Technology for Lawyers and Paralegals: Evidence Authentication – Word Documents
Top8, August 11, 2008
Top8, a security, compliance and e-discovery consulting firm, recently posted a blog asking readers, “”Electronic evidence presents unique authentication challenges. What are the specific issues for MS Word files?” As the author presents the litigation issues associated with Word documents, our own Jim O’Connor, Executive Vice President of Engineering, Surety, pointed out the difference between a hash and a cryptographic timestamp.
“If something is hashed, it can be subsequently altered and rehashed. Such a change is generally not detectable. This is not true of a cryptographic timestamp. A cryptographic timestamp cryptographically binds a trusted time value to a hash and can prove when the data was secured and that it has not been altered since.”
We’re glad to see Top8 talking about these issues, and we’re looking forward to continuing the conversation with their blogger, Mark Kerzner.