SlideShare a Scribd company logo
Collecting Social Media Records
as Digital Evidence
Michael Riedijk
PageFreezer.com
Social Media in Civil Litigation
Employment 32%
Insurance 13%
Tort 13%
Intellectual Property
10%
Contract 8%
Defamation 5%
Bankruptcy 5%
Privacy 5%
Trade secrets 3%
Divorce 3% Discrimination 3%
Social Media in Criminal Litigation
Child Exploitation 28%
ID of Witnesses 13%
Online Harassment
11%
Gang related 11%
Fraud 8%
Sexual Assault 9%
Violation of Probation
6%
Drugs 6%
Possession of Firearms
4%
Murder 2% Terrorism 2%
Confidential
Broker dealers & Investment brokers
(2012)
– SEC 17a-4: preserve business records of all
marketing communications for not less than
3 years
– FINRA 10-06/11-39: record keeping,
supervision and responding to social media
posts
Banks & Credit Unions (2013)
– FFIEC, FDIC, NCUA: “Social Media:
Consumer Risk Management Guidance”
Mortgage Brokers (2015)
– Mortgage Acts and Practices (FTC):
preserve copies of all commercial
communications & mortgage advertisement
Financial
Services
Regulatory
Compliance
Learn more: https://www.pagefreezer.com/financial-services/
• Federal Records Act (44 U.S.C.
3301 )
– “All books, papers, maps, photographs,
machine readable materials, or other
documentary materials, regardless of
physical form or characteristics…”
• State Open Records laws
– “All state and local government agencies
must retain all web content in accordance
with the approved retention schedules.” -
WA State Preservation of Electronic Public
Records law
Open
Records
Compliance
Learn more: http://www.pagefreezer.com/government/
FTC’s Advertising Endorsement
Guides
• Prevent deceptive online advertisement
• Applies to bloggers, social media &
websites that get paid for promoting
products
• Images, video and links to 3rd party
website are considered an endorsement
• Must disclose relationship with
advertiser
https://www.ftc.gov/system/files/documents/plain-language/bus41-dot-
com-disclosures-information-about-online-advertising.pdf
https://www.ftc.gov/tips-advice/business-center/guidance/ftcs-
endorsement-guides-what-people-are-asking
Online
Advertisement
Guidelines
1. Archive all your public social media, blogs,
forums, websites daily
2. Collect data in original file format (HTML,
PDF etc.)
3. Collect metadata
4. Sign all data with digital signatures &
timestamps
5. Data must be indexed and full-text
searchable
6. Store data on duplicate media
7. Data must be retained for 3 to 7 years
(depends on industry)
Regulatory
Compliance
Checklist
Important
Lawsuits
● Re Vee Vinhnee (2005)
this case identified inadmissibility of mere printouts of
data as authentic evidence, and so the question had to
be asked….how to legally verify a document from the
internet or digital origin?
● Lorraine v Markel Insurance Company
(2007)
this landmark judgment originally discussed, and
verified, the legal necessity of authentication of digital
content when produced in court as digital evidence, in
accordance with Federal Rule of Evidence 901(a).
● United States v. Vayner (2014)
in one of the most recent and relevant cases to the
current stance of social media evidence, the courts
found that printouts of a social media account were
wrongly admitted as evidence without proper
verification and authentication.
The problem
with digital
evidence
Data Integrity
– How do you prove that a message has not
been tampered with?
Data Authenticity
– How do you prove the date & time a page
was captured?
– How do you prove from which URL a
snapshot was taken?
Digital Signatures & Timestamps
– Provide data integrity & authenticity for
business transactions
– eSign Act (2000)
Why is social
media hard to
collect?
Multifaceted Nature
Can contain images, videos, comments, likes
Real-Time Activity
Content posted, edited or deleted in real-time
Infinite scrolling
Social Media walls can scroll indefinitely
Deeplinked Content
30% of social media messages contain links to 3rd
party website content
Link shorteners
Short links (bit.ly, goog.le) links can change over time
or expire
About
Metadata
Client metadata (FROM)
Browser, operating system, IP address, user
Webserver/API endpoint metadata (TO)
URL, HTTP headers, type, date & time of the request and response
Account metadata (WHO)
Account owner, bio, description, location
Message metadata (WHAT, WHEN)
Author, message type, post date & time, versions, links (un-
shortened), location, privacy settings, likes, comments, friends
What do
you need?
1. Screenshot in PDF for visual reference
2. Source code (JSON, XML, MHTML)
3. Metadata
4. Digital Signature & Timestamps
5. EDRM – XML to import in eDiscovery
system
WebPreserver.com
• Web browser plugin
• Capture single social media profiles
or webpages
• Auto-scroll Facebook timeline
• Auto-expand Facebook comments
• Export to PDF, HTML, metadata,
EDRM-XML
• Digital Signatures & Timestamps
• Full-text Search
• Share online
PageFreezer.com
• Collect social media history
• Collect complete websites
• Continuous monitoring
• API metadata
• Export to PDF, HTML, metadata,
EDRM-XML
• Digital Signatures & Timestamps
• Visual Compare
• Full-text Search
• Share online
Social Media & Web Collection Service
• We do the work for you
• Complete social media account collection
• Webpage or complete website
• 1 business day turn-around
Get the
Whitepaper
“ Social Media & eDiscovery –
Collecting Online Conversations for
Litigation”
http://hello.pagefreezer.com/social-media-archiving
PageFreezer Software, Inc.
#500 – 311 Water Street
Vancouver, BC Canada
(888) 916 3999
mike@pagefreezer.com
www.pagefreezer.com
@PageFreezer
Lets
Connect

More Related Content

What's hot

Thought leaders in big data ulf mattsson, cto of protegrity (part 2)
Thought leaders in big data   ulf mattsson, cto of protegrity (part 2)Thought leaders in big data   ulf mattsson, cto of protegrity (part 2)
Thought leaders in big data ulf mattsson, cto of protegrity (part 2)
Ulf Mattsson
 
GDPR Explained in Simple Terms for Hospitality Owners
GDPR Explained in Simple Terms for Hospitality OwnersGDPR Explained in Simple Terms for Hospitality Owners
GDPR Explained in Simple Terms for Hospitality Owners
Boostly
 
Access control by signature key to provide privacy for cloud and big data
Access control by signature   key to provide privacy for cloud and big dataAccess control by signature   key to provide privacy for cloud and big data
Access control by signature key to provide privacy for cloud and big data
Shakas Technologies
 
BigID DataSheet: Data Access Intelligence
BigID DataSheet: Data Access IntelligenceBigID DataSheet: Data Access Intelligence
BigID DataSheet: Data Access Intelligence
BigID Inc
 
BigID Data Sheet HIPAA Data Security & Privacy
BigID Data Sheet HIPAA Data Security & Privacy BigID Data Sheet HIPAA Data Security & Privacy
BigID Data Sheet HIPAA Data Security & Privacy
BigID Inc
 
BigID Datasheet: CCPA Data Rights Automation
BigID Datasheet: CCPA Data Rights AutomationBigID Datasheet: CCPA Data Rights Automation
BigID Datasheet: CCPA Data Rights Automation
BigID Inc
 
Privacy: What does this have to do with Product Management?
Privacy: What does this have to do with Product Management?Privacy: What does this have to do with Product Management?
Privacy: What does this have to do with Product Management?
Eduardo Silva
 
PageFreezer Webinar | Website & Social Media Compliance for Financial Services
PageFreezer Webinar | Website & Social Media Compliance for Financial ServicesPageFreezer Webinar | Website & Social Media Compliance for Financial Services
PageFreezer Webinar | Website & Social Media Compliance for Financial Services
Michael Riedijk
 
Best Practices to Protect Cardholder Data Environment and Achieve PCI Compliance
Best Practices to Protect Cardholder Data Environment and Achieve PCI ComplianceBest Practices to Protect Cardholder Data Environment and Achieve PCI Compliance
Best Practices to Protect Cardholder Data Environment and Achieve PCI Compliance
Rapid7
 
BigID Data sheet: Consent Governance & Orchestration
BigID Data sheet: Consent Governance & OrchestrationBigID Data sheet: Consent Governance & Orchestration
BigID Data sheet: Consent Governance & Orchestration
BigID Inc
 
Trouble with the terroriest
Trouble with the terroriestTrouble with the terroriest
Trouble with the terroriestbaqerz
 
Handling PII and sensitive content in SAP BusinessObjects
Handling PII and sensitive content in SAP BusinessObjects Handling PII and sensitive content in SAP BusinessObjects
Handling PII and sensitive content in SAP BusinessObjects
Wiiisdom
 
GDPR for developers
GDPR for developersGDPR for developers
GDPR for developers
Bozhidar Bozhanov
 
Alternatives for copyright protection online
Alternatives for copyright protection onlineAlternatives for copyright protection online
Alternatives for copyright protection online
Bozhidar Bozhanov
 
General Data Protection Regulation for Ops
General Data Protection Regulation for OpsGeneral Data Protection Regulation for Ops
General Data Protection Regulation for Ops
Kamil Rextin
 
GDPR and Blockchain
GDPR and BlockchainGDPR and Blockchain
GDPR and Blockchain
Salman Baset
 
BigID Data Sheet: LGPD Compliance Automated
BigID Data Sheet: LGPD Compliance AutomatedBigID Data Sheet: LGPD Compliance Automated
BigID Data Sheet: LGPD Compliance Automated
BigID Inc
 
GDPR considerations for blockchain solution architects.
GDPR considerations for blockchain solution architects.GDPR considerations for blockchain solution architects.
GDPR considerations for blockchain solution architects.
Salman Baset
 
Data Privacy & Compliance Considerations on Using Cloud Services
Data Privacy & Compliance Considerations on Using Cloud ServicesData Privacy & Compliance Considerations on Using Cloud Services
Data Privacy & Compliance Considerations on Using Cloud Services
Amazon Web Services
 
Frukostseminarium om molntjänster
Frukostseminarium om molntjänsterFrukostseminarium om molntjänster
Frukostseminarium om molntjänster
Transcendent Group
 

What's hot (20)

Thought leaders in big data ulf mattsson, cto of protegrity (part 2)
Thought leaders in big data   ulf mattsson, cto of protegrity (part 2)Thought leaders in big data   ulf mattsson, cto of protegrity (part 2)
Thought leaders in big data ulf mattsson, cto of protegrity (part 2)
 
GDPR Explained in Simple Terms for Hospitality Owners
GDPR Explained in Simple Terms for Hospitality OwnersGDPR Explained in Simple Terms for Hospitality Owners
GDPR Explained in Simple Terms for Hospitality Owners
 
Access control by signature key to provide privacy for cloud and big data
Access control by signature   key to provide privacy for cloud and big dataAccess control by signature   key to provide privacy for cloud and big data
Access control by signature key to provide privacy for cloud and big data
 
BigID DataSheet: Data Access Intelligence
BigID DataSheet: Data Access IntelligenceBigID DataSheet: Data Access Intelligence
BigID DataSheet: Data Access Intelligence
 
BigID Data Sheet HIPAA Data Security & Privacy
BigID Data Sheet HIPAA Data Security & Privacy BigID Data Sheet HIPAA Data Security & Privacy
BigID Data Sheet HIPAA Data Security & Privacy
 
BigID Datasheet: CCPA Data Rights Automation
BigID Datasheet: CCPA Data Rights AutomationBigID Datasheet: CCPA Data Rights Automation
BigID Datasheet: CCPA Data Rights Automation
 
Privacy: What does this have to do with Product Management?
Privacy: What does this have to do with Product Management?Privacy: What does this have to do with Product Management?
Privacy: What does this have to do with Product Management?
 
PageFreezer Webinar | Website & Social Media Compliance for Financial Services
PageFreezer Webinar | Website & Social Media Compliance for Financial ServicesPageFreezer Webinar | Website & Social Media Compliance for Financial Services
PageFreezer Webinar | Website & Social Media Compliance for Financial Services
 
Best Practices to Protect Cardholder Data Environment and Achieve PCI Compliance
Best Practices to Protect Cardholder Data Environment and Achieve PCI ComplianceBest Practices to Protect Cardholder Data Environment and Achieve PCI Compliance
Best Practices to Protect Cardholder Data Environment and Achieve PCI Compliance
 
BigID Data sheet: Consent Governance & Orchestration
BigID Data sheet: Consent Governance & OrchestrationBigID Data sheet: Consent Governance & Orchestration
BigID Data sheet: Consent Governance & Orchestration
 
Trouble with the terroriest
Trouble with the terroriestTrouble with the terroriest
Trouble with the terroriest
 
Handling PII and sensitive content in SAP BusinessObjects
Handling PII and sensitive content in SAP BusinessObjects Handling PII and sensitive content in SAP BusinessObjects
Handling PII and sensitive content in SAP BusinessObjects
 
GDPR for developers
GDPR for developersGDPR for developers
GDPR for developers
 
Alternatives for copyright protection online
Alternatives for copyright protection onlineAlternatives for copyright protection online
Alternatives for copyright protection online
 
General Data Protection Regulation for Ops
General Data Protection Regulation for OpsGeneral Data Protection Regulation for Ops
General Data Protection Regulation for Ops
 
GDPR and Blockchain
GDPR and BlockchainGDPR and Blockchain
GDPR and Blockchain
 
BigID Data Sheet: LGPD Compliance Automated
BigID Data Sheet: LGPD Compliance AutomatedBigID Data Sheet: LGPD Compliance Automated
BigID Data Sheet: LGPD Compliance Automated
 
GDPR considerations for blockchain solution architects.
GDPR considerations for blockchain solution architects.GDPR considerations for blockchain solution architects.
GDPR considerations for blockchain solution architects.
 
Data Privacy & Compliance Considerations on Using Cloud Services
Data Privacy & Compliance Considerations on Using Cloud ServicesData Privacy & Compliance Considerations on Using Cloud Services
Data Privacy & Compliance Considerations on Using Cloud Services
 
Frukostseminarium om molntjänster
Frukostseminarium om molntjänsterFrukostseminarium om molntjänster
Frukostseminarium om molntjänster
 

Similar to Collecting Social Media as Digital Evidence - PageFreezer Webinar

Webinar: Gathering Social Media Evidence
Webinar: Gathering Social Media EvidenceWebinar: Gathering Social Media Evidence
Webinar: Gathering Social Media Evidence
Case IQ
 
SayanMitra.pdf
SayanMitra.pdfSayanMitra.pdf
SayanMitra.pdf
TanayMalhotra
 
Eamonn O Raghallaigh Major Security Issues In E Commerce
Eamonn O Raghallaigh   Major Security Issues In E CommerceEamonn O Raghallaigh   Major Security Issues In E Commerce
Eamonn O Raghallaigh Major Security Issues In E Commerce
EamonnORagh
 
Is More Data Always Better The Legal Risks of Data Collection, Storage and Us...
Is More Data Always Better The Legal Risks of Data Collection, Storage and Us...Is More Data Always Better The Legal Risks of Data Collection, Storage and Us...
Is More Data Always Better The Legal Risks of Data Collection, Storage and Us...Vivastream
 
Why Do You Know So Much About Me
Why Do You Know So Much About MeWhy Do You Know So Much About Me
Why Do You Know So Much About Me
commandeleven
 
Legal Perspective on Information Management “New Social Media – The New Recor...
Legal Perspective on Information Management “New Social Media – The New Recor...Legal Perspective on Information Management “New Social Media – The New Recor...
Legal Perspective on Information Management “New Social Media – The New Recor...
anthonywong
 
What the Redaction of WHOIS Data Means for Cybersecurity
What the Redaction of WHOIS Data Means for CybersecurityWhat the Redaction of WHOIS Data Means for Cybersecurity
What the Redaction of WHOIS Data Means for Cybersecurity
WhoisXML API
 
Role of CAs in cyber world
Role of CAs in cyber worldRole of CAs in cyber world
Role of CAs in cyber world
CA. (Dr.) Rajkumar Adukia
 
SS236 Unit 8 Assignment Rubric Content 70 Points Do.docx
 SS236 Unit 8 Assignment Rubric Content 70 Points Do.docx SS236 Unit 8 Assignment Rubric Content 70 Points Do.docx
SS236 Unit 8 Assignment Rubric Content 70 Points Do.docx
aryan532920
 
digital identity 2.0: how technology is transforming behaviours and raising c...
digital identity 2.0: how technology is transforming behaviours and raising c...digital identity 2.0: how technology is transforming behaviours and raising c...
digital identity 2.0: how technology is transforming behaviours and raising c...
Patrick McCormick
 
6: privacy terms
6: privacy terms6: privacy terms
6: privacy terms
COMP 113
 
Monitising mobile (data and infomation)
Monitising mobile (data and infomation)Monitising mobile (data and infomation)
Monitising mobile (data and infomation)
Tony Fish
 
Don't Panic. Making Progress on the 'Going Dark' Debate
Don't Panic. Making Progress on the 'Going Dark' DebateDon't Panic. Making Progress on the 'Going Dark' Debate
Don't Panic. Making Progress on the 'Going Dark' Debate
Fabio Chiusi
 
Social Distortion: Privacy, Consent, and Social Networks
Social Distortion: Privacy, Consent, and Social NetworksSocial Distortion: Privacy, Consent, and Social Networks
Social Distortion: Privacy, Consent, and Social Networks
dariphagen
 
GDPR (En) JM Tyszka
GDPR (En)  JM TyszkaGDPR (En)  JM Tyszka
GDPR (En) JM Tyszka
Jean-Michel Tyszka
 
Online Identity Theft: Changing the Game
Online Identity Theft: Changing the GameOnline Identity Theft: Changing the Game
Online Identity Theft: Changing the Game
- Mark - Fullbright
 
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docxhttpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
adampcarr67227
 
Big Data LDN 2017: Collaborative Data Governance: GDPR Is Only the Beginning
Big Data LDN 2017: Collaborative Data Governance: GDPR Is Only the BeginningBig Data LDN 2017: Collaborative Data Governance: GDPR Is Only the Beginning
Big Data LDN 2017: Collaborative Data Governance: GDPR Is Only the Beginning
Matt Stubbs
 
2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna
2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna
2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna
Aviva Spectrum™
 
How To Prevent The World Wild Web Identity Crisis
How To Prevent The World Wild Web Identity CrisisHow To Prevent The World Wild Web Identity Crisis
How To Prevent The World Wild Web Identity Crisis
wieringa
 

Similar to Collecting Social Media as Digital Evidence - PageFreezer Webinar (20)

Webinar: Gathering Social Media Evidence
Webinar: Gathering Social Media EvidenceWebinar: Gathering Social Media Evidence
Webinar: Gathering Social Media Evidence
 
SayanMitra.pdf
SayanMitra.pdfSayanMitra.pdf
SayanMitra.pdf
 
Eamonn O Raghallaigh Major Security Issues In E Commerce
Eamonn O Raghallaigh   Major Security Issues In E CommerceEamonn O Raghallaigh   Major Security Issues In E Commerce
Eamonn O Raghallaigh Major Security Issues In E Commerce
 
Is More Data Always Better The Legal Risks of Data Collection, Storage and Us...
Is More Data Always Better The Legal Risks of Data Collection, Storage and Us...Is More Data Always Better The Legal Risks of Data Collection, Storage and Us...
Is More Data Always Better The Legal Risks of Data Collection, Storage and Us...
 
Why Do You Know So Much About Me
Why Do You Know So Much About MeWhy Do You Know So Much About Me
Why Do You Know So Much About Me
 
Legal Perspective on Information Management “New Social Media – The New Recor...
Legal Perspective on Information Management “New Social Media – The New Recor...Legal Perspective on Information Management “New Social Media – The New Recor...
Legal Perspective on Information Management “New Social Media – The New Recor...
 
What the Redaction of WHOIS Data Means for Cybersecurity
What the Redaction of WHOIS Data Means for CybersecurityWhat the Redaction of WHOIS Data Means for Cybersecurity
What the Redaction of WHOIS Data Means for Cybersecurity
 
Role of CAs in cyber world
Role of CAs in cyber worldRole of CAs in cyber world
Role of CAs in cyber world
 
SS236 Unit 8 Assignment Rubric Content 70 Points Do.docx
 SS236 Unit 8 Assignment Rubric Content 70 Points Do.docx SS236 Unit 8 Assignment Rubric Content 70 Points Do.docx
SS236 Unit 8 Assignment Rubric Content 70 Points Do.docx
 
digital identity 2.0: how technology is transforming behaviours and raising c...
digital identity 2.0: how technology is transforming behaviours and raising c...digital identity 2.0: how technology is transforming behaviours and raising c...
digital identity 2.0: how technology is transforming behaviours and raising c...
 
6: privacy terms
6: privacy terms6: privacy terms
6: privacy terms
 
Monitising mobile (data and infomation)
Monitising mobile (data and infomation)Monitising mobile (data and infomation)
Monitising mobile (data and infomation)
 
Don't Panic. Making Progress on the 'Going Dark' Debate
Don't Panic. Making Progress on the 'Going Dark' DebateDon't Panic. Making Progress on the 'Going Dark' Debate
Don't Panic. Making Progress on the 'Going Dark' Debate
 
Social Distortion: Privacy, Consent, and Social Networks
Social Distortion: Privacy, Consent, and Social NetworksSocial Distortion: Privacy, Consent, and Social Networks
Social Distortion: Privacy, Consent, and Social Networks
 
GDPR (En) JM Tyszka
GDPR (En)  JM TyszkaGDPR (En)  JM Tyszka
GDPR (En) JM Tyszka
 
Online Identity Theft: Changing the Game
Online Identity Theft: Changing the GameOnline Identity Theft: Changing the Game
Online Identity Theft: Changing the Game
 
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docxhttpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
 
Big Data LDN 2017: Collaborative Data Governance: GDPR Is Only the Beginning
Big Data LDN 2017: Collaborative Data Governance: GDPR Is Only the BeginningBig Data LDN 2017: Collaborative Data Governance: GDPR Is Only the Beginning
Big Data LDN 2017: Collaborative Data Governance: GDPR Is Only the Beginning
 
2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna
2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna
2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna
 
How To Prevent The World Wild Web Identity Crisis
How To Prevent The World Wild Web Identity CrisisHow To Prevent The World Wild Web Identity Crisis
How To Prevent The World Wild Web Identity Crisis
 

Recently uploaded

定制(nus毕业证书)新加坡国立大学毕业证学位证书实拍图原版一模一样
定制(nus毕业证书)新加坡国立大学毕业证学位证书实拍图原版一模一样定制(nus毕业证书)新加坡国立大学毕业证学位证书实拍图原版一模一样
定制(nus毕业证书)新加坡国立大学毕业证学位证书实拍图原版一模一样
9ib5wiwt
 
办理(waikato毕业证书)新西兰怀卡托大学毕业证双学位证书原版一模一样
办理(waikato毕业证书)新西兰怀卡托大学毕业证双学位证书原版一模一样办理(waikato毕业证书)新西兰怀卡托大学毕业证双学位证书原版一模一样
办理(waikato毕业证书)新西兰怀卡托大学毕业证双学位证书原版一模一样
9ib5wiwt
 
Lifting the Corporate Veil. Power Point Presentation
Lifting the Corporate Veil. Power Point PresentationLifting the Corporate Veil. Power Point Presentation
Lifting the Corporate Veil. Power Point Presentation
seri bangash
 
Highlights_of_Bhartiya_Nyaya_Sanhita.pptx
Highlights_of_Bhartiya_Nyaya_Sanhita.pptxHighlights_of_Bhartiya_Nyaya_Sanhita.pptx
Highlights_of_Bhartiya_Nyaya_Sanhita.pptx
anjalidixit21
 
怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样
怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样
怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样
9ib5wiwt
 
XYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdf
XYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdfXYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdf
XYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdf
bhavenpr
 
在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样
在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样
在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样
osenwakm
 
Defending Weapons Offence Charges: Role of Mississauga Criminal Defence Lawyers
Defending Weapons Offence Charges: Role of Mississauga Criminal Defence LawyersDefending Weapons Offence Charges: Role of Mississauga Criminal Defence Lawyers
Defending Weapons Offence Charges: Role of Mississauga Criminal Defence Lawyers
HarpreetSaini48
 
Tax Law Notes on taxation law tax law for 10th sem
Tax Law Notes on taxation law tax law for 10th semTax Law Notes on taxation law tax law for 10th sem
Tax Law Notes on taxation law tax law for 10th sem
azizurrahaman17
 
Rokita Releases Soccer Stadium Legal Opinion
Rokita Releases Soccer Stadium Legal OpinionRokita Releases Soccer Stadium Legal Opinion
Rokita Releases Soccer Stadium Legal Opinion
Abdul-Hakim Shabazz
 
Business and Corporate Case Update (2024)
Business and Corporate Case Update (2024)Business and Corporate Case Update (2024)
Business and Corporate Case Update (2024)
Wendy Couture
 
Daftar Rumpun, Pohon, dan Cabang Ilmu (28 Mei 2024).pdf
Daftar Rumpun, Pohon, dan Cabang Ilmu (28 Mei 2024).pdfDaftar Rumpun, Pohon, dan Cabang Ilmu (28 Mei 2024).pdf
Daftar Rumpun, Pohon, dan Cabang Ilmu (28 Mei 2024).pdf
akbarrasyid3
 
原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样
原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样
原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样
9ib5wiwt
 
ADR in criminal proceeding in Bangladesh with global perspective.
ADR in criminal proceeding in Bangladesh with global perspective.ADR in criminal proceeding in Bangladesh with global perspective.
ADR in criminal proceeding in Bangladesh with global perspective.
Daffodil International University
 
一比一原版麻省理工学院毕业证(MIT毕业证)成绩单如何办理
一比一原版麻省理工学院毕业证(MIT毕业证)成绩单如何办理一比一原版麻省理工学院毕业证(MIT毕业证)成绩单如何办理
一比一原版麻省理工学院毕业证(MIT毕业证)成绩单如何办理
o6ov5dqmf
 
原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样
原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样
原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样
osenwakm
 
Secure Your Brand: File a Trademark Today
Secure Your Brand: File a Trademark TodaySecure Your Brand: File a Trademark Today
Secure Your Brand: File a Trademark Today
Trademark Quick
 
Understanding about ITR-1 and Documentation
Understanding about ITR-1 and DocumentationUnderstanding about ITR-1 and Documentation
Understanding about ITR-1 and Documentation
CAAJAYKUMAR4
 
Bharatiya Nagarik Suraksha Sanhita power.pptx
Bharatiya Nagarik Suraksha Sanhita power.pptxBharatiya Nagarik Suraksha Sanhita power.pptx
Bharatiya Nagarik Suraksha Sanhita power.pptx
ShivkumarIyer18
 
Patenting_Innovations_in_3D_Printing_Prosthetics.pptx
Patenting_Innovations_in_3D_Printing_Prosthetics.pptxPatenting_Innovations_in_3D_Printing_Prosthetics.pptx
Patenting_Innovations_in_3D_Printing_Prosthetics.pptx
ssuser559494
 

Recently uploaded (20)

定制(nus毕业证书)新加坡国立大学毕业证学位证书实拍图原版一模一样
定制(nus毕业证书)新加坡国立大学毕业证学位证书实拍图原版一模一样定制(nus毕业证书)新加坡国立大学毕业证学位证书实拍图原版一模一样
定制(nus毕业证书)新加坡国立大学毕业证学位证书实拍图原版一模一样
 
办理(waikato毕业证书)新西兰怀卡托大学毕业证双学位证书原版一模一样
办理(waikato毕业证书)新西兰怀卡托大学毕业证双学位证书原版一模一样办理(waikato毕业证书)新西兰怀卡托大学毕业证双学位证书原版一模一样
办理(waikato毕业证书)新西兰怀卡托大学毕业证双学位证书原版一模一样
 
Lifting the Corporate Veil. Power Point Presentation
Lifting the Corporate Veil. Power Point PresentationLifting the Corporate Veil. Power Point Presentation
Lifting the Corporate Veil. Power Point Presentation
 
Highlights_of_Bhartiya_Nyaya_Sanhita.pptx
Highlights_of_Bhartiya_Nyaya_Sanhita.pptxHighlights_of_Bhartiya_Nyaya_Sanhita.pptx
Highlights_of_Bhartiya_Nyaya_Sanhita.pptx
 
怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样
怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样
怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样
 
XYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdf
XYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdfXYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdf
XYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdf
 
在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样
在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样
在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样
 
Defending Weapons Offence Charges: Role of Mississauga Criminal Defence Lawyers
Defending Weapons Offence Charges: Role of Mississauga Criminal Defence LawyersDefending Weapons Offence Charges: Role of Mississauga Criminal Defence Lawyers
Defending Weapons Offence Charges: Role of Mississauga Criminal Defence Lawyers
 
Tax Law Notes on taxation law tax law for 10th sem
Tax Law Notes on taxation law tax law for 10th semTax Law Notes on taxation law tax law for 10th sem
Tax Law Notes on taxation law tax law for 10th sem
 
Rokita Releases Soccer Stadium Legal Opinion
Rokita Releases Soccer Stadium Legal OpinionRokita Releases Soccer Stadium Legal Opinion
Rokita Releases Soccer Stadium Legal Opinion
 
Business and Corporate Case Update (2024)
Business and Corporate Case Update (2024)Business and Corporate Case Update (2024)
Business and Corporate Case Update (2024)
 
Daftar Rumpun, Pohon, dan Cabang Ilmu (28 Mei 2024).pdf
Daftar Rumpun, Pohon, dan Cabang Ilmu (28 Mei 2024).pdfDaftar Rumpun, Pohon, dan Cabang Ilmu (28 Mei 2024).pdf
Daftar Rumpun, Pohon, dan Cabang Ilmu (28 Mei 2024).pdf
 
原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样
原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样
原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样
 
ADR in criminal proceeding in Bangladesh with global perspective.
ADR in criminal proceeding in Bangladesh with global perspective.ADR in criminal proceeding in Bangladesh with global perspective.
ADR in criminal proceeding in Bangladesh with global perspective.
 
一比一原版麻省理工学院毕业证(MIT毕业证)成绩单如何办理
一比一原版麻省理工学院毕业证(MIT毕业证)成绩单如何办理一比一原版麻省理工学院毕业证(MIT毕业证)成绩单如何办理
一比一原版麻省理工学院毕业证(MIT毕业证)成绩单如何办理
 
原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样
原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样
原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样
 
Secure Your Brand: File a Trademark Today
Secure Your Brand: File a Trademark TodaySecure Your Brand: File a Trademark Today
Secure Your Brand: File a Trademark Today
 
Understanding about ITR-1 and Documentation
Understanding about ITR-1 and DocumentationUnderstanding about ITR-1 and Documentation
Understanding about ITR-1 and Documentation
 
Bharatiya Nagarik Suraksha Sanhita power.pptx
Bharatiya Nagarik Suraksha Sanhita power.pptxBharatiya Nagarik Suraksha Sanhita power.pptx
Bharatiya Nagarik Suraksha Sanhita power.pptx
 
Patenting_Innovations_in_3D_Printing_Prosthetics.pptx
Patenting_Innovations_in_3D_Printing_Prosthetics.pptxPatenting_Innovations_in_3D_Printing_Prosthetics.pptx
Patenting_Innovations_in_3D_Printing_Prosthetics.pptx
 

Collecting Social Media as Digital Evidence - PageFreezer Webinar

  • 1. Collecting Social Media Records as Digital Evidence Michael Riedijk PageFreezer.com
  • 2.
  • 3. Social Media in Civil Litigation Employment 32% Insurance 13% Tort 13% Intellectual Property 10% Contract 8% Defamation 5% Bankruptcy 5% Privacy 5% Trade secrets 3% Divorce 3% Discrimination 3%
  • 4. Social Media in Criminal Litigation Child Exploitation 28% ID of Witnesses 13% Online Harassment 11% Gang related 11% Fraud 8% Sexual Assault 9% Violation of Probation 6% Drugs 6% Possession of Firearms 4% Murder 2% Terrorism 2%
  • 6. Broker dealers & Investment brokers (2012) – SEC 17a-4: preserve business records of all marketing communications for not less than 3 years – FINRA 10-06/11-39: record keeping, supervision and responding to social media posts Banks & Credit Unions (2013) – FFIEC, FDIC, NCUA: “Social Media: Consumer Risk Management Guidance” Mortgage Brokers (2015) – Mortgage Acts and Practices (FTC): preserve copies of all commercial communications & mortgage advertisement Financial Services Regulatory Compliance
  • 8. • Federal Records Act (44 U.S.C. 3301 ) – “All books, papers, maps, photographs, machine readable materials, or other documentary materials, regardless of physical form or characteristics…” • State Open Records laws – “All state and local government agencies must retain all web content in accordance with the approved retention schedules.” - WA State Preservation of Electronic Public Records law Open Records Compliance
  • 10. FTC’s Advertising Endorsement Guides • Prevent deceptive online advertisement • Applies to bloggers, social media & websites that get paid for promoting products • Images, video and links to 3rd party website are considered an endorsement • Must disclose relationship with advertiser https://www.ftc.gov/system/files/documents/plain-language/bus41-dot- com-disclosures-information-about-online-advertising.pdf https://www.ftc.gov/tips-advice/business-center/guidance/ftcs- endorsement-guides-what-people-are-asking Online Advertisement Guidelines
  • 11.
  • 12. 1. Archive all your public social media, blogs, forums, websites daily 2. Collect data in original file format (HTML, PDF etc.) 3. Collect metadata 4. Sign all data with digital signatures & timestamps 5. Data must be indexed and full-text searchable 6. Store data on duplicate media 7. Data must be retained for 3 to 7 years (depends on industry) Regulatory Compliance Checklist
  • 13. Important Lawsuits ● Re Vee Vinhnee (2005) this case identified inadmissibility of mere printouts of data as authentic evidence, and so the question had to be asked….how to legally verify a document from the internet or digital origin? ● Lorraine v Markel Insurance Company (2007) this landmark judgment originally discussed, and verified, the legal necessity of authentication of digital content when produced in court as digital evidence, in accordance with Federal Rule of Evidence 901(a). ● United States v. Vayner (2014) in one of the most recent and relevant cases to the current stance of social media evidence, the courts found that printouts of a social media account were wrongly admitted as evidence without proper verification and authentication.
  • 14. The problem with digital evidence Data Integrity – How do you prove that a message has not been tampered with? Data Authenticity – How do you prove the date & time a page was captured? – How do you prove from which URL a snapshot was taken? Digital Signatures & Timestamps – Provide data integrity & authenticity for business transactions – eSign Act (2000)
  • 15. Why is social media hard to collect? Multifaceted Nature Can contain images, videos, comments, likes Real-Time Activity Content posted, edited or deleted in real-time Infinite scrolling Social Media walls can scroll indefinitely Deeplinked Content 30% of social media messages contain links to 3rd party website content Link shorteners Short links (bit.ly, goog.le) links can change over time or expire
  • 16. About Metadata Client metadata (FROM) Browser, operating system, IP address, user Webserver/API endpoint metadata (TO) URL, HTTP headers, type, date & time of the request and response Account metadata (WHO) Account owner, bio, description, location Message metadata (WHAT, WHEN) Author, message type, post date & time, versions, links (un- shortened), location, privacy settings, likes, comments, friends
  • 17. What do you need? 1. Screenshot in PDF for visual reference 2. Source code (JSON, XML, MHTML) 3. Metadata 4. Digital Signature & Timestamps 5. EDRM – XML to import in eDiscovery system
  • 18. WebPreserver.com • Web browser plugin • Capture single social media profiles or webpages • Auto-scroll Facebook timeline • Auto-expand Facebook comments • Export to PDF, HTML, metadata, EDRM-XML • Digital Signatures & Timestamps • Full-text Search • Share online
  • 19. PageFreezer.com • Collect social media history • Collect complete websites • Continuous monitoring • API metadata • Export to PDF, HTML, metadata, EDRM-XML • Digital Signatures & Timestamps • Visual Compare • Full-text Search • Share online
  • 20. Social Media & Web Collection Service • We do the work for you • Complete social media account collection • Webpage or complete website • 1 business day turn-around
  • 21. Get the Whitepaper “ Social Media & eDiscovery – Collecting Online Conversations for Litigation” http://hello.pagefreezer.com/social-media-archiving
  • 22. PageFreezer Software, Inc. #500 – 311 Water Street Vancouver, BC Canada (888) 916 3999 mike@pagefreezer.com www.pagefreezer.com @PageFreezer Lets Connect

Editor's Notes

  1. Picture this: a Buffalo police cop stealing coke from the evidence room and posting it on Vine. In this case, it was a comedy skit viewed by 6M people online. As police officers cannot appear in uniform with their badge it turned into an employment case with this officer being suspended for dishonoring the police on social media.
  2. After FDA Warning, Kim Kardashian Posts Corrected Endorsement Of Morning Sickness Pill
  3. Obviously take a screenshot and legalize a tweet by a paralegal, but what if you need to process a 10,000 page website or long social media timelines?