Download as pdf or txt
Download as pdf or txt
You are on page 1of 5

DATE DOWNLOADED: Wed Feb 16 15:45:32 2022

SOURCE: Content Downloaded from HeinOnline

Citations:

Bluebook 21st ed.


Paul W. Grimm, New Evidence Rules and Artificial Intelligence, 45 LITIGATION 6
(2018).

ALWD 7th ed.


Paul W. Grimm, New Evidence Rules and Artificial Intelligence, 45 Litigation 6
(2018).

APA 7th ed.


Grimm, P. W. (2018). New Evidence Rules and Artificial Intelligence. Litigation,
45(1), 6-9.

Chicago 17th ed.


Paul W. Grimm, "New Evidence Rules and Artificial Intelligence," Litigation 45, no. 1
(Fall 2018): 6-9

McGill Guide 9th ed.


Paul W. Grimm, "New Evidence Rules and Artificial Intelligence" (2018) 45:1
Litigation 6.

AGLC 4th ed.


Paul W. Grimm, 'New Evidence Rules and Artificial Intelligence' (2018) 45 Litigation
6.

MLA 8th ed.


Grimm, Paul W. "New Evidence Rules and Artificial Intelligence." Litigation, vol. 45,
no. 1, Fall 2018, p. 6-9. HeinOnline.

OSCOLA 4th ed.


Paul W. Grimm, 'New Evidence Rules and Artificial Intelligence' (2018) 45 Litigation
6

Provided by:
Universidade da Coruna

-- Your use of this HeinOnline PDF indicates your acceptance of HeinOnline's Terms and
Conditions of the license agreement available at
https://heinonline.org/HOL/License
-- The search text of this PDF is generated from uncorrected OCR text.
-- To obtain permission to use this article beyond the scope of your license, please use:
Copyright Information
about not only how they do their jobs, but
also their interests, hobbies, use of lan-
guage, and mannerisms.
From the Bench Then, using a computer program that
incorporates an artificial intelligence (AI)
NEW EVIDENCE RULES algorithm, WorkerMatch analyzes the re-
cordings of the high-performing Digital
A ND A RTIFICIA L employees and develops an online ques-
tionnaire tailored to the needs of the par-
INTELLIGENCE ticular Digital job vacancy. All job appli-
cants must complete the questionnaire;
those who score well then participate in
an online video-recorded interview.
Again using the AI algorithm software,
H O N . PA U L W. G R I M M
WorkerMatch compares the applicants’
questionnaire responses and online inter-
The author is a U.S. district judge in the District of Maryland.
view results against the results of ques-
tionnaire responses and recorded inter-
views of Digital’s top performers. The
software then prepares a rank-ordered
list of the 10 most qualified candidates.
Digital engaged WorkerMatch to help fill
the vacancy for which Jane applied. Digital’s
human resources director and vice presi-
dent of programming reviewed the list of
the top 10 candidates that WorkerMatch
Imagine this situation: Jane Jones ap- demonstrably better qualified than Slacker provided and selected the top 5 for personal
plied for a senior programmer vacancy and that by giving the job to him, Digital interviews. Slacker was ranked number 2,
advertised by Digital Solutions Inc. Her discriminated against her on the basis of Jane number 9.
résumé boasts undergraduate and gradu- her gender. Because Jane wasn’t in the top 5, she was
ate degrees in computer science, 15 years Digital vehemently denies that dis- not interviewed in person. Slacker occupied
of successful programming experience crimination played a role in Slacker’s the number 2 spot—he interviewed in per-
in a series of increasingly demanding selection and asserts that despite her son and was the clear choice of the majority
programming jobs, and annual job per- more impressive résumé, Jane was the of the Digital hiring team. So he got the job.
formance evaluations of “always exceeds lesser-qualified candidate. In support of To support its defense, Digital has pro-
expectations” or better. its defense, Digital disclosed during dis- duced copies of the job candidate analy-
The job went to Bill “Slacker” Bailey covery that it retains a company by the sis done by WorkerMatch. Those records
instead of Jane. His résumé shows that name of WorkerMatch to help it find the corroborate Digital’s explanation of how
he took various computer-related cours- best candidate for each of its job openings. Slacker was picked over Jane. But during
es for two years at a community college, According to Digital, WorkerMatch has a Rule 30(b)(6) deposition of Digital’s
but never obtained an associate degree, developed a computer analytics method of corporate designee—its human resources
and gained five years of job experience identifying the most qualified applicants director—Digital was unable to provide
as a tech-support specialist at a local for any particular job vacancy. any details about how WorkerMatch’s AI
big-box electronics store and another 10 Here is how it works: WorkerMatch analytics worked, explaining that it relied
years as the founder of “HakkersPlace,” asks Digital to identify the top-performing on WorkerMatch to develop the selection
an online blog devoted to computers and employees doing the same type of work as process. Digital added, however, that since
programming. is required for the job vacancy. Then, for using WorkerMatch, all the employees
Jane filed a Title VII gender discrimi- a time, it digitally monitors how they per- hired were doing a terrific job.
nation case against Digital in federal court. form their jobs. Next, the employees par- In its court filings, Digital has
The essence of her claim is that she is ticipate in a far-ranging online interview argued that it cannot be liable for

6 L I T I G AT I O N
intentional gender discrimination be- That could be difficult, not to mention “extrinsic evidence”—read: “witnesses”—to
cause the selection process was designed expensive. The users of AI software cre- authenticate the evidence, then it comes
by WorkerMatch’s computer analysis, not ated by others likely do not have direct in on its own. And that is when the po-
by anyone at Digital, and that an inani- control over the availability of the witness tential savings in time and expense can
mate computer cannot form discrimina- (or witnesses) who developed the com- be considerable.
tory intent. In response, Jane’s attorneys puter program. Is there any alternative Rule 902(13), “Certified Records
filed a motion in limine to exclude the to requiring live testimony in every case Generated by an Electronic Process or
documents generated by WorkerMatch, in which computer analysis underlies the System,” provides:
arguing that Digital cannot prove how the process that is central to the key issue in
AI algorithm used by WorkerMatch func- the case? A record generated by an electronic
tions and therefore cannot show that the process or system that produces an ac-
software was not programmed to make curate result, as shown by a certifica-
gender discriminatory selections. Two New Evidence Rules tion of a qualified person that complies
The hearing on the motion in limine is As of December 1, 2017, the answer is yes! with the certification requirements of
only a week away. How is Digital to over- This is because two new federal rules of Rule 902(11) or (12) [is self-authenti-
come Jane’s challenge to the admissibility evidence became effective on that date— cating]. The proponent must also meet
of the records generated by WorkerMatch Rule 902(13), covering certified records the notice requirements of Rule 902(11).
regarding the hiring of Slacker over Jane? generated by an electronic process or [Rules 902(11) and 902(12) permit the
If you think this hypothetical is far- system, and Rule 902(14), covering certi- self-authentication of certified copies
fetched, think again. As it happens, AI fied data copied from an electronic device, of domestic and foreign business
analytics already is being used by com- storage medium, or file. records.]
panies to make employment decisions.
See, e.g., Stephen Buranyi, Rise of the Rule 902(14), “Certified Data Copied
Racist Robots—How AI Is Learning All These new rules may from an Electronic Device, Storage
Our Worst Impulses, Guardian, Aug. 8, Medium, or File,” states:
2017, www.theguardian.com/inequality/ greatly facilitate
2017/aug/08/rise- of-the-racist-ro - Data copied from an electronic device,
bots-how-ai-is-learning-all-our-worst- the authentication storage medium, or file, if authenticat-
impulses; Daniel Newman, Your ed by a process of digital identification,
Artificial Intelligence Is Not Bias-Free,
Forbes, Sept. 12, 2017, www.forbes.
of electronically as shown by a certification of a quali-
fied person that complies with the cer-
com/sites/danielnewman/2017/09/12/ generated evidence in tification requirements of Rule 902(11)
your-artificial-intelligence-is-not- or (12) [is self-authenticating]. The pro-
bias-free/#1a3f331cc783; Josh Constine, federal cases. ponent also must meet the notice re-
Pymetrics Attacks Discrimination quirements of Rule 902(11).
in Hiring with AI and Recruiting
Games, Tech Crunch, Sept. 20, 2017, These new rules may greatly facili- The 2017 advisory committee note
https://techcrunch.com/2017/09/20/ tate the authentication of electronically to Rule 902(13) explains its purpose
unbiased-hiring/. generated evidence in federal cases. And succinctly:
This has raised concern about whether because digital information increasingly
computer programs using AI to make hir- plays an important role in both civil and The amendment sets forth a procedure
ing selections have discriminatory crite- criminal cases, lawyers need to know by which parties can authenticate cer-
ria embedded within them. When faced about them and how to use them. tain electronic evidence other than
with evidentiary challenges to decisions Both are located in Federal Rule of through the testimony of a foundation
based on AI analysis that was not devel- Evidence 902, which sets out examples witness. As with the provisions on busi-
oped by the hiring company, how can the of evidence that is self-authenticating— ness records in Rules 902(11) and (12),
hiring company prove that the methodol- meaning that “they require no extrinsic the Committee has found that the ex-
ogy used is reliable? Must it produce the evidence of authenticity in order to be pense and inconvenience of producing
developer of the AI program as a witness admitted.” This is vital to understand- a witness to authenticate an item
at a hearing or trial? ing their importance. If you do not need of electronic evidence is often

VO L 45 | N O 1 | FA L L 201 8 7
unnecessary. It is often the case that a by a witness at trial. If the certification adversary notify her of any intent to chal-
party goes to the expense of producing provides information that would be in- lenge the sufficiency of the certification by
an authentication witness, and then the sufficient to authenticate the record if a reasonable date in advance of the hear-
adversary either stipulates authenticity the certifying person testified, then au- ing or trial. If opposing counsel does not
before the witness is called or fails to thenticity is not established under this agree to do so, ask the court to impose a
challenge the authentication testimony Rule. The Rule specifically allows the deadline for notice of any challenge.
once it is presented. The amendment authenticity foundation that satisfies While Rule 902(13) focuses on records
provides a procedure under which the Rule 901(b)(9) to be established by a generated by an electronic process or sys-
parties can determine in advance of certification rather than the testimony tem, Rule 902(14) focuses more narrowly
trial whether a real challenge to au- of a live witness. on data copied from an electronic device,
thenticity will be made, and can then storage medium, or file. But the obser-
plan accordingly. vant reader will detect a certain overlap
Using the Rules between the two. After all, aren’t copies
Rule 902(13) has several important So, if you want to take advantage of Rule of records produced by an electronic sys-
features. First, while it satisfies the au- 902(13), you will need to carefully con- tem or process also data copied from an
thentication requirement of Rule 901(a), sider who must make the certification electronic device?
it does not address other potential eviden- (which may require more than one per- Why the overlap? One commentary on
tiary issues such as hearsay or the original son) and carefully draft it to ensure that the new rules explains it this way:
writing rule. See Paul W. Grimm, Daniel J. it is as comprehensive as the testimony
Capra & Gregory J. Joseph, Authenticating that would have to be offered at trial to It should be noted that there is an over-
Digital Evidence, 69 Baylor L. Rev. 1, 40 meet the authentication requirement. “A lap in the two provisions. When data is
(2017) (“[A] certification under the pro- declaration that satisfies 28 U.S.C. § 1746 copied from an electronic device, the
posed rules can establish only that the would satisfy the declaration requirement result is a record (i.e., the copy) that is
proffered item has satisfied the admis- . . . as would any comparable certification ordinarily generated by an electronic
sibility requirements for authenticity. So under oath.” Fed. R. Evid. 902(11) advi- process (because the copy is generated
the opponent remains free to object to ad- sory committee note (2000). electronically). So it is true that the
missibility on other grounds. . . .” (empha- Third, Rule 903(13) requires that ad- electronic information that is covered
sis in original)). But because the greatest versaries be given the same notice re- by Rule 902(14) could also for the most
challenge to digital evidence tends to be quired by Rule 902(11) and (12). That part (but not completely) be covered
authentication (id.), the benefits the rule means that “[b]efore the trial or hearing, by Rule 902(13). The overlap does not
provides are substantial. the proponent must give an adverse par- run very far the other way, however;
Second, the required certification ty reasonable written notice of the intent that is, records generated by an elec-
must be substantive, not boilerplate. That to offer the record—and must make the tronic system may well not be a “copy”
means the person making the certification record and certification available for in- of anything. The Advisory Committee
must meet the Rule 602 personal knowl- spection—so that the party has a fair op- had a good reason for proposing a sepa-
edge requirements; the Rule 702 scien- portunity to challenge them.” Fed. R. Evid. rate subdivision for copies of electronic
tific, technical, or specialized knowledge 902(11) (2017). data, because the process of authenti-
requirements; and the Rule 901(b)(9) re- The rule is silent about how much ad- cating a copy—usually through hash
quirements to explain how the process vance notice must be given, but it must value—is unique and specific. Rule
or system that generated the electronic be reasonable, so it is unwise to wait un- 902(14) is in large part directed to a
record produces reliable and accurate til the last minute to do so. Rule 902(11) fairly specific problem—cloning hard
results. does not impose any duty on the party that drives and offering the clone rather
As the 2017 advisory committee note receives a certification under 902(13) or than the original, through a hash value
cautions, (14) to reciprocate by providing reason- match. The process of authenticating
able notice to the proponent of its objec- machine-generated evidence more
[a] proponent establishing authenticity tion to the sufficiency of the certification, broadly can be satisfied by a number of
under this Rule must present a certifi- so prudent counsel will want to make sure different methods. Put another way,
cation containing information that that she provides as much advance notice the copying processes that serve for
would be sufficient to establish authen- of the 902(13) or (14) certification as is authentication under Rule 902(14) do
ticity were that information provided reasonably possible and request that her only one thing—assuring that there is

8 L I T I G AT I O N
no change between the copy and the storage medium, or file are identical to could by affidavit authenticate or pro-
original. the original. vide a copy of an otherwise admissible
So, for example, you could use Rule record” for introduction into evidence
Grimm et al., Authenticating Digital 902(13) to prove that a USB drive device in a criminal case without running afoul
Evidence, supra, at 40–41. was connected to a computer (Grimm et of the Confrontation Clause. 557 U.S. 305,
The advisory committee explained the al., Authenticating Digital Evidence, supra, 322–23 (2009).
justification for Rule 902(14) this way: at 42–43); that a server was used to con- That language, colloquially referred to
nect to a webpage (id. at 43–44); where a as “the Melendez-Diaz carve out”—Grimm
Today, data copied from electronic de- person was at the time that a digital pho- et al., Authenticating Digital Evidence, su-
vices, storage media, and electronic tograph was taken using his smart phone pra, at 47–48—“has been relied on by every
files are ordinarily authenticated by (using the GPS coordinates recorded by circuit court that has evaluated the ad-
“hash value.” A hash value is a number the phone on the photograph) (id. at 44); missibility of certificates offered under
that is often represented as a sequence that there is an association between or Rule 902(11) to provide the foundation
of characters and is produced by an al- that there has been contact between vari- for and to authenticate business records
gorithm based upon the digital con- ous individuals (through text message logs) under the hearsay exception . . . [of ] Rule
tents of a drive, medium, or file. If the (id. at 44–45); and, for purposes of the hy- 803(6)” to rule that the certificates do not
hash values for the original and copy pothetical that appears at the start of this violate the Confrontation Clause. See id.
are different, then the copy is not iden- article, that the AI algorithm used to rank at 48 (citing cases).
tical to the original. If the hash values the qualifications of the applicants for the And because Rules 902(13) and (14) re-
for the original and copy are the same, job that Jane and Slacker applied for had quire the exact same type of certificates
it is highly improbable that the origi- the ability to select the most qualified ap- as Rule 902(11), it is quite likely that their
nal and copy are not identical. Thus, plicant without any gender-based bias. use in a criminal case also would survive a
identical hash values for the original Given the ubiquity of the use of digital Confrontation Clause challenge. Id. That
and copy reliably attest to the fact that devices in all aspects of human activity, said, until the circuit courts actually
they are exact duplicates. This amend- the list of potential uses of Rule 902(13) have ruled this way, a prudent prosecu-
ment allows self-authentication by a is as infinite as the uses of digital technol- tor would be wise to file a pretrial mo-
certification of a qualified person that ogy itself. As Rule 902(14) is narrower in tion in limine to secure an advance ruling
she checked the hash value of the prof- scope, its most frequent use likely will be to this effect before assuming away any
fered item and that it was identical to to prove that the contents of a forensic im- Confrontation Clause concerns regard-
the original. The rule is flexible age made of the hard drive of a computer ing the use of Rules 902(13) and (14) in a
enough to allow certifications through or cell phone is identical to the contents criminal trial.
processes other than comparison of of the computer or phone from which the As with any new rules of evidence, it
hash value, including by other reliable image was made. Id. at 45–46. will take some time for the usefulness of
means of identification provided by The narrower scope of Rule 902(14) in Rules 902(13) and (14) to take effect. And
future technology. no way diminishes its importance, how- keep in mind that, while useful, their im-
ever, because evidence taken from fo- pact is modest. “They provide an easier
Fed. R. Evid. 902(14) advisory committee rensic images of digital devices is intro- method to authenticate but they do not
note (2017). duced all the time in both criminal and reduce the standards of authentication.”
civil cases. And in criminal cases, the use Id. at 40 (emphasis in original).
of Rules 902(13) and (14) could implicate And they satisfy only the requirement
The Distinction Between the the Confrontation Clause because the cer- of Rule 901(a) that non-testimonial evi-
Rules tifications required by the rules would ap- dence be authenticated before it is admis-
The essential distinction between Rule pear to be “testimonial,” as they clearly sible. They do not satisfy any other evi-
902(13) and Rule 902(14) is this: 902(13) contemplate use at a trial. dentiary foundation that may be required.
is likely to be the “utility player” govern- In Melendez-Diaz v. Massachusetts, But inasmuch as the chief problem as-
ing a wide range of situations in which however, the majority opinion noted that sociated with admissibility of digital in-
machine-generated evidence is offered at common law, “a clerk’s certificate au- formation tends to be its authentication,
into evidence, while Rule 902(14) more thenticating an official record—or a copy the modest helping hand offered by Rules
narrowly focuses on how to demonstrate thereof—for use as evidence” traditionally 902(13) and (14) promises to be very use-
that data copied from an electronic device, was admissible, meaning that “[a] clerk ful indeed. q

VO L 45 | N O 1 | FA L L 201 8 9

You might also like