Like everyone said here, it all depends on the context of the e-mail. For me at work, I can use them as evidence if someone changed some configuration on a network order. This happened before and I pulled out the e-mail to show everyone that it was changed by this person, on this day and at this time.