Abstrakt: |
The increasing use of digital technologies in judicial and arbitration proceedings increases the usage of digital evidence by the parties, which brings the necessity of creating patterns for adjudicators to admit and assess this new type of evidence. This paper generally addresses digital evidence focusing on the second moment in international arbitration proceedings. It also narrows the topic to hacked and leaked evidence and its admissibility in international arbitration. The literature review showed a significant amount of research devoted to the evidence in arbitration. Some considered electronic evidence within one jurisdiction; others focused on certain forms of digital evidence such as electronic signatures. Papers on digital evidence in international arbitration approach arbitration rules for digital evidence but skip admissibility issues. No systemic and complex works research digital evidence in arbitration, explicitly focusing on the admissibility of hacked and leaked digital evidence from a comparative perspective. Also, no research deals with enforcing international arbitration awards relying on illegally obtained digital evidence. In these cases, there could be a possible violation of domestic public policy under the New York Convention terms (art. V, 2, b). That is why the paper aims to offer the concept of digital evidence in international arbitration, including hacked and leaked evidence, criteria of its admissibility and relevance, and design the arbitration guidelines for assessing hacked and leaked evidence. Comparative legal analysis of the international arbitration rules and national procedure law allowed us to compare the regulatory approaches to the definition of digital evidence and its admissibility worldwide. The method of legal modeling allowed designing model guidelines for arbitral tribunals to evaluate the admissibility and relevance of digital evidence, including hacked and leaked evidence. Moreover, the case study method allowed us to analyze jurisprudence and define criteria for admission of hacked and leaked evidence. We conclude that the admissibility of hacked and leaked evidence depends solely on the arbitrator's broad discretion to assess the evidence. Nevertheless, thorough evidence analysis and a well-reasoned award are always mandatory. [ABSTRACT FROM AUTHOR] |