Tag:Admissibility

1
In re Interest of B.H., 2009 WL 2195930 (N.J. Super. Ct. App. Div. July 24, 2009)
2
Gray v. State, 2009 WL 3645055 (Tex. App. Nov. 4, 2009) (Unpublished)
3
Saadi v. Maroun, 2009 WL 3736121 (M.D. Fla. Nov. 4, 2009)
4
U-Haul Int?l, Inc. v. Lumbermens Mut. Cas. Co., 576 F.3d 1040 (9th Cir. 2009)
5
State v. Ross, 2009 WL 118958 (Ohio Ct. App. Jan. 20, 2009)
6
Loyal v. State, 2009 WL 2884147 (Ga. Ct. App. Sept. 10, 2009)
7
Scheuplein v. City of West Covina, 2009 WL 3087343 (Cal. Ct. App. Sept. 29, 2009)
8
People v. Vallejo, 2009 WL 3925232 (Cal. Ct. App. Nov. 19, 2009)(Unpublished)
9
People v. Buckner, 228 P.3d 245 (Colo. App. 2009)
10
McClendon v. Challenge Fin. Investors Corp., 2009 WL 589245 (N.D. Ohio Mar. 9, 2009)

In re Interest of B.H., 2009 WL 2195930 (N.J. Super. Ct. App. Div. July 24, 2009)

Key Insight: Court found edited copy of surveillance tape was properly authenticated and admitted where, pursuant to the N.J. Best Evidence Rule, duplicates are admissible to the same extent as the original unless a question is raised as to the authenticity of the original, which defendant did not do, and where the testimony of the patrolman who viewed the original surveillance tape established that the copy was an accurate duplication of the pertinent parts of the original tape, and where there was no showing of unfairness in the production of the edited tape rather than the original

Nature of Case: Criminal / Robbery

Electronic Data Involved: Copy of surveillance tape

Gray v. State, 2009 WL 3645055 (Tex. App. Nov. 4, 2009) (Unpublished)

Key Insight: Emails were properly authenticated by defendant?s acknowledgment that he sent the emails at issue during a recorded interview with detectives, by the victim?s testimony that she was familiar with defendant?s email address and signature and by defendant?s own offering of emails between himself and the victim which contained identical email addresses to those emails challenged on appeal

Nature of Case: Criminal

Electronic Data Involved: Emails

Saadi v. Maroun, 2009 WL 3736121 (M.D. Fla. Nov. 4, 2009)

Key Insight: Where plaintiff offered printouts of defamatory statements from website for the limited purpose of proving the statements appeared on the worldwide web on the days that plaintiff personally saw the statements and printed them from the computer, testimony of plaintiff of his personal knowledge of the content was sufficient to authenticate the documents

Nature of Case: Defamation

Electronic Data Involved: Printout of website

U-Haul Int?l, Inc. v. Lumbermens Mut. Cas. Co., 576 F.3d 1040 (9th Cir. 2009)

Key Insight: Court found ?computer-generated? exhibits summarizing loss adjustment expense payments ?fit squarely within the business records exception to hearsay? and were properly authenticated by the testimony of an employee who, although not responsible for actually inputting each piece of data that was summarized in the exhibit, was sufficiently familiar with the record system that his ?description of the process used to create the summaries was sufficient to authenticate the evidence?

Nature of Case: Breach of insurance contract

Electronic Data Involved: Computer-generated summaries

State v. Ross, 2009 WL 118958 (Ohio Ct. App. Jan. 20, 2009)

Key Insight: Where transcript of online chat was erased from law enforcement hard drive following ?computer problems? but where there was no evidence of bad faith, appellate court affirmed denial of defendant?s motion for production of the hard drive and reasoned that State could authenticate the printed transcripts by offering testimony from personal knowledge that the document was what it was claimed to be pursuant to ER 901(B)(1) or through the presentation of ?evidence describing a process or system used to produce a result and showing that the process or system produces an accurate result? pursuant to ER 901(B)(9)

Nature of Case: Attemtped unlawful sexual conduct with a minor

Electronic Data Involved: Hard drive, online chat transcripts

Loyal v. State, 2009 WL 2884147 (Ga. Ct. App. Sept. 10, 2009)

Key Insight: Vice President?s testimony that electronic security log was kept in regular course of business and that data was entered into the log contemporaneously with the events themselves was sufficient to establish a foundation for the admission of the log as a business record where the exception does not require that the foundation be laid by the custodian of records, but only that ?the record offered to prove a transaction be made in the regular course of business and that it is the regular course of business to make the record at the time of the act or transaction?; a witness?s lack of personal knowledge regarding how the records were created ?merely affects the weight given to the evidence?

Nature of Case: Criminal/theft

Electronic Data Involved: Security log indicating when warehouse was locked and unlocked, and the PIN used to access the facility

Scheuplein v. City of West Covina, 2009 WL 3087343 (Cal. Ct. App. Sept. 29, 2009)

Key Insight: Where a forensic examiner appointed by the discovery referee submitted a declaration that the emails admitted into evidence were retrieved from plaintiff?s computer and that the printouts were accurate representations of the retrieved messages, and where the emails contained information only the plaintiff would know and the trial court found that ?the emails ?were, at least in part, authenticated by the plaintiff himself?, the appellate court found that there was sufficient evidence to support the trial court?s finding that the emails were genuine

Nature of Case: Violations of Political Reform Act

Electronic Data Involved: Emails

People v. Vallejo, 2009 WL 3925232 (Cal. Ct. App. Nov. 19, 2009)(Unpublished)

Key Insight: Court found no abuse of discretion for admitting table summarizing defendant?s sales activities for the relevant time period where the corporate investigator of defendant?s suspected theft prior to his prosecution testified that the report was generated by a particular software in the ordinary course of business and where there was the ?logical inference? based on certain facts that the report was prepared ?at or near? the time of the events reported therein as is required by California Evid. Code section 1271 to authenticate a document as a business record

Nature of Case: Grand theft from employer

Electronic Data Involved: Report of defendant’s sales activities

People v. Buckner, 228 P.3d 245 (Colo. App. 2009)

Key Insight: Court held admission of defendant?s cell phone was not error and did not constitute impermissible hearsay where the prosecution sought to show that an undercover officer?s number showed up on defendant?s phone, where the phone was authenticated by the officer?s testimony, and where the telephone was not a ?person? or ?declarant? making ?a communicative ?statement? within the meaning of the relevant hearsay rule; court rejected argument that admission of phone was error because it contained other phone numbers, texts, etc. where defendant failed to show that he was prejudiced and failed to identify any particular message, etc. that the jury would have obtained from the phone

Nature of Case: Criminal

Electronic Data Involved: Cellular phone

McClendon v. Challenge Fin. Investors Corp., 2009 WL 589245 (N.D. Ohio Mar. 9, 2009)

Key Insight: Revenue report from database properly considered as business record under ER 803(6) where report was based on data entered and preserved in database in the regular course of business, where the database was regularly maintained and updated by the company?s accountants, where the accountants had personal knowledge of the information entered into the database, and where the foundation for its admission was provided by a ?qualified witness? familiar with the record-keeping procedures of the database

Nature of Case: Class action arising from alleged violations of Ohio Mortgage Act and common law violations of fiduciary duty

Electronic Data Involved: Database report

Copyright © 2025, K&L Gates LLP. All Rights Reserved.