Monday, January 11, 2010

Electronic Discovery & Computer Records - A Canadian Opinion

I clipped Slaw's Well worth a read – George Paul’s “Foundations of Digital Evidence” quite a while back but never got around to publishing. I think the following probably lies outside mainstream thinking but it is a provocative piece. Since the Christmas bomber managed to show how screwed up software can be, the last paragraph resonates even stronger.
Paul starts with evidence law’s preference for original records and argues it is both irrelevant and dangerous. It is irrelevant because digital records are comprised of “pure information” and can be modified without creating any evidence of change (metadata aside). It is dangerous because it invites inflated assumptions about a document’s authenticity, a problem aggravated because we often proffer digital information after it has been recorded on paper. That is, we proffer a physical rendition of digital information that appears to have integrity. Paul argues “trivial showings” based on inspection of paper documents should not support admissibility:

***
Paul also argues that the hearsay doctrine ought to bar the admission of computer-generated records – the output of computer processing – without special assurance of trustworthiness. He demonstrates, with case citations, that American courts have largely failed to recognize the risk posed by admitting out of court “statements” made by computers, often by utilizing the business records exception in a manner treats computer-generated as far more reliable than they deserve to be treated given the commonplace challenges in processing data: “Just because businesses rely on faulty computer programs does not necessarily mean that courts should follow suit.”
Now let us consider these points:
Applied Discovery
The court held that “name” terms should be used with particular technological references because searches of names alone would result in positive hits on virtually every document held by defendants’ relatively small business in which most employees were “key” employees. However, terms relating to the licensing of source code should not be used in conjunction with other terms, according to the court, because licensing activity of defendants’ company was “relatively small” and the result of a search of license terms only when found with other terms could be “excessively narrow.” The court invited the parties to return if results from the first search suggested some other search protocol might be needed.
e-Discovery Team
Clearone Communications v. Chiang, 2008 WL 704228 (D. Utah Mar. 10, 2008). Plaintiff filed a motion for sanctions in this case involving claims of misappropriation of trade secrets, breach of contract, and conversion. Plaintiff argued that sanctions were warranted because of Defendant’s misrepresentations concerning the late source code production and Defendant’s failure to produce “smoking gun” email, which was produced by another party to the litigation. The other party was the recipient of the “smoking gun” email. Defendant argued that its computer system did not retain copies of any sent emails.
With our increasing dependence on digital technology, these problems will come down to businesses of all sizes. Be ready fo rit.

No comments:

Post a Comment