SlideShare ist ein Scribd-Unternehmen logo
1 von 58
From ESI to Evidence Presented by: William F. Hamilton Tampa, Florida
“Documents” Are Now Electronic ,[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],ESI Comes in Numerous Flavors
Admissibility of ESI ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Admissibility of ESI ,[object Object],[object Object],*
Admissibility of ESI ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The First Hurdle ,[object Object]
Relevance of ESI   ,[object Object],[object Object],[object Object],[object Object]
Second Hurdle ,[object Object]
ESI – Inauthentic ,[object Object],[object Object],[object Object],Consumers
ESI Inauthentic ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
ESI Inauthentic ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Authentication of ESI: FRE 901(a)  ,[object Object],[object Object],[object Object]
Authentication of ESI ,[object Object],[object Object],[object Object]
Authentication of ESI ,[object Object],[object Object],[object Object],[object Object]
Authentication of ESI: FRE 901(b) ,[object Object],[object Object],[object Object]
Authentication of ESI: FRE 901(b)(9) ,[object Object],[object Object]
Authentication of ESI: FRE 901(b)(9) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Authentication of ESI:    Typical Challenges ,[object Object],[object Object],[object Object]
Authentication of ESI: Record  a  Chain of Custody ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Authentication of ESI ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Authentication of ESI ,[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],Authentication of ESI:    Hash Technology
Authentication of ESI:    Experts under 901(b)(3) ,[object Object]
Authentication of ESI:   Expert Questions ,[object Object],[object Object],[object Object],[object Object]
Authentication of ESI:    Expert Questions ,[object Object],[object Object]
Authentication of ESI:    Data Acquisition ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Authentication of ESI:    “Mirror Image” Challenges ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Authentication of ESI:    Ubiquitous Email ,[object Object]
Authentication of ESI:    Produced Documents  ,[object Object],[object Object]
Authentication of ESI:   Ubiquitous Email ,[object Object],[object Object],[object Object],[object Object]
Authentication of ESI:  Websites ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Authentication of ESI:  Websites ,[object Object],[object Object],[object Object],[object Object],[object Object]
Authentication of ESI: Chat Rooms ,[object Object],[object Object],[object Object]
Authentication of ESI: Chat Rooms ,[object Object],[object Object],[object Object],[object Object]
Authentication of ESI: Chat Rooms ,[object Object],[object Object],[object Object]
Third Hurdle: Hearsay (Rules 801-807)
The Hearsay Hurdle:  Is it Hearsay? ,[object Object],[object Object],[object Object],[object Object],[object Object]
The Hearsay Hurdle:  ESI ,[object Object],[object Object],[object Object],[object Object]
The Hearsay Hurdle:    Email Admitted as Admissions ,[object Object],[object Object],[object Object]
The Hearsay Hurdle:  Websites ,[object Object],[object Object],[object Object],[object Object]
Hearsay Hurdle:    Business Records Exception ,[object Object],[object Object],[object Object],[object Object]
Hearsay Hurdle:   Regular Practice of Business ,[object Object],[object Object],[object Object]
Hearsay Hurdle:    Regular Practice of Business ,[object Object],[object Object],[object Object],[object Object]
Hearsay Hurdle:    Regular Practice of Business ,[object Object],[object Object],[object Object]
Other Hearsay Exceptions ,[object Object],[object Object],[object Object],[object Object]
Other Hearsay Exceptions ,[object Object],[object Object]
Hearsay Hurdle:   Word and Excel Documents ,[object Object],[object Object],[object Object],[object Object]
Fourth Hurdle: ,[object Object]
The Original Writing Rules:   Rules 1001-1008 ,[object Object],[object Object]
Rule 1003: Duplicates are Admissible ,[object Object]
Original Evidence Rule: Printouts ,[object Object],[object Object],[object Object]
Rule 1004: Other Evidence of Contents ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Rule 1004 and Electronic Evidence ,[object Object],[object Object],[object Object],[object Object]
Last Hurdle:  Fed. R. Evid. 403  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Examples: ,[object Object],[object Object],[object Object],[object Object]
Rule 403 Has Limited Application ,[object Object],[object Object],[object Object]
Conclusion:    The Courts and Electronic Evidence ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]

Weitere ähnliche Inhalte

Was ist angesagt?

Electronic Evidence fraud conference
Electronic Evidence   fraud conferenceElectronic Evidence   fraud conference
Electronic Evidence fraud conference
Adv Prashant Mali
 
Legal aspects of handling cyber frauds
Legal aspects of handling cyber fraudsLegal aspects of handling cyber frauds
Legal aspects of handling cyber frauds
Sagar Rahurkar
 
Neeraj aarora cyber_lawyer_current trends in cyber crime scenario
Neeraj aarora cyber_lawyer_current trends in cyber crime scenarioNeeraj aarora cyber_lawyer_current trends in cyber crime scenario
Neeraj aarora cyber_lawyer_current trends in cyber crime scenario
Neeraj Aarora
 
Digital Evidence - the defence, prosecution, & the court
Digital Evidence - the defence, prosecution, & the courtDigital Evidence - the defence, prosecution, & the court
Digital Evidence - the defence, prosecution, & the court
Cell Site Analysis (CSA)
 

Was ist angesagt? (20)

9 things about indian cyber law prashant mali
9 things about indian cyber law   prashant mali9 things about indian cyber law   prashant mali
9 things about indian cyber law prashant mali
 
Electronic Evidence fraud conference
Electronic Evidence   fraud conferenceElectronic Evidence   fraud conference
Electronic Evidence fraud conference
 
Neeraj aarora cyber_lawyer_section 65b_evidence act
Neeraj aarora cyber_lawyer_section 65b_evidence actNeeraj aarora cyber_lawyer_section 65b_evidence act
Neeraj aarora cyber_lawyer_section 65b_evidence act
 
EDI 2009- Admissibility of Electronic/Digital Evidence
EDI 2009- Admissibility of Electronic/Digital EvidenceEDI 2009- Admissibility of Electronic/Digital Evidence
EDI 2009- Admissibility of Electronic/Digital Evidence
 
Electronic evidence for delhi judicial academy prashant mali
Electronic evidence  for delhi judicial academy prashant maliElectronic evidence  for delhi judicial academy prashant mali
Electronic evidence for delhi judicial academy prashant mali
 
Cybercrime investigation
Cybercrime investigationCybercrime investigation
Cybercrime investigation
 
Admissibility of electronic evidence in india
Admissibility of electronic evidence in indiaAdmissibility of electronic evidence in india
Admissibility of electronic evidence in india
 
Judicial Appreciation of Digital Evidence 2016
Judicial Appreciation of Digital Evidence 2016Judicial Appreciation of Digital Evidence 2016
Judicial Appreciation of Digital Evidence 2016
 
Legal aspects of handling cyber frauds
Legal aspects of handling cyber fraudsLegal aspects of handling cyber frauds
Legal aspects of handling cyber frauds
 
Investigation of a cyber crime
Investigation of a cyber crimeInvestigation of a cyber crime
Investigation of a cyber crime
 
Appreciation of Digital Evidence in Sri Lankan Law
Appreciation of Digital Evidence in Sri Lankan LawAppreciation of Digital Evidence in Sri Lankan Law
Appreciation of Digital Evidence in Sri Lankan Law
 
Neeraj aarora cyber_lawyer_current trends in cyber crime scenario
Neeraj aarora cyber_lawyer_current trends in cyber crime scenarioNeeraj aarora cyber_lawyer_current trends in cyber crime scenario
Neeraj aarora cyber_lawyer_current trends in cyber crime scenario
 
Digital Evidence - the defence, prosecution, & the court
Digital Evidence - the defence, prosecution, & the courtDigital Evidence - the defence, prosecution, & the court
Digital Evidence - the defence, prosecution, & the court
 
Cyber Forensic - Policing the Digital Domain
Cyber Forensic - Policing the Digital DomainCyber Forensic - Policing the Digital Domain
Cyber Forensic - Policing the Digital Domain
 
Digital Crime & Forensics - Presentation
Digital Crime & Forensics - PresentationDigital Crime & Forensics - Presentation
Digital Crime & Forensics - Presentation
 
ICT AND E-JUDICIARY: INDIAN PERSPECTIVE: 2018
ICT AND E-JUDICIARY: INDIAN PERSPECTIVE: 2018ICT AND E-JUDICIARY: INDIAN PERSPECTIVE: 2018
ICT AND E-JUDICIARY: INDIAN PERSPECTIVE: 2018
 
Lecture on Use of Modern devices and Techniques for Evidence as envisaged in ...
Lecture on Use of Modern devices and Techniques for Evidence as envisaged in ...Lecture on Use of Modern devices and Techniques for Evidence as envisaged in ...
Lecture on Use of Modern devices and Techniques for Evidence as envisaged in ...
 
Cyber law nepal
Cyber law nepalCyber law nepal
Cyber law nepal
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
 

Ähnlich wie Electronic Evidence Power Point V6 Final

Law, Ethics & Technology: e-Discovery and e-Competence
Law, Ethics & Technology: e-Discovery and e-CompetenceLaw, Ethics & Technology: e-Discovery and e-Competence
Law, Ethics & Technology: e-Discovery and e-Competence
jcassd619
 
Running Head THE SCIENTIFIC METHOD APPLIED TO DIGITAL FORENSICS .docx
Running Head THE SCIENTIFIC METHOD APPLIED TO DIGITAL FORENSICS  .docxRunning Head THE SCIENTIFIC METHOD APPLIED TO DIGITAL FORENSICS  .docx
Running Head THE SCIENTIFIC METHOD APPLIED TO DIGITAL FORENSICS .docx
jenkinsmandie
 
Running Head THE SCIENTIFIC METHOD APPLIED TO DIGITAL FORENSICS .docx
Running Head THE SCIENTIFIC METHOD APPLIED TO DIGITAL FORENSICS  .docxRunning Head THE SCIENTIFIC METHOD APPLIED TO DIGITAL FORENSICS  .docx
Running Head THE SCIENTIFIC METHOD APPLIED TO DIGITAL FORENSICS .docx
todd521
 
1- How could you approach a task to create a stakeholder’s managem.docx
1- How could you approach a task to create a stakeholder’s managem.docx1- How could you approach a task to create a stakeholder’s managem.docx
1- How could you approach a task to create a stakeholder’s managem.docx
aulasnilda
 
Maintaining The Digital Chain of Custody By John Patzakis .docx
Maintaining The Digital Chain of Custody By John Patzakis .docxMaintaining The Digital Chain of Custody By John Patzakis .docx
Maintaining The Digital Chain of Custody By John Patzakis .docx
smile790243
 
Chapter 3 cmp forensic
Chapter 3 cmp forensicChapter 3 cmp forensic
Chapter 3 cmp forensic
shahhardik27
 
iConference Popovsky
iConference PopovskyiConference Popovsky
iConference Popovsky
Brian Rowe
 
2018 mar-09 - jens jenkins - finjan your claims to patent eligibility (update...
2018 mar-09 - jens jenkins - finjan your claims to patent eligibility (update...2018 mar-09 - jens jenkins - finjan your claims to patent eligibility (update...
2018 mar-09 - jens jenkins - finjan your claims to patent eligibility (update...
Workman Nydegger
 
EDiscovery Presentation
EDiscovery PresentationEDiscovery Presentation
EDiscovery Presentation
scubastog
 
Document Retention And Destruction Power Point
Document Retention And Destruction Power PointDocument Retention And Destruction Power Point
Document Retention And Destruction Power Point
lnarvid
 

Ähnlich wie Electronic Evidence Power Point V6 Final (20)

Sound E-Discovery Collection Practices
Sound E-Discovery Collection PracticesSound E-Discovery Collection Practices
Sound E-Discovery Collection Practices
 
Admissibility Of Esi (Final1)
Admissibility Of Esi (Final1)Admissibility Of Esi (Final1)
Admissibility Of Esi (Final1)
 
Law, Ethics & Technology: e-Discovery and e-Competence
Law, Ethics & Technology: e-Discovery and e-CompetenceLaw, Ethics & Technology: e-Discovery and e-Competence
Law, Ethics & Technology: e-Discovery and e-Competence
 
Running Head THE SCIENTIFIC METHOD APPLIED TO DIGITAL FORENSICS .docx
Running Head THE SCIENTIFIC METHOD APPLIED TO DIGITAL FORENSICS  .docxRunning Head THE SCIENTIFIC METHOD APPLIED TO DIGITAL FORENSICS  .docx
Running Head THE SCIENTIFIC METHOD APPLIED TO DIGITAL FORENSICS .docx
 
Running Head THE SCIENTIFIC METHOD APPLIED TO DIGITAL FORENSICS .docx
Running Head THE SCIENTIFIC METHOD APPLIED TO DIGITAL FORENSICS  .docxRunning Head THE SCIENTIFIC METHOD APPLIED TO DIGITAL FORENSICS  .docx
Running Head THE SCIENTIFIC METHOD APPLIED TO DIGITAL FORENSICS .docx
 
1- How could you approach a task to create a stakeholder’s managem.docx
1- How could you approach a task to create a stakeholder’s managem.docx1- How could you approach a task to create a stakeholder’s managem.docx
1- How could you approach a task to create a stakeholder’s managem.docx
 
Ethical Hacking And Computer Forensics
Ethical Hacking And Computer ForensicsEthical Hacking And Computer Forensics
Ethical Hacking And Computer Forensics
 
Maintaining The Digital Chain of Custody By John Patzakis .docx
Maintaining The Digital Chain of Custody By John Patzakis .docxMaintaining The Digital Chain of Custody By John Patzakis .docx
Maintaining The Digital Chain of Custody By John Patzakis .docx
 
Cyber
CyberCyber
Cyber
 
Chapter 3 cmp forensic
Chapter 3 cmp forensicChapter 3 cmp forensic
Chapter 3 cmp forensic
 
Mastering E-Discovery Presentation (partial)
Mastering E-Discovery Presentation (partial)Mastering E-Discovery Presentation (partial)
Mastering E-Discovery Presentation (partial)
 
Cyber Security 1215
Cyber Security 1215Cyber Security 1215
Cyber Security 1215
 
Cyber Security Isaca Bglr Presentation 24th July
Cyber Security Isaca Bglr Presentation 24th JulyCyber Security Isaca Bglr Presentation 24th July
Cyber Security Isaca Bglr Presentation 24th July
 
iConference Popovsky
iConference PopovskyiConference Popovsky
iConference Popovsky
 
2018 mar-09 - jens jenkins - finjan your claims to patent eligibility (update...
2018 mar-09 - jens jenkins - finjan your claims to patent eligibility (update...2018 mar-09 - jens jenkins - finjan your claims to patent eligibility (update...
2018 mar-09 - jens jenkins - finjan your claims to patent eligibility (update...
 
Electronic Document Management And Discovery
Electronic Document Management And DiscoveryElectronic Document Management And Discovery
Electronic Document Management And Discovery
 
EDiscovery Presentation
EDiscovery PresentationEDiscovery Presentation
EDiscovery Presentation
 
Document Retention And Destruction Power Point
Document Retention And Destruction Power PointDocument Retention And Destruction Power Point
Document Retention And Destruction Power Point
 
Daniel day
Daniel dayDaniel day
Daniel day
 
Legal Issues Of ELNs
Legal Issues Of ELNsLegal Issues Of ELNs
Legal Issues Of ELNs
 

Electronic Evidence Power Point V6 Final

  • 1. From ESI to Evidence Presented by: William F. Hamilton Tampa, Florida
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35.
  • 36.
  • 37. Third Hurdle: Hearsay (Rules 801-807)
  • 38.
  • 39.
  • 40.
  • 41.
  • 42.
  • 43.
  • 44.
  • 45.
  • 46.
  • 47.
  • 48.
  • 49.
  • 50.
  • 51.
  • 52.
  • 53.
  • 54.
  • 55.
  • 56.
  • 57.
  • 58.