{"id":3547,"date":"2019-04-04T09:00:00","date_gmt":"2019-04-04T15:00:00","guid":{"rendered":"https:\/\/idsinc.com\/?p=3547"},"modified":"2022-04-12T14:22:19","modified_gmt":"2022-04-12T20:22:19","slug":"preuve-electronique","status":"publish","type":"post","link":"https:\/\/idsinc.com\/fr\/electronic-evidence\/","title":{"rendered":"Faites confiance mais v\u00e9rifiez\u00a0: comment aborder la preuve \u00e9lectronique"},"content":{"rendered":"<!--themify_builder_content-->\n<div id=\"themify_builder_content-3547\" data-postid=\"3547\" class=\"themify_builder_content themify_builder_content-3547 themify_builder tf_clear\">\n    <\/div>\n<!--\/themify_builder_content-->\n\n\n<p class=\"wp-block-paragraph\">Lorsque le traitement de texte et la conception graphique sont devenus des outils de bureau, on craignait que les mauvais acteurs aient d\u00e9sormais la possibilit\u00e9 de cr\u00e9er de faux documents. Et certains l&#039;ont fait.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Mais aujourd&#039;hui, alors m\u00eame que le monde est de plus en plus num\u00e9ris\u00e9, l&#039;une des cons\u00e9quences involontaires de cette num\u00e9risation entrelac\u00e9e est la difficult\u00e9 accrue de cr\u00e9er de fausses preuves. Cela est d\u00fb \u00e0 plusieurs facteurs contributifs.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>4 raisons pour lesquelles il est plus difficile de cr\u00e9er de fausses preuves<\/strong><\/h3>\n\n\n\n<p class=\"wp-block-paragraph\">Premi\u00e8rement, nos documents individuels sont devenus de plus en plus complexes. Prenez le courrier \u00e9lectronique comme exemple. \u00c0 l&#039;origine, les e-mails \u00e9taient de simples communications textuelles avec des fonctionnalit\u00e9s limit\u00e9es. Aujourd&#039;hui, ils peuvent \u00eatre color\u00e9s, anim\u00e9s, remplis de pi\u00e8ces jointes, diffus\u00e9s \u00e0 de nombreux destinataires, hi\u00e9rarchis\u00e9s, r\u00e9gis par des r\u00e8gles, automatis\u00e9s et configur\u00e9s pour des r\u00e9ponses automatiques.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Tous ces aspects reposent sur une vari\u00e9t\u00e9 de fonctionnalit\u00e9s qui, elles-m\u00eames, comportent une vari\u00e9t\u00e9 de m\u00e9tadonn\u00e9es ou de caract\u00e9ristiques r\u00e9v\u00e9latrices, qui peuvent facilement \u00eatre ignor\u00e9es par le faussaire moyen, ou reproduites de mani\u00e8re incorrecte. Dans une affaire r\u00e9cente, r\u00e9cemment, un plaignant a fabriqu\u00e9 un PDF d&#039;une pr\u00e9tendue cha\u00eene de messagerie. Dans l&#039;une des lignes d&#039;objet, il a utilis\u00e9 des polices mixtes Serif et Sans Serif. Cela ne peut pas se produire dans un e-mail valide. C&#039;\u00e9tait un d\u00e9faut fatal.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Deuxi\u00e8mement, nous travaillons avec des piles logicielles. Une \u00ab\u00a0pile\u00a0\u00bb est un ensemble d&#039;outils logiciels qui sont combin\u00e9s pour fournir une capacit\u00e9 collective. Lorsque vous utilisez plusieurs outils en combinaison les uns avec les autres, chacun assiste et enregistre les \u00e9v\u00e9nements. Finalement, ces histoires enregistr\u00e9es doivent s&#039;accorder. Quand les preuves sont truqu\u00e9es, ils ne le font pas.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Troisi\u00e8mement, nos syst\u00e8mes d&#039;exploitation sont devenus de plus en plus conviviaux, ce qui n\u00e9cessite beaucoup plus de travail en coulisse. Ce travail est facilit\u00e9 par les poign\u00e9es de main du syst\u00e8me, les journaux d&#039;activit\u00e9, les contr\u00f4les de s\u00e9curit\u00e9 et d&#039;autres syst\u00e8mes qui, encore une fois, enregistrent et documentent ce que le syst\u00e8me fait \u00e0 volume \u00e9lev\u00e9 et \u00e0 haute fr\u00e9quence.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Enfin, gr\u00e2ce \u00e0 la connectivit\u00e9 et \u00e0 la mobilit\u00e9, les syst\u00e8mes que nous utilisons passent par une vari\u00e9t\u00e9 de fournisseurs de services pour acheminer les donn\u00e9es d&#039;un point A \u00e0 un point B. Non seulement cela cr\u00e9e une piste de donn\u00e9es, mais cette piste est souvent entre les mains de plusieurs syst\u00e8mes, appartenant \u00e0 plusieurs fournisseurs de services. M\u00eame si vous connaissiez tous les endroits o\u00f9 cr\u00e9er de fausses donn\u00e9es ou faussement modifier des donn\u00e9es existantes, il est impossible d&#039;obtenir un acc\u00e8s de modification \u00e0 chacun d&#039;eux.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Pour toutes ces raisons, combin\u00e9es au besoin de reprise apr\u00e8s sinistre, de s\u00e9curit\u00e9 des donn\u00e9es et de confidentialit\u00e9 des donn\u00e9es - qui se traduisent toutes par plus de suivi, plus de journaux et plus de copies de nos activit\u00e9s - il est devenu de plus en plus impossible de falsifier compl\u00e8tement des preuves.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-should-you-accept-or-dig-look-for-these-red-flags\"><strong>Devriez-vous accepter ou creuser\u00a0? Recherchez ces drapeaux rouges<\/strong><\/h3>\n\n\n\n<p class=\"wp-block-paragraph\">Au lieu de cela, les faussaires ne peuvent qu&#039;esp\u00e9rer que vous ne creusez pas assez profond\u00e9ment. Le d\u00e9fi devient alors de savoir quand accepter et quand creuser. Voici quelques indicateurs faciles \u00e0 rechercher pour d\u00e9terminer si vous devez accepter ou contester des donn\u00e9es\u00a0:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Est-ce trop beau pour \u00eatre vrai ? Si c&#039;est le cas, cela pourrait valoir la peine d&#039;\u00eatre examin\u00e9.<\/li><li>La copie \u00e9lectronique est-elle manquante ? Lorsque nous voyons des preuves cl\u00e9s produites uniquement sous forme papier, alors que l&#039;original n&#039;est plus disponible, cela d\u00e9clenche un signal d&#039;alarme.<\/li><li>N&#039;y a-t-il pas d&#039;autres t\u00e9moins ? Lorsque nous avons des cas o\u00f9 d&#039;autres personnes impliqu\u00e9es dans un document, ou une communication par e-mail, ne sont pas disponibles et que seule la personne qui pr\u00e9sente la preuve est disponible pour en discuter, ou - pire encore - il y en a d&#039;autres qui ne se souviennent pas du document, ou r\u00e9futent \u00e7a, c&#039;est un drapeau rouge.<\/li><\/ul>\n\n\n\n<p class=\"wp-block-paragraph\">R\u00e9cemment, nous avons eu un cas o\u00f9 les trois drapeaux rouges se sont lev\u00e9s. Cela justifiait une analyse plus approfondie des preuves (dans ce cas, un e-mail, un accus\u00e9 de lecture et une photo de la bo\u00eete d&#039;envoi du demandeur). Cette plong\u00e9e plus profonde a r\u00e9v\u00e9l\u00e9 plus de 100 probl\u00e8mes dans les preuves. Ce n&#039;\u00e9tait pas seulement faux, c&#039;\u00e9tait vraiment, vraiment faux.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Le syst\u00e8me juridique am\u00e9ricain repose sur l&#039;int\u00e9grit\u00e9 des parties pour permettre \u00e0 notre syst\u00e8me de proc\u00e9dure civile et de d\u00e9couverte de fonctionner. Mais, pour reprendre les mots de Ronald Reagan lors des n\u00e9gociations de son administration avec nos adversaires et nos alli\u00e9s, il faut parfois adopter une position de \u00ab confiance mais v\u00e9rification \u00bb. Nous pr\u00e9conisons la m\u00eame approche en ce qui concerne la preuve \u00e9lectronique. Surtout l\u00e0 o\u00f9 les drapeaux rouges commencent \u00e0 appara\u00eetre.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-text-color has-background is-style-wide\" style=\"background-color:#e1e1e1;color:#e1e1e1\"\/>\n\n\n\n<p class=\"wp-block-paragraph\"><strong><em>iDS fournit des solutions de donn\u00e9es consultatives aux entreprises et aux cabinets d&#039;avocats du monde entier, leur donnant un avantage d\u00e9cisif - \u00e0 la fois dans et hors de la salle d&#039;audience. Nos experts en la mati\u00e8re et nos strat\u00e8ges de donn\u00e9es se sp\u00e9cialisent dans la recherche de solutions aux probl\u00e8mes de donn\u00e9es complexes, garantissant que les donn\u00e9es peuvent \u00eatre exploit\u00e9es comme un atout et non comme un handicap.<\/em><\/strong><\/p>","protected":false},"excerpt":{"rendered":"<p>When word processing and graphic design became desktop tools, there was a concern that bad actors now had the ability to create fake documents. And some did. But today, even as the world has become more and more digitized, one of the unintended consequences of that interwoven digitalization is the increased difficulty to create fake [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":3548,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[10],"tags":[],"class_list":["post-3547","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","has-post-title","has-post-date","has-post-category","has-post-tag","has-post-comment","has-post-author",""],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.6 (Yoast SEO v27.6) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Trust But Verify: How To Approach Electronic Evidence - iDS<\/title>\n<meta name=\"description\" content=\"When should you take a deeper dive into the evidence? Learn some easy flags to look for to determine if you should accept or challenge data.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/idsinc.com\/fr\/preuve-electronique\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Trust But Verify: How To Approach Electronic Evidence\" \/>\n<meta property=\"og:description\" content=\"When should you take a deeper dive into the evidence? Learn some easy flags to look for to determine if you should accept or challenge data.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/idsinc.com\/fr\/preuve-electronique\/\" \/>\n<meta property=\"og:site_name\" content=\"iDiscovery Solutions\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/iDiscovery-Solutions-110210573904472\" \/>\n<meta property=\"article:published_time\" content=\"2019-04-04T15:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-04-12T20:22:19+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/idsinc.com\/wp-content\/uploads\/2022\/04\/Electronic-Evidence.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2500\" \/>\n\t<meta property=\"og:image:height\" content=\"1250\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Dan Regard\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Dan Regard\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/electronic-evidence\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/electronic-evidence\\\/\"},\"author\":{\"name\":\"Dan Regard\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/person\\\/803ad31781146823f476911393d83156\"},\"headline\":\"Trust But Verify: How To Approach Electronic Evidence\",\"datePublished\":\"2019-04-04T15:00:00+00:00\",\"dateModified\":\"2022-04-12T20:22:19+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/electronic-evidence\\\/\"},\"wordCount\":749,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/electronic-evidence\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2022\\\/04\\\/Electronic-Evidence.jpg\",\"articleSection\":[\"Blog\"],\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/idsinc.com\\\/electronic-evidence\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/electronic-evidence\\\/\",\"url\":\"https:\\\/\\\/idsinc.com\\\/electronic-evidence\\\/\",\"name\":\"Trust But Verify: How To Approach Electronic Evidence - iDS\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/electronic-evidence\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/electronic-evidence\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2022\\\/04\\\/Electronic-Evidence.jpg\",\"datePublished\":\"2019-04-04T15:00:00+00:00\",\"dateModified\":\"2022-04-12T20:22:19+00:00\",\"description\":\"When should you take a deeper dive into the evidence? Learn some easy flags to look for to determine if you should accept or challenge data.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/electronic-evidence\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/idsinc.com\\\/electronic-evidence\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/electronic-evidence\\\/#primaryimage\",\"url\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2022\\\/04\\\/Electronic-Evidence.jpg\",\"contentUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2022\\\/04\\\/Electronic-Evidence.jpg\",\"width\":2500,\"height\":1250,\"caption\":\"When should you take a deeper dive into the evidence? Learn some easy flags to look for to determine if you should accept or challenge data.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/electronic-evidence\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/idsinc.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blog\",\"item\":\"https:\\\/\\\/idsinc.com\\\/de\\\/category\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Trust But Verify: How To Approach Electronic Evidence\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#website\",\"url\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/\",\"name\":\"iDiscovery Solutions\",\"description\":\"Use data to your advantage in the courtroom\",\"publisher\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#organization\"},\"alternateName\":\"iDS\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#organization\",\"name\":\"iDiscovery Solutions\",\"alternateName\":\"iDS\",\"url\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/iDS-Logo-3c-e1611176096212.png\",\"contentUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/iDS-Logo-3c-e1611176096212.png\",\"width\":100,\"height\":73,\"caption\":\"iDiscovery Solutions\"},\"image\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/iDiscovery-Solutions-110210573904472\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/idsinc\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCarv7o1MeYfCp0eZ1IrufIw\"],\"description\":\"iDS provides consultative data solutions to corporations and law firms around the world, giving them a decisive advantage \u2013 both in and out of the courtroom. iDS\u2019s subject matter experts and data strategists specialize in finding solutions to complex data problems, ensuring data can be leveraged as an asset, not a liability.\",\"email\":\"info@idsinc.com\",\"telephone\":\"+1.800.813.4832\",\"legalName\":\"iDiscovery Solutions\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/person\\\/803ad31781146823f476911393d83156\",\"name\":\"Dan Regard\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/71f395a2e924fed8327f7eae9a8e3f3c021847644b1cea8c14a20b0396aa22f1?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/71f395a2e924fed8327f7eae9a8e3f3c021847644b1cea8c14a20b0396aa22f1?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/71f395a2e924fed8327f7eae9a8e3f3c021847644b1cea8c14a20b0396aa22f1?s=96&d=mm&r=g\",\"caption\":\"Dan Regard\"},\"url\":\"https:\\\/\\\/idsinc.com\\\/fr\\\/author\\\/dan\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Faites confiance mais v\u00e9rifiez\u00a0: comment aborder les preuves \u00e9lectroniques - iDS","description":"Quand devriez-vous approfondir les preuves ? D\u00e9couvrez quelques indicateurs simples \u00e0 rechercher pour d\u00e9terminer si vous devez accepter ou contester les donn\u00e9es.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/idsinc.com\/fr\/preuve-electronique\/","og_locale":"fr_FR","og_type":"article","og_title":"Trust But Verify: How To Approach Electronic Evidence","og_description":"When should you take a deeper dive into the evidence? Learn some easy flags to look for to determine if you should accept or challenge data.","og_url":"https:\/\/idsinc.com\/fr\/preuve-electronique\/","og_site_name":"iDiscovery Solutions","article_publisher":"https:\/\/www.facebook.com\/iDiscovery-Solutions-110210573904472","article_published_time":"2019-04-04T15:00:00+00:00","article_modified_time":"2022-04-12T20:22:19+00:00","og_image":[{"width":2500,"height":1250,"url":"https:\/\/idsinc.com\/wp-content\/uploads\/2022\/04\/Electronic-Evidence.jpg","type":"image\/jpeg"}],"author":"Dan Regard","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"Dan Regard","Dur\u00e9e de lecture estim\u00e9e":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/idsinc.com\/electronic-evidence\/#article","isPartOf":{"@id":"https:\/\/idsinc.com\/electronic-evidence\/"},"author":{"name":"Dan Regard","@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/person\/803ad31781146823f476911393d83156"},"headline":"Trust But Verify: How To Approach Electronic Evidence","datePublished":"2019-04-04T15:00:00+00:00","dateModified":"2022-04-12T20:22:19+00:00","mainEntityOfPage":{"@id":"https:\/\/idsinc.com\/electronic-evidence\/"},"wordCount":749,"commentCount":0,"publisher":{"@id":"https:\/\/idsinc.com\/en_gb\/#organization"},"image":{"@id":"https:\/\/idsinc.com\/electronic-evidence\/#primaryimage"},"thumbnailUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2022\/04\/Electronic-Evidence.jpg","articleSection":["Blog"],"inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/idsinc.com\/electronic-evidence\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/idsinc.com\/electronic-evidence\/","url":"https:\/\/idsinc.com\/electronic-evidence\/","name":"Faites confiance mais v\u00e9rifiez\u00a0: comment aborder les preuves \u00e9lectroniques - iDS","isPartOf":{"@id":"https:\/\/idsinc.com\/en_gb\/#website"},"primaryImageOfPage":{"@id":"https:\/\/idsinc.com\/electronic-evidence\/#primaryimage"},"image":{"@id":"https:\/\/idsinc.com\/electronic-evidence\/#primaryimage"},"thumbnailUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2022\/04\/Electronic-Evidence.jpg","datePublished":"2019-04-04T15:00:00+00:00","dateModified":"2022-04-12T20:22:19+00:00","description":"Quand devriez-vous approfondir les preuves ? D\u00e9couvrez quelques indicateurs simples \u00e0 rechercher pour d\u00e9terminer si vous devez accepter ou contester les donn\u00e9es.","breadcrumb":{"@id":"https:\/\/idsinc.com\/electronic-evidence\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/idsinc.com\/electronic-evidence\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/idsinc.com\/electronic-evidence\/#primaryimage","url":"https:\/\/idsinc.com\/wp-content\/uploads\/2022\/04\/Electronic-Evidence.jpg","contentUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2022\/04\/Electronic-Evidence.jpg","width":2500,"height":1250,"caption":"When should you take a deeper dive into the evidence? Learn some easy flags to look for to determine if you should accept or challenge data."},{"@type":"BreadcrumbList","@id":"https:\/\/idsinc.com\/electronic-evidence\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/idsinc.com\/"},{"@type":"ListItem","position":2,"name":"Blog","item":"https:\/\/idsinc.com\/de\/category\/blog\/"},{"@type":"ListItem","position":3,"name":"Trust But Verify: How To Approach Electronic Evidence"}]},{"@type":"WebSite","@id":"https:\/\/idsinc.com\/en_gb\/#website","url":"https:\/\/idsinc.com\/en_gb\/","name":"Solutions d&#039;iD\u00e9couverte","description":"Utilisez les donn\u00e9es \u00e0 votre avantage dans la salle d\u2019audience","publisher":{"@id":"https:\/\/idsinc.com\/en_gb\/#organization"},"alternateName":"iDS","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/idsinc.com\/en_gb\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/idsinc.com\/en_gb\/#organization","name":"Solutions d&#039;iD\u00e9couverte","alternateName":"iDS","url":"https:\/\/idsinc.com\/en_gb\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/logo\/image\/","url":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/iDS-Logo-3c-e1611176096212.png","contentUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/iDS-Logo-3c-e1611176096212.png","width":100,"height":73,"caption":"iDiscovery Solutions"},"image":{"@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/iDiscovery-Solutions-110210573904472","https:\/\/www.linkedin.com\/company\/idsinc","https:\/\/www.youtube.com\/channel\/UCarv7o1MeYfCp0eZ1IrufIw"],"description":"iDS fournit des solutions de donn\u00e9es consultatives aux entreprises et aux cabinets d&#039;avocats du monde entier, leur donnant un avantage d\u00e9cisif, tant \u00e0 l&#039;int\u00e9rieur qu&#039;\u00e0 l&#039;ext\u00e9rieur de la salle d&#039;audience. Les experts en la mati\u00e8re et les strat\u00e8ges en donn\u00e9es d&#039;iDS se sp\u00e9cialisent dans la recherche de solutions \u00e0 des probl\u00e8mes de donn\u00e9es complexes, garantissant que les donn\u00e9es peuvent \u00eatre exploit\u00e9es comme un atout et non comme un passif.","email":"info@idsinc.com","telephone":"+1.800.813.4832","legalName":"iDiscovery Solutions"},{"@type":"Person","@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/person\/803ad31781146823f476911393d83156","name":"Dan Regard","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/71f395a2e924fed8327f7eae9a8e3f3c021847644b1cea8c14a20b0396aa22f1?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/71f395a2e924fed8327f7eae9a8e3f3c021847644b1cea8c14a20b0396aa22f1?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/71f395a2e924fed8327f7eae9a8e3f3c021847644b1cea8c14a20b0396aa22f1?s=96&d=mm&r=g","caption":"Dan Regard"},"url":"https:\/\/idsinc.com\/fr\/author\/dan\/"}]}},"builder_content":"","_links":{"self":[{"href":"https:\/\/idsinc.com\/fr\/wp-json\/wp\/v2\/posts\/3547","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/idsinc.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/idsinc.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/idsinc.com\/fr\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/idsinc.com\/fr\/wp-json\/wp\/v2\/comments?post=3547"}],"version-history":[{"count":0,"href":"https:\/\/idsinc.com\/fr\/wp-json\/wp\/v2\/posts\/3547\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/idsinc.com\/fr\/wp-json\/wp\/v2\/media\/3548"}],"wp:attachment":[{"href":"https:\/\/idsinc.com\/fr\/wp-json\/wp\/v2\/media?parent=3547"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/idsinc.com\/fr\/wp-json\/wp\/v2\/categories?post=3547"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/idsinc.com\/fr\/wp-json\/wp\/v2\/tags?post=3547"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}