SlideShare a Scribd company logo
1 of 28
LAW OF EVIDENCE
DIGITAL EVIDENCE ADMISSIBILITY
FOR LEGAL PROCEEDINGS IN
MALAYSIA
A PRESENTATION BY :
S E LVA K U MA R B A L A K R I S H N A N
MASTER OF CRIMINAL JUSTICE
C O N TEN TS
• INTRODUCTION
• DOCUMENTARY EVIDENCE
• DOCUMENT PRODUCED BY COMPUTER
• ADMISSIBILITY OF THE EVIDENCE
• CHALLENGES ON THE ADMISSIBILITY OF COMPUTER GENERATED EVIDENCE
• DIGITAL FORENSIC EXPERT
• CONCLUSION
I N T R O D U C T I O N
• Technology advancement has driven the utilization of digital evidence during legal
proceedings in the court.
• Digital Evidence also categorized as Electronic/Computer Evidence, Computer
associated evidence and Computer generated Evidence. Example of Digital Evidence
are Computer, Photograph, Mobile Phones, Tablets/I pads. GPS Devices, Computer Hard
Drives and so on.
• Data/Evidence obtained can prove crucial to the outcome in all forms of criminal
activities as well as for cases such as Homicide, Rape, Breach of trust, Conspiracy,
Murder, Drug Trafficking and etc.
I N T R O D U C T I O N
(CONT)
• For evidence to be deemed admissible, it must be obtained with reasonable and
least intrusive means so that it’s physical characteristics abides by the rules of
digital evidence.
DOCUMENTARY EVIDENCE
 Under Section 3 of the Evidence Act 1950, Document is defined as:
• “document” means any matter expressed, described, or howsoever represented,
upon any substance, material, thing or article, including any matter embodied in
a disc, tape, film, sound-track or other device whatsoever, by means of—
• (a) letters, figures, marks, symbols, signals, signs, or other forms of expression,
description, or representation whatsoever;
• (b) any visual recording (whether of still or moving images);
• (c) any sound recording, or any electronic, magnetic, mechanical or other
recording whatsoever and howsoever made, or any sounds, electronic impulses,
or other data whatsoever;
• (d) a recording, or transmission, over a distance of any matter by any, or any
combination, of the means mentioned in paragraph (a), (b) or (c),
DOCUMENTARY EVIDENCE
(CONT)
• or by more than one of the means mentioned in paragraphs (a), (b), (c) and (d),
intended to be used or which may be used for the purpose of expressing,
describing, or howsoever representing, that matter;
 Further, computer is defined as:
• “computer” means an electronic, magnetic, optical, electrochemical, or other
data processing device, or a group of such interconnected or related devices,
performing logical, arithmetic, storage and display functions, and includes any
data storage facility or communications facility directly related to or operating
in conjunction with such device or group of such interconnected or related
devices, but does not include an automated typewriter or typesetter, or a
portable hand held calculator or other similar device which is non-programmable
or which does not contain any data storage facility;
DOCUMENT PRODUCED BY A
COMPUTER
• Document generated by a computer and statement contained in particular is
admissible under section 90A, 90B and 90C of the Evidence Act 1950.
• Section 90A  sets the requirements for admissibility and proof
• Section 90B  deals with the probative value to be attached to the evidence
• Section 90C  stipulates that the provisions of Section 90A and 90B shall prevail
over any other provisions in any other statues
• All these Sections [90A,90B,90C] are applicable to criminal and civil proceedings.
• Section 90A,90B and 90C are considered as exceptions to the hearsay rule because
the computer-generated are admissible in Malaysia courts without requiring
testimony from the original maker of the documents over the content of the
documents.
ADMISSIBILITY OF THE EVIDENCE
• Digital Evidence obtained is legally admissible when it is presented to prove the
facts of a case.
• The court will determine whether the rendered evidence is relevant, reliable and
authentic to the disputed facts of the case in proceedings.
• If a doubt arises, the evidence in a criminal trial will be excluded as it needs to
be proven beyond a reasonable doubt.
• In practice, admissibility is a set of legal tests carried out by a judge to assess an
item of evidence according to the following criteria.
ADMISSIBILITY OF THE EVIDENCE
(CONT)
 Relevance and Reliability
• Traces of tampering, deletion or other changes over the digital evidence should be
examined. The content of digital data involved and the process through which it
was made must produce accurate and relevant results.
 Authenticity of evidence
• The evidence that was acquired from a particular system or location should satisfy
the court. A precise and complete copy of digital evidence is required. The
evidence should be preserved and unchanged from when it was collected.
• For an example, when a Digital Forensic Analyst seized a hard drive from a crime
spot, he/she need to make a copy of the hard drive using computer forensic tools
like EnCase, Forensic Tool Kit, DEFT Linux and etc.
ADMISSIBILITY OF THE EVIDENCE
(CONT)
• Before copying the seized hard drive, the seized hard drive need to be
connected to a forensic disk controller or hardware write-block device to gain
read-only access to computer hard drives without the risk of damaging the
drive's contents.
 Copy of the hard drive is required for
• To prevent damage/tampering of the original content [the source of evidence]
in the hard drive
• Analysis/Investigation purpose
CHALLENGES ON THE ADMISSSIBILITY OF
COMPUTER GENERATED EVIDENCE
• Case Study 1  Gnanasegaran a/l Pararajasingam v Public Prosecutor [1997]
• Case Study 2  Bank Bumiputra Malaysia Berhad v Emas Bestari Sdn Bhd & Anor [2014]
• Case Study 3  Hanafi bin Mat Hassan v Public Prosecutor [2006]
• Case Study 4  Ahmad Najib bin Aris v Public Prosecutor [2009]
• Case Study 5  PP v Goh Hoe Cheong & Anor [2006]
CHALLENGES ON THE ADMISSSIBILITY OF
COMPUTER GENERATED EVIDENCE (CONT)
Case Study 1: Gnanasegaran a/l Pararajasingam v Public Prosecutor [1997]
• Gnanasegaran a/l Pararajasingam v Public Prosecutor [1997] was of the early
cases where direction was sought from the court of appeal on the admissibility
and probative value of computer generated documents.
• The appellant argued the computer print out evidence was inadmissible because
Section 90A required that a certificate had to be produced to authenticate the
computer records.
• Shaik Daud Ismail JCA further clarified that there were two ways of proving ‘in
the course of its ordinary use’
CHALLENGES ON THE ADMISSSIBILITY OF
COMPUTER GENERATED EVIDENCE (CONT)
• (I) it may be proved by the production of the certificate as required by sub-s.
(2). – This is permissive and not mandatory. This can also be seen in sub-s. (4)
which begins with the words 'Where’ a certificate is given under sub-s. (2)…..
• (II) calling the maker of the document
• In this case, a certificate is not required to be produced as the bank officer was
able to testify with regard to the documents because he was in charge of the
operation of current accounts. Thus, the appeal was dismissed.
CHALLENGES ON THE ADMISSSIBILITY OF
COMPUTER GENERATED EVIDENCE (CONT)
Case Study 2: Bank Bumiputra Malaysia Berhad v Emas Bestari Sdn Bhd & Anor [2014]
• In cases where computer-based evidence is tendered in court, failure to
procedure the certificate might even end up as evidence inadmissible as the
evidence is lack of authenticity.
• An example is shown in the case of Bank Bumiputra Malaysia Berhad v Emas
Bestari Sdn Bhd & Anor [2014]
• The computer-based document at issue was an exhibit of a bank statement
showing the defendant had paid instalments to the financing centre even after
the disbursement. In this situation, the court reigned such statement was
inadmissible due to unavailability of related certificate by the bank officer who
made the statement.
CHALLENGES ON THE ADMISSSIBILITY OF
COMPUTER GENERATED EVIDENCE (CONT)
Case Study 3: Hanafi bin Mat Hassan v Public Prosecutor [2006]
• In this case, the prosecutor provided the bus ticket as a proof but the defense
argued that the proof which was presented was inadmissible.
• The defense argued that the ticket generated by a ticket machine is a digital
record and will be considered as inadmissible if the prosecution fails to tender a
certificate and a review of the DNA profiling of the semen which is additionally a
digital record where it is inadmissible for failure to comply with Section 90A.
• However, in deciding the court had waived the necessity to tender the certificate
needed under Section 90A [2] when submitted evidence demonstrates the ticket
machine was a computer while the bus ticket was generated by the ticket
machine during the ordinary course of the business.
CHALLENGES ON THE ADMISSSIBILITY OF
COMPUTER GENERATED EVIDENCE (CONT)
• Even if the witness failed to provide evidence, the assumption in Section 90A [6]
was sufficient to determine the latter element to indicate that the ticket was
issued in the ordinary course by the machine.
• All the digital evidence presented by the defense have been acknowledged and
accepted in this case.
CHALLENGES ON THE ADMISSSIBILITY OF
COMPUTER GENERATED EVIDENCE (CONT)
Case Study 4: Ahmad Najib bin Aris v Public Prosecutor [2009]
• In Ahmad Najib Bin Aris v Public Prosecutor [2009], Both chemist’s report and
CCTV recording were accepted [no certificate has been issued] as it has been
generated by a computer. Federal court stated there were two ways of
submitting and providing the documents generated by a computer according to
Section 90A [1] in conjunction with supporting Gnanasegaran and Hanafi.
• The chemist’s report was accepted based on extensive oral evidence in the
course of its regular use and preservation as stated in Section 90A [3] and
Section 90A [4]. However, the recordings of the CCTV were denied because there
was neither a certificate nor oral evidence about its operation.
CHALLENGES ON THE ADMISSSIBILITY OF
COMPUTER GENERATED EVIDENCE (CONT)
• This is due to the general rule as established that the ‘computer’ generated
evidence can be derived either using a certificate establishment of the ‘course
of ordinary use’ and the proper functioning of the device or using direct oral
evidence attesting to the same requirements.
• In the event of failure to meet any of the conditions, the recordings of the CCTV
were adhered to be inadmissible.
CHALLENGES ON THE ADMISSSIBILITY OF
COMPUTER GENERATED EVIDENCE (CONT)
Case Study 5: PP v Goh Hoe Cheong & Anor [2006]
• The prosecution ineffectively sought to present evidence in the form of digitally
generated check-in baggage tags.
• The judge determined that the electronic baggage tags will not be accepted as
evidence due to absence of both oral evidence and any certificate under Section
90A [1] for establishing the chain of custody and control of the checked-in bags.
• Consequently, the prosecution failed to prove the allegations against the
offender.
DIGITAL FORENSIC EXPERT
• Malaysia court agrees that oral testimony and certificate submission are two ways of
authenticating digital evidence, but that methods are not adequate to ensure the
credibility and originality of digital evidence submitted.
• Apart from presenting maker or witness to the court to authenticate digital evidence
submitted, another authentication method used in court is by getting an expert opinion
from digital forensics experts.
• Under section 45 of the Evidence Act, the expert opinion rule is applicable where the
evidence obtained requires a computer forensic specialist to validate it rather than
calling a maker or a witness before the trial.
DIGITAL FORENSIC EXPERT
(CONT)
• Although there is no particular provision to cater for digital forensics evidence
admissibility in court, Malaysia court has agreed upon the admissibility of digital
forensics evidence as a form of expert opinion on the condition that expert follows the
rules and procedures during the submission of evidence. The Malaysian court
acknowledges all reports and testimonials from them [Digital Forensic Expert].
• To secure it as authentic content, the court must evaluate the collection, preservation
and discovery of the evidence.
• In Malaysia, Cybersecurity Malaysia agency [consist of digital forensic experts] has been
established under the Malaysian Government to handle digital forensics affairs.
• This experts help to preserve the custody chain in its original and authentic form from
its collection time until it is produced in court.
CONCLUSION
• In a nutshell, Digital Evidence must be authentic to be used as evidence in Malaysia
court of law.
• The provisions of Section 90A of Evidence Act 1950 have facilitated the use of
computer generated evidence.
• However, despite the recent amendments to the Evidence Act in 2012, It is noted
that the legislature has not seen the need to amend the term “computer” to
electronic or digital. As such questions of whether documents from particular
equipment are computer generated will continue to emerge.
• This is because technology has been evolving in a fast manner and there might be
more complicated cases in future. Thus, the laws need to be reviewed over time
and updated with certain modification if needed.
REFERENCES
• Mohamed, D., & Ramlee, Z. (2013). Cases of electronic evidence in Malaysian courts: the civil and Syariah perspective.
• Brett Shavers, in Placing the Suspect Behind the Keyboard, 2013 EvidenceAct 1950 (Act 56)
• Anushia Kandasivam (2016, October 11).Understanding Digital Evidence in Malaysian Courts. Retrieved from
https://www.digitalnewsasia.com/digital-economy/understanding-digital-evidence-malaysian-courts
• [2015] 1 MLJ 617
• [2013] 5 MLJ 867
• Malayan Law Journal Articles/2013/Volume 3/Computer Evidence in Malaysia: Where are We?
• Christine Sgarlata, Chung and David J Byer, 'The Electronic Paper Trail: Evidentiary Obstacles to Discovery and
Admission electronic Evidence', 4 BU J SCI & TECH L 5, 22 September 1998
• [1937] MLJ 38
• [1975] 2 MLJ 106
REFERENCES (CONT)
• Paul Hartman (1965). IllegallyObtained Evidence in the USA.
• [1975] 1 All ER 70
• Brenner, Susan W. (2005). US digital evidence: Simulations and animations, Computer and Telecommunications Law Review 2005
(C.T.L.R. 2005, 11(2), 38-39).
• Paul,Augustine. (2004). Evidence: Practice and procedure, second edition, Malayan Law Journal quoted in Mohamed, D., &
Ramlee, Z. (2013). Cases of electronic evidence in Malaysian courts: the civil and Syariah perspective.
• [1997] 3 MLJ 1.
• [2014] 1 CLJ 316
• It is not clear what 'good working order' and 'operating properly' means; for a discussion of this problem that is also a problem in
England & Wales, see Stephen Mason, general editor, Electronic Evidence (2nd Ed), LexisNexis Butterworth, 2010, Chapter 5.
• [1996] 3 MLJ 240
• [2009] 2 CLJ 800
REFERENCES (CONT)
• Malaysia, C. L. J. L. (2006, July 28). Bulletin_27_2006. Retrieved May 23, 2020, from
https://www.cljlaw.com/others/clj_bulletin/Bulletin_27_2006.htm?fbclid=IwAR2F4dLlmcHlvwbrpzKhi7Bp1kx5uyr1dGTDBGflM2JU
9Q8zRl6fzhJX9-E
• Charles Ramendran. (2019, November 1). Raped, murdered by a beast. The Sun Daily. Retrieved from
https://www.thesundaily.my/local/raped-murdered-by-a-beast-XY1562462
• Radhakrishna, Gita. (2014). Digital evidence in Malaysia. Digital Evidence and Electronic Signature Law Review. 9.
10.14296/deeslr.v9i0.1987.
• Nurainolmardhiah BintiAbdul Halim, Setra Ginsim and Siti Khadijah Binti Baharuddin. (2015). CASE STUDIES:ADMISSIBILITY OF
DIGITAL RECORDSAS LEGAL EVIDENCE IN MALAYSIA. NationalArchives of Malaysia
• Charles Ramendran. (2019, November 1). Raped, murdered by a beast. The Sun Daily. Retrieved from
https://www.thesundaily.my/local/raped-murdered-by-a-beast-XY1562462
• Dr Duryana Mohamed and Dr Zulfakar Ramlee. (2014). CASES OF ELECTRONIC EVIDENCE IN MALAYSIAN. COURTS: THE CIVILAND
SYARIAH PERSPECTIVE. E-Journal of Social Science Research. No1 (2), page 4.
• Ibid at p 7.
REFERENCES (CONT)
• Mohamad,A. M. (2019).Admissibility and Authenticity of Electronic Evidence in the Courts of Malaysia and United Kingdom.
International Journal of Law, Government and Communication, 4(15), 121-129.
• [2007] 7 CLJ 68
• Sethia,A. (2016). Rethinking admissibility of electronic evidence. International Journal of Law and Information Technology, 24(3),
229-250.
• John C. O’Brien, ‘The Hearsay Within Confrontation’ (2010) Saint Louis University Public Law Review Vol.XXIX:501
• Mohamed, D. (2011). Computer evidence: Issues and challenges in the present and the future. LNS (A) lxvii.
THANK YOU

More Related Content

What's hot

(5) theft
(5) theft(5) theft
(5) theftFAROUQ
 
Writ, service, appearance & judgment in default (2017-2018)
Writ, service, appearance & judgment in default (2017-2018)Writ, service, appearance & judgment in default (2017-2018)
Writ, service, appearance & judgment in default (2017-2018)Intan Muhammad
 
Procedure of appeal from high court to court of appeal
Procedure of appeal from high court to court of appeal Procedure of appeal from high court to court of appeal
Procedure of appeal from high court to court of appeal ilyana iskandar
 
Tee bee case presentation
Tee bee case presentationTee bee case presentation
Tee bee case presentationAnis Amni
 
Karn Woon Lin - Memorandum of Appeal
Karn Woon Lin - Memorandum of AppealKarn Woon Lin - Memorandum of Appeal
Karn Woon Lin - Memorandum of AppealNanthini Rajarethinam
 
EVIDENCE LAW 1(12) judicial notice (pengiktirafan penghakiman)
EVIDENCE LAW 1(12) judicial notice (pengiktirafan penghakiman)EVIDENCE LAW 1(12) judicial notice (pengiktirafan penghakiman)
EVIDENCE LAW 1(12) judicial notice (pengiktirafan penghakiman)Hafizul Mukhlis
 
Modes of commencement : Civil procedure
Modes of commencement : Civil procedureModes of commencement : Civil procedure
Modes of commencement : Civil procedureNur Farhana Ana
 
Appearance and default judgment
Appearance and default judgmentAppearance and default judgment
Appearance and default judgmentNur Farhana Ana
 
Confession under Malaysian Evidence Act 1950
Confession under Malaysian Evidence Act 1950Confession under Malaysian Evidence Act 1950
Confession under Malaysian Evidence Act 1950Intan Muhammad
 
Sunny Ang vs public prosecutor [1966]
Sunny Ang vs public prosecutor [1966]Sunny Ang vs public prosecutor [1966]
Sunny Ang vs public prosecutor [1966]Ikram Abdul Sattar
 
CIVIL PROCEDURE: PROCEDURE OF FILING AN APPEAL FROM SUBORDINATE COURT TO THE ...
CIVIL PROCEDURE: PROCEDURE OF FILING AN APPEAL FROM SUBORDINATE COURT TO THE ...CIVIL PROCEDURE: PROCEDURE OF FILING AN APPEAL FROM SUBORDINATE COURT TO THE ...
CIVIL PROCEDURE: PROCEDURE OF FILING AN APPEAL FROM SUBORDINATE COURT TO THE ...ASMAH CHE WAN
 
Pre trial case management (2017 2018)
Pre trial case management (2017 2018)Pre trial case management (2017 2018)
Pre trial case management (2017 2018)Intan Muhammad
 
Third party proceeding & summary judgement
Third party proceeding & summary judgementThird party proceeding & summary judgement
Third party proceeding & summary judgementASMAH CHE WAN
 
Secret trust
Secret trustSecret trust
Secret trustFAROUQ
 

What's hot (20)

(5) theft
(5) theft(5) theft
(5) theft
 
(5) section 8
(5) section 8(5) section 8
(5) section 8
 
Writ, service, appearance & judgment in default (2017-2018)
Writ, service, appearance & judgment in default (2017-2018)Writ, service, appearance & judgment in default (2017-2018)
Writ, service, appearance & judgment in default (2017-2018)
 
(1) evidence (overview)
(1) evidence (overview)(1) evidence (overview)
(1) evidence (overview)
 
Procedure of appeal from high court to court of appeal
Procedure of appeal from high court to court of appeal Procedure of appeal from high court to court of appeal
Procedure of appeal from high court to court of appeal
 
Tee bee case presentation
Tee bee case presentationTee bee case presentation
Tee bee case presentation
 
Karn Woon Lin - Memorandum of Appeal
Karn Woon Lin - Memorandum of AppealKarn Woon Lin - Memorandum of Appeal
Karn Woon Lin - Memorandum of Appeal
 
EVIDENCE LAW 1(12) judicial notice (pengiktirafan penghakiman)
EVIDENCE LAW 1(12) judicial notice (pengiktirafan penghakiman)EVIDENCE LAW 1(12) judicial notice (pengiktirafan penghakiman)
EVIDENCE LAW 1(12) judicial notice (pengiktirafan penghakiman)
 
Secret trust
Secret trust Secret trust
Secret trust
 
Modes of commencement : Civil procedure
Modes of commencement : Civil procedureModes of commencement : Civil procedure
Modes of commencement : Civil procedure
 
Appearance and default judgment
Appearance and default judgmentAppearance and default judgment
Appearance and default judgment
 
Confession under Malaysian Evidence Act 1950
Confession under Malaysian Evidence Act 1950Confession under Malaysian Evidence Act 1950
Confession under Malaysian Evidence Act 1950
 
Sunny Ang vs public prosecutor [1966]
Sunny Ang vs public prosecutor [1966]Sunny Ang vs public prosecutor [1966]
Sunny Ang vs public prosecutor [1966]
 
private caveats
private caveatsprivate caveats
private caveats
 
CIVIL PROCEDURE: PROCEDURE OF FILING AN APPEAL FROM SUBORDINATE COURT TO THE ...
CIVIL PROCEDURE: PROCEDURE OF FILING AN APPEAL FROM SUBORDINATE COURT TO THE ...CIVIL PROCEDURE: PROCEDURE OF FILING AN APPEAL FROM SUBORDINATE COURT TO THE ...
CIVIL PROCEDURE: PROCEDURE OF FILING AN APPEAL FROM SUBORDINATE COURT TO THE ...
 
Pre trial case management (2017 2018)
Pre trial case management (2017 2018)Pre trial case management (2017 2018)
Pre trial case management (2017 2018)
 
FAMILY LAW - MARRIAGE
FAMILY LAW - MARRIAGEFAMILY LAW - MARRIAGE
FAMILY LAW - MARRIAGE
 
Equity and land law (Topic 2)
Equity and land law (Topic 2)Equity and land law (Topic 2)
Equity and land law (Topic 2)
 
Third party proceeding & summary judgement
Third party proceeding & summary judgementThird party proceeding & summary judgement
Third party proceeding & summary judgement
 
Secret trust
Secret trustSecret trust
Secret trust
 

Similar to Digital Evidence Admissibility for Legal Proceedings

Admissibility_of_Electronic_Evidence_ppt.pptx
Admissibility_of_Electronic_Evidence_ppt.pptxAdmissibility_of_Electronic_Evidence_ppt.pptx
Admissibility_of_Electronic_Evidence_ppt.pptxRakeshPandey951330
 
Electronic Evidence fraud conference
Electronic Evidence   fraud conferenceElectronic Evidence   fraud conference
Electronic Evidence fraud conferenceAdv Prashant Mali
 
Appreciation of Digital Evidence in Sri Lankan Law
Appreciation of Digital Evidence in Sri Lankan LawAppreciation of Digital Evidence in Sri Lankan Law
Appreciation of Digital Evidence in Sri Lankan LawTalwant Singh
 
Computer Forensics (1).pptx
Computer Forensics (1).pptxComputer Forensics (1).pptx
Computer Forensics (1).pptxGautam708801
 
IEA Presentation - Electronic Records & Electronic Evidence: Section 65B
IEA Presentation - Electronic Records & Electronic Evidence: Section 65BIEA Presentation - Electronic Records & Electronic Evidence: Section 65B
IEA Presentation - Electronic Records & Electronic Evidence: Section 65Bbanerjeerohit
 
Electronic evidence digital evidence in india
Electronic evidence  digital evidence in indiaElectronic evidence  digital evidence in india
Electronic evidence digital evidence in indiaAdv Prashant Mali
 
Relavancy and Admissibility ppt.pptx
Relavancy and Admissibility ppt.pptxRelavancy and Admissibility ppt.pptx
Relavancy and Admissibility ppt.pptxadiljamalullaily
 
Gautam 046.pptx on evidence law related to electronic evidence
Gautam 046.pptx on evidence law related to electronic evidenceGautam 046.pptx on evidence law related to electronic evidence
Gautam 046.pptx on evidence law related to electronic evidenceGautamShaurya
 
Digital forensic
Digital forensicDigital forensic
Digital forensicChandan Sah
 
Useful article on e evidnce
Useful article on e evidnceUseful article on e evidnce
Useful article on e evidnceArjun Randhir
 
Digital forensic principles and procedure
Digital forensic principles and procedureDigital forensic principles and procedure
Digital forensic principles and procedurenewbie2019
 
Most promising cyber forensic solution providers from india forn sec solut...
Most promising cyber forensic solution providers  from india   forn sec solut...Most promising cyber forensic solution providers  from india   forn sec solut...
Most promising cyber forensic solution providers from india forn sec solut...FORnSECSolutions
 
iConference Popovsky
iConference PopovskyiConference Popovsky
iConference PopovskyBrian Rowe
 
Best Cyber Crime Investigation Service Provider | Fornsec Solutions
Best Cyber Crime Investigation Service Provider | Fornsec SolutionsBest Cyber Crime Investigation Service Provider | Fornsec Solutions
Best Cyber Crime Investigation Service Provider | Fornsec SolutionsFORnSECSolutions
 
The Development of E-Commerce in Nigeria - Olushola Abiloye
The Development of E-Commerce in Nigeria - Olushola AbiloyeThe Development of E-Commerce in Nigeria - Olushola Abiloye
The Development of E-Commerce in Nigeria - Olushola AbiloyeAcas Media
 
Fundamental digital forensik
Fundamental digital forensikFundamental digital forensik
Fundamental digital forensiknewbie2019
 

Similar to Digital Evidence Admissibility for Legal Proceedings (20)

Admissibility_of_Electronic_Evidence_ppt.pptx
Admissibility_of_Electronic_Evidence_ppt.pptxAdmissibility_of_Electronic_Evidence_ppt.pptx
Admissibility_of_Electronic_Evidence_ppt.pptx
 
Electronic Evidence fraud conference
Electronic Evidence   fraud conferenceElectronic Evidence   fraud conference
Electronic Evidence fraud conference
 
Appreciation of Digital Evidence in Sri Lankan Law
Appreciation of Digital Evidence in Sri Lankan LawAppreciation of Digital Evidence in Sri Lankan Law
Appreciation of Digital Evidence in Sri Lankan Law
 
Computer Forensics (1).pptx
Computer Forensics (1).pptxComputer Forensics (1).pptx
Computer Forensics (1).pptx
 
IEA Presentation - Electronic Records & Electronic Evidence: Section 65B
IEA Presentation - Electronic Records & Electronic Evidence: Section 65BIEA Presentation - Electronic Records & Electronic Evidence: Section 65B
IEA Presentation - Electronic Records & Electronic Evidence: Section 65B
 
Electronic evidence digital evidence in india
Electronic evidence  digital evidence in indiaElectronic evidence  digital evidence in india
Electronic evidence digital evidence in india
 
Relavancy and Admissibility ppt.pptx
Relavancy and Admissibility ppt.pptxRelavancy and Admissibility ppt.pptx
Relavancy and Admissibility ppt.pptx
 
Gautam 046.pptx on evidence law related to electronic evidence
Gautam 046.pptx on evidence law related to electronic evidenceGautam 046.pptx on evidence law related to electronic evidence
Gautam 046.pptx on evidence law related to electronic evidence
 
Digital forensic
Digital forensicDigital forensic
Digital forensic
 
Digital Forensic
Digital ForensicDigital Forensic
Digital Forensic
 
Useful article on e evidnce
Useful article on e evidnceUseful article on e evidnce
Useful article on e evidnce
 
Chap 1 general introduction to computer forensics
Chap 1  general introduction to computer forensicsChap 1  general introduction to computer forensics
Chap 1 general introduction to computer forensics
 
Digital forensic principles and procedure
Digital forensic principles and procedureDigital forensic principles and procedure
Digital forensic principles and procedure
 
Most promising cyber forensic solution providers from india forn sec solut...
Most promising cyber forensic solution providers  from india   forn sec solut...Most promising cyber forensic solution providers  from india   forn sec solut...
Most promising cyber forensic solution providers from india forn sec solut...
 
iConference Popovsky
iConference PopovskyiConference Popovsky
iConference Popovsky
 
Best Cyber Crime Investigation Service Provider | Fornsec Solutions
Best Cyber Crime Investigation Service Provider | Fornsec SolutionsBest Cyber Crime Investigation Service Provider | Fornsec Solutions
Best Cyber Crime Investigation Service Provider | Fornsec Solutions
 
Sued or Suing: Introduction to Digital Forensics
Sued or Suing: Introduction to Digital ForensicsSued or Suing: Introduction to Digital Forensics
Sued or Suing: Introduction to Digital Forensics
 
Lect 3 Computer Forensics
Lect 3 Computer ForensicsLect 3 Computer Forensics
Lect 3 Computer Forensics
 
The Development of E-Commerce in Nigeria - Olushola Abiloye
The Development of E-Commerce in Nigeria - Olushola AbiloyeThe Development of E-Commerce in Nigeria - Olushola Abiloye
The Development of E-Commerce in Nigeria - Olushola Abiloye
 
Fundamental digital forensik
Fundamental digital forensikFundamental digital forensik
Fundamental digital forensik
 

Recently uploaded

如何办理威斯康星大学密尔沃基分校毕业证学位证书
 如何办理威斯康星大学密尔沃基分校毕业证学位证书 如何办理威斯康星大学密尔沃基分校毕业证学位证书
如何办理威斯康星大学密尔沃基分校毕业证学位证书Fir sss
 
POLICE ACT, 1861 the details about police system.pptx
POLICE ACT, 1861 the details about police system.pptxPOLICE ACT, 1861 the details about police system.pptx
POLICE ACT, 1861 the details about police system.pptxAbhishekchatterjee248859
 
如何办理(KPU毕业证书)加拿大昆特兰理工大学毕业证学位证书
 如何办理(KPU毕业证书)加拿大昆特兰理工大学毕业证学位证书 如何办理(KPU毕业证书)加拿大昆特兰理工大学毕业证学位证书
如何办理(KPU毕业证书)加拿大昆特兰理工大学毕业证学位证书Fir sss
 
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.pptFINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.pptjudeplata
 
如何办理佛蒙特大学毕业证学位证书
 如何办理佛蒙特大学毕业证学位证书 如何办理佛蒙特大学毕业证学位证书
如何办理佛蒙特大学毕业证学位证书Fir sss
 
如何办理澳洲南澳大学(UniSA)毕业证学位证书
如何办理澳洲南澳大学(UniSA)毕业证学位证书如何办理澳洲南澳大学(UniSA)毕业证学位证书
如何办理澳洲南澳大学(UniSA)毕业证学位证书Fir L
 
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书Fs Las
 
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书Fir L
 
如何办理(Rice毕业证书)莱斯大学毕业证学位证书
如何办理(Rice毕业证书)莱斯大学毕业证学位证书如何办理(Rice毕业证书)莱斯大学毕业证学位证书
如何办理(Rice毕业证书)莱斯大学毕业证学位证书SD DS
 
A Short-ppt on new gst laws in india.pptx
A Short-ppt on new gst laws in india.pptxA Short-ppt on new gst laws in india.pptx
A Short-ppt on new gst laws in india.pptxPKrishna18
 
How You Can Get a Turkish Digital Nomad Visa
How You Can Get a Turkish Digital Nomad VisaHow You Can Get a Turkish Digital Nomad Visa
How You Can Get a Turkish Digital Nomad VisaBridgeWest.eu
 
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.pptFINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.pptjudeplata
 
如何办理提赛德大学毕业证(本硕)Teesside学位证书
如何办理提赛德大学毕业证(本硕)Teesside学位证书如何办理提赛德大学毕业证(本硕)Teesside学位证书
如何办理提赛德大学毕业证(本硕)Teesside学位证书Fir L
 
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书Fir L
 
如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书
如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书
如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书FS LS
 
Indemnity Guarantee Section 124 125 and 126
Indemnity Guarantee Section 124 125 and 126Indemnity Guarantee Section 124 125 and 126
Indemnity Guarantee Section 124 125 and 126Oishi8
 
如何办理(UCD毕业证书)加州大学戴维斯分校毕业证学位证书
如何办理(UCD毕业证书)加州大学戴维斯分校毕业证学位证书如何办理(UCD毕业证书)加州大学戴维斯分校毕业证学位证书
如何办理(UCD毕业证书)加州大学戴维斯分校毕业证学位证书SD DS
 

Recently uploaded (20)

如何办理威斯康星大学密尔沃基分校毕业证学位证书
 如何办理威斯康星大学密尔沃基分校毕业证学位证书 如何办理威斯康星大学密尔沃基分校毕业证学位证书
如何办理威斯康星大学密尔沃基分校毕业证学位证书
 
POLICE ACT, 1861 the details about police system.pptx
POLICE ACT, 1861 the details about police system.pptxPOLICE ACT, 1861 the details about police system.pptx
POLICE ACT, 1861 the details about police system.pptx
 
如何办理(KPU毕业证书)加拿大昆特兰理工大学毕业证学位证书
 如何办理(KPU毕业证书)加拿大昆特兰理工大学毕业证学位证书 如何办理(KPU毕业证书)加拿大昆特兰理工大学毕业证学位证书
如何办理(KPU毕业证书)加拿大昆特兰理工大学毕业证学位证书
 
Russian Call Girls Rohini Sector 7 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
Russian Call Girls Rohini Sector 7 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...Russian Call Girls Rohini Sector 7 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
Russian Call Girls Rohini Sector 7 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
 
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.pptFINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
 
如何办理佛蒙特大学毕业证学位证书
 如何办理佛蒙特大学毕业证学位证书 如何办理佛蒙特大学毕业证学位证书
如何办理佛蒙特大学毕业证学位证书
 
Vip Call Girls Greater Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Greater Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS LiveVip Call Girls Greater Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Greater Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
 
如何办理澳洲南澳大学(UniSA)毕业证学位证书
如何办理澳洲南澳大学(UniSA)毕业证学位证书如何办理澳洲南澳大学(UniSA)毕业证学位证书
如何办理澳洲南澳大学(UniSA)毕业证学位证书
 
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书
 
Old Income Tax Regime Vs New Income Tax Regime
Old  Income Tax Regime Vs  New Income Tax   RegimeOld  Income Tax Regime Vs  New Income Tax   Regime
Old Income Tax Regime Vs New Income Tax Regime
 
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书
 
如何办理(Rice毕业证书)莱斯大学毕业证学位证书
如何办理(Rice毕业证书)莱斯大学毕业证学位证书如何办理(Rice毕业证书)莱斯大学毕业证学位证书
如何办理(Rice毕业证书)莱斯大学毕业证学位证书
 
A Short-ppt on new gst laws in india.pptx
A Short-ppt on new gst laws in india.pptxA Short-ppt on new gst laws in india.pptx
A Short-ppt on new gst laws in india.pptx
 
How You Can Get a Turkish Digital Nomad Visa
How You Can Get a Turkish Digital Nomad VisaHow You Can Get a Turkish Digital Nomad Visa
How You Can Get a Turkish Digital Nomad Visa
 
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.pptFINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
 
如何办理提赛德大学毕业证(本硕)Teesside学位证书
如何办理提赛德大学毕业证(本硕)Teesside学位证书如何办理提赛德大学毕业证(本硕)Teesside学位证书
如何办理提赛德大学毕业证(本硕)Teesside学位证书
 
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书
 
如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书
如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书
如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书
 
Indemnity Guarantee Section 124 125 and 126
Indemnity Guarantee Section 124 125 and 126Indemnity Guarantee Section 124 125 and 126
Indemnity Guarantee Section 124 125 and 126
 
如何办理(UCD毕业证书)加州大学戴维斯分校毕业证学位证书
如何办理(UCD毕业证书)加州大学戴维斯分校毕业证学位证书如何办理(UCD毕业证书)加州大学戴维斯分校毕业证学位证书
如何办理(UCD毕业证书)加州大学戴维斯分校毕业证学位证书
 

Digital Evidence Admissibility for Legal Proceedings

  • 2. DIGITAL EVIDENCE ADMISSIBILITY FOR LEGAL PROCEEDINGS IN MALAYSIA A PRESENTATION BY : S E LVA K U MA R B A L A K R I S H N A N MASTER OF CRIMINAL JUSTICE
  • 3. C O N TEN TS • INTRODUCTION • DOCUMENTARY EVIDENCE • DOCUMENT PRODUCED BY COMPUTER • ADMISSIBILITY OF THE EVIDENCE • CHALLENGES ON THE ADMISSIBILITY OF COMPUTER GENERATED EVIDENCE • DIGITAL FORENSIC EXPERT • CONCLUSION
  • 4. I N T R O D U C T I O N • Technology advancement has driven the utilization of digital evidence during legal proceedings in the court. • Digital Evidence also categorized as Electronic/Computer Evidence, Computer associated evidence and Computer generated Evidence. Example of Digital Evidence are Computer, Photograph, Mobile Phones, Tablets/I pads. GPS Devices, Computer Hard Drives and so on. • Data/Evidence obtained can prove crucial to the outcome in all forms of criminal activities as well as for cases such as Homicide, Rape, Breach of trust, Conspiracy, Murder, Drug Trafficking and etc.
  • 5. I N T R O D U C T I O N (CONT) • For evidence to be deemed admissible, it must be obtained with reasonable and least intrusive means so that it’s physical characteristics abides by the rules of digital evidence.
  • 6. DOCUMENTARY EVIDENCE  Under Section 3 of the Evidence Act 1950, Document is defined as: • “document” means any matter expressed, described, or howsoever represented, upon any substance, material, thing or article, including any matter embodied in a disc, tape, film, sound-track or other device whatsoever, by means of— • (a) letters, figures, marks, symbols, signals, signs, or other forms of expression, description, or representation whatsoever; • (b) any visual recording (whether of still or moving images); • (c) any sound recording, or any electronic, magnetic, mechanical or other recording whatsoever and howsoever made, or any sounds, electronic impulses, or other data whatsoever; • (d) a recording, or transmission, over a distance of any matter by any, or any combination, of the means mentioned in paragraph (a), (b) or (c),
  • 7. DOCUMENTARY EVIDENCE (CONT) • or by more than one of the means mentioned in paragraphs (a), (b), (c) and (d), intended to be used or which may be used for the purpose of expressing, describing, or howsoever representing, that matter;  Further, computer is defined as: • “computer” means an electronic, magnetic, optical, electrochemical, or other data processing device, or a group of such interconnected or related devices, performing logical, arithmetic, storage and display functions, and includes any data storage facility or communications facility directly related to or operating in conjunction with such device or group of such interconnected or related devices, but does not include an automated typewriter or typesetter, or a portable hand held calculator or other similar device which is non-programmable or which does not contain any data storage facility;
  • 8. DOCUMENT PRODUCED BY A COMPUTER • Document generated by a computer and statement contained in particular is admissible under section 90A, 90B and 90C of the Evidence Act 1950. • Section 90A  sets the requirements for admissibility and proof • Section 90B  deals with the probative value to be attached to the evidence • Section 90C  stipulates that the provisions of Section 90A and 90B shall prevail over any other provisions in any other statues • All these Sections [90A,90B,90C] are applicable to criminal and civil proceedings. • Section 90A,90B and 90C are considered as exceptions to the hearsay rule because the computer-generated are admissible in Malaysia courts without requiring testimony from the original maker of the documents over the content of the documents.
  • 9. ADMISSIBILITY OF THE EVIDENCE • Digital Evidence obtained is legally admissible when it is presented to prove the facts of a case. • The court will determine whether the rendered evidence is relevant, reliable and authentic to the disputed facts of the case in proceedings. • If a doubt arises, the evidence in a criminal trial will be excluded as it needs to be proven beyond a reasonable doubt. • In practice, admissibility is a set of legal tests carried out by a judge to assess an item of evidence according to the following criteria.
  • 10. ADMISSIBILITY OF THE EVIDENCE (CONT)  Relevance and Reliability • Traces of tampering, deletion or other changes over the digital evidence should be examined. The content of digital data involved and the process through which it was made must produce accurate and relevant results.  Authenticity of evidence • The evidence that was acquired from a particular system or location should satisfy the court. A precise and complete copy of digital evidence is required. The evidence should be preserved and unchanged from when it was collected. • For an example, when a Digital Forensic Analyst seized a hard drive from a crime spot, he/she need to make a copy of the hard drive using computer forensic tools like EnCase, Forensic Tool Kit, DEFT Linux and etc.
  • 11. ADMISSIBILITY OF THE EVIDENCE (CONT) • Before copying the seized hard drive, the seized hard drive need to be connected to a forensic disk controller or hardware write-block device to gain read-only access to computer hard drives without the risk of damaging the drive's contents.  Copy of the hard drive is required for • To prevent damage/tampering of the original content [the source of evidence] in the hard drive • Analysis/Investigation purpose
  • 12. CHALLENGES ON THE ADMISSSIBILITY OF COMPUTER GENERATED EVIDENCE • Case Study 1  Gnanasegaran a/l Pararajasingam v Public Prosecutor [1997] • Case Study 2  Bank Bumiputra Malaysia Berhad v Emas Bestari Sdn Bhd & Anor [2014] • Case Study 3  Hanafi bin Mat Hassan v Public Prosecutor [2006] • Case Study 4  Ahmad Najib bin Aris v Public Prosecutor [2009] • Case Study 5  PP v Goh Hoe Cheong & Anor [2006]
  • 13. CHALLENGES ON THE ADMISSSIBILITY OF COMPUTER GENERATED EVIDENCE (CONT) Case Study 1: Gnanasegaran a/l Pararajasingam v Public Prosecutor [1997] • Gnanasegaran a/l Pararajasingam v Public Prosecutor [1997] was of the early cases where direction was sought from the court of appeal on the admissibility and probative value of computer generated documents. • The appellant argued the computer print out evidence was inadmissible because Section 90A required that a certificate had to be produced to authenticate the computer records. • Shaik Daud Ismail JCA further clarified that there were two ways of proving ‘in the course of its ordinary use’
  • 14. CHALLENGES ON THE ADMISSSIBILITY OF COMPUTER GENERATED EVIDENCE (CONT) • (I) it may be proved by the production of the certificate as required by sub-s. (2). – This is permissive and not mandatory. This can also be seen in sub-s. (4) which begins with the words 'Where’ a certificate is given under sub-s. (2)….. • (II) calling the maker of the document • In this case, a certificate is not required to be produced as the bank officer was able to testify with regard to the documents because he was in charge of the operation of current accounts. Thus, the appeal was dismissed.
  • 15. CHALLENGES ON THE ADMISSSIBILITY OF COMPUTER GENERATED EVIDENCE (CONT) Case Study 2: Bank Bumiputra Malaysia Berhad v Emas Bestari Sdn Bhd & Anor [2014] • In cases where computer-based evidence is tendered in court, failure to procedure the certificate might even end up as evidence inadmissible as the evidence is lack of authenticity. • An example is shown in the case of Bank Bumiputra Malaysia Berhad v Emas Bestari Sdn Bhd & Anor [2014] • The computer-based document at issue was an exhibit of a bank statement showing the defendant had paid instalments to the financing centre even after the disbursement. In this situation, the court reigned such statement was inadmissible due to unavailability of related certificate by the bank officer who made the statement.
  • 16. CHALLENGES ON THE ADMISSSIBILITY OF COMPUTER GENERATED EVIDENCE (CONT) Case Study 3: Hanafi bin Mat Hassan v Public Prosecutor [2006] • In this case, the prosecutor provided the bus ticket as a proof but the defense argued that the proof which was presented was inadmissible. • The defense argued that the ticket generated by a ticket machine is a digital record and will be considered as inadmissible if the prosecution fails to tender a certificate and a review of the DNA profiling of the semen which is additionally a digital record where it is inadmissible for failure to comply with Section 90A. • However, in deciding the court had waived the necessity to tender the certificate needed under Section 90A [2] when submitted evidence demonstrates the ticket machine was a computer while the bus ticket was generated by the ticket machine during the ordinary course of the business.
  • 17. CHALLENGES ON THE ADMISSSIBILITY OF COMPUTER GENERATED EVIDENCE (CONT) • Even if the witness failed to provide evidence, the assumption in Section 90A [6] was sufficient to determine the latter element to indicate that the ticket was issued in the ordinary course by the machine. • All the digital evidence presented by the defense have been acknowledged and accepted in this case.
  • 18. CHALLENGES ON THE ADMISSSIBILITY OF COMPUTER GENERATED EVIDENCE (CONT) Case Study 4: Ahmad Najib bin Aris v Public Prosecutor [2009] • In Ahmad Najib Bin Aris v Public Prosecutor [2009], Both chemist’s report and CCTV recording were accepted [no certificate has been issued] as it has been generated by a computer. Federal court stated there were two ways of submitting and providing the documents generated by a computer according to Section 90A [1] in conjunction with supporting Gnanasegaran and Hanafi. • The chemist’s report was accepted based on extensive oral evidence in the course of its regular use and preservation as stated in Section 90A [3] and Section 90A [4]. However, the recordings of the CCTV were denied because there was neither a certificate nor oral evidence about its operation.
  • 19. CHALLENGES ON THE ADMISSSIBILITY OF COMPUTER GENERATED EVIDENCE (CONT) • This is due to the general rule as established that the ‘computer’ generated evidence can be derived either using a certificate establishment of the ‘course of ordinary use’ and the proper functioning of the device or using direct oral evidence attesting to the same requirements. • In the event of failure to meet any of the conditions, the recordings of the CCTV were adhered to be inadmissible.
  • 20. CHALLENGES ON THE ADMISSSIBILITY OF COMPUTER GENERATED EVIDENCE (CONT) Case Study 5: PP v Goh Hoe Cheong & Anor [2006] • The prosecution ineffectively sought to present evidence in the form of digitally generated check-in baggage tags. • The judge determined that the electronic baggage tags will not be accepted as evidence due to absence of both oral evidence and any certificate under Section 90A [1] for establishing the chain of custody and control of the checked-in bags. • Consequently, the prosecution failed to prove the allegations against the offender.
  • 21. DIGITAL FORENSIC EXPERT • Malaysia court agrees that oral testimony and certificate submission are two ways of authenticating digital evidence, but that methods are not adequate to ensure the credibility and originality of digital evidence submitted. • Apart from presenting maker or witness to the court to authenticate digital evidence submitted, another authentication method used in court is by getting an expert opinion from digital forensics experts. • Under section 45 of the Evidence Act, the expert opinion rule is applicable where the evidence obtained requires a computer forensic specialist to validate it rather than calling a maker or a witness before the trial.
  • 22. DIGITAL FORENSIC EXPERT (CONT) • Although there is no particular provision to cater for digital forensics evidence admissibility in court, Malaysia court has agreed upon the admissibility of digital forensics evidence as a form of expert opinion on the condition that expert follows the rules and procedures during the submission of evidence. The Malaysian court acknowledges all reports and testimonials from them [Digital Forensic Expert]. • To secure it as authentic content, the court must evaluate the collection, preservation and discovery of the evidence. • In Malaysia, Cybersecurity Malaysia agency [consist of digital forensic experts] has been established under the Malaysian Government to handle digital forensics affairs. • This experts help to preserve the custody chain in its original and authentic form from its collection time until it is produced in court.
  • 23. CONCLUSION • In a nutshell, Digital Evidence must be authentic to be used as evidence in Malaysia court of law. • The provisions of Section 90A of Evidence Act 1950 have facilitated the use of computer generated evidence. • However, despite the recent amendments to the Evidence Act in 2012, It is noted that the legislature has not seen the need to amend the term “computer” to electronic or digital. As such questions of whether documents from particular equipment are computer generated will continue to emerge. • This is because technology has been evolving in a fast manner and there might be more complicated cases in future. Thus, the laws need to be reviewed over time and updated with certain modification if needed.
  • 24. REFERENCES • Mohamed, D., & Ramlee, Z. (2013). Cases of electronic evidence in Malaysian courts: the civil and Syariah perspective. • Brett Shavers, in Placing the Suspect Behind the Keyboard, 2013 EvidenceAct 1950 (Act 56) • Anushia Kandasivam (2016, October 11).Understanding Digital Evidence in Malaysian Courts. Retrieved from https://www.digitalnewsasia.com/digital-economy/understanding-digital-evidence-malaysian-courts • [2015] 1 MLJ 617 • [2013] 5 MLJ 867 • Malayan Law Journal Articles/2013/Volume 3/Computer Evidence in Malaysia: Where are We? • Christine Sgarlata, Chung and David J Byer, 'The Electronic Paper Trail: Evidentiary Obstacles to Discovery and Admission electronic Evidence', 4 BU J SCI & TECH L 5, 22 September 1998 • [1937] MLJ 38 • [1975] 2 MLJ 106
  • 25. REFERENCES (CONT) • Paul Hartman (1965). IllegallyObtained Evidence in the USA. • [1975] 1 All ER 70 • Brenner, Susan W. (2005). US digital evidence: Simulations and animations, Computer and Telecommunications Law Review 2005 (C.T.L.R. 2005, 11(2), 38-39). • Paul,Augustine. (2004). Evidence: Practice and procedure, second edition, Malayan Law Journal quoted in Mohamed, D., & Ramlee, Z. (2013). Cases of electronic evidence in Malaysian courts: the civil and Syariah perspective. • [1997] 3 MLJ 1. • [2014] 1 CLJ 316 • It is not clear what 'good working order' and 'operating properly' means; for a discussion of this problem that is also a problem in England & Wales, see Stephen Mason, general editor, Electronic Evidence (2nd Ed), LexisNexis Butterworth, 2010, Chapter 5. • [1996] 3 MLJ 240 • [2009] 2 CLJ 800
  • 26. REFERENCES (CONT) • Malaysia, C. L. J. L. (2006, July 28). Bulletin_27_2006. Retrieved May 23, 2020, from https://www.cljlaw.com/others/clj_bulletin/Bulletin_27_2006.htm?fbclid=IwAR2F4dLlmcHlvwbrpzKhi7Bp1kx5uyr1dGTDBGflM2JU 9Q8zRl6fzhJX9-E • Charles Ramendran. (2019, November 1). Raped, murdered by a beast. The Sun Daily. Retrieved from https://www.thesundaily.my/local/raped-murdered-by-a-beast-XY1562462 • Radhakrishna, Gita. (2014). Digital evidence in Malaysia. Digital Evidence and Electronic Signature Law Review. 9. 10.14296/deeslr.v9i0.1987. • Nurainolmardhiah BintiAbdul Halim, Setra Ginsim and Siti Khadijah Binti Baharuddin. (2015). CASE STUDIES:ADMISSIBILITY OF DIGITAL RECORDSAS LEGAL EVIDENCE IN MALAYSIA. NationalArchives of Malaysia • Charles Ramendran. (2019, November 1). Raped, murdered by a beast. The Sun Daily. Retrieved from https://www.thesundaily.my/local/raped-murdered-by-a-beast-XY1562462 • Dr Duryana Mohamed and Dr Zulfakar Ramlee. (2014). CASES OF ELECTRONIC EVIDENCE IN MALAYSIAN. COURTS: THE CIVILAND SYARIAH PERSPECTIVE. E-Journal of Social Science Research. No1 (2), page 4. • Ibid at p 7.
  • 27. REFERENCES (CONT) • Mohamad,A. M. (2019).Admissibility and Authenticity of Electronic Evidence in the Courts of Malaysia and United Kingdom. International Journal of Law, Government and Communication, 4(15), 121-129. • [2007] 7 CLJ 68 • Sethia,A. (2016). Rethinking admissibility of electronic evidence. International Journal of Law and Information Technology, 24(3), 229-250. • John C. O’Brien, ‘The Hearsay Within Confrontation’ (2010) Saint Louis University Public Law Review Vol.XXIX:501 • Mohamed, D. (2011). Computer evidence: Issues and challenges in the present and the future. LNS (A) lxvii.