
Keys to ESI authentication
$225.00
Description
Abstract: Electronically stored information (ESI) has assumed a prominent role in commercial and other types of litigation. Like any evidence, it must satisfy the rules for authentication, but it requires sufficient evidence to establish that it hasn’t been changed since its creation or a particular relevant date. This article describes several types of ESI authentication, including hashing, metadata and digital signatures.
Additional information
Year | |
---|---|
Niche | |
Newsletter | |
Issue | |
Word Count |