Tag:Admissibility

1
Tienda v. State, 358 S.W.3d 633 (Tex. Crim. App. 2012)
2
United States v. Hock Chee Koo, No. 09-321-(2,3)-KI, 2011 WL 777965 (D. Or. Mar. 1, 2011)
3
People v. Saibu, D054980, 2011 WL 73314 (Cal. Ct. App. 2011)
4
Jimena v. UBS AG Bank, Inc., No. 1:07-cv-00367 OWW SKO, 2011 WL 2551413 (E.D. Cal. June 27, 2011)
5
State v. Pullens, 800 N.W.2d 202 (Neb. 2011)
6
People v. Oyerinde, No. 298199, 2011 WL 5964613 (Mich. Ct. App. Nov. 29, 2011)
7
Commonwealth v. Purdy, SJC-10739, 2011 WL 1421367 (Mass. Apr. 15, 2011)
8
Griffin v. State, 419 Md. 343, 19 A.3d 415 (Md. 2011)
9
Gomez v. State, 2009 WL 4831117 (Tex. Ct. App. Dec. 16, 2009)
10
United States v. Lanzon, 639 F.3d 1293 (11th Cir. 2011)

Tienda v. State, 358 S.W.3d 633 (Tex. Crim. App. 2012)

Key Insight: On petition for discretionary review, Court of Criminal Appeals affirmed appeals court?s finding that state proffered sufficient evidence to establish a prima facie showing that social-networking webpage offered into evidence was authored by the defendant based upon sufficient circumstantial evidence to ?support a finding that the exhibits were that they were purported to be?; court?s opinion discussed proper procedures for authenticating evidence

Nature of Case: Criminal

Electronic Data Involved: Social Media Content (e.g., MySpace.com)

United States v. Hock Chee Koo, No. 09-321-(2,3)-KI, 2011 WL 777965 (D. Or. Mar. 1, 2011)

Key Insight: Where a computer analyst made a backup image of certain files on defendant?s computer and returned the laptop to defendant?s employer, who proceeded to look through the files, etc. before supplying the backup image and the laptop to the FBI, and where the FBI then made an image of the backup image and an image of the entire laptop, the court held that the image of the backup image, reflecting some of the contents of the laptop before the employer looked through the laptop?s files, could be admitted as proof of what the FBI obtained from the employer AND as evidence of some of the contents of the laptop (the backup image did not include the entire contents of the laptop); court held that FBI?s image of the whole laptop (taken after the employer had looked through the files, etc. and thus changed metadata, etc.) could be admitted as evidence of what was obtained by the FBI from the employer, but cold not be offered to prove the contents of the laptop while in defendant?s possession

Nature of Case: Theft of trade secrets

Electronic Data Involved: Backup image and image of contents of laptop

People v. Saibu, D054980, 2011 WL 73314 (Cal. Ct. App. 2011)

Key Insight: Where trial court admitted enhanced digital photos despite prosecution?s failure to disclose that the photograph had been enhanced, or how , but offered defendant an opportunity to remedy the prejudice and locate an opposing expert, appellate court found no abuse of discretion; appellate court found no error in trial court?s failure to require a Kelly hearing with respect to the enhancement techniques where it was ?questionable? whether the Photoshop program used could be considered a scientific technique and where the expert testified that he had been using Photoshop since for 8 years, that it was ?widely available? and ?considered an essential tool? and where an appellate court in Washington had previously determined that the enhancement of latent prints with Photoshop was ?generally accepted in the relevant scientific community?; foundation was properly laid for admission of photos where expert testified as to how they were created and where ?other witnesses? testified that the surveillance video (from which still photos were taken) accurately depicted the events they had witnessed

Nature of Case: Robbery, murder

Electronic Data Involved: Enhanced digital photo

Jimena v. UBS AG Bank, Inc., No. 1:07-cv-00367 OWW SKO, 2011 WL 2551413 (E.D. Cal. June 27, 2011)

Key Insight: Court found plaintiff failed to properly authenticate emails allegedly sent to him by Clive Standish pursuant to either Evidence Rule 901(b)(1), permitting authentication through the testimony of a witness with personal knowledge, or Rule 901(b)(4) which allows authentication by appearance, contents, substance, internal patterns, or other distinctive characteristics taken in conjunction with circumstances and, absent admissible evidence to create a triable issue of material fact, granted defendant?s motion for summary judgment

Nature of Case: Fraud

Electronic Data Involved: Emails

State v. Pullens, 800 N.W.2d 202 (Neb. 2011)

Key Insight: Court outlined possible ways to authenticate an email and found that the emails at issue were properly authenticated and admitted where some came from an account bearing the defendant?s name, where many were signed by the defendant, where some contained identifying information, including defendant?s social security number and telephone numbers and other personal facts, and where an investigator recalled that at least two of the email addresses contained in the at-issue emails had been used on the computer of the victim, with whom defendant was staying before her death; per the court, possible ways to authenticate an email include: by ?use of the email address, which many times contains the same of the sender;? by ?[t]he signature or name of the sender or recipient in the body of the email;? by evidence ?that an email is a timely response to an earlier message;? and by presentation of the ?contents of the email and other circumstances? which may show authorship

Nature of Case: Murder

Electronic Data Involved: Emails

People v. Oyerinde, No. 298199, 2011 WL 5964613 (Mich. Ct. App. Nov. 29, 2011)

Key Insight: Trial court properly determined that Facebook messages from Defendant to his victim were admissible non-hearsay as party admissions pursuant to MRE 801(d)(2); trial court (in bench trial) indicated that it reviewed Facebook messages from victim to defendant and from victim to her sister to ?provide context? for Defendant and victim?s relationship and, on appeal, appellate court reasoned that ?[r]egardless whether some of the messages should not have been admitted under MRE 803(3), the trial court did not rely on the messages to prove that any events actually occurred; judgment of the trial court was affirmed

Nature of Case: Criminal: First-degree felony murder and carjacking

Electronic Data Involved: Social Media Content (e.g., Facebook)

Commonwealth v. Purdy, SJC-10739, 2011 WL 1421367 (Mass. Apr. 15, 2011)

Key Insight: Where Commonwealth offered evidence that at-issue emails originated from an account bearing defendant?s name and acknowledged to be used by defendant; that the emails were found on the hard drive of defendant?s computer for which he supplied the passwords; that at least one email contained a picture of defendant, and that in another, he provided an accurate description of ?the unusual set of services provided by the salon and of himself (?hairstylist, art and antiques dealer, [and] massage therapist?), the judge did not err in concluding the emails were properly authenticated as having been authored by the defendant, despite defendant?s denial of the same

Nature of Case: Convictions related to prostitution

Electronic Data Involved: Emails

Griffin v. State, 419 Md. 343, 19 A.3d 415 (Md. 2011)

Key Insight: Where MySpace evidence was not properly authenticated because the lower court failed to acknowledge the possibility that another person could have created the profile or message at issue, the appellate court reversed defendant?s conviction and remanded for a new trial; court suggested that message could have been properly authenticated by asking the purported creator to authenticate the profile and message, by searching the computer of the alleged creator of the message to determine whether they posted the message, or by obtaining information directly from the networking website that links the ?establishment of the profile to the person who allegedly created it and also links the posting sought to be introduced to the person who initiated it.?

Nature of Case: Murder conviction

Electronic Data Involved: MySpace evidence

Gomez v. State, 2009 WL 4831117 (Tex. Ct. App. Dec. 16, 2009)

Key Insight: Computer printout of ?pawn database? properly admitted under ?Statements in Documents Affecting an Interest in Property? exception to hearsay where employee of police department?s pawnshop unit testified regarding the department?s pawnshop database and how it worked and where the document memorialized appellant?s transfer of ownership of the item at issue to the pawn shop such that the record fit within the stated exception

Nature of Case: Criminal

Electronic Data Involved: Database printout from police department’s pawnshop database

United States v. Lanzon, 639 F.3d 1293 (11th Cir. 2011)

Key Insight: Where detective preserved transcripts of internet chats by copying them into Word documents saved onto CD and verifying that they were identical to the original transcripts rather than preserving the original transcript on a department hard drive for purposes of saving space, defendant?s due process rights were not denied by destruction of the original transcript absent evidence that they would ?significantly contribute to his defense? and were lost as a result of bad faith; transcripts in Word documents were properly admitted in light of detective?s testimony that he participated in the chats and that the transcripts were accurate; transcripts did not violate best evidence rule absent evidence that originals were destroyed in bad faith; admission of transcripts did not violate rule of completeness; district court did not err in denying request for jury instruction on spoliation and destruction of evidence where there was no evidence that portions of chat were destroyed (because detective testified he saved conversations in their entirety) and no showing prejudice

Nature of Case: Crimnal charges related to attempt to coerce minor to engage in sezual activity

Electronic Data Involved: Chat transcripts

Copyright © 2022, K&L Gates LLP. All Rights Reserved.