Commercial Litigation and Arbitration

Email, Text and Facebook Message Authentication

From Manuel v. State, 2011 Tex. App. LEXIS 7152 (Tex. Ct. App. Aug. 31, 2011):

An e-mail is properly authenticated if its appearance, contents, substance, or other distinctive characteristics, taken in conjunction with circumstances, support a finding that the document is what its proponent claims. See Shea, 167 S.W.3d at 105; Massimo v. State, 144 S.W.3d 210, 215-16 (Tex. App.-Fort Worth 2004, no pet.). Characteristics to consider in determining whether e-mail evidence has been properly authenticated include (1) consistency with the e-mail address in another e-mail sent by the alleged author; (2) the author's awareness, shown through the e-mail, of the details of the alleged author's conduct; (3) the e-mail's inclusion of similar requests that the alleged author had made by phone during the time period; and (4) the e-mail's reference to the author by the alleged author's nickname. Massimo, 144 S.W.3d at 215-16 (citing United States v. Siddiqui, 235 F.3d 1318, 1322-23 (11th Cir. 2000), cert. denied, 533 U.S. 940, 121 S. Ct. 2573, 150 L. Ed. 2d 737 (2001)).

Text messages can be authenticated by applying the same factors. See, e.g., Dickens v. State, 927 A.2d 32, 35-38 (2007) (threatening text messages received by victim on cell phone con-tained details few people would know and were sent from phone in defendant's possession at the time); In re F.P., 878 A.2d 91, 95 (Pa. Super. 2005) (threatening instant messages properly authenticated through circumstantial evidence including screen names, context of messages, and surrounding circumstances); see also Goode, supra, at 9. Rule 901(b)(4) has also been applied to authenticate MySpace evidence. See Tienda v. State, No. 05-09-00553-CR, 2010 WL 5129722, at *4-5 (Tex. App.-Dallas Dec. 17, 2010, pet. granted). And other jurisdictions have applied similar rules to Facebook messages. See, e.g., State v. Eleck, No. AC 31581, 2011 Conn. App. LEXIS 427, at *17-18 (Conn. App. Ct. Aug. 9, 2011) (showing that messages came from particular Face book account insufficient to authenticate messages without further "foundational proof"); Commonwealth v. Purdy, 459 Mass. 442, 450-51, 945 N.E.2d 372 (2011) (holding that e-mail sent from Face book account bearing defendant's name not sufficiently authenticated without additional "confirming circumstances").

Another traditional method of authentication permitted by Rule 901 is the "reply-letter doctrine." Varkonyi v. State, 276 S.W.3d 27, 35 (Tex. App.-El Paso 2008, pet. ref'd) (citing Cathy Cochran, Texas Rules of Evidence Handbook, Article IX, at 915 (6th ed. 2005)). Under this doctrine, a letter received in the due course of mail purportedly in answer to another letter is prima facie genuine and admissible without further proof of authenticity. Id. This doctrine applies to e-mails. Id. Therefore, an e-mail is sufficiently authenticated when a person responds to an e-mail that was sent to the person's e-mail address. Id. This rule has been applied to other types of messages by analogy. See, e.g., People v. Pierre, 838 N.Y.S.2d 546, 548-49 (N.Y. App. Div. 2007) (applied to instant message where person sent instant message to screen name and received reply, content on reply supported conclusion that message was sent by defendant, and no evidence was admitted to show anyone else had motive or opportunity to impersonate defendant by using his screen name).

Rule 901 clearly provides that the illustrations are not exclusive means of authentication. See Tex. R. Evid. 901(b) ("By way of illustration only, and not by way of limitation, the following are examples of authentication or identification conforming with the requirements of this rule[.]")

Share this article:

Facebook
Twitter
LinkedIn
Email

Recent Posts

RICO and Injunctions: (1) State Court Actions Designed to Perpetuate and Monetize a RICO Violation Are Enjoinable under RICO, Even Though They Are Not Themselves Alleged to Be Predicate Acts [Note: Noerr Pennington Applies in RICO Actions] — (2) Although Civil RICO’s Text and Legislative History Fail to Reveal Any Intent to Override the Provisions of the Federal Arbitration Act, Arbitrations Are Enjoinable Under the “Effective Vindication” Doctrine Where They Operate As a Prospective Waiver of a Party’s Right to Pursue Statutory RICO Remedies — (3) Arbitration Findings May Be Given Collateral Estoppel Effect in a Civil RICO Action — (4) Injunction of Non-Corrupt State Court Litigations That Furthers a RICO Violation Are Enjoinable Under the Anti-Injunction Act’s “Expressly Authorized” Exception — (5) “The Irreparable Harm Requirement Is The Single Most Important Prerequisite For The Issuance Of A Preliminary Injunction” (Good Quote) — (6) When Injunction Is Based on “Serious Questions on the Merits” Rather Than “Likelihood of Success,” Court May Rely on Unverified Pleadings and Attached Exhibits to Assess the Merits, Unless the Opponent Has Raised Substantial Questions (Here, the Opponent Failed to Request an Evidentiary Hearing) — (7) Whether Amended Pleading Moots An Appeal Turns on Whether It Materially Changes the Substantive Basis for the Appeal — (8) Meaning of “In That” (“Used To Introduce A Statement That Explains Or Gives More Specific Information” About A Prior Statement)

Archives