See the latest news and insights around Information Governance, eDiscovery, Enterprise Collaboration, and Social Media.
As social media usage has increased, so have the different types of abuse, harassment, bullying, and defamation victims can face online. One of the most powerful tools to combat this growing trend is education, making it easier to handle situations that can suddenly materialize. This blog discusses the ten forms of social media bullying and harassment by offering concrete examples and insights into its many forms.
As social media usage has increased, so have the different types of abuse, harassment, bullying, and defamation victims can face online. One of the most powerful tools to combat this growing trend is education, making it easier to handle situations that c
Since the beginning of social media, people from all over have been able to share their thoughts and ideas. The dark side of this revolutionary change is that not everyone has something kind to say, which makes protecting yourself against social media har
The internet has become a breeding ground for misinformation and disinformation. According to the Pew Research Center, Americans' exposure to––and belief in––misinformation differs by the specific news outlets and the general pathways they rely on. More s
Any business that deals with sensitive information needs a document retention policy. Does your business have staff you keep records on, for example? If so, your business deals with sensitive information.
Building websites used to require a lot of time, knowledge, and manual coding. But with today's sophisticated content management systems (CMSs), building and managing a website is much easier. While customizing features may require technical know-how, the
Social media archiving is necessary for police and fire departments to comply with open record laws. It can also help facilitate crisis communication and foster organizational trust within the community.
Law enforcement agencies rely heavily on social media platforms for their public messaging.
With the digital realm increasingly shaping both our personal and professional lives, the rise of electronic evidence in legal cases was inevitable. But as technology advances, so do the methods for creating fake digital evidence, posing significant chall
Building trust with the general public is important for government agencies, and it is no easy task. Public information officers (PIOs) need to stay vigilant and ahead of the curve when it comes to social media use.
We’re used to seeing people post incredible amounts of personal information on platforms like Facebook, LinkedIn, Instagram, Strava, Twitter, etc. But now, another platform must be added to that list: TikTok.
SHA-256 is one of the most widely used cryptographic hashing algorithms, playing a crucial role in securing digital information. Part of the Secure Hash Algorithm 2 (SHA-2) family, SHA-256 ensures data integrity, safeguards sensitive information, and authenticates digital evidence and records in legal and compliance scenarios.
These days, you'd be hard-pressed to find an business that isn't advertising on social media. But when it comes to financial service providers, social media marketing can become a double-edged sword, or worse a compliance nightmare that results in major fines from the SEC, FINRA or the FTC.
Head Office:
#500-311 Water Street
Vancouver, BC V6B 1B8
Canada
Europe Office:
Van Leeuwenhoekpark 1
2611 DW, Delft
The Netherlands
UK Office:
+44 20 3744 7173
Australia Office:
+61 (07) 3186 2199
© 2025 Pagefreezer Software Inc. All Rights Reserved. Privacy Policy and Acceptable Use Policy. Commercial use and distribution of the contents of this website is not allowed without express and prior written consent of Pagefreezer Software Inc. subject to existing copyright exceptions and limitations.