State v. Pullens, 800 N.W.2d 202 (Neb. 2011)

Key Insight: Court outlined possible ways to authenticate an email and found that the emails at issue were properly authenticated and admitted where some came from an account bearing the defendant?s name, where many were signed by the defendant, where some contained identifying information, including defendant?s social security number and telephone numbers and other personal facts, and where an investigator recalled that at least two of the email addresses contained in the at-issue emails had been used on the computer of the victim, with whom defendant was staying before her death; per the court, possible ways to authenticate an email include: by ?use of the email address, which many times contains the same of the sender;? by ?[t]he signature or name of the sender or recipient in the body of the email;? by evidence ?that an email is a timely response to an earlier message;? and by presentation of the ?contents of the email and other circumstances? which may show authorship

Nature of Case: Murder

Electronic Data Involved: Emails

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>

Copyright © 2022, K&L Gates LLP. All Rights Reserved.