What Every Judge and Lawyer Needs to Know About Electronic Evidence

Not long ago, “friend” was a noun, “yelp” meant a shrill bark, “twitter” referred to a chirp, a “tumbler” was a gymnast or a glass, and “facebook,” “youtube,” and “instagram” were gibberish. Cases now rise and fall on the admissibility of Facebook profiles, Yelp reviews, Twitter tweets, YouTube videos, Instagram photos, Tumblr posts, and other social media evidence — and more conventional, but only slightly older, electronic data like text messages, emails, search engine results, and webpages (live or archived).

While the media are new, the applicable evidentiary principles are familiar and have easily adapted to them. The two overarching issues are authentication and hearsay. This article focuses on authentication beginning with the critical, and very distinct, roles of judge and jury in deciding that question. The article then turns to authentication of website data, moving from conventional webpages to social media pages. It concludes with a discussion of email, text, and social media messages.

I. Judge as Gatekeeper, Jury as Decision Maker

The ultimate decision maker on the question of authentication is the finder of fact. The judge is gatekeeper, but this is not Daubert-intensive gatekeeping.

The principal authentication rule, Rule 901(a), provides that: “To satisfy the requirement of authenticating or identifying an item of evidence, the proponent must produce evidence sufficient to support a finding that the item is what the proponent claims it is.” The court makes the initial decision under Rule 104(a) whether the proponent has offered sufficient proof that a reasonable juror could find in favor of authenticity. 1 If so, then, under Rule 104(b), 2 the jury makes the ultimate determination as to whether the evidence is, in fact, what its proponent claims. 3 “Importantly,” as the Fourth Circuit has observed, “the burden to authenticate under Rule 901 is not high . . . . [A] district court’s role is to serve as gatekeeper in assessing whether the proponent has offered a satisfactory foundation from which the jury could reasonably find that the evidence is authentic.” 4 “In performing its Rule 104 gate-keeping function, the trial court itself need not be persuaded that the proffered evidence is authentic. The preliminary question for the trial court to decide is simply whether the proponent of the evidence has supplied facts that are sufficient to support a reasonable jury determination that the evidence he has proffered is authentic.” 5 At that point, the issue is for the jury.

II. Conventional Websites

Prima Facie Website Authentication

In applying Rule 901 authentication standards to website evidence, there are three questions that must be answered:

  1. What was actually on the website?
  2. Does the exhibit or testimony accurately reflect it?
  3. If so, is it attributable to the owner of the site?

It is generally sufficient, in order to make a prima facie showing of authenticity, that a witness testifies — or certifies in compliance with a statute or rule — that:

  1. The witness typed in the Internet address reflected on the exhibit on the date and at the time stated;
  2. The witness logged onto the website and reviewed its contents; and
  3. The exhibit fairly and accurately reflects what the witness perceived. 6

The exhibit should bear the Internet address and the date and time the webpage was accessed and the contents downloaded. 7

When evaluating the proffer, the court considers whether the exhibit bears indicia of reliability, such as:

The opponent of the evidence is free to challenge it by adducing facts showing that the exhibit does not accurately reflect the contents of a website, or that those contents are not attributable to the ostensible owner of the site. There may be legitimate questions concerning the ownership of the site or attribution of statements contained on the site to the ostensible owner. 8 More by way of authentication may be required of a proponent who is known to be an information technology specialist (that is, a computer geek) and is both able and motivated to modify the proffered website data. 9

Self-Authenticating Website Data

Three types of webpage exhibits are self-authenticating.

Government Websites. Under Rule 902(5) (Official Publications), “[a] book, pamphlet, or other publication purporting to be issued by a public authority” is self-authenticating. Rule 101(b)(6) provides that “a reference to any kind of written material or any other medium includes electronically stored information.” Hence, data on governmental websites are self-authenticating. 10

As discussed below, courts regularly take judicial notice of these websites.

Newspaper & Periodical Websites. Under Rule 902(6) (Newspapers and Periodicals), “[p]rinted material purporting to be a newspaper or periodical” is self-authenticating. Coupled with Rule 101(b)(6), which expands “printed” to include electronic data, newspaper, and periodical material that appears on the web — whether or not it ever appeared in hard copy — is self-authenticating. 11 As discussed below, courts regularly take judicial notice of these websites. (Note that, while the contents of articles remain subject to hearsay analysis, if an article is more than 20 years old it is not excludable as hearsay because it is an “ancient document” under Rule 803(16), seemingly leading to the conclusion that incredible tabloid articles from the early ’90s or before are admissible for their truth. Sometimes, common sense must intrude.)

Websites Certified as Business Records. Rules 902(11) and (12) render self- authenticating business (organizational) records that are certified as satisfying Rule 803(6) by “the custodian or another qualified person.” Exhibits extracted from websites that are maintained by, for, and in the ordinary course of a business or other regularly conducted activity can satisfy this rule. 12

Judicial Notice of Website Evidence

“It is not uncommon for courts to take judicial notice of factual information found on the world wide web.” 13 Governmental Websites. First and foremost among the types of Internet inference that may be judicially noticed is that taken from governmental websites, 14 including:

Even this rule has exceptions, however. For example, one court found that data posted on the website of a governmental entity, which was a litigant before the court, was in conflict with all other evidence (including evidence before the governmental entity that posted the data) and was insufficiently trustworthy to warrant judicial notice. 19

Nongovernmental Websites. Generally, and with some notable exceptions, courts are reluctant to take judicial notice of nongovernmental websites because the Internet “contains an unlimited supply of information with varying degrees of reliability, permanence, and accessibility” and “is an open source” permitting anyone to “purchas[e] an Internet address and create a website.” 20

Familiar, Frequently Noticed Websites. Nonetheless, there are many types of nongovernmental websites of which courts routinely take judicial notice, including:

Wayback Machine. Archived versions of websites as displayed on The Wayback Machine ( www.archive.org ) are frequently the subject of judicial notice, but this is not always the case.26 Note that it is only the contents of the archived pages that may warrant judicial notice — the dates assigned to archived pages may not apply to images linked to them, and more generally, links on archived pages may direct to the live web if the object of the old link is no longer available. 25 Corporate Websites. For certain purposes, even private business websites may warrant judicial notice. 26 Much may turn on the purpose for which judicial notice is taken, the nature or stage of the proceedings, whether any party contests the taking of judicial notice, whether the evidence is in the nature of a party admission, the importance to the outcome of the case of the fact to be noticed, and other variables. 27

III. Social Media Websites

User-Created Pages

Anyone can create a Facebook or other social media page in anyone else’s name — that is, create a false identity, post a phony social media page, send pseudonymous messages. Law enforcement does this with some regularity. 28 There is even instruction on the Internet in how to create a fake Facebook page. 29 One person may also gain access to another’s account, which becomes easier and easier as people own more and more devices, each of which can be used to link to their social media accounts.

Courts are, therefore, circumspect in their approach to authentication of social media evidence.

Both the social media page and the particular post must be linked to the purported author. 30

This can be done in a variety of ways, including:

Among the circumstantial factors that may tip the scales in favor of, or against, putting the issue to the jury for final determination are: