Tag:Admissibility

1
Butler v. State of Texas, —S.W.3d—, 2015 WL 1816933 (Tex. Crim. App. Apr. 22, 2015)
2
United States v. Shah, No. 5:13-CR-328-FL, 2015 WL 3605077 (E.D.N.C. June 5, 2015)
3
United States v. Lizarraga-Tirado, —F.3d—, 2015 WL 3772772 (9th Cir. June 18, 2015)
4
Donley v Donley, 2015 Ark. App. 496 (Ark. Ct. App. Sept. 23, 2015)
5
Commonwealth v. Gelfgatt, 11 N.E.3d 605 (Mass. 2014)
6
Clauss Constr. v. UChicago Argonne, LLC, No. 13 C 5479, 2014 WL 5390665 (N.D. Ill. Oct. 20, 2014)
7
People v. Chabcery, No. ST-14-CR-0000073, 2014 WL 5396166 (V.I. Super. Oct. 22, 2014)
8
Culp v. Alabama, CR-13-1039, 2014 WL 6608543 (Ala. Crim. App Nov.21, 2014)
9
Commonwealth v. Foster F., No. 13-P-1427, 2014 WL 6909045 (Mass. App. Ct. Dec. 10, 2014)
10
State v. Francis, 455 S.W.3d 56 (Mo. Ct. App. 2014)

Butler v. State of Texas, —S.W.3d—, 2015 WL 1816933 (Tex. Crim. App. Apr. 22, 2015)

Key Insight: Highest criminal court in Texas reversed the judgment of the court of appeals that had overturned defendant?s conviction upon concluding that the trial court ?had acted within its discretion? in concluding that the state met its threshold burden of authentication sufficient to admit defendant?s text messages to the victim where authentication can be satisfied by direct or circumstantial evidence and where the victim testified that she knew the messages were from defendant because: he had called from that number in the past, ?the context of the text messages convinced her that the messages were from him,? and ?he actually called her from that same phone number during the course of that very text message exchange?

Nature of Case: Criminal: Kidnapping, assault and related crimes

Electronic Data Involved: Text messages from Defendant to the victim

United States v. Shah, No. 5:13-CR-328-FL, 2015 WL 3605077 (E.D.N.C. June 5, 2015)

Key Insight: Court declined to find that contents of email and chats from gmail account could be authenticated as Google?s business records pursuant to ER 902(11) where the contents of the emails were automatically copied to and maintained upon Google?s servers finding that the ?knowledge? requirement was not satisfied and reasoning: ?Neither SHAHNN28@GMAIL.COM, nor any other originating source whose statements appear in the records produced by Google were under a ?business duty? to convey accurate information in their correspondence. Because the proffered ?finished product? is not the collective effort of ?business insiders,? who share a duty to ensure the accuracy of their statements, the court cannot allow those statements to be authenticated on the theory that they are Google?s self-proving business records under Federal Rules of Evidence 803(6) and 902(11).?

Nature of Case: Intentional damage to a protected computer

Electronic Data Involved: Gmail emails and chats

United States v. Lizarraga-Tirado, —F.3d—, 2015 WL 3772772 (9th Cir. June 18, 2015)

Key Insight: Court found that Google Earth satellite image was not hearsay because it makes no assertion and also found that ?[a] tack placed by the Google Earth program and automatically labeled with GPS coordinates isn?t? hearsay? because the ?relevant assertion isn?t made by a person? its made by the Google Earth program? and therefore, there is no statement as defined by the hearsay rule (where the rule applies ?only to out-of-court statements? and where ?it defines a statement as ?a person?s oral assertion, written assertion, or nonverbal conduct?); however, ?[i]f the tack is place d manually and then labeled . . . its classic hearsay?

Nature of Case: Illegal re-entry into the U.S.A.

Electronic Data Involved: Google Earth image and tack

Donley v Donley, 2015 Ark. App. 496 (Ark. Ct. App. Sept. 23, 2015)

Key Insight: Circuit court did not abuse its discretion in admitting screen shots from Defendant?s ex-boyfriend?s Facebook account where the appellate court determined that Defendant?s admission that she was ?Meka Rochelle? – the at-issue commenter shown in the screen shots – and admissions that she authored one of the comments and that she was the person depicted in the photos ?sufficiently tie[d] her to the comments and the photos? and that Defendant?s claim that she did not recall making the comments went to weight , not admissibility

Electronic Data Involved: Social Media (Facebook)

Commonwealth v. Gelfgatt, 11 N.E.3d 605 (Mass. 2014)

Key Insight: Where the facts that would be conveyed by a criminal defendant through his act of decryption of computer files — i.e., his ownership and control of the computers and their contents, knowledge of the act of encryption, and knowledge of the encryption key — are already known to the government and are thus a “foregone conclusion,” compelling the defendant to enter his encryption key does not violate the defendant’s rights under the Fifth Amendment because the defendant is only telling the government what it already knows; accordingly, court reversed trial judge’s denial of government’s motion to compel decryption and remanded the case to the trial court for further proceedings

Nature of Case: Criminal case regarding mortgage fraud scheme

Electronic Data Involved: ESI; encryption key

Clauss Constr. v. UChicago Argonne, LLC, No. 13 C 5479, 2014 WL 5390665 (N.D. Ill. Oct. 20, 2014)

Key Insight: Where plaintiff discovered numerous boxes of relevant or potentially relevant documents that had not been previously produced, but did not produce them in electronic format with Bates-labeling in accordance with parties’ agreed production protocol and instead provided photographs of the documents and boxes and some incomplete indexes, defendants successfully argued that plaintiff either should have to comply with parties’ agreement and produce material in correct format or nonconforming documents should be excluded; plaintiff chose to have newly discovered documents excluded from evidence; court found that monetary sanctions were appropriate and awarded defendant its attorneys’ fees and expenses incurred in filing the motion and attending hearing

Nature of Case: Breach of contract claims

Electronic Data Involved: Hard copy documents

People v. Chabcery, No. ST-14-CR-0000073, 2014 WL 5396166 (V.I. Super. Oct. 22, 2014)

Key Insight: Stating that the Federal Rules of Evidence provide that the originality of ESI is determined by whether the printout accurately reflects the information that it purports to show, not the location where the information is stored, court found that printout of message log retrieved from an electronic memory card constituted an original writing under FRE 1002, and denied criminal defendant’s motion in limine to exclude such evidence

Nature of Case: Criminal case on charges of rape and unlawful conduct

Electronic Data Involved: Information stored on memory card

Culp v. Alabama, CR-13-1039, 2014 WL 6608543 (Ala. Crim. App Nov.21, 2014)

Key Insight: In his appeal of a domestic violence conviction, Culp claimed that emails between himself and the victim were improperly admitted into evidence and were never properly authenticated under Rule 901(b)(4), Ala. R. Evid.. Alabama?s Rule 901(b)(4), which is identical to the federal version, provides that evidence can be authenticated by ?[d]istinctive characteristics and the like,? including ?[a]ppearance, contents, substance, internal patterns, or other distinctive characteristics, taken in conjunction with circumstances.? The court ruled that the emails were properly authenticated because each email contained Culp?s photograph, a screen name that he used, and many of the emails concluded with Culp?s initials. Additionally, the emails contained drug references that were uniquely used by Culp and the victim.

Nature of Case: Criminal

Electronic Data Involved: Email

Commonwealth v. Foster F., No. 13-P-1427, 2014 WL 6909045 (Mass. App. Ct. Dec. 10, 2014)

Key Insight: Because the relevancy and admissibility of the Facebook messages depended on their being authored by the juvenile, the judge was required to determine whether the evidence was sufficient for a reasonable jury to find by a preponderance of the evidence that the juvenile authored them; while the evidence was sufficient to support the judge’s conclusion that the Facebook messages were authored by the juvenile, as the juvenile?s actions served as a basis for concluding that the records were authentic, the better practice would have been to instruct the jurors that, in order to consider the Facebook messages as evidence of the statements contained therein, they first needed to find by a fair preponderance of the evidence that the juvenile was the author

Nature of Case: Juvenile court matter in which juvenile was adjudicated delinquent

Electronic Data Involved: Social networking Internet website messages

State v. Francis, 455 S.W.3d 56 (Mo. Ct. App. 2014)

Key Insight: Court reversed conviction and remanded for new trial based on error in admission of text messages found on Blackberry in Defendant?s possession at the time of his arrest where the State argued that ownership of the Blackberry could be inferred and failed to establish that at-issue text messages were authored by the defendant, which in turn, negated the state?s arguments for admitting the outgoing text messages as well: ?There was no evidence that Appellant owned the BlackBerry or, more importantly, authored the messages. The fact that Appellant possessed the phone at the time of arrest is insufficient by itself to establish that Appellant authored text messages sent hours or days earlier. Because the State failed to establish that the text messages were authored by Appellant, the outgoing messages were not admissible as admissions by a party opponent and, thus, the incoming messages were not admissible under any identified exception to the hearsay rule.?

Nature of Case: Drug conviction

Electronic Data Involved: Text messages from Blackberry

Copyright © 2025, K&L Gates LLP. All Rights Reserved.