Tag:Admissibility

1
United States v. Hock Chee Koo, No. 09-321-(2,3)-KI, 2011 WL 777965 (D. Or. Mar. 1, 2011)
2
People v. Saibu, D054980, 2011 WL 73314 (Cal. Ct. App. 2011)
3
Jimena v. UBS AG Bank, Inc., No. 1:07-cv-00367 OWW SKO, 2011 WL 2551413 (E.D. Cal. June 27, 2011)
4
State v. Pullens, 800 N.W.2d 202 (Neb. 2011)
5
People v. Oyerinde, No. 298199, 2011 WL 5964613 (Mich. Ct. App. Nov. 29, 2011)
6
Commonwealth v. Purdy, SJC-10739, 2011 WL 1421367 (Mass. Apr. 15, 2011)
7
People v. Taylor, 922 N.E.2d 1235 (Ill. App. Ct. 2010)
8
Kohler v. Kindred Nursing Ctrs., Inc., 2010 WL 709182 (Cal. Ct. App. Mar. 2, 2010)
9
State v. Thompson, 777 N.W.2d 617 (N.D. 2010)
10
Commonwealth v. Williams, 926 N.E.2d 1162 (Mass. 2010)

United States v. Hock Chee Koo, No. 09-321-(2,3)-KI, 2011 WL 777965 (D. Or. Mar. 1, 2011)

Key Insight: Where a computer analyst made a backup image of certain files on defendant?s computer and returned the laptop to defendant?s employer, who proceeded to look through the files, etc. before supplying the backup image and the laptop to the FBI, and where the FBI then made an image of the backup image and an image of the entire laptop, the court held that the image of the backup image, reflecting some of the contents of the laptop before the employer looked through the laptop?s files, could be admitted as proof of what the FBI obtained from the employer AND as evidence of some of the contents of the laptop (the backup image did not include the entire contents of the laptop); court held that FBI?s image of the whole laptop (taken after the employer had looked through the files, etc. and thus changed metadata, etc.) could be admitted as evidence of what was obtained by the FBI from the employer, but cold not be offered to prove the contents of the laptop while in defendant?s possession

Nature of Case: Theft of trade secrets

Electronic Data Involved: Backup image and image of contents of laptop

People v. Saibu, D054980, 2011 WL 73314 (Cal. Ct. App. 2011)

Key Insight: Where trial court admitted enhanced digital photos despite prosecution?s failure to disclose that the photograph had been enhanced, or how , but offered defendant an opportunity to remedy the prejudice and locate an opposing expert, appellate court found no abuse of discretion; appellate court found no error in trial court?s failure to require a Kelly hearing with respect to the enhancement techniques where it was ?questionable? whether the Photoshop program used could be considered a scientific technique and where the expert testified that he had been using Photoshop since for 8 years, that it was ?widely available? and ?considered an essential tool? and where an appellate court in Washington had previously determined that the enhancement of latent prints with Photoshop was ?generally accepted in the relevant scientific community?; foundation was properly laid for admission of photos where expert testified as to how they were created and where ?other witnesses? testified that the surveillance video (from which still photos were taken) accurately depicted the events they had witnessed

Nature of Case: Robbery, murder

Electronic Data Involved: Enhanced digital photo

Jimena v. UBS AG Bank, Inc., No. 1:07-cv-00367 OWW SKO, 2011 WL 2551413 (E.D. Cal. June 27, 2011)

Key Insight: Court found plaintiff failed to properly authenticate emails allegedly sent to him by Clive Standish pursuant to either Evidence Rule 901(b)(1), permitting authentication through the testimony of a witness with personal knowledge, or Rule 901(b)(4) which allows authentication by appearance, contents, substance, internal patterns, or other distinctive characteristics taken in conjunction with circumstances and, absent admissible evidence to create a triable issue of material fact, granted defendant?s motion for summary judgment

Nature of Case: Fraud

Electronic Data Involved: Emails

State v. Pullens, 800 N.W.2d 202 (Neb. 2011)

Key Insight: Court outlined possible ways to authenticate an email and found that the emails at issue were properly authenticated and admitted where some came from an account bearing the defendant?s name, where many were signed by the defendant, where some contained identifying information, including defendant?s social security number and telephone numbers and other personal facts, and where an investigator recalled that at least two of the email addresses contained in the at-issue emails had been used on the computer of the victim, with whom defendant was staying before her death; per the court, possible ways to authenticate an email include: by ?use of the email address, which many times contains the same of the sender;? by ?[t]he signature or name of the sender or recipient in the body of the email;? by evidence ?that an email is a timely response to an earlier message;? and by presentation of the ?contents of the email and other circumstances? which may show authorship

Nature of Case: Murder

Electronic Data Involved: Emails

People v. Oyerinde, No. 298199, 2011 WL 5964613 (Mich. Ct. App. Nov. 29, 2011)

Key Insight: Trial court properly determined that Facebook messages from Defendant to his victim were admissible non-hearsay as party admissions pursuant to MRE 801(d)(2); trial court (in bench trial) indicated that it reviewed Facebook messages from victim to defendant and from victim to her sister to ?provide context? for Defendant and victim?s relationship and, on appeal, appellate court reasoned that ?[r]egardless whether some of the messages should not have been admitted under MRE 803(3), the trial court did not rely on the messages to prove that any events actually occurred; judgment of the trial court was affirmed

Nature of Case: Criminal: First-degree felony murder and carjacking

Electronic Data Involved: Social Media Content (e.g., Facebook)

Commonwealth v. Purdy, SJC-10739, 2011 WL 1421367 (Mass. Apr. 15, 2011)

Key Insight: Where Commonwealth offered evidence that at-issue emails originated from an account bearing defendant?s name and acknowledged to be used by defendant; that the emails were found on the hard drive of defendant?s computer for which he supplied the passwords; that at least one email contained a picture of defendant, and that in another, he provided an accurate description of ?the unusual set of services provided by the salon and of himself (?hairstylist, art and antiques dealer, [and] massage therapist?), the judge did not err in concluding the emails were properly authenticated as having been authored by the defendant, despite defendant?s denial of the same

Nature of Case: Convictions related to prostitution

Electronic Data Involved: Emails

People v. Taylor, 922 N.E.2d 1235 (Ill. App. Ct. 2010)

Key Insight: Where defendant objected that state failed to properly authenticate silent surveillance video, appellate court agreed and concluded that ?where no witness can testify as to the authentication of the recording as truly and accurately portraying what he or she has seen or heard, the requirements for a silent-witness foundation must be met?

Nature of Case: Theft of property less than $300

Electronic Data Involved: Surveillance video

Kohler v. Kindred Nursing Ctrs., Inc., 2010 WL 709182 (Cal. Ct. App. Mar. 2, 2010)

Key Insight: Appellate court upheld ruling that copies of website attached to affidavit attempting to establish contacts sufficient for personal jurisdiction were not authenticated and therefore inadmissible where affiant asserted that the pages were copies of defendant?s website but failed to present evidence showing the website was created by defendant or that the statements in the printouts were made by persons authorized to speak on defendant?s behalf; court noted that ?self-authenticating? provisions in Evidence Code ?operates to establish only that a computer?s print function has worked properly. The presumption does not operate to establish the accuracy of the printed information.?

Nature of Case: Claims arising from death of patient while in nursing facility

Electronic Data Involved: Printed pages from website

State v. Thompson, 777 N.W.2d 617 (N.D. 2010)

Key Insight: Where the rules of evidence require authentication sufficient to establish that the evidence in question is what the proponent claims, admission of image of text message was no abuse of discretion where defendant did not argue that the image was not an accurate reflection of the message and where the complainant (victim) and defendant established by their testimony that defendant?s cell phone number and signature were on the image and provided other circumstantial evidence to establish that the image was what it was claimed to be

Nature of Case: Criminal prosecution for simple assault

Electronic Data Involved: Image of text message

Commonwealth v. Williams, 926 N.E.2d 1162 (Mass. 2010)

Key Insight: Where MySpace messages were admitted into evidence upon the testimony of the recipient which established that the messages were sent by someone with access to the alleged sender?s MySpace page but that did not establish the identity of the person who actually sent the communications, appellate court ruled the messages were admitted in error, but that the error did not create a substantial likelihood of a miscarriage of justice; conviction was affirmed

Nature of Case: Appeal of murder conviction

Electronic Data Involved: MySpace messages

Copyright © 2025, K&L Gates LLP. All Rights Reserved.