lost as a result of the routine,
good-faith operation of an electronic information system.”
•
To take advantage of the good faith exception, a party needs to act
affirmatively to prevent the system from destroying or altering
information, even if such destruction would occur in the regular
course of business.
– Where a party fails to suspend it at any time, courts have found
that the party cannot take advantage of Rule 37(e)'s good faith
exception. Doe v. Norwalk Community College
– Where defendant used a wiping tool before handing computers
over to bankruptcy trustee, Rule 37(e) did not apply. United
States v. Krause
24
Rule 37(e) “Safe Harbor” (cont’d)
•
Rule 37(e) does not exempt a party who fails to stop the
operation of a system that is obliterating information that
may be discoverable in litigation. Disability Rights Council of
Greater Washington v. Washington Metropolitan Transit
Authority
•
Under 5th Circuit law of “bad faith,” record did not provide a
basis for severe sanction as an adverse-inference instruction
because there is no showing that relevant electronic
communications were destroyed or that the destruction
occurred in bad faith. Escobar v. City of Houston
25
Illinois Civil or Evidentiary Sanctions
•
Supreme Court Rule 219(c) permits a trial court to impose
sanctions, including dismissal of the cause of action, upon
any party who unreasonably refuses to comply with any
provisions of the discovery rules.
•
The decision to impose a particular sanction is within the
discretion of the trial court and, thus, only a clear abuse of
discretion justifies reversal.
•
Sanctions imposed in Illinois include:
– Dismissal with Prejudice or Default Judgment
– Exclusion of evidence
– Adverse inference instruction to the jury
26
Preserving and Producing ESI stored by third
parties
•
Many courts have recognized an obligation to preserve such data,
reasoning that third-party documents may be in a company's "control."
– Steele Software Sys. Corp. v. DataQuick, 237 F.R.D. 561 (D.Md. 2006)
– A user typically has control over their own social media content to the
extent he or she can still access it.
– Keir v. UnumProvident Corp., 2003 WL 21997747 (S.D.N.Y.) (Found
that defendant failed to communicate in a timely manner or meaningful
way regarding potential preservation obligations of its third-party
provider of e-mail and other computer services).
– In re Triton, 2002 WL 32114464 (E.D. Tex.) (Held that it would have
been prudent and within the spirit of the law for defendant to instruct its
outside directors to preserve and produce any documents in their
possession, custody or control).
– PML North America v. Hartford Underwriters Insurance, 2006 U.S. Dist.
LEXIS 94456 (E.D. Mich.) (Court granted plaintiff's motion to compel
and ordered production of a specifically identified hard drive, a thumbdrive and non-party employee's home laptop computer).
27
Preserving and Producing ESI stored by third
parties
•
Potential evidence must be in a party's "possession, custody, or
control" for any preservation duty to attach. See Phillips v. Netblue,
2007 WL 174459 (N.D. Cal.) ("One cannot keep what one does not
have.")
– Some courts "require production if the party has practical ability
to obtain the documents from another, irrespective of his legal
entitlement to the documents." See Prokosch v. Catalina
Lighting Inc., 193 F.R.D. 633, 636 (D. Minn. 2000) (quoting
United States v. Skeddle, 176 F.R.D. 258, 261 n.5 (N.D. Ohio
1997)).
– Other courts require parties to produce only those documents
they have a legal right to obtain. See, e.g., Chaveriat v.
Williams Pipe Line Co., 11 F.3d 1420, 1427 (7th Cir. 1993)
("But the fact that a party could obtain a document if it tried
hard enough ... does not mean that the document is in its
possession, custody, or control").
28
Production
29
Form of Production (Federal Rules)
•
Rule 34(a) allows the requesting party to specify the form(s)
in which ESI will be produced.
– Unless specified, responding party must produce ESI in
the form in which it is “ordinarily maintained” or a form
that is “reasonably usable.”
– However, cannot produce ESI in a form less useful or
searchable than the form in which it is normally
maintained.
•
Responding party need not produce in more than one form.
•
Consider reviewing or producing in Native File Format
•
Address form of production in FRCP 26(f) conference
30
Form of Production (Illinois Rules)
•
Supreme Court Rule 214 provides that a responding party
must include in its production response “all retrievable
information in computer storage in printed form.”
•
Committee Comment: Rule 214 requires “a party to include
in that party’s production response all responsive information
in computer storage in printed form. This change is intended
to prevent parties producing information from computer
storage on storage disks or in any other manner which tends
to frustrate the party requesting discovery from being able to
access the information produced.”
31
Form of Production Considerations
Native File Format
Fixed Image Format
Metadata rich
Metadata poor
Formulas in spreadsheets visible
Preserves original appearance
Cannot redact
Easy to redact
Quick and cheap
Upfront costs to TIFF
Hard to label
Easy to label
Resource intensive
Must preserve metadata?
Searchable
Searchable
Risk of alteration
Contents preserved
Limits on use
Unlimited use
32
In re Seroquel Products Liability Litig.
•
Failure to produce e-discovery in “any manageable
searchable form” found to be sanctionable.
•
Mere disclosure not enough: ESI must be readable,
searchable, complete (including metadata) and proper
quality assurance techniques employed.
•
“Particularly in complex litigation, there is a heightened need
for the parties to confer about the format of the electronic
discovery being produced.”
33
Other Production Issues
•
“Claw back” and “quick-peek” agreements allow parties to
produce relevant documents before privilege review is
conducted and assert claims of privilege afterwards
•
Committee notes to amended FRCP 26(f) indicate that when
memorialized in a court order, parties to these agreements
are deemed not to have waived the privilege as among
themselves
•
But these agreements may be undesirable or of limited
usefulness. Some courts have held that production of
privileged materials to an opposing party under such
agreements constitutes a waiver of the privilege as to third
parties. Hopson v. Mayor and City Council of Baltimore
34
Authentication and Admissibility of ESI
35
Presentation/Evidentiary Issues
•
“The paperless electronic record involves a difference in the
format of the record that presents more complicated
variations on the authentication problem than for paper
records.” In re Vee Vinhee
– Creditor sought to prove up debt after debtor defaulted,
but court refused to admit creditor’s electronic business
records into evidence because of a defective evidentiary
foundation
– Creditor’s records custodian could not testify in response
to questions about the nature and operation of the
computer system on which the records were maintained
•
Remember that traditional rules of evidence still apply
36
Lorraine v. Markel American Ins. Co.
•
After discovery, both parties moved for summary judgment to
enforce a private arbitrator’s award that damage to plaintiff’s yacht
was caused by lightning.
•
In denying both motions, the court held that emails attached to both
motions and offered as parol evidence were inadmissible due to
parties’ failure to lay the appropriate evidentiary foundation.
•
Magistrate Judge Grimm noted that: “[C]onsidering the significant
costs associated with the discovery of ESI, it makes little sense to
go to all the bother and expense to get electronic information only
to have it excluded from evidence or rejected from consideration
during summary judgment because the proponent cannot lay a
sufficient foundation to get it admitted.”
37
Illinois Rules of Evidence
•
Effective January 1, 2011, incorporate the current state of
the law of evidence in Illinois whenever the Illinois General
Assembly, Supreme Court or Appellate Court has clearly
spoken on a principle of evidentiary law.
•
The Rules also include certain “modernizations,” which the
court says address “noncontroversial developments in the
law of evidence as reflected in the Federal Rules of
Evidence.”
•
In this regard, the Illinois Rules have followed the lead of the
Federal Rules of Evidence and provide for a straightforward
means of authentication of ESI for purposes of admissibility.
38
Illinois Rules of Evidence (Cont’d)
•
Admissibility determined by the court.
•
Ill. R. Evid. 104(a) provides: “Questions of Admissibility Generally.
Preliminary questions concerning the qualification of a person to be
a witness, the existence of a privilege, or the admissibility of
evidence shall be determined by the court, subject to the provisions
of subdivision (b). In making its determination, the court is not
bound by the rules of evidence except those with respect to
privileges.”
•
Ill. R. Evid. 801 & 802 (Hearsay)
•
Rule 801 defines “hearsay” as “a statement, other than one made
by the declarant while testifying at the trial or hearing, offered in
evidence to prove the truth of the matter asserted.”
•
Rule 802 states that “Hearsay is not admissible except as provided
by these rules, by other rules prescribed by the Supreme Court, or
by statute as provided in Rule 101.”
39
Illinois Rules of Evidence (Cont’d)
Ill. R. Evid. 901 & 902 (Authentication)
•
Requirement of Authentication: The requirement of authentication or identification as
to a condition precedent to admissibility is satisfied by evidence sufficient to support a
finding that the matter in question is what its proponent claims. Ill. R. Evid. 901(a).
•
Methods of Authentication: Rule 901(b) offers a non-exhaustive list of illustrations of
legitimate methods of authentication. For example:
•
Testimony of Witness With Knowledge. Testimony that a matter is what it is claimed to
be. Ill. R. Evid. 901(b)(1).
•
Self Authentication: Rule 902 also lists several categories of documents where
“[e]xtrinsic evidence of authenticity as a condition precedent to admissibility is not
required...” These documents include: domestic public documents, foreign public
documents, certified copies of public records, official publications, newspapers and
periodicals, trade inscriptions, acknowledged documents, commercial paper and
related documents, and certified records of regularly conduced activity.
Ill. R. Evid. 201 (Judicial Notice)
•
Under Ill. R. Evid. 201, “[a] judicially noticed fact must be one not subject to reasonable
dispute in that it is either (1) generally known within the territorial jurisdiction of the trial
court or (2) capable of accurate and ready determination by resort to sources whose
accuracy cannot reasonably be questioned.”
40
ESI Authentication (Illinois Law)
•
To lay a proper foundation for a document, a party must
present evidence, direct or circumstantial, that shows that
the document is what it purports to be
– Under Supreme Court Rule 216 (b), a party may serve
on any other party a written request for admission of the
genuineness of any relevant documents described in the
request.
– Illinois courts authenticate writings based on
appearance, contents, and substance
41
ESI Authentication (Illinois Law)
•
People v. Downin, 357 Ill.App.3d 193 (3rd Dist. 2005) -- Discussed
how direct or circumstantial evidence can be used to authenticate
e-mails in various ways:
– Self-identification by the parties
– Ongoing exchange of e-mails by the parties
– Unique and personal nature of the e-mail
– Overt acts of parties in conjunction with an e-mail
– Direct or circumstantial evidence establishing author and date
of transmission
•
E-mails held to be inadmissible because there was neither direct
nor circumstantial evidence of their authenticity. CCP Limited
Partnership v. First Source Financial, Inc., 368 Ill.App.3d 476 (1st
Dist. 2006).
42
Authenticating Different Types of ESI
•
Print outs
•
Emails
•
Text Messages and Instant Messages
•
Voicemail and Digital Recordings
•
Chat Room & “Cut and Paste” Transcripts
•
Websites
•
Social Media – Facebook, MySpace (Photos, Video,
Postings)
43
Computer Print Outs
Illinois Case Illustrations
•
Computer print outs properly admitted: Anderson v. AlbertoCulver USA, Inc., 337 Ill. App. 3d 643, 273 Ill. Dec. 404, 421,
789 N.E.2d 304, 321 (1st Dist. 2003) (trial court properly
admitted computer generated flight planning documents in
wrongful death case; these were records directly generated
by a computer, which are generally admissible as
representing the tangible result of the computer's internal
operations, as opposed to printouts of computer stored
records, which constitute statements placed into the
computer by out-of-court declarants, which cannot be tested
by cross-examination and are therefore inadmissible absent
an exception to the hearsay rule)
44
Emails
•
Emails were admissible and properly authenticated. People v. Downin, 357 Ill. App. 3d
193 (3rd Dist. 2005) – Affirming a judgment convicting the defendant of aggravated
criminal sexual abuse of a 16-year-old girl, the court held that the trial court did not
abuse its discretion in admitting into evidence two printed versions of e-mails
purportedly sent by the defendant to the victim and which contained admissions of
guilt, despite claims that the e-mails were not sufficiently authenticated. The court
explained that in admitting such evidence the prosecution need only prove a rational
basis upon which the fact finder may conclude that the exhibit did in fact belong to the
defendant. The court further explained that an e-mail message may be authenticated
by direct or circumstantial evidence, that circumstantial evidence of authenticity
includes such factors as appearance, contents, and substance, and that prima facie
authorship of a message may include a showing that the writing contains knowledge of
a matter sufficiently obscure so as to be known to only a small group of individuals.
•
Emails found to be admissible. Where a medical resident claimed he was improperly
terminated from an anesthesiology residency program at a state university medical
school by its director, in Fenje v. Feld, 301 F. Supp. 2d 781 (N.D. Ill. 2003), aff'd on
other grounds, 398 F.3d 620, (7th Cir. 2005) (applying federal and Illinois law), the
court ruled that two e-mails submitted by the director which purported to be from the
resident to the anesthesiology department's keeper of records, one of which was
requested to be printed and provided to the director, were sufficiently authenticated so
as to be admissible. The court noted that the records keeper stated in her affidavit that
these were accurate copies of e-mails she received from the resident, that the printed
e-mails showed a source e-mail address that matched that shown on the resident's
letterhead that was included in other authenticated documents, and that the content of
the e-mails was consistent with other evidence. The court added that the records
keeper also adequately authenticated an e-mail communication she received and
replied to as between herself and another university employee.
45
Emails (Cont’d)
•
E-mails held to be inadmissible because there was neither direct nor circumstantial
evidence of their authenticity. CCP Limited Partnership v. First Source Financial, Inc.,
368 Ill. App. 3d 476 (1st Dist. 2006). The Court ruled that the party had not
authenticated certain e-mails between the bank and a corporation. A bank employee
swore in an affidavit: “The e-mails attached have been maintained in the ordinary
course of business in [the bank's] computer system, and I assisted in retrieving them
for use in this matter.” A partnership official similarly swore that the e-mails attached to
the partnership's motions for summary judgment were “maintained in the ordinary
course of business in [the partnership's] computer system.” Neither affiant said
anything about his participation in the correspondence or the occasion for receipt of the
e-mail. The court explained that without proper authentication no document is
admissible, that an affidavit may provide the authentication needed to make a
document admissible, and that to make documents admissible the proponent must
present evidence to demonstrate that the document is what its proponent claims it to
be.
•
Email not properly authenticated: In Complete Conference Coordinators, Inc. v. Kumon
North America, Inc., 394 Ill. App. 3d 105 (2d. Dist. 2009), the Second District held that
the mere fact that former employee produced in discovery certain printouts of e-mail
messages allegedly created or received by her was insufficient to authenticate the
messages. As such, the emails were deemed inadmissible in employer’s opposition to
former employee’s motion for summary judgment in employer's action against former
employee for intentional interference with a contractual relationship.
46
Text Messages
•
In People v. Chromik, No. 3–09–0686, 2011 WL 1346923 (3d. Dist. 2011), the Illinois
Appellate Court found that the trial court properly authenticated and admitted into
evidence a document which purported to be a transcription created by the principal that
recounted the messages as read to him by the victim.
•
The court noted that “All acknowledged that the transcription may not have evinced,
with 100% accuracy, the text messages sent from defendant to K.B. as some words
were changed via the word processor's spell-check feature. Nevertheless, the dates
and times contained on the document and attributed to text messages sent from
defendant to the victim mirrored those identified in the phone company records. K.B.
testified as to the content of the messages and defendant acknowledged the accuracy
of a number of the messages as transcribed by the principal.”
•
The court explained that “[t]he trial judge ensured that all knew the document was
exactly what it purported to be: a transcription of the victim's reading of the text
messages. The judge allowed both sides to argue over their interpretation of the
messages and allowed defendant to admit evidence indicating the spell-check program
on the word processor used to create the document likely changed the wording or
spelling of some messages.
•
While defendant attacks the credibility of the document's substance, bringing to light
the fact that it may not have perfectly reproduced every message he sent to K.B., this
does not change the fact that the trial court properly authenticated the document as
being nothing more than exactly what it purported to be. Defendant did not deny
sending even a single one of the purported text messages. We find no error.
47
Instant Messages
•
Instant messages properly authenticated and admitted: In People v.
Clevenstine, 891 N.Y.S.2d 511 (N.Y. App. Div. 2009), the
defendant was convicted of various sex crimes, perpetrated against
two teenage sisters. Id. at 513. Several witnesses testified as to
the contents and authenticity of instant messages exchanged
between defendant and one of the victims, which indicated
defendant and victim had engaged in sexual activity. Id. The
witnesses included: the victims; an investigator who retrieved the
communications from the hard drive of the victims’ computer; a
legal compliance officer for MySpace, the network through which
the instant messages were exchanged; and defendant’s wife, who
first discovered the communications. Id. at 514. The witnesses’
testimonies were deemed sufficient to authenticate the instant
message communications and, as such, the communications
constituted admissible evidence. Id.
48
Voicemails and Digital Recordings
•
Ill. R. Evid. 901(b)(5) “Voice identification” states that “[i]dentification of a
voice, whether heard firsthand or through mechanical or electronic
transmission or recording, by opinion based upon hearing the voice at any
time under circumstances connecting it with the alleged speaker. This rule
allows a witness to listen to a recording (whether a tape recording or digital
recording) as a way to authenticate a voicemail message as being the voice
of the person in question.
•
A voicemail message left on a cell phone, for example, is merely a type of
audio recording. Though you may be able to properly identify the voice, this
alone does not authenticate the message itself as an accurate recording of
what that person said. A litigant will need additional testimony (such as a
third party who overheard the conversation) to lay the proper foundation for
that.
•
When properly authenticated sound recordings are admissible if they
accurately portray the conversation or sounds. Such records are routinely
allowed into evidence. See, e.g., People v. Griffin, 375 Ill. App. 3d 564 (1st
Dist. 2007). These same standards are used when authenticating and
admitting voicemails or digital recordings.
49
Chat Rooms and “Cut and Paste” Documents
•
Transcript of Online Chat Inadmissible: The Illinois Court of Appeals found that the prosecution had
failed to establish a sufficient foundation for the admission of transcripts of on-line chat room
conversations captured using Power Tools software by an undercover police investigator posing as a
minor in an America Online (AOL) chat room. People v. Johnson, 376 Ill. App. 3d 175, 875 N.E.2d
1256 (Ill. App. Ct. 2007).
•
The defendant, convicted of indecent solicitation of a minor, argued that the trial court erred in
allowing the State to introduce the transcripts without an adequate foundation, noting that no AOL
representative testified to their accuracy. The Court of Appeals noted that “[i]n the case of computer
generated records, a proper foundation additionally requires a showing that: standard equipment was
used; the particular computer generates accurate records when used appropriately; the computer was
used appropriately; and the sources of the information, the method of recording utilized, and the time
of preparation indicate that the record is trustworthy and should be admitted into evidence.” 875
N.E.2d at 1259-60.
•
The content of a document also may be admitted through the testimony of a witness. For
example, a record from a police investigation may be admissible as a past recollection recorded if the
proper foundation is laid, showing, among other things, “‘that the facts in the report have been
recorded at the time of the occurrence or soon thereafter, and that the report is both truthful and
accurate.’”
•
Here, the State did nothing to establish a foundation for the admissibility of the chat room transcripts
as evidence: the accuracy of the transcripts was never addressed; the State offered no evidence of
the efficacy of AOL or Power Tools records; and it did not establish that the police investigator was a
competent operator of the systems used to compile the transcripts.
•
Accordingly, the Court concluded that the admission of the transcripts without an adequate foundation
was reversible error and ordered a new trial.
50
Social Media
•
Statements Made on Social Networking Site Admitted: Defendant's prideful statements
on social networking website, including statement that “Society labels me as an outlaw
and criminal,” were relevant in prosecution for the murder of two-year-old child to rebut
defense theory that made defendant's character a central issue and contended that
defendant's intent could only have been “reckless” and not criminal. Clark v. State, 915
N.E.2d 126 (Ind. 2009).
•
Messages on social media site were admitted in error: In Commonwealth v. Williams,
926 N.E.2d 1162 (Mass. 2010). Computer messages on social networking Internet site
were not authenticated, although foundational testimony established that the messages
were sent by someone with access to account of alleged writer of messages;
foundational testimony did not identify the person who actually sent the messages,
whether anyone other than alleged writer could communicate from the Web page, how
secure the Web page was, who could access it, and whether codes were needed for
access.
•
Social Media Profile Pages Improperly Authenticated: The Maryland Supreme Court
reversed the appellate court decision and ordered a new trial for defendant due to lack
of proper authentication for the printout of the MySpace page. Since the State only
identified the date of birth and the picture of the girlfriend with defendant appearing on
the site, someone other than the girlfriend could have created the profile and posted
the threat. Griffin v. State, 2011 Md. LEXIS 226 (Md. Apr. 28, 2011).
51
Social Media (Cont’d)
•
Photos on MySpace.com Admissible: The Ohio courts also dealt with the admissibility
of photographs posted on a social networking website and testimony about the creation
of the website page in State v. Gaskins, 2007 WL 2296454 (Ohio Ct. App. Aug. 13,
2007). To defend against a charge of unlawful sexual conduct with a minor, the
defendant sought to introduce evidence that the complainant held herself out to the
world as an eighteen-year-old on the website MySpace.com. Regarding the
photographs, the Court affirmed the trial court’s decision, which permitted the
introduction of photographs that were posted on the complainant’s MySpace.com
website page, noting that the photographs were properly authenticated. The defendant
had elicited testimony from a witness that the photographs accurately depicted what
the complainant looked like prior to the incident in June 2005 and were relevant to how
the complaint looked on the date of the incident. To evaluate the trial court’s decision to
prohibit questioning regarding the MySpace.com website page, the Court of Appeals
mulled over two important facts the appellant-defendant had failed to prove. First, the
defendant had offered no evidence that he ever saw the complainant’s MySpace.com
page. Second, defendant did not establish that the website was created before the
date of the assault. Thus, in holding that the trial court had properly prohibited
questioning regarding the website, the Court explained that whether the complainant
represented herself as eighteen years old after the incident occurred was not relevant
since the charge centered on the complainant’s age at the time of the incident.
•
Facebook pictures of a Mother drinking and socializing were properly admitted into
evidence according to the Court of Appeals of Kentucky in an appeal from a divorce
and custody order. LaLonde v. LaLonde, No. 2009-CA-002279-MR, 2011 WL 832465
(Ky. Ct. App. Feb. 25, 2011). The Court held that the photos posted on the social
networking site were properly authenticated by testimony of the Mother and thus,
properly admitted into evidence.
52
Free Resources on ESI
•
Appendix A to The Sedona Conference© Commentary on
ESI Evidence & Admissibility (March 2008) contains an
excellent practical guide for working with ESI so that it
ultimately will be admissible. The guide includes a checklist
of the potential methods of authentication under FRE 901
and 902 that can be used for various types of ESI. The
Commentary is available for download at
http://www.thesedonaconference.org/content/miscFiles/publi
cations_html?grp=wgs110
•
E-Discovery Blog, including case summary database:
http://www.ediscoverylaw.com/
53
Questions?
Dara Chevlin Tarkowski
Litigation Associate & National E-Discovery Practice
Katten Muchin Rosenman LLP
54