Close Menu
  • Home
  • News Update
  • Legal Updates
  • Free Legal Resources
  • Law News
  • More
    • Legal Articles & Commentaries
    • Recent Events
    • Promotions
    • About Us
    • S.C Report Online
    • S.C Report Printed Editions

Subscribe to receive Updates

Get the latest updates from us

What's Hot

NDPC Releases Data Protection Advisory Amid Growing Security Threats

April 17, 2026

Defamation and Judicial Integrity: Court Grants ₦100m Damages to Ex-Judge

April 17, 2026

Case Law Friday: Substantial Justice Over Technicalities – A Supreme Court Insight from FRN v. Odeh (2025) 4–5 S.C. (Pt. I) 1 @ 35–38

April 17, 2026
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram
Lawbreed Blog
Visit our Website
  • Home
  • News Update

    NDPC Releases Data Protection Advisory Amid Growing Security Threats

    April 17, 2026

    UK asylum deal applies only to illegal Nigerian migrants, not foreigners — Presidency

    March 21, 2026

    US jails Ex-NNPC Executive Over $2.1m Bribe

    February 26, 2026

    “Citizens Are Boss” — Acting IGP Disu Vows Zero Tolerance For Corruption And Human Rights Abuses

    February 26, 2026

    Fire guts Lagos airport old terminal, no one hurt, says FAAN

    February 23, 2026
  • Legal Updates

    Case Law Friday: Substantial Justice Over Technicalities – A Supreme Court Insight from FRN v. Odeh (2025) 4–5 S.C. (Pt. I) 1 @ 35–38

    April 17, 2026

    Recalibrating Physical Planning In Nigeria

    September 19, 2025

    How to Process a Change of Name at the Supreme Court : Updated Requirements

    May 8, 2025

    What residents should know and do about Wike’s land policy to protect properties

    April 15, 2025

    EXPLAINER: What constitution says about emergency rule, governor’s suspension

    March 19, 2025
  • Free Legal Resources

    [Download Judgment] Court convicts Nnamdi Kanu on all seven terrorism counts in Abuja

    November 20, 2025

    US court orders FBI, DEA to release records on Tinubu’s investigation (See UNITED STATES DISTRICT COURT MEMORANDUM OPINION)

    April 14, 2025

    Relief for Tinubu as U.S. judge denies Greenspan’s motion to fast-track confidential records disclosure by FBI, CIA, others

    October 24, 2023

    Nigeria wins $11bn P&ID case in UK court (Download Judgment)

    October 23, 2023

    Download: 12-hour marathon judgement delivered by the Presidential Election Petitions Court

    September 9, 2023
  • Law News

    Defamation and Judicial Integrity: Court Grants ₦100m Damages to Ex-Judge

    April 17, 2026

    Court voids CBN’s sack of Union Bank board

    March 25, 2026

    NBA condemns Sowore’s conduct at Abuja court

    March 25, 2026

    Court sentences Ekiti lecturer to death by hanging for armed robbery

    March 17, 2026

    Court Dismisses NBA Suit Challenging Police Tinted Glass Permit Policy, Rules Use Of Tinted Glass Is Not A Constitutional Right

    March 13, 2026
  • More
    • Legal Articles & Commentaries
    • Recent Events
    • Promotions
    • About Us
    • S.C Report Online
    • S.C Report Printed Editions
Lawbreed Blog
Home»Legal Articles & Commentaries»The Lawyer’s Guide To Authenticating Electronic Evidence In Nigeria
Legal Articles & Commentaries

The Lawyer’s Guide To Authenticating Electronic Evidence In Nigeria

Lawbreed LimitedBy Lawbreed LimitedMay 13, 2025No Comments7 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr Email
Folarin-Aluko
Share
Facebook Twitter LinkedIn Pinterest Email WhatsApp

In a time when deepfakes, filters, and artificial intelligence distort the boundaries of perception, today’s Legal Practitioner must become a master of the law and technology. Today, a single WhatsApp message can tilt the scale in a multimillion-naira contract dispute. A screenshot may decide guilt or innocence in a criminal trial.

Digital evidence has not only entered the courtroom—it is reshaping it and in this digital age, authentication is the compass we use to navigate an environment where information is abundant, but trust is rare. For Nigerian lawyers, this transformation offers opportunity, immense responsibility and the burden of evolution.

A Brief Historical Lens
Electronic evidence is not a stranger to the Nigerian legal system. As far back as Esso West Africa Inc. v. T. Oyegbola (1969) 1 N.M.L.R 194, the Supreme Court acknowledged the inevitable influence of computers on modern litigation, stating, “The law cannot be and is not ignorant of modern business methods and must not shut its eyes to the mysteries of the computer.”

However, it wasn’t until the Evidence Act of 2011, particularly Section 84, that the courts were given a structured legal framework for admitting electronically generated documents. The legal framework for electronic evidence has been further expanded by the Evidence (Amendment) Act, 2023 to include digital signatures, electronic oaths, and computer simulations.

But despite these developments, many practitioners continue to stumble at a critical threshold: authentication—the legal and technical bridge between a document’s mere existence and its admissibility. For all the advances in legislation, the central challenge remains the same: proving that a piece of electronic evidence is genuine, reliable, and free from tampering.

What is Authentication?
Authentication is the process of proving that evidence is what it purports to be. It’s not just about whether a file exists or a message was forwarded—it’s about origin, integrity, and reliability.

In the context of electronic evidence, authentication ensures the evidence is genuine, while relevance establishes its connection to the case. Once both are satisfied, admissibility is determined. However, the weight of evidence is assessed by the court, considering factors like reliability, collection method, and metadata.

In traditional litigation, authentication may involve presenting an original signed contract or calling a witness to verify handwriting. In the digital age, it requires interpreting server logs, timestamps, metadata, and sometimes code. The principle remains the same, but the method evolves.

A few years ago, I represented a client in a case where the opposing party tendered photographs as evidence of service. The embedded timestamps showed the photos were taken months after the service date, and the device name didn’t match the one listed in the Certificate. The court rejected the evidence, causing the claim to collapse. This underscores the importance of scrutinizing digital evidence and metadata.

Old Doctrine, New Tools
Section 84 of the Evidence Act remains the cornerstone of digital authentication in Nigeria. It provides two primary avenues for authenticating electronic evidence: oral testimony and a certificate of compliance.

Oral testimony typically involves the creator or custodian of the digital document confirming its authenticity. A Certificate, on the other hand, is a formal written statement detailing how the document was produced and affirming that the system used was functioning properly.

This dual mechanism was affirmed by the Supreme Court in Dickson v. Sylva (2017) 8 NWLR (Pt. 1567) 167, where the Court held that authentication may be satisfied by either method, provided the document meets the reliability standards prescribed by law.

And here, reliability refers to the consistent performance of the device or software used to generate the evidence. Integrity refers to whether the data has remained unchanged between creation and presentation in court.

Authentication, then, is not about format or technology alone. It is about trust—trust in process, in system, in intention. While the courts have provided the legal scaffolding for authentication, the Lawyer is responsible for bringing those rules to life through diligent, technical engagement with the evidence itself.

Practical Handling of Electronic Evidence
The first step in handling digital evidence is understanding its nature. Is it a text message, an audio file, a screenshot, an email, a social media post, or a PDF scan? Each format has vulnerabilities. A tweet can be deleted. An email can be spoofed. A chat log can be fabricated with simple apps. Data on RAM can be wiped by a simple reboot.

During an IP mediation I had opportunity to handle, a party submitted a WhatsApp screenshot to prove ownership of a jingle. On inspection, the message content checked out—but the timestamp didn’t. It turned out the phone’s clock had been manually adjusted before the screenshot was taken. The message itself was real, but the format—easily manipulated—made the evidence suspect.

A clear reminder that understanding the nature of digital evidence is key, because even genuine content can lose force if the format isn’t trusted.

The second step is preserving the chain of custody. From the moment a digital file is obtained, its handling must be documented. Was it retrieved from a phone, a laptop, a server? Who accessed it? Was it copied, moved, renamed, or edited? A documented chain of custody shields the evidence from claims of tampering.

Third, collect metadata—information about the file that may include its creation date, last modification, author, software used, and access history. Metadata often tells the story that the file cannot. It can confirm or destroy a claim of authenticity.

Fourth, consider engaging digital forensics experts. These professionals can extract, analyze, and preserve evidence using industry-standard methods. Their expert reports can provide not only credibility but context—showing the court not just what the evidence is, but how it came to be.

How to Authenticate Electronic Evidence in Nigeria
It’s important to note that Authentication is not a checklist—it’s a narrative that relies on certain essential steps

  1. The Source: Identify who created the document. Can they testify to its origin and how it was produced?
  2. Secure the chain of custody: Document every transfer, copy, or interaction with the evidence from collection to court.
  3. Obtain a certificate of compliance: This should come from the person in charge of the device or system and must confirm:
    a. Their identity and role
    b. The nature of the system used
    c. That the system was operational
    d. That the document was produced in the ordinary course of business
    e. That the data has not been altered

Circumstantial Authentication can be inferred by the Court, where a document reflects personal knowledge, style, or context familiar to the parties.
For example, in a recent cyberbullying case I consulted on, the Defendant denied sending harassing messages from an anonymous social media account. However, the tone, grammar, and references in the messages were identical to previous undisputed messages sent by the Defendant. The victim testified to receiving the messages, and the Court admitted them as “linguistically traceable” to the Defendant, thus authenticating the evidence.

Anticipate objections: Be prepared to counter claims of fabrication with supporting evidence—server logs, forensic reports, or corroborating testimony.

Final Reflections
Having mentored many young lawyers in the area of digital rights, I have witnessed how mastering the technical intricacies of electronic evidence can significantly impact the outcome of a case.

As our courtrooms increasingly adopt digital technologies, it’s crucial to recognize that while electronic evidence may be silent by nature, it leaves behind digital trails—if you know how to find them. Tendering electronic evidence requires more than just certificates; it demands an understanding of the technical workings of digital media.

Like the skilled hunter who reads the wind, the modern lawyer must learn to read the data—not only for content, but for its journey.

Folarin Aluko is an IP Lawyer, Digital Rights Expert and Partner at Trumann Rockwood Solicitors. He can be reached at fmaluko@trumann-rockwood.com

featured
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Lawbreed Limited
  • Website
  • Facebook
  • X (Twitter)
  • Instagram
  • LinkedIn

Publishers of Judgments of The Supreme Court of Nigeria (S.C Report) - on the Authority of the Supreme Court of Nigeria

Related Posts

NDPC Releases Data Protection Advisory Amid Growing Security Threats

April 17, 2026

Defamation and Judicial Integrity: Court Grants ₦100m Damages to Ex-Judge

April 17, 2026

Case Law Friday: Substantial Justice Over Technicalities – A Supreme Court Insight from FRN v. Odeh (2025) 4–5 S.C. (Pt. I) 1 @ 35–38

April 17, 2026

Comments are closed.

DARK HEARTS by Layi Babatunde, SAN – CLICK TO BUY
Top Posts

Trump, Sons, and Trump Organization File $10bn Lawsuit Against IRS and Treasury Over Tax Data Breach

January 30, 2026576 Views

$2bn debt dispute: Court rejects Olanipekun, Banire’s appointments as counsels to Nestoil, Neconde

January 23, 2026554 Views

UK introduces eVisas for Nigerian study, work visa applicants

July 9, 2025549 Views

Federal High Court Declares Lower Courts Lack Powers to Freeze Bank Accounts

January 16, 2026445 Views
QUALITY BOOKS & LAW REPORTS BREEDS QUALITY PRACTICE
https://lawbreed.blog/wp-content/uploads/2020/10/Law-Breed_x264.mp4
Don't Miss

NDPC Releases Data Protection Advisory Amid Growing Security Threats

News Update April 17, 2026

The Nigeria Data Protection Commission has issued a regulatory advisory to all Data Controllers and…

Defamation and Judicial Integrity: Court Grants ₦100m Damages to Ex-Judge

April 17, 2026

Case Law Friday: Substantial Justice Over Technicalities – A Supreme Court Insight from FRN v. Odeh (2025) 4–5 S.C. (Pt. I) 1 @ 35–38

April 17, 2026

Court voids CBN’s sack of Union Bank board

March 25, 2026

NBA condemns Sowore’s conduct at Abuja court

March 25, 2026
Stay In Touch
  • Facebook
  • Twitter
  • Pinterest
  • Instagram

Subscribe to get Updates

Get the latest creative news delivered to your email. subscribe now

Supreme Court Report Online (My S.C Extra)
Our Picks

NDPC Releases Data Protection Advisory Amid Growing Security Threats

April 17, 2026

Defamation and Judicial Integrity: Court Grants ₦100m Damages to Ex-Judge

April 17, 2026

Case Law Friday: Substantial Justice Over Technicalities – A Supreme Court Insight from FRN v. Odeh (2025) 4–5 S.C. (Pt. I) 1 @ 35–38

April 17, 2026

Court voids CBN’s sack of Union Bank board

March 25, 2026
Don't Miss

NDPC Releases Data Protection Advisory Amid Growing Security Threats

News Update April 17, 2026

The Nigeria Data Protection Commission has issued a regulatory advisory to all Data Controllers and…

Defamation and Judicial Integrity: Court Grants ₦100m Damages to Ex-Judge

April 17, 2026

Case Law Friday: Substantial Justice Over Technicalities – A Supreme Court Insight from FRN v. Odeh (2025) 4–5 S.C. (Pt. I) 1 @ 35–38

April 17, 2026

Court voids CBN’s sack of Union Bank board

March 25, 2026
About Us
About Us

Lawbreed Blog is owned by Lawbreed Limited, a full fledged Law publishing and marketing Private Limited Liability Company, incorporated under the Laws of the Federal Republic of Nigeria.

Email Us: mails@lawbreed.com
Contact: +2348077011730

Facebook X (Twitter) Instagram YouTube LinkedIn WhatsApp
Tags
#2023Election Adeleke AGF AI AMCON APC Bandits Bill BOSAN Buhari BVAS caselaw CBN CJN Covid EFCC FEA feature featured FG FIRS Fraud INEC Lawbreed LAYI BABATUNDE SAN legal updates metro Momo Bank Multichoice NBA NDPC NICN NJC Nnamdi Kanu NPC Obi OMA Osun State Popular SAN Tax Tinubu Trending Twitter VAT
Most Popular

Trump, Sons, and Trump Organization File $10bn Lawsuit Against IRS and Treasury Over Tax Data Breach

January 30, 2026576 Views

$2bn debt dispute: Court rejects Olanipekun, Banire’s appointments as counsels to Nestoil, Neconde

January 23, 2026554 Views

UK introduces eVisas for Nigerian study, work visa applicants

July 9, 2025549 Views

Type above and press Enter to search. Press Esc to cancel.