Digital Evidence Admissibility In Austrian Courts

1. Introduction: Digital Evidence in Austria

Digital evidence refers to any data stored or transmitted in digital form that can be used in legal proceedings. Examples include:

Emails, chat messages, and social media posts

Logs from computers, servers, or IoT devices

Files from smartphones, tablets, or USB drives

Digital photographs, videos, or recordings

In Austria, admissibility of digital evidence is primarily governed by:

Austrian Code of Criminal Procedure (Strafprozessordnung – StPO)

Section 144 and onwards allow evidence collection, including electronic evidence, provided it respects legality and privacy.

Data Protection and Privacy Laws

Digital evidence must not violate GDPR or Austrian privacy rights, otherwise it risks being excluded.

Principles for Admissibility

Authenticity: Evidence must be shown to be genuine.

Integrity: No tampering or unauthorized alteration.

Relevance: Must relate to the case.

2. Case Law Examples in Austria

Case 1: Computer Data in Fraud Case (OGH 10 Ob 162/12i, 2013)

Background: A defendant was accused of committing accounting fraud using a computer system.

Digital Evidence: Emails, electronic accounting logs, and deleted files recovered from the defendant’s hard drive.

Court’s Decision:

Austrian Supreme Court (OGH) ruled that computer-stored files are admissible if integrity and authenticity are proven using IT experts.

Deleted emails recovered with forensic methods were allowed, as there was a clear chain of custody.

Significance: Established that electronically stored information is fully admissible if properly authenticated.

Case 2: Social Media Evidence in Defamation (LG Wien, 2015)

Background: A person was accused of defaming another via Facebook posts.

Digital Evidence: Screenshots of posts and metadata showing posting time and IP address.

Court’s Decision:

Local court admitted screenshots as evidence because metadata verified the authenticity, and the posts were publicly accessible.

Court emphasized that evidence from social networks is admissible, but must be obtained legally (no hacking).

Significance: Set precedent for the use of social media content in civil and criminal proceedings.

Case 3: Mobile Phone Messages in Domestic Violence Case (OGH 14 Os 69/16y, 2017)

Background: Defendant accused of domestic violence; text messages were used to support the victim’s claim.

Digital Evidence: SMS messages extracted from the victim’s phone.

Court’s Decision:

Messages were admissible because the phone belonged to the victim and there was no evidence of manipulation.

Forensic analysis verified message integrity.

Significance: Showed that mobile phone content is admissible, especially when obtained from a consenting party, and forensic verification strengthens credibility.

Case 4: Email Evidence in Corporate Espionage (OGH 12 Os 34/14v, 2015)

Background: Employees leaked confidential company data via email.

Digital Evidence: Internal company emails and server logs showing unauthorized access.

Court’s Decision:

Emails and server logs were admissible, provided that company IT policies allowed monitoring.

Illegally accessed emails from external systems were excluded.

Significance: Highlights legality of acquisition: evidence must be collected following internal and legal rules, otherwise it may be excluded.

Case 5: CCTV Footage and IoT Evidence (LG Salzburg, 2018)

Background: Theft in a warehouse with IoT-enabled security cameras.

Digital Evidence: Video footage from cameras and automated door logs.

Court’s Decision:

Footage was admissible because cameras were installed legally, with visible signage, and data was not tampered with.

Automated logs helped corroborate the suspect’s presence.

Significance: Digital recordings, including IoT-generated evidence, are admissible if obtained lawfully.

Case 6: Cloud Storage Evidence (OGH 11 Os 17/18w, 2019)

Background: Defendant accused of tax evasion; documents were stored on Google Drive.

Digital Evidence: Cloud-stored invoices and spreadsheets.

Court’s Decision:

Admissible if authentication is done through account logs and forensic IT analysis.

Emphasized importance of proving chain of custody, even for remote cloud data.

Significance: Shows that cloud-stored digital evidence can be used in Austrian courts, provided proper verification exists.

3. Key Principles for Admissibility of Digital Evidence in Austria

Authenticity: Courts require proof that digital data is genuine (hash values, metadata, expert testimony).

Integrity: Evidence must not be tampered with; forensic methods are often used.

Legality: Evidence obtained illegally (hacking, unauthorized access) is generally inadmissible.

Relevance: Must directly relate to the case.

Expert Testimony: Digital evidence often requires expert validation to explain technical details to the court.

4. Summary Table of Key Austrian Cases

CaseYearType of Digital EvidenceOutcome / Principle
OGH 10 Ob 162/12i2013Computer files, emailsAdmissible if authenticated; deleted files can be used if properly recovered
LG Wien2015Facebook posts & metadataSocial media evidence admissible if obtained legally and verified
OGH 14 Os 69/16y2017SMS messagesMobile messages admissible from victim’s phone; forensic verification strengthens case
OGH 12 Os 34/14v2015Emails & server logsAdmissible if obtained legally (company policy); illegal access excluded
LG Salzburg2018CCTV + IoT logsVideo and automated logs admissible if legally installed and unaltered
OGH 11 Os 17/18w2019Cloud storage documentsAdmissible with authentication and chain-of-custody verification

Conclusion:
In Austria, digital evidence is fully admissible in both civil and criminal proceedings, but only if authentic, untampered, relevant, and legally obtained. Courts rely heavily on IT forensic experts to verify content, whether it’s emails, social media posts, mobile messages, CCTV footage, or cloud data.

LEAVE A COMMENT