Best suggestion: Speak to an experienced lawyer who is licensed in your jurisdiction.Shortcut list of some of the common acronyms and abbreviations used in chat rooms, SMS messages on cell phones, and instant messengers such as Yahoo and MSN.This prevents anyone from gaining unauthorised access to your account, even if they manage to get hold of your password.However, hackers and hijackers are managing to find ways around it.Two-factor authentication is a godsend for securing your accounts.
There are other tests of admissibility such as its relevance, whether the text message is the best evidence, and whether the probative value of the text outweighs any unfair prejudice.
When it comes to guys managing multiple women, phones really are smart. Years ago your average player owned a small stack of paper, bound with glue, called a black book.
While it allowed men to record details on his sexual exploits, it was an extraneous accessory that anyone could be privy to with a glance. A veritable database of contacts where a player can keep all your contact info, notes, pictures, along with a list of who you know thanks to social networks.
Preservation of the Evidence The first step is to save your evidence.
You need to screen capture the text messages or find a way to save your entire conversation so that it can be transferred, displayed, or stored on another device to be admitted at trial or deposition. Authentication A major evidentiary issue for the judge is determining whether the texts were genuinely written, sent, or received by the parties and that they contain the full conversation.