All evidence is required to meet the foundation requirement of admissibility, which would include relevancy, the best evidence rule and hearsay. Under the law, the courts require authentication because before a tangible object or writing can be admitted into evidence, it must be shown that it is in fact what it claims to be. Thus evidence that is not authenticated is not relevant and must be excluded from consideration by the court.
Digital evidence has the same requirements as all other evidence in terms of authentication and foundation before it could be admitted into evidence. Digital evidence is also known sometimes as electronically stored information (ESI). That phrase was made a part of the Federal Rules of Civil Procedure in 2006. The leading case on the application of the Federal Rules of Civil Procedure and adopted by Illinois came to be in the 2007 Maryland case of Lorraine v. Markel American Insurance Co., 241 F.R.D. 534 (D. Md. 2007). In that case, magistrate Judge Paul Grimm of the U.S. District Court for the District of Maryland noted that the failure to authenticate ESI “almost always is self-inflicted injury which can be avoided by thoughtful advanced preparation.”
One of the principal problems with digital evidence is that it can be manipulated, changed, fabricated by hackers and other sophisticated software users. It is also difficult to show to the court who was responsible for creating the digital evidence, whether it was on a keyboard on a computer or by cell phone or iPad. In some mobile apps, text messages seem to come from a particular person’s telephone, when in fact they did not. But evidence authentication does not require certainty. People v. Anderson, No. 311448, 2014 W.L.1383399 at 4 n. 3 (Mich. Ct. App. April 8, 2014); State v. Mays, 729 A.2d 1074, 1079 (N.J. Super. Ct. App. Div. 1999). In these cases dealing with authenticity, the parties hired experts to testify about who was the sender or recipient of certain digital evidence.
Continue reading