Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 7 of 7

Full-Text Articles in Law

Hearsay In The Smiley Face: Analyzing The Use Of Emojis As Evidence, Erin Janssen Jun 2018

Hearsay In The Smiley Face: Analyzing The Use Of Emojis As Evidence, Erin Janssen

St. Mary's Law Journal

Abstract forthcoming


Should The Medium Affect The Message? Legal And Ethical Implications Of Prosecutors Reading Inmate-Attorney Email, Brandon P. Ruben Mar 2015

Should The Medium Affect The Message? Legal And Ethical Implications Of Prosecutors Reading Inmate-Attorney Email, Brandon P. Ruben

Fordham Law Review

The attorney-client privilege protects confidential legal communications between a party and her attorney from being used against her, thus encouraging full and frank attorney-client communication. It is a venerable evidentiary principle of American jurisprudence. Unsurprisingly, prosecutors may not eavesdrop on inmate-attorney visits or phone calls or read inmate-attorney postal mail. Courts are currently divided, however, as to whether or not they can forbid prosecutors from reading inmate- attorney email.

This Note explores the cases that address whether federal prosecutors may read inmates’ legal email. As courts have unanimously held, because inmates know that the Bureau of Prisons (BOP) monitors all …


Spoliation Of Electronic Evidence: Sanctions Versus Advocacy, Charles W. Adams Jan 2011

Spoliation Of Electronic Evidence: Sanctions Versus Advocacy, Charles W. Adams

Michigan Telecommunications & Technology Law Review

This Article proposes that courts should refrain from imposing adverse inference jury instructions as sanctions for the spoliation of evidence. This proposal bears some similarity to the approach taken twenty years ago by the 1993 amendments to Rule 11, which constrained courts' ability to sanction. Instead of imposing an adverse jury instruction as a sanction for spoliation of evidence, courts should allow evidence of spoliation to be admitted at trial if a reasonable jury could find that spoliation had occurred and if the spoliation was relevant to a material issue. If a court allows the introduction of evidence of spoliation …


Electronic Discovery Sanctions In The Twenty-First Century, Shira A. Scheindlin, Kachana Wangkeo Oct 2004

Electronic Discovery Sanctions In The Twenty-First Century, Shira A. Scheindlin, Kachana Wangkeo

Michigan Telecommunications & Technology Law Review

At the federal level, the Civil Rules Advisory Committee has responded to the "unique and necessary feature of computer systems--the automatic recycling, overwriting, and alteration of electronically stored information"--with a proposed amendment to Rule 37. The proposed Rule 37(f) would shield litigants from sanctions for the destruction of electronic data if the party "took reasonable steps to preserve the information after it knew or should have known the information was discoverable in the action" and "the failure resulted from the loss of the information because of the routine operation of the party's electronic information system." The safe harbor provision would …


Computer Searches And Seizures: Some Unresolved Issues, Susan W. Brenner, Barbara A. Frederiksen Jun 2002

Computer Searches And Seizures: Some Unresolved Issues, Susan W. Brenner, Barbara A. Frederiksen

Michigan Telecommunications & Technology Law Review

The goal of this article is to illustrate the issues that arise in the context of computer search and seizures by examining several areas in which the application of Fourth Amendment concepts to computer searches and/or seizures can be problematic. In order to illustrate this point, the article will build on a hypothetical. The hypothetical situation assumes law enforcement officers have lawfully obtained a warrant to search for and seize evidence concerning the commission of one or more crimes. It will also be assumed that computer technology played some role in the commission of these crimes, so computer equipment and …


Sender Beware: The Discoverability And Admissibility Of E-Mail, William Decoste Jan 2000

Sender Beware: The Discoverability And Admissibility Of E-Mail, William Decoste

Vanderbilt Journal of Entertainment & Technology Law

This Note will explore the current body of jurisprudence concerning the discoverability and admissibility of e-mail in both the civil and criminal contexts. Beginning with a brief explanation of the relevant forms of information technology and electronic communication, it will examine the common misconceptions that fuel the ongoing imprudent use of e-mail. It will then trace the development of the case law, from the foundational cases that first confronted electronic evidence to recent precedent specifically addressing the various forms of contemporary e-mail. Federal statutory law regulating the acquisition and use of electronic communications will also be discussed. This Note will …


The Costs Of Confidentiality And The Purpose Of Privilege, Melanie B. Leslie Jan 2000

The Costs Of Confidentiality And The Purpose Of Privilege, Melanie B. Leslie

Faculty Articles

No abstract provided.