SlideShare una empresa de Scribd logo
1 de 22
Email as Evidence JOHN D. GREGORY DANIEL J. MICHALUK February 9, 2010
Email as Evidence Definitions Relevance Access Production Admissibility and Weight Case studies 2
Definitions Email and e-messages 1970s Classic email (SMTP) 1980s Bulletin boards, MUD, voice mail 1990s Web mail, ICQ, computer-generated or –received faxes 2000s IM, Social networks, Twitter, virtual worlds Remix of all of the above – e.g. notice of FB comments & replies VOIP (e.g. Skype = voice + image + IM) Multiplication of carriers : e-messages in the cloud 3
Relevance Why focus on email issues? ,[object Object]
Everybody uses email and (more or less) understands it
Can be particularly potent evidence – Gates, Black, Poindexter
Information in transit: special issues
Multiplicity of repositories
Jurisdiction
Communications/speech issues with content
Impermanence
Paradigm case
Raises many issues in strong ways that appear elsewhere
Evolves quickly – the answers keep changing4
Access Stored communications on the corporate e-mail system Lotus Domino, Microsoft Exchange Server, Groupwise Blackberry Enterprise Server Workstations Handheld devices
Access Hard to access stored communications Un-logged PIN-to-PIN messages (including Blackberry Messenger communications) Blackberry Internet Service messages SMS communications Very hard to access stored communications Communications on employee home computers Communications on “personal” cloud services
Access The law – sources of rights Employee privacy legislation (federal plus three provinces) Criminal Code wiretap provision “Common law of the unionized workplace” Constructive dismissal claims by non-union employees
Access Cases to watch University of British Columbia – BC Supreme Court R. v. Cole – Ontario Court of Appeal Quon – USSC
Access Practical options for employers Do something now! Option #1 – Try harder to control expectations despite personal use But how far will notice take you? Option #2 – Give in, and implement privacy controls Proportional audit/surveillance framework Investigation standards (reasonable suspicion)
Production The problem of volume - retention Retention policies are key Email is often on a ‘short’ list for retention At least pressure to move off server, sometimes auto-delete unless actively saved Limit: reasonably likely to need it in litigation This can be an e-discovery issue or a trial issue Remington case (1998) – is retention policy reasonable? Broccoli v Echostar (2005) – 21-day retention of emails 10
Production Privilege waiver – the internal counsel problem Generally one does not produce privileged information. What is privileged, in-house? If you copy counsel on all internal emails, all the emails do not become privileged. Separate business advice from legal advice How to sort it out? Air Canada v Westjet,  There is no deemed undertaking rule for evidence led at trial. 11
Production Privilege waiver – employee emails on employer systems A practical problem for employer counsel among others Case law on privilege is different from case law on investigations, audits and surveillance Lots of U.S. developments, few Canadian cases What must you do to shield yourself from a “poisoned client”? 12

Más contenido relacionado

Destacado

The Future of Employment Law
The Future of Employment LawThe Future of Employment Law
The Future of Employment LawDan Michaluk
 
E discovery production and non-party privacy v2
E discovery production and non-party privacy v2E discovery production and non-party privacy v2
E discovery production and non-party privacy v2Dan Michaluk
 
The ugly, the bad and the good of cloud computing
The ugly, the bad and the good of cloud computingThe ugly, the bad and the good of cloud computing
The ugly, the bad and the good of cloud computingDan Michaluk
 
Ci admin law addressing the privacy interests of affected individuals nov 2...
Ci admin law   addressing the privacy interests of affected individuals nov 2...Ci admin law   addressing the privacy interests of affected individuals nov 2...
Ci admin law addressing the privacy interests of affected individuals nov 2...Dan Michaluk
 
Privacy and Litigation
Privacy and LitigationPrivacy and Litigation
Privacy and LitigationDan Michaluk
 
Employee issues and privacy
Employee issues and privacyEmployee issues and privacy
Employee issues and privacyDan Michaluk
 
Social media and the hiring process
Social media and the hiring processSocial media and the hiring process
Social media and the hiring processDan Michaluk
 
A Lawyer's Perspective on Records Retention And Destruction
A Lawyer's Perspective on Records Retention And DestructionA Lawyer's Perspective on Records Retention And Destruction
A Lawyer's Perspective on Records Retention And DestructionDan Michaluk
 

Destacado (8)

The Future of Employment Law
The Future of Employment LawThe Future of Employment Law
The Future of Employment Law
 
E discovery production and non-party privacy v2
E discovery production and non-party privacy v2E discovery production and non-party privacy v2
E discovery production and non-party privacy v2
 
The ugly, the bad and the good of cloud computing
The ugly, the bad and the good of cloud computingThe ugly, the bad and the good of cloud computing
The ugly, the bad and the good of cloud computing
 
Ci admin law addressing the privacy interests of affected individuals nov 2...
Ci admin law   addressing the privacy interests of affected individuals nov 2...Ci admin law   addressing the privacy interests of affected individuals nov 2...
Ci admin law addressing the privacy interests of affected individuals nov 2...
 
Privacy and Litigation
Privacy and LitigationPrivacy and Litigation
Privacy and Litigation
 
Employee issues and privacy
Employee issues and privacyEmployee issues and privacy
Employee issues and privacy
 
Social media and the hiring process
Social media and the hiring processSocial media and the hiring process
Social media and the hiring process
 
A Lawyer's Perspective on Records Retention And Destruction
A Lawyer's Perspective on Records Retention And DestructionA Lawyer's Perspective on Records Retention And Destruction
A Lawyer's Perspective on Records Retention And Destruction
 

Similar a E-mail as Evdience

Techno Security 2009 Presentation-Myrtle Beach
Techno Security 2009 Presentation-Myrtle BeachTechno Security 2009 Presentation-Myrtle Beach
Techno Security 2009 Presentation-Myrtle Beachelgolfo
 
Transitory Electronic Communication: Recordless Messaging in the Context of a...
Transitory Electronic Communication: Recordless Messaging in the Context of a...Transitory Electronic Communication: Recordless Messaging in the Context of a...
Transitory Electronic Communication: Recordless Messaging in the Context of a...jonneiditz
 
Translating Geek To Attorneys It Security
Translating Geek To Attorneys It SecurityTranslating Geek To Attorneys It Security
Translating Geek To Attorneys It SecurityCTIN
 
Luxembourg Coc E Discovery Presentation
Luxembourg Coc   E Discovery PresentationLuxembourg Coc   E Discovery Presentation
Luxembourg Coc E Discovery Presentationjmsobel1
 
Jbh Esi Powerpoint
Jbh Esi PowerpointJbh Esi Powerpoint
Jbh Esi PowerpointJbhirsh
 
5 19 09 Brandeis Lawyer Technology CLE
5 19 09 Brandeis Lawyer Technology CLE5 19 09 Brandeis Lawyer Technology CLE
5 19 09 Brandeis Lawyer Technology CLEJonathan Ezor
 
5 19 09 Brandeis Lawyer Technology CLE
5 19 09 Brandeis Lawyer Technology CLE5 19 09 Brandeis Lawyer Technology CLE
5 19 09 Brandeis Lawyer Technology CLEguestaaab94
 
Who's Afraid of eDiscovery?
Who's Afraid of eDiscovery?Who's Afraid of eDiscovery?
Who's Afraid of eDiscovery?CallPM
 
E-Discovery 10 Years after Qualcomm v. Broadcom - Where We Are and Where We A...
E-Discovery 10 Years after Qualcomm v. Broadcom - Where We Are and Where We A...E-Discovery 10 Years after Qualcomm v. Broadcom - Where We Are and Where We A...
E-Discovery 10 Years after Qualcomm v. Broadcom - Where We Are and Where We A...Kirby Drake
 
Logs & The Law: What is Admissible in Court?
Logs & The Law: What is Admissible in Court?Logs & The Law: What is Admissible in Court?
Logs & The Law: What is Admissible in Court?loglogic
 
Amcto presentation final
Amcto presentation finalAmcto presentation final
Amcto presentation finalDan Michaluk
 
Document Retention And Destruction Power Point
Document Retention And Destruction Power PointDocument Retention And Destruction Power Point
Document Retention And Destruction Power Pointlnarvid
 
People, Processes, AND Technology: Use All Three to Avoid Missing a Filing De...
People, Processes, AND Technology: Use All Three to Avoid Missing a Filing De...People, Processes, AND Technology: Use All Three to Avoid Missing a Filing De...
People, Processes, AND Technology: Use All Three to Avoid Missing a Filing De...Jack Pringle
 
Ethical And Social Issues in MIS - Management Information System
Ethical And Social Issues in MIS - Management Information SystemEthical And Social Issues in MIS - Management Information System
Ethical And Social Issues in MIS - Management Information SystemFaHaD .H. NooR
 
iConference Popovsky
iConference PopovskyiConference Popovsky
iConference PopovskyBrian Rowe
 
Cyber Breach: A Legal Perspective - Jarrett Coco
Cyber Breach: A Legal Perspective - Jarrett CocoCyber Breach: A Legal Perspective - Jarrett Coco
Cyber Breach: A Legal Perspective - Jarrett CocoIT-oLogy
 
Electric Insurance ESI Planning
Electric Insurance   ESI PlanningElectric Insurance   ESI Planning
Electric Insurance ESI PlanningJohn Jablonski
 
It takes a village - LegalTech NY 2011
It takes a village - LegalTech NY 2011It takes a village - LegalTech NY 2011
It takes a village - LegalTech NY 2011J. David Morris
 

Similar a E-mail as Evdience (20)

Techno Security 2009 Presentation-Myrtle Beach
Techno Security 2009 Presentation-Myrtle BeachTechno Security 2009 Presentation-Myrtle Beach
Techno Security 2009 Presentation-Myrtle Beach
 
Transitory Electronic Communication: Recordless Messaging in the Context of a...
Transitory Electronic Communication: Recordless Messaging in the Context of a...Transitory Electronic Communication: Recordless Messaging in the Context of a...
Transitory Electronic Communication: Recordless Messaging in the Context of a...
 
Translating Geek To Attorneys It Security
Translating Geek To Attorneys It SecurityTranslating Geek To Attorneys It Security
Translating Geek To Attorneys It Security
 
Luxembourg Coc E Discovery Presentation
Luxembourg Coc   E Discovery PresentationLuxembourg Coc   E Discovery Presentation
Luxembourg Coc E Discovery Presentation
 
Jbh Esi Powerpoint
Jbh Esi PowerpointJbh Esi Powerpoint
Jbh Esi Powerpoint
 
5 19 09 Brandeis Lawyer Technology CLE
5 19 09 Brandeis Lawyer Technology CLE5 19 09 Brandeis Lawyer Technology CLE
5 19 09 Brandeis Lawyer Technology CLE
 
5 19 09 Brandeis Lawyer Technology CLE
5 19 09 Brandeis Lawyer Technology CLE5 19 09 Brandeis Lawyer Technology CLE
5 19 09 Brandeis Lawyer Technology CLE
 
Who's Afraid of eDiscovery?
Who's Afraid of eDiscovery?Who's Afraid of eDiscovery?
Who's Afraid of eDiscovery?
 
E-Discovery 10 Years after Qualcomm v. Broadcom - Where We Are and Where We A...
E-Discovery 10 Years after Qualcomm v. Broadcom - Where We Are and Where We A...E-Discovery 10 Years after Qualcomm v. Broadcom - Where We Are and Where We A...
E-Discovery 10 Years after Qualcomm v. Broadcom - Where We Are and Where We A...
 
Logs & The Law: What is Admissible in Court?
Logs & The Law: What is Admissible in Court?Logs & The Law: What is Admissible in Court?
Logs & The Law: What is Admissible in Court?
 
Amcto presentation final
Amcto presentation finalAmcto presentation final
Amcto presentation final
 
Document Retention And Destruction Power Point
Document Retention And Destruction Power PointDocument Retention And Destruction Power Point
Document Retention And Destruction Power Point
 
eDiscovery
eDiscoveryeDiscovery
eDiscovery
 
Data Residency: Challenges and the Need for Standards
Data Residency: Challenges and the Need for StandardsData Residency: Challenges and the Need for Standards
Data Residency: Challenges and the Need for Standards
 
People, Processes, AND Technology: Use All Three to Avoid Missing a Filing De...
People, Processes, AND Technology: Use All Three to Avoid Missing a Filing De...People, Processes, AND Technology: Use All Three to Avoid Missing a Filing De...
People, Processes, AND Technology: Use All Three to Avoid Missing a Filing De...
 
Ethical And Social Issues in MIS - Management Information System
Ethical And Social Issues in MIS - Management Information SystemEthical And Social Issues in MIS - Management Information System
Ethical And Social Issues in MIS - Management Information System
 
iConference Popovsky
iConference PopovskyiConference Popovsky
iConference Popovsky
 
Cyber Breach: A Legal Perspective - Jarrett Coco
Cyber Breach: A Legal Perspective - Jarrett CocoCyber Breach: A Legal Perspective - Jarrett Coco
Cyber Breach: A Legal Perspective - Jarrett Coco
 
Electric Insurance ESI Planning
Electric Insurance   ESI PlanningElectric Insurance   ESI Planning
Electric Insurance ESI Planning
 
It takes a village - LegalTech NY 2011
It takes a village - LegalTech NY 2011It takes a village - LegalTech NY 2011
It takes a village - LegalTech NY 2011
 

Más de Dan Michaluk

Ecno cyber - 23 June 2023 - djm(137852631.1).pptx
Ecno cyber - 23 June 2023 - djm(137852631.1).pptxEcno cyber - 23 June 2023 - djm(137852631.1).pptx
Ecno cyber - 23 June 2023 - djm(137852631.1).pptxDan Michaluk
 
Critical Issues in School Board Cyber Security
Critical Issues in School Board Cyber SecurityCritical Issues in School Board Cyber Security
Critical Issues in School Board Cyber SecurityDan Michaluk
 
Introduction to FOI law (the law of information)
Introduction to FOI law (the law of information)Introduction to FOI law (the law of information)
Introduction to FOI law (the law of information)Dan Michaluk
 
Higher Education Sexual Violence Presentation
Higher Education Sexual Violence PresentationHigher Education Sexual Violence Presentation
Higher Education Sexual Violence PresentationDan Michaluk
 
Cyber class action claims at an inflection point
Cyber class action claims at an inflection pointCyber class action claims at an inflection point
Cyber class action claims at an inflection pointDan Michaluk
 
The pandemic and privacy
The pandemic and privacyThe pandemic and privacy
The pandemic and privacyDan Michaluk
 
Cyber security for the regulator and regulated - Ontario Regulatory Authorit...
Cyber security for the regulator and regulated  - Ontario Regulatory Authorit...Cyber security for the regulator and regulated  - Ontario Regulatory Authorit...
Cyber security for the regulator and regulated - Ontario Regulatory Authorit...Dan Michaluk
 
Union access to information
Union access to informationUnion access to information
Union access to informationDan Michaluk
 
Cybersecurity Risk Governance
Cybersecurity Risk GovernanceCybersecurity Risk Governance
Cybersecurity Risk GovernanceDan Michaluk
 
Cyber Incident Response - When it happens, will you be ready?
Cyber Incident Response - When it happens, will you be ready?Cyber Incident Response - When it happens, will you be ready?
Cyber Incident Response - When it happens, will you be ready?Dan Michaluk
 
The Current State of FOI
The Current State of FOIThe Current State of FOI
The Current State of FOIDan Michaluk
 
Cyber, secrecy and the public body
Cyber, secrecy and the public bodyCyber, secrecy and the public body
Cyber, secrecy and the public bodyDan Michaluk
 
The privacy and security implications of AI, big data and predictive analytics
The privacy and security implications of AI, big data and predictive analyticsThe privacy and security implications of AI, big data and predictive analytics
The privacy and security implications of AI, big data and predictive analyticsDan Michaluk
 
Advocates' Society Tricks of the Trade 2019 - A Privacy Update
Advocates' Society Tricks of the Trade 2019 - A Privacy UpdateAdvocates' Society Tricks of the Trade 2019 - A Privacy Update
Advocates' Society Tricks of the Trade 2019 - A Privacy UpdateDan Michaluk
 
Privacy, Data Security and Anti-Spam Compliance
Privacy, Data Security and Anti-Spam CompliancePrivacy, Data Security and Anti-Spam Compliance
Privacy, Data Security and Anti-Spam ComplianceDan Michaluk
 
Cyber Insurance and Incident Response Practice
Cyber Insurance and Incident Response Practice Cyber Insurance and Incident Response Practice
Cyber Insurance and Incident Response Practice Dan Michaluk
 
Role of a breach coach
Role of a breach coachRole of a breach coach
Role of a breach coachDan Michaluk
 
PHIPA for school boards
PHIPA for school boardsPHIPA for school boards
PHIPA for school boardsDan Michaluk
 
Privacy, Data Security and Anti-Spam Compliance
Privacy, Data Security and Anti-Spam CompliancePrivacy, Data Security and Anti-Spam Compliance
Privacy, Data Security and Anti-Spam ComplianceDan Michaluk
 
Finding internet evidence
Finding internet evidenceFinding internet evidence
Finding internet evidenceDan Michaluk
 

Más de Dan Michaluk (20)

Ecno cyber - 23 June 2023 - djm(137852631.1).pptx
Ecno cyber - 23 June 2023 - djm(137852631.1).pptxEcno cyber - 23 June 2023 - djm(137852631.1).pptx
Ecno cyber - 23 June 2023 - djm(137852631.1).pptx
 
Critical Issues in School Board Cyber Security
Critical Issues in School Board Cyber SecurityCritical Issues in School Board Cyber Security
Critical Issues in School Board Cyber Security
 
Introduction to FOI law (the law of information)
Introduction to FOI law (the law of information)Introduction to FOI law (the law of information)
Introduction to FOI law (the law of information)
 
Higher Education Sexual Violence Presentation
Higher Education Sexual Violence PresentationHigher Education Sexual Violence Presentation
Higher Education Sexual Violence Presentation
 
Cyber class action claims at an inflection point
Cyber class action claims at an inflection pointCyber class action claims at an inflection point
Cyber class action claims at an inflection point
 
The pandemic and privacy
The pandemic and privacyThe pandemic and privacy
The pandemic and privacy
 
Cyber security for the regulator and regulated - Ontario Regulatory Authorit...
Cyber security for the regulator and regulated  - Ontario Regulatory Authorit...Cyber security for the regulator and regulated  - Ontario Regulatory Authorit...
Cyber security for the regulator and regulated - Ontario Regulatory Authorit...
 
Union access to information
Union access to informationUnion access to information
Union access to information
 
Cybersecurity Risk Governance
Cybersecurity Risk GovernanceCybersecurity Risk Governance
Cybersecurity Risk Governance
 
Cyber Incident Response - When it happens, will you be ready?
Cyber Incident Response - When it happens, will you be ready?Cyber Incident Response - When it happens, will you be ready?
Cyber Incident Response - When it happens, will you be ready?
 
The Current State of FOI
The Current State of FOIThe Current State of FOI
The Current State of FOI
 
Cyber, secrecy and the public body
Cyber, secrecy and the public bodyCyber, secrecy and the public body
Cyber, secrecy and the public body
 
The privacy and security implications of AI, big data and predictive analytics
The privacy and security implications of AI, big data and predictive analyticsThe privacy and security implications of AI, big data and predictive analytics
The privacy and security implications of AI, big data and predictive analytics
 
Advocates' Society Tricks of the Trade 2019 - A Privacy Update
Advocates' Society Tricks of the Trade 2019 - A Privacy UpdateAdvocates' Society Tricks of the Trade 2019 - A Privacy Update
Advocates' Society Tricks of the Trade 2019 - A Privacy Update
 
Privacy, Data Security and Anti-Spam Compliance
Privacy, Data Security and Anti-Spam CompliancePrivacy, Data Security and Anti-Spam Compliance
Privacy, Data Security and Anti-Spam Compliance
 
Cyber Insurance and Incident Response Practice
Cyber Insurance and Incident Response Practice Cyber Insurance and Incident Response Practice
Cyber Insurance and Incident Response Practice
 
Role of a breach coach
Role of a breach coachRole of a breach coach
Role of a breach coach
 
PHIPA for school boards
PHIPA for school boardsPHIPA for school boards
PHIPA for school boards
 
Privacy, Data Security and Anti-Spam Compliance
Privacy, Data Security and Anti-Spam CompliancePrivacy, Data Security and Anti-Spam Compliance
Privacy, Data Security and Anti-Spam Compliance
 
Finding internet evidence
Finding internet evidenceFinding internet evidence
Finding internet evidence
 

Último

Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsP&CO
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Dipal Arora
 
Progress Report - Oracle Database Analyst Summit
Progress  Report - Oracle Database Analyst SummitProgress  Report - Oracle Database Analyst Summit
Progress Report - Oracle Database Analyst SummitHolger Mueller
 
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetCreating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetDenis Gagné
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageMatteo Carbone
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...anilsa9823
 
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Lviv Startup Club
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Serviceritikaroy0888
 
Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Roland Driesen
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfPaul Menig
 
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurVIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurSuhani Kapoor
 
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Delhi Call girls
 
BEST ✨ Call Girls In Indirapuram Ghaziabad ✔️ 9871031762 ✔️ Escorts Service...
BEST ✨ Call Girls In  Indirapuram Ghaziabad  ✔️ 9871031762 ✔️ Escorts Service...BEST ✨ Call Girls In  Indirapuram Ghaziabad  ✔️ 9871031762 ✔️ Escorts Service...
BEST ✨ Call Girls In Indirapuram Ghaziabad ✔️ 9871031762 ✔️ Escorts Service...noida100girls
 
GD Birla and his contribution in management
GD Birla and his contribution in managementGD Birla and his contribution in management
GD Birla and his contribution in managementchhavia330
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLSeo
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayNZSG
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Servicediscovermytutordmt
 
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒anilsa9823
 

Último (20)

Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and pains
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
 
Progress Report - Oracle Database Analyst Summit
Progress  Report - Oracle Database Analyst SummitProgress  Report - Oracle Database Analyst Summit
Progress Report - Oracle Database Analyst Summit
 
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetCreating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usage
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
 
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Service
 
Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdf
 
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurVIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
 
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
 
BEST ✨ Call Girls In Indirapuram Ghaziabad ✔️ 9871031762 ✔️ Escorts Service...
BEST ✨ Call Girls In  Indirapuram Ghaziabad  ✔️ 9871031762 ✔️ Escorts Service...BEST ✨ Call Girls In  Indirapuram Ghaziabad  ✔️ 9871031762 ✔️ Escorts Service...
BEST ✨ Call Girls In Indirapuram Ghaziabad ✔️ 9871031762 ✔️ Escorts Service...
 
GD Birla and his contribution in management
GD Birla and his contribution in managementGD Birla and his contribution in management
GD Birla and his contribution in management
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 May
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Service
 
Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517
Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517
Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517
 
Forklift Operations: Safety through Cartoons
Forklift Operations: Safety through CartoonsForklift Operations: Safety through Cartoons
Forklift Operations: Safety through Cartoons
 
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
 

E-mail as Evdience

  • 1. Email as Evidence JOHN D. GREGORY DANIEL J. MICHALUK February 9, 2010
  • 2. Email as Evidence Definitions Relevance Access Production Admissibility and Weight Case studies 2
  • 3. Definitions Email and e-messages 1970s Classic email (SMTP) 1980s Bulletin boards, MUD, voice mail 1990s Web mail, ICQ, computer-generated or –received faxes 2000s IM, Social networks, Twitter, virtual worlds Remix of all of the above – e.g. notice of FB comments & replies VOIP (e.g. Skype = voice + image + IM) Multiplication of carriers : e-messages in the cloud 3
  • 4.
  • 5. Everybody uses email and (more or less) understands it
  • 6. Can be particularly potent evidence – Gates, Black, Poindexter
  • 7. Information in transit: special issues
  • 13. Raises many issues in strong ways that appear elsewhere
  • 14. Evolves quickly – the answers keep changing4
  • 15. Access Stored communications on the corporate e-mail system Lotus Domino, Microsoft Exchange Server, Groupwise Blackberry Enterprise Server Workstations Handheld devices
  • 16. Access Hard to access stored communications Un-logged PIN-to-PIN messages (including Blackberry Messenger communications) Blackberry Internet Service messages SMS communications Very hard to access stored communications Communications on employee home computers Communications on “personal” cloud services
  • 17. Access The law – sources of rights Employee privacy legislation (federal plus three provinces) Criminal Code wiretap provision “Common law of the unionized workplace” Constructive dismissal claims by non-union employees
  • 18. Access Cases to watch University of British Columbia – BC Supreme Court R. v. Cole – Ontario Court of Appeal Quon – USSC
  • 19. Access Practical options for employers Do something now! Option #1 – Try harder to control expectations despite personal use But how far will notice take you? Option #2 – Give in, and implement privacy controls Proportional audit/surveillance framework Investigation standards (reasonable suspicion)
  • 20. Production The problem of volume - retention Retention policies are key Email is often on a ‘short’ list for retention At least pressure to move off server, sometimes auto-delete unless actively saved Limit: reasonably likely to need it in litigation This can be an e-discovery issue or a trial issue Remington case (1998) – is retention policy reasonable? Broccoli v Echostar (2005) – 21-day retention of emails 10
  • 21. Production Privilege waiver – the internal counsel problem Generally one does not produce privileged information. What is privileged, in-house? If you copy counsel on all internal emails, all the emails do not become privileged. Separate business advice from legal advice How to sort it out? Air Canada v Westjet, There is no deemed undertaking rule for evidence led at trial. 11
  • 22. Production Privilege waiver – employee emails on employer systems A practical problem for employer counsel among others Case law on privilege is different from case law on investigations, audits and surveillance Lots of U.S. developments, few Canadian cases What must you do to shield yourself from a “poisoned client”? 12
  • 23. Admissibility and Weight Proving a digital object is different Vulnerability of information composed of presence or absence of electric current What happens when the power goes off? When the system crashes? Malleability of information Easy to change undetectably Presentation in the courtroom Printout vs native format (capacity to present etc) Mobility multiplies the issues 13
  • 24.
  • 25. Is this record what it purports to me?
  • 26. Admissibility if foundation laid to support that conclusion
  • 27. The cutting edge of e-evidence including email evidence today
  • 29. What is an original electronic document?
  • 31. Does the medium matter?
  • 32. Exceptions wide (reliability) or focused (business records?)
  • 33. It’s not always hearsay (e.g. mechanical evidence)14
  • 34. Admissibility and Weight The Uniform Electronic Evidence Act (where enacted) “Solutions” to electronic application of these rules Authentication: codify Count on the witness under oath (not saying who) Challenge is in responding to challenges (expertise, availability of foundation evidence) Best evidence: system not document Presumptions in aid: it matters whose system it is Standards in aid Hearsay: do nothing Possible spillover effect of other rules Admissibility, nothing re weight 15
  • 35. Case law Not much of interest on UEEA R. v. Bellingham (AB) needed evidence of what printouts were Leoppky v Meston (AB) – demonstrates several things: Court looks behind computer to actual sender A series of emails can satisfy Statute of Frauds Still had missing link i.e. legal rules still apply Nat. Business Solutions (ON) – email as course of conduct Singapore vs England: email headers OK or not OK as evidence capable of supporting Statute of Frauds Lorraine v Markel (NJ) – extreme demands (all obiter) Prove lots about system, manner of production, etc Admitted some shortcuts might exist e.g. notice of intent to use 16
  • 36.
  • 37. “The entity’s policies and procedures for the use of the equipment, database and programs are important. How access to the … database [and to the specific program are] controlled is important. How changes in the database are logged, as well as the structure and implementation of backup systems and audit procedures for assuring the continued integrity of the database, are pertinent.”
  • 38. In re VeeVinhee, US appeal court, 2005.17
  • 39.
  • 41. Make a policy about how e-records are managed
  • 45. Adjust the policy as required by circumstances
  • 46. Have a policy manual that you can point to.
  • 47. Have someone responsible (CRO) (+ witness)18
  • 48. New e-messages: Challenges Webmail, Facebook/MySpace, Twitter As you go into the cloud, it is harder to: Authenticate (go to ISP not ASP) Figure out and prove the ‘system’ whose reliability one would like to count on (or at least appreciate) No standardization – every application is different (not like SMTP) Consumer oriented – so less rigorous than business systems Proprietary – so codes etc are not readily available Surrounded by TP apps – Tweetdeck, thousands of FB suppliers – who, where, what are they? Are clouds third party providers in ordinary course of business, i.e. should they be considered reliable? 19
  • 49. Admissibility and Weight Email problem #1 – You didn’t send that Employee alleges termination on basis of pregnancy Email pre-dates her pregnancy by two months showing bona fide intent to terminate Proponent can testify 20
  • 50.
  • 51. Agreement to arbitrate executed through employer’s intranet
  • 52. Execution by entering SSN or employee ID number plus password
  • 54. Supervisor resets password to help employee get access
  • 56. Employee claims supervisor executed agreement and denies reading confirmation email21
  • 57. Email as Evidence JOHN D. GREGORY DANIEL J. MICHALUK February 9, 2010

Notas del editor

  1. DANPossible content-introduce term “transitory record”-introduce concept of short retention of e-mails-useful hived off from transitory records and transitory records disposed-Will a court go behind a short retention period?-What is the standard? Good faith? Reasonableness?-Lewy v. Remington Arms Co., 836 F .2d 1104 (8th Cir. 1998) (court will consider whether retention period is reasonable in all the circumstances) -Pretty radical… almost a common law duty of care -not aware of a Canadian duty-Micron Technology v. Rambus, Inc. (D. Del., Jan. 9, 2009) -illustrates preservation risks associated with short e-mail retention periods
  2. JOHN
  3. DAN-problem: employees send and receive e-mails to employer using employers work computer-legal issue: does that waive privilege?-legal cases -Canadian cases have tended to favour preservation of privilege Leading case is Daniel Potter, [2005] N.S.J. No. 186 -president stores e-mails on company’s servers -Scanlan J. says no waiver of privilege -did argue the workplace privacy cases -says privilege is different (question of intent rather than reasonable expectation of privacy) -but reasoning turns on e-mail exposure to ISP’s in general -did he have good evidence that established the employer's domain? -also qualified – he was the president so had control over the system New case is Eissis -s-c communication stored on corporate e-mail system -extracted, processed and produced by defendant -with production made waiver claim -plaintiff waited two years to respond -intentional waiver finding -court also suggests that process of extracting, processing and producing with a waiver claim is proper -risky business…. don’t we “seal and deal”-practically -respect the privilege subject to a fight -law firms should have protocols -protocols should include what to tell clients -clients not bound by ethical rules but court… but ability to obtain instructions may be affected