Legal LinkzLegal LinkzLegal Linkz
  • About Us
  • NBA
  • FIDA
  • NBAWF
  • Judiciary
  • Crime
  • International
  • Events
  • Contact
Font ResizerAa
Font ResizerAa
Legal LinkzLegal Linkz
  • My Feed
  • My Saves
  • My Interests
Search
  • ABOUT
  • NBA
  • FIDA
  • NBAWF
  • JUDICIARY
  • CRIME
  • INTERNATIONAL
  • CONTACT
Have an existing account? Sign In
Follow US
© 2025 LegalLinkz. All Rights Reserved.
ACADEMIABREAKINGNBA

The Lawyer’s Guide to Authenticating Electronic Evidence in Nigeria: Folarin Aluko

LegalLinkz
Last updated: May 13, 2025 6:49 pm
LegalLinkz
Share


The Lawyer’s Guide to Authenticating Electronic Evidence in Nigeria: Folarin Aluko
SHARE

“Even the wind leaves a trail—if you know where to look.”
— African Proverb

Contents
A Brief Historical LensWhat is Authentication?Old Doctrine, New ToolsPractical Handling of Electronic EvidenceHow to Authenticate Electronic Evidence in NigeriaFinal Reflections

In a time when deepfakes, filters, and artificial intelligence distort the boundaries of perception, today’s legal practitioner must become a master of both law and technology. A single WhatsApp message can tilt the scale in a multimillion-naira contract dispute. A screenshot may decide guilt or innocence in a criminal trial.

Digital evidence has not only entered the courtroom—it is reshaping it. In this digital age, authentication is the compass lawyers use to navigate an environment where information is abundant but trust is rare. For Nigerian lawyers, this transformation offers opportunity, immense responsibility, and the burden of evolution.

A Brief Historical Lens

Electronic evidence is not a stranger to the Nigerian legal system. As far back as Esso West Africa Inc. v. T. Oyegbola (1969) 1 N.M.L.R 194, the Supreme Court acknowledged the inevitable influence of computers on modern litigation, stating:

- Advertisement -
Ad image

“The law cannot be and is not ignorant of modern business methods and must not shut its eyes to the mysteries of the computer.”

However, it wasn’t until the Evidence Act of 2011, particularly Section 84, that courts were given a structured legal framework for admitting electronically generated documents. The legal landscape was further updated with the Evidence (Amendment) Act, 2023, expanding provisions to include digital signatures, electronic oaths, and computer simulations.

Despite these developments, many practitioners continue to stumble at a critical threshold: authentication—the legal and technical bridge between a document’s mere existence and its admissibility.

What is Authentication?

Authentication is the process of proving that evidence is what it purports to be. It’s not just about whether a file exists or a message was forwarded—it’s about origin, integrity, and reliability.

In digital evidence, authentication ensures the evidence is genuine. Relevance connects it to the case. Once both are satisfied, admissibility is determined. However, weight is assessed by the court, considering factors like reliability, method of collection, and metadata.

In the past, authentication might involve an original contract or handwriting verification. Today, it might mean interpreting server logs, metadata, timestamps, or even lines of code.

- Advertisement -
Ad image

I once handled a case where the opposing party submitted photos as evidence of service. The embedded timestamps showed the photos were taken months after the claimed service date. The device name didn’t match the one listed in the Certificate. The court rejected the evidence, causing the claim to collapse. A stark reminder of the importance of scrutinizing digital evidence and metadata.

Old Doctrine, New Tools

Section 84 of the Evidence Act remains the cornerstone of digital authentication in Nigeria. It provides two primary methods:

  1. Oral testimony from the document’s creator or custodian.
  2. Certificate of compliance, detailing how the document was produced and verifying system functionality.

This dual approach was affirmed by the Supreme Court in Dickson v. Sylva (2017) 8 NWLR (Pt. 1567) 167. Reliability here refers to consistent system performance, while integrity assesses whether the data has remained unchanged from creation to court presentation.

Ultimately, authentication is not about technology alone. It is about trust—in process, system, and intention.

Practical Handling of Electronic Evidence

  1. Understand the Nature of the Evidence
    Is it a text, screenshot, email, audio, or social media post? Each has vulnerabilities. Screenshots can be altered. Tweets deleted. Emails spoofed. During an IP mediation, a party submitted a WhatsApp screenshot to prove jingle ownership. The message was real—but the timestamp was fake, altered by changing the phone’s clock. The format rendered it unreliable.
  2. Preserve the Chain of Custody
    From collection to court, every access, copy, and modification must be logged. This audit trail protects the evidence from challenges of tampering.
  3. Collect Metadata
    Metadata contains creation dates, authorship, file history, and more. Sometimes, it tells the story that the content doesn’t.
  4. Engage Digital Forensics Experts
    Forensic professionals provide technical validation, extract data properly, and prepare expert reports that boost credibility.

How to Authenticate Electronic Evidence in Nigeria

Authentication is a narrative, not a checklist. But certain elements are essential:

  • Identify the Source: Who created the file? Can they testify to it?

  • Document Chain of Custody: Record all handling from start to finish.

Secure a Certificate of Compliance: This must state:

  • Identity and role of the certifier
  • Description of the system used
  • Confirmation that the system was operational
  • That the evidence was produced in the normal course of business
  • That it was not altered

Courts may also accept circumstantial authentication. In a recent cyberbullying case, although the defendant denied sending anonymous messages, the tone, grammar, and context mirrored previous messages. The court admitted the messages as “linguistically traceable” and accepted them.

Always anticipate objections. Be ready with server logs, forensic reports, and corroborating testimony.

Final Reflections

Having mentored young lawyers in digital rights, I’ve seen how mastering the technical side of electronic evidence transforms outcomes. As courtrooms go digital, we must recognize that while digital evidence may be silent, it leaves digital footprints—if you know how to follow them.

Tendering electronic evidence demands more than compliance certificates; it calls for an intimate understanding of how digital media works. Like the skilled hunter who reads the wind, the modern lawyer must learn to read the data—not just its content, but its journey.

Folarin Aluko is an IP Lawyer, Digital Rights Expert, and Partner at Trumann Rockwood Solicitors.
He can be reached at: fmaluko@trumann-rockwood.com

Read More:

Don’t be a headnote lawyer.

Pinciting in Legal Writing: Making the Court’s Work Easier and Boosting Your Credibility

TAGGED:admissibility of evidenceauthenticationchain of custodycourt procedurecyber lawdigital forensicsdigital rightselectronic evidenceEvidence ActFolarin Alukolegal practice Nigerialegal technologymetadataNigerian LawSection 84
Share This Article
Whatsapp Whatsapp Email Copy Link Print
What do you think?
Love0
Sad0
Happy0
Embarrass0
Surprise0
Previous Article Become an Accredited Service Provider: NBA-ICLE 
Next Article Upholding Children’s Rights: Oyinkansola Badejo-Okusanya FCIArb Advocates Legal Awareness at NBA Ikorodu’s ‘Train the Trainers’ Initiative Upholding Children’s Rights: Oyinkansola Badejo-Okusanya FCIArb Advocates Legal Awareness at NBA Ikorodu’s ‘Train the Trainers’ Initiative
Leave a Comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

You Might Also Like

Excitement Peaks as YLF Garki Branch is Set Today for its Inaugural Meeting (Physical)
BREAKINGNBA

Excitement Peaks as YLF Garki Branch is Set Today for its Inaugural Meeting (Physical)

By LegalLinkz
Access to the Internet: Bridging the gap for women and girls
ACADEMIABREAKING

Access to the Internet: Bridging the gap for women and girls

By LegalLinkz
Chief Emeka Obegolu, SAN, to Be Honoured by NBA Eti-Osa Branch for Outstanding Contributions to the Legal Profession
BREAKINGNBA

Chief Emeka Obegolu, SAN, Honoured by NBA Eti-Osa Branch for Outstanding Contributions to the Legal Profession

By LegalLinkz
BREAKINGNBA

Reserve Your Spot: Join Us for the Law Week Dinner and Networking Night

By LegalLinkz
Legal Linkz
Facebook Twitter Youtube Instagram

We are your trusted source for breaking stories, up-to-date legal news and analysis. Whether you’re a legal professional, a student, or someone simply interested in the law, we are your go-to resource for insightful articles, case analyses, and much more.

Top Categories
  • NBA
  • NBAWF
  • FIDA
  • CRIME
  • JUDICIARY
  • INTERNATIONAL NEWS
  • ACADEMIA
Usefull Links
  • Home
  • My Bookmarks
  • About Us
  • Blog
  • My Saves
  • Terms and Conditions
  • Contact

© LegalLinkz. All Rights Reserved.

© 2025 LegalLinkz.
Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?