Practical Needs of the Family Law Practitioner

Size: px
Start display at page:

Download "Practical Needs of the Family Law Practitioner"

Transcription

1 Friday, January 20, :15 p.m. 5:30 p.m. Family Law Section 3.0 MCLE Credit Hours; 3.0 MJCLE for Family Court Judges Practical Needs of the Family Law Practitioner The Family Law Section Council of the South Carolina Bar is proud to present a program that addresses the practical needs of the family law practitioner. The practice of family law is becoming more and more impacted by electronic communication and storage, both in how we represent our clients and how we store and access information within our offices. Rick Robertson, an attorney from Texas and an expert in this area, will help us understand the admissibility of electronically obtained evidence and communications. Furthermore, he will address the future of the electronic office and opportunities to make ourselves more efficient while protecting client information. Lillian Koller, the new director of SCDSS, will speak. As most of us become involved with DSS in our practices, either representing clients by appointment or bringing actions on their behalf, we need to know the direction the agency is taking and what we can expect in our dealings with the Department of Social Services. Rep. Bruce Bannister of Greenville will speak about the direction our legislators are taking and how this will influence our practices. Rep. Bannister has been influential in the direction that family court legislation has taken and has been responsive to the concerns raised by practitioners in the family law area. Agenda 2:15 p.m. 2:45 p.m. Legislative Update Rep. Bruce W. Bannister, Greenville 2:45 p.m. 3:45 p.m. Electronic Evidence How to Avoid Getting Shocked Rick Robertson, Plano, TX 3:45 p.m. 4:00 p.m. Break 4:00 p.m. 5:00 p.m. Practicing in the Cloud with Your Feet on the Ground Rick Robertson, Plano, TX 5:00 p.m. 5:45 p.m. S.C. Department of Social Services Introducing the New Director Lillian Koller, Columbia Course Planner/Moderator: Patricia L. Forbis, Columbia

2 ELECTRONIC EVIDENCE HOW TO AVOID GETTING SHOCKED RICK ROBERTSON EMILY MISKEL Koons, Fuller, Vanden Eykel & Robertson, P.C W. Plano Pkwy., Suite 2200 Plano, Texas (972)

3 TABLE OF CONTENTS I. SCOPE OF ARTICLE II. ELECTRONIC EVIDENCE UNDER EXISTING RULES... 1 III. AUTHENTICATING ELECTRONIC EVIDENCE... 1 A. Electronically Stored Information (ESI) B. Stored versus Processed Data... 1 C D. Internet Website Postings... 2 E. Text Messages and Chat Room Content F. Computer Stored Records and Data... 4 G. Digital Photographs and Videos Original Digital Photograph Digitally Converted Images Digitally Enhanced Images H. Voic I. Conclusion on Authenticating ESI... 7 IV. BEST EVIDENCE RULE... 7 V. HEARSAY ISSUES IN ELECTRONIC EVIDENCE VI. A. Unreflective Statements Present Sense Impression Excited Utterance Then Existing Mental, Emotional, or Physical Condition B. Reliable Documents Recorded Recollection Records of Regularly Conducted Activity Market Reports, Commercial Publications C. Statements That Are Not Hearsay Computer Generated Statements Metadata Admissions by a Party-Opponent WITNESSES A. Writing Used to Refresh Memory B. Impeachment Prior Inconsistent Statement Impeaching Hearsay Statements C. Character Evidence VII. VIII. UNFAIR PREJUDICE EXPERT TESTIMONY AND OPINIONS A. Basis of Expert Testimony and Opinions B. Factors Relied Upon IX. DISCOVERY OF ELECTRONIC EVIDENCE X. ILLEGALLY OBTAINING ELECTRONIC EVIDENCE XI. A. Wiretap Laws B. Electronic Data Laws C. Torts D. Consequences for Attorneys SPOLIATION OF ELECTRONIC EVIDENCE i

4 A. Zubulake B. Sedona Guidelines C. Federal Rules of Civil Procedure D. Other Rules involving Electronic Information E. Recent Case law on Spoliation and Sanctions XII. CONCLUSION ii

5 I. SCOPE OF ARTICLE. Increasingly, family lawyers are on the front lines of using modern, electronic evidence. The latest study conducted by the American Academy of Matrimonial Lawyers found that more than 80 percent of divorce attorneys say they have seen an increase in the number of cases using social networking evidence during the past five years. This paper endeavors to provide a practical guide to using and admitting modern evidence. The paper also discusses the laws regarding obtaining and preserving electronic evidence. II. ELECTRONIC EVIDENCE UNDER EXISTING RULES. While electronic evidence and online communications feel like a new and unique area in evidence, they are evaluated under the same familiar rules attorneys have always used. State and federal courts have rejected calls to abandon the existing rules of evidence when evaluating electronic evidence. For example, a Pennsylvania court addressed the authentication required to introduce transcripts of instant message conversations: Essentially, appellant would have us create a whole new body of law just to deal with e- mails or instant messages. The argument is that s or text messages are inherently unreliable because of their relative anonymity and the fact that while an electronic message can be traced to a particular computer, it can rarely be connected to a specific author with any certainty. Unless the purported author is actually witnessed sending the , there is always the possibility it is not from whom it claims. As appellant correctly points out, anybody with the right password can gain access to another's account and send a message ostensibly from that person. However, the same uncertainties exist with traditional written documents. A signature can be forged; a letter can be typed on another's typewriter; distinct letterhead stationary can be copied or stolen. We believe that messages and similar forms of electronic communication can be properly authenticated within the existing framework of [the rules of evidence and case law]...we see no justification for constructing unique rules of admissibility of electronic communications such as instant messages; they are to be evaluated on a case-by-case basis as any other document to determine whether or not there has been an adequate foundational showing of their relevance and authenticity. 1 1 In Re F.P., 878 A.2d 91, (Pa. Super. Ct. 2005). While attorneys are right to be skeptical of electronic evidence, attorneys can forget that the same concerns are present with any type of evidence. III. AUTHENTICATING ELECTRONIC EVIDENCE. The requirement of authentication or identification is a condition precedent to admissibility. This requirement is satisfied by evidence sufficient to support a finding that the matter in question is what its proponent claims. 2 Unless the evidence sought to be admitted is self-authenticating under Rule 902, SCRE, extrinsic evidence must be adduced prior to its admission. Rule 901(b) contains a non-exclusive list of illustrations of authentication that comply with the rule. A frequently-cited federal case, Lorraine v. Markel Am. Insur. Co., has become an authority on the application of the rules of evidence to electronicallystored information (ESI). 3 This section quotes extensively from the case, including selections relevant to authenticating ESI: A. Electronically Stored Information (ESI). A party seeking to admit an exhibit need only make a prima facie showing that it is what he or she claims it to be. This is not a particularly high barrier to overcome. For example, in United States v. Safavian, the court analyzed the admissibility of , noting, the question for the court under Rule 901 is whether the proponent of the evidence has offered a foundation from which the jury could reasonably find that the evidence is what the proponent says it is. The Court need not find that the evidence is necessarily what the proponent claims, but only that there is sufficient evidence that the jury ultimately might do so. The authentication requirements of Rule 901 are designed to set up a threshold preliminary standard to test the reliability of evidence, subject to later review by an opponent s cross-examination. Determining what degree of foundation is appropriate in any given case is in the judgment of the court. The required foundation will vary not only with the particular circumstances but also with the individual judge. Obviously, there is no one size fits all approach that can be taken when authenticating electronic evidence, in part because technology changes so rapidly that it is often new to many judges. B. Stored versus Processed Data In general, electronic documents or records that are merely stored in a computer raise no computerspecific authentication issues. 4 If a computer processes data rather than merely storing it, authentication issues 2 Rule 901, SCRE. 3 Lorraine v. Markel American Ins. Co., 241 F.R.D. 534 (D.Md. 2007) (memo. op.). 4 Lorraine, 241 F.R.D. at 543 (emph. added). 1

6 may arise. The need for authentication and an explanation of the computer s processing will depend on the complexity and novelty of the computer processing. There are many stages in the development of computer data where error can be introduced, which can adversely affect the accuracy and reliability of the output. Inaccurate results occur most often because of bad or incomplete data inputting, but can also happen when defective software programs are used or storeddata media become corrupted or damaged. C. There are many ways in which evidence may be authenticated. 5 One well-respected commentator has observed: [E]-mail messages may be authenticated by direct or circumstantial evidence. An message s distinctive characteristics, including its contents, substance, internal patterns, or other distinctive characteristics, taken in conjunction with circumstances may be sufficient for authentication. Printouts of messages ordinarily bear the sender s address, providing circumstantial evidence that the message was transmitted by the person identified in the address. In responding to an message, the person receiving the message may transmit the reply using the computer s reply function, which automatically routes the message to the address from which the original message came. Use of the reply function indicates that the reply message was sent to the sender s listed address. The contents of the may help show authentication by revealing details known only to the sender and the person receiving the message. However, the sending address in an message is not conclusive, since e- mail messages can be sent by persons other than the named sender. For example, a person with unauthorized access to a computer can transmit messages under the computer owner s name. Because of the potential for unauthorized transmission of messages, authentication requires testimony from a person with personal knowledge of the transmission or receipt to ensure its trustworthiness. Courts also have approved the authentication of e- mail by the above described methods. See, e.g.: Siddiqui, 235 F.3d at ( may be authenticated entirely by circumstantial evidence, including its distinctive characteristics); Safavian, 435 F.Supp.2d at 40 (recognizing that e- mail may be authenticated by distinctive characteristics 901(b)(4), or by comparison of exemplars with other s that already have been authenticated 901(b)(3)); 5 Lorraine, 241 F.R.D. at Rambus, 348 F.Supp.2d 698 ( that qualifies as business record may be self-authenticating under 902(11)); In re F.P., 878 A.2d at 94 ( may be authenticated by direct or circumstantial evidence). The most frequent ways to authenticate evidence are: 901(b)(1) (witness with knowledge), 901(b)(3) (expert testimony or comparison with authenticated exemplar), 901(b)(4) (distinctive characteristics, including circumstantial evidence), and 902(7) (trade inscriptions). D. Internet Website Postings. When determining the admissibility of exhibits containing representations of the contents of website postings of a party, the issues that have concerned courts include the possibility that third persons other than the sponsor of the website were responsible for the content of the postings, leading many to require proof by the proponent that the organization hosting the website actually posted the statements or authorized their posting. 6 See: United States v. Jackson, 208 F.3d 633, 638 (7th Cir.2000) (excluding evidence of website postings because proponent failed to show that sponsoring organization actually posted the statements, as opposed to a third party); St. Luke s, 2006 WL (plaintiff failed to authenticate exhibits of defendant s website postings because affidavits used to authenticate the exhibits were factually inaccurate and the author lacked personal knowledge of the website); Wady, 216 F.Supp.2d One commentator has observed [i]n applying [the authentication standard] to website evidence, there are three questions that must be answered explicitly or implicitly. (1) What was actually on the website? (2) Does the exhibit or testimony accurately reflect it? (3) If so, is it attributable to the owner of the site? 7 The same author suggests that the following factors will influence courts in ruling whether to admit evidence of internet postings: the length of time the data was posted on the site; whether others report having seen it; 6 Lorraine, 241 F.R.D. at Gregory P. Joseph, Internet and Evidence, 13 PRAC. LITIGATOR (Mar. 2002), reprinted in 5 STEPHEN A. SALTZBURG ET AL., FEDERAL RULES OF EVIDENCE MANUAL, Part 4 at 21 (9th ed. 2006); see also SALTZBURG at [12].

7 whether it remains on the website for the court to verify; whether the data is of a type ordinarily posted on that website or websites of similar entities (e.g. financial information from corporations); whether the owner of the site has elsewhere published the same data, in whole or in part; whether others have published the same data, in whole or in part; whether the data has been republished by others who identify the source of the data as the website in question? 8 Counsel attempting to authenticate exhibits containing information from internet websites need to address these concerns in deciding what method of authentication to use, and the facts to include in the foundation. The authentication rules most likely to apply, singly or in combination, are: 901(b)(1) (witness with knowledge) 901(b)(3) (expert testimony) 901(b)(4) (distinctive characteristics), 901(b)(7) (public records), 901(b)(9) (system or process capable of producing a reliable result), and 902(5) (official publications). South Carolina Case: A court considered evidence of Father s MySpace postings in determining custody. 9 E. Text Messages and Chat Room Content. Many of the same foundational issues encountered when authenticating website evidence apply with equal force to text messages and internet chat room content; however, the fact that chat room messages are posted by third parties, often using screen names means that it cannot be assumed that the content found in chat rooms was posted with the knowledge or authority of the website host. 10 One commentator has suggested that the following foundational requirements must be met to authenticate chat room evidence: (1) evidence that the individual used the screen name in question when participating in chat room conversations (either generally or at the site in question); (2) evidence that, when a meeting with the person using the screen name was arranged, the individual showed up; (3) evidence that the person using the screen name identified himself as the person in the chat room conversation; (4) evidence that the individual had in his possession information given to the person using the screen name; or (5) evidence from the hard drive of the individual s computer showing use of the same screen name. 11 Courts also have recognized that exhibits of chat room conversations may be authenticated circumstantially. For example, in In re F.P., 12 the defendant argued that the testimony of the internet service provider was required, or that of a forensic expert. The court held that circumstantial evidence, such as the use of the defendant s screen name in the text message, the use of the defendant s first name, and the subject matter of the messages all could authenticate the transcripts. Similarly, in United States v. Simpson, 13 the court held that there was ample circumstantial evidence to authenticate printouts of the content of chat room discussions between the defendant and an undercover detective, including use of the name of the defendant, the presence of the defendant s correct address in the messages, and notes seized at the defendant s home containing the address, address and telephone number given by the undercover officer. Likewise, in United States v. Tank, 14 the court found sufficient circumstantial facts to authenticate chat room conversations, despite the fact that certain portions of the text of the messages in which the defendant had participated had been deleted. There, the court found the testimony regarding the limited nature of the deletions by the member of the chat room club who had made the deletions, circumstantial evidence connecting the defendant to the chat room, including the use of the defendant s screen name in the messages, were sufficient to authenticate the messages. Based on the foregoing cases, the rules most likely to be used to authenticate chat room and text messages, alone or in combination, appear to be: 901(b)(1) (witness with knowledge) and 901(b)(4) (circumstantial evidence of distinctive characteristics). South Carolina Cases: South Carolina cases that have turned on text message evidence include: In re Spencer R., 387 S.C. 517, 692 S.E.2d 56 (Ct.App. 2010); Roe v. Reeves, 392 S.C. 143, 708 S.E.2d 778 (2011); and Garcia v. Saski, Opinion No MO- 044 (Nov. 10, 2008). South Carolina Cases: The South Carolina Supreme Court upheld the admission of chat room 8 Id. at High v. High, 389 S.C. 226, 697 S.E.2d 690 (Ct.App. 2010). 10 Lorraine, 241 F.R.D. at SALTZBURG at [12] A.2d at F.3d at F.3d at

8 conversations. 15 A recent appellate court case also turned on chat room conversation evidence. 16 F. Computer Stored Records and Data. Given the widespread use of computers, there is an almost limitless variety of records that are stored in or generated by computers. 17 As one commentator has observed [m]any kinds of computer records and computer- generated information are introduced as real evidence or used as litigation aids at trials. They range from computer printouts of stored digital data to complex computer-generated models performing complicated computations. Each may raise different admissibility issues concerning authentication and other foundational requirements. The least complex admissibility issues are associated with electronically stored records. In general, electronic documents or records that are merely stored in a computer raise no computer-specific authentication issues. That said, although computer records are the easiest to authenticate, there is growing recognition that more care is required to authenticate these electronic records than traditional hard copy records. Two cases illustrate the contrast between the more lenient approach to admissibility of computer records and the more demanding one: In United States v. Meienberg, 18 the defendant challenged on appeal the admission into evidence of printouts of computerized records of the Colorado Bureau of Investigation, arguing that they had not been authenticated because the government had failed to introduce any evidence to demonstrate the accuracy of the records. The Tenth Circuit disagreed, stating: Any question as to the accuracy of the printouts, whether resulting from incorrect data entry or the operation of the computer program, as with inaccuracies in any other type of business records, would have affected only the weight of the printouts, not their admissibility. See also: Kassimu, 2006 WL (To authenticate computer records as business records did not require the maker, or even a custodian of the record, only a witness qualified to explain the record keeping system of the organization to confirm that the requirements of Rule 803(6) had been met, and the inability of a witness to attest to the accuracy of the information entered into the computer did not preclude admissibility); Sea Land Serv., Inc. v. Lozen Int l, 285 F.3d 808 (9th Cir.2002) (ruling that trial court properly considered electronically generated bill of 15 State v. Gaines, 380 S.C. 23, 667 S.E.2d 728 (2008). 16 State v. Reid, 383 S.C. 285, 679 S.E.2d 194 (2009). 17 Lorraine, 241 F.R.D. at F.3d at lading as an exhibit to a summary judgment motion. The only foundation that was required was that the record was produced from the same electronic information that was generated contemporaneously when the parties entered into their contact. The court did not require evidence that the records were reliable or accurate). In contrast, in the case of In re Vee Vinhnee, 19 the bankruptcy appellate panel upheld the trial ruling of a bankruptcy judge excluding electronic business records of the credit card issuer of a Chapter 7 debtor, for failing to authenticate them. The court noted that it is becoming recognized that early versions of computer foundations were too cursory, even though the basic elements covered the ground. The court further observed that: The primary authenticity issue in the context of business records is on what has, or may have, happened to the record in the interval between when it was placed in the files and the time of trial. In other words, the record being proffered must be shown to continue to be an accurate representation of the record that originally was created. Hence, the focus is not on the circumstances of the creation of the record, but rather on the circumstances of the preservation of the record during the time it is in the file so as to assure that the document being proffered is the same as the document that originally was created. The court reasoned that, for paperless electronic records: The logical questions extend beyond the identification of the particular computer equipment and programs used. The entity s policies and procedures for the use of the equipment, database, and programs are important. How access to the pertinent database is controlled and, separately, how access to the specific program is controlled are important questions. How changes in the database are logged or recorded, as well as the structure and implementation of backup systems and audit procedures for assuring the continuing integrity of the database, are pertinent to the question of whether records have been changed since their creation. In order to meet the heightened demands for authenticating electronic business records, the court adopted, with some modification, an eleven-step foundation proposed by Professor Edward Imwinkelried, viewing electronic records as a form of scientific evidence: 1. The business uses a computer. 2. The computer is reliable. 3. The business has developed a procedure for inserting data into the computer. 4. The procedure has built-in safeguards to ensure accuracy and identify errors. 5. The business keeps the computer in a good state of repair B.R

9 6. The witness had the computer readout certain data. 7. The witness used the proper procedures to obtain the readout. 8. The computer was in working order at the time the witness obtained the readout. 9. The witness recognizes the exhibit as the readout. 10. The witness explains how he or she recognizes the readout. 11. If the readout contains strange symbols or terms, the witness explains the meaning of the symbols or terms for the trier of fact. 20 Although the position taken by the court in In re Vee Vinhnee appears to be the most demanding requirement for authenticating computer stored records, other courts also have recognized a need to demonstrate the accuracy of these records. See, e.g.: State v. Dunn, 7 S.W.3d 427, 432 (Mo.Ct.App.2000) (Admissibility of computergenerated records should be determined on the basis of the reliability and accuracy of the process involved. ); State v. Hall, 976 S.W.2d 121, 147 (Tenn. 1998) ( [T]he admissibility of the computer tracing system record should be measured by the reliability of the system, itself, relative to its proper functioning and accuracy. ). As the foregoing cases illustrate, there is a wide disparity between the most lenient positions courts have taken in accepting electronic records as authentic and the most demanding requirements that have been imposed. Further, it would not be surprising to find that, to date, more courts have tended towards the lenient rather than the demanding approach. However, it also is plain that commentators and courts increasingly recognize the special characteristics of electronically stored records, and there appears to be a growing awareness, as expressed in the Manual for Complex Litigation, that courts should consider the accuracy and reliability of computerized evidence in ruling on its admissibility. Lawyers can expect to encounter judges in both camps, and in the absence of controlling precedent in the court where an action is pending setting forth the foundational requirements for computer records, there is uncertainty about which approach will be required. Further, although it may be better to be lucky than good, as the saying goes, counsel would be wise not to test their luck unnecessarily. If it is critical to the success of your case to admit into evidence computer stored records, it would be prudent to plan to authenticate the record by the most rigorous standard that may be applied. If less is required, then luck was with you. 20 EDWARD J. IMWINKELRIED, EVIDENTIARY FOUNDATIONS at 4.03[2] (LexisNexis 6th ed. 2005). 5 The methods of authentication most likely to be appropriate for computerized records are: 901(b)(1) (witness with knowledge), 901(b)(3) (expert testimony), 901(b)(4) (distinctive characteristics), and 901(b)(9) (system or process capable of producing a reliable result). G. Digital Photographs and Videos. Photographs have been authenticated for decades under Rule 901(b)(1) by the testimony of a witness familiar with the scene depicted in the photograph who testifies that the photograph fairly and accurately represents the scene. 21 Calling the photographer or offering expert testimony about how a camera works almost never has been required for traditional film photographs. Today, however, the vast majority of photographs taken, and offered as exhibits at trial, are digital photographs, which are not made from film, but rather from images captured by a digital camera and loaded into a computer. Digital photographs present unique authentication problems because they are a form of electronically produced evidence that may be manipulated and altered. Indeed, unlike photographs made from film, digital photographs may be enhanced. Digital image enhancement consists of removing, inserting, or highlighting an aspect of the photograph that the technician wants to change. Some examples graphically illustrate the authentication issues associated with digital enhancement of photographs: Suppose that in a civil case, a shadow on a 35 mm photograph obscures the name of the manufacturer of an offending product. The plaintiff might offer an enhanced image, magically stripping the shadow to reveal the defendant s name. Or suppose that a critical issue is the visibility of a highway hazard. A civil defendant might offer an enhanced image of the stretch of highway to persuade the jury that the plaintiff should have perceived the danger ahead before reaching it. In many criminal trials, the prosecutor offers an improved, digitally enhanced image of fingerprints discovered at the crime scene. The digital image reveals incriminating points of similarity that the jury otherwise would never would have seen. There are three distinct types of digital photographs that should be considered with respect to authentication analysis: original digital images, digitally converted images, and digitally enhanced images. 1. Original Digital Photograph. An original digital photograph may be authenticated the same way as a film photo, by a witness with personal knowledge of the scene depicted who can testify that the photo fairly and accurately 21 Lorraine, 241 F.R.D. at

10 depicts it. If a question is raised about the reliability of digital photography in general, the court likely could take judicial notice of it under Rule 201. Further, even if no witness can testify from personal knowledge that the photo or video accurately depicts the scene, the silent witness analysis allows a photo or video to be authenticated by showing a process or system that produces an accurate result Digitally Converted Images. For digitally converted images, authentication requires an explanation of the process by which a film photograph was converted to digital format. This would require testimony about the process used to do the conversion, requiring a witness with personal knowledge that the conversion process produces accurate and reliable images, Rules 901(b)(1) and 901(b)(9)-the latter rule implicating expert testimony under Rule 702. Alternatively, if there is a witness familiar with the scene depicted who can testify to the photo produced from the film when it was digitally converted, no testimony would be needed regarding the process of digital conversion. 3. Digitally Enhanced Images. For digitally enhanced images, it is unlikely that there will be a witness who can testify how the original scene looked if, for example, a shadow was removed, or the colors were intensified. In such a case, there will need to be proof, permissible under Rule 901(b)(9), that the digital enhancement process produces reliable and accurate results, which gets into the realm of scientific or technical evidence under Rule 702. Recently, one state court has given particular scrutiny to how this should be done. In State v. Swinton, 23 the defendant was convicted of murder in part based on evidence of computer enhanced images prepared using the Adobe Photoshop software. The images showed a superimposition of the defendant s teeth over digital photographs of bite marks taken from the victim s body. At trial, the state called the forensic odontologist (bite mark expert) to testify that the defendant was the source of the bite marks on the victim. However, the defendant testified that he was not familiar with how the Adobe Photoshop made the overlay photographs, which involved a multi-step process in which a wax mold of the defendant s teeth was digitally photographed and scanned into the computer to then be superimposed on the photo of the victim. The trial court admitted the exhibits over objection, but the state appellate court reversed, finding that the defendant had not been afforded a chance to challenge the scientific or technical process by which the exhibits had been prepared. The court stated that to authenticate the 22 See Rule 901(b)(9), SCRE Conn. 781, 847 A.2d 921, (2004). exhibits would require a sponsoring witness who could testify, adequately and truthfully, as to exactly what the jury was looking at, and the defendant had a right to cross-examine the witness concerning the evidence. Because the witness called by the state to authenticate the exhibits lacked the computer expertise to do so, the defendant was deprived of the right to cross examine him. Because the process of computer enhancement involves a scientific or technical process, one commentator has suggested the following foundation as a means to authenticate digitally enhanced photographs under Rule 901(b)(9): (1) The witness is an expert in digital photography; (2) the witness testifies as to image enhancement technology, including the creation of the digital image consisting of pixels and the process by which the computer manipulates them; (3) the witness testifies that the processes used are valid; (4) the witness testifies that there has been adequate research into the specific application of image enhancement technology involved in the case; (5) the witness testifies that the software used was developed from the research; (6) the witness received a film photograph; (7) the witness digitized the film photograph using the proper procedure, then used the proper procedure to enhance the film photograph in the computer; (8) the witness can identify the trial exhibit as the product of the enhancement process he or she performed. 24 The author recognized that this is an extensive foundation, and whether it will be adopted by courts in the future remains to be seen. However, it is probable that courts will require authentication of digitallyenhanced photographs by adequate testimony that a photograph is the product of a system or process that produces accurate and reliable results under Rule 901(b)(9). South Carolina Case: The South Carolina Supreme Court held that a party may authenticate a video animation by offering testimony from a witness familiar with the preparation of the animation and the data on which it is based. In that case, the animation was authenticated by the testimony of the expert who prepared the underlying data and the computer technician who used that data to create it Edward J. Imwinkelried, Can this Photo be Trusted?, Trial, October 2005 at Clark v. Cantrell, 339 S.C. 369, 529 S.E.2d 528 (2000). 6

11 H. Voic . Rule 901(b)(5) provides that a voice recording may be identified by opinion based upon hearing the voice at anytime under circumstances connecting it with the alleged speaker. South Carolina Case: A tape of a recorded conversation was sufficiently authenticated under 901(b)(6) by the following testimony: the victim who made the call testified that she knew the other party, that she telephoned him from the sheriff's office and knew the conversation was taped, that she listened to the tape, that she recognized the tape from her initials on it, that the tape fairly and accurately represented the phone conversation, and that the tape had not been edited or altered in any way. The court further held that establishing a chain of custody was not necessary since the tape was otherwise authenticated. 26 I. Conclusion on Authenticating ESI. To prepare properly to address authentication issues associated with electronically generated or stored evidence, a lawyer must identify each category of electronic evidence to be introduced. 27 Then, he or she should determine what courts have required to authenticate this type of evidence, and carefully evaluate the methods of authentication identified in Rules 901 and 902, as well as consider requesting a stipulation from opposing counsel, or filing a request for admission of the genuineness of the evidence. With this analysis in mind, the lawyer then can plan which method or methods of authentication will be most effective, and prepare the necessary formulation, whether through testimony, affidavit, admission or stipulation. The proffering attorney needs to be specific in presenting the authenticating facts and, if authenticity is challenged, should cite authority to support the method selected. An attorney could also ask authenticating questions about ESI during a deposition. An attorney could have the deponent log into various sites during the deposition and testify to the contents. In theory, this would be no different than having a deponent produce a diary and go through it. IV. BEST EVIDENCE RULE. The Best Evidence Rule states that, to prove the content of a writing, recording, or photograph, the original writing, recording, or photograph is required except as otherwise provided. 28 The purpose of the best evidence rule is to produce the best obtainable evidence, and if a document cannot as a practical matter be produced because of its loss or destruction, then the production of the original is excused. 29 Under Rule 1001(3), SCRE, if data are stored in a computer or similar device, any printout or other output readable by sight, shown to reflect the data accurately, is an original. An Indiana court, for example, found that internet chat room communications that a party cut and pasted into a word processing document were still originals. 30 In the predicate for introducing a computer printout, asking whether the exhibit reflects the data accurately may help to overcome an objection under the Best Evidence Rule. V. HEARSAY ISSUES IN ELECTRONIC EVIDENCE. Hearsay is a statement, other than one made by the declarant while testifying at the trial or hearing, offered in evidence to prove the truth of the matter asserted. 31 (See Non-Assertive Statement, below, for a discussion of whether testimony is even a statement at all.) Hearsay is inadmissible unless otherwise permitted by the rules or by statute. 32 Put more simply, any out-of-court statement, whether by the witness or another person, is hearsay and is inadmissible to support the truth of a claim, unless permitted by another rule. If it can be shown that a statement is non-hearsay or that it falls within a hearsay exception, the statement can be admissible as probative evidence. The twenty-three hearsay exceptions listed in Rule 803 may be roughly categorized into three categories: unreflective statements, reliable documents, and reputation evidence. The rationale for all of the exceptions is that, over time, experience has shown that these types of statements are generally reliable and trustworthy. A. Unreflective Statements. Evidence obtained from , text messaging, or social networking sites, such as Facebook, MySpace, or Twitter, is often relevant in family law cases. The evidence may be non-hearsay to the extent that it is an admission by a party-opponent, but there may be times where statements by others are relevant. Of the hearsay exceptions, 803(1)-(3) can be especially useful in admitting these types of evidence. Those are the exceptions for present sense impression, excited utterance, and then-existing condition. Electronic communication is particularly prone to candid statements of the declarant s state of mind, feelings, 26 State v. Aragon, 354 S.C. 334, , 579 S.E.2d 626 (Ct.App. 2003). 27 Lorraine, 241 F.R.D. at Rule 1002, SCRE (emph. added). 29 Rule 1004(1), SCRE. 30 Laughner v. State, 769 N.E.2d 1147, 1159 (Ind. Ct. App. 2002). 31 Rule 801(c), SCRE. 32 Rule 802, SCRE; see Rules 801(d), 803,

12 emotions, and motives. 33 Further, such messages are often sent while events are unfolding. The logic of the existing exceptions can be applied to admit even new forms of communication. Prior to South Carolina s adoption of the Rules of Evidence, there was a common-law res gestae hearsay exception. 34 The previous res gestae exception combined both 803(1) and (2), but, under the Rules of Evidence, those exceptions are different. 1. Present Sense Impression. A statement describing or explaining an event made while the declarant was perceiving the event or immediately thereafter. 35 Unlike the excited-utterance exception, the rationale for this exception stems from the statement s contemporaneity, not its spontaneity. The present sense impression exception to the hearsay rule is based upon the premise that the contemporaneity of the event and the declaration ensures reliability of the statement. 36 The rationale underlying the present sense impression is that the statement is safe from any error of the defect of memory of the declarant because of its contemporaneous nature; there is little or no time for a calculated misstatement; and the statement will usually be made to another (the witness who reports it) who would have an equal opportunity to observe and therefore check a misstatement. The rule is predicated on the notion that the utterance is a reflex product of immediate sensual impressions, unaided by retrospective mental processes. It is instinctive, rather than deliberate. If the declarant has had time to reflect upon the event and the conditions he observed, this lack of contemporaneity diminishes the reliability of the statements and renders them inadmissible under the rule. Once reflective narratives, calculated statements, deliberate opinions, conclusions, or conscious thinking-it-through statements enter the picture, the present sense impression exception no longer allows their admission. Thinking about it destroys the unreflective nature required of a present sense impression. 2. Excited Utterance. A statement relating to a startling event or condition made while the declarant was under the stress of excitement caused by event or condition. 37 The excited-utterance exception is broader than the present-sense-impression exception. While a presentsense-impression statement must be made while the 33 Lorraine v. Markel American Ins. Co., 241 F.R.D. 534, 570 (D.Md. 2007) (memo. op.). 34 See State v. Burroughs, 328 S.C. 489, 492 S.E.2d 408 (1997). 35 Rule 803(1), SCRE (emph. added). 36 Miller v. Keating, 754 F.2d 507, (3d Cir. 1985). 37 Rule 803(2), SCRE. 8 declarant was perceiving the event or condition, or immediately thereafter, under the excited-utterance exception, the startling event may trigger a spontaneous statement that relates to a much earlier incident. The elements of the excited-utterance exception are: (1) a startling occasion, (2) a statement relating to the circumstances of the startling occasion, (3) a declarant who appears to have had opportunity to observe personally the events, and (4) a statement made before there has been time to reflect and fabricate. 38 The critical factor in determining when a statement is an excited utterance under Rule 803(2) is whether the declarant was still dominated by the emotions, excitement, fear, or pain of the event. The time elapsed between the occurrence of the event and the utterance is only one factor considered in determining the admissibility of the hearsay statement. 3. Then Existing Mental, Emotional, or Physical Condition. A statement of the declarant s then existing state of mind, emotion, sensation, or physical condition (such as intent, plan, motive, design, mental feeling, pain, and bodily health), but not including a statement of memory or belief to prove the fact remembered or believed unless it relates to the execution, revocation, identification, or terms of declarant s will. 39 The type of statement contemplated by this rule includes a statement that on its face expresses or exemplifies the declarant s state of mind such as fear, hate, love, and pain. However, a statement is inadmissible if it is a statement of memory or belief offered to prove the fact remembered or believed. 40 One federal court offers the following explanation of Rule 803(3) s exception to the exception : Case law makes it clear that a witness may testify to a declarant saying I am scared, but not I am scared because the defendant threatened me. The first statement indicates an actual state of mind or condition, while the second statement expresses belief about why the declarant is frightened. The phrase because the defendant threatened me is expressly outside the state-of-mind exception because the explanation for the fear expresses a belief different from the state of mind of being afraid. 41 B. Reliable Documents. The second category of hearsay exceptions, reliable documents, can also include a variety of computer- or internet-stored data. Anything from online flight schedules, to personal financial records, to s could potentially be admitted under these existing hearsay exceptions. 38 Miller v. Keating, 754 F.2d 507, (3d Cir. 1985). 39 Rule 803(3), SCRE. 40 Rule 803(3), SCRE. 41 United States v. Ledford, 443 F.3d 702, 709 (10th Cir. 2005).

13 1. Recorded Recollection. A memorandum or record concerning a matter about which a witness once had knowledge but now has insufficient recollection to enable the witness to testify fully and accurately, shown to have been made or adopted by the witness when the matter was fresh in the witness memory and to reflect that knowledge correctly, unless the circumstances of preparation cast doubt on the document s trustworthiness. If admitted, the memorandum or record may be read into evidence but may not itself be received as an exhibit unless offered by an adverse party. 42 For a statement to be admissible under Rule 803(5), the witness must have had firsthand knowledge of the event, the statement must be an original memorandum made at or near the time of the event while the witness had a clear and accurate memory of it, the witness must lack a present recollection of the event, and the witness must vouch for the accuracy of the written memorandum. To meet the fourth element, the witness may testify that she presently remembers recording the fact correctly or remembers recognizing the writing as accurate when she read it at an earlier time. But if her present memory is less effective, it is sufficient if the witness testifies that she knows the memorandum is correct because of a habit or practice to record matters accurately or to check them for accuracy. 2. Records of Regularly Conducted Activity. A memorandum, report, record, or data compilation, in any form, of acts, events, conditions, opinions, or diagnoses, made at or near the time by, or from information transmitted by, a person with knowledge, if kept in the course of a regularly conducted business activity, and if it was the regular practice of that business activity to make the memorandum, report, record, or data compilation, all as shown by the testimony of the custodian or other qualified witness, unless the source of information or the method or circumstances of preparation indicate lack of trustworthiness; provided, however, that subjective opinions and judgments found in business records are not admissible. The term "business" as used in this subsection includes business, institution, association, profession, occupation, and calling of every kind, whether or not conducted for profit. 43 For example, if a spouse keeps financial records as part of a regularly organized activity, the records can be admitted under this exception with the spouse as the sponsoring witness, without a business records affidavit. Courts have admitted check registers in this way. 44 The predicate for admissibility under the 42 Rule 803(5), SCRE. 43 Rule 803(6), SCRE. 44 See Sabatino v. Curtiss Nat l Bank, 415 F.2d 632, 634 (5 th Cir. 1969). 9 business records exception is established if the party offering the evidence establishes that the records were generated pursuant to a course of regularly conducted business activity and that the records were created by or from information transmitted by a person with knowledge, at or near the time of the event. 3. Market Reports, Commercial Publications. Market quotations, tabulations, lists, directories, or other published compilations, generally used and relied upon by the public or by persons in particular occupations. 45 Where it is proven that publications of market prices or statistical compilations are generally recognized as reliable and regularly used in a trade or specialized activity by persons so engaged, such publications are admissible for the truth of the matter published. A variety of potentially-relevant commercial data published online can be admissible under this exception. C. Statements That Are Not Hearsay. Evidence constitutes hearsay only if it is (1) an assertive statement (2) by an out-of-court declarant (3) offered to prove the truth of the assertion Computer Generated Statements. Cases involving electronic evidence often raise the issue of whether electronic writings constitute statements under Rule 801(a). Where the writings are non-assertive, or not made by a person, courts have held that they do not constitute hearsay, as they are not statements. 47 While there may be authentication issues relating to computer-generated text or computer-processed data, several federal cases have held that such information is not hearsay: United States v. Khorozian, 333 F.3d 498, 506 (3d Cir.2003) ( [N]either the header nor the text of the fax was hearsay. As to the header, [u]nder FRE 801(a), a statement is something uttered by a person, so nothing said by a machine is hearsay ); Safavian, 435 F.Supp.2d at 44 (holding that portions of communications that make imperative statements instructing defendant what to do, or asking questions are nonassertive verbal conduct that does not fit within the definition of hearsay); Telewizja Polska USA, 2004 WL (finding that images and text posted on website offered to show what the website looked like on a particular day were not statements and 45 Rule 803(17), SCRE. 46 Edward J. Imwinkelreid, Evidentiary Foundations, 7 th ed., 10.01, p. 407 (2008). 47 Lorraine v. Markel American Ins. Co., 241 F.R.D. 534, (D.Md. 2007) (memo. op.).

14 therefore fell outside the reach of the hearsay rule); Perfect 10, 213 F.Supp.2d at 1155 (finding that images and text taken from website of defendant not hearsay, to the extent these images and text are being introduced to show the images and text found on the websites, they are not statements at all and thus fall outside the ambit of the hearsay rule. ); United States v. Rollins, rev d on other grounds 2004 WL 26780, at *9 (A.F.Ct.Crim.App. Dec.24, 2003)( Computer generated records are not hearsay: the role that the hearsay rule plays in limiting the fact finder s consideration to reliable evidence received from witnesses who are under oath and subject to crossexamination has no application to the computer generated record in this case. Instead, the admissibility of the computer tracing system record should be measured by the reliability of the system itself, relative to its proper functioning and accuracy. ); State v. Dunn, 7 S.W.3d 427, 432 (Mo.Ct.App.2000) ( Because records of this type [computer generated telephone records] are not the counterpart of a statement by a human declarant, which should ideally be tested by cross-examination of that declarant, they should not be treated as hearsay, but rather their admissibility should be determined on the reliability and accuracy of the process involved. ); State v. Hall, 976 S.W.2d 121, 147 (Tenn.1998) (reviewing the admissibility of computer generated records and holding [t]he role that the hearsay rule plays in limiting the fact finder s consideration to reliable evidence received from witnesses who are under oath and subject to cross-examination has no application to the computer generated record in this case. Instead, the admissibility of the computer tracing system record should be measured by the reliability of the system, itself, relative to its proper functioning and accuracy. ). 2. Metadata Metadata is the computer-generated data about a file, including date, time, past saves, edit information, etc. It would likely be considered a non-statement under the above logic, and therefore non-hearsay. It remains important to properly satisfy authentication requirements. A higher authentication standard may apply, since it is computer-processed data, rather than merely computer-stored data. However, since metadata is normally hidden and usually not intended to be reviewed, several states have issued ethics opinions concluding that it is unethical to mine inadvertently-produced metadata. 48 A few ethics opinions have held that mining metadata is not unethical. 49 The American Bar Association has published a state-by-state chart comparing positions on metadata. 50 South Carolina does not yet have an ethics opinion directly on point. 3. Admissions by a Party-Opponent. The statement is offered against a party and is (A) the party's own statement in either an individual or a representative capacity, or (B) a statement of which the party has manifested an adoption or belief in its truth, or (C) a statement by a person authorized by the party to make a statement concerning the subject, or (D) a statement by the party's agent or servant concerning a matter within the scope of the agency or employment, made during the existence of the relationship, or (E) a statement by a coconspirator of a party during the course and in furtherance of the conspiracy. 51 The Rules of Evidence allow liberal introduction of a party's admissions and define them as nonhearsay, because of the incongruity of the party objecting to his own statement on the ground that he was not subject to cross-examination by himself at the time. For this reason, the Rules of Evidence omit any provision allowing introduction of admissions made by predecessors in interest or those in privity to a party, as considerations of privity and joint interest neither furnish criteria of credibility nor aid in the evaluation of testimony. 52 The exemption for admissions by a partyopponent is extremely useful in overcoming a hearsay objection to texts, s, Facebook wall posts, etc. VI. WITNESSES. Online evidence can also be useful in managing a witness. A. Writing Used to Refresh Memory. Social networking or other electronic communications can be a useful record of events or a witness s thoughts. If a witness s memory fails, a writing, including an electronic communication, may be used to refresh the witness s memory. 48 NY. Comm. On Prof l Ethics, Op. 749 (1002); Prof l Ethics of the Fla. Bar, Op (2006); Ala. State Bar office of the Gen. Counsel, Op. No (2007); D.C. Bar, Op Md. State Bar Ass n, Comm. on Ethics, Op (2006); ABA Formal Op Available at: departments_offices/legal_technology_resources/resources/ charts_fyis/metadatachart.html 51 Rule 801(d)(2), SCRE. 52 See Eldridge v. Greenwood, 331 S.C. 398, 432 n.17, 503 S.E.2d 191 (1998). 10

15 There is often confusion about the difference between a recorded recollection under the hearsay exception of Rule 803(5) and a writing used to refresh memory under Rule 613. The Welch 53 case offers a helpful explanation of the differences: A witness testifies from present recollection what he remembers presently about the facts in the case. When that present recollection fails, the witness may refresh his memory by reviewing a memorandum made when his memory was fresh. After reviewing the memorandum, the witness must testify either his memory is refreshed or his memory is not refreshed. If his memory is refreshed, the witness continues to testify and the memorandum is not received as evidence. However, if the witness states that his memory is not refreshed, but has identified the memorandum and guarantees the correctness, then the memorandum is admitted as past recollection recorded. Where the memorandum, statement or writing is used to refresh the present recollection of the witness and it does, then the memorandum does not become part of the evidence, for it is not the paper that is evidence, but the recollection of the witness. An adverse party is entitled to have the writing produced at the hearing, to inspect it, to cross-examine the witness thereon, and to introduce in evidence those portions which relate to the testimony of the witness. 54 Use of an otherwise privileged writing to refresh a party s memory will constitute a waiver of that privilege. B. Impeachment. Electronic communications can be some of the most useful tools for impeachment. Impeachment evidence is generally hearsay and does not have probative value. Prior inconsistent statements offered to impeach the witness s credibility do not constitute hearsay because they are not offered for the truth of the matter asserted. If the impeachment evidence meets a hearsay exception or exemption, however, it may be admitted as probative evidence. The Michael 55 case gives an excellent summary of the means of impeachment: There are five major forms of impeachment: two are specific, and three are nonspecific. Specific impeachment is an attack on the accuracy of the specific testimony (i.e., the witness may normally be a truthteller, but she is wrong about X), while non-specific impeachment is an attack on the witness generally (the witness is a liar, therefore she is wrong about X). The two specific forms of impeachment are impeachment by prior inconsistent statements and impeachment by another witness. The three non-specific forms of impeachment are impeachment through bias or motive or interest, impeachment by highlighting testimonial defects, and impeachment by general credibility or lack of truthfulness. Electronic evidence can be useful for providing specific impeachment (previous statements by the witness) as well as non-specific impeachment (photos of the witness in situations that reflect poorly on the witness s credibility). 1. Prior Inconsistent Statement. Extrinsic evidence of a prior inconsistent statement by a witness is not admissible unless the witness is advised of the substance of the statement, the time and place it was allegedly made, and the person to whom it was made, and is given the opportunity to explain or deny the statement. If a witness does not admit that he has made the prior inconsistent statement, extrinsic evidence of such statement is admissible. However, if a witness admits making the prior statement, extrinsic evidence that the prior statement was made is inadmissible. This provision does not apply to admissions of a partyopponent as defined in Rule 801(d)(2). 56 If a proper predicate is not laid, the inconsistent statement may be excluded and further crossexamination on the subject blocked. However, if the witness is the opposing party, no confrontation is required, and no opportunity to explain need be given. 2. Impeaching Hearsay Statements The credibility of hearsay statements can be impeached just as if the statements were uttered by a witness. If an opponent successfully uses online communications from a third party, an attorney can put on evidence to impeach the credibility of the out-ofcourt declarant. Rule 806, SCRE, provides that when a hearsay statement, or a non-hearsay statement defined by Rule 801(d), has been admitted in evidence, the credibility of the out-of-court declarant may be attacked. Evidence of a statement or conduct by the declarant at any time may be offered to impeach the out-of-court declarant. There is no requirement that the declarant be afforded an opportunity to deny or explain. If the credibility of the out-of-court declarant is attacked, it may be supported by any evidence which would be admissible if the declarant had testified as a witness. If the party against whom a hearsay statement has been admitted then calls the declarant as a witness, the party is entitled to examine the declarant on the statement as if under cross-examination. 53 Welch v. State, 576 S.W.2d 638, 641 (Tex.Crim.App. 1979). 54 Rule 612, SCRE. 55 Michael v. State, 235 S.W.3d 723, 726 (Tex.Crim.App. 2007) Rule 613(b), SCRE.

16 C. Character Evidence. Social networking evidence can be especially useful for providing character evidence or evidence of a party s prior conduct. Evidence about prior instances of conduct used to show that a person acted in conformity on a particular occasion is generally inadmissible. However, under 404(b), such evidence may be admissible for other purposes, such as showing proof of motive, opportunity, intent, preparation, plan, knowledge, identity, or absence of mistake or accident. Further, evidence of the habit of a person or of the routine practice of an organization, whether corroborated or not and regardless of the presence of eyewitnesses, is relevant to prove that the conduct of the person or organization on a particular occasion was in conformity with the habit or routine practice. 57 Although evidence of specific acts is limited, character evidence can be admissible. 58 If reputation or opinion testimony is admitted, evidence of specific instances of conduct is permitted on cross-examination. VII. UNFAIR PREJUDICE. If an attorney trying to keep a piece of evidence out has failed to block the evidence based on relevance, authenticity, hearsay, or the original writing rule, the final step is the requirement to balance evidence s probative value against the potential for unfair prejudice, or other harm, under Rule 403. This rule states: Although relevant, evidence may be excluded if its probative value is substantially outweighed by the danger of unfair prejudice, confusion of the issues, or misleading the jury, or by considerations of undue delay, or needless presentation of cumulative evidence. Although Rule 403 may be used in combination with any other rule of evidence to assess the admissibility of electronic evidence, courts are particularly likely to consider whether the admission of electronic evidence would be unduly prejudicial in the following circumstances: Offensive language. When the evidence would contain offensive or highly derogatory language that may provoke an emotional response. Monotype Corp., 43 F. 3d at 450 (Finding that trial court properly excluded an from a Microsoft employee under Rule 403 that contained a highly derogatory and offensive description of... [another company s] type director. ). Computer Animations. When analyzing computer animations, to determine if there is a substantial risk that the jury may mistake them for the actual events in the litigation. 57 Rule 406, SCRE. 58 Rules , SCRE. 12 Friend v. Time Manufacturing Co., 2006 WL at * 7 (D. Ariz. 2006)( Therefore, the question is simply whether the animation accurately demonstrates the scene of the accident, and whether the probative value is substantially outweighed by the danger of unfair prejudice, confusion of the issues, or misleading the jury, or by considerations of undue delay, waste of time, or needless presentation of cumulative evidence. ). State v. Sayles, 662 N.W. 2d 1, 11 (Iowa, 2003) (Appellate court found no error in trial court s admission of computer animation slides showing effects of shaken infant syndrome, finding that trial court properly considered state version of Rule 403, and admitted evidence with a cautionary instruction that the evidence was only an illustration, not a recreation of the actual crime). Summaries. When considering the admissibility of summaries of voluminous electronic writings, recordings or photographs under Rule Weinstein 59 ( Summary evidence is subject to the balancing test under Rule 403 that weighs the probative value of evidence against its prejudicial effect. ). Reliability and Accuracy. In circumstances when the court is concerned as to the reliability or accuracy of the information that is contained within the electronic evidence. St. Clair v. Johnny s Oyster and Shrimp Inc., 76 F. Supp. 2d 773 (S.D. Tx. 1999) (Court expressed extreme skepticism regarding the reliability and accuracy of information posted on the internet, referring to it variously as voodoo information. Although the court did not specifically refer to Rule 403, the possibility of unfair prejudice associated with the admissibility of unreliable or inaccurate information, as well as for confusion of the jury, makes Rule 403 a likely candidate for exclusion of such evidence). VIII. EXPERT TESTIMONY AND OPINIONS. A. Basis of Expert Testimony and Opinions. Increasingly, parties are bringing electronic evidence directly to experts, including Facebook posts, Twitter tweets, online photo albums, and other relevant social networking posts. For example, social study evaluators are being handed printouts of a spouse s online activity. To determine how this 59 JACK B. WEINSTEIN & MARGARET A. BERGER, WEINSTEIN S FEDERAL EVIDENCE [3] (Joseph M. McLaughlin ed., Matthew Bender 2d ed. 1997).

17 evidence affects an expert s work, attorneys should look back at the rules regarding expert testimony. B. Factors Relied Upon. The general rule is that, once properly qualified, an expert can base his or her opinion on just about anything remotely relevant to the issue he or she is called to testify about including evidence of online activity. Rule 703, SCRE, permits an expert to rely on the following to base his opinion: Personal Knowledge. This would include such observations as statements made by the parties, testing results, etc. Facts/Data Made Known to the Expert at or Before the Hearing. Many mental health professional rely and may rely on other evidence presented by others, deposition testimony and reports of other experts. Inadmissible Evidence, if Relied on by Others. The reliance on tests, trade journals, other medical reports, etc. has not created much controversy in regard to expert opinions. However, a problem may arise when the expert begins to recount a hearsay conversation he has had with another. Rule 703 implies that this type of testimony is permissible, but the case law indicates that there are limits. 60 Rule 703 permits an expert giving an opinion to rely on facts or data that are not admitted in evidence or even admissible into evidence. The rule, however, does not allow for the unqualified admission of hearsay evidence merely because an expert has used it in forming an opinion. The expert may testify to evidence even though it is inadmissible under the hearsay rule, but allowing the evidence to be received for this purpose does not mean it is admitted for its truth. It is received only for the limited purpose of informing the jury of the basis of the expert's opinion and therefore does not constitute a true hearsay exception. IX. DISCOVERY OF ELECTRONIC EVIDENCE South Carolina amended its rules of civil procedure this year to explicitly address ESI. The amendments to Rules 16, 26, 33, 34, 37 and 45 of the South Carolina Rules of Civil Procedure concerning electronic discovery are substantially similar to the corresponding provisions in the Federal Rules of Civil Procedure. 61 Federal Rule of Civil Procedure 34, for example, governs the production of documents and electronically stored information. The Committee Notes on the 2006 amendment to FRCP 34 detail some of the issues courts have had to face in applying traditional discovery rules to include electronic evidence: 60 Jones v. Doe, 372 S.C. 53, 63, 640 S.E.2d 514 (Ct.App. 2006). 61 See S.C. R. Civ. P. Note to 2011 Amendment. As originally adopted, Rule 34 focused on discovery of documents and things. In 1970, Rule 34(a) was amended to include discovery of data compilations, anticipating that the use of computerized information would increase. Since then, the growth in electronically stored information and in the variety of systems for creating and storing such information has been dramatic. Lawyers and judges interpreted the term documents to include electronically stored information because it was obviously improper to allow a party to evade discovery obligations on the basis that the label had not kept pace with changes in information technology. But it has become increasingly difficult to say that all forms of electronically stored information, many dynamic in nature, fit within the traditional concept of a document. Electronically stored information may exist in dynamic databases and other forms far different from fixed expression on paper. Rule 34(a) is amended to confirm that discovery of electronically stored information stands on equal footing with discovery of paper documents. The change clarifies that Rule 34 applies to information that is fixed in a tangible form and to information that is stored in a medium from which it can be retrieved and examined. At the same time, a Rule 34 request for production of documents should be understood to encompass, and the response should include, electronically stored information unless discovery in the action has clearly distinguished between electronically stored information and documents. Discoverable information often exists in both paper and electronic form, and the same or similar information might exist in both. The items listed in Rule 34(a) show different ways in which information may be recorded or stored. Images, for example, might be hard-copy documents or electronically stored information. The wide variety of computer systems currently in use, and the rapidity of technological change, counsel against a limiting or precise definition of electronically stored information. Rule 34(a)(1) is expansive and includes any type of information that is stored electronically. A common example often sought in discovery is electronic communications, such as e- mail. The rule covers either as documents or as electronically stored information information stored in any medium, to encompass future developments in computer technology. Rule 34(a)(1) is intended to be broad enough to cover all current types of computerbased information, and flexible enough to encompass future changes and developments. References elsewhere in the rules to electronically stored information should be understood to invoke this expansive approach. A companion change is made to Rule 33(d), making it explicit that parties choosing to respond to an interrogatory by permitting access to responsive 13

18 records may do so by providing access to electronically stored information. More generally, the term used in Rule 34(a)(1) appears in a number of other amendments, such as those to Rules 26(a)(1), 26(b)(2), 26(b)(5)(B), 26(f), 34(b), 37(f), and 45. In each of these rules, electronically stored information has the same broad meaning it has under Rule 34(a)(1). References to documents appear in discovery rules that are not amended, including Rules 30(f), 36(a), and 37(c)(2). These references should be interpreted to include electronically stored information as circumstances warrant. The term electronically stored information is broad, but whether material that falls within this term should be produced, and in what form, are separate questions that must be addressed under Rules 26(b), 26(c), and 34(b). Rule 34(a)(1) is also amended to make clear that parties may request an opportunity to test or sample materials sought under the rule in addition to inspecting and copying them. That opportunity may be important for both electronically stored information and hard-copy materials. The current rule is not clear that such testing or sampling is authorized; the amendment expressly permits it. As with any other form of discovery, issues of burden and intrusiveness raised by requests to test or sample can be addressed under Rules 26(b)(2) and 26(c). Inspection or testing of certain types of electronically stored information or of a responding party's electronic information system may raise issues of confidentiality or privacy. The addition of testing and sampling to Rule 34(a) with regard to documents and electronically stored information is not meant to create a routine right of direct access to a party's electronic information system, although such access might be justified in some circumstances. Courts should guard against undue intrusiveness resulting from inspecting or testing such systems. Subdivision (b). Rule 34(b) provides that a party must produce documents as they are kept in the usual course of business or must organize and label them to correspond with the categories in the discovery request. The production of electronically stored information should be subject to comparable requirements to protect against deliberate or inadvertent production in ways that raise unnecessary obstacles for the requesting party. Rule 34(b) is amended to ensure similar protection for electronically stored information. The amendment to Rule 34(b) permits the requesting party to designate the form or forms in which it wants electronically stored information produced. The form of production is more important to the exchange of electronically stored information than of hard-copy materials, although a party might specify hard copy as the requested form. Specification of the desired form or forms may facilitate the orderly, efficient, and cost-effective discovery of electronically stored information. The rule recognizes that different forms of production may be appropriate for different types of electronically stored information. Using current technology, for example, a party might be called upon to produce word processing documents, e- mail messages, electronic spreadsheets, different image or sound files, and material from databases. Requiring that such diverse types of electronically stored information all be produced in the same form could prove impossible, and even if possible could increase the cost and burdens of producing and using the information. The rule therefore provides that the requesting party may ask for different forms of production for different types of electronically stored information. The rule does not require that the requesting party choose a form or forms of production. The requesting party may not have a preference. In some cases, the requesting party may not know what form the producing party uses to maintain its electronically stored information, although Rule 26(f)(3) is amended to call for discussion of the form of production in the parties prediscovery conference. The responding party also is involved in determining the form of production. In the written response to the production request that Rule 34 requires, the responding party must state the form it intends to use for producing electronically stored information if the requesting party does not specify a form or if the responding party objects to a form that the requesting party specifies. Stating the intended form before the production occurs may permit the parties to identify and seek to resolve disputes before the expense and work of the production occurs. A party that responds to a discovery request by simply producing electronically stored information in a form of its choice, without identifying that form in advance of the production in the response required by Rule 34(b), runs a risk that the requesting party can show that the produced form is not reasonably usable and that it is entitled to production of some or all of the information in an additional form. Additional time might be required to permit a responding party to assess the appropriate form or forms of production. If the requesting party is not satisfied with the form stated by the responding party, or if the responding party has objected to the form specified by the requesting party, the parties must meet and confer under Rule 37(a)(2)(B) in an effort to resolve the matter before the requesting party can file a motion to compel. If they cannot agree and the court resolves the dispute, the court is not limited to the forms initially chosen by the requesting party, stated by the 14

19 responding party, or specified in this rule for situations in which there is no court order or party agreement. If the form of production is not specified by party agreement or court order, the responding party must produce electronically stored information either in a form or forms in which it is ordinarily maintained or in a form or forms that are reasonably usable. Rule 34(a) requires that, if necessary, a responding party translate information it produces into a reasonably usable form. Under some circumstances, the responding party may need to provide some reasonable amount of technical support, information on application software, or other reasonable assistance to enable the requesting party to use the information. The rule does not require a party to produce electronically stored information in the form it [sic] which it is ordinarily maintained, as long as it is produced in a reasonably usable form. But the option to produce in a reasonably usable form does not mean that a responding party is free to convert electronically stored information from the form in which it is ordinarily maintained to a different form that makes it more difficult or burdensome for the requesting party to use the information efficiently in the litigation. If the responding party ordinarily maintains the information it is producing in a way that makes it searchable by electronic means, the information should not be produced in a form that removes or significantly degrades this feature. Some electronically stored information may be ordinarily maintained in a form that is not reasonably usable by any party. One example is legacy data that can be used only by superseded systems. The questions whether a producing party should be required to convert such information to a more usable form, or should be required to produce it at all, should be addressed under Rule 26(b)(2)(B). Whether or not the requesting party specified the form of production, Rule 34(b) provides that the same electronically stored information ordinarily be produced in only one form. 62 The National Center for State Courts Conference of Chief Justices approved GUIDELINES FOR STATE TRIAL COURTS REGARDING DISCOVERY OF ELECTRONICALLY STORED INFORMATION in The document is intended to help reduce the uncertainty in state court litigation by assisting trial judges in identifying the issues and determining the decision-making factors to be applied. If you have a case that you know will be particularly focused on electronic evidence, it may be useful to circulate the guide at pretrial discovery hearings to provide 62 FED. R. CIV. P. 34, Committee Notes on Rules 2006 Amendment. 63 Available at: EDiscCCJGuidelinesFinal.pdf 15 guidance on some of the more complex electronic discovery issues. X. ILLEGALLY OBTAINING ELECTRONIC EVIDENCE Many clients have questions about whether they can record phone calls, hide a camera to catch a cheating spouse in the act, or access a spouse s s. Attorneys wonder whether such evidence may be used at trial. Electronic evidence can be a trap for both client and attorney, exposing them to extensive civil and even criminal liability. A confusing mix of state and federal laws on wiretapping and computer security can have significant effects on divorcing spouses. Further, a spouse can be subject to private suits and common-law tort liability. This article will address the most common types of surreptitious electronic evidence and the pitfalls associated with each. A. Wiretap Laws The federal Wiretap Act, 18 U.S.C , regulates electronic surveillance of oral communications, whether those conversations are in person, by telephone, or by cell phone. Under the federal act, civil remedies include liquidated damages of $10,000, punitive damages, and attorney s fees. Criminal penalties can include imprisonment of up to five years. The federal wiretapping laws are one-party consent laws, meaning you may record any conversation you are a part of without the consent of the other party. However, planting a bug to record conversations between others would be a violation, as would installing an application on someone else s cell phone to record his or her calls with others. Courts have found a limited vicarious consent exception allowing a parent to record his or her child s conversations with others if there is a good faith, reasonable basis that it is necessary for the welfare of the child. While South Carolina does not have an explicit statute on point, caselaw holds that only one party s consent is required, similar to federal law. 64 B. Electronic Data Laws The federal Stored Communications Act, 18 U.S.C , regulates access to electronic communications including , faxes, and 64 See Mays v. Mays, 229 S.E.2d 725, (S.C. 1976) (finding that 18 U.S.C. 2511(2)(d) "makes it clear that one party to a telephone conversation may lawfully tape the conversation without the other's knowledge or permission and subsequently disclose [the conversation]."); Thompson v. State, 479 S.E.2d 808, (S.C. Ct. App. 1996) (finding that taped telephone conversations between defendant and confidential informant did not violate 18 U.S.C and the defendants right to privacy).

20 voic . Despite the use of the term stored, the Act regulates the access of communications during electronic transmission. Interestingly, this means that accessing s saved to the hard drive of a shared computer is permitted, but accessing s through a spouse s webmail account without consent is a violation. Penalties include fines and imprisonment for up to five years. Using evidence obtained from Facebook, MySpace, blogs, and other online sites is a growing trend in family law. It is a violation to log in to a spouse s online account without consent, however, the stored communications laws do not contain the same strict exclusionary rule as the wiretap laws. This means that even illegally-intercepted internet communications may be used at trial. South Carolina Case: A South Carolina Court recently applied the Stored Communications Act in a divorce case. 65 C. Torts Many invasion-of-privacy torts can apply to wiretapping or illegally obtaining electronic evidence. Victims of wiretapping, videotaping, and intercepted s can sue for (a) intrusion upon seclusion, (b) public disclosure of private facts, (c) appropriation of name or likeness for defendant s advantage, and even (d) intentional infliction of emotional distress, depending on the facts. Liability does not always depend on whether the private matters were ever publicized. Hiding a camera in a master bedroom can give rise to an invasion of privacy claim. In tort, a plaintiff can recover actual and punitive damages. A divorcing spouse would not have to file a separate lawsuit, because a court can consider tort claims in making a disproportionate division of a marital estate. D. Consequences for Attorneys An attorney s use or disclosure of intercepted communications violates the wiretap laws, even if the attorney did not direct a client to make the recording. This means that attorneys can face criminal and civil penalties for using evidence that a client obtained in violation of the wiretap laws. If an attorney has reason to believe that recordings were illegally obtained, the attorney should immediately cease reviewing the recordings and should not use or disclose the communications in any way. Although it is very tempting for clients to try to obtain smoking-gun evidence, attorneys must be aware of the serious consequences that can flow from violating electronic evidence laws. 65 Jennings v. Jennings, 389 S.C. 190, 697 S.E.2d 671 (Ct.App. 2010). 16 XI. SPOLIATION OF ELECTRONIC EVIDENCE Over the past few years, case and statutory law have begun to outline the duties and obligations of parties to litigation with respect to electronic discovery and evidence. Though fiduciary litigation, outside of closely held corporations, will largely be confined in discovery requests to the business data and hardware, do not automatically exclude the possibility of extraneous sources of electronic data, such as texts, facebook pages, blogs, or websites. The everdeveloping case and statutory law provides important guidelines for any litigator to keep in mind when dealing with electronic evidence and discovery. A. Zubulake In a series of opinions culminating in what is commonly referred to as Zubulake V, Judge Schendlin of the Southern District of New York announced what have now become significant protocols for counsel=s responsibilities surrounding electronic discovery and evidence. 66 One of the primary obligations the Zubulake opinions address is the duty to preserve electronic evidence when a party reasonably anticipates litigation. 67 Zubulake V provides three steps counsel should take to ensure compliance with a party=s preservation obligation: 1) Counsel must issue a Alitigation hold@ at the beginning of litigation or whenever litigation is reasonably anticipated. The hold should be re-issued periodically so that new employees are aware of it and all employees are reminded of their duties. 2) Counsel should communicate directly with Akey players@ in the litigation (i.e. people identified in a party=s initial disclosure and any supplemented disclosure). 3) Counsel should instruct all employees to produce electronic copies of their relevant active files and make sure that all backup media which the party has a duty retain is identified and stores in a safe place. 68 A litigation hold notice should describe the matter at issue, provide specific examples of the types of information at issue, identify potential sources of 66 Zubulake v. UBS Warburg, LLC, 229 F.R.D. 422 (S.D.N.Y. 2004); Losey, See Zubulake V, 228 F.R.D. 422; The Sedona Conference Commentary on Legal Holds: The Trigger and The Process, 1, (Conor R. Crowley et al. eds, The Sedona Conference 2007). 68 See Zubulake V, 229 F.R.D 422; The Sedona Conference Commentary on Legal Holds, 12.

21 information, and inform recipients of their legal obligations. 69 Case law is clear that a party does not have to preserve information that is not relevant. 70 B. Sedona Guidelines The Sedona Conference, a working group composed of lawyers, consultants, academics, and jurists, has also published a series of articles on the management of and best practices regarding electronic evidence. Primarily aimed at organizations, the Sedona Conference published the following guidelines for managing electronic information and records: An organization should have reasonable policies and procedures for managing its information and records. An organization=s information and records management policies and procedures should be realistic, practical and tailored to the circumstances of the organization. An organization need not retain all electronic information ever generated or received. An organization adopting an information and records management policy should also develop procedures that address the creation, identification, retention, retrieval and ultimate disposition or destruction of information and records. An organization=s policies and procedures must mandate the suspension of ordinary destruction practices and procedures must mandate the suspension of ordinary destruction practices and procedures as necessary to comply with preservation obligations related to actual or reasonably anticipated litigation, government investigation or audit. 71 The Sedona Conference has also devised the following guidelines to determine when litigation is reasonably anticipated and when a duty to take affirmative steps to preserve relevant information has arisen: 69 The Sedona Conference Commentary of Legal Holds, See Zubulake v. UBS Warburg (Zubulake IV), 220 F.R.D. 212, 217 (S.D.N.Y. 2003)(stating, AMust a corporation, upon recognizing the threat of litigation, preserve every shred of paper, every or electronic documents, and every backup tape? The answer is clearly, >no.= Such a rule would cripple large corporations.@) 71 The Sedona Guidelines: Best Practice Guidelines and Commentary for Managing Information and Records in the Electronic Age, iv-v (Charles R. Ragan et al. eds, The Sedona Conference 2005). 17 Reasonable anticipation of litigation arises when an organization is on notice of a credible threat it will become involved in litigation or anticipates taking action to initiate litigation. The adoption and consistent compliance with a policy defining a preservation decision-making process is one factor that demonstrates reasonableness and good faith in meeting preservation obligations. The adoption of a process for the reporting a threat of litigation to a responsible decision maker is a factor that demonstrates reasonableness and good faith. The determination of whether litigation is reasonably anticipated should be based on good faith and reasonable evaluation of relevant facts and circumstances. Judicial evaluation of an organization=s legal hold decision should be based on the good faith and reasonableness of the decision (including whether a legal hold is necessary and how the legal hold should be executed) at the time it was made. 72 C. Federal Rules of Civil Procedure The Federal Rules of Civil Procedures were amended on December 1, 2006 to address the discovery of electronically stored information. Among the changes: Amended Rule 26(b)(2)(B) states that a party does not need to provide discovery of electronically stored information from sources that the party identifies as not reasonably accessible because of undue burden or cost. Amended Rule 34 includes Aelectronically stored information@ as a category for which any party may request any other party in an interrogatory to produce and inspect, copy, test or sample. Amended Rule 37(f) provides that, absent exceptional circumstances, a court may not impose sanctions on a party for failing to provide electronically stored information lost as a result of the routine, good-faith operation of an electronic information system. D. Other Rules involving Electronic Information In August of 2007 the Uniform Law Commissioners adopted the Uniform Rules Relating to Discovery of Electronically Stored Information for use 72 The Sedona Conference Commentary on Legal Holds, 3.

22 by state courts. A copy of these model rules can be found in the Appendix to this paper. E. Recent Case law on Spoliation and Sanctions Courts have indicated that there may be serious consequences for parties and their counsel for failing to preserve electronic evidence and to comply with the duties set forth in Zubulake. Possible sanctions include fines, attorney s fees and costs, as well as adverseinference jury instructions. Additionally, in one new, important case regarding sanctions for willful spoliation, the judge threatened jail time for the actions of one party. Here are some recent examples: In Victor Stanley v. Creative Pipe, 2010 WL (D. MD. Sept. 9, 2010), already known as Victor Stanley II, the aptly named Judge Grimm of Maryland threatened jail time if the party who willfully destroyed evidence did not pay for the opposing party s fees and costs. While extreme in conduct and punishment, the most lasting takeaway from Victor Stanley II is Judge Grimm s 12 page circuit break down of spoliation criteria, caselaw, and sanctions, attached as Appendix A. Judge Grimm s sanctions and national survey of the caselaw were not done to further ESI sanctions, but rather to grasp the state of the law in order to stabilize it. As the judge stated in his opinion: the Court could be excused for simply acknowledging Defendants concessions and applying the applicable law of the Fourth Circuit without considering the broader legal context in which preservation/spoliation issues are playing out in litigation across the country. While justified, such a narrow analysis would be of little use to lawyers and their clients who are forced, on a daily basis, to make important decisions in their cases regarding preservation/spoliation issues, and for whom a more expansive examination of the broader issue might be of some assistance. Accordingly, I will attempt to synthesize not only the law of this District and Circuit, but also to put it within the context of the state of the law in other circuits as well. I hope that this analysis will provide counsel with an analytical framework that may enable them to resolve preservation/ spoliation issues with a greater level of comfort that their actions will not expose them to disproportionate costs or unpredictable outcomes of spoliation motions. In Phoenix Four, Inc. V. Strategic Resources Corp., a law firm and it clients were sanctioned $45,162 for the attorneys= failure to personally investigate and understand that two of its client=s computer serves had hidden partitions containing discoverable electronic information. 73 The Southern District Court of New York in Qualcomm Inc. v. Broadcom Corp. found Qualcomm in violation of its discovery obligation for failing to produce over 200,000 pages of relevant s, memoranda, and other company documents until four months after trial. 74 The court issued a show cause order which stated: this Court is inclined to consider the imposition of any and all appropriate sanctions on Qualcomm=s attorneys, including but not limited to, monetary sanctions, continuing legal education, referral to the California State Bar for appropriate investigation and possible sanctions, and counsel=s formal disclosure of this Court=s findings to all current clients and any courts in which counsel is admitted or has litigation currently pending. 75 In Teague v. Target Corp., the Western District Court of North Carolina found that plaintiff had a duty to preserve evidence, even though the suit had not been filed, because she had retained counsel and filed EEOC charges. 76 Thus, plaintiff failed to comply with her duty to preserve relevant information when she threw away her computer, which contained information relevant to the lawsuit. 77 As sanctions, the court issued an adverse inference jury instruction. 78 XII. CONCLUSION Although using modern evidence can feel like a new puzzle, attorneys are still working with the same familiar rules of evidence. Do not be intimidated just because evidence is electronic in nature. An attorney who is well-prepared to argue how the rules of evidence apply to electronic evidence can successfully use even the newest technologies. 73 No. 05-CIV-4837, 2006 WL (S.D.N.Y. May 22, 2006); Losey No. 05-CV-1958-B(BLM) Doc. 593 (S.D. Cal. Aug. 6, 2007); Losey Qualcomm,No. 05-CIV-4837, 2006 WL (S.D.N.Y. May 22, 2006); Losey WL (W.D. N.C. April 4, 2007); Losey WL (W.D. N.C. April 4, 2007); Losey WL (W.D. N.C. April 4, 2007); Losey

23 CONFERENCE OF CHIEF JUSTICES Guidelines For State Trial Courts Regarding Discovery Of Electronically-Stored Information Approved August 2006 Richard Van Duizend, Reporter

24 Table Of Contents Introduction Overview of Electronic Discovery Purpose and Role of the Guidelines v v vi Preface ix Guidelines 1 1. Definitions 1 A. Electronically-Stored Information 1 B. Accessible Information 2. Responsibility of Counsel To Be Informed About Client s Electronically-Stored Information 1 3. Agreements by Counsel; Pre-Conference Orders 2 4. Initial Discovery Hearing or Conference 4 5. The Scope of Electronic Discovery 5 6. Form of Production 6 7. Reallocation of Discovery Costs 7 8. Inadvertent Disclosure of Privileged Information 8 9. Preservation Orders Sanctions 10 Bibliography 13 iii

25 Introduction 1 Overview of Electronic Discovery Most documents today are in digital form. Electronic (or digital) documents refers to any information created, stored, or best utilized with computer technology of any sort, including business applications, such as word processing, databases, and spreadsheets; Internet applications, such as and the World Wide Web; devices attached to or peripheral to computers, such as printers, fax machines, pagers; web-enabled portable devices and cell phones; and media used to store computer data, such as disks, tapes, removable drives, CDs, and the like. There are significant differences, however, between conventional documents and electronic documents differences in degree, kind, and costs. Differences in degree. The volume, number of locations, and data volatility of electronic documents are significantly greater than those of conventional documents. A floppy disk, with 1.44 megabytes, is the equivalent of 720 typewritten pages of plain text. A CD-ROM, with 650 megabytes, can hold up to 325,000 typewritten pages. One gigabyte is the equivalent of 500,000 typewritten pages. Large corporate computer networks create backup data measured in terabytes, or 1,000,000 megabytes: each terabyte represents the equivalent of 500 [m]illion typewritten pages of plain text. 2 One paper document originating from a corporate computer network and shared with other employees who commented on it may result in well over 1,000 copies or versions of that document in the system. A company with 100 employees sending or receiving the industry average 25 messages a day produces 625,000 messages a year, generally unorganized and full of potentially embarrassing or inappropriate comments. Document search locations not only include computer hard drives, but also network servers, backup tapes, servers; outside computers, servers, and back up tapes; laptop and home computers; and personal digital assistants or other portable devices. Electronic documents are easily damaged or altered e.g., by simply opening the file. Computer systems automatically recycle and reuse memory space, overwrite backups, change file locations, and otherwise maintain themselves automatically with the effect of altering or destroying computer data without any human intent, intervention, or even knowledge. And, every electronic document can look like an original. 1 Much of the material in this introduction is condensed directly from a presentation on electronic discovery by Ken Withers, former Senior Judicial Education Attorney at the Federal Judicial Center, to the National Workshop for United States Magistrate Judges on June 12, Committee on Rules of Practice and Procedures of the Judicial Conference of the United States, Report of the Civil Rules Advisory Committee, p.3 (Washington, DC: August 3, 2004).

26 Conference Of Chief Justices Working Group On Electronic Discovery Differences in kind. One difference in kind between digital discovery and conventional paper discovery is that digital transactions (creation of an electronic airline ticket, for example) often create no permanent document in electronic or any other form. There are only integrated databases containing bits and pieces of millions of transactions. After a customer has printed out an e-ticket and moved to a different screen, the e-ticket disappears. In addition, unlike conventional documents, electronic documents contain non-traditional types of data including metadata, system data, and deleted data. Metadata refers to the information embedded in an electronic file about that file, such as the date of creation, author, source, history, etc. System data refers to computer records regarding the computer s use, such as when a user logged on or off, the websites visited, passwords used, and documents printed or faxed. Deleted data is not really deleted at all. The computer has merely been told to ignore the deleted information and that the physical space that the data takes up on the hard drive is available for overwriting when the space is needed. The possibility that a deleted file can be restored or retrieved presents a temptation to engage in electronic discovery on a much broader scale than is usually contemplated in conventional paper discovery. Differences in costs. Cost differences are often thought to include differences in the allocation of costs as well as the amount of costs. In conventional big document cases, for example, when responding parties simply make boxes of documents available for the requesting party to review, the costs of searching through the boxes typically fall on the requesting parties. On the other hand, the cost to the responding parties of locating, reviewing, and preparing vast digital files for production is perceived to be much greater than in conventional discovery proceedings. One reported case, for example, involved the restoration of 93 backup tapes. The process was estimated to cost $6.2 million before attorney review of the resulting files for relevance or privilege objections. Complete restoration of 200 backup tapes of one of the defendants in another prominent reported decision was estimated to cost $9.75 million, while restoration of eight randomly selected tapes to see if any relevant evidence appeared on them, could be done for $400,000. The high costs of electronic discovery frequently include the costs of experts. Systems experts know the computers, software, and files at issue in the case. Outside experts are often brought in to conduct electronic discovery. Their role is to take the data collections, convert them into indexed and reviewable files, and ready them for production. Forensic examiners, the most expensive of all, may be brought in to search for deleted documents, missing , and system data. On the other hand, electronic discovery can also greatly reduce the costs of discovery and facilitate the pretrial preparation process. When properly managed, electronic discovery allows a party to organize, identify, index, and even authenticate documents in a fraction of the time and at a fraction of the cost of paper discovery while virtually eliminating costs of copying and transport. Purpose and Role of the Guidelines Until recently, electronic discovery disputes have not been a standard feature of state court litigation in most jurisdictions. However, because of the near universal reliance on electronic records both by businesses and individuals, the frequency with which electronic discovery-related ques- vi

27 Guidelines For State Trial Courts Regarding Discovery Of Electronically-Stored Information tions arise in state courts is increasing rapidly, in all manner of cases. Uncertainty about how to address the differences between electronic and traditional discovery under current discovery rules and standards exacerbates the problems. Case law is emerging, but it is not consistent and discovery disputes are rarely the subject of appellate review. 3 Accordingly, the Conference of Chief Justices established a Working Group at its 2004 Annual Meeting to develop a reference document to assist state courts in considering issues related to electronic discovery. The initial draft of the first four Guidelines was sent to each state s chief justice in March, A Review Draft was circulated for comment in October 2005 to each Chief Justice and to a wide array of lawyer organizations and e-discovery experts. Seventeen sets of comments were received 4 and were reviewed by the Working Group in preparing the March 2006 version of the Guidelines. The Working Group wishes to express its deep appreciation to all those who took the time to share their experience, insights, and concerns. These Guidelines are intended to help reduce this uncertainty in state court litigation by assisting trial judges faced by a dispute over e-discovery in identifying the issues and determining the decision-making factors to be applied. The Guidelines should not be treated as model rules that can simply be plugged into a state s procedural scheme. They have been crafted only to offer guidance to those faced with addressing the practical problems that the digital age has created and should be considered along with the other resources cited in the attached bibliography including the newly revised provisions on discovery in the Federal Rules of Civil Procedure 5 and the most recent edition of the American Bar Association Standards Relating to Discovery. 6 3 Id. at 3. 4 From: The American College of Trial Lawyers (ACTL); The Association of Trial Lawyers of America (ATLA); Courtney Ingraffia Barton, Esq., LexisNexis Applied Discovery; Gary M. Berne, Esq., Stoll Stoll Berne Lokting & Shlachter PC, Portland, OR; Richard C. Broussard, Esq., Broussard & David, Lafayette, LA; David Dukes, Esq., President, The Defense Research Institute (DRI); Walter L. Floyd, Esq., The Floyd Law Firm, PC, St. Louis, MO; Thomas A. Gottschalk, Executive Vice President Law & Public Policy and General Counsel, General Motors; Robert T. Hall, Esq., Hall, Sickells, Frei and Kattenberg, PC Reston, VA; Justice Nathan L. Hecht, Supreme Court of Texas; Andrea Morano Quercia, Eastman Kodak Company; Prof. Glenn Koppel, Western State University Law School; Michelle C. S. Lange, Esq., & Charity J. Delich, Kroll Ontrack Inc.; Lawyers for Civil Justice (LCJ), U.S. Chamber Institute for Legal Reform, DRI, the Federation of Defense and Corporate Counsel, & the International Association of Defense Counsel; Charles W. Matthews, Vice President and General Counsel, Exxon Mobil; Harry Ng, American Petroleum Institute; Clifford A. Rieders, Esq., Riders, Travis, Humphrey, Harris, Waters & Waffenschmidt, Williamsport, PA. 5 The revised rules were approved by the United States Supreme Court on April 12, 2006, and will take effect on December 1, 2006, unless Congress enacts legislation to reject, modify, or defer the amendments. 6 American Bar Association Standards Relating to Civil Discovery, (Chicago, IL: August 2004). vii

28 Preface Recognizing that: there are significant differences in the discovery of conventional paper documents and electronically stored information in terms of volume, volatility, and cost; until recently, electronic discovery disputes have not been a standard feature of state court litigation in most jurisdictions; the frequency with which electronic discovery-related questions arise in state courts is increasing rapidly, because of the near universal reliance on electronic records both by businesses and individuals; and uncertainty about how to address the differences between discovery of conventional and electronically-stored information under current discovery rules and standards exacerbates the length and costs of litigation; and discovery disputes are rarely the subject of appellate review; the Conference of Chief Justices (CCJ) established a Working Group at its 2004 Annual Meeting to develop a reference document to assist state courts in considering issues related to electronic discovery. A review draft of proposed Guidelines was widely circulated for comment in October, Many sets of thorough and thoughtful comments were received and discussed by the Working Group in preparing a final draft for consideration by the members of CCJ at its 2006 Annual Meeting. At its business meeting on August 2, 2006, CCJ approved the Guidelines for State Trial Courts Regarding Discovery of Electronically-Stored Information as a reference tool for state trial court judges faced by a dispute over e-discovery. These Guidelines are intended to help in identifying the issues and determining the decision-making factors to be applied in the circumstances presented in a specific case. They should not be treated as model rules or universally applicable standards. They have been crafted only to offer guidance to those faced with addressing the practical problems that the digital age has created. The Conference of Chief Justices recognizes that the Guidelines will become part of the continuing dialogue concerning how best to ensure the fair, efficient, and effective administration of justice as technology changes. They should be considered along with the other resources such as the newly revised provisions on discovery in the Federal Rules of Civil Procedure and the most recent edition of the American Bar Association Standards Relating to Discovery. Although the Guidelines acknowledge the benefits of uniformity and are largely consistent with the revised Federal Rules, they also recognize that the final determination of what procedural and ix

29 Conference Of Chief Justices Working Group On Electronic Discovery evidentiary rules should govern questions in state court proceedings (such as when inadvertent disclosures waive the attorney-client privilege) are the responsibility of each state, based upon its legal tradition, experience, and process. The Guidelines are being sent you to because of your interest in the civil justice process generally and electronic discovery issues in particular. Additional copies can be downloaded from the National Center for State Courts website Conference of Chief Justices x

30 Guidelines For State Trial Courts Regarding Discovery Of Electronically-Stored Information 1. Definitions A. Electronically-stored information is any information created, stored, or best utilized with computer technology of any type. It includes but is not limited to data; word-processing documents; spreadsheets; presentation documents; graphics; animations; images; and instant messages (including attachments); audio, video, and audiovisual recordings; voic stored on databases; networks; computers and computer systems; servers; archives; back-up or disaster recovery systems; discs, CD s, diskettes, drives, tapes, cartridges and other storage media; printers; the Internet; personal digital assistants; handheld wireless devices; cellular telephones; pagers; fax machines; and voic systems. B. Accessible information is electronically-stored information that is easily retrievable in the ordinary course of business without undue cost and burden. COMMENT: The definition of electronically-stored information is based on newly revised section 29 of the American Bar Association Standards Relating to Civil Discovery (August 2004). It is intended to include both on-screen information and system data and metadata that may not be readily viewable. The list included in the Guideline should be considered as illustrative rather than limiting, given the rapid changes in formats, media, devices, and systems. The definition of accessible information is drawn pending Federal Rule 26(b)(2)(B) (2006). See also Zubulake v. UBS Warburg LLC, 217 F.R.D. 390 (S.D.N.Y. 2003)(Zubulake III). What constitutes an undue cost or burden will need to be determined on a case by case basis. However, examples of information that may not be reasonably accessible in all instances include data stored on back-up tapes or legacy systems; material that has been deleted; and residual data. 2. Responsibility Of Counsel To Be Informed About Client s Electronically-Stored Information In any case in which an issue regarding the discovery of electronically-stored information is raised or is likely to be raised, a judge should, when appropriate, encourage counsel to become familiar with the operation of the party s relevant information management systems, including how information is stored and retrieved. If a party intends to seek the production of electronically-stored information in a specific case, that fact should be communicated to opposing counsel as soon as possible and the categories or types of information to be sought should be clearly identified.

31 Conference Of Chief Justices Working Group On Electronic Discovery COMMENT: This provision is drawn from the Electronic Discovery Guidelines issued by the U.S. District Court for the District of Kansas (para. 1) and is consistent with other rules and proposed rules that place a responsibility on counsel, when appropriate and reasonable, to learn about their client s data storage and management systems and policies at the earliest stages of litigation in order to facilitate the smooth operation of the discovery process. [See e.g., pending Federal Rules of Civil Procedure 26(f) (2006)]. While the manner in which this encouragement should be given will, of necessity, depend on the procedures and practices of a particular jurisdiction and the needs of the case before the court, the court should establish the expectation early that counsel must be well informed about their clients electronic records. Voluntary resolution of issues involving electronically-stored information by counsel for the parties should be encouraged. Such agreements can be facilitated if the party seeking discovery clearly indicates the categories of information to be sought so that counsel for the producing party may confer with its clients about the sources of such information and render advice regarding preservation obligations. 3. Agreements By Counsel; Pre-Conference Orders A. In any case in which an issue regarding the discovery of electronically-stored information is raised or is likely to be raised, a judge should encourage counsel to meet and confer in order to voluntarily come to agreement on the electronicallystored information to be disclosed, the manner of its disclosure, and a schedule that will enable discovery to be completed within the time period specified by [the Rules of Procedure or the scheduling order]. B. In any case in which an issue regarding the discovery of electronically-stored information is raised or is likely to be raised, and in which counsel have not reached agreement regarding the following matters, a judge should direct counsel to exchange information that will enable the discovery process to move forward expeditiously. The list of information subject to discovery should be tailored to the case at issue. Among the items that a judge should consider are: (1) A list of the person(s) most knowledgeable about the relevant computer system(s) or network(s), the storage and retrieval of electronically-stored information, and the backup, archiving, retention, and routine destruction of electronically stored information, together with pertinent contact information and a brief description of each person s responsibilities; (2) A list of the most likely custodian(s), other than the party, of relevant electronic data, together with pertinent contact information, a brief description of each custodian s responsibilities, and a description of the electronicallystored information in each custodian s possession, custody, or control; (3) A list of each electronic system that may contain relevant electronicallystored information and each potentially relevant electronic system that was operating during the time periods relevant to the matters in dispute, together with a general description of each system;

32 Guidelines For State Trial Courts Regarding Discovery Of Electronically-Stored Information (4) An indication whether relevant electronically-stored information may be of limited accessibility or duration of existence (e.g., because they are stored on media, systems, or formats no longer in use, because it is subject to destruction in the routine course of business, or because retrieval may be very costly); (5) A list of relevant electronically-stored information that has been stored offsite or off-system; (6) A description of any efforts undertaken, to date, to preserve relevant electronically-stored information, including any suspension of regular document destruction, removal of computer media with relevant information from its operational environment and placing it in secure storage for access during litigation, or the making of forensic image back-ups of such computer media; (7) The form of production preferred by the party; and (8) Notice of any known problems reasonably anticipated to arise in connection with compliance with e-discovery requests, including any limitations on search efforts considered to be burdensome or oppressive or unreasonably expensive, the need for any shifting or allocation of costs, the identification of potentially relevant data that is likely to be destroyed or altered in the normal course of operations or pursuant to the party s document retention policy. COMMENT: This Guideline combines the approaches of the pending Federal Rules of Procedure 26(f)(3) (2006) and the rule proposed by Richard Best that relies heavily on the Default Standard for Discovery of Electronic Documents promulgated by the U.S. District Court for the District of Delaware. The Guideline expresses a clear preference for counsel to reach an agreement on these matters. Because not all states follow the three-step process contemplated by the Federal Rules 7 or require initial party conferences, paragraph 3(A) recommends that trial judges encourage counsel to meet in any case in which e-discovery is or is likely to be an issue. When counsel fail to reach an agreement, the Guideline recommends that judges issue an order requiring the exchange of the basic informational foundation that will assist in tailoring e-discovery requests and moving the discovery process forward. While not all of these items may be needed in every case, the list provides the elements from which a state judge can select to craft an appropriate order. In order to address concerns regarding the Delaware Default Order expressed by defense counsel, the Guideline inserts a standard of relevance. 8 For example, unlike the proposed California rule and the Delaware Default Standard, it requires a list of only those electronic systems 7 Step 1: Counsel exchange basic information and become familiar with their client s information systems; Step 2: Counsel confer to attempt to resolve key discovery issues and develop a discovery plan; and Step 3: A hearing and order to memorialize the plan and determine unsettled issues. 8 Relevance in this context refers to a state s standard of relevance for discovery purposes, not the standard used to determine admissibility at trial.

33 Conference Of Chief Justices Working Group On Electronic Discovery on which relevant electronically-stored information may be stored or that were operating during the time periods relevant to the matters in dispute, rather than the broader each relevant electronic system that has been in place at all relevant times. It is hoped that in this way, the burden on the responding party may be reduced by being able to focus solely on the systems housing the actual electronically-stored information or data that is or will be requested. Of course, the best way of limiting the burden is for counsel to agree in advance, thus obviating the need to issue a pre-conference order. Subparagraph 2(B)(3) suggests that the parties be required to provide a general description of each electronic system that may contain relevant electronically-stored information. Ordinarily, such descriptions should include the hardware and software used by each system, and the scope, character, organization, and formats each system employs. Subparagraph 2(B)(7) of the Guideline includes one issue not covered in the proposed California rule or Delaware Default Standard -- the form of production preferred by the party. [See the pending Federal Rules of Civil Procedure 26(f)(3) (2006).] Including an exchange of the format preferences early will help to reduce subsequent disputes over this thorny issue. 4. Initial Discovery Hearing Or Conference Following the exchange of the information specified in Guideline 3, or a specially set hearing, or a mandatory conference early in the discovery period, a judge should inquire whether counsel have reached agreement on any of the following matters and address any disputes regarding these or other electronic discovery issues: A. The electronically-stored information to be exchanged including information that is not readily accessible; B. The form of production; C. The steps the parties will take to segregate and preserve relevant electronically stored information; D. The procedures to be used if privileged electronically-stored information is inadvertently disclosed; and E. The allocation of costs. COMMENT: This Guideline is derived from Electronic Discovery Guidelines issued by the U.S. District Court for the District of Kansas. It addresses the next stage of the process, and lists for the trial judge some of the key issues regarding electronic discovery that the judge may be called upon to address. The intent is to identify early the discovery issues that are in dispute so that they can be addressed promptly.

34 Guidelines For State Trial Courts Regarding Discovery Of Electronically-Stored Information 5. The Scope Of Electronic Discovery In deciding a motion to protect electronically-stored information or to compel discovery of such information, a judge should first determine whether the material sought is subject to production under the applicable standard for discovery. If the requested information is subject to production, a judge should then weigh the benefits to the requesting party against the burden and expense of the discovery for the responding party, considering such factors as: A. The ease of accessing the requested information; B. The total cost of production compared to the amount in controversy; C. The materiality of the information to the requesting party; D. The availability of the information from other sources; E. The complexity of the case and the importance of the issues addressed; F. The need to protect privileged, proprietary, or confidential information, including trade secrets; G. Whether the information or software needed to access the requested information is proprietary or constitutes confidential business information; H. The breadth of the request, including whether a subset (e.g., by date, author, recipient, or through use of a key-term search or other selection criteria) or representative sample of the contested electronically stored information can be provided initially to determine whether production of additional such information is warranted; I. The relative ability of each party to control costs and its incentive to do so; J. The resources of each party compared to the total cost of production; K. Whether the requesting party has offered to pay some or all of the costs of identifying, reviewing, and producing the information; L. Whether the electronically-stored information is stored in a way that makes it more costly or burdensome to access than is reasonably warranted by legitimate personal, business, or other non-litigation-related reasons; and M. Whether the responding party has deleted, discarded, or erased electronic information after litigation was commenced or after the responding party was aware that litigation was probable.

35 Conference Of Chief Justices Working Group On Electronic Discovery COMMENT: This Guideline recommends that when a request to discover electronically-stored information is contested, judges should first assess whether the information being sought is subject to discovery under the applicable state code, rules, and decisions (e.g., whether the material sought is relevant to the claims and defenses of the party, or relevant to the subject matter under dispute, or could lead to admissible evidence). Once this question has been answered, the Guideline suggests that judges balance the benefits and burdens of requiring discovery, offering a set of factors to consider derived from the revised American Bar Association Standards Relating to Civil Discovery, Standard 29.b.iv. (August 2004). In so doing, it sets out a framework for decisionmaking rather than specific presumptions regarding reasonably accessible vs. not reasonably accessible data; active data vs. deleted information; information visible on-screen vs. metadata; or forensic vs. standard data collection. But see e.g., Pending Federal Rule of Civil Procedure 26(b)(2)(2006); The Sedona Conference Working Group on Best Practices for Electronic Document Retention and Production, The Sedona Principles, Principles 8, 9, and 12 (Silver Spring, MD: The Sedona Conference 2004). It is unlikely that all of the factors will apply in a particular case, though the first six will arise in most disputes over the scope of electronically stored information. See e.g., Public Relations Society of America, Inc. v. Road Runner High Speed Online, 2005 WL (N.Y. May 27, 2005). Depending on the circumstances and the decision regarding the scope of discovery, the judge may wish to consider shifting some or all of the costs of production and review in accordance with the factors cited in Guideline 7, infra. 6. Form Of Production In the absence of agreement among the parties, a judge should ordinarily require electronically-stored information to be produced in no more than one format and should select the form of production in which the information is ordinarily maintained or in a form that is reasonably usable. COMMENT: In conventional discovery, the form of production was seldom disputed. In electronic discovery, there are many choices besides paper. While a party could produce hard-copy printouts of all electronic files, doing so would likely hide metadata, embedded edits, and other non-screen information. It also would be voluminous and cumbersome to store, and costly to produce and search. On the other hand, producing all data in native format (i.e. streams of electrons on disks or tapes exactly as they might be found on the producing party s computer) would provide all the hidden data and be more easily stored, but would be just as difficult to search without the word-processing, , or database software needed to organize and present the information in a coherent form. This Guideline is based on pending Federal Rule of Civil Procedure 34(b)(ii) and (iii) (2006). It recommends that parties should not be required to produce electronically-stored information in multiple formats absent a good reason for doing so. See also comment 12.c of The Sedona Principles. [The Sedona Conference Working Group on Best Practices for Electronic Document Retention and Production, The Sedona Principles (Silver Spring, MD: The Sedona Conference 2004).] Requests for multiple formats should be subject to the same cost-benefit analysis as suggested in Guideline 5.

36 Guidelines For State Trial Courts Regarding Discovery Of Electronically-Stored Information The Guideline, like the pending Federal Rule, suggests rendition in the form in which the information is ordinarily maintained or in another form that is reasonably useable. The Guideline, thus, assumes that the information s standard format is reasonably usable or it would be of no benefit to the party who has produced it, but allows substitution of another format that may still be helpful to the requesting party. Whether the production of metadata and other forms of hidden information, are discoverable should be determined based upon the particular circumstances of the case. 7. Reallocation of Discovery Costs Ordinarily, the shifting of the costs of discovery to the requesting party or the sharing of those costs between the requesting and responding party should be considered only when the electronically-stored information sought is not accessible information and when restoration and production of responsive electronically-stored information from a small sample of the requested electronically-stored information would not be sufficient. When these conditions are present, the judge should consider the following factors in determining whether any or all discovery costs should be borne by the requesting party: A. The extent to which the request is specifically tailored to discover relevant information; B. The availability of such information from other sources; C. The total cost of production compared to the amount in controversy; D. The total cost of production compared to the resources available to each party; E. The relative ability of each party to control costs and its incentive to do so; F. The importance of the issues at stake in the litigation; and G. The relative benefits of obtaining the information. COMMENT: This Guideline reflects the analysis conducted in Zubulake v. UBS Warburg LLC, 216 F.R.D. 280 (S.D.N.Y. 2003)(Zubulake III), the leading federal case on the issue. The Court in Zubulake established a three-tiered test for determining when it is appropriate to require a requesting party to pay or contribute to the cost of producing discoverable material. The first tier is a determination of whether the electronically-stored information is accessible. The second tier is a determination that a less-costly method of obtaining the needed information such as restoration of a representative sample of the tapes, disks, or other storage media would not be feasible. The final step is a cost-benefit analysis similar to that recommended in Guideline 5 for determining the appropriate scope of discovery. The Zubulake litigation involved a sex discrimination complaint in which the plaintiff requested messages beyond the approximately 100 pages produced by the defendants.

37 Conference Of Chief Justices Working Group On Electronic Discovery She presented substantial evidence that more responsive existed, most likely on backup tapes and optical storage media created and maintained to meet SEC records retention requirements. The defendants objected to producing from these sources, which they estimated would cost $175,000 exclusive of attorney review time. Withers, K.J., Annotated Case Law and Further Reading on Electronic Discovery 17 (June 16, 2004). The Court found the requested material to be relevant and ordered restoration of 5 of the total of 77 back-up tapes at a cost of approximately $19,000. After determining that 600 of the restored messages were responsive to the plaintiff s discovery request, the Court ordered restoration of the remaining tapes at an estimated cost of $165, for restoration and another $107,695 for review, requiring the plaintiff to bear 25% and the defendants 75% of the costs of restoration and the defendants to pay 100% of the costs of reviewing the material for privileged information. Id., 30. Like Zubulake, the Guideline treats cost-shifting as a matter for the judge s discretion. (But see Texas Rule of Civil Procedure which requires that whenever a court orders a responding party to produce information that is not reasonably available, the court must require the requesting party to pay the reasonable expenses of any extraordinary steps required to retrieve and produce the information. ) It anticipates that the proposed cost/benefit analysis will both encourage requesting parties to carefully assess whether all the information sought is worth paying for, while discouraging the producing party from storing the information in such a way as to make it extraordinarily costly to retrieve. 8. Inadvertent Disclosure of Privileged Information In determining whether a party has waived the attorney-client privilege because of an inadvertent disclosure of attorney work-product or other privileged electronically stored information, a judge should consider: A. The total volume of information produced by the responding party; B. The amount of privileged information disclosed; C. The reasonableness of the precautions taken to prevent inadvertent disclosure of privileged information; D. The promptness of the actions taken to notify the receiving party and otherwise remedy the error; and E. The reasonable expectations and agreements of counsel. COMMENT: Inadvertent disclosure of privileged information is sometimes unavoidable because of the large amounts of information that are often involved in electronic discovery, and the time and cost required to screen this voluminous material for attorney work product and other privileged materials. As indicated in Guideline 4, the best practice is for the parties to agree on

38 Guidelines For State Trial Courts Regarding Discovery Of Electronically-Stored Information the process to use if privileged information is inadvertently disclosed and that such a disclosure shall not be considered a waiver of attorney-client privilege. While claw-back or quick peek agreements 9 are not perfect protections against use of privileged information by third parties not subject to the agreement or by the receiving party in another jurisdiction, they do allow the litigation to move forward and offer significant protection in many cases, especially when coupled with a court order recognizing the agreement and declaring that inadvertent production of privileged information does not create an express or implied waiver. [See The Sedona Conference Working Group on Best Practices for Electronic Document Retention and Production, The Sedona Principles, Comment 10.d (Silver Spring, MD: The Sedona Conference 2004); and Report of the Judicial Conference Committee on Practice and Procedure, pp (September 2005).] This Guideline applies when the parties have not reached an agreement regarding the inadvertent disclosure of electronically stored information subject to the attorney-client privilege. The first four factors are based on Alldread v. City of Grenada, 988 F.2d, 1425, 1433, 1434 (5 th Cir. 1993). [See also United States v. Rigas, 281 F. Supp. 2d 733 (S.D.N.Y. 2003). The fifth factor listed by the Court in Alldread the overriding issue of fairness is omitted, since the four factors listed help to define what is fair in the circumstances surrounding a disclosure in a particular case, but the reasonable expectations and agreements of counsel has been added to reinforce the importance of attorneys discussing and reaching at least an informal understanding on how to handle inadvertent disclosures of privileged information. Unlike Texas Rule of Civil Procedure 193.3(d) and the most recent revisions to Federal Rule of Civil Procedure 26(b)(5)(B), the Guideline does not create a presumption against a waiver when, within 10 days after discovering that privileged material has been disclosed, the producing party amends the response, identifying the material or information produced and stating the privilege asserted. While the Texas rule has apparently worked well, creation of a presumption is a matter for state rules committees or legislatures and goes beyond the scope of these Guidelines. 9. Preservation Orders A. When an order to preserve electronically-stored information is sought, a judge should require a threshold showing that the continuing existence and integrity of the information is threatened. Following such a showing, the judge should consider the following factors in determining the nature and scope of any order: (1) The nature of the threat to the continuing existence or integrity of the electronically-stored information; (2) The potential for irreparable harm to the requesting party absent a preservation order; 9 Claw-back agreements are a formal understanding between the parties that production of privileged information is presumed to be inadvertent and does not waive the privilege and the receiving party must return the privileged material until the question is resolved. Under quick peek agreements, counsel are allowed to see each other s entire data collection before production and designate those items which they believe are responsive to the discovery requests. The producing party then reviews the presumably much smaller universe of files for privilege, and produces those that are responsive and not privileged, along with a privilege log. K.J., Withers, Discovery Disputes: Decisional Guidance, 3 Civil Action No. 2, 4,5 (2004).

39 Conference Of Chief Justices Working Group On Electronic Discovery (3) The capability of the responding party to maintain the information sought in its original form, condition, and content; and (4) The physical, technological, and financial burdens created by ordering preservation of the information. B. When issuing an order to preserve electronically stored information, a judge should carefully tailor the order so that it is no broader than necessary to safeguard the information in question. COMMENT: One consequence of the expansion in the volume of electronically-stored information resulting from the use of computer systems, is the reliance on automated data retention programs and protocols that result in the periodic destruction of defined types of files, data, and back-up tapes. These programs and protocols are essential for smooth operation, effectively managing record storage, and controlling costs. The factors for determining when to issue a preservation order apply after existence of a threat to the sought information has been demonstrated. They are drawn from the decision in Capricorn Power Co. v. Siemens Westinghouse Power Corp., 220 F.R.D. 429 (W.D. Pa. 2004). They require balancing the danger to the electronically stored information against its materiality, the ability to maintain it, and the costs and burdens of doing so. Because electronically-stored information, files, and records are seldom created and stored with future litigation in mind, they cannot always be easily segregated. An order directing a business to halt all operations that can result in the destruction or alteration of computer data, including , word-processing, databases, and financial information... can effectively unplug a computer network and put a computer dependent company out of business. K.J. Withers, Electronic Discovery Disputes: Decisional Guidance, 3 Civil Action No. 2, p.4 (NCSC 2004). Thus, the Guideline urges that when a preservation order is called for, it should be drawn as narrowly as possible to accomplish its purpose so as to limit the impact on the responding party s operations. 10. Sanctions Absent exceptional circumstances, a judge should impose sanctions because of the destruction of electronically-stored information only if: A. There was a legal obligation to preserve the information at the time it was destroyed; B. The destruction of the material was not the result of the routine, good faith operation of an electronic information system; and C. The destroyed information was subject to production under the applicable state standard for discovery. 10

40 Guidelines For State Trial Courts Regarding Discovery Of Electronically-Stored Information COMMENT: This Guideline closely tracks pending Federal Rule of Civil Procedure 37(f) (2006), but provides greater guidance to courts and litigants without setting forth the stringent standards suggested in the Sedona Principles [ a clear duty to preserve, intentional or reckless failure to preserve and produce, and a reasonable probability of material prejudice]. [The Sedona Conference Working Group on Best Practices for Electronic Document Retention and Production, The Sedona Principles, Principle 14 (Silver Spring, MD: The Sedona Conference 2004).] 11

41 Selected Bibliography On Discovery Of Electronically-Stored Information Rules and Standards 10 ABA Section of Litigation. ABA Civil Discovery Standards. Revised August Ad Hoc Committee for Electronic Discovery of the U.S. District Court for the District of Delaware. Default Standard for Discovery of Electronic Documents E-Discovery (May 2004). Committee on Rules of Practice and Procedures of the Judicial Conference of the United States. Report (September 2005). District of Delaware. Default Standard for Discovery of Electronic Documents (May 2004). U.S. District Court for the District of Kansas. Electronic Discovery Guidelines (March 2004). Local and Civil Rules of the U.S. District Court for the District of New Jersey, R. 26.1(d), Discovery of Digital Information Including Computer-Based Information. Mississippi Rules of Civil Procedure, Rule 26(b)(5), Sedona Conference Working Group on Best Practices for Electronic Document Retention and Production. The Sedona Principles: Best Practices Recommendations and Principles for Addressing Electronic Document Production. Sedona, AZ: Sedona Conference Working Group Series, January Updated version. Texas Rules of Civil Procedure (d) and (1999). Articles Allman, Thomas Y. A Proposed Model for State Rules re: Electronic Discovery. National Center for State Courts, November 15, Best, Richard E. Taming the Discovery Monster. California Litigation: The Journal of the Litigation Section, State Bar of California (November, 2005). Best, Richard E. E-Discovery Basics. California Litigation: The Journal of the Litigation Section, State Bar of California (August 2005). Best, Richard E. The Need for Electronic Discovery Rules. Modern Practice (August 2002). 10 The following additional federal jurisdictions have codified the practice of electronic discovery: Eastern and Western Districts of Arkansas [Rule 26.1(4) (2000)]; Middle District of Pennsylvania [Rule 26.1 (2005)]; Wyoming [Rule 26.1(d)(3)(B). 13

42 Conference Of Chief Justices Working Group On Electronic Discovery Bobelian, Michael. N.Y. Judge Charts a Course on Electronic Discovery; Finding No Exact Precedent, Nassau Justice Applies Rule that Requesting Side Pays. New York Law Journal (August 24, 2004). Carroll, John L. and Withers, Kenneth J. Observations on The Sedona Principles, 2003 (www. kenwithers.com). Hedges, Ronald J. Discovery of Digital Information, 2004 ( Johnson, Molly Treadway, Kenneth J. Withers, and Meghan A. Dunn, A Qualitative Study of Issues Raised by the Discovery of Computer-Based Information in Civil Litigation. Submitted to the Judicial Conference Advisory Committee on Civil Rules for its October 2002 meeting, Federal Judicial Center, Washington, D.C., September 13, 2002 ( Joseph, Gregory P. Electronic Discovery Standards. November 2003 ( Joseph, Gregory P. Electronic Discovery. National Law Journal (October 4, 2004): 12. Redgrave, Jonathan M., and Erica J. Bachmann. Ripples on the Shores of Zubulake: Practice Considerations from Recent Electronic Discovery Decisions. Federal Lawyer (November/December 2003): 31. Solovy, Jerold S., and Robert L. Byman. Cost-Shifting. National Law Journal (November 10, 2003): 23. Van Duizend, Richard. Electronic Discovery: Questions and Answers. Civil Action 3, no. 2 (2004): 4. Withers, Kenneth J. Electronic Discovery Disputes: Decisional Guidance, Civil Action 3 no. 2, (2004): 4. Withers, Kenneth J. Annotated Case Law and Further Reading on Electronic Discovery, June 16, 2004 ( Withers, Kenneth J. Two Tiers and a Safe Harbor: Federal Rulemakers Grapple with E-Discovery, August 23, 2004 ( Withers, Kenneth J. Is Digital Different? Electronic Disclosure and Discovery in Civil Litigation. Washington, DC: Federal Judicial Center,

SOCIAL MEDIA EVIDENTIARY ISSUES

SOCIAL MEDIA EVIDENTIARY ISSUES SOCIAL MEDIA EVIDENTIARY ISSUES EMILY MISKEL KoonsFuller, P.C. 5700 W. Plano Pkwy., Suite 2200 Plano, Texas 75093 (972) 769-2727 [email protected] Texas Association of Counties 2013 FALL JUDICIAL EDUCATION

More information

AUTHENTICATING SOCIAL MEDIA - ADMISSIBILITY. 2014 Spring Judicial Education Session Overton Hotel & Conference Center Lubbock, Texas March 19-21, 2014

AUTHENTICATING SOCIAL MEDIA - ADMISSIBILITY. 2014 Spring Judicial Education Session Overton Hotel & Conference Center Lubbock, Texas March 19-21, 2014 2014 Spring Judicial Education Session Overton Hotel & Conference Center Lubbock, Texas March 19-21, 2014 Wednesday, March 19 8:15 a.m. 9:15 a.m. AUTHENTICATING SOCIAL MEDIA - ADMISSIBILITY Ms. Emily A.

More information

The Indiana Coalition Against Domestic Violence

The Indiana Coalition Against Domestic Violence Evidentiary Issues in Domestic Cases: An Overview Introduction A. Importance of legal representation in cases that involve domestic violence. B. History of protection order laws and implications for evidence.

More information

Admissibility of Writings (Emails, Text Messages, etc.) **************

Admissibility of Writings (Emails, Text Messages, etc.) ************** Admissibility of Writings (Emails, Text Messages, etc.) ************** John Rubin UNC School of Government Rev d May 19, 2011 Admissibility of Electronic Writings: Some Questions and Answers* The defendant

More information

When E-Discovery Becomes Evidence

When E-Discovery Becomes Evidence Monday, June 11, 2007 When E-Discovery Becomes Evidence Make sure that you can easily authenticate the information that was so costly to produce By Leonard Deutchman Special to the Law Weekly A federal

More information

Legal view of digital evidence

Legal view of digital evidence Chapter 2 Legal view of digital evidence Before developing a model or a theory, it is important to understand the requirements of the domain in which the model or the theory is going to be used. The ultimate

More information

RULES CONCERNING EXPERT WITNESSES FOR TSCPA SEMINAR

RULES CONCERNING EXPERT WITNESSES FOR TSCPA SEMINAR RULES CONCERNING EXPERT WITNESSES FOR TSCPA SEMINAR Capuder, Gaither & Amann, L.L.P. One Allen Center, Tenth Floor 500 Dallas, Suite 1000 Houston, Texas 77002-4804 (713) 654-7455 (713) 654-7412 (Direct)

More information

Social Media: Cutting Edge Evidence Questions. Presented by: Lawrence Morales II The Morales Firm, P.C. San Antonio, Texas

Social Media: Cutting Edge Evidence Questions. Presented by: Lawrence Morales II The Morales Firm, P.C. San Antonio, Texas Social Media: Cutting Edge Evidence Questions Presented by: Lawrence Morales II The Morales Firm, P.C. San Antonio, Texas The Three Commandments of Social Media Evidence #1: Thou Shalt Not Underestimate

More information

May 2015 Vol. 44, No. 5 Page 45. Articles Family Law Preservation of Social Media Evidence in a Family Law Context

May 2015 Vol. 44, No. 5 Page 45. Articles Family Law Preservation of Social Media Evidence in a Family Law Context May 2015 Vol. 44, No. 5 Page 45 Articles Family Law Preservation of Social Media Evidence in a Family Law Context by Kevin C. Massaro, Taylor P. Statfeld Family Law articles are sponsored by the CBA Family

More information

Getting It In: The Admissibility of Electronically Stored Information in Employment Litigation

Getting It In: The Admissibility of Electronically Stored Information in Employment Litigation Getting It In: The Admissibility of Electronically Stored Information in Employment Litigation Jocelyn D. Larkin Director of Litigation and Training Impact Fund 125 University Avenue, Suite 102 Berkeley,

More information

MAKING SURE YOU CAN USE THE ESI YOU GET: PRETRIAL CONSIDERATIONS REGARDING AUTHENTICITY AND FOUNDATION OF ESI. By: Eric S.

MAKING SURE YOU CAN USE THE ESI YOU GET: PRETRIAL CONSIDERATIONS REGARDING AUTHENTICITY AND FOUNDATION OF ESI. By: Eric S. MAKING SURE YOU CAN USE THE ESI YOU GET: PRETRIAL CONSIDERATIONS REGARDING AUTHENTICITY AND FOUNDATION OF ESI By: Eric S. Eissenstat In the modern litigation world, a trial lawyer often requests, assimilates,

More information

Use of Check Images By Customers of Financial Institutions. Version Dated: July 14, 2006

Use of Check Images By Customers of Financial Institutions. Version Dated: July 14, 2006 Use of Check Images By Customers of Financial Institutions Version Dated: July 14, 2006 This document provides an overview of the treatment of check images under the Check 21 Act and laws and regulations

More information

E-discovery that is, the discovery of electronically

E-discovery that is, the discovery of electronically E-Discovery Without Admissibility Is Useless: Lorraine v. Markel and Authentication By Jeffrey D. Bukowski E-discovery that is, the discovery of electronically stored information has garnered much attention

More information

Admissibility of Digital Photographs in Criminal Trials

Admissibility of Digital Photographs in Criminal Trials Admissibility of Digital Photographs in Criminal Trials Keith Hodges, Senior Instructor, [email protected] Federal Law Enforcement Training Center Glynco, GA 1 What we will discuss Digital photos captured

More information

Authentication of Cell Phone Text Messages

Authentication of Cell Phone Text Messages Authentication of Cell Phone Text Messages By Pierre Grosdidier Parties seeking to admit cell phone text messages at trial face two authentication challenges. They must show that the documents they seek

More information

UNITED STATES DISTRICT COURT SOUTHERN DISTRICT OF TEXAS HOUSTON DIVISION

UNITED STATES DISTRICT COURT SOUTHERN DISTRICT OF TEXAS HOUSTON DIVISION UNITED STATES DISTRICT COURT SOUTHERN DISTRICT OF TEXAS HOUSTON DIVISION UNITED STATES OF AMERICA v. CRIMINAL ACTION H-00-0000 DEFENDANT(S) JURY INSTRUCTIONS I. General A. Introduction Members of the Jury:

More information

WHEN A CHILD MAY HAVE A TORT CLAIM: WHAT S THE CHILD S COURT- APPOINTED ATTORNEY TO DO?

WHEN A CHILD MAY HAVE A TORT CLAIM: WHAT S THE CHILD S COURT- APPOINTED ATTORNEY TO DO? WHEN A CHILD MAY HAVE A TORT CLAIM: WHAT S THE CHILD S COURT- APPOINTED ATTORNEY TO DO? The Oregon Child Advocacy Project Professor Leslie J. Harris and Child Advocacy Fellows Colin Love-Geiger and Alyssa

More information

Case 5:14-cv-00093-RS-GRJ Document 21 Filed 05/28/14 Page 1 of 9

Case 5:14-cv-00093-RS-GRJ Document 21 Filed 05/28/14 Page 1 of 9 Case 5:14-cv-00093-RS-GRJ Document 21 Filed 05/28/14 Page 1 of 9 MARY SOWELL et al., Plaintiffs, IN THE UNITED STATES DISTRICT COURT FOR THE NORTHERN DISTRICT OF FLORIDA PANAMA CITY DIVISION Page 1 of

More information

RULE 1. ASSIGNMENT OF CASES

RULE 1. ASSIGNMENT OF CASES LOCAL RULES FOR FOURTH CIRCUIT COURT DISTRICT OF MISSISSIPPI [Renumbered and codified by order of the Supreme Court effective May 18, 2006; amended effective April 23, 2009.] RULE 1. ASSIGNMENT OF CASES

More information

RULE 42 EVIDENCE AND PROCEDURE AT TRIAL

RULE 42 EVIDENCE AND PROCEDURE AT TRIAL RULE 42 EVIDENCE AND PROCEDURE AT TRIAL Application (1) This rule does not apply to summary trials under Rule 19, except as provided in that rule. Witness to testify orally (2) Subject to any Act, statute

More information

OPENING INSTRUCTIONS

OPENING INSTRUCTIONS OPENING INSTRUCTIONS Members of the Jury: Respective Roles of Jurors and Judge You ve been chosen as jurors for this case, and you ve taken an oath to decide the facts fairly. As we begin the trial, I

More information

Litigating the Products Liability Case: Discovery

Litigating the Products Liability Case: Discovery www.goldbergsegalla.com NEW YORK PENNSYLVANIA CONNECTICUT NEW JERSEY UNITED KINGDOM Litigating the Products Liability Case: Discovery New York State Bar Association Buffalo, NY October 22, 2013 Presenter

More information

IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF HAWAII. J. MICHAEL SEABRIGHT United States District Judge

IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF HAWAII. J. MICHAEL SEABRIGHT United States District Judge IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF HAWAII August 8, 2011 J. MICHAEL SEABRIGHT United States District Judge GENERAL FEDERAL JURY INSTRUCTIONS IN CIVIL CASES INDEX 1 DUTY OF JUDGE 2

More information

*Rule 1.4(a) *Rule 1.16(a) *Rule 1.16(a)(2) *Rule 1.16(b) *Rule 3.3 *DR7-102(A)(4) *DR7-102(A)(6)

*Rule 1.4(a) *Rule 1.16(a) *Rule 1.16(a)(2) *Rule 1.16(b) *Rule 3.3 *DR7-102(A)(4) *DR7-102(A)(6) NEW HAMPSHIRE BAR ASSOCIATION Ethics Committee Formal Opinion 1993-94/7 Candor to Tribunal: Use of Questionable Evidence In Criminal Defense January 27, 1994 RULE REFERENCES: *Rule 1.2 *Rule 1.2(a) *Rule

More information

Bridging the Common Law Civil Law Divide in Arbitration

Bridging the Common Law Civil Law Divide in Arbitration Bridging the Common Law Civil Law Divide in Arbitration by SIEGFRIED H. ELSING * AND JOHN M. TOWNSEND * * INTERNATIONAL ARBITRATION has evolved as a system for resolving disputes among parties from different

More information

Confrontation in Domestic Violence Litigation: What Every New Attorney Should Know about the Necessity of Victim Participation

Confrontation in Domestic Violence Litigation: What Every New Attorney Should Know about the Necessity of Victim Participation Confrontation in Domestic Violence Litigation: What Every New Attorney Should Know about the Necessity of Victim Participation By: Michael D. Dean i Those experienced in domestic violence litigation are

More information

Supreme Court Rule 201. General Discovery Provisions. (a) Discovery Methods.

Supreme Court Rule 201. General Discovery Provisions. (a) Discovery Methods. Supreme Court Rule 201. General Discovery Provisions (a) Discovery Methods. Information is obtainable as provided in these rules through any of the following discovery methods: depositions upon oral examination

More information

IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLORADO

IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLORADO Criminal Action No. 05-cr-00545-EWN UNITED STATES OF AMERICA v. Plaintiff, JOSEPH P. NACCHIO, Defendant. IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLORADO MOTION FOR A MISTRIAL ON THE BASIS

More information

Any civil action exempt from arbitration by action of a presiding judge under ORS 36.405.

Any civil action exempt from arbitration by action of a presiding judge under ORS 36.405. CHAPTER 13 Arbitration 13.010 APPLICATION OF CHAPTER (1) This UTCR chapter applies to arbitration under ORS 36.400 to 36.425 and Acts amendatory thereof but, except as therein provided, does not apply

More information

CERTIFIED FOR PUBLICATION APPELLATE DIVISION SUPERIOR COURT OF CALIFORNIA COUNTY OF ORANGE. THE PEOPLE, CASE No. 30-2009-304893

CERTIFIED FOR PUBLICATION APPELLATE DIVISION SUPERIOR COURT OF CALIFORNIA COUNTY OF ORANGE. THE PEOPLE, CASE No. 30-2009-304893 Filed 5/21/10 CERTIFIED FOR PUBLICATION APPELLATE DIVISION SUPERIOR COURT OF CALIFORNIA COUNTY OF ORANGE THE PEOPLE, CASE No. 30-2009-304893 Plaintiff and JUDGMENT ON APPEAL Respondent, from the SUPERIOR

More information

EVIDENTIARY PROBLEMS ASSOCIATED WITH THE INTRODUCTION OF WEB-BASED EVIDENCE

EVIDENTIARY PROBLEMS ASSOCIATED WITH THE INTRODUCTION OF WEB-BASED EVIDENCE EVIDENTIARY PROBLEMS ASSOCIATED WITH THE INTRODUCTION OF WEB-BASED EVIDENCE G. Michael Fenner 1 ([email protected]) James L. Koley 54 Professor of Constitutional Law Creighton University School of Law

More information

SUPREME COURT OF PENNSYLVANIA COMMITTEE ON RULES OF EVIDENCE. Title 225 - Rules of Evidence [225 Pa. Code ART 1]

SUPREME COURT OF PENNSYLVANIA COMMITTEE ON RULES OF EVIDENCE. Title 225 - Rules of Evidence [225 Pa. Code ART 1] SUPREME COURT OF PENNSYLVANIA COMMITTEE ON RULES OF EVIDENCE Title 225 - Rules of Evidence [225 Pa. Code ART 1] Proposed Amendment of Pa.R.E. 104 and Revision of Comment The Committee on Rules of Evidence

More information

MSPB HEARING GUIDE TABLE OF CONTENTS. Introduction... 1. Pre-Hearing Preparation... 2. Preparation of Witness... 4. Preparation of Documents...

MSPB HEARING GUIDE TABLE OF CONTENTS. Introduction... 1. Pre-Hearing Preparation... 2. Preparation of Witness... 4. Preparation of Documents... MSPB HEARING GUIDE TABLE OF CONTENTS Introduction........................................................ 1 Pre-Hearing Preparation............................................... 2 Preparation of Witness................................................

More information

The N.C. State Bar v. Wood NO. COA10-463. (Filed 1 February 2011) 1. Attorneys disciplinary action convicted of criminal offense

The N.C. State Bar v. Wood NO. COA10-463. (Filed 1 February 2011) 1. Attorneys disciplinary action convicted of criminal offense The N.C. State Bar v. Wood NO. COA10-463 (Filed 1 February 2011) 1. Attorneys disciplinary action convicted of criminal offense The North Carolina State Bar Disciplinary Hearing Commission did not err

More information

How To Know If A Prosecutor Can Contact A Victim In A Criminal Case

How To Know If A Prosecutor Can Contact A Victim In A Criminal Case Nebraska Ethics Advisory Opinion for Lawyers No. 09-03 IF THE VICTIM IN A CRIMINAL CASE THAT A COUNTY ATTORNEY IS PROSECUTING HAS RETAINED COUNSEL TO REPRESENT HIM IN A CIVIL CASE ARISING FROM THE SAME

More information

DISTRICT COURT OF APPEAL OF THE STATE OF FLORIDA FOURTH DISTRICT July Term 2010

DISTRICT COURT OF APPEAL OF THE STATE OF FLORIDA FOURTH DISTRICT July Term 2010 GROSS, C.J. DISTRICT COURT OF APPEAL OF THE STATE OF FLORIDA FOURTH DISTRICT July Term 2010 DEPARTMENT OF CHILDREN AND FAMILIES, Appellant, v. D.B.D., the father, Appellee. No. 4D09-4862 [August 25, 2010]

More information

Counsel must be fully familiar with the Uniform Civil Rules for the Supreme Court 22 NYCRR Part 202.

Counsel must be fully familiar with the Uniform Civil Rules for the Supreme Court 22 NYCRR Part 202. JUSTICE GERALD E. LOEHR, J.S.C. Rockland County Supreme Court 1 South Main Street New City, New York 10956 Courtroom 1 Tel: (845) 483-8343 Fax: (845) 708-7236 Staff Bruce J. Pearl, Principal Law Secretary

More information

DISCOVERY: Using the Civil and Criminal Rules of Discovery in DSS Cases

DISCOVERY: Using the Civil and Criminal Rules of Discovery in DSS Cases DISCOVERY: Using the Civil and Criminal Rules of Discovery in DSS Cases Maitri Mike Klinkosum Assistant Capital Defender Office of the Capital Defender-Forsyth Regional Office Winston-Salem, North Carolina

More information

EXAMINATION OUTLINE FOR PRIVATE INVESTIGATORS

EXAMINATION OUTLINE FOR PRIVATE INVESTIGATORS EXAMINATION OUTLINE FOR PRIVATE INVESTIGATORS 2014 I. Ethics (18%) This area assesses the candidate s ability to comply with ethical standards of private investigators regarding privacy rights, confidentiality,

More information

Overcoming Potential Legal Challenges to the Authentication of Social Media Evidence

Overcoming Potential Legal Challenges to the Authentication of Social Media Evidence Overcoming Potential Legal Challenges to the Authentication of Social Media Evidence Overcoming Potential Legal Challenges to the Authentication of Social Media Evidence By John Patzakis 1 Summary: Social

More information

IN THE DISTRICT COURT OF OKLAHOMA COUNTY STATE OF OKLAHOMA ) ) ) ) ) ) ) PLAINTIFF'S INTERROGATORIES AND REQUESTS FOR PRODUCTION TO DEFENDANT

IN THE DISTRICT COURT OF OKLAHOMA COUNTY STATE OF OKLAHOMA ) ) ) ) ) ) ) PLAINTIFF'S INTERROGATORIES AND REQUESTS FOR PRODUCTION TO DEFENDANT IN THE DISTRICT COURT OF OKLAHOMA COUNTY STATE OF OKLAHOMA, Plaintiff, vs., Defendant. Case No.: CJ-2011- PLAINTIFF'S INTERROGATORIES AND REQUESTS FOR PRODUCTION TO DEFENDANT TO: COMES NOW the Plaintiff,

More information

DISTRICT OF COLUMBIA COURT OF APPEALS. No. 10-CV-769. Appeal from the Superior Court of the District of Columbia (CAC2807-05)

DISTRICT OF COLUMBIA COURT OF APPEALS. No. 10-CV-769. Appeal from the Superior Court of the District of Columbia (CAC2807-05) Notice: This opinion is subject to formal revision before publication in the Atlantic and Maryland Reporters. Users are requested to notify the Clerk of the Court of any formal errors so that corrections

More information

UNITED STATES BANKRUPTCY COURT EASTERN DISTRICT OF VIRGINIA Richmond Division

UNITED STATES BANKRUPTCY COURT EASTERN DISTRICT OF VIRGINIA Richmond Division PUBLISHED UNITED STATES BANKRUPTCY COURT EASTERN DISTRICT OF VIRGINIA Richmond Division IN RE: WILLIAM G. DADE ) Case No. 00-32487 ANN E. DADE ) Chapter 7 Debtors. ) ) ) DEBORAH R. JOHNSON ) Adversary

More information

FINAL ORDER REVERSING TRIAL COURT. Appellant, Joseph Pabon (herein Appellant ), appeals the Orange County Court s

FINAL ORDER REVERSING TRIAL COURT. Appellant, Joseph Pabon (herein Appellant ), appeals the Orange County Court s IN THE CIRCUIT COURT OF THE NINTH JUDICIAL CIRCUIT, IN AND FOR ORANGE COUNTY, FLORIDA APPELLATE CASE NO: 2011-AP-32 LOWER COURT CASE NO: 48-2010-MM-12557 JOSEPH PABON, vs. Appellant, STATE OF FLORIDA,

More information

EFFICIENTLY PREPARING A CASE FOR TRIAL ABA Distance CLE Teleconference January 12, 2010. A. I have previously presented a teleconference on

EFFICIENTLY PREPARING A CASE FOR TRIAL ABA Distance CLE Teleconference January 12, 2010. A. I have previously presented a teleconference on EFFICIENTLY PREPARING A CASE FOR TRIAL ABA Distance CLE Teleconference January 12, 2010 I. Scope of this presentation A. I have previously presented a teleconference on Woodshedding Witnesses and 60 Days

More information

SUPREME COURT OF WISCONSIN

SUPREME COURT OF WISCONSIN SUPREME COURT OF WISCONSIN 2008 WI 37 NOTICE This order is subject to further editing and modification. The final version will appear in the bound volume of the official reports. No. 07-12 In the matter

More information

TABLE OF CONTENTS FILING YOUR APPEAL...

TABLE OF CONTENTS FILING YOUR APPEAL... THE APPEALS PROCESS This handbook provides general information and does not constitute legal advice. For questions involving legal interpretations or when litigation is involved, always refer to the Colorado

More information

How To Admit Blood Alcohol Test Results

How To Admit Blood Alcohol Test Results IN THE SUPREME COURT OF FLORIDA JAMES C. BABER, Petitioner, vs. STATE OF FLORIDA, Respondent. : : : Case No. : : : 96,010 DISCRETIONARY REVIEW OF DECISION OF THE DISTRICT COURT OF APPEAL OF FLORIDA FOURTH

More information

IN THE COURT OF APPEALS OF TENNESSEE AT NASHVILLE December 02, 2014 Session

IN THE COURT OF APPEALS OF TENNESSEE AT NASHVILLE December 02, 2014 Session IN THE COURT OF APPEALS OF TENNESSEE AT NASHVILLE December 02, 2014 Session CONNIE REDMOND v. WALMART STORES, INC., ET AL. Appeal from the Circuit Court for Davidson County No. 13C3247 Joseph P. Binkley,

More information

Electronic Discovery: Litigation Holds, Data Preservation and Production

Electronic Discovery: Litigation Holds, Data Preservation and Production Electronic Discovery: Litigation Holds, Data Preservation and Production April 27, 2010 Daniel Munsch, Assistant General Counsel John Lerchey, Coordinator for Incident Response 0 E-Discovery Rules Federal

More information

and IN THE COURT OF CRIMINAL APPEALS, AUSTIN, TEXAS

and IN THE COURT OF CRIMINAL APPEALS, AUSTIN, TEXAS IN THE 242 ND DISTRICT COURT OF SWISHER COUNTY, TEXAS and IN THE COURT OF CRIMINAL APPEALS, AUSTIN, TEXAS THE STATE OF TEXAS ) Writ Nos. 51,824 01, -02, -03, -04 ) (Trial Court Cause Nos. ) B-3340-9907-CR,

More information

How To Appeal To The Supreme Court In North Carolina

How To Appeal To The Supreme Court In North Carolina QUESTIONS AND ANSWERS ABOUT YOUR APPEAL AND YOUR LAWYER A Guide Prepared by the Office of the Appellate Defender 1. WHO IS MY LAWYER? Your lawyer s name is on the notice that came with this guide. The

More information

IN THE UNITED STATES DISTRICT COURT FOR THE MIDDLE DISTRICT OF NORTH CAROLINA

IN THE UNITED STATES DISTRICT COURT FOR THE MIDDLE DISTRICT OF NORTH CAROLINA Case 1:13-cv-00046-CCE-LPA Document 24 Filed 01/06/14 Page 1 of 14 IN THE UNITED STATES DISTRICT COURT FOR THE MIDDLE DISTRICT OF NORTH CAROLINA EQUAL EMPLOYMENT OPPORTUNITY ) COMMISSION, ) ) Plaintiff,

More information

How To Prove That A Person Is Not Responsible For A Cancer

How To Prove That A Person Is Not Responsible For A Cancer Portfolio Media. Inc. 860 Broadway, 6th Floor New York, NY 10003 www.law360.com Phone: +1 646 783 7100 Fax: +1 646 783 7161 [email protected] Alternative Burdens May Come With Alternative Causes

More information

CIVIL LITIGATION PRACTICE FOR PARALEGALS. Many attorneys, paralegals and legal assistants refer to pleadings as all

CIVIL LITIGATION PRACTICE FOR PARALEGALS. Many attorneys, paralegals and legal assistants refer to pleadings as all CIVIL LITIGATION PRACTICE FOR PARALEGALS III. PREPARATION OF PLEADINGS Many attorneys, paralegals and legal assistants refer to pleadings as all court papers in the case. Technically speaking, the pleadings

More information

Case 3:09-cv-00432-HEH Document 77 Filed 02/19/2010 Page 1 of 7

Case 3:09-cv-00432-HEH Document 77 Filed 02/19/2010 Page 1 of 7 Case 3:09-cv-00432-HEH Document 77 Filed 02/19/2010 Page 1 of 7 IN THE UNITED STATES DISTRICT COURT FOR THE EASTERN DISTRICT OF VIRGINIA Richmond Division MINNESOTA LAWYERS MUTUAL INSURANCE COMPANY, Plaintiff,

More information

NC General Statutes - Chapter 15A Article 48 1

NC General Statutes - Chapter 15A Article 48 1 SUBCHAPTER IX. PRETRIAL PROCEDURE. Article 48. Discovery in the Superior Court. 15A-901. Application of Article. This Article applies to cases within the original jurisdiction of the superior court. (1973,

More information

CIVIL APPEALS PAMPHLET PRO BONO PROJECT FOR THE SPONSORED AND ADMINISTERED BY THE PRO BONO COMMITTEES FOR THE STATE BAR OF TEXAS APPELLATE SECTION

CIVIL APPEALS PAMPHLET PRO BONO PROJECT FOR THE SPONSORED AND ADMINISTERED BY THE PRO BONO COMMITTEES FOR THE STATE BAR OF TEXAS APPELLATE SECTION CIVIL APPEALS PAMPHLET FOR THE PRO BONO PROJECT SPONSORED AND ADMINISTERED BY THE PRO BONO COMMITTEES FOR THE STATE BAR OF TEXAS APPELLATE SECTION AND THE HOUSTON BAR ASSOCIATION APPELLATE SECTION IN THE

More information

Current Trends in Litigation Involving the Use of Social Media

Current Trends in Litigation Involving the Use of Social Media Current Trends in Litigation Involving the Use of Social Media John B. Kearney Partner and Head, New Jersey Litigation Group Ballard Spahr LLP 1 Introduction Social media now affect all phases of litigation

More information

UNITED STATES BANKRUPTCY COURT MIDDLE DISTRICT OF NORTH CAROLINA WINSTON-SALEM DIVISION

UNITED STATES BANKRUPTCY COURT MIDDLE DISTRICT OF NORTH CAROLINA WINSTON-SALEM DIVISION SO ORDERED. SIGNED this 22nd day of February, 2013. UNITED STATES BANKRUPTCY COURT MIDDLE DISTRICT OF NORTH CAROLINA WINSTON-SALEM DIVISION In re: Joseph Walter Melara and Shyrell Lynn Melara, Case No.

More information

Reports or Connecticut Appellate Reports, the

Reports or Connecticut Appellate Reports, the ****************************************************** The officially released date that appears near the beginning of each opinion is the date the opinion will be published in the Connecticut Law Journal

More information

IN THE SUPREME COURT OF THE STATE OF ILLINOIS

IN THE SUPREME COURT OF THE STATE OF ILLINOIS M.R. 3140 IN THE SUPREME COURT OF THE STATE OF ILLINOIS Order entered February 16, 2011. (Deleted material is struck through and new material is underscored.) Effective immediately, Supreme Court Rules

More information

Court Record Access Policy

Court Record Access Policy SUPREME COURT OF BRITISH COLUMBIA Court Record Access Policy The Supreme Court of British Columbia 800 Smithe Street Vancouver, BC V6Z 2E1 www.courts.gov.bc.ca Page 1 of 39 TABLE OF CONTENTS PART I: GENERAL

More information

IN THE SUPREME COURT OF THE STATE OF DELAWARE

IN THE SUPREME COURT OF THE STATE OF DELAWARE IN THE SUPREME COURT OF THE STATE OF DELAWARE KEVIN D. TALLEY, Defendant-Below No. 172, 2003 Appellant, v. Cr. ID No. 0108005719 STATE OF DELAWARE, Court Below: Superior Court of the State of Delaware,

More information

IN THE UNITED STATES DISTRICT COURT FOR THE EASTERN DISTRICT OF PENNSYLVANIA. Memorandum and Order

IN THE UNITED STATES DISTRICT COURT FOR THE EASTERN DISTRICT OF PENNSYLVANIA. Memorandum and Order IN THE UNITED STATES DISTRICT COURT FOR THE EASTERN DISTRICT OF PENNSYLVANIA CAROSELLA & FERRY, P.C., Plaintiff, v. TIG INSURANCE COMPANY, Defendant. CIVIL ACTION NO. 00-2344 Memorandum and Order YOHN,

More information

The Land Surveyor as Expert Witness

The Land Surveyor as Expert Witness PDHonline Course P141 (1 PDH) The Land Surveyor as Expert Witness Instructor: Thomas Strong, P.L.S. 2012 PDH Online PDH Center 5272 Meadow Estates Drive Fairfax, VA 22030-6658 Phone & Fax: 703-988-0088

More information

Case 1:07-cv-00389-MJW-BNB Document 51 Filed 08/21/2008 Page 1 of 8 IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLORADO

Case 1:07-cv-00389-MJW-BNB Document 51 Filed 08/21/2008 Page 1 of 8 IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLORADO Case 1:07-cv-00389-MJW-BNB Document 51 Filed 08/21/2008 Page 1 of 8 IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLORADO Civil Action No. 07-cv-00389-MJW-BNB ERNA GANSER, Plaintiff, v. ROBERT

More information

IN THE CIRCUIT COURT, FOURTH JUDICIAL CIRCUIT, IN AND FOR DUVAL COUNTY, FLORIDA.

IN THE CIRCUIT COURT, FOURTH JUDICIAL CIRCUIT, IN AND FOR DUVAL COUNTY, FLORIDA. IN THE CIRCUIT COURT, FOURTH JUDICIAL CIRCUIT, IN AND FOR DUVAL COUNTY, FLORIDA. CASE NO.: 16- DIVISION: CV- vs. Plaintiff, Defendant. ORDER SETTING CASE FOR JURY TRIAL AND PRETRIAL CONFERENCE AND REQUIRING

More information

COURT OF APPEALS OF WISCONSIN PUBLISHED OPINION

COURT OF APPEALS OF WISCONSIN PUBLISHED OPINION COURT OF APPEALS OF WISCONSIN PUBLISHED OPINION 2012 WI APP 54 Case No.: 2011AP414 Complete Title of Case: CINDY HORAK, INDIVIDUALLY AND AS SPECIAL ADMINISTRATOR OF THE ESTATE OF GEORGE BENZINGER, V. PLAINTIFF-APPELLANT,

More information

FILED December 8, 2015 Carla Bender 4 th District Appellate Court, IL

FILED December 8, 2015 Carla Bender 4 th District Appellate Court, IL NOTICE This order was filed under Supreme Court Rule 23 and may not be cited as precedent by any party except in the limited circumstances allowed under Rule 23(e(1. 2015 IL App (4th 130903-U NO. 4-13-0903

More information

E-Signatures, Authentication and Contracts

E-Signatures, Authentication and Contracts Hilton Chicago Chicago, IL March 16-19, 2016 www.techshow.com #ABATECHSHOW Authentication and Written by George Bellas, Bellas & Wachowski Dan Puterbaugh, Adobe Systems Presenters George Geo Bellas: @GeoBellas

More information

Reflections on Ethical Issues In the Tripartite Relationship

Reflections on Ethical Issues In the Tripartite Relationship Reflections on Ethical Issues In the Tripartite Relationship [click] By Bruce A. Campbell 1 Introduction In most areas of the practice of law, there are a number of ethical issues that arise on a frequent

More information

What to Do When Your Witness Testimony Doesn t Match His or Her Declaration

What to Do When Your Witness Testimony Doesn t Match His or Her Declaration What to Do When Your Witness Testimony Doesn t Match His or Her Declaration Russell R. Yurk Jennings, Haug & Cunningham, L.L.P. 2800 N. Central Avenue, Suite 1800 Phoenix, AZ 85004-1049 (602) 234-7819

More information

IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF ARIZONA

IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF ARIZONA Thompson v. Hartford Accident and Indemnity Company et al Doc. 1 1 1 WO William U. Thompson, v. IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF ARIZONA Plaintiff, Property & Casualty Insurance

More information

GLOSSARY OF SELECTED LEGAL TERMS

GLOSSARY OF SELECTED LEGAL TERMS GLOSSARY OF SELECTED LEGAL TERMS Sources: US Courts : http://www.uscourts.gov/library/glossary.html New York State Unified Court System: http://www.nycourts.gov/lawlibraries/glossary.shtml Acquittal A

More information

THE STATE OF NEW HAMPSHIRE SUPREME COURT NO. 2011-0912 STATE OF NEW HAMPSHIRE DANIEL C. THOMPSON BRIEF FOR THE DEFENDANT

THE STATE OF NEW HAMPSHIRE SUPREME COURT NO. 2011-0912 STATE OF NEW HAMPSHIRE DANIEL C. THOMPSON BRIEF FOR THE DEFENDANT THE STATE OF NEW HAMPSHIRE SUPREME COURT NO. 2011-0912 STATE OF NEW HAMPSHIRE V. DANIEL C. THOMPSON BRIEF FOR THE DEFENDANT Rule 7 Mandatory Appeal 2 nd Circuit District Division - Lebanon Bruce E. Kenna,

More information

ORANGE COUNTY BAR ASSOCIATION. Formal Opinion 2011-01 (Collaborative Family Law)

ORANGE COUNTY BAR ASSOCIATION. Formal Opinion 2011-01 (Collaborative Family Law) ORANGE COUNTY BAR ASSOCIATION Formal Opinion 2011-01 (Collaborative Family Law) Issue: Can a family lawyer enter into a collaborative law agreement consistent with her ethical duties, notwithstanding the

More information

How To Defend Yourself In A Criminal Case Against A Man Who Is A Convicted Felon

How To Defend Yourself In A Criminal Case Against A Man Who Is A Convicted Felon Case 307-cr-00289-M Document 368 Filed 08/01/2008 Page 1 of 6 UNITED STATES DISTRICT COURT FOR THE NORTHERN DISTRICT OF TEXAS UNITED STATES OF AMERICA, v. DON HILL, et al., Defendants. NO. 307CR289-R ELECTRONICALLY

More information

Case 1:07-cr-00220-BSJ Document 30 Filed 08/17/2007 Page 1 of 11

Case 1:07-cr-00220-BSJ Document 30 Filed 08/17/2007 Page 1 of 11 Case 1:07-cr-00220-BSJ Document 30 Filed 08/17/2007 Page 1 of 11 UNITED STATES DISTRICT COURT SOUTHERN DISTRICT OF NEW YORK UNITED STATES OF AMERICA V. 07 Cr. 220 (BSJ) PAUL BARNABA, GOVERNMENT S MEMORANDUM

More information

JUDICIAL BRANCH MEMORANDUM. Re: New Hampshire Superior Court Civil Rules Effective October 1, 2013

JUDICIAL BRANCH MEMORANDUM. Re: New Hampshire Superior Court Civil Rules Effective October 1, 2013 JUDICIAL BRANCH MEMORANDUM To: Attorneys; Legal Assistants; Litigants From: Patricia A. Lenz, Superior Court Administrator Julie W. Howard, Strafford Superior Court Clerk Date: Updated December 16, 2013

More information

SUPERIOR COURT OF THE STATE OF CALIFORNIA FOR THE COUNTY OF LOS ANGELES. (District Courthouse) ) ) ) ) ) ) ) ) ) ) ) )

SUPERIOR COURT OF THE STATE OF CALIFORNIA FOR THE COUNTY OF LOS ANGELES. (District Courthouse) ) ) ) ) ) ) ) ) ) ) ) ) JON BRYANT ARTZ, ESQ. - State Bar No. LAW OFFICES OF JON BRYANT ARTZ 0 Wilshire Boulevard, th Floor Los Angeles, California 00-0 Telephone: ( 0- Facsimile: ( 0-1 Attorney for Defendant 1 1 1 1 1 0 1 SUPERIOR

More information

IN THE COURT OF APPEALS OF TENNESSEE AT KNOXVILLE

IN THE COURT OF APPEALS OF TENNESSEE AT KNOXVILLE IN THE COURT OF APPEALS OF TENNESSEE AT KNOXVILLE FILED June 24, 1999 Cecil Crowson, Jr. Appellate Court Clerk RONALD D. BOWLIN, C/A NO. 03A01-9807-CV-00243 Plaintiff-Appellee, APPEAL AS OF RIGHT FROM

More information

Boulder Municipal Court Boulder County Justice Center P.O. Box 8015 1777 6 th Street Boulder, CO 80306-8015 www.bouldercolorado.

Boulder Municipal Court Boulder County Justice Center P.O. Box 8015 1777 6 th Street Boulder, CO 80306-8015 www.bouldercolorado. Boulder Municipal Court Boulder County Justice Center P.O. Box 8015 1777 6 th Street Boulder, CO 80306-8015 www.bouldercolorado.gov/court JURY READINESS CONFERENCE INSTRUCTIONS You have set your case for

More information

Former Law Office of Vincent DiCarlo

Former Law Office of Vincent DiCarlo Former Law Office of Vincent DiCarlo As of September 1, 2008,Vincent DiCarlo is no longer engaged in the private practice of law. This site is no longer maintained, may no longer be accurate, and is provided

More information

CASE 0:13-cr-00203-ADM-JJG Document 40 Filed 01/08/14 Page 1 of 10 UNITED STATES DISTRICT COURT DISTRICT OF MINNESOTA

CASE 0:13-cr-00203-ADM-JJG Document 40 Filed 01/08/14 Page 1 of 10 UNITED STATES DISTRICT COURT DISTRICT OF MINNESOTA CASE 0:13-cr-00203-ADM-JJG Document 40 Filed 01/08/14 Page 1 of 10 United States of America, UNITED STATES DISTRICT COURT DISTRICT OF MINNESOTA Plaintiff, MEMORANDUM OPINION v. AND ORDER Criminal Case

More information

Case 1:13-cr-00133-SS Document 79 Filed 11/14/13 Page 1 of 5 UNITED STATES DISTRICT COURT WESTERN DISTRICT OF TEXAS AUSTIN DIVISION

Case 1:13-cr-00133-SS Document 79 Filed 11/14/13 Page 1 of 5 UNITED STATES DISTRICT COURT WESTERN DISTRICT OF TEXAS AUSTIN DIVISION Case 1:13-cr-00133-SS Document 79 Filed 11/14/13 Page 1 of 5 UNITED STATES DISTRICT COURT WESTERN DISTRICT OF TEXAS AUSTIN DIVISION UNITED STATES OF AMERICA, Plaintiff v. GREGORY P. BOYD, Defendant No.

More information

Offering Defense Witnesses to New York Grand Juries. Your client has just been held for the action of the Grand Jury. Although you

Offering Defense Witnesses to New York Grand Juries. Your client has just been held for the action of the Grand Jury. Although you Offering Defense Witnesses to New York Grand Juries By: Mark M. Baker 1 Your client has just been held for the action of the Grand Jury. Although you have a valid defense, you do not want your client to

More information

IN THE UNITED STATES DISTRICT COURT FOR THE EASTERN DISTRICT OF PENNSYLVANIA. v. : CRIMINAL NO. 96-00407 O R D E R

IN THE UNITED STATES DISTRICT COURT FOR THE EASTERN DISTRICT OF PENNSYLVANIA. v. : CRIMINAL NO. 96-00407 O R D E R IN THE UNITED STATES DISTRICT COURT FOR THE EASTERN DISTRICT OF PENNSYLVANIA UNITED STATES OF AMERICA : v. : CRIMINAL NO. 96-00407 BYRON C. MITCHELL : O R D E R AND NOW, this day of, 2000, upon consideration

More information

Stages in a Capital Case from http://deathpenaltyinfo.msu.edu/

Stages in a Capital Case from http://deathpenaltyinfo.msu.edu/ Stages in a Capital Case from http://deathpenaltyinfo.msu.edu/ Note that not every case goes through all of the steps outlined here. Some states have different procedures. I. Pre-Trial Crimes that would

More information

IN THE COURT OF APPEALS OF INDIANA

IN THE COURT OF APPEALS OF INDIANA FOR PUBLICATION APPELLANT PRO SE: LLOYD G. PERRY ATTORNEYS FOR APPELLEES: Attorneys for Anonymous Hospital 1, Inc. and Anonymous Medical Facility 1, Inc. MARK W. BAEVERSTAD ANDREW L. PALMISON Rothberg

More information