Certified digital evidence with full legal value in European and Extra EU courts, with optional international timestamp valid worldwide
Legal Value of Certified Copies under EU eIDAS Regulation and in Extra-EU Jurisdictions
- The full Internet address (URL) of the acquired content is recorded;
- The browser type and version used during the acquisition is documented;
- The IP address of the source server, along with date, time, and acquisition software details, is logged;
- The entire source code of the page is preserved, including all linked objects (images, documents, audio, video, scripts, executables, compressed files, etc.);
- The delivered report includes qualified digital signatures and security certificates issued by our forensic infrastructure;
- A qualified RFC 3161 timestamp is applied to each digitally signed file, providing irrefutable proof of the exact acquisition date and time;
- The network packets of the entire browsing session are recorded, demonstrating authenticity and conformity with the original source;
- We are among the few providers that store certification metadata directly on the forensic software producer’s servers, allowing any court or authority to independently verify the acquisition through the producer’s database (including acquisition code, URL, timestamps, and client IP);
- A continuous forensically sound video recording of the entire acquisition process is provided.
International Validity & Extra-EU Documentation (included)
Our Certified Copy is delivered in a sealed container (.zip.p7m / .tsd) with a Qualified Electronic Signature and a RFC 3161 qualified timestamp. Under the eIDAS Regulation (EU No. 910/2014, as amended by Regulation (EU) 2024/1183), this ensures authenticity, integrity, and legal admissibility across the European Union and is recognised or assessable in many Extra-EU jurisdictions (e.g., United States, United Kingdom, Canada, Australia, Switzerland, Norway).
Extra-EU add-on (included at no extra cost): “Digital Evidence Certification Statement”
For cross-border cases we include, inside the evidence package, a digitally signed PDF titled Forensic_Evidence_Statement_acquisitions_signed.pdf, which:- Summarises the forensic acquisition methodology and technical environment (tools, parameters, controls);
- Details the collected evidence (source URL, metadata, cryptographic hashes, chain of custody);
- References applicable legal frameworks in the EU, United States, United Kingdom, Canada, Australia and other comparable jurisdictions;
- Includes a sworn declaration on authenticity, integrity, and continuity of evidence;
- Sets out custody transfer details and retention policy.
FEDIS™: International Legal Recognition Framework
To ensure maximum legal admissibility in Extra-EU jurisdictions (United States, United Kingdom, Canada, Australia, and other common law countries), we have developed the FEDIS™ (Forensic Evidence Declaration & Integrity Statement). FEDIS™ is a comprehensive forensic certification framework that bridges the gap between EU-qualified electronic evidence and Extra-EU legal standards. Unlike the basic “Digital Evidence Certification Statement” (included at no extra cost), FEDIS™ provides:- Detailed chain of custody documentation compliant with common law evidentiary requirements;
- Expert witness declarations meeting Daubert/Frye standards (USA) and comparable criteria in UK, Canada, and Australia;
- Cross-referenced compliance matrices mapping our methodology to jurisdiction-specific rules of evidence;
- Structured metadata attestations with cryptographic proof of authenticity and integrity;
- Multi-jurisdictional legal opinions on admissibility under Federal Rules of Evidence (USA), Criminal Procedure Rules (UK), Canada Evidence Act, and Australian Evidence Acts;
- Cryptographic hash verification for electronic delivery: FEDIS™ is the only method that proves a download link points to the exact same file with cryptographic certainty (SHA-256 hash matching), essential for telematic evidence delivery and cloud-based evidence custody.
- EU qualified signatures and qualified timestamps are not automatically recognized outside the EU;
- Common law jurisdictions require specific evidentiary foundations (authentication, best evidence rule, hearsay exceptions);
- FEDIS™ provides the necessary legal bridge to ensure your digital evidence is admissible in court without additional expert testimony or procedural challenges;
- Courts in USA, UK, Canada, and Australia explicitly recognize FEDIS-certified evidence as meeting their evidentiary standards;
- For telematic delivery: FEDIS™ includes pre-computed cryptographic hashes that allow independent verification that the downloaded file is identical to the certified evidence, preventing any dispute about file integrity during electronic transmission.
Standards & Good Practice Followed
- ISO/IEC 27037:2012 — Guidelines for identification, collection, acquisition and preservation of digital evidence;
- NIST IR 8006 (2014) — Cloud forensics challenges and considerations;
- Council of Europe Electronic Evidence Guide (2013);
- ACPO Good Practice Guide (UK, v5) — Principles for digital evidence handling;
- RFC 3227 — Guidelines for evidence collection and archiving;
- Budapest Convention on Cybercrime — International cooperation framework.
Qualified Signatures, Timestamps & Containers
Every certified file is digitally signed with a certificate bound to a QSCD (Qualified Signature Creation Device), and sealed with a qualified RFC 3161 timestamp. Delivery formats include CAdES (.zip.p7m) or TSD (.tsd), ensuring independent, tool-agnostic verification by courts and experts.
Data Protection & Retention
- Evidence is stored on dedicated secure servers with access controls; a read-only evidence mirror can be provided for independent checks by courts or law enforcement.
- Processing is GDPR-compliant; where applicable we align with relevant international privacy frameworks (e.g., CCPA).
- Retention follows the principle of storage limitation: only for the time strictly necessary for certification purposes.
What You Receive
- A sealed evidence package (
.zip.p7m/.tsd) containing the Certified Copy (forensic acquisition) and the lawyer-ready report (English; other languages on request); - Recorded URL, timestamps, browser & source server IP, page source code and linked files (images, documents, audio, video, scripts, archives);
- Qualified signatures and a qualified timestamp applied to each certified file;
- Network traffic capture of the session and a continuous forensically sound capture video (where applicable);
- Optional but just included on Extra EU certifications: SHA-256 hash attestation for long-term preservation, structured annexes/timelines, and map/log visualisations for specific cases.
Remote Operations & Legal Mandate
Private areas (accounts, portals) are accessed only under a digitally signed legal mandate provided by the client, to protect both your rights and our access. Credentials can be revoked immediately after acquisition.Would you like an answer to any of these questions?
- How is the certification delivered?
- In which language the accompanying report is delivered?
- Does the certification have legal value?
- Can we have a demo of your work?
- Do you want to be paid on delivery or in advance?
- What are the payment methods provided?
- How can I trust you?
- Do you guarantee your presence at the court hearing in my country?
- Can your certification be contested?
- Why a screenshot has no legal value?
- How long is the certification kept on our archive?
- Does the certification have a validity deadline?
- Is the certification valid outside the European Union?
The forensic web content acquisition software we use
The forensic web content acquisition software we employ is developed and continuously updated in compliance with international standards for the acquisition and preservation of digital evidence. It also incorporates methodologies for Network Forensics and Cloud Forensics established and recognized by the technical community and leading authorities worldwide.
The software complies with the following standards and scientific references:
- ISO/IEC 27037:2012 – Guidelines for identification, collection, acquisition and preservation of digital evidence
- NIST Interagency Report 8006 (2014) – Cloud Computing Forensic Science Challenges
- NIST Special Publication 800-86 – Guide to Integrating Forensic Techniques into Incident Response
- CoE Electronic Evidence Guide – Council of Europe, 2013
- ACPO Good Practice Guide for Digital Evidence – Association of Chief Police Officers, UK, Version 5
- RFC 3227 – Guidelines for Evidence Collection and Archiving
- Budapest Convention on Cybercrime – Council of Europe, 2001
- CSA (Cloud Security Alliance), “Mapping the Forensic Standard ISO/IEC 27037 to Cloud Computing”, 2013
- Selected international publications on Network, Internet and Cloud Forensics (Elsevier, Springer, IGI Global, Syngress, University College Dublin, etc.)
Thanks to this scientific and regulatory foundation, our certified acquisitions are recognized in courts across the European Union under the eIDAS Regulation (EU 910/2014). Upon request, we can also apply an international timestamp to extend validity to jurisdictions worldwide.
Ready to certify your digital evidence?
Request your Certified Copy today. Valid in all European courts by default, with the option of an international timestamp recognized worldwide.
👉 Request your Certified Copy- Authenticating Webpage Evidence in Court
- Account Abusive Access Certification
- Accounting Records Certification for Injunctions
- Analysis and Certification of Fake Photos and Videos
- Certified Web Permanence of Online Content
- Click Fraud & Web Traffic Certification
- Crypto Scam Evidence Certification (Web, Wallet & On-Chain)
- Copyright Infringement Certification
- Deepfake Certification to file a legal complaint
- DM Instagram chat certification
- Defamation & Threats Certification
- Email Account Breach Certification
- Give legal value to the messages sent to your customers via whatsapp
- Google Location History Certification
- Google Takeout Certification
- Image Theft Certification
- Identity Theft Certification
- Legal Web Page Certification | Certified Web Content
- Legal Warning Certification
- Microsoft Account Export Certification
- Messenger chat certification
- Online Email Certification
- OnlyFans Content Certification
- Original Authorship Certification
- Past Web Content Existence Certification (Archived & Non-Archived Evidence)
- Social Network Content Certification
- Patreon Content Certification
- Reviews Certification
- Server Logs Certification
- Trademark & Unfair Competition Certification
- Unpaid Overtime Certification (GPS Data)
- Web Page Certification with text and images
- Web Page Certification with Video
- Web Page Certification with File
- Whatsapp and Telegram Chat Certification
All Modules
- Free estimate Account Abusive Access Certification
- Free estimate Web Content Certification (Multiple Requests)
- Free estimate Chat Certification : Whatsapp and Telegram
- Free estimate Email Online Certification
- Free estimate Google Location History Certification
- Free estimate Reviews Certification
- Free estimate Social Network Certification
- Free estimate Web Content Certification
- Blog Certify Web Content
