This website uses cookies to ensure you have the best experience. Learn more

Computer Generated Evidence In Court Essay

4785 words - 19 pages

IntroductionWe are living in what is usually described as an 'information society' and as the business community makes ever greater use of computers the courts are going to find that increasingly the disputes before them turn on evidence which has at some stage passed through or been processed by a computer. In order to keep in step with this practice it is vital that the courts are able to take account of such evidence. As the Criminal Law Revision Committee recognised, 'the increasing use of computers by the Post Office, local authorities, banks and business firms to store information will make it more difficult to prove certain matters such as cheque card frauds, unless it is possible for this to be done from computers' (CLRC 1972, para 259).AdmissibilityThe law of evidence is concerned with the means of proving the facts which are in issue and this necessarily involves the adduction of evidence which is then presented to the court. The law admits evidence only if it complies with the rules governing admissibility. Computer output is only admissible in evidence where special conditions are satisfied. These conditions are set out in detail in section 69 of the Police and Criminal Evidence Act (PACE) 1984 (see further Nyssens 1993, Reed 1993 and Tapper 1993).In general the principles of admissibility are that the evidence must be relevant to the proof of a fact in issue, to the credibility of a witness or to the reliability of other evidence, and the evidence must not be inadmissible by virtue of some particular rule of law (Keane 1994, pp 15-20; Tapper 1990, pp 51-61).Real evidence usually takes the form of some material object (including computer output) produced for inspection in order that the court may draw an inference from its own observation as to the existence, condition or value of the object in question. Although real evidence may be extremely valuable as a means of proof, little if any weight attaches to it unless accompanied by testimony which identifies the object in question and explains its connection with, or significance in relation to, the facts in issue or relevant to the issue.This is illustrated in the case of R v Wood (1982) 76 Cr App R 23 where the appellant was convicted of handling stolen metals. In order to prove that metal found in his possession and metal retained from the stolen consignment had the same chemical composition cross-checking was undertaken and the figures produced were subjected to a laborious mathematical process in order that the percentage of the various metals in the samples could be stated as figures. This was done by a computer operated by chemists. At the trial, detailed evidence was given as to how the computer had been programmed and used. The computer printout was not treated as hearsay but rather as real evidence, the actual proof and relevance of which depended upon the evidence of the chemists, computer programmer and other experts involved.The difficulty in the application of this rule...

Find Another Essay On Computer Generated Evidence In Court

Computer Forensics Essay

1581 words - 6 pages understand computer forensics. Forensics is the process of using scientific knowledge for collecting, analyzing, and presenting evidence to the courts. Forensics deals primarily with the recovery and analysis of latent evidence. Latent evidence can take many forms, from fingerprints left on a window to DNA evidence recovered from bloodstains to the files on a hard drive. Computer forensics can be used to uncover potential evidence in many types of cases

The Computer Industry Essay

1922 words - 8 pages information. Forms of computer communications may be used in evidence. New methods of surveillance is made possible by computers and may be used by law enforcement. Legal Aspects of Computer-based Patient Records and Record Systems – Information on computer patient records and how they have a legal play in court. Legal Aspects of Computer Crime – Information on various types of computer crime. Computer Crime Legal Resources – A guide on computer

Should We Support Virtual Pornography?

1707 words - 7 pages advanced a growing question began to be formed: should virtual pornography be constitutionally protected, under the argument that it is a form of personal expression and that it’s content has significant scientific, literary, artistic, or political value? Unlike actual child pornography, which has to include two innocent children partaking in sexual acts, virtual pornography consist of two computer generated children engaging in sexual acts. The

The Role of Federal Agencies in Fighting Digital Crime

834 words - 4 pages . Untrained patrol officers can easily destroy computer evidence by accident, and cause the criminal to go free because there is no evidence linking the computer crime to the criminal. Local law enforcement agencies aren’t capable of deciphering encrypted computer evidence as federal law enforcement agencies are due to the fact that they don’t receive enough funding to get equipment to read encrypted evidence. The constant changes in computer

A History of the FBI Regional Computing Forensics Laboratory

1219 words - 5 pages , and how do they apply to what happens at the FBI’s Regional Computer Forensic Laboratory. There are a few tests that can be applied to determine whether or not the collected evidence is admissible in court, one of these being the Daubert rules (509 US 579, 1993), the other being the Federal Rules of Evidence (FRE) 702 (Rule 702). Essentially, these various rules go over how an ‘expert’ utilizes tools to extract and examine evidence References 1

Computer Forensics and Criminal Justice

745 words - 3 pages seizure of evidence. In computer crimes, evidence could be lost simply because a computer has been shut down by the suspect or any other person. If the data was deleted from the computer, further warrants would be needed to retrieve it from the computer which would cost time and effort.Searching and seizure of evidence in a computer crime requires search warrants. The Fourth Amendment states that a search warrant should not be issued without probable

What is Digital Forensic?

1795 words - 8 pages 1. Introduction The aim of this report is to theoretical cover data preservation, examination of digital evidence, tools and techniques for data capture, preservation and examination with a list of recommendations. In our modern society, computers and other digital devices are becoming ubiquitous. In the late 1970’s the number of crimes that involved digital devices and computers has been increasing rapidly. As a result of that, computer

Categories and Types of Evidence and their Use in the Courtroom

1551 words - 6 pages , computer animation, diagrams,physical examinations and motion pictures. They have to be authenticated before a judge allowstheir use in the court of law to be used as demonstrative evidence. Any such evidence has to passthe authentication test.Experimental evidence is the kind of evidence that is gotten s a result of experimentsperformed on objects got on a criminal scene so as to deduce the background of the criminal orto gather information on the

Child Pornography and the Supreme Court

611 words - 2 pages In this paper we shall present an important case involving the governments attempt to defend a child-protection law designed to guard minors against internet pornography. In Ashcroft v. Free Speech Coalition, 00-795, the court heard arguments over the Child Pornography Protection Act of 1996 (CPPA).(Ashcroft)   The production or possession of actual child pornography was illegal prior to 1996; the CPPA broadened the definition of

Best Evidence

787 words - 4 pages evidence in court allows the prosecution to secure the original evidence and to protect it from damage, loss, or theft. Currently, under the Federal Rules of Evidence any printout or readable output of data stored in a computer reflecting the original is deemed to be an ‘original’ and admissible in evidence, however, the fraud examiner will still need to maintain detailed records of the chain of custody, just in case the defendants attorney challenges the best evidence rule.

The data protection act was introduced in the UK in 1984. It gives rights to data subjects (i.e. people who have data

3095 words - 12 pages Dean Smith 11k LEGISLATION The data protection act was introduced in the UK in 1984. It gives rights to data subjects (i.e. people who have data about them stored on computer systems). The act was updated in 1998 to take the increasing use of computers, and changes in European Union law, into account. The 8 principles of the data protection act are: 1. Data must not be processed unless there is a specific

Similar Essays

Repressed Memory Should Not Be Used As Evidence In Court

1909 words - 8 pages Since the 1980's till today, one of the most controversial in law and psychology has been the validity of repressed memory. Repressed memory refers to a memory of experience, especially a traumatic one that is recalled after an often lengthy period of time. In this essay it is argued that repressed memory should not be used as evidence in court. Four main arguments are presented against the validity of repressed memory used as evidence in court

Computer Forensics: Issues In Preserving Digital Evidence And Forensic Investigation

1931 words - 8 pages jepoeradize its reliability when being admitted into court. It is important to identify the issues, possible solutions, and the type of technology that is used in computer forensics, especially during a computer forensic investigation. This paper will provide an insight to the existing issues in FIT such as computer forensics, with emphasis on preserving digital(electronic) evidence and the issue of effectively aquiring, authenticating, and

Computer Crime Investigations Essay

771 words - 3 pages In simple terms, computer or digital forensic evidence analysis is the scientific collection of data that is either retrieved or held by a computer storage device that can be used against a criminal in a court of law. For the information to be used in court it should be collected before it is presentation; therefore, there are a number of recommendations proposed to make sure that information collected meets the intended integrity

Processes And Analyses For Computer Crime Investigations

713 words - 3 pages In simple terms, computer or digital forensic evidence analysis is the scientific collection of data that is either retrieved or held by a computer storage device that can be used against a criminal in a court of law. For the information to be used in court, it should be collected before it is presented. Therefore, there are a number of recommendations proposed to make sure that information collected meets the intended integrity. Information