SlideShare ist ein Scribd-Unternehmen logo
1 von 22
Collecting Social Media Records
as Digital Evidence
Michael Riedijk
PageFreezer.com
Social Media in Civil Litigation
Employment 32%
Insurance 13%
Tort 13%
Intellectual Property
10%
Contract 8%
Defamation 5%
Bankruptcy 5%
Privacy 5%
Trade secrets 3%
Divorce 3% Discrimination 3%
Social Media in Criminal Litigation
Child Exploitation 28%
ID of Witnesses 13%
Online Harassment
11%
Gang related 11%
Fraud 8%
Sexual Assault 9%
Violation of Probation
6%
Drugs 6%
Possession of Firearms
4%
Murder 2% Terrorism 2%
Confidential
Broker dealers & Investment brokers
(2012)
– SEC 17a-4: preserve business records of all
marketing communications for not less than
3 years
– FINRA 10-06/11-39: record keeping,
supervision and responding to social media
posts
Banks & Credit Unions (2013)
– FFIEC, FDIC, NCUA: “Social Media:
Consumer Risk Management Guidance”
Mortgage Brokers (2015)
– Mortgage Acts and Practices (FTC):
preserve copies of all commercial
communications & mortgage advertisement
Financial
Services
Regulatory
Compliance
Learn more: https://www.pagefreezer.com/financial-services/
• Federal Records Act (44 U.S.C.
3301 )
– “All books, papers, maps, photographs,
machine readable materials, or other
documentary materials, regardless of
physical form or characteristics…”
• State Open Records laws
– “All state and local government agencies
must retain all web content in accordance
with the approved retention schedules.” -
WA State Preservation of Electronic Public
Records law
Open
Records
Compliance
Learn more: http://www.pagefreezer.com/government/
FTC’s Advertising Endorsement
Guides
• Prevent deceptive online advertisement
• Applies to bloggers, social media &
websites that get paid for promoting
products
• Images, video and links to 3rd party
website are considered an endorsement
• Must disclose relationship with
advertiser
https://www.ftc.gov/system/files/documents/plain-language/bus41-dot-
com-disclosures-information-about-online-advertising.pdf
https://www.ftc.gov/tips-advice/business-center/guidance/ftcs-
endorsement-guides-what-people-are-asking
Online
Advertisement
Guidelines
1. Archive all your public social media, blogs,
forums, websites daily
2. Collect data in original file format (HTML,
PDF etc.)
3. Collect metadata
4. Sign all data with digital signatures &
timestamps
5. Data must be indexed and full-text
searchable
6. Store data on duplicate media
7. Data must be retained for 3 to 7 years
(depends on industry)
Regulatory
Compliance
Checklist
Important
Lawsuits
● Re Vee Vinhnee (2005)
this case identified inadmissibility of mere printouts of
data as authentic evidence, and so the question had to
be asked….how to legally verify a document from the
internet or digital origin?
● Lorraine v Markel Insurance Company
(2007)
this landmark judgment originally discussed, and
verified, the legal necessity of authentication of digital
content when produced in court as digital evidence, in
accordance with Federal Rule of Evidence 901(a).
● United States v. Vayner (2014)
in one of the most recent and relevant cases to the
current stance of social media evidence, the courts
found that printouts of a social media account were
wrongly admitted as evidence without proper
verification and authentication.
The problem
with digital
evidence
Data Integrity
– How do you prove that a message has not
been tampered with?
Data Authenticity
– How do you prove the date & time a page
was captured?
– How do you prove from which URL a
snapshot was taken?
Digital Signatures & Timestamps
– Provide data integrity & authenticity for
business transactions
– eSign Act (2000)
Why is social
media hard to
collect?
Multifaceted Nature
Can contain images, videos, comments, likes
Real-Time Activity
Content posted, edited or deleted in real-time
Infinite scrolling
Social Media walls can scroll indefinitely
Deeplinked Content
30% of social media messages contain links to 3rd
party website content
Link shorteners
Short links (bit.ly, goog.le) links can change over time
or expire
About
Metadata
Client metadata (FROM)
Browser, operating system, IP address, user
Webserver/API endpoint metadata (TO)
URL, HTTP headers, type, date & time of the request and response
Account metadata (WHO)
Account owner, bio, description, location
Message metadata (WHAT, WHEN)
Author, message type, post date & time, versions, links (un-
shortened), location, privacy settings, likes, comments, friends
What do
you need?
1. Screenshot in PDF for visual reference
2. Source code (JSON, XML, MHTML)
3. Metadata
4. Digital Signature & Timestamps
5. EDRM – XML to import in eDiscovery
system
WebPreserver.com
• Web browser plugin
• Capture single social media profiles
or webpages
• Auto-scroll Facebook timeline
• Auto-expand Facebook comments
• Export to PDF, HTML, metadata,
EDRM-XML
• Digital Signatures & Timestamps
• Full-text Search
• Share online
PageFreezer.com
• Collect social media history
• Collect complete websites
• Continuous monitoring
• API metadata
• Export to PDF, HTML, metadata,
EDRM-XML
• Digital Signatures & Timestamps
• Visual Compare
• Full-text Search
• Share online
Social Media & Web Collection Service
• We do the work for you
• Complete social media account collection
• Webpage or complete website
• 1 business day turn-around
Get the
Whitepaper
“ Social Media & eDiscovery –
Collecting Online Conversations for
Litigation”
http://hello.pagefreezer.com/social-media-archiving
PageFreezer Software, Inc.
#500 – 311 Water Street
Vancouver, BC Canada
(888) 916 3999
mike@pagefreezer.com
www.pagefreezer.com
@PageFreezer
Lets
Connect

Weitere ähnliche Inhalte

Was ist angesagt?

Thought leaders in big data ulf mattsson, cto of protegrity (part 2)
Thought leaders in big data   ulf mattsson, cto of protegrity (part 2)Thought leaders in big data   ulf mattsson, cto of protegrity (part 2)
Thought leaders in big data ulf mattsson, cto of protegrity (part 2)Ulf Mattsson
 
GDPR Explained in Simple Terms for Hospitality Owners
GDPR Explained in Simple Terms for Hospitality OwnersGDPR Explained in Simple Terms for Hospitality Owners
GDPR Explained in Simple Terms for Hospitality OwnersBoostly
 
Access control by signature key to provide privacy for cloud and big data
Access control by signature   key to provide privacy for cloud and big dataAccess control by signature   key to provide privacy for cloud and big data
Access control by signature key to provide privacy for cloud and big dataShakas Technologies
 
BigID DataSheet: Data Access Intelligence
BigID DataSheet: Data Access IntelligenceBigID DataSheet: Data Access Intelligence
BigID DataSheet: Data Access IntelligenceBigID Inc
 
BigID Data Sheet HIPAA Data Security & Privacy
BigID Data Sheet HIPAA Data Security & Privacy BigID Data Sheet HIPAA Data Security & Privacy
BigID Data Sheet HIPAA Data Security & Privacy BigID Inc
 
BigID Datasheet: CCPA Data Rights Automation
BigID Datasheet: CCPA Data Rights AutomationBigID Datasheet: CCPA Data Rights Automation
BigID Datasheet: CCPA Data Rights AutomationBigID Inc
 
Privacy: What does this have to do with Product Management?
Privacy: What does this have to do with Product Management?Privacy: What does this have to do with Product Management?
Privacy: What does this have to do with Product Management?Eduardo Silva
 
PageFreezer Webinar | Website & Social Media Compliance for Financial Services
PageFreezer Webinar | Website & Social Media Compliance for Financial ServicesPageFreezer Webinar | Website & Social Media Compliance for Financial Services
PageFreezer Webinar | Website & Social Media Compliance for Financial ServicesMichael Riedijk
 
Best Practices to Protect Cardholder Data Environment and Achieve PCI Compliance
Best Practices to Protect Cardholder Data Environment and Achieve PCI ComplianceBest Practices to Protect Cardholder Data Environment and Achieve PCI Compliance
Best Practices to Protect Cardholder Data Environment and Achieve PCI ComplianceRapid7
 
BigID Data sheet: Consent Governance & Orchestration
BigID Data sheet: Consent Governance & OrchestrationBigID Data sheet: Consent Governance & Orchestration
BigID Data sheet: Consent Governance & OrchestrationBigID Inc
 
Trouble with the terroriest
Trouble with the terroriestTrouble with the terroriest
Trouble with the terroriestbaqerz
 
Handling PII and sensitive content in SAP BusinessObjects
Handling PII and sensitive content in SAP BusinessObjects Handling PII and sensitive content in SAP BusinessObjects
Handling PII and sensitive content in SAP BusinessObjects Wiiisdom
 
Alternatives for copyright protection online
Alternatives for copyright protection onlineAlternatives for copyright protection online
Alternatives for copyright protection onlineBozhidar Bozhanov
 
General Data Protection Regulation for Ops
General Data Protection Regulation for OpsGeneral Data Protection Regulation for Ops
General Data Protection Regulation for OpsKamil Rextin
 
GDPR and Blockchain
GDPR and BlockchainGDPR and Blockchain
GDPR and BlockchainSalman Baset
 
BigID Data Sheet: LGPD Compliance Automated
BigID Data Sheet: LGPD Compliance AutomatedBigID Data Sheet: LGPD Compliance Automated
BigID Data Sheet: LGPD Compliance AutomatedBigID Inc
 
GDPR considerations for blockchain solution architects.
GDPR considerations for blockchain solution architects.GDPR considerations for blockchain solution architects.
GDPR considerations for blockchain solution architects.Salman Baset
 
Data Privacy & Compliance Considerations on Using Cloud Services
Data Privacy & Compliance Considerations on Using Cloud ServicesData Privacy & Compliance Considerations on Using Cloud Services
Data Privacy & Compliance Considerations on Using Cloud ServicesAmazon Web Services
 
Frukostseminarium om molntjänster
Frukostseminarium om molntjänsterFrukostseminarium om molntjänster
Frukostseminarium om molntjänsterTranscendent Group
 

Was ist angesagt? (20)

Thought leaders in big data ulf mattsson, cto of protegrity (part 2)
Thought leaders in big data   ulf mattsson, cto of protegrity (part 2)Thought leaders in big data   ulf mattsson, cto of protegrity (part 2)
Thought leaders in big data ulf mattsson, cto of protegrity (part 2)
 
GDPR Explained in Simple Terms for Hospitality Owners
GDPR Explained in Simple Terms for Hospitality OwnersGDPR Explained in Simple Terms for Hospitality Owners
GDPR Explained in Simple Terms for Hospitality Owners
 
Access control by signature key to provide privacy for cloud and big data
Access control by signature   key to provide privacy for cloud and big dataAccess control by signature   key to provide privacy for cloud and big data
Access control by signature key to provide privacy for cloud and big data
 
BigID DataSheet: Data Access Intelligence
BigID DataSheet: Data Access IntelligenceBigID DataSheet: Data Access Intelligence
BigID DataSheet: Data Access Intelligence
 
BigID Data Sheet HIPAA Data Security & Privacy
BigID Data Sheet HIPAA Data Security & Privacy BigID Data Sheet HIPAA Data Security & Privacy
BigID Data Sheet HIPAA Data Security & Privacy
 
BigID Datasheet: CCPA Data Rights Automation
BigID Datasheet: CCPA Data Rights AutomationBigID Datasheet: CCPA Data Rights Automation
BigID Datasheet: CCPA Data Rights Automation
 
Privacy: What does this have to do with Product Management?
Privacy: What does this have to do with Product Management?Privacy: What does this have to do with Product Management?
Privacy: What does this have to do with Product Management?
 
PageFreezer Webinar | Website & Social Media Compliance for Financial Services
PageFreezer Webinar | Website & Social Media Compliance for Financial ServicesPageFreezer Webinar | Website & Social Media Compliance for Financial Services
PageFreezer Webinar | Website & Social Media Compliance for Financial Services
 
Best Practices to Protect Cardholder Data Environment and Achieve PCI Compliance
Best Practices to Protect Cardholder Data Environment and Achieve PCI ComplianceBest Practices to Protect Cardholder Data Environment and Achieve PCI Compliance
Best Practices to Protect Cardholder Data Environment and Achieve PCI Compliance
 
BigID Data sheet: Consent Governance & Orchestration
BigID Data sheet: Consent Governance & OrchestrationBigID Data sheet: Consent Governance & Orchestration
BigID Data sheet: Consent Governance & Orchestration
 
Trouble with the terroriest
Trouble with the terroriestTrouble with the terroriest
Trouble with the terroriest
 
Handling PII and sensitive content in SAP BusinessObjects
Handling PII and sensitive content in SAP BusinessObjects Handling PII and sensitive content in SAP BusinessObjects
Handling PII and sensitive content in SAP BusinessObjects
 
GDPR for developers
GDPR for developersGDPR for developers
GDPR for developers
 
Alternatives for copyright protection online
Alternatives for copyright protection onlineAlternatives for copyright protection online
Alternatives for copyright protection online
 
General Data Protection Regulation for Ops
General Data Protection Regulation for OpsGeneral Data Protection Regulation for Ops
General Data Protection Regulation for Ops
 
GDPR and Blockchain
GDPR and BlockchainGDPR and Blockchain
GDPR and Blockchain
 
BigID Data Sheet: LGPD Compliance Automated
BigID Data Sheet: LGPD Compliance AutomatedBigID Data Sheet: LGPD Compliance Automated
BigID Data Sheet: LGPD Compliance Automated
 
GDPR considerations for blockchain solution architects.
GDPR considerations for blockchain solution architects.GDPR considerations for blockchain solution architects.
GDPR considerations for blockchain solution architects.
 
Data Privacy & Compliance Considerations on Using Cloud Services
Data Privacy & Compliance Considerations on Using Cloud ServicesData Privacy & Compliance Considerations on Using Cloud Services
Data Privacy & Compliance Considerations on Using Cloud Services
 
Frukostseminarium om molntjänster
Frukostseminarium om molntjänsterFrukostseminarium om molntjänster
Frukostseminarium om molntjänster
 

Ähnlich wie Collecting Social Media as Digital Evidence - PageFreezer Webinar

Webinar: Gathering Social Media Evidence
Webinar: Gathering Social Media EvidenceWebinar: Gathering Social Media Evidence
Webinar: Gathering Social Media EvidenceCase IQ
 
Eamonn O Raghallaigh Major Security Issues In E Commerce
Eamonn O Raghallaigh   Major Security Issues In E CommerceEamonn O Raghallaigh   Major Security Issues In E Commerce
Eamonn O Raghallaigh Major Security Issues In E CommerceEamonnORagh
 
Is More Data Always Better The Legal Risks of Data Collection, Storage and Us...
Is More Data Always Better The Legal Risks of Data Collection, Storage and Us...Is More Data Always Better The Legal Risks of Data Collection, Storage and Us...
Is More Data Always Better The Legal Risks of Data Collection, Storage and Us...Vivastream
 
Why Do You Know So Much About Me
Why Do You Know So Much About MeWhy Do You Know So Much About Me
Why Do You Know So Much About Mecommandeleven
 
Legal Perspective on Information Management “New Social Media – The New Recor...
Legal Perspective on Information Management “New Social Media – The New Recor...Legal Perspective on Information Management “New Social Media – The New Recor...
Legal Perspective on Information Management “New Social Media – The New Recor...anthonywong
 
What the Redaction of WHOIS Data Means for Cybersecurity
What the Redaction of WHOIS Data Means for CybersecurityWhat the Redaction of WHOIS Data Means for Cybersecurity
What the Redaction of WHOIS Data Means for CybersecurityWhoisXML API
 
SS236 Unit 8 Assignment Rubric Content 70 Points Do.docx
 SS236 Unit 8 Assignment Rubric Content 70 Points Do.docx SS236 Unit 8 Assignment Rubric Content 70 Points Do.docx
SS236 Unit 8 Assignment Rubric Content 70 Points Do.docxaryan532920
 
digital identity 2.0: how technology is transforming behaviours and raising c...
digital identity 2.0: how technology is transforming behaviours and raising c...digital identity 2.0: how technology is transforming behaviours and raising c...
digital identity 2.0: how technology is transforming behaviours and raising c...Patrick McCormick
 
6: privacy terms
6: privacy terms6: privacy terms
6: privacy termsCOMP 113
 
Monitising mobile (data and infomation)
Monitising mobile (data and infomation)Monitising mobile (data and infomation)
Monitising mobile (data and infomation)Tony Fish
 
Don't Panic. Making Progress on the 'Going Dark' Debate
Don't Panic. Making Progress on the 'Going Dark' DebateDon't Panic. Making Progress on the 'Going Dark' Debate
Don't Panic. Making Progress on the 'Going Dark' DebateFabio Chiusi
 
Social Distortion: Privacy, Consent, and Social Networks
Social Distortion: Privacy, Consent, and Social NetworksSocial Distortion: Privacy, Consent, and Social Networks
Social Distortion: Privacy, Consent, and Social Networksdariphagen
 
Online Identity Theft: Changing the Game
Online Identity Theft: Changing the GameOnline Identity Theft: Changing the Game
Online Identity Theft: Changing the Game- Mark - Fullbright
 
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docxhttpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docxadampcarr67227
 
Big Data LDN 2017: Collaborative Data Governance: GDPR Is Only the Beginning
Big Data LDN 2017: Collaborative Data Governance: GDPR Is Only the BeginningBig Data LDN 2017: Collaborative Data Governance: GDPR Is Only the Beginning
Big Data LDN 2017: Collaborative Data Governance: GDPR Is Only the BeginningMatt Stubbs
 
2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna
2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna
2014 GRC Conference in West Palm Beach-Moderated by Sonia LunaAviva Spectrum™
 
How To Prevent The World Wild Web Identity Crisis
How To Prevent The World Wild Web Identity CrisisHow To Prevent The World Wild Web Identity Crisis
How To Prevent The World Wild Web Identity Crisiswieringa
 

Ähnlich wie Collecting Social Media as Digital Evidence - PageFreezer Webinar (20)

Webinar: Gathering Social Media Evidence
Webinar: Gathering Social Media EvidenceWebinar: Gathering Social Media Evidence
Webinar: Gathering Social Media Evidence
 
SayanMitra.pdf
SayanMitra.pdfSayanMitra.pdf
SayanMitra.pdf
 
Eamonn O Raghallaigh Major Security Issues In E Commerce
Eamonn O Raghallaigh   Major Security Issues In E CommerceEamonn O Raghallaigh   Major Security Issues In E Commerce
Eamonn O Raghallaigh Major Security Issues In E Commerce
 
Is More Data Always Better The Legal Risks of Data Collection, Storage and Us...
Is More Data Always Better The Legal Risks of Data Collection, Storage and Us...Is More Data Always Better The Legal Risks of Data Collection, Storage and Us...
Is More Data Always Better The Legal Risks of Data Collection, Storage and Us...
 
Why Do You Know So Much About Me
Why Do You Know So Much About MeWhy Do You Know So Much About Me
Why Do You Know So Much About Me
 
Legal Perspective on Information Management “New Social Media – The New Recor...
Legal Perspective on Information Management “New Social Media – The New Recor...Legal Perspective on Information Management “New Social Media – The New Recor...
Legal Perspective on Information Management “New Social Media – The New Recor...
 
What the Redaction of WHOIS Data Means for Cybersecurity
What the Redaction of WHOIS Data Means for CybersecurityWhat the Redaction of WHOIS Data Means for Cybersecurity
What the Redaction of WHOIS Data Means for Cybersecurity
 
Role of CAs in cyber world
Role of CAs in cyber worldRole of CAs in cyber world
Role of CAs in cyber world
 
SS236 Unit 8 Assignment Rubric Content 70 Points Do.docx
 SS236 Unit 8 Assignment Rubric Content 70 Points Do.docx SS236 Unit 8 Assignment Rubric Content 70 Points Do.docx
SS236 Unit 8 Assignment Rubric Content 70 Points Do.docx
 
digital identity 2.0: how technology is transforming behaviours and raising c...
digital identity 2.0: how technology is transforming behaviours and raising c...digital identity 2.0: how technology is transforming behaviours and raising c...
digital identity 2.0: how technology is transforming behaviours and raising c...
 
6: privacy terms
6: privacy terms6: privacy terms
6: privacy terms
 
Monitising mobile (data and infomation)
Monitising mobile (data and infomation)Monitising mobile (data and infomation)
Monitising mobile (data and infomation)
 
Don't Panic. Making Progress on the 'Going Dark' Debate
Don't Panic. Making Progress on the 'Going Dark' DebateDon't Panic. Making Progress on the 'Going Dark' Debate
Don't Panic. Making Progress on the 'Going Dark' Debate
 
Social Distortion: Privacy, Consent, and Social Networks
Social Distortion: Privacy, Consent, and Social NetworksSocial Distortion: Privacy, Consent, and Social Networks
Social Distortion: Privacy, Consent, and Social Networks
 
GDPR (En) JM Tyszka
GDPR (En)  JM TyszkaGDPR (En)  JM Tyszka
GDPR (En) JM Tyszka
 
Online Identity Theft: Changing the Game
Online Identity Theft: Changing the GameOnline Identity Theft: Changing the Game
Online Identity Theft: Changing the Game
 
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docxhttpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
 
Big Data LDN 2017: Collaborative Data Governance: GDPR Is Only the Beginning
Big Data LDN 2017: Collaborative Data Governance: GDPR Is Only the BeginningBig Data LDN 2017: Collaborative Data Governance: GDPR Is Only the Beginning
Big Data LDN 2017: Collaborative Data Governance: GDPR Is Only the Beginning
 
2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna
2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna
2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna
 
How To Prevent The World Wild Web Identity Crisis
How To Prevent The World Wild Web Identity CrisisHow To Prevent The World Wild Web Identity Crisis
How To Prevent The World Wild Web Identity Crisis
 

Kürzlich hochgeladen

VIETNAM – LATEST GUIDE TO CONTRACT MANUFACTURING AND TOLLING AGREEMENTS
VIETNAM – LATEST GUIDE TO CONTRACT MANUFACTURING AND TOLLING AGREEMENTSVIETNAM – LATEST GUIDE TO CONTRACT MANUFACTURING AND TOLLING AGREEMENTS
VIETNAM – LATEST GUIDE TO CONTRACT MANUFACTURING AND TOLLING AGREEMENTSDr. Oliver Massmann
 
Mediation ppt for study materials. notes
Mediation ppt for study materials. notesMediation ppt for study materials. notes
Mediation ppt for study materials. notesPRATIKNAYAK31
 
一比一原版利兹大学毕业证学位证书
一比一原版利兹大学毕业证学位证书一比一原版利兹大学毕业证学位证书
一比一原版利兹大学毕业证学位证书E LSS
 
Why Every Business Should Invest in a Social Media Fraud Analyst.pdf
Why Every Business Should Invest in a Social Media Fraud Analyst.pdfWhy Every Business Should Invest in a Social Media Fraud Analyst.pdf
Why Every Business Should Invest in a Social Media Fraud Analyst.pdfMilind Agarwal
 
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书如何办理(USF文凭证书)美国旧金山大学毕业证学位证书
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书Fs Las
 
如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书
如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书
如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书FS LS
 
Offences against property (TRESPASS, BREAKING
Offences against property (TRESPASS, BREAKINGOffences against property (TRESPASS, BREAKING
Offences against property (TRESPASS, BREAKINGPRAKHARGUPTA419620
 
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.pptFINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.pptjudeplata
 
CALL ON ➥8923113531 🔝Call Girls Singar Nagar Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Singar Nagar Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Singar Nagar Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Singar Nagar Lucknow best sexual serviceanilsa9823
 
如何办理新西兰奥克兰商学院毕业证(本硕)AIS学位证书
如何办理新西兰奥克兰商学院毕业证(本硕)AIS学位证书如何办理新西兰奥克兰商学院毕业证(本硕)AIS学位证书
如何办理新西兰奥克兰商学院毕业证(本硕)AIS学位证书Fir L
 
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top BoutiqueAndrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top BoutiqueSkyLaw Professional Corporation
 
如何办理(KPU毕业证书)加拿大昆特兰理工大学毕业证学位证书
 如何办理(KPU毕业证书)加拿大昆特兰理工大学毕业证学位证书 如何办理(KPU毕业证书)加拿大昆特兰理工大学毕业证学位证书
如何办理(KPU毕业证书)加拿大昆特兰理工大学毕业证学位证书Fir sss
 
Introduction to Corruption, definition, types, impact and conclusion
Introduction to Corruption, definition, types, impact and conclusionIntroduction to Corruption, definition, types, impact and conclusion
Introduction to Corruption, definition, types, impact and conclusionAnuragMishra811030
 
国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》
国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》
国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》o8wvnojp
 
Indemnity Guarantee Section 124 125 and 126
Indemnity Guarantee Section 124 125 and 126Indemnity Guarantee Section 124 125 and 126
Indemnity Guarantee Section 124 125 and 126Oishi8
 
How You Can Get a Turkish Digital Nomad Visa
How You Can Get a Turkish Digital Nomad VisaHow You Can Get a Turkish Digital Nomad Visa
How You Can Get a Turkish Digital Nomad VisaBridgeWest.eu
 

Kürzlich hochgeladen (20)

VIETNAM – LATEST GUIDE TO CONTRACT MANUFACTURING AND TOLLING AGREEMENTS
VIETNAM – LATEST GUIDE TO CONTRACT MANUFACTURING AND TOLLING AGREEMENTSVIETNAM – LATEST GUIDE TO CONTRACT MANUFACTURING AND TOLLING AGREEMENTS
VIETNAM – LATEST GUIDE TO CONTRACT MANUFACTURING AND TOLLING AGREEMENTS
 
Mediation ppt for study materials. notes
Mediation ppt for study materials. notesMediation ppt for study materials. notes
Mediation ppt for study materials. notes
 
一比一原版利兹大学毕业证学位证书
一比一原版利兹大学毕业证学位证书一比一原版利兹大学毕业证学位证书
一比一原版利兹大学毕业证学位证书
 
Why Every Business Should Invest in a Social Media Fraud Analyst.pdf
Why Every Business Should Invest in a Social Media Fraud Analyst.pdfWhy Every Business Should Invest in a Social Media Fraud Analyst.pdf
Why Every Business Should Invest in a Social Media Fraud Analyst.pdf
 
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书如何办理(USF文凭证书)美国旧金山大学毕业证学位证书
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书
 
Russian Call Girls Rohini Sector 6 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
Russian Call Girls Rohini Sector 6 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...Russian Call Girls Rohini Sector 6 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
Russian Call Girls Rohini Sector 6 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
 
如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书
如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书
如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书
 
Offences against property (TRESPASS, BREAKING
Offences against property (TRESPASS, BREAKINGOffences against property (TRESPASS, BREAKING
Offences against property (TRESPASS, BREAKING
 
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.pptFINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
 
CALL ON ➥8923113531 🔝Call Girls Singar Nagar Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Singar Nagar Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Singar Nagar Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Singar Nagar Lucknow best sexual service
 
如何办理新西兰奥克兰商学院毕业证(本硕)AIS学位证书
如何办理新西兰奥克兰商学院毕业证(本硕)AIS学位证书如何办理新西兰奥克兰商学院毕业证(本硕)AIS学位证书
如何办理新西兰奥克兰商学院毕业证(本硕)AIS学位证书
 
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top BoutiqueAndrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
 
如何办理(KPU毕业证书)加拿大昆特兰理工大学毕业证学位证书
 如何办理(KPU毕业证书)加拿大昆特兰理工大学毕业证学位证书 如何办理(KPU毕业证书)加拿大昆特兰理工大学毕业证学位证书
如何办理(KPU毕业证书)加拿大昆特兰理工大学毕业证学位证书
 
Russian Call Girls Service Gomti Nagar \ 9548273370 Indian Call Girls Service...
Russian Call Girls Service Gomti Nagar \ 9548273370 Indian Call Girls Service...Russian Call Girls Service Gomti Nagar \ 9548273370 Indian Call Girls Service...
Russian Call Girls Service Gomti Nagar \ 9548273370 Indian Call Girls Service...
 
Introduction to Corruption, definition, types, impact and conclusion
Introduction to Corruption, definition, types, impact and conclusionIntroduction to Corruption, definition, types, impact and conclusion
Introduction to Corruption, definition, types, impact and conclusion
 
国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》
国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》
国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》
 
Indemnity Guarantee Section 124 125 and 126
Indemnity Guarantee Section 124 125 and 126Indemnity Guarantee Section 124 125 and 126
Indemnity Guarantee Section 124 125 and 126
 
Sensual Moments: +91 9999965857 Independent Call Girls Vasundhara Delhi {{ Mo...
Sensual Moments: +91 9999965857 Independent Call Girls Vasundhara Delhi {{ Mo...Sensual Moments: +91 9999965857 Independent Call Girls Vasundhara Delhi {{ Mo...
Sensual Moments: +91 9999965857 Independent Call Girls Vasundhara Delhi {{ Mo...
 
Russian Call Girls Rohini Sector 7 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
Russian Call Girls Rohini Sector 7 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...Russian Call Girls Rohini Sector 7 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
Russian Call Girls Rohini Sector 7 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
 
How You Can Get a Turkish Digital Nomad Visa
How You Can Get a Turkish Digital Nomad VisaHow You Can Get a Turkish Digital Nomad Visa
How You Can Get a Turkish Digital Nomad Visa
 

Collecting Social Media as Digital Evidence - PageFreezer Webinar

  • 1. Collecting Social Media Records as Digital Evidence Michael Riedijk PageFreezer.com
  • 2.
  • 3. Social Media in Civil Litigation Employment 32% Insurance 13% Tort 13% Intellectual Property 10% Contract 8% Defamation 5% Bankruptcy 5% Privacy 5% Trade secrets 3% Divorce 3% Discrimination 3%
  • 4. Social Media in Criminal Litigation Child Exploitation 28% ID of Witnesses 13% Online Harassment 11% Gang related 11% Fraud 8% Sexual Assault 9% Violation of Probation 6% Drugs 6% Possession of Firearms 4% Murder 2% Terrorism 2%
  • 6. Broker dealers & Investment brokers (2012) – SEC 17a-4: preserve business records of all marketing communications for not less than 3 years – FINRA 10-06/11-39: record keeping, supervision and responding to social media posts Banks & Credit Unions (2013) – FFIEC, FDIC, NCUA: “Social Media: Consumer Risk Management Guidance” Mortgage Brokers (2015) – Mortgage Acts and Practices (FTC): preserve copies of all commercial communications & mortgage advertisement Financial Services Regulatory Compliance
  • 8. • Federal Records Act (44 U.S.C. 3301 ) – “All books, papers, maps, photographs, machine readable materials, or other documentary materials, regardless of physical form or characteristics…” • State Open Records laws – “All state and local government agencies must retain all web content in accordance with the approved retention schedules.” - WA State Preservation of Electronic Public Records law Open Records Compliance
  • 10. FTC’s Advertising Endorsement Guides • Prevent deceptive online advertisement • Applies to bloggers, social media & websites that get paid for promoting products • Images, video and links to 3rd party website are considered an endorsement • Must disclose relationship with advertiser https://www.ftc.gov/system/files/documents/plain-language/bus41-dot- com-disclosures-information-about-online-advertising.pdf https://www.ftc.gov/tips-advice/business-center/guidance/ftcs- endorsement-guides-what-people-are-asking Online Advertisement Guidelines
  • 11.
  • 12. 1. Archive all your public social media, blogs, forums, websites daily 2. Collect data in original file format (HTML, PDF etc.) 3. Collect metadata 4. Sign all data with digital signatures & timestamps 5. Data must be indexed and full-text searchable 6. Store data on duplicate media 7. Data must be retained for 3 to 7 years (depends on industry) Regulatory Compliance Checklist
  • 13. Important Lawsuits ● Re Vee Vinhnee (2005) this case identified inadmissibility of mere printouts of data as authentic evidence, and so the question had to be asked….how to legally verify a document from the internet or digital origin? ● Lorraine v Markel Insurance Company (2007) this landmark judgment originally discussed, and verified, the legal necessity of authentication of digital content when produced in court as digital evidence, in accordance with Federal Rule of Evidence 901(a). ● United States v. Vayner (2014) in one of the most recent and relevant cases to the current stance of social media evidence, the courts found that printouts of a social media account were wrongly admitted as evidence without proper verification and authentication.
  • 14. The problem with digital evidence Data Integrity – How do you prove that a message has not been tampered with? Data Authenticity – How do you prove the date & time a page was captured? – How do you prove from which URL a snapshot was taken? Digital Signatures & Timestamps – Provide data integrity & authenticity for business transactions – eSign Act (2000)
  • 15. Why is social media hard to collect? Multifaceted Nature Can contain images, videos, comments, likes Real-Time Activity Content posted, edited or deleted in real-time Infinite scrolling Social Media walls can scroll indefinitely Deeplinked Content 30% of social media messages contain links to 3rd party website content Link shorteners Short links (bit.ly, goog.le) links can change over time or expire
  • 16. About Metadata Client metadata (FROM) Browser, operating system, IP address, user Webserver/API endpoint metadata (TO) URL, HTTP headers, type, date & time of the request and response Account metadata (WHO) Account owner, bio, description, location Message metadata (WHAT, WHEN) Author, message type, post date & time, versions, links (un- shortened), location, privacy settings, likes, comments, friends
  • 17. What do you need? 1. Screenshot in PDF for visual reference 2. Source code (JSON, XML, MHTML) 3. Metadata 4. Digital Signature & Timestamps 5. EDRM – XML to import in eDiscovery system
  • 18. WebPreserver.com • Web browser plugin • Capture single social media profiles or webpages • Auto-scroll Facebook timeline • Auto-expand Facebook comments • Export to PDF, HTML, metadata, EDRM-XML • Digital Signatures & Timestamps • Full-text Search • Share online
  • 19. PageFreezer.com • Collect social media history • Collect complete websites • Continuous monitoring • API metadata • Export to PDF, HTML, metadata, EDRM-XML • Digital Signatures & Timestamps • Visual Compare • Full-text Search • Share online
  • 20. Social Media & Web Collection Service • We do the work for you • Complete social media account collection • Webpage or complete website • 1 business day turn-around
  • 21. Get the Whitepaper “ Social Media & eDiscovery – Collecting Online Conversations for Litigation” http://hello.pagefreezer.com/social-media-archiving
  • 22. PageFreezer Software, Inc. #500 – 311 Water Street Vancouver, BC Canada (888) 916 3999 mike@pagefreezer.com www.pagefreezer.com @PageFreezer Lets Connect

Hinweis der Redaktion

  1. Picture this: a Buffalo police cop stealing coke from the evidence room and posting it on Vine. In this case, it was a comedy skit viewed by 6M people online. As police officers cannot appear in uniform with their badge it turned into an employment case with this officer being suspended for dishonoring the police on social media.
  2. After FDA Warning, Kim Kardashian Posts Corrected Endorsement Of Morning Sickness Pill
  3. Obviously take a screenshot and legalize a tweet by a paralegal, but what if you need to process a 10,000 page website or long social media timelines?