Вы находитесь на странице: 1из 10

Reviewing Your HRIS System To Ensure It Creates Admissible and Persuasive Records

Human Resources Information


Systems: Reviewing Your HRIS
System To Ensure It Creates
Admissible and Persuasive
Records
Gregory T. Casamento, Patrick J. Hatfield, and Hanna Norvell

Employers currently using or those signed in wet ink on paper. admissibility risk, (4) compliance
considering moving to an elec- Over the last few years, courts risk, (5) adoption risk, and (6)
tronic Human Resources Infor- have explained the flaws to such relative risk.3 Through the use of
mation System (HRIS)1 should systems when the enforceabil- the e-Risk Analysis Framework,
review those systems to ensure ity of these agreements are chal- employers first identify, then mit-
that any notices, policies, train- lenged by employees. igate, the most common risks to
ing, evaluations, codes of con- To help employers mitigate the enforcement of their electron-
duct, disclosures and contracts, the risks, human resources profes- ically signed agreements or other
such as arbitration agreements or sionals can use a Six Point e-Risk documents. Moreover, through
restrictive covenants,2 generated Analysis Framework that analyzes the identification and mitigation
by the HRIS and signed or ac- the following six risks associated process, most employers will con-
knowledged by employees elec- with an HRIS: (1) authentica- clude, as we have, that with an
tronically are as enforceable as tion risk, (2) repudiation risk, (3) appropriately designed and im-
plemented process, an employer
GREGORY T. CASAMENTO is a partner in the New York office of Locke Lord Bissell
& Liddell LLP. Mr. Casamento’s practice focuses on business, commercial, employment and can actually create electronically
intellectual property litigation. He has significant experience litigating restrictive covenant, signed or acknowledged agree-
breach of contract and the enforcement of arbitration agreements before both State and Federal ments that are as enforceable, if
Courts. As a member of Locke Lord’s Technology Transactions group, Mr. Casamento not more so, than those signed
regularly assists clients in review of e-process systems. He is also highly knowledgeable in
with wet ink on paper.4
e-Matters (e-signatures, e-discovery, e-admissibility), and regularly addresses a number of
prestigious organizations and trade associations regarding the admissibility and enforceability To demonstrate how an em-
of e-signatures, e-contracts, and e-records. ployer can use the e-Risk Analysis
PATRICK J. HATFIELD is a Partner in the Corporate Department of the Atlanta office of Framework with its HRIS, this
Locke Lord Bissell & Liddell LLP and serves as co-chair of the firm’s Technology Transactions article first discusses the six risks
Group. Mr. Hatfield’s practice is highly focused on issues surrounding electronic signatures,
outsourcing, and software licensing and development. Mr. Hatfield is a frequent and sought after
that the Framework helps em-
speaker and regularly addresses some of the most highly regarded industry associations in the ployers identify and then shows
country on electronic signatures and a number of e-Matters related topics. how employers can develop a
HANNA NORVELL is a partner in the Houston office of Locke Lord Bissell & Liddell process to mitigate those risks.
LLP. She is Board Certified in Labor and Employment Law by the Texas Board of Legal The article then discusses four
Specialization, and her practice exclusively serves employers regarding any employment
related issues, including compliance, counseling and litigation. She has successfully litigated
relevant HRIS court opinions5 to
the issue of an enforceable arbitration agreement signed electronically wherein the matter was show how the risks faced by each
compelled to arbitration. employer in those situations were
© 2009 Thomson Reuters. This publication was created to provide you with accurate and authoritative information
concerning the subject matter covered; however, this publication was not necessarily prepared by persons licensed to
HR ADVISOR practice law in a particular jurisdiction. The publisher is not engaged in rendering legal or other professional advice and
this publication is not a substitute for the advice of an attorney. If you require legal or other expert advice, you should
JULY/AUGUST 2009
seek the services of a competent attorney or other professional. For authorization to photocopy, please contact the
Copyright Clearance Center at 222 Rosewood Drive, Danvers, MA 01923, USA (978) 750-8400; fax (978) 646-8600
19 or West’s Copyright Services at 610 Opperman Drive, Eagan, MN 55123, fax (651) 687-7551. Please outline the spe-
cific material involved, the number of copies you wish to distribute and the purpose or format of the use.
Reviewing Your HRIS System To Ensure It Creates Admissible and Persuasive Records

or could have been mitigated by attached to or logically associ- to paper documents and wet ink
the e-Risk Analysis Framework. ated with his or her signature, but signatures apply also to electronic
claims that the document con- documents signed electronically,
SIX POINT E-RISK ANALYSIS tains terms and conditions dif- stored electronically and retrieved
FRAMEWORK ferent than those in the original electronically.6 Thus, the Federal
Authentication Risk agreement because it was changed Rules of Evidence, or their state
This is the risk that the person sign- after it was signed or that what equivalents, will govern the ad-
ing the agreement is in fact not the they signed did not sufficiently missibility of documents present-
person he or she claims to be, also describe the terms or conditions ed, signed, secured, archived and/
referred to as the “forger risk.” To at issue or that the employee oth- or retrieved by an HRIS.7
mitigate the Authentication Risk, erwise did not receive some re- Employers may use HRIS to
employers should configure their quired notice. create what are often referred to as
HRIS to properly authenticate the HRIS often can be configured “signing ceremonies.” These are
identity of the person signing. Em- to reduce the repudiation risk far the processes by which employ-
ployers can authenticate employees below such risk associated with ees sign documents in the HRIS,
on an HRIS through the use of se- paper documents signed in wet in ways to satisfy the admissibility
cure log-in names, passwords, and ink, especially multi-page docu- standards in the Federal Rules of
pin numbers, information created ments or documents which refer Evidence. Signing ceremonies are
by and known only to the individual to other documents. For example, useful to prove at trial the authen-
employee. Default or other access HRIS can cryptographically seal ticity of a document retrieved by
by a supervisor or other person each document upon the signing HRIS because the ceremony can
should be avoided. With new em- of that document by the employ- create a record of the entire signa-
ployee applicants, employers can ee, thereby rendering such docu- ture ceremony process, including:
use third-party databases to verify ment unalterable without detec- (a) the terms and conditions pre-
the applicant’s identity. Employers tion. Documents electronically sented to the employee with which
should seek to record and archive sealed in this fashion are likely to the electronic signature will be
this authentication process, often pass the admissibility threshold logically associated; (b) the specific
referred to as “capturing an audit (see discussion below) and once act of the employee expressing his
trail,” which the HRIS then se- such documents are admitted into or her intent to be bound to those
curely archives for later secure re- evidence, employers are likely to terms and conditions, as called for
trieval if the employee claims he or have meaningful, persuasive evi- in those same terms and conditions;
she never signed something on the dence as to why such documents and (c) the circumstances under
system. If the employer opts not could not have been altered with- which the employee’s signature
to include the authentication pro- out detection and should there- was obtained.8 This information
cess in the audit trail, then the em- fore be enforced as written against all goes to establish the authentic-
ployer may not have access to reli- the employee. ity of the document (containing the
able evidence to establish the actual terms and conditions) stored in the
Admissibility Risk HRIS. There will need to be one
identity of the employee. Ideally,
This is the risk that a court re- or more witnesses who can explain
the employer calibrates the level of
fuses to admit into evidence the process. Without the appropri-
authentication with the employer’s
copies of electronic documents ate witness (from the HRIS ven-
assessment of the authentication
generated, presented, signed, se- dor or the information technology
risk within their organization.
cured, archived and retrieved by department) to provide an affidavit
Repudiation Risk the employer’s HRIS because of or live testimony as to items (a) to
This is the risk that the employ- evidentiary “authentication” is- (c) above, the evidence will not be
ee later repudiates the terms and sues, a condition to admissibility admissible and therefore a court is
conditions in the record bearing of any document. The rules of likely to make a finding of no en-
his or her signature. For example, evidence regarding authentica- forceable agreement.9
the employee acknowledges that tion, including the required evi- The standard for the authen-
he or she signed the document dentiary foundations, that apply tication of evidence under the
© 2009 Thomson Reuters. This publication was created to provide you with accurate and authoritative information
concerning the subject matter covered; however, this publication was not necessarily prepared by persons licensed to
HR ADVISOR practice law in a particular jurisdiction. The publisher is not engaged in rendering legal or other professional advice and
this publication is not a substitute for the advice of an attorney. If you require legal or other expert advice, you should
JULY/AUGUST 2009
seek the services of a competent attorney or other professional. For authorization to photocopy, please contact the
Copyright Clearance Center at 222 Rosewood Drive, Danvers, MA 01923, USA (978) 750-8400; fax (978) 646-8600
20 or West’s Copyright Services at 610 Opperman Drive, Eagan, MN 55123, fax (651) 687-7551. Please outline the spe-
cific material involved, the number of copies you wish to distribute and the purpose or format of the use.
Reviewing Your HRIS System To Ensure It Creates Admissible and Persuasive Records

Federal Rules of Evidence is which permits exhibits to be au- In addition to the express lan-
contained in Rule 901, Require- thenticated by appearance, con- guage of F.R.E. 901(b)(9), Im-
ment of Authentication or Iden- tents, substance, internal patterns, winkelried’s Evidentiary Founda-
tification, which provides that or other distinctive characteristics tions provides a supplemental elev-
“the requirement of authentica- “is one of the most frequently en-step process under the Rule
tion or identification as a condi- used [rules] to authenticate [elec- for the admission of computer
tion precedent to admissibility is tronic signatures] and other elec- generated records.17 Most of the
satisfied by evidence sufficient to tronic records.”14 F.R.E. 901(b) testimony proffered under these
support a finding that the matter (9), which authorizes authentica- eleven steps is a simple recitation
in question is what its proponent tion by “[e]vidence describing a of facts that HRIS should meet.
claims.”10 As stated throughout process or system used to produce
More challenging is step four,
the relevant case law, “‘reliability a result and showing that the pro-
which requires expert testimony
must be the watchword’ in deter- cess or system produces an accu-
that the “procedure has built-in
mining the admissibility of com- rate result,” is “one method of
safeguards to ensure accuracy and
puter generated evidence.”11 The authentication that is particularly
identify errors…regarding com-
“factors [must] effectively address useful in authenticating electronic
evidence stored in or generated by puter policy and system control
a witness’s familiarity with the
computers” and is frequently used procedures, including control of
type of evidence and the method
as a litmus test for admissibility of access to the database, control of
used to create it, and appropriate-
computer-related information.15 access to the program, record-
ly require that the witness be ac-
“[It] dictates that the inquiry into ing and logging changes, backup
quainted with the technology in-
volved in the computer program the basic foundational admissibil- practices, and audit procedures to
used to generate the evidence.”12 ity requires sufficient evidence to assure the continuing integrity of
Certain subparts of Sections authenticate both the accuracy of the records.”18
901 and 902 of the Federal Rules the image and the reliability of the Expert witness testimony seek-
of Evidence are particularly suit- machine producing the image.”16 ing the admission of signatures
ed to address the admission of HRIS should use a process and documents from the HRIS
electronic signatures and records to secure each document after pursuant to F.R.E. 901(b)(9)
signed using an HRIS: Sections it is signed to allow employers would include:
901(b)(1), (3), (4) and (9), and to configure the HRIS to meet
zz The manner in which the
902(7) and (11). Rules 901(b)(1), the admissibility standards under
HRIS server(s), as appro-
(3), (4) and (9) require witness tes- the subsections in F.R.E. 901.
The testimony of a witness with priate, are used to gener-
timony to authenticate proffered ate electronic signatures and
evidence, while 902(7) and (11) knowledge of the specific trans-
action will satisfy F.R.E. 901(b) documents;
allow for self-authentication.13 An
(1), and a learned expert wit- zz The reliability of these servers;
HRIS need only be authenticated
ness should suffice under F.R.E.
once through one of these meth- zz Procedures for manual data
901(b)(3). An expert witness
ods, whichever is best applied to entry and system controls; and
knowledgeable about the con-
the situation at hand.
tents, substance and distinctive zz Safeguards to ensure accu-
F.R.E. 901 characteristics of the HRIS and racy and identify errors (i.e.,
A witness with direct knowledge, the process of creating, present- safeguards, access rules and
pursuant to F.R.E. 901(b)(1), or ing, signing, securing, archiving other controls on the en-
an expert witness with learned and retrieving the documents in vironment that govern the
knowledge, pursuant to F.R.E. question should satisfy F.R.E. flow of information through
901(b)(3), are certainly two fairly 901(b)(4), while expert testimony its system), tamper resistant
straightforward methods an em- describing how the HRIS ac- software, use of cryptograph-
ployer could use to admit hard complishes the foregoing accu- ic technology, and that all of
copies of documents signed us- rately should suffice under F.R.E. these meet or exceed indus-
ing an HRIS. F.R.E. 901(b)(4), 901(b)(9). try standards.
© 2009 Thomson Reuters. This publication was created to provide you with accurate and authoritative information
concerning the subject matter covered; however, this publication was not necessarily prepared by persons licensed to
HR ADVISOR practice law in a particular jurisdiction. The publisher is not engaged in rendering legal or other professional advice and
this publication is not a substitute for the advice of an attorney. If you require legal or other expert advice, you should
JULY/AUGUST 2009
seek the services of a competent attorney or other professional. For authorization to photocopy, please contact the
Copyright Clearance Center at 222 Rosewood Drive, Danvers, MA 01923, USA (978) 750-8400; fax (978) 646-8600
21 or West’s Copyright Services at 610 Opperman Drive, Eagan, MN 55123, fax (651) 687-7551. Please outline the spe-
cific material involved, the number of copies you wish to distribute and the purpose or format of the use.
Reviewing Your HRIS System To Ensure It Creates Admissible and Persuasive Records

Following initial court deci- an electronic record and electronic sig- ment to Rule 803(6) to allow
sions recognizing the safeguards nature under Rule 902(7).”20 proponents of business records to
of a particular HRIS might re- F.R.E. 902(11) of the Federal qualify them for admittance with
duce the risk for future challenges Rules of Evidence might also an affidavit or similar written
and result in stipulations to the be considered for authentication statement rather than the live tes-
authenticity of electronic signa- of documents presented, signed, timony of a qualified witness. In
tures created by that and com- secured, archived and retrieved addition to the affidavit require-
parable systems, such that in the using electronic signatures and ments, there is a notice require-
initial cases witness testimony is records generated by an HRIS. ment to afford opposing parties an
required but in future and sub- As Judge Grimm noted: “Rule opportunity to review the docu-
sequent cases it is not. Notwith- 902(11) also is extremely useful ment and affidavit to challenge
standing, from the outset, there because it affords a means of au- its authenticity.23 Thus, assuming
will be ample evidence to lay the thenticating business records un- no challenge, F.R.E. 902(11) is
appropriate foundation for the der Rule 803(6), one of the most one of the best ways to secure the
admission of electronic signatures used hearsay exceptions, without admission into evidence of signa-
created by the HRIS, assuming the need for a witness to testify tures and documents executed us-
risks are adequately managed and in person at trial.”21 The primary ing an HRIS.
appropriate witness testimony can reason one would seek to authen- As explained above, critical in
be obtained. ticate electronic evidence using the admissibility analysis and the
this rule is that it permits a written overall enforceability of documents
F.R.E. 902 declaration by a custodian rather executed using an HRIS is the re-
Although in a major dispute testi- than oral testimony, which under quirement of a secure method to
mony may be necessary regarding most circumstances makes it pref- archive and retrieve the documents
the HRIS and the authenticity of erable to F.R.E. 901(b)(4) or (b) so they cannot be altered after sig-
its process, as noted above, docu- (9). F.R.E. 902(11) addresses: nature. The HRIS should also use
ments presented, signed, secured,
a form of e-vaulting, such that the
archived and retrieved using the Certified domestic records of
regularly conducted activity. HRIS can securely archive signed
HRIS may also be admitted as self-
The original or a duplicate of documents to show the documents
authenticating documents under
a domestic record of regularly were not altered after signature, and
F.R.E. 902(7). Judge Grimm, in conducted activity that would secure retrieval capabilities. Assum-
the extremely thorough opinion be admissible under Rule 803(6)
if accompanied by a written
ing these guidelines are followed,
in Lorraine v. Markel, stated that:
declaration of its custodian or the HRIS should produce admis-
“[e]xtrinsic evidence of authen-
other qualified person, in a man- sible agreements.
ticity as a condition precedent to ner complying with any Act of
admissibility is not required with Congress or rule prescribed by Compliance Risk
respect to the following:…(7) the Supreme Court pursuant to The Compliance Risk is defined
Trade inscriptions and the like. statutory authority, certifying
as the risk that the HRIS fails to
that the record—
Inscriptions, signs, tags, or labels comply with legal and regula-
purporting to have been affixed (A) was made at or near the time
tory requirements. This might
of the occurrence of the matters
in the course of business and in- set forth by, or from information result in employees being able to
dicating ownership, control, or transmitted by, a person with void electronically signed agree-
origin.”19 “Under Rule 902(7), knowledge of those matters; ments.24 Employers must be
labels or tags affixed in the course (B) was kept in the course of the aware that their HRIS may need
of business require no authen- regularly conducted activity; and to be configured to meet certain
tication. The HRIS will collect (C) was made by the regularly legal and regulatory requirements,
and record information showing conducted activity as a regular depending on states where the
the entire signature ceremony. practice.22 agreements are signed, industry,
The identification markers alone or other issues. This might require
stored in the secure container Rule 902(11) was designed to that each agreement presented
may be sufficient to authenticate work in tandem with an amend- and/or signed by the employee is
© 2009 Thomson Reuters. This publication was created to provide you with accurate and authoritative information
concerning the subject matter covered; however, this publication was not necessarily prepared by persons licensed to
HR ADVISOR practice law in a particular jurisdiction. The publisher is not engaged in rendering legal or other professional advice and
this publication is not a substitute for the advice of an attorney. If you require legal or other expert advice, you should
JULY/AUGUST 2009
seek the services of a competent attorney or other professional. For authorization to photocopy, please contact the
Copyright Clearance Center at 222 Rosewood Drive, Danvers, MA 01923, USA (978) 750-8400; fax (978) 646-8600
22 or West’s Copyright Services at 610 Opperman Drive, Eagan, MN 55123, fax (651) 687-7551. Please outline the spe-
cific material involved, the number of copies you wish to distribute and the purpose or format of the use.
Reviewing Your HRIS System To Ensure It Creates Admissible and Persuasive Records

presented in such a way, i.e., con- ated with a paper and wet ink signature process has less risk than
tent, sequence, and disclosure, so process. Considering the risks of the paper and wet ink process.
that no regulatory objection can the electronic signature process In having identified the six
be made to enforcement. Users relative to the corresponding risks risks that can be mitigated using
may configure HRIS to reduce associated with the paper and wet the e-Risk Analysis Framework,
the compliance risk associated ink signature process allows users we now move to a discussions of
with the transactions below the to better assess the risks inherent in four cases that demonstrate how
risk associated with similar trans- the electronic process, versus risks some of these risks have played
actions using wet ink and paper that are inherent in every process. out in employment disputes.
by designing the HRIS so that all Our view is that HRIS is ca- Campbell v. General Dynamics:
regulatory disclosures are made pable of being configured to re- Failure to Mitigate the
before an employee can sign, duce the risks considerably below Repudiation, Adoption, and
Relative Risks Results in
through use of the audit trail, and the corresponding risks of using pa- Unenforceable Arbitration
setting up auto notifications when per and wet ink. For example, an Agreement
certain compliance issues arise. HRIS can be configured to pre- Campbell v. General Dynamics
Adoption Risk
vent an agreement from being Government Systems Corporation25
signed by the employee if there shows what can happen when a
This is the risk that employ-
are any blanks in the document company fails to adequately con-
ees will fail to adopt the HRIS
to be signed, prevent any docu- sider the repudiation risks when
because it is too burdensome,
ment from being submitted by implementing a new HRIS pro-
complicated, or otherwise non-
the employee unless all of the cess. The decision also provides
employee friendly. Companies
required steps, including execu- some interesting discussion points
should be able to reduce the
tion of or acknowledgement of for employers looking to mitigate
adoption risk by beta testing their
receipt of all disclosures, are ful- the adoption and relative risks.
HRIS with a select group of em-
filled, prevent loss of all or por- In that case, General Dynam-
ployees to work out any adoption
tions of documents, and prevent ics failed to ensure that its HRIS
type issues. Employers should also
employees from crossing out or gave Mr. Campbell, its employee,
offer employees various types of
modifying portions of documents adequate notice of the changes
incentives to encourage HRIS
or other issues common with in the terms of his employment,
use, such as making employee pay
hard copy agreements. Moreover, which allowed Campbell to re-
and benefits information avail-
an HRIS can more easily track pudiate his employer’s arbitration
able on the HRIS, requiring em-
which employees have signed the policy of which he had received
ployees to use HRIS for vacation
necessary agreements and alert notice through email. Notwith-
or other personnel requests, or
the necessary personnel to take standing the Court’s failure to
even providing other incentives
actions regarding unsigned docu- enforce the arbitration agreement
to get employees to use the sys-
ments. Once signed, the HRIS against Mr. Campbell, it did dis-
tem. Moreover, the HRIS should
secures the agreements from be- cuss several methods employers
be designed so that the system
ing altered without detection or should consider in designing and
tracks and, when necessary, will
lost. Employers may configure implementing an HRIS to miti-
send alerts to HR, management
HRIS for various types of signa- gate the risks identified by the e-
or other designated parties, if em-
ture ceremonies for various types Risk Analysis Framework.
ployees fail to adopt and therefore
of employees. This configuration General Dynamics sought to re-
do not sign agreements or review
can calibrate the risk mitigation quire all of its employees, as a con-
notices presented through the sys-
approaches discussed in this arti- dition of their continued employ-
tem. Such efforts should mitigate
cle, with the employer’s concerns ment, to resolve all future employ-
against the adoption risk.
about the various risks for each ment disputes or claims through
Relative Risk category of employee. This can binding arbitration. Instead of us-
It is important for employers to be done in such a way that the ing its traditional method of send-
consider the risks of a given HRIS employer can, in all likelihood, ing employees such policy changes
in the context of the risks associ- configure HRIS so the electronic in hard copy that required the
© 2009 Thomson Reuters. This publication was created to provide you with accurate and authoritative information
concerning the subject matter covered; however, this publication was not necessarily prepared by persons licensed to
HR ADVISOR practice law in a particular jurisdiction. The publisher is not engaged in rendering legal or other professional advice and
this publication is not a substitute for the advice of an attorney. If you require legal or other expert advice, you should
JULY/AUGUST 2009
seek the services of a competent attorney or other professional. For authorization to photocopy, please contact the
Copyright Clearance Center at 222 Rosewood Drive, Danvers, MA 01923, USA (978) 750-8400; fax (978) 646-8600
23 or West’s Copyright Services at 610 Opperman Drive, Eagan, MN 55123, fax (651) 687-7551. Please outline the spe-
cific material involved, the number of copies you wish to distribute and the purpose or format of the use.
Reviewing Your HRIS System To Ensure It Creates Admissible and Persuasive Records

employees wet ink signature to ac- Both opinions discussed the waive the employee’s right to
knowledge receipt of the change, various reasons General Dynamics’ bring workplace disputes in court.
General Dynamics notified all of email provided insufficient notice Based on General Dynamic’s
its employees through a new email to Mr. Campbell, each of which failures, the court held that, “a
system. There was no dispute that is instructive in highlighting one reasonable employee could read
Mr. Campbell received the e-mail, or more of the risks identified and the e-mail announcement and
however, the actual arbitration mitigated by application of the e- conclude that the Policy pre-
policy and the revised employee Risk Analysis Framework. sented an optional alternative to
handbook were not contained in In an example of how General litigation rather than a mandatory
the text of the e-mail. Instead, the Dynamics failed to mitigate the replacement for it.”26 Notwith-
email contained a hyperlink that, if adoption risk, the court discussed standing the court’s decision not
accessed by Mr. Campbell, brought how this was General Dynamics’ to enforce the arbitration agree-
him to a Web site containing the first attempt at communicating a ment against Mr. Campbell, the
policy. General Dynamics’ system change to its employment policies court did explicitly recognize, an
did not track whether Mr. Camp- to its employees through email “e-mail, properly couched, can be
bell accessed the Web site contain- instead of through its traditional an appropriate medium for form-
ing an arbitration agreement.”27
ing the policy. method, e.g., by sending the em-
The lesson of General Dynam-
Mr. Campbell brought suit in ployee an actual copy of the pol-
ics is simple: mitigate up front the
court seeking to recover damages icy memorializing the significant
risks in the design and implemen-
for discrimination on the basis of change in writing, requiring the
tation phase of an HRIS so that
a disability. General Dynamics re- employee’s “wet ink” signature,
it clearly requires employee adop-
sponded with a motion to compel and then placing the signed writ-
tion, and provides clear and ex-
arbitration under the electroni- ing in the employee’s personnel
plicit notice to employees of the
cally sent arbitration policy. As folder. In failing to mitigate the terms, conditions or changes in
reported in the District Court and risk, General Dynamics could not their employment, thereby pre-
First Circuit Court of Appeals de- show that Mr. Campbell, a user venting repudiation and allow-
cisions, Mr. Campbell argued that of the paper and wet ink system, ing the employer to prove that
the policy did not apply to him adopted (or used) the new HRIS. its employees received notice of
because the General Dynamics’ General Dynamics also failed these terms, conditions or chang-
notification process, consisting of to mitigate the repudiation risk es and should be bound.
the email containing the hyper- because it failed to have Mr.
Kerr v. Dillard: The HRIS’s
link, did not provide him with Campbell elicit a response or ac- Failure to Mitigate the
sufficient notice of the policy knowledgment he had read the Authentication, Adoption
change requiring all employees to e-mail and the link to the new and Relative Risk Led to the
Court’s Refusal to Enforce an
arbitrate employer-employee dis- policy, such as requiring him to Arbitration Agreement
putes. Therefore, Mr. Campbell acknowledge receipt or to click a The recent case of Kerr v. Dillard
argued General Dynamics could box on a computer screen indi- provides a good example of where
not bind him to arbitration. cating that he had read the pol- an HRIS implementation failed
In separate opinions, both the icy. This allowed Mr. Campbell to address the authentication, rel-
District Court and then the First to repudiate the agreement, or in ative and adoption risks.28 There,
Circuit Court of Appeals sided other words, argue that while he Dillard’s29 implemented an HRIS
with Mr. Campbell, finding that had received the email, he never that required all of its store asso-
General Dynamics’ e-mail process saw the agreement. ciates to electronically sign em-
did not give Mr. Campbell suffi- General Dynamics failed to ployment arbitration agreements
cient notice of a change in policy state in the substance of the e- through mydillards.com, Dillard’s
necessary for the Court to hold mail that the new arbitration pol- employee intranet system. Every
that Mr. Campbell had waived icy had contractual significance Dillard’s associates had a unique,
his right to bring employment and that the policy contained an confidential password, created by
discrimination claims in court. arbitration provision that would and known only to the associate.
© 2009 Thomson Reuters. This publication was created to provide you with accurate and authoritative information
concerning the subject matter covered; however, this publication was not necessarily prepared by persons licensed to
HR ADVISOR practice law in a particular jurisdiction. The publisher is not engaged in rendering legal or other professional advice and
this publication is not a substitute for the advice of an attorney. If you require legal or other expert advice, you should
JULY/AUGUST 2009
seek the services of a competent attorney or other professional. For authorization to photocopy, please contact the
Copyright Clearance Center at 222 Rosewood Drive, Danvers, MA 01923, USA (978) 750-8400; fax (978) 646-8600
24 or West’s Copyright Services at 610 Opperman Drive, Eagan, MN 55123, fax (651) 687-7551. Please outline the spe-
cific material involved, the number of copies you wish to distribute and the purpose or format of the use.
Reviewing Your HRIS System To Ensure It Creates Admissible and Persuasive Records

Dillard’s, however, also gave store the subject of the litigation. On and intentionally executed the ar-
supervisors the ability to log in to the previous day, April 27, Ms. bitration agreement.30 While the
an associate’s account by resetting Kerr had missed work. When Ms. court did not accuse Ms. Kerr’s
the associate’s confidential pass- Kerr’s supervisor asked Ms. Kerr supervisor of signing the arbitra-
word and logging in under the as- why she had missed a scheduled tion agreement, it recognized
sociate’s default password. day of work, Ms. Kerr attribut- that such a scenario was at least
After an associate accessed my- ed her absence to not knowing possible, or even that Ms. Kerr
dillards.com, the system required how to access her work sched- may have accidentally executed
the associate to execute the em- ule through mydillards.com. Ms. the arbitration agreement herself,
ployee arbitration agreement by: Kerr’s supervisor then took Ms. thereby not knowingly and in-
(1) entering his or her social se- Kerr to the Dillard’s employee tentionally signing it.31 Dillard’s
curity number or associate iden- break room, where Dillard’s had a might have overcome this if it
tification number (AIN); (2) en- computer kiosk for employee use, could have shown that Ms. Kerr
tering his or her secure password; to show Ms. Kerr how to access had adopted the system, but, since
and (3) clicking the “accept” her schedule on mydillards.com, Ms. Kerr had only accessed the
option at the bottom of the ar- and the supervisor actually ac- system on three occasions over a
bitration agreement screen. The cessed her account for her through period of at least five months, it
system would then generate an the default password. The system was unable to do so. Since Dil-
e-mail to the associate’s Dillard’s recorded that at or near this time, lard’s failed to meet its burden of
e-mail account, confirming that Ms. Kerr signed her employment proof at trial, the court denied its
the associate had signed the arbi- arbitration agreement and a con- motion to compel Ms. Kerr to
tration agreement. firmation e-mail was sent to Ms. arbitrate her employment claims
In an example of Dillard’s fail- Kerr’s Dillard’s e-mail account, and the litigation continued, in
ing to mitigate the adoption risk, which was opened. The system the precise forum the employer
for a period of five months Ms. records also demonstrated that the sought to avoid.
Kerr refused her supervisors’ re- e-mails on Ms. Kerr’s intranet ac-
Verizon v. Pizzirani:
peated requests that she log on count were opened on only three Repudiation Can be Overcome
to her mydillards.com account to previous occasions: February 10, if Opportunity to Review and
electronically sign her employee April 28 and August 24, 2006. Assent is Given
arbitration agreement. Ms. Kerr Some time later, Dillard’s Verizon Communications v. Pizzi-
based her refusal on the misun- terminated Ms. Kerr, and in re- rani demonstrates that when an
derstanding that when she first sponse, she brought race dis- employer can show a properly de-
became employed at Dillard’s, crimination claims against Dil- signed and risk mitigating HRIS,
she had not signed an employee lard’s. Dillard’s moved to compel a court is more likely to bind the
arbitration agreement. Ms. Kerr arbitration on the basis of the employee to terms, conditions or
believed that if she accessed the electronically signed employee changes in employment commu-
HRIS and electronically signed arbitration agreement. Ms. Kerr nicated through the HRIS.32
the employee arbitration agree- denied ever having signed the ar- Plaintiff Verizon sued Mr.
ment, she would give up some of bitration agreement or having re- Pizzirani, a former highly com-
her legal rights. ceived the confirming e-mail. pensated executive in Verizon’s
Five months after Dillard’s Unfortunately for Dillard’s, broadband division who had re-
first implemented the employee its system did not adequately ad- signed to work for a Verizon com-
arbitration requirement on my- dress the authentication and re- petitor, Comcast. Verizon sought
dillards.com, Ms. Kerr had still pudiation risks because it could enforcement of a 12-month non-
not adopted the system. In fact, not show that only Ms. Kerr had competition restrictive covenant
the evidence at trial showed Ms. access to her account. Therefore, that Mr. Pizzirani had received
Kerr had only accessed the system Dillard’s was unable to meet its in an e-mail as a participant in
on three occasions: February 10, burden of proof at trial to show, Verizon’s Long Term Incentive
April 28, and August 24, 2006, by a preponderance of the evi- Plan, which awarded Verizon
with the April 28 access being dence, that Ms. Kerr knowingly employees with both Restricted
© 2009 Thomson Reuters. This publication was created to provide you with accurate and authoritative information
concerning the subject matter covered; however, this publication was not necessarily prepared by persons licensed to
HR ADVISOR practice law in a particular jurisdiction. The publisher is not engaged in rendering legal or other professional advice and
this publication is not a substitute for the advice of an attorney. If you require legal or other expert advice, you should
JULY/AUGUST 2009
seek the services of a competent attorney or other professional. For authorization to photocopy, please contact the
Copyright Clearance Center at 222 Rosewood Drive, Danvers, MA 01923, USA (978) 750-8400; fax (978) 646-8600
25 or West’s Copyright Services at 610 Opperman Drive, Eagan, MN 55123, fax (651) 687-7551. Please outline the spe-
cific material involved, the number of copies you wish to distribute and the purpose or format of the use.
Reviewing Your HRIS System To Ensure It Creates Admissible and Persuasive Records

Stock Options and Performance line where he acknowledged and hard drive or expand the default
Stock Units (“Awards”). Mr. Piz- agreed to all terms. size viewing screen. The court
zirani, as an Award recipient, had In his defense, Mr. Pizzirani did also found it compelling that Mr.
been advised in bolded language not contest that he had executed the Pizzirani had no time pressure
through e-mails from Verizon’s Award Agreements by electronic to read and sign the agreements.
human resources department in signature, but instead claimed that Verizon gave him more than a
2005 and 2006 of the following he did not read the contracts prior month to read and electronically
terms and conditions relating to to electronically signing them and sign the documents.
his acceptance of the Awards: asserted that he was completely un- Because Verizon went to great
aware of the restrictive covenants lengths to ensure that its employ-
As you access you [sic] award on- contained in them until October ees understood the importance of
line, it is important that you read
and understand the terms and
2006. In essence, Mr. Pizzirani at- reading the documents, the court
conditions of the Award Agree- tempted to repudiate the terms of found little evidence that Veri-
ments. When accepting your his agreement by claiming he never zon intended to misrepresent the
award on-line, you acknowledge read them. terms of the Award Agreements.
that you have read both the award
The court refused, enforcing
agreements and Plan document, Bell v. Hollywood: The
including the terms [and] condi- the non-competition agreements Employer’s Evidence of
tions regarding vesting, restrictive against Mr. Pizzirani and barring Knowing & Voluntary Consent
covenants and the provisions con- him from accepting a competi- Binds Employee
cerning award payouts.33 tor’s offer of employment. The Bell v. Hollywood Entertainment
court recognized that, under Corporation presents another ex-
On March 17, 2005, Mr. Piz- “New York law, a valid contract ample of an HRIS that did ad-
zirani clicked on the “I AC- is formed by manifestation of as- dress the risks raised in the e-Risk
KNOWLEDGE” button on the sent, including checking a box Analysis Framework. In that case,
bottom of the e-mail, whereby he or clicking a button on a com- the court granted the employer’s
acknowledged that he understood puter screen, as in this case[,]”35 motion to compel the employee
that, in accepting such Award, and that “parties are bound by to arbitration because the HRIS
he would be bound by the non- the contracts they sign, whether effectively communicated to Ms.
competition restrictive covenant. or not the party has read the con- Bell the requirement that she ar-
In 2006, however, Mr. Pizzi- tract so long as there is no fraud, bitrate all employment disputes.37
rani did not click on the “I AC- duress or some other wrongful act There, Ms. Bell completed her
KNOWLEDGE” button, which of the other party.”36 The court employment application pro-
resulted in the HRIS informing also stated that Mr. Pizzirani had cess electronically either through
human resources that Mr. Pizzi- a reasonable opportunity to know a Hollywood in-store kiosk or
rani had failed to acknowledge. the essential terms and character over the Internet through Hol-
In response to a call from Ve- of the agreements, Verizon en- lywood’s Web site. Hollywood’s
rizon’s human resources, Mr. couraged him to read them, and application process required, as a
Pizzirani drafted and sent the fol- he was adequately warned by e- condition to Ms. Bell’s employ-
lowing e-mail to an employee in mail that, through his acceptance, ment, that she agree to submit all
the human resources department: he certified that he had read, un- claims involving workplace dis-
“John I will read and agree to derstood and agreed to be bound putes to binding arbitration.
the terms and conditions of the by the agreements and restrictive Ms. Bell later commenced an
award agreement and Plan docu- covenants. action against Hollywood for
ments.”34 After Verizon’s human Mr. Pizzirani also complained maintaining a hostile work en-
resources department received the that he was only able to view the vironment, allowing sexual ha-
email certification that Mr. Pizzi- document in a small box on the rassment to occur in the work-
rani had read and understood and computer screen, but Verizon place and for civil battery. As
agreed to the terms of the Award, demonstrated that its system gave Mr. Campbell had argued against
that department granted Mr. Piz- Mr. Pizzirani the ability to print General Dynamics, and Ms. Kerr
zirani access to the agreement on- the agreements, save them to his against Dillard, Ms. Bell argued
© 2009 Thomson Reuters. This publication was created to provide you with accurate and authoritative information
concerning the subject matter covered; however, this publication was not necessarily prepared by persons licensed to
HR ADVISOR practice law in a particular jurisdiction. The publisher is not engaged in rendering legal or other professional advice and
this publication is not a substitute for the advice of an attorney. If you require legal or other expert advice, you should
JULY/AUGUST 2009
seek the services of a competent attorney or other professional. For authorization to photocopy, please contact the
Copyright Clearance Center at 222 Rosewood Drive, Danvers, MA 01923, USA (978) 750-8400; fax (978) 646-8600
26 or West’s Copyright Services at 610 Opperman Drive, Eagan, MN 55123, fax (651) 687-7551. Please outline the spe-
cific material involved, the number of copies you wish to distribute and the purpose or format of the use.
Reviewing Your HRIS System To Ensure It Creates Admissible and Persuasive Records

that she had received inadequate EXHIBIT 1


notice from Hollywood concern-
Use the e-Risk Analysis Framework to Identify and Mitigate the Risks Associated
ing the requirement that all of her with the Design and Implementation of an HRIS
workplace employment claims be
The e-Risk Analysis Framework is designed to assist employers in identifying and
resolved through binding arbitra- mitigating the six principal risks of an HRIS. The mitigation of these risks will help
tion. Unlike in the other cases, employers avoid the sorts of issues raised in the Campbell v. General Dynamics, Kerr
v. Dillard, Bell v. Hollywood and Verizon v. Pizzirani cases, and should allow employers
however, the court in Hollywood to conclude, as we do from our own experience with our clients, that companies can,
found for the employer, hold- through the use of a well thought-out HRIS, actually design and implement a system
ing that Ms. Bell had agreed to that equates with, and in many cases reduces, the risks associated with having
employees continue to sign notices, acknowledgements or agreements in wet ink, and
arbitrate her workplace disputes then storing those documents in hard copy.
because Hollywood could show,
conclusively, that Ms. Bell had
received information about the Bell either acknowledge or deny clients identify and mitigate the risks in
moving to e-process solution.
arbitration policy, provided evi- that she knew how to access the 4. Problems such as lost or unsigned signature
dence that she read and under- connecting links. The Holly- pages, pen and ink modification to
wood system also minimized re- agreements, lost, missing or misplaced pages
stood the terms and conditions and/or personnel files, all become problems
of the policy, and that she had pudiation by requiring Ms. Bell of the past, or, more appropriately,
agreed to be bound to them as a to choose “yes” or “no” in re- problems of the paper and wet ink world.
5. Campbell v. General Dynamics
condition of her employment.38 sponse to her consent to arbitrate
Government Systems Corp., 407 F.3d 546,
The appellate court affirmed the any and all employment disputes 16 A.D. Cas. (BNA) 1361, 151 Lab. Cas.
lower court’s decision to compel with Hollywood, thereby con- (CCH) P 60002 (1st Cir. 2005); Verizon
Communications Inc. v. Pizzirani, 462
arbitration because it found that firming her agreement. Finally, F. Supp. 2d 648 (E.D. Pa. 2006); Bell v.
Ms. Bell “had the legal capacity Hollywood’s system also forced Hollywood Entertainment Corp.,, 2006-
to contract, signed the agreement Ms. Bell to confirm that she knew Ohio-3974, 2006 WL 2192053 (Ohio Ct.
App. 8th Dist. Cuyahoga County 2006);
and was sufficiently informed re- how to access Hollywood’s Web Kerr v. Dillard Store Services, Inc., 2008
garding the program. She was site to obtain the complete arbi- WL 687014 (D. Kan. 2008).
informed on how to obtain addi- tration policy (even though there 6. Readers should also note that contractual
enforceability is governed by state law,
tional information, confirmed that was no apparent evidence she ac- regardless of whether the dispute is heard
she understood how to obtain ad- tually reviewed such policy).40 in federal or state court. Nearly all states
ditional information, and know- require the same three elements for the
The lesson of Bell v. Hollywood
formation of a contract: (1) a meeting of
ingly and voluntarily consented to for employers looking to imple- the minds, (2) an offer and acceptance,
arbitrate her employment claims ment an HRIS is the same as that and (3) the exchange of consideration (the
against [Hollywood].”39 exchange of something of value).
discussed above, in connection 7. Many states have adopted rules of evidence
In analyzing the risks identified with Campbell v. General Dynam- that track the Federal Rules of Evidence
in the e-Risk Analysis Frame- ics and Kerr v. Dillard: employers (FRE). For purposes of this article all cited
work, one need only look to the cases are based on the FRE or state law
must design and implement their that follows the FRE. This article does not
factors relied upon by the court system so it mitigates the prevent- address admissibility concerns beyond legal
in reaching its decision. To mini- able risks. authentication.
mize repudiation, Hollywood, in 8. Repeated use of the same or similar signing
n ceremonies will also greatly contribute to
its electronic application process, the admissibility of documents signed using
presented Ms. Bell with a screen NOTES
an HRIS.
that informed her that all claims 9. This would require the employer to
1. The term HRIS is used broadly to include provide a witness with personal or expert
would be submitted to arbitra- any electronic computerized system that knowledge to testify (in person or via
tion pursuant to Hollywood’s lets employers and employees interact on affidavit) as to how each document was
employment related issues. presented, signed, secured after signature
Employment Issue Resolution 2. Employer-employee notices, policies, to render it unalterable without detection,
Program (EIRP), with a link to disclosures and agreements will be archived, retrieved and printed. This
a summary of the EIRP Rules collectively referred to as “agreements” person will also testify as to the integrity
throughout this article. and security of each system involved in
or, if Ms. Bell desired, a link to
3. Locke Lord Bissell & Liddell LLP has creating, securing, archiving, retrieving
a Web site containing a full copy developed the Six Point e-Risk Analysis and printing the document and should be
of the rules and required that Ms. Framework through its work in helping qualified as an expert in that field.

© 2009 Thomson Reuters. This publication was created to provide you with accurate and authoritative information
concerning the subject matter covered; however, this publication was not necessarily prepared by persons licensed to
HR ADVISOR practice law in a particular jurisdiction. The publisher is not engaged in rendering legal or other professional advice and
this publication is not a substitute for the advice of an attorney. If you require legal or other expert advice, you should
JULY/AUGUST 2009
seek the services of a competent attorney or other professional. For authorization to photocopy, please contact the
Copyright Clearance Center at 222 Rosewood Drive, Danvers, MA 01923, USA (978) 750-8400; fax (978) 646-8600
27 or West’s Copyright Services at 610 Opperman Drive, Eagan, MN 55123, fax (651) 687-7551. Please outline the spe-
cific material involved, the number of copies you wish to distribute and the purpose or format of the use.
Reviewing Your HRIS System To Ensure It Creates Admissible and Persuasive Records

10. See also Lorraine v. Markel American Ins. 2. The computer is reliable. 26. Campbell v. General Dynamics
Co., 241 F.R.D. 534, 541-542, 73 Fed. R. Government Systems Corp., 407 F.3d 546,
Evid. Serv. 446 (D. Md. 2007).
3. The business has developed a
558, 16 A.D. Cas. (BNA) 1361, 151 Lab.
11. State v. Swinton, 268 Conn. 781, 812, procedure for inserting data into
the computer. Cas. (CCH) P 60002 (1st Cir. 2005).
847 A.2d 921 (2004) (applying the federal
27. Campbell v. General Dynamics
standard to a state case.) 4. The procedure has built-in Government Systems Corp., 407 F.3d 546,
12. State v. Swinton, 268 Conn. 781, 813, 814, safeguards to ensure accuracy and
847 A.2d 921 (2004) (applying the federal 555, 16 A.D. Cas. (BNA) 1361, 151 Lab.
identify errors. Cas. (CCH) P 60002 (1st Cir. 2005).
standard to a state case.)
13. Magistrate Judge Paul W. Grimm’s opinion 5. The business keeps the com- 28. Kerr v. Dillard Store Services, Inc., 105
in Lorraine v. Markel American Insurance puter in a good state of repair. Fair Empl. Prac. Cas. (BNA) 1298, 92
Company provides ones of the best analyses Empl. Prac. Dec. (CCH) P 43483, 2009
6. The witness had the computer
to date of the admissibility of electronic WL 385863 (D. Kan. 2009).
evidence, which broadly could include
readout certain data.
29. The Dillard Department Store is commonly
electronic signatures. Lorraine v. Markel 7. The witness used the proper referred to as Dillard’s, so other than in the
American Ins. Co., 241 F.R.D. 534, 542, 73 procedures to obtain the readout.
Fed. R. Evid. Serv. 446 (D. Md. 2007). See, case name, we use that vernacular.
e.g.: In re Vee Vinhnee, 336 B.R. 437 (B.A.P. 8. The computer was in work- 30. Kerr v. Dillard Store Services, Inc., 105
9th Cir. 2005) (proponent failed to properly ing order at the time the witness Fair Empl. Prac. Cas. (BNA) 1298, 92
authenticate exhibits of electronically stored obtained the readout. Empl. Prac. Dec. (CCH) P 43483, 2009
business records); U.S. v. Jackson, 208 F.3d 9. The witness recognizes the WL 385863 (D. Kan. 2009).
633, 638, 53 Fed. R. Evid. Serv. 1030 (7th 31. Kerr v. Dillard Store Services, Inc., 105
exhibit as the readout.
Cir. 2000) (proponent failed to authenticate Fair Empl. Prac. Cas. (BNA) 1298, 92
exhibits taken from an organization’s Web 10. The witness explains how he
Empl. Prac. Dec. (CCH) P 43483, 2009
site); St. Luke’s Cataract and Laser Institute, or she recognizes the readout.
WL 385863 (D. Kan. 2009).
P.A. v. Sanderson, 70 Fed. R. Evid. Serv.
174 (M.D. Fla. 2006) (excluding exhibits
11. If the readout contains strange 32. Verizon Communications Inc. v. Pizzirani,
because affidavits used to authenticate symbols or terms, the witness ex- 462 F. Supp. 2d 648 (E.D. Pa. 2006).
exhibits showing content of web pages plains the meaning of the symbols 33. Verizon Communications Inc. v. Pizzirani,
were factually inaccurate and affiants lacked or terms for the trier of fact. 462 F. Supp. 2d 648, 652 (E.D. Pa. 2006).
personal knowledge of facts); Rambus, Inc. 34. Verizon Communications Inc. v. Pizzirani,
v. Infineon Technologies AG, 348 F. Supp. 18. In re Vee Vinhnee, 336 B.R. 437, 462 F. Supp. 2d 648, 653 (E.D. Pa. 2006).
2d 698, 66 Fed. R. Evid. Serv. 16 (E.D. 447 (B.A.P. 9th Cir. 2005). Opposing
35. Verizon Communications Inc. v. Pizzirani,
Va. 2004) (proponent failed to authenticate parties often allege that computer records
462 F. Supp. 2d 648, 655 n.3 (E.D. Pa.
computer generated business records); Wady have been tampered with and thus lack
authenticity. Such claims have been 2006).
v. Provident Life and Accident Ins. Co. of
America, 216 F. Supp. 2d 1060 (C.D. Cal. viewed as “almost wild-eyed speculation… 36. Verizon Communications Inc. v. Pizzirani,
2002) (sustaining an objection to affidavit without some evidence to support such a 462 F. Supp. 2d 648, 655 (E.D. Pa. 2006)
of witness offered to authenticate exhibit scenario….” U.S. v. Whitaker, 127 F.3d (internal quotations omitted).
that contained documents taken from 595, 602, 47 Fed. R. Evid. Serv. 1197 (7th 37. Bell v. Hollywood Entertainment Corp.,
defendant’s Web site because affiant lacked Cir. 1997).
2006-Ohio-3974, 2006 WL 2192053
personal knowledge); Indianapolis Minority 19. Lorraine v. Markel American Ins. Co., 241
(Ohio Ct. App. 8th Dist. Cuyahoga
Contractions Association, Inc. v. Wiley, F.R.D. 534, 549, 73 Fed. R. Evid. Serv.
446 (D. Md. 2007). County 2006).
1998 WL 1988826 at *7 (S.D. Ind. 1998),
20. Lorraine v. Markel American Ins. Co., 241 38. Bell v. Hollywood Entertainment Corp.,
judgment aff’d, 187 F.3d 743 (7th Cir. 1999)
(proponent of computer records failed to F.R.D. 534, 73 Fed. R. Evid. Serv. 446 2006-Ohio-3974, 2006 WL 2192053
(D. Md. 2007), quoting Weinstein’s Federal (Ohio Ct. App. 8th Dist. Cuyahoga
show that they were from a system capable
Evidence § 900.07[3]. County 2006).
of producing reliable and accurate results,
21. Lorraine v. Markel American Ins. Co., 241
and therefore, failed to authenticate them).” 39. Bell v. Hollywood Entertainment Corp.,
F.R.D. 534, 552, 73 Fed. R. Evid. Serv.
14. Lorraine v. Markel American Ins. Co., 241 2006-Ohio-3974, 2006 WL 2192053
446 (D. Md. 2007).
F.R.D. 534, 544, 73 Fed. R. Evid. Serv. (Ohio Ct. App. 8th Dist. Cuyahoga
22. Federal Rules of Evidence 902 (11).
446 (D. Md. 2007). County 2006).
23. Federal Rules of Evidence 902 (11) at 773
15. Lorraine v. Markel American Ins. Co., 241
at footnote 4. 40. The Bell v. Hollywood court even quoted
F.R.D. 534, 549, 73 Fed. R. Evid. Serv.
24. A regulatory violation does not from Campbell v. General Dynamics, in
446 (D. Md. 2007). necessarily void an agreement, or even
16. State v. Swinton, 268 Conn. 781, 811, 847 noting that a “signature may not be
make it voidable, but may just lead to
A.2d 921 (2004). denied legal effect or enforceability solely
penalties or fines.
17. Edward J. Imwinkelried, Evidentiary because it is in electronic form … [and a]
25. Campbell v. General Dynamics
Foundations, 58-59 (LexisNexis 6th ed. 2005). Government Systems Corp., 407 F.3d 546, contract may not be denied legal effect or
16 A.D. Cas. (BNA) 1361, 151 Lab. Cas. enforceability because an electronic record
1. The business uses a computer. (CCH) P 60002 (1st Cir. 2005). was used in its formation.”

© 2009 Thomson Reuters. This publication was created to provide you with accurate and authoritative information
concerning the subject matter covered; however, this publication was not necessarily prepared by persons licensed to
HR ADVISOR practice law in a particular jurisdiction. The publisher is not engaged in rendering legal or other professional advice and
this publication is not a substitute for the advice of an attorney. If you require legal or other expert advice, you should
JULY/AUGUST 2009
seek the services of a competent attorney or other professional. For authorization to photocopy, please contact the
Copyright Clearance Center at 222 Rosewood Drive, Danvers, MA 01923, USA (978) 750-8400; fax (978) 646-8600
28 or West’s Copyright Services at 610 Opperman Drive, Eagan, MN 55123, fax (651) 687-7551. Please outline the spe-
cific material involved, the number of copies you wish to distribute and the purpose or format of the use.

Вам также может понравиться