e-mail as evdience

22
Email as Evidence JOHN D. GREGORY DANIEL J. MICHALUK February 9, 2010

Upload: dan-michaluk

Post on 19-Jan-2015

1.085 views

Category:

Business


0 download

DESCRIPTION

This is an hour presentation on the law of e-mail given as part of an e-discovery conference.

TRANSCRIPT

Page 1: E-mail as Evdience

Email as EvidenceJOHN D. GREGORY

DANIEL J. MICHALUK

February 9, 2010

Page 2: E-mail as Evdience

Email as EvidenceDefinitionsRelevanceAccessProductionAdmissibility and WeightCase studies

2

Page 3: E-mail as Evdience

DefinitionsEmail and e-messages1970s

Classic email (SMTP)1980s

Bulletin boards, MUD, voice mail1990s

Web mail, ICQ, computer-generated or –received faxes2000s

IM, Social networks, Twitter, virtual worldsRemix of all of the above – e.g. notice of FB comments &

repliesVOIP (e.g. Skype = voice + image + IM)Multiplication of carriers : e-messages in the cloud

3

Page 4: E-mail as Evdience

RelevanceWhy focus on email issues? It’s still the killer app

Everybody uses email and (more or less) understands itCan be particularly potent evidence – Gates, Black,

Poindexter Information in transit: special issues

Multiplicity of repositories JurisdictionCommunications/speech issues with content Impermanence

Paradigm caseRaises many issues in strong ways that appear elsewhereEvolves quickly – the answers keep changing

4

Page 5: E-mail as Evdience

AccessStored communications on the corporate e-

mail systemLotus Domino, Microsoft Exchange Server,

GroupwiseBlackberry Enterprise ServerWorkstationsHandheld devices

Page 6: E-mail as Evdience

AccessHard to access stored communications

Un-logged PIN-to-PIN messages (including Blackberry Messenger communications)

Blackberry Internet Service messagesSMS communications

Very hard to access stored communicationsCommunications on employee home computersCommunications on “personal” cloud services

Page 7: E-mail as Evdience

AccessThe law – sources of rights

Employee privacy legislation (federal plus three provinces)

Criminal Code wiretap provision“Common law of the unionized workplace”Constructive dismissal claims by non-union

employees

Page 8: E-mail as Evdience

AccessCases to watch

University of British Columbia – BC Supreme Court

R. v. Cole – Ontario Court of AppealQuon – USSC

Page 9: E-mail as Evdience

AccessPractical options for employers

Do something now!Option #1 – Try harder to control expectations

despite personal use But how far will notice take you?

Option #2 – Give in, and implement privacy controls

Proportional audit/surveillance framework Investigation standards (reasonable suspicion)

Page 10: E-mail as Evdience

ProductionThe problem of volume - retentionRetention policies are key

Email is often on a ‘short’ list for retention At least pressure to move off server, sometimes auto-

delete unless actively saved Limit: reasonably likely to need it in litigation

This can be an e-discovery issue or a trial issue Remington case (1998) – is retention policy reasonable? Broccoli v Echostar (2005) – 21-day retention of emails

10

Page 11: E-mail as Evdience

ProductionPrivilege waiver – the internal counsel problemGenerally one does not produce privileged

information.What is privileged, in-house? If you copy counsel on all internal emails, all the

emails do not become privileged. Separate business advice from legal advice

How to sort it out? Air Canada v Westjet, There is no deemed undertaking rule for

evidence led at trial.

11

Page 12: E-mail as Evdience

ProductionPrivilege waiver – employee emails on

employer systemsA practical problem for employer counsel among

othersCase law on privilege is different from case law

on investigations, audits and surveillanceLots of U.S. developments, few Canadian casesWhat must you do to shield yourself from a

“poisoned client”?

12

Page 13: E-mail as Evdience

Admissibility and WeightProving a digital object is differentVulnerability of information composed of

presence or absence of electric currentWhat happens when the power goes off? When

the system crashes?Malleability of information

Easy to change undetectablyPresentation in the courtroom

Printout vs native format (capacity to present etc)

Mobility multiplies the issues13

Page 14: E-mail as Evdience

Admissibility and WeightThe elements of documentary evidence: dealing with

the differences

Authentication Is this record what it purports to me? Admissibility if foundation laid to support that conclusion The cutting edge of e-evidence including email evidence today

Best evidence rule What is an original electronic document?

Hearsay Does the medium matter? Exceptions wide (reliability) or focused (business records?) It’s not always hearsay (e.g. mechanical evidence)

14

Page 15: E-mail as Evdience

Admissibility and WeightThe Uniform Electronic Evidence Act (where

enacted)“Solutions” to electronic application of these rulesAuthentication: codify

Count on the witness under oath (not saying who)Challenge is in responding to challenges (expertise,

availability of foundation evidence)Best evidence: system not document

Presumptions in aid: it matters whose system it isStandards in aid

Hearsay: do nothingPossible spillover effect of other rules

Admissibility, nothing re weight

15

Page 16: E-mail as Evdience

Case lawNot much of interest on UEEA

R. v. Bellingham (AB) needed evidence of what printouts were

Leoppky v Meston (AB) – demonstrates several things:Court looks behind computer to actual senderA series of emails can satisfy Statute of FraudsStill had missing link i.e. legal rules still apply

Nat. Business Solutions (ON) – email as course of conduct

Singapore vs England: email headers OK or not OK as evidence capable of supporting Statute of Frauds

Lorraine v Markel (NJ) – extreme demands (all obiter)Prove lots about system, manner of production, etcAdmitted some shortcuts might exist e.g. notice of intent

to use

16

Page 17: E-mail as Evdience

An extreme case?“The focus is not on the … creation of the

record, but rather on the … preservation of the record during the time it is in the file”

“The entity’s policies and procedures for the use of the equipment, database and programs are important. How access to the … database [and to the specific program are] controlled is important. How changes in the database are logged, as well as the structure and implementation of backup systems and audit procedures for assuring the continued integrity of the database, are pertinent.”

In re Vee Vinhee, US appeal court, 2005.

17

Page 18: E-mail as Evdience

CGSB StandardCanadian General Standards Board: Standard on

electronic records as documentary evidenceThe key rule of the Standard: think about it! In other words:

Make a policy about how e-records are managedCommunicate the policy Implement the policyMonitor compliance with the policyAdjust the policy as required by circumstances

Have a policy manual that you can point to.Have someone responsible (CRO) (+ witness)

18

Page 19: E-mail as Evdience

New e-messages: ChallengesWebmail, Facebook/MySpace, TwitterAs you go into the cloud, it is harder to:

Authenticate (go to ISP not ASP)Figure out and prove the ‘system’ whose reliability one

would like to count on (or at least appreciate) No standardization – every application is different (not like

SMTP) Consumer oriented – so less rigorous than business systems Proprietary – so codes etc are not readily available Surrounded by TP apps – Tweetdeck, thousands of FB

suppliers – who, where, what are they?Are clouds third party providers in ordinary course of

business, i.e. should they be considered reliable?

19

Page 20: E-mail as Evdience

Admissibility and Weight

Email problem #1 – You didn’t send that

Employee alleges termination on basis of pregnancy

Email pre-dates her pregnancy by two months showing bona fide intent to terminate

Proponent can testify

20

Page 21: E-mail as Evdience

Admissibility and WeightEmail problem #2 – I didn’t send that

Agreement to arbitrate executed through employer’s intranet

Execution by entering SSN or employee ID number plus password

Supervisors could reset passwordsSupervisor resets password to help employee get accessEmail confirmation sent to employeeEmployee claims supervisor executed agreement and

denies reading confirmation email

21

Page 22: E-mail as Evdience

Email as EvidenceJOHN D. GREGORY

DANIEL J. MICHALUK

February 9, 2010