Indirect Evidence of E-mail Authenticity Not Enough in Architect’s Defamation Suit – IL ND (Part I of II)

An Illinois Federal court recently expanded on the reach of some common business torts, the grounds to vacate a default judgment, and the evidentiary vagaries of e-mail.

Strabala v. Zhang, 318 F.R.D. 81 (Ill. N.D. 2016), pits an architect against his former partners in a defamation and tortious interference suit based on accusations of unethical conduct and the diversion of partnership assets to foreign businesses.

The plaintiff alleged that two of the defendants e-mailed different businesses and plaintiff’s professional associates and falsely accused him of forging signatures, illegally using copyrighted software and misrepresenting his accomplishments and “tax fraud.”

After a default judgment entered against them, the former partners moved to vacate the judgment and separately moved to dismiss the plaintiff’s suit for lack of subject matter and personal jurisdiction and defective service of process.  The court vacated the default judgment and partially granted the defendants’ motion to dismiss.  Some highlights of the court’s opinion:

Federal Rules 55 and 60 respectively allows a court to set aside a default order for good cause and a default judgment.  A judgment entered by a court that lacks subject matter jurisdiction over a case or personal jurisdiction over a defendant is void and must be set aside.  See FRCP 60(b)(4).  This furthers the law’s established policy of having cases decided on their merits instead of on technicalities.

A party seeking to vacate an entry of default prior to the entry of final judgment must show: (1) good cause for the default; (2) quick action to correct it; and (3) a meritorious defense to the complaint.  The court found that the defendants satisfied the three-prong standard to vacate the default.

E-mail Evidence: Foundational Rules

The defendants sought to offer two emails into evidence – one sent by the plaintiff, the other received by him.  To lay a foundation for documentary evidence, the proponent (here the defendants) must submit evidence “sufficient to support a finding that the item is what the proponent claims it is.”  FRE 901(a).  The foundational standard is lenient. The proponent must only make a prima facie showing of genuineness; it is up to the court or jury to decide whether the evidence is truly authentic.

Here, the defendants failed to lay a foundation for the e-mails.  First, the plaintiff – variously, author and recipient of the e-mails – testified that he believed the e-mails may have been altered and did not concede the e-mails’ authenticity.

Next, the Court rejected Defendants’ argument that the e-mails were self-authenticating under FRE 902(7) – the rule governing inscriptions, signs, tags, or labels that indicate business origin, ownership, or control.

The court found that plaintiff’s electronic e-mail signature and a company letterhead logo were not “trade inscriptions” within the meaning of Rule 902(7) citing to a Seventh Circuit case holding that a trade inscription on the cover of an owner’s manual does not authenticate the contents of the manual.

Plaintiff presented evidence in his affidavit (declaration) rebutting the presumptive authenticity of the e-mails by calling into question whether he signed one e-mail electronically and by stating that the e-mails were on his personal laptop’s hard drive, a device plaintiff claimed the defendants stole from him.  The court held that if the e-mails did originate from plaintiff’s stolen laptop, the evidence would be inadmissible.

Q: So what kind of evidence would have satisfied the court?

A: Direct proof of authenticity.

Q: What would qualify as “direct proof”?

A: Testimony by Plaintiff or the other sender or someone who witnessed the sending of the emails who could attest that the questioned e-mails are the actual, unchanged emails sent by the authors.

The court noted that indirect evidence of authenticity could also work.  Indirect evidence typically involves testimony from “someone who personally retrieved the e-mail from the computer to which the e-mail was allegedly sent” together with other circumstantial evidence such as the e-mail address in the header and the substance of the email itself.

Here, the court found the defendants’ indirect evidence was too flimsy. It noted that the defendants were interested parties and accused of theft (plaintiff claimed they stole his laptop).  The court also held that the defendants’ self-serving testimony that they didn’t alter the e-mails wasn’t enough to establish their authenticity especially in light of plaintiff’s claims that the defendants stole his laptop and that the e-mails appeared to have been changed.

In the end, the court granted the plaintiff’s motion to strike the two e-mail exhibits to the defendants’ motion to dismiss.

Take-aways:

Given the rampantness of e-mail, this case is instructive for litigators since most cases will involve at least some e-mail evidence.  The case also underscores that while the standard for evidence authenticity is low, it still has some teeth.

Here, the plaintiff’s belief that the emails offered against him were doctored coupled with the fact that the e-mails’ source was stolen property (a laptop), was enough to create a question as to whether the e-mails were authentic.

The next post summarizes the Court’s exhaustive analysis of subject matter and personal jurisdiction under the Illinois long-arm statue and Federal due process standards.

Getting E-Mails Into Evidence: (Ind.) Federal Court Weighs In

IMG_0924

Since e-mail is the dominant form of business communication across the globe, it’s no surprise that it comprises a large chunk of the documents used as evidence at a business dispute trial.

Email’s prevalence in lawsuits makes it crucial for litigators to understand the key evidence authenticity and foundational rules that govern whether an email gets into evidence.  This is especially true where an email goes to the heart of a plaintiff’s claims (or defendant’s defenses) and the e-mail author or recipient denies the e-mail’s validity.

Finnegan v. Myers, 2015 WL 5252433 (N.D. Ind. 2015), serves as a recent example of a Federal court applying fundamental evidence rules to the e-mail communications context.

In the case, the plaintiffs, whose teenaged daughter died under suspicious circumstances, sued various Indiana child welfare agencies for lodging criminal child neglect charges against them that were eventually dropped.  The plaintiffs then filed Federal civil rights and various due process claims against the defendants.

The defendants moved for summary judgment and then sought to strike some of plaintiffs’ evidence opposing summary judgment.  A key piece of evidence relied on by the plaintiff in opposing summary judgment that the defendants sought to exclude as improper hearsay was an e-mail from a forensic pathologist to child welfare personnel that called into questions the results of a prior autopsy of the deceased.

Denying defendants’ two motions (the summary judgment motion and motion to strike), the Court provides a useful gloss on the operative evidence rules that control e-mail documents in litigation.

  • The Federal Rules of Evidence (FRE) require a proponent to produce evidence sufficient to support a finding the item is authentic – that it is what the proponent claims it to be;
  • FRE 901 recognizes several methods of authentication including witness testimony, expert or non-expert comparisons, distinctive characteristics, and public records, among others;
  • FRE 902 recognizes certain evidence as inherently trustworthy and “self-authenticating” (requiring no additional proof of authenticity).  Evidence in this camp includes public records, official publications, newspapers and periodicals, commercial paper, and certified domestic records of a regularly conducted activity;
  • Authentication only relates to the source of the documents – it does not mean that the documents’ contents are taken as true;
  • E-mails may be authenticated by circumstantial evidence such as (a) viewing the e-mail’s contents in light of the factual background of the case, (b) identifying the sender and receiver via affidavit, (c) identifying the sender by the e-mail address from which the e-mail was sent, (d) comparing the email’s substance to other evidence in the case, and (e) comparing the e-mail to other statements by the claimed author of a given email.

(** 5-6)

Applying these guideposts, the court found that the plaintiff sufficiently established that the subject email was genuine (i.e., it was what it purported to be) and that it was up to the jury to determine what probative value the email evidence had at trial.

The court also agreed with the plaintiff that the pathologist’s email wasn’t hearsay: it was not used for the truth of the email.  Instead, it was simply used to show that the State  agency was put on notice of a second autopsy and changes in the pathologist’s cause of death opinions.

Afterwords:

This case resonates with me since I’ve litigated cases in the past where a witness flatly denies sending an email even though it’s from an e-mail address associated with the witness.  In those situations. I’ve had to compile other evidence – like the recipient’s affidavit – and had to show the denied email is congruent with other evidence in the case to negate the denial.

Finnegan neatly melds FRE 901 and 902 and provides a succinct summary of what steps a litigator must take to establish the authenticity of e-mail evidence.