Tag:Admissibility

1
Commonwealth Fin. Sys., Inc. v. Smith, No. 3435 EDA 2009, 2011 WL 489704 (Pa. Super. Ct. Feb. 14, 2011)
2
United States v. Cameron, 762 F. Supp. 2d 152 (D. Me. 2011)
3
People v. Lesser, No. H034189, 2011 WL 193460 (Cal. Ct. App. Jan. 21, 2011)
4
Commonwealth v. Koch, 39 A.3d 996 (Pa. Super. Ct. 2011)
5
United States v. Hock Chee Koo, No. 09-321-(2,3)-KI, 2011 WL 777965 (D. Or. Mar. 1, 2011)
6
People v. Saibu, D054980, 2011 WL 73314 (Cal. Ct. App. 2011)
7
Dutch v. United States, 997 A.2d 685 (D.C. 2010)
8
Rhode Island Managed Eye Care, Inc. v. Blue Cross & Blue Shield of Rhode Island, 996 A.2d 684 (R.I. 2010)
9
Haskins v. State, 2010 WL 2524797 (Tex. Ct. App. June 24, 2010)
10
Boyd v. Toyobo Am., Inc. (In Re Second Chance Body Armor, Inc.) 2010 WL 3168643 (Bankr. W.D. Mich. July 29, 2010)

Commonwealth Fin. Sys., Inc. v. Smith, No. 3435 EDA 2009, 2011 WL 489704 (Pa. Super. Ct. Feb. 14, 2011)

Key Insight: Appellate court affirmed trial court?s exclusion of electronic business records obtained by the plaintiff from the former holders of defendant?s debt, where the trial court properly concluded that the a representative of the plaintiff corporation was not ?the right person to establish the Citibank records? (because he was not familiar with how the records were created or maintained and had no personal knowledge of the entries on the at-issue spreadsheet, for example) and held that ?CPS failed to establish the trustworthiness and reliability of the records sufficiently to permit their admission into evidence? pursuant to Pennsylvania Rule of Evidence 803(6), among other things

Nature of Case: Action to collect credit card debt

Electronic Data Involved: Electronic records

United States v. Cameron, 762 F. Supp. 2d 152 (D. Me. 2011)

Key Insight: Images of child pornography produced by ISPs to government were properly authenticated by testimony of ISPs? legal assistants who were familiar with the process for collecting those images and the reliability and accuracy of the servers and who testified that the images offered into evidence were the same as those collected and that the images had been traced to the defendant?s computer; court reasoned that ?[i]t is not necessary for the Government to produce the actual ISP searchers in order to comply with the requirements of the Sixth Amendment?

Nature of Case: Criminal

Electronic Data Involved: Images of child pornography

People v. Lesser, No. H034189, 2011 WL 193460 (Cal. Ct. App. Jan. 21, 2011)

Key Insight: Appellate court affirmed trial court?s admission of printouts of online chats preserved by a police officer, despite the fact that the version presented at trial contained emoticons that prior versions presented at preliminary examination did not or that introductory lines for the chats were not preserved in the printouts, where the officer ?offered sufficient evidence of the method by which he preserved the text? and where he testified that ?the printouts were accurate and complete? representations of the chats; the printouts were not inadmissible hearsay as argued by defendant because they were not offered for the truth of the matters asserted but rather were offered to show that defendant in fact made the statements

Nature of Case: Attempted distribution of harmful matter to a minor over the internet and related charges

Electronic Data Involved: Instant messages

Commonwealth v. Koch, 39 A.3d 996 (Pa. Super. Ct. 2011)

Key Insight: Conviction reversed and case remanded where trial court abused its discretion by admitting text messages found on the defendant?s cell phone without providing any evidence to establish that the defendant was the author of the at-issue messages, particularly where several messages referred to the defendant in the third person and ?and thus, were clearly not written by her?; court also found the text messages constituted inadmissible hearsay

Nature of Case: Drug conviction

Electronic Data Involved: Text messages

United States v. Hock Chee Koo, No. 09-321-(2,3)-KI, 2011 WL 777965 (D. Or. Mar. 1, 2011)

Key Insight: Where a computer analyst made a backup image of certain files on defendant?s computer and returned the laptop to defendant?s employer, who proceeded to look through the files, etc. before supplying the backup image and the laptop to the FBI, and where the FBI then made an image of the backup image and an image of the entire laptop, the court held that the image of the backup image, reflecting some of the contents of the laptop before the employer looked through the laptop?s files, could be admitted as proof of what the FBI obtained from the employer AND as evidence of some of the contents of the laptop (the backup image did not include the entire contents of the laptop); court held that FBI?s image of the whole laptop (taken after the employer had looked through the files, etc. and thus changed metadata, etc.) could be admitted as evidence of what was obtained by the FBI from the employer, but cold not be offered to prove the contents of the laptop while in defendant?s possession

Nature of Case: Theft of trade secrets

Electronic Data Involved: Backup image and image of contents of laptop

People v. Saibu, D054980, 2011 WL 73314 (Cal. Ct. App. 2011)

Key Insight: Where trial court admitted enhanced digital photos despite prosecution?s failure to disclose that the photograph had been enhanced, or how , but offered defendant an opportunity to remedy the prejudice and locate an opposing expert, appellate court found no abuse of discretion; appellate court found no error in trial court?s failure to require a Kelly hearing with respect to the enhancement techniques where it was ?questionable? whether the Photoshop program used could be considered a scientific technique and where the expert testified that he had been using Photoshop since for 8 years, that it was ?widely available? and ?considered an essential tool? and where an appellate court in Washington had previously determined that the enhancement of latent prints with Photoshop was ?generally accepted in the relevant scientific community?; foundation was properly laid for admission of photos where expert testified as to how they were created and where ?other witnesses? testified that the surveillance video (from which still photos were taken) accurately depicted the events they had witnessed

Nature of Case: Robbery, murder

Electronic Data Involved: Enhanced digital photo

Dutch v. United States, 997 A.2d 685 (D.C. 2010)

Key Insight: Court found admission of two documents derived from information stored on computers as ?business records? was proper where evidence established the data was created and stored in the relevant information system at the time of the transaction at issued, where the data was created and used by merchants in usual course of their business, and where sufficient testimony was presented to ?give adequate reason to trust the authenticity of the documents?

Nature of Case: Conviction for attempted uttering (cashing a forged check)

Electronic Data Involved: Hard copy business records “derived from information stored on computers”

Rhode Island Managed Eye Care, Inc. v. Blue Cross & Blue Shield of Rhode Island, 996 A.2d 684 (R.I. 2010)

Key Insight: Supreme court affirmed admission of ?membership data reports? generated from plaintiff?s database as business records and rejected defendant?s arguments that they lacked the necessary guarantees of trustworthiness where the records were relied upon in the usual course of business and where evidence indicated the software had been calibrated to ensure accuracy, among other things, and where the records were properly authenticated by testimony regarding the manner in which they were created and evidence the system had been producing accurate results

Nature of Case: Breach of contract

Electronic Data Involved: ?Membership data reports? generated from plaintiff?s database

Haskins v. State, 2010 WL 2524797 (Tex. Ct. App. June 24, 2010)

Key Insight: Relying on precedent stating that ?computer-generated data is not hearsay because there is no human declarant?, appellate court held that trial court did not abuse its discretion in admitting a document detailing the number of times a particular coupon had been scanned where testimony established that the information in the printout was automatically generated, that the information was safe from alteration while stored in the relevant computer system, that the information had not been altered, and that the computer from which the information was generated was not malfunctioning

Nature of Case: Theft

Electronic Data Involved: Printout of computer generated data

Boyd v. Toyobo Am., Inc. (In Re Second Chance Body Armor, Inc.) 2010 WL 3168643 (Bankr. W.D. Mich. July 29, 2010)

Key Insight: Court found email had not been properly authenticated where the email was not self authenticating and where the email was a purely internal communication between employees of a third party company and thus could not be authenticated by the defense witness who was not an employee of that company, was not listed as a recipient of the email, and testified that he had never seen the document before

Nature of Case: Adversarial action in Bankruptcy

Electronic Data Involved: Email

Copyright © 2025, K&L Gates LLP. All Rights Reserved.