Evidence

eDiscovery Trends: First Pass Review – Synonym Searching Your Opponent’s Data

 

Even those of us at eDiscoveryDaily have to take an occasional vacation; however, instead of “going dark” for the week, we thought we would republish a post series from the early days of the blog (when we didn’t have many readers yet)  So chances are, you haven’t seen these posts yet!  Enjoy!

Yesterday, we talked about the use of First Pass Review (FPR) applications (such as FirstPass®, powered by Venio FPR™) to not only conduct first pass review of your own collection, but also to analyze your opponent’s ESI production.  One way to analyze that data is through email analytics to see the communication patterns graphically to identify key parties for deposition purposes and look for potential production omissions.

Synonym Searching

Another type of analysis is the use of synonym searching.  Attorneys understand the key terminology their client uses, but they often don’t know the terminology their client’s opposition uses because they haven’t interviewed the opposition’s custodians.  In a product defect case, the opposition may refer to admitted design or construction “mistakes” in their product or process as “flaws”, “errors”, “goofs” or even “flubs”.  With FirstPass, you can enter your search term into the synonym searching section of the application and it will provide a list of synonyms (with hit counts of each, if selected).  Then, you can simply select the synonyms you wish to include in the search.  As a result, FirstPass identifies synonyms of your search terms to broaden the scope and catch key “hits” that could be the “smoking gun” in the case.

Thursday, I’ll talk about the use of fuzzy searching to find misspellings that may be commonly used by your opponent or errors resulting from Optical Character Recognition (OCR) of any image-only files that they produce.  Stay tuned!  🙂

In the meantime, what do you think?  Have you used synonym searching to identify variations on terms in an opponent’s produced ESI?  Please share any comments you might have or if you’d like to know more about a particular topic.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine Discovery. eDiscoveryDaily is made available by CloudNine Discovery solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscoveryDaily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

Happy Independence Day from all of us at eDiscovery Daily and CloudNine Discovery!

eDiscovery Trends: First Pass Review – of Your Opponent’s Data

 

Even those of us at eDiscoveryDaily have to take an occasional vacation; however, instead of “going dark” for the week, we thought we would republish a post series from the early days of the blog (when we didn’t have many readers yet)  So chances are, you haven’t seen these posts yet!  Enjoy!

In the past few years, applications that support Early Case Assessment (ECA) (or Early Data Assessment, as many prefer to call it) and First Pass Review (FPR) of ESI have become widely popular in eDiscovery as the analytical and culling benefits of conducting FPR have become obvious.  The benefit of these FPR tools to analyze and cull their ESI before conducting attorney review and producing relevant files has become increasingly clear.  But, nobody seems to talk about what these tools can do with opponent’s produced ESI.

Less Resources to Understand Data Produced to You

In eDiscovery, attorneys typically develop a reasonably in-depth understanding of their collection.  They know who the custodians are, have a chance to interview those custodians and develop a good knowledge of standard operating procedures and terminology of their client to effectively retrieve responsive ESI.  However, that same knowledge isn’t present when reviewing opponent’s data.  Unless they are deposed, the opposition’s custodians aren’t interviewed and where the data originated is often unclear.  The only source of information is the data itself, which requires in-depth analysis.  An FPR application like FirstPass®, powered by Venio FPR™, can make a significant difference in conducting that analysis – provided that you request a native production from your opponent, which is vital to being able to perform that in-depth analysis.

Email Analytics

The ability to see the communication patterns graphically – to identify the parties involved, with whom they communicated and how frequently – is a significant benefit to understanding the data received.  FirstPass provides email analytics to understand the parties involved and potentially identify other key opponent individuals to depose in the case.  Dedupe capabilities enable quick comparison against your production to confirm if the opposition has possibly withheld key emails between opposing parties.  FirstPass also provides an email timeline to enable you to determine whether any gaps exist in the opponent’s production.

Message Threading

The ability to view message threads for emails (which Microsoft Outlook® tracks), can also be a useful tool as it enables you to see the entire thread “tree” of a conversation, including any side discussions that break off from the original discussion.  Because Outlook tracks those message threads, any missing emails are identified with placeholders.  Those could be emails your opponent has withheld, so the ability to identify those quickly and address with opposing counsel (or with the court, if necessary) is key to evaluating the completeness of the production.

Tomorrow, I’ll talk about the use of synonym searching to find variations of your search terms that may be common terminology of your opponent.  Same bat time, same bat channel! 🙂

In the meantime, what do you think?  Have you used email analytics to analyze an opponent’s produced ESI?  Please share any comments you might have or if you’d like to know more about a particular topic.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine Discovery. eDiscoveryDaily is made available by CloudNine Discovery solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscoveryDaily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

eDiscovery Case Law: “Naked” Assertions of Spoliation Are Not Enough to Grant Spoliation Claims

 

In Grabenstein v. Arrow Electronics, Inc., No. 10-cv-02348-MSK-KLM, 2012 U.S. Dist. LEXIS 56204 (D. Colo. Apr.23, 2012), Colorado Magistrate Judge Kristen L. Mix denied the plaintiff’s motion for sanctions, finding that their claims of spoliation were based on “naked” assertions that relevant eMails must exist even though the plaintiff could not demonstrate that such other eMails do or did exist.  The motion was also denied because the plaintiff could not establish when the defendant had deleted certain eMail messages, thereby failing to prove claims that the defendant violated its duty to preserve electronic evidence. Judge Mix noted that sanctions are not justified when documents are destroyed in good faith pursuant to a reasonable records-retention policy, if that’s prior to the duty to preserve such documents.

In this employment discrimination case, the plaintiff filed a motion for sanctions, claiming that the defendant failed to retain all eMail messages exchanged internally as well as between the defendant and the plaintiff’s insurer, MetLife, regarding the plaintiff’s short-term disability leave.

Defining the requirement for a finding of spoliation, Judge Mix stated, “A spoliation sanction is proper where (1) a party has a duty to preserve evidence because it knew, or should have known, that litigation was imminent, and (2) the adverse party was prejudiced by the destruction of the evidence.”

Here, Judge Mix found the plaintiff’s contentions that relevant eMails were missing to be “fatally unclear” since neither the plaintiff nor the defendant knew whether other such eMails existed. The plaintiff was also unable to provide any verification that MetLife’s log of relevant eMails exchanged with the defendant was incomplete or had been altered. As a result, Judge Mix was “unable to find that the e-mails produced by MetLife are incomplete and that Defendant destroyed the only complete versions of those e-mails”.

There were some eMails which the defendant admittedly did not preserve.  As to whether those eMails had been deleted after the duty to preserve them had arisen, Judge Mix discussed the standard under the spoliation doctrine: “‘[I]n most cases, the duty to preserve evidence is triggered by the filing of a lawsuit. However, the obligation to preserve evidence may arise even earlier if a party has notice that future litigation is likely.’” Here, Judge Mix found that the plaintiff had not produced any evidence that the defendant should have anticipated litigation prior to receiving actual notice of the filing of the lawsuit. The plaintiff was also unable to show any evidence at all when the defendant had destroyed the eMails that would rebut the defendant’s attorney’s statement that the eMails were deleted prior to the start of litigation. As a result, the plaintiff did not meet its burden of establishing that the defendant had violated its duty to preserve.

While finding that the defendants had violated a records retention policy regulation applicable to the Equal Employment Opportunity Commission when it deleted the eMails, Judge Mix found that it had not done so in bad faith, and it had been simply following its own eMail retention policy in the normal course of business. Accordingly, the plaintiff’s motion for sanctions was denied.

So, what do you think?  Was the ruling fair or should the defendants have been sanctioned for the deleted eMails?  Please share any comments you might have or if you’d like to know more about a particular topic.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine Discovery. eDiscoveryDaily is made available by CloudNine Discovery solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscoveryDaily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

eDiscovery Case Law: Plaintiff Compelled to Produce Mirror Image of Drives Despite Defendant’s Initial Failure to Request Metadata

 

In Commercial Law Corp., P.C. v. FDIC, No. 10-13275, 2012 U.S. Dist. LEXIS 51437 (E.D. Mich. Apr. 12, 2012), Michigan District Judge Sean F. Cox ruled that a party can be compelled to produce a mirror image of its computer drives using a neutral third-party expert where metadata is relevant and the circumstances dictate it, even though the requesting party initially failed to request that metadata and specify the format of documents in its first discovery request.

The plaintiff was an attorney who sought to recover fees from the FDIC for services in its capacity as receiver for a bank. The plaintiff claimed that it held valid liens on properties of the bank, and provided an eMail to the bank as evidence. The FDIC disputed the plaintiff’s claim, contended that she was lying and sought to compel her to produce a mirror image of her computer drives to examine relevant data pertaining to the lien documents. Magistrate Judge R. Steven Whalen ordered the plaintiff to compel, and the plaintiff objected.

Judge Cox ruled that there was a proper basis for ordering an exact copy of her drives to be created and also agreed that it was appropriate to be performed by a neutral third-party expert, finding:

  • That such an examination would reveal relevant information pursuant to Rule 26 because “[t]he date Plaintiff executed the security lien is clearly relevant to a defense against Plaintiff’s attorney lien claim”;
  • That there were a number of factors that gave the defendant “sufficient cause for concern” as to the authenticity of the lien documents, shooting down the plaintiff’s claim that the court was simply following a “hunch”;
  • That a third-party expert is an appropriate way to execute the examination.

Despite the fact that the defendant did not request metadata nor specify the format of the documents in its initial discovery request, Judge Cox permitted an expert to obtain relevant metadata. Judge Cox noted:

“It is clear from the parties’ pleadings that Defendant’s concern regarding the legitimacy of the lien documents intensified during the course of discovery. Specifically, Defendant did not obtain the January 18, 2010 email [claiming the lien documents were attached] until it deposed Karl Haiser in August of 2011, well after it submitted its first discovery requests to Plaintiff. “

As a result, the plaintiff’s objections to the Magistrate Judge Whalen’s order were overruled.

So, what do you think?  Should the defendant have been granted another opportunity at the metadata or should the plaintiff’s objections have been granted?  Please share any comments you might have or if you’d like to know more about a particular topic.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine Discovery. eDiscoveryDaily is made available by CloudNine Discovery solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscoveryDaily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

eDiscovery Trends: X1 Social Discovery – Social Media Discovery for Professionals

 

According to EDDUpdate.com, social media will be eclipsing email as the primary discovery resource within three years.  Social media has become a normal part of our everyday life as we share our photos on Facebook, tweet news on Twitter, and make professional connections on LinkedIn.  We’ve previously covered social media archiving tools here, highlighting a firm named Smarsh, and the need for effective electronic discovery methods is only growing by the day.  As you can imagine, the sheer amount of content being generated is astounding.  Twitter CEO Dick Costolo announced on June 6th that Twitter had broken the 400 million tweet-per-day barrier, up 18% from 340 million back in March.  These aren’t simply meaningless ones and zeroes, either. X1 Discovery has information for 689 cases related to social media discovery from 2010 and 2011 linked on their website, making it clear just how many cases are being affected by social media these days.

With regard to ESI on social media networks, X1 Discovery features a solution called X1 Social Discovery, which is described as “the industry's first investigative solution specifically designed to enable eDiscovery and computer forensics professionals to effectively address social media content.  X1 Social Discovery provides for a powerful platform to collect, authenticate, search, review and produce electronically stored information (ESI) from popular social media sites, such as Facebook, Twitter and LinkedIn.”

We reached out to X1 Discovery for more information about X1 Social Discovery, especially with regard as to what sort of challenges faces a new tool developed for a new type of information.  For example, why isn’t support for Google+, Google’s fledgling social network, offered?  X1 Discovery Executive Vice President for Sales and Business Development, Skip Lindsey, addressed that question accordingly:

“Our system can be purposed to accommodate a wide variety of use cases and we are constantly working with clients to understand their requirements to further enhance the product.  As you are aware there are a staggering number of potential social media systems to be collected from, but in terms of frequency of use, Facebook, Twitter and Linkedin are far and away the most prominent and there is a lot of constant time and attention we provide to ensure the accuracy and completeness of the data we obtain from those sites. We use a combination of direct API’s to the most popular systems, and have incorporated comprehensive web crawling and single page web capture into X1 Social Discovery to allow capture of virtually any web source that the operator can access. Google + is on the roadmap and we plan support in the near future.”

So, who is going to benefit most from X1 Social Discovery, and how is it different than an archiving tool like Smarsh?  According to Lindsay:

“X1 Social Discovery is installable software, not a service. This means that clients can deploy quickly and do not incur any additional usage charges for case work. Our investigative interface and workflow are unique in our opinion and better suited to professional investigators, law enforcement and eDiscovery professionals that other products that we have seen which work with social media content. Many of these other systems were created for the purpose of compliance archiving of web sites and do not address the investigation and litigation support needs of our client base. We feel that the value proposition of X1 Social Discovery is hard to beat in terms of its functionality, defensibility, and cost of ownership.”

With so many cases requiring collection by experienced professionals these days, it seems appropriate that there’s a tool like X1 Social Discovery designed for them for collecting social media ESI.

So, what do you think?  Do you collect your own social media ESI or do you use experienced professionals for this collection?  What tools have you used?  Please share any comments you might have or if you’d like to know more about a particular topic.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine Discovery. eDiscoveryDaily is made available by CloudNine Discovery solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscoveryDaily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

eDiscovery Best Practices: Smoking Gun Shoots Blanks, Google Wins Latest Battle in “Smartphone War” with Oracle

 

Despite a significant inadvertent disclosure of information during Google's litigation with Oracle Corp., U.S. District Judge William Alsup last Thursday (May 31) dismissed claims that its Android mobile phone platform infringes Oracle's copyrights relating to the Java computer language.

Oracle had accused Google of infringing the "structure, sequence and organization" of 37 of Java's application programming interface (API) application. Referring to this case as “the first of the so-called smartphone war cases”, Alsup ruled in the 41-page decision that the particular Java elements Google replicated were free for all to use under copyright law, noting: "So long as the specific code used to implement a method is different, anyone is free under the Copyright Act to write his or her own code to carry out exactly the same function or specification of any methods used in the Java API"

Summarizing the validity of Oracle’s claim, Judge Alsup stated:

“Of the 166 Java packages, 129 were not violated in any way.  Of the 37 accused, 97 percent of the Android lines were new from Google and the remaining three percent were freely replicable under the merger and names doctrines.  Oracle must resort, therefore, to claiming that it owns, by copyright, the exclusive right to any and all possible implementations of the taxonomy-like command structure for the 166 packages and/or any subpart thereof – even though it copyrighted only one implementation.  To accept Oracle’s claim would be to allow anyone to copyright one version of code to carry out a system of commands and thereby bar all others from writing their own different versions to carry out all or part of the same commands.  No holding has ever endorsed such a sweeping proposition.”

Judge Alsup indicated that he was not ruling that Java API packages are free for all to use, stating: “This order does not hold that Java API packages are free for all to use without license.  It does not hold that the structure, sequence, and organization of all computer programs may be stolen. Rather, it holds on the specific facts of this case, the particular elements replicated by Google were free for all to use under the Copyright Act.”

Oracle filed suit against Google in San Francisco federal court in August 2011 claiming that the Android mobile operating system infringed Java copyrights and patents (to which Oracle obtained the rights after acquiring Sun Microsystems in 2010) and once valued damages in the case at $6 billion. In the first phase of the trial, the jury returned a verdict that said Google infringed the structure, sequence, and organization of 37 API packages; however, they deadlocked on Google's affirmative defense that it only made fair use of Java technology and Alsup had not yet ruled on whether the APIs could be copyrighted.  He has now.

Oracle is expected to appeal.

So, what do you think?  Will Oracle appeal and should they do so?  Please share any comments you might have or if you’d like to know more about a particular topic.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine Discovery. eDiscoveryDaily is made available by CloudNine Discovery solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscoveryDaily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

eDiscovery Case Law: Court Allows Third Party Discovery Because Defendant is an “Unreliable Source”

 

Repeatedly referring to the defendant’s unreliability and untrustworthiness in discovery and “desire to suppress the truth,” Nebraska Magistrate Judge Cheryl R. Zwart found, in Peter Kiewit Sons’, Inc. v. Wall Street Equity Group, Inc., No. 8:10CV365, (D. Neb. May 18, 2012), that the defendant avoided responding substantively to the plaintiff’s discovery requests through a pattern of destruction and misrepresentation and therefore monetary sanctions and an adverse jury instruction at trial were appropriate. 

In this trademark action, Judge Zwart awarded sanctions of extensive discovery costs against a defendant that destroyed discoverable electronic evidence, failed to search for and locate other electronically stored information (ESI), and made false representations in affidavits and in court regarding its efforts to search for this evidence. In addition, she allowed the plaintiff to conduct discovery by contacting directly the defendant’s current and former clients, despite the court’s acknowledgment that such contact could harm the defendant’s business. Finally, Judge Zwart recommended an adverse jury instruction be given at trial.

Throughout a lengthy and contentious discovery process, the defendant claimed that its failure to produce any electronic documents containing the plaintiff’s mark demonstrated that there simply were no such documents. What the court ultimately discovered, however, was that no documents were produced for very different reasons: (1) the defendant appeared to have a virtually nonexistent records retention policy; (2) the defendant recovered its external hard drives from its landlord just before the landlord received a subpoena for the hard drives, leading the landlord to claim he did not possess the files; (3) to “comply” with discovery requests, the defendant had an employee who is not a computer expert conduct a keyword search consisting of one word (“Kiewit”) of the defendant’s files (from her own workstation) for the name of the plaintiff’s mark and recovered only two nonresponsive documents; and (4) the defendant discarded what it claimed was a non-functioning server the same month that it received notice of the plaintiff’s discovery requests.

The court ordered a forensic examination of the defendants’ computer systems that revealed thousands of documents containing the keyword “Kiewit” on its face as well as in its metadata. It also revealed at least one document that had been previously produced was missing from the electronic files, contributing to the evidence of spoliation. In ruling, the court pointed out that “considering Defendant’s very liberal policy of not keeping documents, consolidating their records in one location, or organizing their files, their efforts to locate relevant electronic files were woefully inadequate.”

As a consequence of the defendants’ “obstreperous” conduct, Judge Zwart found sanctions were appropriate, including monetary awards and an adverse jury instruction. She granted sanctions pursuant to its “authority to sanction the misconduct of parties and their attorneys . . . derived from the Federal Rules of Civil Procedure and the inherent power of the court,” as well as its “power to shape the appropriate remedy including default judgment, striking pleadings, an adverse jury instruction, and an award of attorney’s fees and costs” derived from precedent. Judge Zwart noted, “The most severe sanctions are reserved for those litigants demonstrating ‘blatant disregard of the Court’s orders and discovery rules’ [and] engaging in a pattern of deceit by presenting false and misleading answers and testimony under oath in order to prevent their opponent from fairly presenting its case.’”

Furthermore, Judge Zwart found the defendants’ conduct dictated that the plaintiff should be permitted to conduct third-party discovery. The plaintiff argued that it needed to contact the defendants’ clients in an effort to determine whether and how the defendants used the plaintiff’s trademark, whereas the defendants argued that they would suffer “irreparable harm” should the plaintiff reach out to their current and former clients. Despite courts’ general reluctance to allow direct contact with litigants’ clients in intellectual property cases, Judge Zwart here found that the plaintiff showed the clients’ information was “relevant and necessary”; moreover, because “Defendants are simply not a reliable source of information” and they “continue to attempt to use client confidentiality as a means of preventing Plaintiff from discovering relevant information,” the plaintiff’s contact with the clients would be proper.

So, what do you think?  Did the court’s sanctions go far enough or should they have been even tougher?  Please share any comments you might have or if you’d like to know more about a particular topic.

Case Summary Source: Applied Discovery (free subscription required).  For eDiscovery news and best practices, check out the Applied Discovery Blog here.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine Discovery. eDiscoveryDaily is made available by CloudNine Discovery solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscoveryDaily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

eDiscovery Case Law: Inadvertent Disclosure By Expert Waives Privilege

 

In Ceglia v. Zuckerberg, No. 10-CV-00569A(F), (W.D.N.Y. Apr. 19, 2012) (the case where Paul Ceglia is suing claiming 84% ownership of Facebook due to an alleged agreement he had with Mark Zuckerberg back in 2003), New York Magistrate Judge Leslie G. Foschio ruled that an information technology expert’s inadvertent disclosure waived the attorney-client privilege where the plaintiff could not show that it (1) took reasonable steps to prevent the disclosure of the e-mail and (2) took reasonable steps to rectify the error once it discovered the disclosure.

This case involved a dispute over the authenticity of a contract, and in seeking assistance to resolve pretrial matters, the plaintiff filed this motion to compel and asserted, among other things, that the attorney-client privilege should protect an e-mail that was inadvertently disclosed to the defendants. The court set forth the standard under Federal Evidence Rule 502(b) that applies to whether an inadvertent disclosure waives a privilege: “the privilege will not be waived if (1) the disclosure is inadvertent; (2) the privilege holder took reasonable steps to prevent disclosure; and (3) the privilege holder took reasonable steps to rectify the error.” Furthermore, “‘the burden is on the party claiming a communication is privileged” to establish that it met these requirements and that “the opposing party will not be unduly prejudiced by a protective order.”

Because the plaintiff failed to “personally supervise” the actions of the information technology expert he had hired, despite that he understandably hired such an expert to assist him while he was out of town, he “also failed to take reasonable steps to prevent the inadvertent disclosure” of the e-mail. Judge Foschio suggested that instead the defendants could have had the expert “first forward any documents” so that the plaintiff “could have reviewed the documents to ensure there w[ere] no extraneous, privileged materials attached.” If the plaintiff needed to oversee the expert in person, the court admonished, he “should have made himself present to do so.”

Judge Foschio also found that the plaintiff did not take reasonable steps to rectify the inadvertent disclosure. Noting that “the delay in seeking to remedy an inadvertent disclosure of privileged material is measured from the date the holder of the privilege discovers [ ] such disclosure,” and that “[g]enerally, a request for the return or destruction of inadvertently produced privileged materials within days after learning of the disclosure is required to sustain this second element,” the court pointed out that the plaintiff not only waited more than two months to try to rectify the error but also offered no explanation for such a lengthy delay.

Moreover, Judge Foschio stated, “Plaintiff has utterly failed to offer any explanation demonstrating that protecting belated protection of the . . . email will not be unduly prejudicial to Defendants.” Thus, because the plaintiff failed to establish any elements of the test required under the evidentiary rules, any privilege that may have attached to the disputed e-mail was waived.

Case Summary Source: Applied Discovery (free subscription required).

So, what do you think?  Should privilege have been waived or should the plaintiffs have been granted their request for the email to be returned?  Please share any comments you might have or if you’d like to know more about a particular topic.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine Discovery. eDiscoveryDaily is made available by CloudNine Discovery solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscoveryDaily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

eDiscovery Case Law: Another Case with Inadmissible Text Messages

 

Yesterday, we discussed a case – Commonwealth v. Koch, No. 1669-MDA-2010, 2011 Pa. Super. LEXIS 2716 (Sept. 16, 2011) – where a Pennsylvania Superior Court ruled text messages inadmissible, declaring that parties seeking to introduce electronic materials, such as cell phone text messages and email, must be prepared to substantiate their claim of authorship with “circumstantial evidence” that corroborates the sender's identity.  That case is now being appealed to the state Supreme Court.  Today, we have another case – Rodriguez v. Nevada, No. 56413, 2012 WL 1136437 (Nev. Apr. 5, 2012) – where text messages were ruled inadmissible.

In this case, the Nevada Supreme Court found that a lower court abused its discretion in admitting text messages because the State failed to provide sufficient evidence corroborating the identity of the sender. The defendant, Kevin Rodriguez, was found guilty in trial court of multiple counts associated with an attack of a woman in her home. On appeal, he argued that the trial court erred in overruling an objection to the admission of 12 text messages because the state failed to authenticate the messages and the messages constituted inadmissible hearsay.

Citing Commonwealth v. Koch, among other cases, the Nevada Supreme Court found that it is necessary that the identity of the author of the text message be established through corroborating evidence presented. In this case, the state did establish that the victim’s cell phone was stolen during the attack, and that the defendant was in possession of the cell phone prior to being arrested.

The court noted that “Text messages offer new analytical challenges when courts consider their admissibility.  However, those challenges do not require a deviation from basic evidentiary rules applied when determining authentication and hearsay.”  Further noting that “establishing the identity of the author of a text message through the use of corroborating evidence is critical to satisfying the authentication requirement for admissibility", the court concluded that when there has been an objection to admissibility of a text message, “the proponent of the evidence must explain the purpose for which the text message is being offered and provide sufficient direct or circumstantial corroborating evidence of authorship in order to authenticate the text message as a condition precedent to its admission”.

Since the state did not offer any corroborating evidence that the defendant authored 10 of the 12 text messages, those messages were ruled as inadmissible.  The other two messages were deemed admissible and not considered to be hearsay because in those instances, the state was able to present bus surveillance video of the defendant participating in using the phone at the time those two messages were sent. Despite the erroneous admission of the other 10 text messages, however, the Nevada Supreme Court held that the error was harmless as there was a considerable amount of other evidence pointing to the guilt of the defendant.

So, what do you think?  Should text messages be ruled inadmissible without corroborating evidence?  Will cases like this significantly reduce the use of text messages as evidence in litigation?  Please share any comments you might have or if you’d like to know more about a particular topic.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine Discovery. eDiscoveryDaily is made available by CloudNine Discovery solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscoveryDaily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

eDiscovery Case Law: Inadmissibility of Text Messages Being Appealed

 

Last October, we covered a case – Commonwealth v. Koch, No. 1669-MDA-2010, 2011 Pa. Super. LEXIS 2716 (Sept. 16, 2011) – where a Pennsylvania Superior Court ruled text messages inadmissible, declaring that parties seeking to introduce electronic materials, such as cell phone text messages and email, must be prepared to substantiate their claim of authorship with “circumstantial evidence” that corroborates the sender's identity.  That case, where Amy N. Koch was originally convicted at trial on drug charges (partially due to text messages found on her cell phone), is now being appealed to the state Supreme Court.

This article from The Legal Intelligencer regarding the case, notes the following:

“The justices limited the appeal to two issues, leaving the language used by the state intact.

First, the justices will examine whether the text messages “were not offered for their truth” and were therefore admissible. The state questioned whether the Superior Court, in reversing a Cumberland County judge’s decision to admit the texts, had ruled against its own previous holding in another case and thusly created “uncertainty in the law.”

The high court is also tasked with reviewing the case in terms of Pa.R.E. 901, on “Requirement of Authentication or Identification.” According to the Tuesday allocatur grant, prosecutors asked the court to examine whether the Superior Court panel “misapprehended” Rule 901, again going against its own jurisprudence and again creating “uncertainty.”

Despite a victory before the intermediate appellate court, Koch’s attorney called the justice’s decision to take up the case “good news.”

For Camp Hill, Pa., attorney Michael O. Palermo Jr., the challenge represents a chance for the high court to set precedent against electronic documents “blindly coming into evidence.”

“I have a problem with that and I hope the Supreme Court does too,” Palermo told The Legal following the grant of allocatur.”

So, what do you think?  Was the Superior court right in ruling against the admission of these text messages as evidence? Will the State Supreme Court uphold the decision to rule the text messages as inadmissible?  If they do, will that decision create more eDiscovery problems than it solves?  Please share any comments you might have or if you’d like to know more about a particular topic.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine Discovery. eDiscoveryDaily is made available by CloudNine Discovery solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscoveryDaily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.