See the latest news and insights around Information Governance, eDiscovery, Enterprise Collaboration, and Social Media.
Undoubtedly, social media has transformed how we communicate and share information. That point is very relevant in these high-profile social media criminal cases, with open-source intelligence (OSINT) tools being the keys to finding long-awaited answers. The internet is full of great examples that showcase how investigators can solve crimes with the help of a post or shared photo on a social media platform.
As social media usage has increased, so have the different types of abuse, harassment, bullying, and defamation victims can face online. One of the most powerful tools to combat this growing trend is education, making it easier to handle situations that can suddenly materialize. This blog discusses the ten forms of social media bullying and harassment by offering concrete examples and insights into its many forms.
Since the beginning of social media, people from all over have been able to share their thoughts and ideas. The dark side of this revolutionary change is that not everyone has something kind to say, which makes protecting yourself against social media harassment critical.
As more of our personal and professional lives play out online and within digital spaces, it’s unsurprising to learn that an increasing amount of electronic evidence is being presented to the courts in relation to a wide number of legal cases. In fact, the worldwide Digital Forensics industry is expected to grow at a CAGR of 13% between 2020 to 2027.
We’re used to seeing people post incredible amounts of personal information on platforms like Facebook, LinkedIn, Instagram, Strava, Twitter, etc. But now, another platform must be added to that list: TikTok.
WebPreserver now supports collections of TikTok! Starting today, all WebPreserver users have access to similar features and capabilities that we offer for evidence collection on popular platforms like Facebook, Instagram, and Twitter. This is a standard function available to all customers, who will now be able to:
What happens when online harassment crosses the digital divide? For several years now, the practice of swatting has been on the rise, and featured in news stories the world over. What exactly does the practice entail? What are the legal consequences of swatting, and what kind of damage has been inflicted upon those who have fallen victim to it?
With its roots in hacker communities of the 1990s, today, doxxing remains a widespread cybersecurity issue. If anything, the problem is growing. 21% of Americans (more than 43 million individuals) report having personally experienced doxxing. An even greater number, 62%, personally knew someone who had been the victim of a doxxing attack.
Traditional discovery is the initial phase of litigation when all parties are required to provide records and evidence relevant to a specific case. However, thanks to the explosion of electronically stored information (ESI), discovery must now work alongside eDiscovery—a process that involves the identification, preservation, collection, retention, and review of data in an electronic format. This makes the discovery exponentially larger and more complex.
Imagine for a second that you need to collect evidence from someone’s Facebook or Twitter account. Like a surprising number of criminals, the person has just posted something incredibly incriminating that could really help your case. However, there’s also a good chance that they’ll come to their senses and delete the post. The evidence can disappear at any moment—so you need to act quickly.