Are Your Digital Documents Authentic? Here’s How To Check.?
GoldFynch eDiscovery
If you’re looking for an eDiscovery solution that’s fast, cost-effective and easy to use, GoldFynch is the answer.
Takeaway: Verify a document is authentic by examining its (1) digital signature, (2) metadata, (3) hash value, and (4) chain of custody. ?
Most documents nowadays are digital. So, how do we know they haven’t been tampered with??
Digitization of documents has revolutionized the legal world and the lives of lawyers, particularly those at small and midsize firms. But with this digitization comes a challenge: How do we establish that a digital document (PDF, Word document, spreadsheet, etc.) is authentic? And this question becomes even more important in the context of data breaches and document tampering we regularly hear about. Luckily, there are things we can do to ensure we’re dealing with authentic data.?
1. Check your document’s digital signature.?
A digital signature is a mathematical creation (a ‘scheme,’ to be precise) that ‘proves’ a digital message or document is authentic. It’s similar to a handwritten signature but way more secure. Some examples of digital signal protocols include PKCS#7, X.509, and Digital Signature Algorithm (DSA).???
Here’s how digital signatures work.
2. Explore the document’s metadata.?
Metadata, often described as "data about data," provides context about the content, quality, condition, origin, and other characteristics of a document or piece of data. It lives behind the scenes and offers a roadmap to understand and work with the data more efficiently. For instance, administrative metadata provides information about when and how a document was created, details about licenses and rights, and more. (Note that there are other types of metadata. For example, descriptive metadata reveals a document’s title, author, keywords, etc. Structural metadata covers things like how pages are ordered to form chapters in a book. And geospatial metadata confirms where a document was created.) Learn more about metadata.??
3. Verify a document’s hash value.?
Earlier, we mentioned hash values in the context of digital signatures. But you can create a hash value independently, too. As a reminder: a hash value, often called a hash, is a fixed-size string of letters/numbers generated from input data. And this string serves as an identifier for the document. Crucially, even the smallest change in the input data (e.g., deleting a single word from a document) will produce a drastically different hash value. This makes hashes perfect for security and integrity checks. For example, when sending a document, you'd provide the document's hash value to the recipient, who would then recalculate the hash to see if it matches yours. Common hash functions include MD5 (Message Digest Algorithm 5) and SHA-1 (Secure Hash Algorithm 1). Do note that while it's highly unlikely for two documents to have the same hash value, it's not mathematically impossible. So, hashes are especially great when combined with other security measures like digital signatures.?
4. Inspect a document’s chain of custody.
A chain of custody refers to the digital ‘trail’ tracking when a document is collected, used, analyzed, and transferred. It’s a way of logging who handles and stores a document right from when it was collected to when it was presented in court.?
The chain of custody matters for a bunch of reasons.?
Here’s what goes into establishing a chain of custody.
We have to look out for common challenges, though.?
In conclusion, verifying documents might take effort, but it’s possible with the right approach.?
The stakes for verifying the authenticity of digital documents have never been higher. But with the right knowledge and tools, you can make technology work for you instead of against you. So, mix the above techniques into your eDiscovery workflow, and rest assured you’re dealing with genuine, untampered evidence.