SlideShare uma empresa Scribd logo
1 de 22
Email as Evidence JOHN D. GREGORY DANIEL J. MICHALUK February 9, 2010
Email as Evidence Definitions Relevance Access Production Admissibility and Weight Case studies 2
Definitions Email and e-messages 1970s Classic email (SMTP) 1980s Bulletin boards, MUD, voice mail 1990s Web mail, ICQ, computer-generated or –received faxes 2000s IM, Social networks, Twitter, virtual worlds Remix of all of the above – e.g. notice of FB comments & replies VOIP (e.g. Skype = voice + image + IM) Multiplication of carriers : e-messages in the cloud 3
Relevance Why focus on email issues? ,[object Object]
Everybody uses email and (more or less) understands it
Can be particularly potent evidence – Gates, Black, Poindexter
Information in transit: special issues
Multiplicity of repositories
Jurisdiction
Communications/speech issues with content
Impermanence
Paradigm case
Raises many issues in strong ways that appear elsewhere
Evolves quickly – the answers keep changing4
Access Stored communications on the corporate e-mail system Lotus Domino, Microsoft Exchange Server, Groupwise Blackberry Enterprise Server Workstations Handheld devices
Access Hard to access stored communications Un-logged PIN-to-PIN messages (including Blackberry Messenger communications) Blackberry Internet Service messages SMS communications Very hard to access stored communications Communications on employee home computers Communications on “personal” cloud services
Access The law – sources of rights Employee privacy legislation (federal plus three provinces) Criminal Code wiretap provision “Common law of the unionized workplace” Constructive dismissal claims by non-union employees
Access Cases to watch University of British Columbia – BC Supreme Court R. v. Cole – Ontario Court of Appeal Quon – USSC
Access Practical options for employers Do something now! Option #1 – Try harder to control expectations despite personal use But how far will notice take you? Option #2 – Give in, and implement privacy controls Proportional audit/surveillance framework Investigation standards (reasonable suspicion)
Production The problem of volume - retention Retention policies are key Email is often on a ‘short’ list for retention At least pressure to move off server, sometimes auto-delete unless actively saved Limit: reasonably likely to need it in litigation This can be an e-discovery issue or a trial issue Remington case (1998) – is retention policy reasonable? Broccoli v Echostar (2005) – 21-day retention of emails 10
Production Privilege waiver – the internal counsel problem Generally one does not produce privileged information. What is privileged, in-house? If you copy counsel on all internal emails, all the emails do not become privileged. Separate business advice from legal advice How to sort it out? Air Canada v Westjet,  There is no deemed undertaking rule for evidence led at trial. 11
Production Privilege waiver – employee emails on employer systems A practical problem for employer counsel among others Case law on privilege is different from case law on investigations, audits and surveillance Lots of U.S. developments, few Canadian cases What must you do to shield yourself from a “poisoned client”? 12

Mais conteúdo relacionado

Destaque

E discovery production and non-party privacy v2
E discovery production and non-party privacy v2E discovery production and non-party privacy v2
E discovery production and non-party privacy v2
Dan Michaluk
 
A Lawyer's Perspective on Records Retention And Destruction
A Lawyer's Perspective on Records Retention And DestructionA Lawyer's Perspective on Records Retention And Destruction
A Lawyer's Perspective on Records Retention And Destruction
Dan Michaluk
 

Destaque (8)

The Future of Employment Law
The Future of Employment LawThe Future of Employment Law
The Future of Employment Law
 
E discovery production and non-party privacy v2
E discovery production and non-party privacy v2E discovery production and non-party privacy v2
E discovery production and non-party privacy v2
 
The ugly, the bad and the good of cloud computing
The ugly, the bad and the good of cloud computingThe ugly, the bad and the good of cloud computing
The ugly, the bad and the good of cloud computing
 
Ci admin law addressing the privacy interests of affected individuals nov 2...
Ci admin law   addressing the privacy interests of affected individuals nov 2...Ci admin law   addressing the privacy interests of affected individuals nov 2...
Ci admin law addressing the privacy interests of affected individuals nov 2...
 
Privacy and Litigation
Privacy and LitigationPrivacy and Litigation
Privacy and Litigation
 
Employee issues and privacy
Employee issues and privacyEmployee issues and privacy
Employee issues and privacy
 
Social media and the hiring process
Social media and the hiring processSocial media and the hiring process
Social media and the hiring process
 
A Lawyer's Perspective on Records Retention And Destruction
A Lawyer's Perspective on Records Retention And DestructionA Lawyer's Perspective on Records Retention And Destruction
A Lawyer's Perspective on Records Retention And Destruction
 

Semelhante a E-mail as Evdience

Translating Geek To Attorneys It Security
Translating Geek To Attorneys It SecurityTranslating Geek To Attorneys It Security
Translating Geek To Attorneys It Security
CTIN
 
Amcto presentation final
Amcto presentation finalAmcto presentation final
Amcto presentation final
Dan Michaluk
 
Document Retention And Destruction Power Point
Document Retention And Destruction Power PointDocument Retention And Destruction Power Point
Document Retention And Destruction Power Point
lnarvid
 
Ethical And Social Issues in MIS - Management Information System
Ethical And Social Issues in MIS - Management Information SystemEthical And Social Issues in MIS - Management Information System
Ethical And Social Issues in MIS - Management Information System
FaHaD .H. NooR
 
iConference Popovsky
iConference PopovskyiConference Popovsky
iConference Popovsky
Brian Rowe
 
Electric Insurance ESI Planning
Electric Insurance   ESI PlanningElectric Insurance   ESI Planning
Electric Insurance ESI Planning
John Jablonski
 

Semelhante a E-mail as Evdience (20)

Techno Security 2009 Presentation-Myrtle Beach
Techno Security 2009 Presentation-Myrtle BeachTechno Security 2009 Presentation-Myrtle Beach
Techno Security 2009 Presentation-Myrtle Beach
 
Transitory Electronic Communication: Recordless Messaging in the Context of a...
Transitory Electronic Communication: Recordless Messaging in the Context of a...Transitory Electronic Communication: Recordless Messaging in the Context of a...
Transitory Electronic Communication: Recordless Messaging in the Context of a...
 
Translating Geek To Attorneys It Security
Translating Geek To Attorneys It SecurityTranslating Geek To Attorneys It Security
Translating Geek To Attorneys It Security
 
Luxembourg Coc E Discovery Presentation
Luxembourg Coc   E Discovery PresentationLuxembourg Coc   E Discovery Presentation
Luxembourg Coc E Discovery Presentation
 
Jbh Esi Powerpoint
Jbh Esi PowerpointJbh Esi Powerpoint
Jbh Esi Powerpoint
 
5 19 09 Brandeis Lawyer Technology CLE
5 19 09 Brandeis Lawyer Technology CLE5 19 09 Brandeis Lawyer Technology CLE
5 19 09 Brandeis Lawyer Technology CLE
 
5 19 09 Brandeis Lawyer Technology CLE
5 19 09 Brandeis Lawyer Technology CLE5 19 09 Brandeis Lawyer Technology CLE
5 19 09 Brandeis Lawyer Technology CLE
 
Who's Afraid of eDiscovery?
Who's Afraid of eDiscovery?Who's Afraid of eDiscovery?
Who's Afraid of eDiscovery?
 
E-Discovery 10 Years after Qualcomm v. Broadcom - Where We Are and Where We A...
E-Discovery 10 Years after Qualcomm v. Broadcom - Where We Are and Where We A...E-Discovery 10 Years after Qualcomm v. Broadcom - Where We Are and Where We A...
E-Discovery 10 Years after Qualcomm v. Broadcom - Where We Are and Where We A...
 
Logs & The Law: What is Admissible in Court?
Logs & The Law: What is Admissible in Court?Logs & The Law: What is Admissible in Court?
Logs & The Law: What is Admissible in Court?
 
Amcto presentation final
Amcto presentation finalAmcto presentation final
Amcto presentation final
 
Document Retention And Destruction Power Point
Document Retention And Destruction Power PointDocument Retention And Destruction Power Point
Document Retention And Destruction Power Point
 
eDiscovery
eDiscoveryeDiscovery
eDiscovery
 
Data Residency: Challenges and the Need for Standards
Data Residency: Challenges and the Need for StandardsData Residency: Challenges and the Need for Standards
Data Residency: Challenges and the Need for Standards
 
People, Processes, AND Technology: Use All Three to Avoid Missing a Filing De...
People, Processes, AND Technology: Use All Three to Avoid Missing a Filing De...People, Processes, AND Technology: Use All Three to Avoid Missing a Filing De...
People, Processes, AND Technology: Use All Three to Avoid Missing a Filing De...
 
Ethical And Social Issues in MIS - Management Information System
Ethical And Social Issues in MIS - Management Information SystemEthical And Social Issues in MIS - Management Information System
Ethical And Social Issues in MIS - Management Information System
 
iConference Popovsky
iConference PopovskyiConference Popovsky
iConference Popovsky
 
Cyber Breach: A Legal Perspective - Jarrett Coco
Cyber Breach: A Legal Perspective - Jarrett CocoCyber Breach: A Legal Perspective - Jarrett Coco
Cyber Breach: A Legal Perspective - Jarrett Coco
 
Electric Insurance ESI Planning
Electric Insurance   ESI PlanningElectric Insurance   ESI Planning
Electric Insurance ESI Planning
 
It takes a village - LegalTech NY 2011
It takes a village - LegalTech NY 2011It takes a village - LegalTech NY 2011
It takes a village - LegalTech NY 2011
 

Mais de Dan Michaluk

Mais de Dan Michaluk (20)

Ecno cyber - 23 June 2023 - djm(137852631.1).pptx
Ecno cyber - 23 June 2023 - djm(137852631.1).pptxEcno cyber - 23 June 2023 - djm(137852631.1).pptx
Ecno cyber - 23 June 2023 - djm(137852631.1).pptx
 
Critical Issues in School Board Cyber Security
Critical Issues in School Board Cyber SecurityCritical Issues in School Board Cyber Security
Critical Issues in School Board Cyber Security
 
Introduction to FOI law (the law of information)
Introduction to FOI law (the law of information)Introduction to FOI law (the law of information)
Introduction to FOI law (the law of information)
 
Higher Education Sexual Violence Presentation
Higher Education Sexual Violence PresentationHigher Education Sexual Violence Presentation
Higher Education Sexual Violence Presentation
 
Cyber class action claims at an inflection point
Cyber class action claims at an inflection pointCyber class action claims at an inflection point
Cyber class action claims at an inflection point
 
The pandemic and privacy
The pandemic and privacyThe pandemic and privacy
The pandemic and privacy
 
Cyber security for the regulator and regulated - Ontario Regulatory Authorit...
Cyber security for the regulator and regulated  - Ontario Regulatory Authorit...Cyber security for the regulator and regulated  - Ontario Regulatory Authorit...
Cyber security for the regulator and regulated - Ontario Regulatory Authorit...
 
Union access to information
Union access to informationUnion access to information
Union access to information
 
Cybersecurity Risk Governance
Cybersecurity Risk GovernanceCybersecurity Risk Governance
Cybersecurity Risk Governance
 
Cyber Incident Response - When it happens, will you be ready?
Cyber Incident Response - When it happens, will you be ready?Cyber Incident Response - When it happens, will you be ready?
Cyber Incident Response - When it happens, will you be ready?
 
The Current State of FOI
The Current State of FOIThe Current State of FOI
The Current State of FOI
 
Cyber, secrecy and the public body
Cyber, secrecy and the public bodyCyber, secrecy and the public body
Cyber, secrecy and the public body
 
The privacy and security implications of AI, big data and predictive analytics
The privacy and security implications of AI, big data and predictive analyticsThe privacy and security implications of AI, big data and predictive analytics
The privacy and security implications of AI, big data and predictive analytics
 
Advocates' Society Tricks of the Trade 2019 - A Privacy Update
Advocates' Society Tricks of the Trade 2019 - A Privacy UpdateAdvocates' Society Tricks of the Trade 2019 - A Privacy Update
Advocates' Society Tricks of the Trade 2019 - A Privacy Update
 
Privacy, Data Security and Anti-Spam Compliance
Privacy, Data Security and Anti-Spam CompliancePrivacy, Data Security and Anti-Spam Compliance
Privacy, Data Security and Anti-Spam Compliance
 
Cyber Insurance and Incident Response Practice
Cyber Insurance and Incident Response Practice Cyber Insurance and Incident Response Practice
Cyber Insurance and Incident Response Practice
 
Role of a breach coach
Role of a breach coachRole of a breach coach
Role of a breach coach
 
PHIPA for school boards
PHIPA for school boardsPHIPA for school boards
PHIPA for school boards
 
Privacy, Data Security and Anti-Spam Compliance
Privacy, Data Security and Anti-Spam CompliancePrivacy, Data Security and Anti-Spam Compliance
Privacy, Data Security and Anti-Spam Compliance
 
Finding internet evidence
Finding internet evidenceFinding internet evidence
Finding internet evidence
 

Último

Call Girls In Nangloi Rly Metro ꧂…….95996 … 13876 Enjoy ꧂Escort
Call Girls In Nangloi Rly Metro ꧂…….95996 … 13876 Enjoy ꧂EscortCall Girls In Nangloi Rly Metro ꧂…….95996 … 13876 Enjoy ꧂Escort
Call Girls In Nangloi Rly Metro ꧂…….95996 … 13876 Enjoy ꧂Escort
dlhescort
 
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al MizharAl Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
allensay1
 
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabiunwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
Abortion pills in Kuwait Cytotec pills in Kuwait
 
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
amitlee9823
 
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
amitlee9823
 

Último (20)

Falcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investorsFalcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investors
 
Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876
Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876
Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876
 
Falcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business PotentialFalcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business Potential
 
Call Girls In Nangloi Rly Metro ꧂…….95996 … 13876 Enjoy ꧂Escort
Call Girls In Nangloi Rly Metro ꧂…….95996 … 13876 Enjoy ꧂EscortCall Girls In Nangloi Rly Metro ꧂…….95996 … 13876 Enjoy ꧂Escort
Call Girls In Nangloi Rly Metro ꧂…….95996 … 13876 Enjoy ꧂Escort
 
Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...
Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...
Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...
 
Uneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration PresentationUneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration Presentation
 
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al MizharAl Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
 
Falcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business GrowthFalcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business Growth
 
Falcon Invoice Discounting platform in india
Falcon Invoice Discounting platform in indiaFalcon Invoice Discounting platform in india
Falcon Invoice Discounting platform in india
 
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabiunwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
 
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
 
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 MonthsSEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 Months
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and pains
 
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
 
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
 
Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024
 
Whitefield CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
Whitefield CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRLWhitefield CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
Whitefield CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
 
Falcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to ProsperityFalcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to Prosperity
 
PHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation FinalPHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation Final
 

E-mail as Evdience

  • 1. Email as Evidence JOHN D. GREGORY DANIEL J. MICHALUK February 9, 2010
  • 2. Email as Evidence Definitions Relevance Access Production Admissibility and Weight Case studies 2
  • 3. Definitions Email and e-messages 1970s Classic email (SMTP) 1980s Bulletin boards, MUD, voice mail 1990s Web mail, ICQ, computer-generated or –received faxes 2000s IM, Social networks, Twitter, virtual worlds Remix of all of the above – e.g. notice of FB comments & replies VOIP (e.g. Skype = voice + image + IM) Multiplication of carriers : e-messages in the cloud 3
  • 4.
  • 5. Everybody uses email and (more or less) understands it
  • 6. Can be particularly potent evidence – Gates, Black, Poindexter
  • 7. Information in transit: special issues
  • 13. Raises many issues in strong ways that appear elsewhere
  • 14. Evolves quickly – the answers keep changing4
  • 15. Access Stored communications on the corporate e-mail system Lotus Domino, Microsoft Exchange Server, Groupwise Blackberry Enterprise Server Workstations Handheld devices
  • 16. Access Hard to access stored communications Un-logged PIN-to-PIN messages (including Blackberry Messenger communications) Blackberry Internet Service messages SMS communications Very hard to access stored communications Communications on employee home computers Communications on “personal” cloud services
  • 17. Access The law – sources of rights Employee privacy legislation (federal plus three provinces) Criminal Code wiretap provision “Common law of the unionized workplace” Constructive dismissal claims by non-union employees
  • 18. Access Cases to watch University of British Columbia – BC Supreme Court R. v. Cole – Ontario Court of Appeal Quon – USSC
  • 19. Access Practical options for employers Do something now! Option #1 – Try harder to control expectations despite personal use But how far will notice take you? Option #2 – Give in, and implement privacy controls Proportional audit/surveillance framework Investigation standards (reasonable suspicion)
  • 20. Production The problem of volume - retention Retention policies are key Email is often on a ‘short’ list for retention At least pressure to move off server, sometimes auto-delete unless actively saved Limit: reasonably likely to need it in litigation This can be an e-discovery issue or a trial issue Remington case (1998) – is retention policy reasonable? Broccoli v Echostar (2005) – 21-day retention of emails 10
  • 21. Production Privilege waiver – the internal counsel problem Generally one does not produce privileged information. What is privileged, in-house? If you copy counsel on all internal emails, all the emails do not become privileged. Separate business advice from legal advice How to sort it out? Air Canada v Westjet, There is no deemed undertaking rule for evidence led at trial. 11
  • 22. Production Privilege waiver – employee emails on employer systems A practical problem for employer counsel among others Case law on privilege is different from case law on investigations, audits and surveillance Lots of U.S. developments, few Canadian cases What must you do to shield yourself from a “poisoned client”? 12
  • 23. Admissibility and Weight Proving a digital object is different Vulnerability of information composed of presence or absence of electric current What happens when the power goes off? When the system crashes? Malleability of information Easy to change undetectably Presentation in the courtroom Printout vs native format (capacity to present etc) Mobility multiplies the issues 13
  • 24.
  • 25. Is this record what it purports to me?
  • 26. Admissibility if foundation laid to support that conclusion
  • 27. The cutting edge of e-evidence including email evidence today
  • 29. What is an original electronic document?
  • 31. Does the medium matter?
  • 32. Exceptions wide (reliability) or focused (business records?)
  • 33. It’s not always hearsay (e.g. mechanical evidence)14
  • 34. Admissibility and Weight The Uniform Electronic Evidence Act (where enacted) “Solutions” to electronic application of these rules Authentication: codify Count on the witness under oath (not saying who) Challenge is in responding to challenges (expertise, availability of foundation evidence) Best evidence: system not document Presumptions in aid: it matters whose system it is Standards in aid Hearsay: do nothing Possible spillover effect of other rules Admissibility, nothing re weight 15
  • 35. Case law Not much of interest on UEEA R. v. Bellingham (AB) needed evidence of what printouts were Leoppky v Meston (AB) – demonstrates several things: Court looks behind computer to actual sender A series of emails can satisfy Statute of Frauds Still had missing link i.e. legal rules still apply Nat. Business Solutions (ON) – email as course of conduct Singapore vs England: email headers OK or not OK as evidence capable of supporting Statute of Frauds Lorraine v Markel (NJ) – extreme demands (all obiter) Prove lots about system, manner of production, etc Admitted some shortcuts might exist e.g. notice of intent to use 16
  • 36.
  • 37. “The entity’s policies and procedures for the use of the equipment, database and programs are important. How access to the … database [and to the specific program are] controlled is important. How changes in the database are logged, as well as the structure and implementation of backup systems and audit procedures for assuring the continued integrity of the database, are pertinent.”
  • 38. In re VeeVinhee, US appeal court, 2005.17
  • 39.
  • 41. Make a policy about how e-records are managed
  • 45. Adjust the policy as required by circumstances
  • 46. Have a policy manual that you can point to.
  • 47. Have someone responsible (CRO) (+ witness)18
  • 48. New e-messages: Challenges Webmail, Facebook/MySpace, Twitter As you go into the cloud, it is harder to: Authenticate (go to ISP not ASP) Figure out and prove the ‘system’ whose reliability one would like to count on (or at least appreciate) No standardization – every application is different (not like SMTP) Consumer oriented – so less rigorous than business systems Proprietary – so codes etc are not readily available Surrounded by TP apps – Tweetdeck, thousands of FB suppliers – who, where, what are they? Are clouds third party providers in ordinary course of business, i.e. should they be considered reliable? 19
  • 49. Admissibility and Weight Email problem #1 – You didn’t send that Employee alleges termination on basis of pregnancy Email pre-dates her pregnancy by two months showing bona fide intent to terminate Proponent can testify 20
  • 50.
  • 51. Agreement to arbitrate executed through employer’s intranet
  • 52. Execution by entering SSN or employee ID number plus password
  • 54. Supervisor resets password to help employee get access
  • 56. Employee claims supervisor executed agreement and denies reading confirmation email21
  • 57. Email as Evidence JOHN D. GREGORY DANIEL J. MICHALUK February 9, 2010

Notas do Editor

  1. DANPossible content-introduce term “transitory record”-introduce concept of short retention of e-mails-useful hived off from transitory records and transitory records disposed-Will a court go behind a short retention period?-What is the standard? Good faith? Reasonableness?-Lewy v. Remington Arms Co., 836 F .2d 1104 (8th Cir. 1998) (court will consider whether retention period is reasonable in all the circumstances) -Pretty radical… almost a common law duty of care -not aware of a Canadian duty-Micron Technology v. Rambus, Inc. (D. Del., Jan. 9, 2009) -illustrates preservation risks associated with short e-mail retention periods
  2. JOHN
  3. DAN-problem: employees send and receive e-mails to employer using employers work computer-legal issue: does that waive privilege?-legal cases -Canadian cases have tended to favour preservation of privilege Leading case is Daniel Potter, [2005] N.S.J. No. 186 -president stores e-mails on company’s servers -Scanlan J. says no waiver of privilege -did argue the workplace privacy cases -says privilege is different (question of intent rather than reasonable expectation of privacy) -but reasoning turns on e-mail exposure to ISP’s in general -did he have good evidence that established the employer's domain? -also qualified – he was the president so had control over the system New case is Eissis -s-c communication stored on corporate e-mail system -extracted, processed and produced by defendant -with production made waiver claim -plaintiff waited two years to respond -intentional waiver finding -court also suggests that process of extracting, processing and producing with a waiver claim is proper -risky business…. don’t we “seal and deal”-practically -respect the privilege subject to a fight -law firms should have protocols -protocols should include what to tell clients -clients not bound by ethical rules but court… but ability to obtain instructions may be affected