Admissibility of Electronic Evidence under the Rules on Evidence

In the modern judicial landscape, the "paper trail" has evolved into a digital footprint. From encrypted chat logs and email threads to CCTV footage and social media posts, electronic evidence is now a cornerstone of litigation. In the Philippines, the governing framework for these digital artifacts is primarily the Rules on Electronic Evidence (REE), promulgated by the Supreme Court in 2001, supplemented by the Rules of Court and the Cybercrime Prevention Act of 2012.

To successfully introduce electronic evidence in a Philippine court, one must navigate the stringent requirements of admissibility, authentication, and the best evidence rule.


I. Defining Electronic Evidence

Under the REE, an Electronic Document refers to information or the representation of information, data, figures, symbols, or other modes of written expression, described or depicted, by which a right is established or an obligation extinguished, or by which a fact may be proved and affirmed, which is received, recorded, transmitted, stored, processed, retrieved, or produced electronically.

Crucially, the law treats electronic documents as the functional equivalent of paper-based documents. If a law requires a document to be in writing, an electronic document suffices if it maintains its integrity and is accessible for subsequent reference.


II. The Core Requirements for Admissibility

For electronic evidence to be admitted by a court, it must pass a three-prong test:

  1. Relevancy: The evidence must have such a relation to the fact in issue as to induce belief in its existence or non-existence.
  2. Authentication: There must be proof that the document is what it purports to be.
  3. Compliance with the REE: It must follow the specific procedural methods of presentation and proof outlined in the Rules.

III. The "Best Evidence Rule" in the Digital Age

In traditional evidence, the "Best Evidence Rule" (now called the Original Document Rule) requires the production of the original writing. In the electronic realm, this concept is adapted:

  • Electronic "Originals": An electronic document is considered an "original" if it is a printout or output readable by sight or other means, shown to reflect the data accurately.
  • Duplicates: If a document is in a format that does not change (like a PDF or a mirrored drive), it is generally treated with the same weight as the original.

IV. Authentication: The Gateway to Admissibility

Authentication is the most common hurdle for electronic evidence. Since digital files are easily manipulated, the court requires a high degree of certainty regarding their source and integrity. Under the REE, an electronic document may be authenticated by:

  • Evidence of Digital Signature: A specific electronic signature that is unique to the signer and under their sole control.
  • Security Procedures: Evidence that a specific, reliable "security procedure" (like encryption or time-stamping) was applied to verify the document.
  • Other Methods: Any other evidence showing that the document is what the party claims it to be, such as testimony from a witness who saw the message being sent or an expert who performed a forensic extraction.

V. Specific Types of Electronic Evidence

1. Electronic Messages (SMS and Chat)

The Supreme Court has clarified (notably in Vidallon-Magpale v. Fragante) that ephemeral electronic communications, such as text messages, are admissible as long as they are properly authenticated. This is usually done through:

  • Testimony of a person who was a party to the communication.
  • Documentation of the messages (screenshots or transcripts) verified by the witness.

2. Audio, Video, and Ephemeral Evidence

Ephemeral communications refer to those that are not retained or stored (like a live phone call or a disappearing Snap). These are proven by the testimony of a person who was a party to the communication or has personal knowledge thereof. Audio and video recordings require a "foundation" to be laid, showing:

  • The capability of the device used.
  • The authenticity and correctness of the recording.
  • No changes, additions, or deletions have been made.

3. Social Media Posts

Public posts are generally easier to admit than private messages, but they still require authentication. Courts look for "circumstantial guarantees of trustworthiness," such as the user profile’s history, unique identifiers, or the witness's personal knowledge of the account holder's identity.


VI. The Burden of Proof and Presumptions

The REE provides certain presumptions to facilitate the use of digital tools:

  • Integrity of the System: If an electronic document is produced by a business in the regular course of business, there is a presumption that the system used to store it was operating properly.
  • Electronic Signatures: If a digital signature is verified through a recognized certification authority, it is presumed to be the signature of the person to whom it correlates.

VII. Disqualification and Hearsay

Electronic evidence is not exempt from the Hearsay Rule. An email saying "John told me he stole the money" is still hearsay if offered to prove John actually stole the money, regardless of it being in electronic form. However, electronic records often fall under the "Entries in the Course of Business" exception to the hearsay rule, provided they were made at or near the time of the event by a person with knowledge.


VIII. Practical Challenges: Forensics and Chain of Custody

In criminal cases, especially those involving the Cybercrime Prevention Act, the "Chain of Custody" is paramount. This involves documenting who handled the digital evidence from the moment of seizure to the moment it is presented in court. If a hard drive is seized without proper "hashing" (creating a unique digital fingerprint of the drive), the defense can argue that the files were planted or altered, rendering the evidence inadmissible.


Summary Table: Paper vs. Electronic Evidence

Feature Paper Evidence Electronic Evidence
Originality The physical ink-on-paper page. The printout or readable output.
Authentication Handwriting or signature analysis. Digital signatures or security procedures.
Integrity Physical signs of tampering (erasures). Metadata, hash values, and system logs.
Storage Physical filing cabinets. Servers, cloud storage, or local drives.

Disclaimer: This content is not legal advice and may involve AI assistance. Information may be inaccurate.