Tag:Admissibility

1
State v. Melendez, 291 Conn. 693, 970 A.2d 64 (2009)
2
King v. State, 908 N.E.2d 673 (Ind. Ct. App. 2009)
3
Midkiff v. Commonwealth, 2009 WL 1851009 (Va. Ct. App. June 30, 2009)
4
Thompson v. State, 210 P.3d 1233 (Alaska Ct. App. 2009)
5
Richmond v. Coastal Bend Coll. Dist., 2009 WL 1940034 (S.D. Tex. July 2, 2009)
6
People v. Roberts, 2009 WL 3380019 (N.Y. App. Div. Oct. 22, 2009)
7
In re Interest of B.H., 2009 WL 2195930 (N.J. Super. Ct. App. Div. July 24, 2009)
8
Gray v. State, 2009 WL 3645055 (Tex. App. Nov. 4, 2009) (Unpublished)
9
Saadi v. Maroun, 2009 WL 3736121 (M.D. Fla. Nov. 4, 2009)
10
U-Haul Int?l, Inc. v. Lumbermens Mut. Cas. Co., 576 F.3d 1040 (9th Cir. 2009)

State v. Melendez, 291 Conn. 693, 970 A.2d 64 (2009)

Key Insight: Having previously established a standard for the authentication of computer generated evidence in State v. Swinton, 268 Conn. 781,847 A.2d 921 (2004), court highlighted distinction between ?technologies that may be characterized as merely presenting evidence and those that are more accurately described as creating evidence? and held that unmodified surveillance footage did not constitute computer generated evidence for purposes of Swinton; testimony of camera operator that the footage presented to the court was the same footage he observed when the images were originally captured was sufficient to authenticate the unmodified video; court?s admission of modified video footage was harmless error

Nature of Case: Sale of narcotics

Electronic Data Involved: Surveillance footage

King v. State, 908 N.E.2d 673 (Ind. Ct. App. 2009)

Key Insight: Trial court abused its discretion in admitting evidence obtained from Yahoo! linking defendant to the relevant account and screen name where Yahoo! stated it did not verify the personal information provided by its users and thus ?the source of the information or the method or circumstances of preparation?indicate[d] a lack of trustworthiness? such that admission under the business records exception was error

Midkiff v. Commonwealth, 2009 WL 1851009 (Va. Ct. App. June 30, 2009)

Key Insight: Trial court did not abuse its discretion in admitting reproductions of images found on appellant?s computer at trial where the Commonwealth presented testimony from the forensic scientist and investigator responsible for making the reproductions explaining the process of reproducing the images and confirming that the reproductions accurately represented the images on defendant?s hard drive, and where defendant admitted membership in relevant websites and storing child pornography on his computer; in Virginia, the best evidence rule is limited to writings and was not applicable in this case

Nature of Case: Possession of child pornography

Electronic Data Involved: Reproductions of images on defendant’s hard drive

Thompson v. State, 210 P.3d 1233 (Alaska Ct. App. 2009)

Key Insight: Appellate court held audio tapes were properly authenticated and admitted into evidence and that trial court did not abuse its discretion upon finding that ?the State presented ample evidence to support the conclusion that the two recordings accurately depicted the two conversations they purported to reproduce? including testimony from victim?s mother who actually taped the conversations and the State Trooper who provided the equipment and instructions; court declined to adopt nine part traditional test for authentication and noted the ?modern approach,? i.e., ?[whether[ the proponent [of the evidence has] presented sufficient evidence to support a rational finding [that] the tape recording is authentic?

Nature of Case: Second degree sexual abuse of a minor

Electronic Data Involved: Audio tapes

Richmond v. Coastal Bend Coll. Dist., 2009 WL 1940034 (S.D. Tex. July 2, 2009)

Key Insight: Court granted defendants? motion for protective order preventing the production of emails in sealed court file where plaintiffs failed to establish an exception to the Public Information Act requiring their disclosure, where plaintiffs failed to establish defendants? waiver of privilege, and where plaintiffs failed to establish the applicability of the crime fraud exception; court granted plaintiffs? motion to compel certain information, including personal emails, and ordered defendants to submit affidavits indicating their lack of personal accounts, if appropriate, and for defendants to produce emails ?of a personal nature to the court under seal? for a determination of relevance

Nature of Case: Employment discrimination

Electronic Data Involved: Emails

People v. Roberts, 2009 WL 3380019 (N.Y. App. Div. Oct. 22, 2009)

Key Insight: Where, based on chain of custody testimony, the trial court admitted a videotape discovered by defendant?s roommate and given to the police, but where there was no testimony concerning the making of the videotape or where it was kept or who had access to it during the nearly three year period from the time of its making to its discovery, and where the appellate court acknowledged that ?because films are so easily altered, there is a very real danger that deceptive tapes, inadequately authenticated, could contaminate the trial process,? appellate court found admission of the tape was in error and that the error was not harmless and ordered a new trial

Nature of Case: Sex abuse

Electronic Data Involved: Videotape

In re Interest of B.H., 2009 WL 2195930 (N.J. Super. Ct. App. Div. July 24, 2009)

Key Insight: Court found edited copy of surveillance tape was properly authenticated and admitted where, pursuant to the N.J. Best Evidence Rule, duplicates are admissible to the same extent as the original unless a question is raised as to the authenticity of the original, which defendant did not do, and where the testimony of the patrolman who viewed the original surveillance tape established that the copy was an accurate duplication of the pertinent parts of the original tape, and where there was no showing of unfairness in the production of the edited tape rather than the original

Nature of Case: Criminal / Robbery

Electronic Data Involved: Copy of surveillance tape

Gray v. State, 2009 WL 3645055 (Tex. App. Nov. 4, 2009) (Unpublished)

Key Insight: Emails were properly authenticated by defendant?s acknowledgment that he sent the emails at issue during a recorded interview with detectives, by the victim?s testimony that she was familiar with defendant?s email address and signature and by defendant?s own offering of emails between himself and the victim which contained identical email addresses to those emails challenged on appeal

Nature of Case: Criminal

Electronic Data Involved: Emails

Saadi v. Maroun, 2009 WL 3736121 (M.D. Fla. Nov. 4, 2009)

Key Insight: Where plaintiff offered printouts of defamatory statements from website for the limited purpose of proving the statements appeared on the worldwide web on the days that plaintiff personally saw the statements and printed them from the computer, testimony of plaintiff of his personal knowledge of the content was sufficient to authenticate the documents

Nature of Case: Defamation

Electronic Data Involved: Printout of website

U-Haul Int?l, Inc. v. Lumbermens Mut. Cas. Co., 576 F.3d 1040 (9th Cir. 2009)

Key Insight: Court found ?computer-generated? exhibits summarizing loss adjustment expense payments ?fit squarely within the business records exception to hearsay? and were properly authenticated by the testimony of an employee who, although not responsible for actually inputting each piece of data that was summarized in the exhibit, was sufficiently familiar with the record system that his ?description of the process used to create the summaries was sufficient to authenticate the evidence?

Nature of Case: Breach of insurance contract

Electronic Data Involved: Computer-generated summaries

Copyright © 2022, K&L Gates LLP. All Rights Reserved.