Access all the On Point 2022 video sessions with one click
Authenticating Social Media in eDiscovery
Relevant case law and Rules of Evidence you’ll need to know
Litigating in the social media age is like trying to solve a really frustrating cold case. That’s because while social media is potentially a rich source of evidence for many types of litigation, the original posts and tweets often disappear from the initial provider’s servers, while retweets and repostings may be scattered throughout the Internet.
This ebook includes relevant case law and Rules of Evidence that you’ll need to be aware of when seeking to capture online evidence that will stand up in court.
- Five steps to authenticate social media
- Important technical considerations
- Obtaining evidence from impermanent sources
- Understanding metadata
Get your complete guide to the authentication process for social media.