A standard proof query that arises is easy methods to correctly authenticate digital communications. We have now written on the subject in a number of blogs: How Can a Occasion Present Authorship of a Social Media Submit or Different Digital Communication?, Authenticating Images Obtained from Social Media Platforms, Enterprise Data: Posts, Chats, and Texts, New Steerage on Authenticating Social Media, Admissibility of Digital Writings: Emails, Textual content Messages, and Social Networking Posts, and extra.
Final yr, I created a chart to focus on the components of authentication our appellate courts discovered to be satisfactory or insufficient as a basis for surveillance video (additionally see the accompanying weblog, Surveillance Video- When It Comes In and When It Doesn’t). I’ve obtained constructive suggestions on the chart and practitioners have requested for extra proof content material on this format. For a second installment, I selected digital communications.
The chart focuses virtually solely on North Carolina appellate regulation and emphasizes the important thing particulars, usually circumstantial in nature, that the courts relied on in deciding whether or not the muse was satisfactory or insufficient. Attentive readers could observe that in nearly all of the printed instances, North Carolina courts held that the muse was satisfactory. The exceptions the place the courts deemed the muse insufficient occurred the place the proponent of the digital proof made little to no try to put a basis. One may justifiably conclude that our courts have gotten extra lax in admitting digital proof as social media and cellphone communications turn into increasingly more ubiquitous.
Nevertheless, questions stay as to the exact quantum of proof essential to efficiently lay the muse for a digital communication. I introduce a mnemonic gadget within the chart, “SANDVAT,” as a shorthand for the varied classes of circumstantial proof generally relied upon by the proponent of a given piece of digital proof. This refers to Substance, Account, Identify, System, Visuals, Tackle, and Timing (defined additional within the chart). In printed instances the place the muse was deemed satisfactory, the proponent typically relied on a number of classes of circumstantial proof which collectively made a persuasive case for authenticity. Had the transferring social gathering tried a basis, however laid one which was shakier, would the digital proof have correctly been admitted?
There isn’t any exact components nor variety of components for a correct basis. The inquiry is fact-determinative and hinges on whether or not the proponent has made a enough displaying such {that a} affordable finder of reality might conclude that the matter is what the proponent claims it to be. See Rule 901(a); State v. Wiggins, 334 N.C. 18 (1993). Our Courts have defined that this “burden to authenticate… is just not excessive—solely a prima facie displaying is required.” See State v. Ford, 245 N.C. App. 510 (2016). Hopefully, this chart with concrete examples will probably be of use in figuring out how excessive the burden is in apply.
The chart might be discovered right here.




















