Tag:Admissibility

1
State v. Ross, 2009 WL 118958 (Ohio Ct. App. Jan. 20, 2009)
2
Loyal v. State, 2009 WL 2884147 (Ga. Ct. App. Sept. 10, 2009)
3
Scheuplein v. City of West Covina, 2009 WL 3087343 (Cal. Ct. App. Sept. 29, 2009)
4
People v. Vallejo, 2009 WL 3925232 (Cal. Ct. App. Nov. 19, 2009)(Unpublished)
5
People v. Buckner, 228 P.3d 245 (Colo. App. 2009)
6
McClendon v. Challenge Fin. Investors Corp., 2009 WL 589245 (N.D. Ohio Mar. 9, 2009)
7
People v. Clevenstine, 891 N.Y.S.2d 511 (N.Y. App. Div. 2009)
8
Golden v. State, 2009 WL 3153262 (Ark. App. Ct. Sept. 30, 2009)
9
Vagenos v. LDG Fin. Servs., LLC, No. 09-cv-02672 (E.D.N.Y. Dec. 31, 2009)
10
Llamas v. State, 270 S.W. 3d. 274 (Tex. App. 2008)

State v. Ross, 2009 WL 118958 (Ohio Ct. App. Jan. 20, 2009)

Key Insight: Where transcript of online chat was erased from law enforcement hard drive following ?computer problems? but where there was no evidence of bad faith, appellate court affirmed denial of defendant?s motion for production of the hard drive and reasoned that State could authenticate the printed transcripts by offering testimony from personal knowledge that the document was what it was claimed to be pursuant to ER 901(B)(1) or through the presentation of ?evidence describing a process or system used to produce a result and showing that the process or system produces an accurate result? pursuant to ER 901(B)(9)

Nature of Case: Attemtped unlawful sexual conduct with a minor

Electronic Data Involved: Hard drive, online chat transcripts

Loyal v. State, 2009 WL 2884147 (Ga. Ct. App. Sept. 10, 2009)

Key Insight: Vice President?s testimony that electronic security log was kept in regular course of business and that data was entered into the log contemporaneously with the events themselves was sufficient to establish a foundation for the admission of the log as a business record where the exception does not require that the foundation be laid by the custodian of records, but only that ?the record offered to prove a transaction be made in the regular course of business and that it is the regular course of business to make the record at the time of the act or transaction?; a witness?s lack of personal knowledge regarding how the records were created ?merely affects the weight given to the evidence?

Nature of Case: Criminal/theft

Electronic Data Involved: Security log indicating when warehouse was locked and unlocked, and the PIN used to access the facility

Scheuplein v. City of West Covina, 2009 WL 3087343 (Cal. Ct. App. Sept. 29, 2009)

Key Insight: Where a forensic examiner appointed by the discovery referee submitted a declaration that the emails admitted into evidence were retrieved from plaintiff?s computer and that the printouts were accurate representations of the retrieved messages, and where the emails contained information only the plaintiff would know and the trial court found that ?the emails ?were, at least in part, authenticated by the plaintiff himself?, the appellate court found that there was sufficient evidence to support the trial court?s finding that the emails were genuine

Nature of Case: Violations of Political Reform Act

Electronic Data Involved: Emails

People v. Vallejo, 2009 WL 3925232 (Cal. Ct. App. Nov. 19, 2009)(Unpublished)

Key Insight: Court found no abuse of discretion for admitting table summarizing defendant?s sales activities for the relevant time period where the corporate investigator of defendant?s suspected theft prior to his prosecution testified that the report was generated by a particular software in the ordinary course of business and where there was the ?logical inference? based on certain facts that the report was prepared ?at or near? the time of the events reported therein as is required by California Evid. Code section 1271 to authenticate a document as a business record

Nature of Case: Grand theft from employer

Electronic Data Involved: Report of defendant’s sales activities

People v. Buckner, 228 P.3d 245 (Colo. App. 2009)

Key Insight: Court held admission of defendant?s cell phone was not error and did not constitute impermissible hearsay where the prosecution sought to show that an undercover officer?s number showed up on defendant?s phone, where the phone was authenticated by the officer?s testimony, and where the telephone was not a ?person? or ?declarant? making ?a communicative ?statement? within the meaning of the relevant hearsay rule; court rejected argument that admission of phone was error because it contained other phone numbers, texts, etc. where defendant failed to show that he was prejudiced and failed to identify any particular message, etc. that the jury would have obtained from the phone

Nature of Case: Criminal

Electronic Data Involved: Cellular phone

McClendon v. Challenge Fin. Investors Corp., 2009 WL 589245 (N.D. Ohio Mar. 9, 2009)

Key Insight: Revenue report from database properly considered as business record under ER 803(6) where report was based on data entered and preserved in database in the regular course of business, where the database was regularly maintained and updated by the company?s accountants, where the accountants had personal knowledge of the information entered into the database, and where the foundation for its admission was provided by a ?qualified witness? familiar with the record-keeping procedures of the database

Nature of Case: Class action arising from alleged violations of Ohio Mortgage Act and common law violations of fiduciary duty

Electronic Data Involved: Database report

People v. Clevenstine, 891 N.Y.S.2d 511 (N.Y. App. Div. 2009)

Key Insight: Stating that ?authenticity is established by proof that the offered evidence is genuine and that there has been no tampering with it,? and that ?the foundation necessary to establish these elements may differ according to the evidence,? court found computer disk containing instant messages was properly authenticated and admitted into evidence where ?both victims testified they had engaged in instant messaging with defendant,? where an investigator testified that he had retrieved the messages from defendant?s computer, where MySpace ?explained the messages?had been exchanged by users of the accounts created by the defendant and the victims,? and where his wife recalled seeing such conversations on defendant?s computer

Nature of Case: Criminal

Electronic Data Involved: Disk containing instant messages

Golden v. State, 2009 WL 3153262 (Ark. App. Ct. Sept. 30, 2009)

Key Insight: Despite testimony that the methods utilized to copy surveillance tape could reduce the image?s fine detail and the State?s failure to comply with a court order to produce the original of the surveillance tape because it had been lost, the trial court did not err in failing to grant defendant a new trial where a duplicate tape is admissible to the same extent as the original and where there was no evidence of bad faith in the loss of the tape; in so deciding, court also cited testimony that defendant did not objet

Nature of Case: Criminal

Electronic Data Involved: Copy of original surveillance tape

Vagenos v. LDG Fin. Servs., LLC, No. 09-cv-02672 (E.D.N.Y. Dec. 31, 2009)

Key Insight: Where plaintiff destroyed the original recording of an automated telephone message that was the subject of the litigation but sought to offer an alleged duplicate recording, court denied defendant?s motion to preclude such an offering where defendant failed to establish the requisite ?bad faith? necessary under Fed. R. Evid. 1004(1) and because the evidence was vital to plaintiff?s case but ordered an adverse inference instruction allowing the jury to infer that ?the destroyed portion of the message contained information harmful to plaintiff?s case? where plaintiff and plaintiff?s counsel (who did not instruct plaintiff of his duty to preserve and was responsible for creating the duplicate recording) failed to uphold their duty to preserve evidence in anticipation of litigation

Nature of Case: Violation of Fair Debt Collection Practices Act

Electronic Data Involved: Recording of automated telephone message

Llamas v. State, 270 S.W. 3d. 274 (Tex. App. 2008)

Key Insight: Appellate court found no abuse of discretion in trial court?s decision to admit surveillance footage of armed robbery into record after State provided testimony regarding chain of custody and where officer in charge of transferring data to DVD testified DVD contained exact replica of the original footage

Nature of Case: Capital murder

Electronic Data Involved: Surveillance footage

Copyright © 2025, K&L Gates LLP. All Rights Reserved.