Chain-Of-Custody Issues In Electronic Evidence

Chain-of-Custody Issues in Electronic Evidence

1. Introduction

Electronic evidence (emails, digital files, logs, mobile data, cloud records) is inherently fragile and easily alterable. Courts often require proof of authenticity and integrity, which is established through a chain of custody.

Chain of custody refers to the documented and unbroken control, transfer, and storage of evidence from the point of collection to its presentation in court. Any lapse in the chain can lead to admissibility challenges.

2. Key Principles

Preservation of Original Evidence

Digital data must be preserved in its original form using secure methods (write-blockers, hashing).

Documentation of Handling

Every transfer, access, or duplication must be recorded with date, time, and identity of handlers.

Authentication and Integrity

Hash values, metadata, and digital signatures help demonstrate that evidence has not been altered.

Minimization of Tampering Risk

Evidence must be stored securely and access should be restricted.

Adherence to Legal Standards

In most jurisdictions, electronic evidence must comply with local procedural law, e.g., the Indian Evidence Act, Federal Rules of Evidence (USA), or EU eIDAS Regulation.

3. Common Chain-of-Custody Issues

Data alteration or corruption during transfer or storage.

Incomplete documentation of handlers or access.

Unauthorized access to evidence prior to submission.

Use of non-standard collection tools that compromise data integrity.

Cloud or third-party storage complications, where the evidence crosses multiple jurisdictions.

Even minor lapses can lead courts to reject evidence or question its credibility, especially in criminal or corporate cases.

4. Case Laws Illustrating Chain-of-Custody Issues

(i) Lorraine v. Markel American Insurance Co., 241 F.R.D. 534 (D. Md. 2007) – USA

Facts: Parties challenged the admissibility of emails and digital records due to questions about storage and handling.

Holding: Court emphasized that authenticity requires clear documentation of custody, including who handled the evidence and how it was preserved.

(ii) State of Maharashtra v. Dr. Praful B. Desai, AIR 2003 SC 40 – India

Facts: Hospital records and digital imaging were challenged in a medical negligence case.

Holding: Supreme Court held that electronic records must have a proper chain of custody, and any tampering or unexplained gaps can affect admissibility.

(iii) United States v. Safavian, 435 F. Supp. 2d 36 (D.D.C. 2006) – USA

Facts: Emails and computer files were central to a government fraud investigation.

Holding: Evidence admitted only after verifying the unbroken chain from original server to court submission. Court highlighted the importance of documenting every access point.

(iv) Anvar P.V. v. P.K. Basheer, (2014) 10 SCC 473 – India

Facts: WhatsApp messages and emails were submitted as evidence in a civil dispute.

Holding: Supreme Court emphasized that electronic evidence must be authenticated under Section 65B of the Indian Evidence Act, which includes proving the chain of custody and integrity.

(v) State v. Allen, 930 P.2d 986 (Wash. 1997) – USA

Facts: Digital video recordings from a police body camera were contested.

Holding: Court ruled that failure to document handling or access can undermine admissibility, stressing proper preservation, logging, and hash verification.

(vi) European Court of Justice – Tele2 Sverige AB v. Post-och telestyrelsen, C-203/15

Facts: Dispute over retention of electronic communications and their use as evidence.

Holding: ECJ highlighted that cross-border digital data requires rigorous documentation and chain-of-custody practices to meet admissibility standards in EU law.

5. Practical Measures to Maintain Chain of Custody in Electronic Evidence

Use write-protected devices for copying data.

Maintain detailed logs of every access, transfer, or duplication.

Apply hashing or cryptographic signatures to detect tampering.

Store backups securely, preferably with restricted physical and digital access.

Document metadata (timestamps, authorship, file properties) to establish authenticity.

Follow jurisdiction-specific rules for admissibility (e.g., Section 65B in India, Federal Rules of Evidence in the USA).

6. Conclusion

Chain-of-custody issues are crucial for the admissibility and credibility of electronic evidence. Courts globally have consistently ruled that:

Lapses in custody or documentation can render evidence inadmissible.

Proper preservation, logging, and authentication ensure reliability.

Statutory and procedural rules supplement practical measures, making chain-of-custody a legal and technical necessity in modern litigation.

LEAVE A COMMENT