The following items of evidence are self-authenticating; they require no extrinsic evidence of authenticity in order to be admitted:
Ariz. R. Evi. 902
COMMENT TO 2018 AMENDMENT ADDING SUBDIVISION (13)
The amendment sets forth a procedure by which parties can authenticate certain electronic evidence other than through the testimony of a foundation witness. As with the provisions on business records in Rules 902(11) and (12), the Court has determined that the expense and inconvenience of producing a witness to authenticate an item of electronic evidence is often unnecessary. It is often the case that a party goes to the expense of producing an authentication witness and then the adversary either stipulates authenticity before the witness is called or fails to challenge the authentication testimony once it is presented. The amendment provides a procedure under which the parties can determine in advance of trial whether a real challenge to authenticity will be made, and can then plan accordingly.
A proponent establishing authenticity under this Rule must present a certification containing information that would be sufficient to establish authenticity were that information provided by a witness at trial. If the certification provides information that would be insufficient to authenticate the record if the certifying person testified, then authenticity is not established under this Rule. The Rule specifically allows the authenticity foundation that satisfies Rule 901(b)(9) to be established by a certification rather than the testimony of a live witness.
The reference to the "certification requirements of Rule 902(11) or (12)" is only to the procedural requirements for a valid certification. There is no intent to require, or permit, a certification under this rule to prove the requirements of Rule 803(6). Rule 902(13) is solely limited to authentication and any attempt to satisfy a hearsay exception must be made independently.
In order to provide the adverse party with an opportunity to properly analyze the issue of authenticity, the "record" provided by the proponent of the ESI evidence must include the metadata for the material in question if reasonably necessary to assess the material's authenticity. In addition, a challenge to the authenticity of electronic evidence may require technical information about the system or process at issue, including possibly retaining a forensic technical expert; such factors will affect whether the opponent has a fair opportunity to challenge the evidence given the notice provided.
COMMENT TO 2018 AMENDMENT ADDING SUBDIVISION (14)
The amendment sets forth a procedure by which parties can authenticate data copied from an electronic device, storage medium, or an electronic file, other than through the testimony of a foundation witness. As with the provisions on business records in Rules 902(11) and (12), the Court has determined that the expense and inconvenience of producing an authenticating witness for this evidence is often unnecessary. It is often the case that a party goes to the expense of producing an authentication witness, and then the adversary either stipulates authenticity before the witness is called or fails to challenge the authentication testimony once it is presented. The amendment provides a procedure in which the parties can determine in advance of trial whether a real challenge to authenticity will be made, and can then plan accordingly.
Today, data copied from electronic devices, storage media, and electronic files are ordinarily authenticated by "hash value." A hash value is a number that is often represented as a sequence of characters and is produced by an algorithm based upon the digital contents of a drive, medium, or file. If the hash values for the original and copy are different, then the copy is not identical to the original. If the hash values for the original and copy are the same, it is highly improbable that the original and copy are not identical. Thus, identical hash values for the original and copy reliably attest to the fact that they are exact duplicates. This amendment allows self-authentication by a certification of a qualified person that the person checked the hash value of the proffered item and that it was identical to the original. The rule is flexible enough to allow certifications through processes other than comparison of hash value, including by other reliable means of identification provided by future technology.
In order to provide the adverse party with an opportunity to properly analyze the issue of authenticity, the "record" provided by the proponent of the ESI evidence must include the metadata for the material in question if reasonably necessary to assess the material's authenticity. In addition, a challenge to the authenticity of electronic evidence may require technical information about the system or process at issue, including possibly retaining a forensic technical expert; such factors will affect whether the opponent has a fair opportunity to challenge the evidence given the notice provided.
COMMENT TO 2012 AMENDMENT
The language of Rule 902 has been amended to conform to the federal restyling of the Evidence Rules to make them more easily understood and to make style and terminology consistent throughout the rules. These changes are intended to be stylistic only. There is no intent to change any result in any ruling on evidence admissibility.
COMMENT TO ORIGINAL 1977 RULE
The language "general commercial law" in (9) is carried forward from the Federal Rule. In Arizona, the reference is to the Uniform Commercial Code as adopted in this State.
HISTORICAL NOTE
Source:
Federal Rules of Evidence, Rule 902.
Civ.Code 1901, § 2548.
Civ.Code 1913, §§ 1734, 1736, 1745, 1748.
Laws 1921, Ch. 2, § 1.
Rev.Code 1928, §§ 4450, 4452, 4458, 4460.
Fed.Rules Civ.Proc., Rule 44(a), 28 U.S.C.A.
Code 1939, §§ 21-926, 23-301, 23-303, 23-309, 23-311.
Rules Civ.Proc., former Rules 44(b), 44(d), 44(e), 44(g), 44(j).