Certified digital evidence with full legal value in European and Extra EU courts, with optional international timestamp valid worldwide
Legal Value of Certified Copies under EU eIDAS Regulation and in Extra-EU Jurisdictions
The certified copy we provide is created using a globally recognized forensic acquisition platform developed in compliance with international standards for digital evidence preservation.
Our qualified electronic signatures and RFC 3161 timestamps are issued by a Qualified Trust Service Provider (QTSP) in accordance with the
European eIDAS Regulation (EU No. 910/2014, as amended by Regulation (EU) 2024/1183) and the Italian Digital Administration Code (D.Lgs. 82/2005).
This ensures authenticity, integrity, and legal admissibility not only throughout the European Union, but also in the United States, the United Kingdom, Canada, Australia, and other jurisdictions that recognize EU-qualified electronic signatures and timestamps under equivalent legal frameworks.
Our forensic IT laboratory was among the first in Europe to offer this service. All acquisitions are securely archived on dedicated servers, enabling independent verification of data integrity by courts, lawyers, or law enforcement authorities.
Few providers can guarantee such a qualified, transparent, and internationally recognized service.
Our Certified Copy (forensic acquisition of websites, web pages, or online content) has probative value because:
- The full Internet address (URL) of the acquired content is recorded;
- The browser type and version used during the acquisition is documented;
- The IP address of the source server, along with date, time, and acquisition software details, is logged;
- The entire source code of the page is preserved, including all linked objects (images, documents, audio, video, scripts, executables, compressed files, etc.);
- The delivered report includes qualified digital signatures and security certificates issued by our forensic infrastructure;
- A qualified RFC 3161 timestamp is applied to each digitally signed file, providing irrefutable proof of the exact acquisition date and time;
- The network packets of the entire browsing session are recorded, demonstrating authenticity and conformity with the original source;
- We are among the few providers that store certification metadata directly on the forensic software producer’s servers, allowing any court or authority to independently verify the acquisition through the producer’s database (including acquisition code, URL, timestamps, and client IP);
- A continuous forensically sound video recording of the entire acquisition process is provided.
(#) The URL (Uniform Resource Locator) uniquely identifies the address of an internet resource.
(*) A timestamp is a service issued by an Accredited Qualified Trust Service Provider under the eIDAS Regulation (EU No. 910/2014, as amended by Regulation (EU) 2024/1183).
It guarantees a certain and legally valid date and time, enforceable against third parties, proving the existence of a document at the moment of certification.
By default, our certified copies are legally valid and admissible across the European Union, the United States, the United Kingdom, Canada, Australia, and other jurisdictions with equivalent digital evidence laws.
If required, we can also provide country-specific certification (e.g., notarization, apostille, or compliance with local procedural standards).
(**) Digital evidence is considered forensically sound if it is collected, analyzed, handled, and stored in a manner that is legally acceptable and demonstrably preserves its integrity and authenticity.
International Validity & Extra-EU Documentation (included)
Our Certified Copy is delivered in a sealed container (.zip.p7m / .tsd) with a Qualified Electronic Signature and a RFC 3161 qualified timestamp. Under the eIDAS Regulation (EU No. 910/2014, as amended by Regulation (EU) 2024/1183), this ensures authenticity, integrity, and legal admissibility across the European Union and is recognised or assessable in many Extra-EU jurisdictions (e.g., United States, United Kingdom, Canada, Australia, Switzerland, Norway).
Extra-EU add-on (included at no extra cost): “Digital Evidence Certification Statement”
For cross-border cases we include, inside the evidence package, a digitally signed PDF titled Forensic_Evidence_Statement_acquisitions_signed.pdf, which:
- Summarises the forensic acquisition methodology and technical environment (tools, parameters, controls);
- Details the collected evidence (source URL, metadata, cryptographic hashes, chain of custody);
- References applicable legal frameworks in the EU, United States, United Kingdom, Canada, Australia and other comparable jurisdictions;
- Includes a sworn declaration on authenticity, integrity, and continuity of evidence;
- Sets out custody transfer details and retention policy.
Note: this additional document is provided only for Extra-EU certifications. Within the EU it is not required, because qualified signature + qualified timestamp + our forensic report already provide full evidentiary strength.
Standards & Good Practice Followed
- ISO/IEC 27037:2012 — Guidelines for identification, collection, acquisition and preservation of digital evidence;
- NIST IR 8006 (2014) — Cloud forensics challenges and considerations;
- Council of Europe Electronic Evidence Guide (2013);
- ACPO Good Practice Guide (UK, v5) — Principles for digital evidence handling;
- RFC 3227 — Guidelines for evidence collection and archiving;
- Budapest Convention on Cybercrime — International cooperation framework.
Qualified Signatures, Timestamps & Containers
Every certified file is digitally signed with a certificate bound to a QSCD (Qualified Signature Creation Device), and sealed with a qualified RFC 3161 timestamp. Delivery formats include CAdES (.zip.p7m) or TSD (.tsd), ensuring independent, tool-agnostic verification by courts and experts.
Data Protection & Retention
- Evidence is stored on dedicated secure servers with access controls; a read-only evidence mirror can be provided for independent checks by courts or law enforcement.
- Processing is GDPR-compliant; where applicable we align with relevant international privacy frameworks (e.g., CCPA).
- Retention follows the principle of storage limitation: only for the time strictly necessary for certification purposes.
What You Receive
- A sealed evidence package (.zip.p7m/.tsd) containing the Certified Copy (forensic acquisition) and the lawyer-ready report (English; other languages on request);
- Recorded URL, timestamps, browser & source server IP, page source code and linked files (images, documents, audio, video, scripts, archives);
- Qualified signatures and a qualified timestamp applied to each certified file;
- Network traffic capture of the session and a continuous forensically sound capture video (where applicable);
- Optional but just included on Extra EU certifications: SHA-256 hash attestation for long-term preservation, structured annexes/timelines, and map/log visualisations for specific cases.
Remote Operations & Legal Mandate
Private areas (accounts, portals) are accessed only under a digitally signed legal mandate provided by the client, to protect both your rights and our access. Credentials can be revoked immediately after acquisition.
Would you like an answer to any of these questions?
- How is the certification delivered?
- In which language the accompanying report is delivered?
- Does the certification have legal value?
- Can we have a demo of your work?
- Do you want to be paid on delivery or in advance?
- What are the payment methods provided?
- How can I trust you?
- Do you guarantee your presence at the court hearing in my country?
- Can your certification be contested?
- Why a screenshot has no legal value?
- How long is the certification kept on our archive?
- Does the certification have a validity deadline?
- Is the certification valid outside the European Union?
The forensic web content acquisition software we use
The forensic web content acquisition software we employ is developed and continuously updated in compliance with international standards for the acquisition and preservation of digital evidence. It also incorporates methodologies for Network Forensics and Cloud Forensics established and recognized by the technical community and leading authorities worldwide.
The software complies with the following standards and scientific references:
- ISO/IEC 27037:2012 – Guidelines for identification, collection, acquisition and preservation of digital evidence
- NIST Interagency Report 8006 (2014) – Cloud Computing Forensic Science Challenges
- NIST Special Publication 800-86 – Guide to Integrating Forensic Techniques into Incident Response
- CoE Electronic Evidence Guide – Council of Europe, 2013
- ACPO Good Practice Guide for Digital Evidence – Association of Chief Police Officers, UK, Version 5
- RFC 3227 – Guidelines for Evidence Collection and Archiving
- Budapest Convention on Cybercrime – Council of Europe, 2001
- CSA (Cloud Security Alliance), “Mapping the Forensic Standard ISO/IEC 27037 to Cloud Computing”, 2013
- Selected international publications on Network, Internet and Cloud Forensics (Elsevier, Springer, IGI Global, Syngress, University College Dublin, etc.)
Thanks to this scientific and regulatory foundation, our certified acquisitions are recognized in courts across the European Union under the eIDAS Regulation (EU 910/2014). Upon request, we can also apply an international timestamp to extend validity to jurisdictions worldwide.
Ready to certify your digital evidence?
Request your Certified Copy today. Valid in all European courts by default, with the option of an international timestamp recognized worldwide.
👉 Request your Certified Copy- Authenticating Webpage Evidence in Court
- Account Abusive Access Certification
- Accounting Records Certification for Injunctions
- Analysis and Certification of Fake Photos and Videos
- Certified Web Permanence of Online Content
- Click Fraud & Web Traffic Certification
- Copyright Infringement Certification
- Deepfake Certification to file a legal complaint
- DM Instagram chat certification
- Defamation & Threats Certification
- Email Account Breach Certification
- Give legal value to the messages sent to your customers via whatsapp
- Google Location History Certification
- Google Takeout Certification
- Image Theft Certification
- Identity Theft Certification
- Legal Warning Certification
- Microsoft Account Export Certification
- Messenger chat certification
- Online Email Certification
- OnlyFans Content Certification
- Original Authorship Certification
- Social Network Content Certification
- Patreon Content Certification
- Reviews Certification
- Server Logs Certification
- Trademark & Unfair Competition Certification
- Unpaid Overtime Certification (GPS Data)
- Web Page Certification with text and images
- Web Page Certification with Video
- Web Page Certification with File
- Whatsapp and Telegram Chat Certification
All Modules
- Free estimate Account Abusive Access Certification
- Free estimate Web Content Certification (Multiple Requests)
- Free estimate Chat Certification : Whatsapp and Telegram
- Free estimate Email Online Certification
- Free estimate Google Location History Certification
- Free estimate Reviews Certification
- Free estimate Social Network Certification
- Free estimate Web Content Certification
- Blog Certify Web Content


