Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Electronic evidence

Discipline
Institution
Publication Year
Publication
Publication Type

Articles 1 - 30 of 30

Full-Text Articles in Law

Kekuatan Pembuktian Alat Bukti Elektronik Dalam Hukum Acara Perdata, Disriani Latifah Soroinda, Anandri Annisa Rininta Soroinda Nasution Jun 2022

Kekuatan Pembuktian Alat Bukti Elektronik Dalam Hukum Acara Perdata, Disriani Latifah Soroinda, Anandri Annisa Rininta Soroinda Nasution

Jurnal Hukum & Pembangunan

The development of digital technology and information technology is happening very rapidly, computer systems are getting more sophisticated and internet access is getting easier making technology a part of people's daily lives, the existence of documents and or electronic information has now become a common thing. How does the Indonesian Civil Procedure Law regulates documents and or electronic information as an evidence and how does the law regulates the recognition, the validity and the strength of that evidence in the trials in order to create legal certainty for the people seeking justice.


You Can't Trust Everything On The Internet: A Look Into Texas' And Maryland's Approach Of Social Media Authentication, Danielle Orr Jan 2021

You Can't Trust Everything On The Internet: A Look Into Texas' And Maryland's Approach Of Social Media Authentication, Danielle Orr

Catholic University Journal of Law and Technology

If unauthenticated evidence is admitted into the court's record, and makes a defendant’s charge more probable, that defendant’s Fifth and Fourteenth Amendment rights to life and liberty have been violated. Social media evidence, due to the ease of hacking and catfishing, can be unreliable, thus Maryland and Texas have led the way, with two respective approaches, on how to handle such evidence. Maryland, with its proscribed three authentication methods, has a less trusting view of social media, and realizes the dangers wrongfully entered evidence may have on a defendant’s due process. Alternatively, Texas has not heighten scrutiny on social media …


Electron Documents As Evidence Source Of Civil Procedural And Economic Procedural Law, O Pirmatov Sep 2018

Electron Documents As Evidence Source Of Civil Procedural And Economic Procedural Law, O Pirmatov

Review of law sciences

This article studies the distinguishing pecularities of electronic documents from simple written evidences, the problems of evaluating electronic documents in pursuiting the civil and economic cases. The improvement of electronic documents is considered in the acting legislative acts.


Electron Documents As Evidence Source Of Civil Procedural And Economic Procedural Law, O Pirmatov Sep 2018

Electron Documents As Evidence Source Of Civil Procedural And Economic Procedural Law, O Pirmatov

Review of law sciences

This article studies the distinguishing pecularities of electronic documents from simple written evidences, the problems of evaluating electronic documents in pursuiting the civil and economic cases. The improvement of electronic documents is considered in the acting legislative acts.


Authenticating Digital Evidence, Paul W. Grimm, Daniel J. Capra, Gregory P. Joseph Jan 2017

Authenticating Digital Evidence, Paul W. Grimm, Daniel J. Capra, Gregory P. Joseph

Faculty Scholarship

No abstract provided.


Cross-Border Evidence Gathering In Transnational Crime Cases: Is The Microsoft Ireland Case The ‘Next Frontier'?, Robert Currie Jan 2016

Cross-Border Evidence Gathering In Transnational Crime Cases: Is The Microsoft Ireland Case The ‘Next Frontier'?, Robert Currie

Articles, Book Chapters, & Popular Press

A recent and prominent American appeals court case has revived a controversial international law question: can a state compel an individual on its territory to obtain and produce material which the individual owns or controls, but which is stored on the territory of a foreign state? The case involved, United States v. Microsoft, features electronic data stored offshore which was sought in the context of a criminal prosecution. It highlights the current legal complexity surrounding the cross-border gathering of electronic evidence, which has produced friction and divergent state practice. The author here contends that the problems involved are best understood—and …


Back To The Future: Lorraine V. Markel American Insurance Co. And New Findings On The Admissibility Of Electronically Stored Information, Hon. Paul W. Grimm, Michael V. Ziccardi Esq., Alexander W. Major Esq. Jun 2015

Back To The Future: Lorraine V. Markel American Insurance Co. And New Findings On The Admissibility Of Electronically Stored Information, Hon. Paul W. Grimm, Michael V. Ziccardi Esq., Alexander W. Major Esq.

Akron Law Review

Imagine the following hypothetical, patterned on an actual case pending in federal court, and you can begin to appreciate why there is a growing awareness of the need to have clear analytical thinking regarding the admissibility of electronically stored information, variously referred to as “ESI,” “digital,” “electronic,” “computer generated,” or “computer stored” evidence in state and federal courts. ConsumerPro is a corporation that provides installment credit to consumers with poor or un-established credit records to enable them to purchase on credit expensive electronic and computer products like flat screen televisions, computers, and entertainment systems. Under their business plan, a purchaser …


Tethered To The Statute: How The Third Circuit’S Narrow Interpretation Of 28 U.S.C. § 1920(4) Will Shape The Future Of Cost-Shifting And E-Discovery For The Better, Jason L. Callaway Jan 2014

Tethered To The Statute: How The Third Circuit’S Narrow Interpretation Of 28 U.S.C. § 1920(4) Will Shape The Future Of Cost-Shifting And E-Discovery For The Better, Jason L. Callaway

Oklahoma Law Review

No abstract provided.


Our Records Panopticon And The American Bar Association Standards For Criminal Justice, Stephen E. Henderson Jan 2014

Our Records Panopticon And The American Bar Association Standards For Criminal Justice, Stephen E. Henderson

Oklahoma Law Review

“Secrets are lies. Sharing is caring. Privacy is theft.” So concludes the main character in Dave Egger’s novel, The Circle, in which a single company that unites Google, Facebook, and Twitter—and on steroids—has the ambition not only to know, but also to share, all of the world’s information. It is telling that a current dystopian novel features not the government in the first instance, but instead a private third party that, through no act of overt coercion, knows so much about us. This is indeed the greatest risk to privacy in our day, both the unprecedented, massive collection and retention …


Digital Forensic Evidence: Legislative And Judicial Policies Developed In Uk, Usa And India, Nalini Ambad, Sukdeo Ingale Jan 2013

Digital Forensic Evidence: Legislative And Judicial Policies Developed In Uk, Usa And India, Nalini Ambad, Sukdeo Ingale

Sukdeo Ingale

This paper speaks about the legislative and judicial policies developed in UK, USA and India about Digital Forensic Evidence in prosecuting criminals under Court of Law. As Digital Forensic Evidence is not subject to any omission and commission, and there is no possibility of turning hostile, it should be given utmost importance in prosecuting criminals. But as in comparison to other forensic sciences, the field of computer forensics/digital forensics is relatively very young, many people do not understand what the term computer forensics/ digital forensics means and what techniques are involved in it. In particular, there is a lack of …


Admissions Online: Statements Of A Party Opponent In The Internet Age, Dylan Charles Edwards Jan 2013

Admissions Online: Statements Of A Party Opponent In The Internet Age, Dylan Charles Edwards

Oklahoma Law Review

No abstract provided.


Educating For The Future: Teaching Evidence In The Technological Age, Denise H. Wong Jan 2013

Educating For The Future: Teaching Evidence In The Technological Age, Denise H. Wong

Research Collection Yong Pung How School Of Law

The advent of the technological age has had significant effect on litigation practice, none more so than in the area of evidence gathering and presentation in court. A significant proportion of evidence that is gathered for both criminal and civil matters is now electronic in nature, and this necessitates a change in the way that lawyers think and advise on evidential issues. It is argued here that rather than simply focusing on principles relating to the admissibility of evidence in court, the traditional course on evidence law should be modified to equip students with an intellectual framework that conceives of …


The Promise Of A Cooperative And Proportional Discovery Process In North Carolina: House Bill 380 And The New State Electronic Discovery Rules, Brian C. Vick, Neil C. Magnuson Jan 2012

The Promise Of A Cooperative And Proportional Discovery Process In North Carolina: House Bill 380 And The New State Electronic Discovery Rules, Brian C. Vick, Neil C. Magnuson

Campbell Law Review

Using the experience of the federal courts under the 2006 Amendments as a guide, this Article examines H.B. 380 and the effect it will have on the discovery process in the state courts. Part I of this Article describes the litigation challenges created by the proliferation of ESI. Part II describes the history, structure and substance of the 2006 Amendments, and discusses their impact in the areas of cooperation and the use of proportionality principles in the federal courts. Part III describes the substance and structure of the rules changes encompassed by H.B. 380, and analyzes the effect that they …


Extraction Of Electronic Evidence From Voip: Identification & Analysis Of Digital Speech, David Irwin, Arek Dadej, Jill Slay Jan 2012

Extraction Of Electronic Evidence From Voip: Identification & Analysis Of Digital Speech, David Irwin, Arek Dadej, Jill Slay

Journal of Digital Forensics, Security and Law

The Voice over Internet Protocol (VoIP) is increasing in popularity as a cost effective and efficient means of making telephone calls via the Internet. However, VoIP may also be an attractive method of communication to criminals as their true identity may be hidden and voice and video communications are encrypted as they are deployed across the Internet. This produces a new set of challenges for forensic analysts compared with traditional wire-tapping of the Public Switched Telephone Network (PSTN) infrastructure, which is not applicable to VoIP. Therefore, other methods of recovering electronic evidence from VoIP are required. This research investigates the …


First Department Adopts Zubulake In The Electronic Discovery Context, Justice Sallie Manzanet-Daniels Jan 2012

First Department Adopts Zubulake In The Electronic Discovery Context, Justice Sallie Manzanet-Daniels

Hofstra Law Review

No abstract provided.


Electronic Evidence In Canada, Robert Currie, Steve Coughlan Jan 2012

Electronic Evidence In Canada, Robert Currie, Steve Coughlan

Articles, Book Chapters, & Popular Press

This chapter discusses the issues surrounding electronic evidence in Canada. Topics discussed include the best evidence rule, electronic signatures, web-based evidence, and video-tape and security camera evidence. In addition rules around protection of privacy, discovery, and confidentiality are pursued. Finally the chapter also considers the many issues which arise around gathering electronic evidence in the criminal context, including wiretaps, general warrants, and searches of computers and cell phones.


Spoliation Of Electronic Evidence: Sanctions Versus Advocacy, Charles W. Adams Jan 2011

Spoliation Of Electronic Evidence: Sanctions Versus Advocacy, Charles W. Adams

Michigan Telecommunications & Technology Law Review

This Article proposes that courts should refrain from imposing adverse inference jury instructions as sanctions for the spoliation of evidence. This proposal bears some similarity to the approach taken twenty years ago by the 1993 amendments to Rule 11, which constrained courts' ability to sanction. Instead of imposing an adverse jury instruction as a sanction for spoliation of evidence, courts should allow evidence of spoliation to be admitted at trial if a reasonable jury could find that spoliation had occurred and if the spoliation was relevant to a material issue. If a court allows the introduction of evidence of spoliation …


Extraction Of Electronic Evidence From Voip: Forensic Analysis Of A Virtual Hard Disk Vs Ram, David Irwin, Jill Slay, Arek Dadej, Malcolm Shore Jan 2011

Extraction Of Electronic Evidence From Voip: Forensic Analysis Of A Virtual Hard Disk Vs Ram, David Irwin, Jill Slay, Arek Dadej, Malcolm Shore

Journal of Digital Forensics, Security and Law

The popularity of Voice over the Internet Protocol (VoIP) is increasing as the cost savings and ease of use is realised by a wide range of home and corporate users. However, the technology is also attractive to criminals. This is because VoIP is a global telephony service, in which it is difficult to verify the user’s identification. The security of placing such calls may also be appealing to criminals, as many implementations use strong encryption to secure both the voice payload as well as to control messages making monitoring such VoIP calls difficult since conventional methods such as wire-tapping is …


Sanctions For E-Discovery Violations: By The Numbers, Dan H. Willoughby Jr., Rose Hunter Jones, Gregory R. Antine Dec 2010

Sanctions For E-Discovery Violations: By The Numbers, Dan H. Willoughby Jr., Rose Hunter Jones, Gregory R. Antine

Duke Law Journal

This Article reviews our comprehensive survey of written opinions from cases in federal courts prior to January 1, 2010, involving motions for sanctions relating to the discovery of electronically stored information (ESI) We analyzed each case for various factors, including date, court, type of case, sanctioning authority, sanctioned party, sanctioned misconduct, sanction type, sanctions to counsel, if any, and the protections provided from sanctions by Federal Rule of Civil Procedure 37(e) The survey identified 401 sanction cases and 230 sanction awards and showed that sanction motions and awards have increased over time, particularly in the last five years Sanctions against …


Discovering A Better Way: The Need For Effective Civil Litigation Reform, John H. Beisner Dec 2010

Discovering A Better Way: The Need For Effective Civil Litigation Reform, John H. Beisner

Duke Law Journal

This Article addresses the myriad problems posed by unfettered discovery in the United States Rather than promoting fairness and efficiency in the American legal system, plaintiffs today often use discovery in an abusive and vexatious manner to coerce defendants into accepting quick settlements Over the past several decades, discovery has expanded in both scope and magnitude such that discovery costs now account for at least half of the total litigation costs in any given case The advent of electronic discovery has only exacerbated the problem, given the sheer number of electronic documents generated in the course of business and the …


'Canada' In Electronic Evidence, Steve Coughlan Jan 2010

'Canada' In Electronic Evidence, Steve Coughlan

Articles, Book Chapters, & Popular Press

Canada is a bilingual and bi-jurisdictional country. Most provinces and territories are mainly English speaking and have common law as the basis for their legal system. The exception is the province of Quebec which is governed by civil law and where the majority speaks French. However, it must be noted that Quebec civil law has been substantially affected by common law, in particular with respect to discovery rules. The latter are closer to common law discovery rules than they are from, for instance, French civil law. Another important factor for the review of the management of digital evidence in Canada …


Electronically Stored Information: A Primer For Litigators, Jules Epstein Jan 2009

Electronically Stored Information: A Primer For Litigators, Jules Epstein

Jules Epstein

No abstract provided.


Development Of An Ontology Based Forensic Search Mechanism: Proof Of Concept, Jill Slay, Fiona Schulz Jan 2006

Development Of An Ontology Based Forensic Search Mechanism: Proof Of Concept, Jill Slay, Fiona Schulz

Journal of Digital Forensics, Security and Law

This paper examines the problems faced by Law Enforcement in searching large quantities of electronic evidence. It examines the use of ontologies as the basis for new forensic software filters and provides a proof of concept tool based on an ontological design. It demonstrates that efficient searching is produced through the use of such a design and points to further work that might be carried out to extend this concept.


Electronic Discovery Sanctions In The Twenty-First Century, Shira A. Scheindlin, Kachana Wangkeo Oct 2004

Electronic Discovery Sanctions In The Twenty-First Century, Shira A. Scheindlin, Kachana Wangkeo

Michigan Telecommunications & Technology Law Review

At the federal level, the Civil Rules Advisory Committee has responded to the "unique and necessary feature of computer systems--the automatic recycling, overwriting, and alteration of electronically stored information"--with a proposed amendment to Rule 37. The proposed Rule 37(f) would shield litigants from sanctions for the destruction of electronic data if the party "took reasonable steps to preserve the information after it knew or should have known the information was discoverable in the action" and "the failure resulted from the loss of the information because of the routine operation of the party's electronic information system." The safe harbor provision would …


Gaining/Losing Perspective On The Law, Or Keeping Digital Evidence In Perspective, Christopher J. Buccafusco Jan 2004

Gaining/Losing Perspective On The Law, Or Keeping Digital Evidence In Perspective, Christopher J. Buccafusco

Faculty Scholarship

No abstract provided.


Marking Carnivore's Territory: Rethinking Pen Registers On The Internet, Anthony E. Orr Jun 2002

Marking Carnivore's Territory: Rethinking Pen Registers On The Internet, Anthony E. Orr

Michigan Telecommunications & Technology Law Review

"Carnivore" entered the online world's collective consciousness in June 2000 when the Federal Bureau of Investigation unveiled the Internet surveillance software program to telecommunications industry specialists. The FBI claims the program allows agents to scan the traffic of an Internet Service Provider (ISP) for messages or commands to or from a criminal suspect and then intercept only those messages, capturing copies of e-mails, web site downloads and other file transfers[...] A central issue in the controversy surrounding Carnivore is whether current law permits the FBI to employ the program in the Internet context. Bureau officials claim statutory authority for deployments …


Computer Searches And Seizures: Some Unresolved Issues, Susan W. Brenner, Barbara A. Frederiksen Jun 2002

Computer Searches And Seizures: Some Unresolved Issues, Susan W. Brenner, Barbara A. Frederiksen

Michigan Telecommunications & Technology Law Review

The goal of this article is to illustrate the issues that arise in the context of computer search and seizures by examining several areas in which the application of Fourth Amendment concepts to computer searches and/or seizures can be problematic. In order to illustrate this point, the article will build on a hypothetical. The hypothetical situation assumes law enforcement officers have lawfully obtained a warrant to search for and seize evidence concerning the commission of one or more crimes. It will also be assumed that computer technology played some role in the commission of these crimes, so computer equipment and …


Big Brother And A Little Black Box: The Effect Of Scientific Evidence On Privacy Rights, David Uris Jan 2002

Big Brother And A Little Black Box: The Effect Of Scientific Evidence On Privacy Rights, David Uris

Santa Clara Law Review

No abstract provided.


State Gladiators Go High Tech With Records--Will The Feds Follow?, Daniel R. Murray, Timothy J. Chorvat Jan 2001

State Gladiators Go High Tech With Records--Will The Feds Follow?, Daniel R. Murray, Timothy J. Chorvat

Oklahoma Law Review

No abstract provided.


Sender Beware: The Discoverability And Admissibility Of E-Mail, William Decoste Jan 2000

Sender Beware: The Discoverability And Admissibility Of E-Mail, William Decoste

Vanderbilt Journal of Entertainment & Technology Law

This Note will explore the current body of jurisprudence concerning the discoverability and admissibility of e-mail in both the civil and criminal contexts. Beginning with a brief explanation of the relevant forms of information technology and electronic communication, it will examine the common misconceptions that fuel the ongoing imprudent use of e-mail. It will then trace the development of the case law, from the foundational cases that first confronted electronic evidence to recent precedent specifically addressing the various forms of contemporary e-mail. Federal statutory law regulating the acquisition and use of electronic communications will also be discussed. This Note will …