Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Authentication

Discipline
Institution
Publication Year
Publication
Publication Type

Articles 1 - 30 of 33

Full-Text Articles in Law

Authentication Of Cybernetic Avatars And Legal System Challenges; With A View To The Trial Concept Of New Dimensional Domain Jurisprudence (Ai, Robot, And Avatar Law), Fumio Shimpo Mar 2024

Authentication Of Cybernetic Avatars And Legal System Challenges; With A View To The Trial Concept Of New Dimensional Domain Jurisprudence (Ai, Robot, And Avatar Law), Fumio Shimpo

Japanese Society and Culture

This article aims to illustrate the basis for the development of authentication, which will be the foundation of future cybernetic-avatar (CA) infrastructures, enabling the safe and secure use of CA’s. This will be realised by the authentication of CA operators (User Authentication Technology), identification and authentication of CA’s (CA Authentication), and ensuring connectivity and existence between operators (User Entities) and the CA’s themselves (CA Notarisation). An ELSI (Ethical, Legal, Social Implications) research platform will be established, to develop a new dimension of the legal field, that is, AI, Robot, and Avatar Law to solve the social issues and realise an …


The Threat Of Deepfakes In Litigation: Raising The Authentication Bar To Combat Falsehood, Agnieszka Mcpeak Feb 2021

The Threat Of Deepfakes In Litigation: Raising The Authentication Bar To Combat Falsehood, Agnieszka Mcpeak

Vanderbilt Journal of Entertainment & Technology Law

Deepfakes are all over the internet—from shape-shifting comedians and incoherent politicians to disturbingly realistic fake pornography. Emerging technology makes it easier than ever to create a convincing deepfake. What used to take significant time and money to develop is now widely available, often for free, thanks to rapid advances in deepfake technology.

Deepfakes threaten individual rights and even democracy. But their impact on litigation should not be overlooked. The US adversarial system of justice is built on a foundation of seeking out the truth to arrive at a just result. The Federal Rules of Evidence serve as an important framework …


You Can't Trust Everything On The Internet: A Look Into Texas' And Maryland's Approach Of Social Media Authentication, Danielle Orr Jan 2021

You Can't Trust Everything On The Internet: A Look Into Texas' And Maryland's Approach Of Social Media Authentication, Danielle Orr

Catholic University Journal of Law and Technology

If unauthenticated evidence is admitted into the court's record, and makes a defendant’s charge more probable, that defendant’s Fifth and Fourteenth Amendment rights to life and liberty have been violated. Social media evidence, due to the ease of hacking and catfishing, can be unreliable, thus Maryland and Texas have led the way, with two respective approaches, on how to handle such evidence. Maryland, with its proscribed three authentication methods, has a less trusting view of social media, and realizes the dangers wrongfully entered evidence may have on a defendant’s due process. Alternatively, Texas has not heighten scrutiny on social media …


Civil Law Specifics Of Transactions In E-Commerce, A.A. Yakoenko Dec 2018

Civil Law Specifics Of Transactions In E-Commerce, A.A. Yakoenko

Review of law sciences

the essence and significance of transactions in electronic commerce are characterized, the features and the order of their conclusion are shown, problems and legal conflicts arising during electronic data exchange are revealed


Revenge Porn, Thomas Lonardo, Tricia P. Martland, Rhode Island Bar Journal Nov 2018

Revenge Porn, Thomas Lonardo, Tricia P. Martland, Rhode Island Bar Journal

Life of the Law School (1993- )

No abstract provided.


Legal Information Management In A Global And Digital Age: Revolution And Tradition, Claire M. Germain Sep 2017

Legal Information Management In A Global And Digital Age: Revolution And Tradition, Claire M. Germain

Claire Germain

This article presents an overview of the public policy issues surrounding digital libraries, and describes some current trends, such as Web 2.0, the social network. It discusses the impact of globalization and the Internet on international and foreign law information, the free access to law movement and open access scholarship, and mass digitization projects, then turns to some concerns, focusing on preservation and long term access to born digital legal information and authentication of official digital legal information. It finally discusses new roles for librarians, called upon to evaluate the quality of information teach legal research methodology and be advocates …


Authentication And Hearsay: Which Trumps?, Stephen A. Saltzburg Jan 2015

Authentication And Hearsay: Which Trumps?, Stephen A. Saltzburg

GW Law Faculty Publications & Other Works

This article addresses the relationship between two federal rules of evidence: Rules 104(a) and 104(b) and which standards a trial judge should apply in admitting hearsay evidence when its authentication is in question. Focusing on United States v. Harvey, 117 F.3d 1044 (7th Circ. 1997) and a simple hypothetical, the article concludes that evidence must be authenticated under Rule 104(b) as well as satisfying the hearsay rule and Rule 104(a).


Should The Ftc Kill The Password? The Case For Better Authentication, Daniel J. Solove, Woodrow Hartzog Jan 2015

Should The Ftc Kill The Password? The Case For Better Authentication, Daniel J. Solove, Woodrow Hartzog

GW Law Faculty Publications & Other Works

Data security breaches are occurring at an alarming frequency, and one of the main causes involves problems authenticating the identity of account holders. The most common approach to authentication is the use of passwords, but passwords are a severely flawed means of authentication. People are being asked to do a nearly impossible task – create unique, long, and complex passwords for each of the numerous accounts they hold, change them frequently, and remember them all. People do very poorly in following these practices, and even if they manage to do so, hackers and phishers can readily trick people into revealing …


Evidentiary Power And Propriety Of Digital Identifiers And The Impact On Privacy Rights In The United States, Michael Losavio, Deborah Keeling Jan 2014

Evidentiary Power And Propriety Of Digital Identifiers And The Impact On Privacy Rights In The United States, Michael Losavio, Deborah Keeling

Journal of Digital Forensics, Security and Law

Media and network systems capture and store data about electronic activity in new, sometimes unprecedented ways; computational systems make for new means of analysis and knowledge development. These new forms offer new, powerful tactical tools for investigations of electronic malfeasance under traditional legal regulation of state power, particular that of Fourth Amendment limitations on police searches and seizures under the U.S. Constitution. But autonomy, identity and authenticity concerns with electronic data raise issues of public policy, privacy and proper police oversight of civil society. We examine those issues and their implications for digital and computational forensics


Uelma - Another First For Colorado, Susan Nevelow Mart Jan 2014

Uelma - Another First For Colorado, Susan Nevelow Mart

Publications

No abstract provided.


Friends, Gangbangers, Custody Disputants, Lend Me Your Passwords, Aviva Orenstein Jan 2012

Friends, Gangbangers, Custody Disputants, Lend Me Your Passwords, Aviva Orenstein

Articles by Maurer Faculty

Whenever parties seek to introduce out-of-court statements, evidentiary issues of hearsay and authentication will arise. As methods of communication expand, the Rules of Evidence must necessarily keep pace. The rules remain essentially the same, but their application vary with new modes of communication. Evidence law has been very adaptable in some ways, and notoriously conservative, even stodgy, in others. Although statements on Facebook and other social media raise some interesting questions concerning the hearsay rule and its exceptions, there has been little concern about applying the hearsay doctrine to such forms of communication. By contrast, such new media have triggered …


Processing Civil Rights Summary Judgment And Consumer Discrimination Claims, Deseriee A. Kennedy Apr 2011

Processing Civil Rights Summary Judgment And Consumer Discrimination Claims, Deseriee A. Kennedy

Deseriee A. Kennedy

No abstract provided.


The Virtues Of Common Law Theories And Disclosure Requirements In The Market For Fine Art, Brian D. Tobin Jan 2011

The Virtues Of Common Law Theories And Disclosure Requirements In The Market For Fine Art, Brian D. Tobin

Student Articles and Papers

For centuries common law warranties and fraud theories have regulated misattribution and mistaken provenance in the market for fine art. Scholars have in recent decades proposed theories to supplement protection for unsophisticated buyers transacting with auction houses or dealers. Academia has also proposed the imposition of securities regulations upon auction houses for the purpose of protecting sellers—an argument that can be extended to protect buyers transacting with either auction houses or dealerships. In practice, the theories put forth to protect purchasers may not have an added benefit and will likely disrupt liquidity. The extension of regulations akin to the securities …


Writings On The Wall: The Need For An Authorship-Centric Approach To The Authentication Of Social-Networking Evidence, Ira P. Robbins Dec 2010

Writings On The Wall: The Need For An Authorship-Centric Approach To The Authentication Of Social-Networking Evidence, Ira P. Robbins

Ira P. Robbins

People are stupid when it comes to their online postings. The recent spate of
social-networking websites has shown that people place shocking amounts of
personal information online. Unlike more traditional modes of communication, the
unique nature of these websites allows users to hide behind a veil of anonymity.
But while social-networking sites may carry significant social benefits, they also
leave users—and their personal information—vulnerable to hacking and other
forms of abuse. This vulnerability is playing out in courtrooms across the country
and will only increase as social-networking use continues to proliferate.
This Article addresses the evidentiary hurdle of authenticating socialnetworking …


Legal Research In The Digital Age: Authentication And Preservation Of Primary Material, Matt Novak Jan 2010

Legal Research In The Digital Age: Authentication And Preservation Of Primary Material, Matt Novak

Marvin and Virginia Schmid Law Library

Most legal professionals have used free online resources to help in the legal research process. Whether it is an opinion downloaded from a court's Web site, a federal statute located using Cornell's Legal Information Institute (LII), an article on Wikipedia, or a post on someone's blawg, the quantity and variety of free online resources seems to grow on a daily basis. Some have even wondered if these resources can one day replace the need to subscribe to a computer-assisted legal research (CALR) service such as Westlaw or LexisNexis. Late last year, the "blogosphere" was abuzz with this question after Google …


Voodoo Information: Authenticating Web Pages In Federal Court, M. Anderson Berry, David Kiernan Jan 2010

Voodoo Information: Authenticating Web Pages In Federal Court, M. Anderson Berry, David Kiernan

M. Anderson Berry

For many litigators, one of the first things they do is see what is available about the opposing party, searching Google, social networking sites and the party’s websites. And during the life of the case, there will likely be other valuable information obtained from the Internet that will be used at deposition or trial. Commonly, the proponent of online evidence will present a “screen shot” of the webpage, which was either downloaded as a .pdf or printed directly from the website. If proper steps are not taken to admit the evidence, the value of this information may be lost.

As …


Should You Use It? Tips On Authenticating Online Legal Sources, Emily M. Janoski-Haehlen Jun 2009

Should You Use It? Tips On Authenticating Online Legal Sources, Emily M. Janoski-Haehlen

Law Faculty Publications

No abstract provided.


Even Better Than The Real Thing: How Courts Have Been Anything But Liberal In Finding Genuine Questions Raised As To The Authenticity Of Originals Under Rule 1003, Colin Miller Mar 2008

Even Better Than The Real Thing: How Courts Have Been Anything But Liberal In Finding Genuine Questions Raised As To The Authenticity Of Originals Under Rule 1003, Colin Miller

Colin Miller

In the common law days, parties seeking to prove the contents of documents were required to produce the original documents or account for their nonproduction. Pursuant to the Best Evidence Rule, if such parties neither produced the originals nor accounted for their nonproduction, courts prevented them from proving their contents through secondary evidence such as handwritten copies or testimony. With the invention of new technologies such as the process of xerography, however, states in the twentieth century began enacting exceptions to the Best Evidence Rule which allowed for the admission of duplicates created without manual transcription even when proponents could …


Legal Information Management In A Global And Digital Age: Revolution And Tradition, Claire M. Germain Jan 2007

Legal Information Management In A Global And Digital Age: Revolution And Tradition, Claire M. Germain

UF Law Faculty Publications

This article presents an overview of the public policy issues surrounding digital libraries, and describes some current trends, such as Web 2.0, the social network. It discusses the impact of globalization and the Internet on international and foreign law information, the free access to law movement and open access scholarship, and mass digitization projects, then turns to some concerns, focusing on preservation and long term access to born digital legal information and authentication of official digital legal information. It finally discusses new roles for librarians, called upon to evaluate the quality of information teach legal research methodology and be advocates …


Authentication And The Best And Secondary Evidence Rules, Miguel A. Mendez Jan 2006

Authentication And The Best And Secondary Evidence Rules, Miguel A. Mendez

University of San Francisco Law Review

This article examines the requirements to introduce writings into evidence: authentication, the best and secondary evidence rules, and the completeness doctrine. It also highlights the differences between the California rules and federal rules as they relate to authentication of writings.


Processing Civil Rights Summary Judgment And Consumer Discrimination Claims, Deseriee A. Kennedy Jan 2004

Processing Civil Rights Summary Judgment And Consumer Discrimination Claims, Deseriee A. Kennedy

Scholarly Works

No abstract provided.


Digital Legal Information: Ensuring Access To The "Official" Word Of The Law, Claire M. Germain Jul 1999

Digital Legal Information: Ensuring Access To The "Official" Word Of The Law, Claire M. Germain

UF Law Faculty Publications

In the United States today, digital versions of current decisions, bills, statutes, and regulations issued by federal and state entities are widely available on publicly accessible Internet Web sites. Worldwide, official legal information issued by international organizations and foreign governments is also becoming available on the Web. However, there are currently no standards for the production and authentication of digital documents. Moreover, the information is sometimes available only for a short time and then disappears from the site. Most of that digital information provides only a right of access, and no ownership, or control over the data, unless it is …


Diogenes Wanders The Superhighway: A Proposal For Authentication Of Publicly Disseminated Documents On The Internet, Kelly Kunsch Jan 1997

Diogenes Wanders The Superhighway: A Proposal For Authentication Of Publicly Disseminated Documents On The Internet, Kelly Kunsch

Seattle University Law Review

On the national level, there are proposals to make the Internet the primary, and even the exclusive, means of disseminating certain government information. Concurrently, corporations and other private organizations may adopt a similar approach for their reports and other documents. Intertwined with these official and quasi-official documents are innumerable others created by individuals around the world. With so many documents, there is potential for dissemination of false, biased, and even fraudulent information. This is the source of the authentication problem.


Rule 901: Requirement Of Authentication Or Identification Jan 1996

Rule 901: Requirement Of Authentication Or Identification

Touro Law Review

No abstract provided.


Conditional Probative Value And The Reconstruction Of The Federal Rules Of Evidence, Dale A. Nance Nov 1995

Conditional Probative Value And The Reconstruction Of The Federal Rules Of Evidence, Dale A. Nance

Michigan Law Review

In a recent article, Richard Friedman articulates a modified and generalized version of the doctrine of conditional relevance, which he calls "conditional probative value." This version comes in response to a substantial body of academic criticism of the traditional doctrine. As one of the critics to whom Professor Friedman responds, I offer this reply with two purposes in mind: (1) to clarify the relationship between Friedman's analysis and my earlier reinterpretation of the conditional relevance doctrine; and (2) to address Friedman's specific proposals with regard to the Federal Rules of Evidence. I conclude that Friedman's articulation helps clarify the logic …


Refining Conditional Probative Value, Richard D. Friedman Jan 1995

Refining Conditional Probative Value, Richard D. Friedman

Articles

The subject of conditional relevance, or what I think is better called "conditional probative value," must seem hopelessly ard to many. It continues to engage the attention of evidence scholars, however, because it forms part of the conceptual underpinnings of many parts of evidentiary law. Dale'Nance, one of the most astute evidence scholars of our time, has previously written at length on the subject' and has done so now more briefly in response to an article of mine. I offer an even briefer continuation of the discussion.


Scope Of The Uniform Commercial Code: Advances In Technology And Survey Of Computer Contracting Cases, Harold R. Weinberg, Ameila H. Boss, William J. Woodward Jr. Aug 1993

Scope Of The Uniform Commercial Code: Advances In Technology And Survey Of Computer Contracting Cases, Harold R. Weinberg, Ameila H. Boss, William J. Woodward Jr.

Law Faculty Scholarly Articles

Since the 1940s, the technology revolution has enabled people to communicate electronically. Sitting at a computer terminal connected to a modem and a telephone wire, it is possible to send a message anywhere in the country (or throughout the world)—to another computer, to a telecopy or telefax machine, even to a telephone. Paper is being replaced by electronic signals as a mode of communication. This revolution calls into question some of the fundamental rules upon which our contracts and the U.C.C. were built. On a broader scale, electronic communication raises issues that include the rights and responsibilities of providers and …


Authentication, Paul C. Giannelli Jan 1991

Authentication, Paul C. Giannelli

Faculty Publications

No abstract provided.


Evidence, David A. Schlueter Jan 1991

Evidence, David A. Schlueter

Faculty Articles

This article addresses some of the more significant evidence cases decided by the Fifth Circuit during the survey period.' Before turning to the cases themselves, it is important to note at the outset that like other federal courts, the Fifth Circuit is generally not inclined to reverse a case on an evidentiary error. It should not be surprising then that in most of the cases which follow, the court implicitly deferred to the decision of the trial judge in deciding whether a certain piece of evidence was admissible.


Evidence, Fifth Circuit Symposium, David A. Schlueter Jan 1990

Evidence, Fifth Circuit Symposium, David A. Schlueter

Faculty Articles

This article reviews decisions by the United States Court of Appeals for the Fifth Circuit on evidence issues and concludes that if an attorney has any hopes of obtaining appellate relief on an evidentiary issue, it is essential that the issues be presented concisely and completely to the trial court. The appellate courts will not reverse an evidentiary ruling of a trial court, even if the trial court has erred. This deference to the trial court is in recognition of the hundreds of rulings on evidence that the trial court must conduct within the course of a trial. In order …