Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- 5th Amendment (1)
- Authentication (1)
- Catfishing (1)
- Cell phone (1)
- Data (1)
-
- Due process (1)
- ESI (1)
- Electronic evidence (1)
- Evidence (1)
- Evidence Spoliation (1)
- FRCP 37(e) (1)
- Federal Court Discovery (1)
- Federal District Courts (1)
- Fifth (1)
- Hacking (1)
- Information Preservation Duties (1)
- Irreplaceable ESI (1)
- Maryland (1)
- Non-ESI (1)
- Passcodes (1)
- Passwords (1)
- Privacy (1)
- Production (1)
- Replaceable ESI (1)
- Security (1)
- Social Media (1)
- Social Media Evidence (1)
- Spoliation (1)
- State Spoliation Claims (1)
- Texas (1)
Articles 1 - 5 of 5
Full-Text Articles in Evidence
State Spoliation Claims In Federal District Courts, Jeffrey A. Parness
State Spoliation Claims In Federal District Courts, Jeffrey A. Parness
Catholic University Law Review
The increasing amounts of electronically stored information (ESI) relevant to civil litigation, and the ease of their loss, caused federal lawmakers explicitly to address the possible consequences of certain pre-suit or post-suit ESI losses. These lawmakers acted in both 2006 and 2015 through Federal Civil Procedure (FRCP) 37(e). But they acted only on certain ESI. Their actions have prompted increasing attention to the significant risks of pre-suit and post-suit losses of all ESI, and of non-ESI, otherwise discoverable in civil actions. In addition, their actions have spurred increasing attention to the availability of substantive law claims involving spoliation of information …
Passcodes, Protection, And Legal Practicality: The Necessity Of A Digital Fifth Amendment, Ethan Swierczewski
Passcodes, Protection, And Legal Practicality: The Necessity Of A Digital Fifth Amendment, Ethan Swierczewski
Catholic University Journal of Law and Technology
No abstract provided.
You Can't Trust Everything On The Internet: A Look Into Texas' And Maryland's Approach Of Social Media Authentication, Danielle Orr
You Can't Trust Everything On The Internet: A Look Into Texas' And Maryland's Approach Of Social Media Authentication, Danielle Orr
Catholic University Journal of Law and Technology
If unauthenticated evidence is admitted into the court's record, and makes a defendant’s charge more probable, that defendant’s Fifth and Fourteenth Amendment rights to life and liberty have been violated. Social media evidence, due to the ease of hacking and catfishing, can be unreliable, thus Maryland and Texas have led the way, with two respective approaches, on how to handle such evidence. Maryland, with its proscribed three authentication methods, has a less trusting view of social media, and realizes the dangers wrongfully entered evidence may have on a defendant’s due process. Alternatively, Texas has not heighten scrutiny on social media …
The Connected State Of Things: A Lawyer’S Survival Guide In An Internet Of Things World, Antigone Peyton
The Connected State Of Things: A Lawyer’S Survival Guide In An Internet Of Things World, Antigone Peyton
Catholic University Journal of Law and Technology
No abstract provided.
Wearable Devices As Admissible Evidence: Technology Is Killing Our Opportunity To Lie, Nicole Chauriye
Wearable Devices As Admissible Evidence: Technology Is Killing Our Opportunity To Lie, Nicole Chauriye
Catholic University Journal of Law and Technology
No abstract provided.