Explain how social media evidence is authenticated if the creator of the evidence is unwilling or unable to authenticate it.
What will be an ideal response?
ANS:
Some methods of authenticating social media evidence if the creator of the evidence is unwilling or unable to authenticate it:
1. testimony from someone who saw the creator post the evidence online;
2. testimony from an expert witness that a search of the creator’s computer hard drive demonstrated that it had originated on that computer;
3. testimony that only the creator of the evidence had access to that computer and the social media account;
4. testimony that the post contains information and references to others known only to the creator;
5. testimony that the IP address used to post the relevant information matches the IP address used by the creator’s computer.
You might also like to view...
What is the name for a written document delivered by a creditor alleging that it is owed money by the estate?
a. Notice to creditors b. Creditor's claim c. Proof of mailing notice to creditors d. Allowance of claim
By the late 1800s, the passage of the Married Women's Property Acts permitted married women to, for the first time:
A. Have property titled to their fathers and brothers. B. Obtain a divorce. C. Own property in their husband's name. D. Own property in their own names.
The peculiar characteristics of the plaintiff are never taken into consideration when evaluating the defendant's conduct for purposes of liability for infliction of mental distress.
Answer the following statement true (T) or false (F)
Services cannot be used for consideration.
Answer the following statement true (T) or false (F)