Nextpoint Nextpoint Nextpoint Nextpoint
  • Features
  • Services
  • Pricing
  • Security
  • Resources
    • BLOG
    • WEBINARS
    • E-GUIDES
    • CHECKLISTS
    • CASE STUDIES
    • EVENTS
  • Sign In
  • GET A QUOTE
Nextpoint
EDISCOVERY GUIDE

Authenticating Social Media in eDiscovery

Relevant case law and Rules of Evidence you’ll need to know


Litigating in the social media age is like trying to solve a really frustrating cold case. That’s because while social media is potentially a rich source of evidence for many types of litigation, the original posts and tweets often disappear from the initial provider’s servers, while retweets and repostings may be scattered throughout the Internet.

This ebook includes relevant case law and Rules of Evidence that you’ll need to be aware of when seeking to capture online evidence that will stand up in court.

Contents include:

  • Five steps to authenticate social media
  • Important technical considerations
  • Obtaining evidence from impermanent sources
  • Understanding metadata

Get your complete guide to the authentication process for social media.

GRAB THIS GUIDE

TALK WITH US

888.929.NEXT

hello@nextpoint.com

Software

Features

Services

Security

Pricing

Sign In

Resources

eDiscovery Blog

eDiscovery Webinars

eDiscovery Guides

eDiscovery Checklists

Case Studies

For Partners

Company

About Us

Our Values

Careers

Contact Us

© 2025 Nextpoint, Inc.

Privacy Policy | Terms of Use

888.929.NEXT

  • Features
  • Services
  • Pricing
  • Security
  • Resources
    • BLOG
    • WEBINARS
    • E-GUIDES
    • CHECKLISTS
    • CASE STUDIES
    • EVENTS
  • Sign In
  • GET A QUOTE
  • Features
  • Services
  • Pricing
  • Security
  • Resources
    • BLOG
    • WEBINARS
    • E-GUIDES
    • CHECKLISTS
    • CASE STUDIES
    • EVENTS
  • Sign In
  • GET A QUOTE
Start Typing