SlideShare une entreprise Scribd logo
1  sur  22
Collecting Social Media Records
as Digital Evidence
Michael Riedijk
PageFreezer.com
Social Media in Civil Litigation
Employment 32%
Insurance 13%
Tort 13%
Intellectual Property
10%
Contract 8%
Defamation 5%
Bankruptcy 5%
Privacy 5%
Trade secrets 3%
Divorce 3% Discrimination 3%
Social Media in Criminal Litigation
Child Exploitation 28%
ID of Witnesses 13%
Online Harassment
11%
Gang related 11%
Fraud 8%
Sexual Assault 9%
Violation of Probation
6%
Drugs 6%
Possession of Firearms
4%
Murder 2% Terrorism 2%
Confidential
Broker dealers & Investment brokers
(2012)
– SEC 17a-4: preserve business records of all
marketing communications for not less than
3 years
– FINRA 10-06/11-39: record keeping,
supervision and responding to social media
posts
Banks & Credit Unions (2013)
– FFIEC, FDIC, NCUA: “Social Media:
Consumer Risk Management Guidance”
Mortgage Brokers (2015)
– Mortgage Acts and Practices (FTC):
preserve copies of all commercial
communications & mortgage advertisement
Financial
Services
Regulatory
Compliance
Learn more: https://www.pagefreezer.com/financial-services/
• Federal Records Act (44 U.S.C.
3301 )
– “All books, papers, maps, photographs,
machine readable materials, or other
documentary materials, regardless of
physical form or characteristics…”
• State Open Records laws
– “All state and local government agencies
must retain all web content in accordance
with the approved retention schedules.” -
WA State Preservation of Electronic Public
Records law
Open
Records
Compliance
Learn more: http://www.pagefreezer.com/government/
FTC’s Advertising Endorsement
Guides
• Prevent deceptive online advertisement
• Applies to bloggers, social media &
websites that get paid for promoting
products
• Images, video and links to 3rd party
website are considered an endorsement
• Must disclose relationship with
advertiser
https://www.ftc.gov/system/files/documents/plain-language/bus41-dot-
com-disclosures-information-about-online-advertising.pdf
https://www.ftc.gov/tips-advice/business-center/guidance/ftcs-
endorsement-guides-what-people-are-asking
Online
Advertisement
Guidelines
1. Archive all your public social media, blogs,
forums, websites daily
2. Collect data in original file format (HTML,
PDF etc.)
3. Collect metadata
4. Sign all data with digital signatures &
timestamps
5. Data must be indexed and full-text
searchable
6. Store data on duplicate media
7. Data must be retained for 3 to 7 years
(depends on industry)
Regulatory
Compliance
Checklist
Important
Lawsuits
● Re Vee Vinhnee (2005)
this case identified inadmissibility of mere printouts of
data as authentic evidence, and so the question had to
be asked….how to legally verify a document from the
internet or digital origin?
● Lorraine v Markel Insurance Company
(2007)
this landmark judgment originally discussed, and
verified, the legal necessity of authentication of digital
content when produced in court as digital evidence, in
accordance with Federal Rule of Evidence 901(a).
● United States v. Vayner (2014)
in one of the most recent and relevant cases to the
current stance of social media evidence, the courts
found that printouts of a social media account were
wrongly admitted as evidence without proper
verification and authentication.
The problem
with digital
evidence
Data Integrity
– How do you prove that a message has not
been tampered with?
Data Authenticity
– How do you prove the date & time a page
was captured?
– How do you prove from which URL a
snapshot was taken?
Digital Signatures & Timestamps
– Provide data integrity & authenticity for
business transactions
– eSign Act (2000)
Why is social
media hard to
collect?
Multifaceted Nature
Can contain images, videos, comments, likes
Real-Time Activity
Content posted, edited or deleted in real-time
Infinite scrolling
Social Media walls can scroll indefinitely
Deeplinked Content
30% of social media messages contain links to 3rd
party website content
Link shorteners
Short links (bit.ly, goog.le) links can change over time
or expire
About
Metadata
Client metadata (FROM)
Browser, operating system, IP address, user
Webserver/API endpoint metadata (TO)
URL, HTTP headers, type, date & time of the request and response
Account metadata (WHO)
Account owner, bio, description, location
Message metadata (WHAT, WHEN)
Author, message type, post date & time, versions, links (un-
shortened), location, privacy settings, likes, comments, friends
What do
you need?
1. Screenshot in PDF for visual reference
2. Source code (JSON, XML, MHTML)
3. Metadata
4. Digital Signature & Timestamps
5. EDRM – XML to import in eDiscovery
system
WebPreserver.com
• Web browser plugin
• Capture single social media profiles
or webpages
• Auto-scroll Facebook timeline
• Auto-expand Facebook comments
• Export to PDF, HTML, metadata,
EDRM-XML
• Digital Signatures & Timestamps
• Full-text Search
• Share online
PageFreezer.com
• Collect social media history
• Collect complete websites
• Continuous monitoring
• API metadata
• Export to PDF, HTML, metadata,
EDRM-XML
• Digital Signatures & Timestamps
• Visual Compare
• Full-text Search
• Share online
Social Media & Web Collection Service
• We do the work for you
• Complete social media account collection
• Webpage or complete website
• 1 business day turn-around
Get the
Whitepaper
“ Social Media & eDiscovery –
Collecting Online Conversations for
Litigation”
http://hello.pagefreezer.com/social-media-archiving
PageFreezer Software, Inc.
#500 – 311 Water Street
Vancouver, BC Canada
(888) 916 3999
mike@pagefreezer.com
www.pagefreezer.com
@PageFreezer
Lets
Connect

Contenu connexe

Tendances

Thought leaders in big data ulf mattsson, cto of protegrity (part 2)
Thought leaders in big data   ulf mattsson, cto of protegrity (part 2)Thought leaders in big data   ulf mattsson, cto of protegrity (part 2)
Thought leaders in big data ulf mattsson, cto of protegrity (part 2)Ulf Mattsson
 
GDPR Explained in Simple Terms for Hospitality Owners
GDPR Explained in Simple Terms for Hospitality OwnersGDPR Explained in Simple Terms for Hospitality Owners
GDPR Explained in Simple Terms for Hospitality OwnersBoostly
 
Access control by signature key to provide privacy for cloud and big data
Access control by signature   key to provide privacy for cloud and big dataAccess control by signature   key to provide privacy for cloud and big data
Access control by signature key to provide privacy for cloud and big dataShakas Technologies
 
BigID DataSheet: Data Access Intelligence
BigID DataSheet: Data Access IntelligenceBigID DataSheet: Data Access Intelligence
BigID DataSheet: Data Access IntelligenceBigID Inc
 
BigID Data Sheet HIPAA Data Security & Privacy
BigID Data Sheet HIPAA Data Security & Privacy BigID Data Sheet HIPAA Data Security & Privacy
BigID Data Sheet HIPAA Data Security & Privacy BigID Inc
 
BigID Datasheet: CCPA Data Rights Automation
BigID Datasheet: CCPA Data Rights AutomationBigID Datasheet: CCPA Data Rights Automation
BigID Datasheet: CCPA Data Rights AutomationBigID Inc
 
Privacy: What does this have to do with Product Management?
Privacy: What does this have to do with Product Management?Privacy: What does this have to do with Product Management?
Privacy: What does this have to do with Product Management?Eduardo Silva
 
PageFreezer Webinar | Website & Social Media Compliance for Financial Services
PageFreezer Webinar | Website & Social Media Compliance for Financial ServicesPageFreezer Webinar | Website & Social Media Compliance for Financial Services
PageFreezer Webinar | Website & Social Media Compliance for Financial ServicesMichael Riedijk
 
Best Practices to Protect Cardholder Data Environment and Achieve PCI Compliance
Best Practices to Protect Cardholder Data Environment and Achieve PCI ComplianceBest Practices to Protect Cardholder Data Environment and Achieve PCI Compliance
Best Practices to Protect Cardholder Data Environment and Achieve PCI ComplianceRapid7
 
BigID Data sheet: Consent Governance & Orchestration
BigID Data sheet: Consent Governance & OrchestrationBigID Data sheet: Consent Governance & Orchestration
BigID Data sheet: Consent Governance & OrchestrationBigID Inc
 
Trouble with the terroriest
Trouble with the terroriestTrouble with the terroriest
Trouble with the terroriestbaqerz
 
Handling PII and sensitive content in SAP BusinessObjects
Handling PII and sensitive content in SAP BusinessObjects Handling PII and sensitive content in SAP BusinessObjects
Handling PII and sensitive content in SAP BusinessObjects Wiiisdom
 
Alternatives for copyright protection online
Alternatives for copyright protection onlineAlternatives for copyright protection online
Alternatives for copyright protection onlineBozhidar Bozhanov
 
General Data Protection Regulation for Ops
General Data Protection Regulation for OpsGeneral Data Protection Regulation for Ops
General Data Protection Regulation for OpsKamil Rextin
 
GDPR and Blockchain
GDPR and BlockchainGDPR and Blockchain
GDPR and BlockchainSalman Baset
 
BigID Data Sheet: LGPD Compliance Automated
BigID Data Sheet: LGPD Compliance AutomatedBigID Data Sheet: LGPD Compliance Automated
BigID Data Sheet: LGPD Compliance AutomatedBigID Inc
 
GDPR considerations for blockchain solution architects.
GDPR considerations for blockchain solution architects.GDPR considerations for blockchain solution architects.
GDPR considerations for blockchain solution architects.Salman Baset
 
Data Privacy & Compliance Considerations on Using Cloud Services
Data Privacy & Compliance Considerations on Using Cloud ServicesData Privacy & Compliance Considerations on Using Cloud Services
Data Privacy & Compliance Considerations on Using Cloud ServicesAmazon Web Services
 
Frukostseminarium om molntjänster
Frukostseminarium om molntjänsterFrukostseminarium om molntjänster
Frukostseminarium om molntjänsterTranscendent Group
 

Tendances (20)

Thought leaders in big data ulf mattsson, cto of protegrity (part 2)
Thought leaders in big data   ulf mattsson, cto of protegrity (part 2)Thought leaders in big data   ulf mattsson, cto of protegrity (part 2)
Thought leaders in big data ulf mattsson, cto of protegrity (part 2)
 
GDPR Explained in Simple Terms for Hospitality Owners
GDPR Explained in Simple Terms for Hospitality OwnersGDPR Explained in Simple Terms for Hospitality Owners
GDPR Explained in Simple Terms for Hospitality Owners
 
Access control by signature key to provide privacy for cloud and big data
Access control by signature   key to provide privacy for cloud and big dataAccess control by signature   key to provide privacy for cloud and big data
Access control by signature key to provide privacy for cloud and big data
 
BigID DataSheet: Data Access Intelligence
BigID DataSheet: Data Access IntelligenceBigID DataSheet: Data Access Intelligence
BigID DataSheet: Data Access Intelligence
 
BigID Data Sheet HIPAA Data Security & Privacy
BigID Data Sheet HIPAA Data Security & Privacy BigID Data Sheet HIPAA Data Security & Privacy
BigID Data Sheet HIPAA Data Security & Privacy
 
BigID Datasheet: CCPA Data Rights Automation
BigID Datasheet: CCPA Data Rights AutomationBigID Datasheet: CCPA Data Rights Automation
BigID Datasheet: CCPA Data Rights Automation
 
Privacy: What does this have to do with Product Management?
Privacy: What does this have to do with Product Management?Privacy: What does this have to do with Product Management?
Privacy: What does this have to do with Product Management?
 
PageFreezer Webinar | Website & Social Media Compliance for Financial Services
PageFreezer Webinar | Website & Social Media Compliance for Financial ServicesPageFreezer Webinar | Website & Social Media Compliance for Financial Services
PageFreezer Webinar | Website & Social Media Compliance for Financial Services
 
Best Practices to Protect Cardholder Data Environment and Achieve PCI Compliance
Best Practices to Protect Cardholder Data Environment and Achieve PCI ComplianceBest Practices to Protect Cardholder Data Environment and Achieve PCI Compliance
Best Practices to Protect Cardholder Data Environment and Achieve PCI Compliance
 
BigID Data sheet: Consent Governance & Orchestration
BigID Data sheet: Consent Governance & OrchestrationBigID Data sheet: Consent Governance & Orchestration
BigID Data sheet: Consent Governance & Orchestration
 
Trouble with the terroriest
Trouble with the terroriestTrouble with the terroriest
Trouble with the terroriest
 
Handling PII and sensitive content in SAP BusinessObjects
Handling PII and sensitive content in SAP BusinessObjects Handling PII and sensitive content in SAP BusinessObjects
Handling PII and sensitive content in SAP BusinessObjects
 
GDPR for developers
GDPR for developersGDPR for developers
GDPR for developers
 
Alternatives for copyright protection online
Alternatives for copyright protection onlineAlternatives for copyright protection online
Alternatives for copyright protection online
 
General Data Protection Regulation for Ops
General Data Protection Regulation for OpsGeneral Data Protection Regulation for Ops
General Data Protection Regulation for Ops
 
GDPR and Blockchain
GDPR and BlockchainGDPR and Blockchain
GDPR and Blockchain
 
BigID Data Sheet: LGPD Compliance Automated
BigID Data Sheet: LGPD Compliance AutomatedBigID Data Sheet: LGPD Compliance Automated
BigID Data Sheet: LGPD Compliance Automated
 
GDPR considerations for blockchain solution architects.
GDPR considerations for blockchain solution architects.GDPR considerations for blockchain solution architects.
GDPR considerations for blockchain solution architects.
 
Data Privacy & Compliance Considerations on Using Cloud Services
Data Privacy & Compliance Considerations on Using Cloud ServicesData Privacy & Compliance Considerations on Using Cloud Services
Data Privacy & Compliance Considerations on Using Cloud Services
 
Frukostseminarium om molntjänster
Frukostseminarium om molntjänsterFrukostseminarium om molntjänster
Frukostseminarium om molntjänster
 

Similaire à Collecting Social Media as Digital Evidence - PageFreezer Webinar

Webinar: Gathering Social Media Evidence
Webinar: Gathering Social Media EvidenceWebinar: Gathering Social Media Evidence
Webinar: Gathering Social Media EvidenceCase IQ
 
Eamonn O Raghallaigh Major Security Issues In E Commerce
Eamonn O Raghallaigh   Major Security Issues In E CommerceEamonn O Raghallaigh   Major Security Issues In E Commerce
Eamonn O Raghallaigh Major Security Issues In E CommerceEamonnORagh
 
Is More Data Always Better The Legal Risks of Data Collection, Storage and Us...
Is More Data Always Better The Legal Risks of Data Collection, Storage and Us...Is More Data Always Better The Legal Risks of Data Collection, Storage and Us...
Is More Data Always Better The Legal Risks of Data Collection, Storage and Us...Vivastream
 
Why Do You Know So Much About Me
Why Do You Know So Much About MeWhy Do You Know So Much About Me
Why Do You Know So Much About Mecommandeleven
 
Legal Perspective on Information Management “New Social Media – The New Recor...
Legal Perspective on Information Management “New Social Media – The New Recor...Legal Perspective on Information Management “New Social Media – The New Recor...
Legal Perspective on Information Management “New Social Media – The New Recor...anthonywong
 
What the Redaction of WHOIS Data Means for Cybersecurity
What the Redaction of WHOIS Data Means for CybersecurityWhat the Redaction of WHOIS Data Means for Cybersecurity
What the Redaction of WHOIS Data Means for CybersecurityWhoisXML API
 
SS236 Unit 8 Assignment Rubric Content 70 Points Do.docx
 SS236 Unit 8 Assignment Rubric Content 70 Points Do.docx SS236 Unit 8 Assignment Rubric Content 70 Points Do.docx
SS236 Unit 8 Assignment Rubric Content 70 Points Do.docxaryan532920
 
digital identity 2.0: how technology is transforming behaviours and raising c...
digital identity 2.0: how technology is transforming behaviours and raising c...digital identity 2.0: how technology is transforming behaviours and raising c...
digital identity 2.0: how technology is transforming behaviours and raising c...Patrick McCormick
 
6: privacy terms
6: privacy terms6: privacy terms
6: privacy termsCOMP 113
 
Monitising mobile (data and infomation)
Monitising mobile (data and infomation)Monitising mobile (data and infomation)
Monitising mobile (data and infomation)Tony Fish
 
Don't Panic. Making Progress on the 'Going Dark' Debate
Don't Panic. Making Progress on the 'Going Dark' DebateDon't Panic. Making Progress on the 'Going Dark' Debate
Don't Panic. Making Progress on the 'Going Dark' DebateFabio Chiusi
 
Social Distortion: Privacy, Consent, and Social Networks
Social Distortion: Privacy, Consent, and Social NetworksSocial Distortion: Privacy, Consent, and Social Networks
Social Distortion: Privacy, Consent, and Social Networksdariphagen
 
Online Identity Theft: Changing the Game
Online Identity Theft: Changing the GameOnline Identity Theft: Changing the Game
Online Identity Theft: Changing the Game- Mark - Fullbright
 
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docxhttpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docxadampcarr67227
 
Big Data LDN 2017: Collaborative Data Governance: GDPR Is Only the Beginning
Big Data LDN 2017: Collaborative Data Governance: GDPR Is Only the BeginningBig Data LDN 2017: Collaborative Data Governance: GDPR Is Only the Beginning
Big Data LDN 2017: Collaborative Data Governance: GDPR Is Only the BeginningMatt Stubbs
 
2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna
2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna
2014 GRC Conference in West Palm Beach-Moderated by Sonia LunaAviva Spectrum™
 
How To Prevent The World Wild Web Identity Crisis
How To Prevent The World Wild Web Identity CrisisHow To Prevent The World Wild Web Identity Crisis
How To Prevent The World Wild Web Identity Crisiswieringa
 

Similaire à Collecting Social Media as Digital Evidence - PageFreezer Webinar (20)

Webinar: Gathering Social Media Evidence
Webinar: Gathering Social Media EvidenceWebinar: Gathering Social Media Evidence
Webinar: Gathering Social Media Evidence
 
SayanMitra.pdf
SayanMitra.pdfSayanMitra.pdf
SayanMitra.pdf
 
Eamonn O Raghallaigh Major Security Issues In E Commerce
Eamonn O Raghallaigh   Major Security Issues In E CommerceEamonn O Raghallaigh   Major Security Issues In E Commerce
Eamonn O Raghallaigh Major Security Issues In E Commerce
 
Is More Data Always Better The Legal Risks of Data Collection, Storage and Us...
Is More Data Always Better The Legal Risks of Data Collection, Storage and Us...Is More Data Always Better The Legal Risks of Data Collection, Storage and Us...
Is More Data Always Better The Legal Risks of Data Collection, Storage and Us...
 
Why Do You Know So Much About Me
Why Do You Know So Much About MeWhy Do You Know So Much About Me
Why Do You Know So Much About Me
 
Legal Perspective on Information Management “New Social Media – The New Recor...
Legal Perspective on Information Management “New Social Media – The New Recor...Legal Perspective on Information Management “New Social Media – The New Recor...
Legal Perspective on Information Management “New Social Media – The New Recor...
 
What the Redaction of WHOIS Data Means for Cybersecurity
What the Redaction of WHOIS Data Means for CybersecurityWhat the Redaction of WHOIS Data Means for Cybersecurity
What the Redaction of WHOIS Data Means for Cybersecurity
 
Role of CAs in cyber world
Role of CAs in cyber worldRole of CAs in cyber world
Role of CAs in cyber world
 
SS236 Unit 8 Assignment Rubric Content 70 Points Do.docx
 SS236 Unit 8 Assignment Rubric Content 70 Points Do.docx SS236 Unit 8 Assignment Rubric Content 70 Points Do.docx
SS236 Unit 8 Assignment Rubric Content 70 Points Do.docx
 
digital identity 2.0: how technology is transforming behaviours and raising c...
digital identity 2.0: how technology is transforming behaviours and raising c...digital identity 2.0: how technology is transforming behaviours and raising c...
digital identity 2.0: how technology is transforming behaviours and raising c...
 
6: privacy terms
6: privacy terms6: privacy terms
6: privacy terms
 
Monitising mobile (data and infomation)
Monitising mobile (data and infomation)Monitising mobile (data and infomation)
Monitising mobile (data and infomation)
 
Don't Panic. Making Progress on the 'Going Dark' Debate
Don't Panic. Making Progress on the 'Going Dark' DebateDon't Panic. Making Progress on the 'Going Dark' Debate
Don't Panic. Making Progress on the 'Going Dark' Debate
 
Social Distortion: Privacy, Consent, and Social Networks
Social Distortion: Privacy, Consent, and Social NetworksSocial Distortion: Privacy, Consent, and Social Networks
Social Distortion: Privacy, Consent, and Social Networks
 
GDPR (En) JM Tyszka
GDPR (En)  JM TyszkaGDPR (En)  JM Tyszka
GDPR (En) JM Tyszka
 
Online Identity Theft: Changing the Game
Online Identity Theft: Changing the GameOnline Identity Theft: Changing the Game
Online Identity Theft: Changing the Game
 
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docxhttpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
 
Big Data LDN 2017: Collaborative Data Governance: GDPR Is Only the Beginning
Big Data LDN 2017: Collaborative Data Governance: GDPR Is Only the BeginningBig Data LDN 2017: Collaborative Data Governance: GDPR Is Only the Beginning
Big Data LDN 2017: Collaborative Data Governance: GDPR Is Only the Beginning
 
2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna
2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna
2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna
 
How To Prevent The World Wild Web Identity Crisis
How To Prevent The World Wild Web Identity CrisisHow To Prevent The World Wild Web Identity Crisis
How To Prevent The World Wild Web Identity Crisis
 

Dernier

PPT- Voluntary Liquidation (Under section 59).pptx
PPT- Voluntary Liquidation (Under section 59).pptxPPT- Voluntary Liquidation (Under section 59).pptx
PPT- Voluntary Liquidation (Under section 59).pptxRRR Chambers
 
Presentation on Corporate SOCIAL RESPONSIBILITY- PPT.pptx
Presentation on Corporate SOCIAL RESPONSIBILITY- PPT.pptxPresentation on Corporate SOCIAL RESPONSIBILITY- PPT.pptx
Presentation on Corporate SOCIAL RESPONSIBILITY- PPT.pptxRRR Chambers
 
Jim Eiberger Redacted Copy Of Tenant Lease.pdf
Jim Eiberger Redacted Copy Of Tenant Lease.pdfJim Eiberger Redacted Copy Of Tenant Lease.pdf
Jim Eiberger Redacted Copy Of Tenant Lease.pdfjimeibergerreview
 
COPYRIGHTS - PPT 01.12.2023 part- 2.pptx
COPYRIGHTS - PPT 01.12.2023 part- 2.pptxCOPYRIGHTS - PPT 01.12.2023 part- 2.pptx
COPYRIGHTS - PPT 01.12.2023 part- 2.pptxRRR Chambers
 
Relationship Between International Law and Municipal Law MIR.pdf
Relationship Between International Law and Municipal Law MIR.pdfRelationship Between International Law and Municipal Law MIR.pdf
Relationship Between International Law and Municipal Law MIR.pdfKelechi48
 
一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理
一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理
一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理Airst S
 
Human Rights_FilippoLuciani diritti umani.pptx
Human Rights_FilippoLuciani diritti umani.pptxHuman Rights_FilippoLuciani diritti umani.pptx
Human Rights_FilippoLuciani diritti umani.pptxfilippoluciani9
 
一比一原版埃克塞特大学毕业证如何办理
一比一原版埃克塞特大学毕业证如何办理一比一原版埃克塞特大学毕业证如何办理
一比一原版埃克塞特大学毕业证如何办理Airst S
 
8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx
8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx
8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptxPamelaAbegailMonsant2
 
一比一原版曼彻斯特城市大学毕业证如何办理
一比一原版曼彻斯特城市大学毕业证如何办理一比一原版曼彻斯特城市大学毕业证如何办理
一比一原版曼彻斯特城市大学毕业证如何办理Airst S
 
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理bd2c5966a56d
 
Transferable and Non-Transferable Property.pptx
Transferable and Non-Transferable Property.pptxTransferable and Non-Transferable Property.pptx
Transferable and Non-Transferable Property.pptx2020000445musaib
 
Smarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation Strategy
Smarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation StrategySmarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation Strategy
Smarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation StrategyJong Hyuk Choi
 
589308994-interpretation-of-statutes-notes-law-college.pdf
589308994-interpretation-of-statutes-notes-law-college.pdf589308994-interpretation-of-statutes-notes-law-college.pdf
589308994-interpretation-of-statutes-notes-law-college.pdfSUSHMITAPOTHAL
 
LITERAL RULE OF INTERPRETATION - PRIMARY RULE
LITERAL RULE OF INTERPRETATION - PRIMARY RULELITERAL RULE OF INTERPRETATION - PRIMARY RULE
LITERAL RULE OF INTERPRETATION - PRIMARY RULEsreeramsaipranitha
 
一比一原版赫瑞瓦特大学毕业证如何办理
一比一原版赫瑞瓦特大学毕业证如何办理一比一原版赫瑞瓦特大学毕业证如何办理
一比一原版赫瑞瓦特大学毕业证如何办理Airst S
 
Code_Ethics of_Mechanical_Engineering.ppt
Code_Ethics of_Mechanical_Engineering.pptCode_Ethics of_Mechanical_Engineering.ppt
Code_Ethics of_Mechanical_Engineering.pptJosephCanama
 
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURYA SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURYJulian Scutts
 
PowerPoint - Legal Citation Form 1 - Case Law.pptx
PowerPoint - Legal Citation Form 1 - Case Law.pptxPowerPoint - Legal Citation Form 1 - Case Law.pptx
PowerPoint - Legal Citation Form 1 - Case Law.pptxca2or2tx
 
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxxAudience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxxMollyBrown86
 

Dernier (20)

PPT- Voluntary Liquidation (Under section 59).pptx
PPT- Voluntary Liquidation (Under section 59).pptxPPT- Voluntary Liquidation (Under section 59).pptx
PPT- Voluntary Liquidation (Under section 59).pptx
 
Presentation on Corporate SOCIAL RESPONSIBILITY- PPT.pptx
Presentation on Corporate SOCIAL RESPONSIBILITY- PPT.pptxPresentation on Corporate SOCIAL RESPONSIBILITY- PPT.pptx
Presentation on Corporate SOCIAL RESPONSIBILITY- PPT.pptx
 
Jim Eiberger Redacted Copy Of Tenant Lease.pdf
Jim Eiberger Redacted Copy Of Tenant Lease.pdfJim Eiberger Redacted Copy Of Tenant Lease.pdf
Jim Eiberger Redacted Copy Of Tenant Lease.pdf
 
COPYRIGHTS - PPT 01.12.2023 part- 2.pptx
COPYRIGHTS - PPT 01.12.2023 part- 2.pptxCOPYRIGHTS - PPT 01.12.2023 part- 2.pptx
COPYRIGHTS - PPT 01.12.2023 part- 2.pptx
 
Relationship Between International Law and Municipal Law MIR.pdf
Relationship Between International Law and Municipal Law MIR.pdfRelationship Between International Law and Municipal Law MIR.pdf
Relationship Between International Law and Municipal Law MIR.pdf
 
一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理
一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理
一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理
 
Human Rights_FilippoLuciani diritti umani.pptx
Human Rights_FilippoLuciani diritti umani.pptxHuman Rights_FilippoLuciani diritti umani.pptx
Human Rights_FilippoLuciani diritti umani.pptx
 
一比一原版埃克塞特大学毕业证如何办理
一比一原版埃克塞特大学毕业证如何办理一比一原版埃克塞特大学毕业证如何办理
一比一原版埃克塞特大学毕业证如何办理
 
8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx
8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx
8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx
 
一比一原版曼彻斯特城市大学毕业证如何办理
一比一原版曼彻斯特城市大学毕业证如何办理一比一原版曼彻斯特城市大学毕业证如何办理
一比一原版曼彻斯特城市大学毕业证如何办理
 
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
 
Transferable and Non-Transferable Property.pptx
Transferable and Non-Transferable Property.pptxTransferable and Non-Transferable Property.pptx
Transferable and Non-Transferable Property.pptx
 
Smarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation Strategy
Smarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation StrategySmarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation Strategy
Smarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation Strategy
 
589308994-interpretation-of-statutes-notes-law-college.pdf
589308994-interpretation-of-statutes-notes-law-college.pdf589308994-interpretation-of-statutes-notes-law-college.pdf
589308994-interpretation-of-statutes-notes-law-college.pdf
 
LITERAL RULE OF INTERPRETATION - PRIMARY RULE
LITERAL RULE OF INTERPRETATION - PRIMARY RULELITERAL RULE OF INTERPRETATION - PRIMARY RULE
LITERAL RULE OF INTERPRETATION - PRIMARY RULE
 
一比一原版赫瑞瓦特大学毕业证如何办理
一比一原版赫瑞瓦特大学毕业证如何办理一比一原版赫瑞瓦特大学毕业证如何办理
一比一原版赫瑞瓦特大学毕业证如何办理
 
Code_Ethics of_Mechanical_Engineering.ppt
Code_Ethics of_Mechanical_Engineering.pptCode_Ethics of_Mechanical_Engineering.ppt
Code_Ethics of_Mechanical_Engineering.ppt
 
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURYA SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
 
PowerPoint - Legal Citation Form 1 - Case Law.pptx
PowerPoint - Legal Citation Form 1 - Case Law.pptxPowerPoint - Legal Citation Form 1 - Case Law.pptx
PowerPoint - Legal Citation Form 1 - Case Law.pptx
 
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxxAudience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
 

Collecting Social Media as Digital Evidence - PageFreezer Webinar

  • 1. Collecting Social Media Records as Digital Evidence Michael Riedijk PageFreezer.com
  • 2.
  • 3. Social Media in Civil Litigation Employment 32% Insurance 13% Tort 13% Intellectual Property 10% Contract 8% Defamation 5% Bankruptcy 5% Privacy 5% Trade secrets 3% Divorce 3% Discrimination 3%
  • 4. Social Media in Criminal Litigation Child Exploitation 28% ID of Witnesses 13% Online Harassment 11% Gang related 11% Fraud 8% Sexual Assault 9% Violation of Probation 6% Drugs 6% Possession of Firearms 4% Murder 2% Terrorism 2%
  • 6. Broker dealers & Investment brokers (2012) – SEC 17a-4: preserve business records of all marketing communications for not less than 3 years – FINRA 10-06/11-39: record keeping, supervision and responding to social media posts Banks & Credit Unions (2013) – FFIEC, FDIC, NCUA: “Social Media: Consumer Risk Management Guidance” Mortgage Brokers (2015) – Mortgage Acts and Practices (FTC): preserve copies of all commercial communications & mortgage advertisement Financial Services Regulatory Compliance
  • 8. • Federal Records Act (44 U.S.C. 3301 ) – “All books, papers, maps, photographs, machine readable materials, or other documentary materials, regardless of physical form or characteristics…” • State Open Records laws – “All state and local government agencies must retain all web content in accordance with the approved retention schedules.” - WA State Preservation of Electronic Public Records law Open Records Compliance
  • 10. FTC’s Advertising Endorsement Guides • Prevent deceptive online advertisement • Applies to bloggers, social media & websites that get paid for promoting products • Images, video and links to 3rd party website are considered an endorsement • Must disclose relationship with advertiser https://www.ftc.gov/system/files/documents/plain-language/bus41-dot- com-disclosures-information-about-online-advertising.pdf https://www.ftc.gov/tips-advice/business-center/guidance/ftcs- endorsement-guides-what-people-are-asking Online Advertisement Guidelines
  • 11.
  • 12. 1. Archive all your public social media, blogs, forums, websites daily 2. Collect data in original file format (HTML, PDF etc.) 3. Collect metadata 4. Sign all data with digital signatures & timestamps 5. Data must be indexed and full-text searchable 6. Store data on duplicate media 7. Data must be retained for 3 to 7 years (depends on industry) Regulatory Compliance Checklist
  • 13. Important Lawsuits ● Re Vee Vinhnee (2005) this case identified inadmissibility of mere printouts of data as authentic evidence, and so the question had to be asked….how to legally verify a document from the internet or digital origin? ● Lorraine v Markel Insurance Company (2007) this landmark judgment originally discussed, and verified, the legal necessity of authentication of digital content when produced in court as digital evidence, in accordance with Federal Rule of Evidence 901(a). ● United States v. Vayner (2014) in one of the most recent and relevant cases to the current stance of social media evidence, the courts found that printouts of a social media account were wrongly admitted as evidence without proper verification and authentication.
  • 14. The problem with digital evidence Data Integrity – How do you prove that a message has not been tampered with? Data Authenticity – How do you prove the date & time a page was captured? – How do you prove from which URL a snapshot was taken? Digital Signatures & Timestamps – Provide data integrity & authenticity for business transactions – eSign Act (2000)
  • 15. Why is social media hard to collect? Multifaceted Nature Can contain images, videos, comments, likes Real-Time Activity Content posted, edited or deleted in real-time Infinite scrolling Social Media walls can scroll indefinitely Deeplinked Content 30% of social media messages contain links to 3rd party website content Link shorteners Short links (bit.ly, goog.le) links can change over time or expire
  • 16. About Metadata Client metadata (FROM) Browser, operating system, IP address, user Webserver/API endpoint metadata (TO) URL, HTTP headers, type, date & time of the request and response Account metadata (WHO) Account owner, bio, description, location Message metadata (WHAT, WHEN) Author, message type, post date & time, versions, links (un- shortened), location, privacy settings, likes, comments, friends
  • 17. What do you need? 1. Screenshot in PDF for visual reference 2. Source code (JSON, XML, MHTML) 3. Metadata 4. Digital Signature & Timestamps 5. EDRM – XML to import in eDiscovery system
  • 18. WebPreserver.com • Web browser plugin • Capture single social media profiles or webpages • Auto-scroll Facebook timeline • Auto-expand Facebook comments • Export to PDF, HTML, metadata, EDRM-XML • Digital Signatures & Timestamps • Full-text Search • Share online
  • 19. PageFreezer.com • Collect social media history • Collect complete websites • Continuous monitoring • API metadata • Export to PDF, HTML, metadata, EDRM-XML • Digital Signatures & Timestamps • Visual Compare • Full-text Search • Share online
  • 20. Social Media & Web Collection Service • We do the work for you • Complete social media account collection • Webpage or complete website • 1 business day turn-around
  • 21. Get the Whitepaper “ Social Media & eDiscovery – Collecting Online Conversations for Litigation” http://hello.pagefreezer.com/social-media-archiving
  • 22. PageFreezer Software, Inc. #500 – 311 Water Street Vancouver, BC Canada (888) 916 3999 mike@pagefreezer.com www.pagefreezer.com @PageFreezer Lets Connect

Notes de l'éditeur

  1. Picture this: a Buffalo police cop stealing coke from the evidence room and posting it on Vine. In this case, it was a comedy skit viewed by 6M people online. As police officers cannot appear in uniform with their badge it turned into an employment case with this officer being suspended for dishonoring the police on social media.
  2. After FDA Warning, Kim Kardashian Posts Corrected Endorsement Of Morning Sickness Pill
  3. Obviously take a screenshot and legalize a tweet by a paralegal, but what if you need to process a 10,000 page website or long social media timelines?