this post was submitted on 28 Jul 2025
31 points (97.0% liked)

Ask Lemmy

33735 readers
1508 users here now

A Fediverse community for open-ended, thought provoking questions


Rules: (interactive)


1) Be nice and; have funDoxxing, trolling, sealioning, racism, and toxicity are not welcomed in AskLemmy. Remember what your mother said: if you can't say something nice, don't say anything at all. In addition, the site-wide Lemmy.world terms of service also apply here. Please familiarize yourself with them


2) All posts must end with a '?'This is sort of like Jeopardy. Please phrase all post titles in the form of a proper question ending with ?


3) No spamPlease do not flood the community with nonsense. Actual suspected spammers will be banned on site. No astroturfing.


4) NSFW is okay, within reasonJust remember to tag posts with either a content warning or a [NSFW] tag. Overtly sexual posts are not allowed, please direct them to either !asklemmyafterdark@lemmy.world or !asklemmynsfw@lemmynsfw.com. NSFW comments should be restricted to posts tagged [NSFW].


5) This is not a support community.
It is not a place for 'how do I?', type questions. If you have any questions regarding the site itself or would like to report a community, please direct them to Lemmy.world Support or email info@lemmy.world. For other questions check our partnered communities list, or use the search function.


6) No US Politics.
Please don't post about current US Politics. If you need to do this, try !politicaldiscussion@lemmy.world or !askusa@discuss.online


Reminder: The terms of service apply here too.

Partnered Communities:

Tech Support

No Stupid Questions

You Should Know

Reddit

Jokes

Ask Ouija


Logo design credit goes to: tubbadu


founded 2 years ago
MODERATORS
 

Since anyone can put anything they want on their servers, it seems like a lot of evidence could be thrown out in court cases if access to that information is not strictly monitored and audited to make sure the owners aren't removing or adding data.

Does anyone know of industry-standard practices to ensure that data on servers is not being manipulated in a way to protect or harm users?

top 24 comments
sorted by: hot top controversial new old
[–] Zwuzelmaus@feddit.org 11 points 5 days ago* (last edited 5 days ago) (2 children)

This question is a whole lot of chaos.

It depends a lot on which country you are thinking of.

You say courts would look into log files. No, they don't. Experts do stuff like that.

Why do you ask for industry standards when it's about legal stuff. There are legal procedures. Or maybe not.

Whether anyone cares about user data, that's one of the things that's very very different in all countries.

[–] Onomatopoeia@lemmy.cafe 2 points 5 days ago

And lines of business too.

The finance world has different regs than say manufacturing or a reseller.

[–] haloduder@thelemmy.club 1 points 5 days ago* (last edited 5 days ago) (3 children)

The industry standards would be what major tech companies do in order to comply and make sure that when their data is involved in a legal battle, they can prove that it hasn't been tampered with.

Any country is fair game since I'm interested about any general knowledge, but I'm mostly curious about Western nations such as the United States.

[–] Onomatopoeia@lemmy.cafe 2 points 5 days ago* (last edited 5 days ago)

It depends on the industry.

Finance has stricter regs about retention than most others.

Your finance data in any company may need to comply with regs, but may also need to comply with your legal team.

It really varies, even by company, or by business unit/vertical. Or class of data.

Compliance is an entire business itself. I've had to do compliance training every year, and not as someone who holds the keys to major data, but interacts within a company, and may handle different types of data.

[–] Zwuzelmaus@feddit.org 1 points 5 days ago (1 children)

Any country is fair game since I'm interested about any general knowledge

So you think you get ~200 responses now, one from each country LOL

[–] haloduder@thelemmy.club 1 points 5 days ago

Probably not, since most people don't know this kind of information about most countries.

[–] BCsven@lemmy.ca 1 points 5 days ago

If you mean like a file for evidence got stored and you want to ensure it wasn't tapered with you can generates a checksum hash then record that hash elsewhere for verification later. Drives will also store access times, even if no data was changes, but just touched or viewed

[–] exasperation@lemmy.dbzer0.com 7 points 5 days ago (1 children)

Each side has the opportunity to use their own experts to ask those questions and analyze the forensic integrity of the evidence at issue. Even if your side doesn't have an expert, your attorney still has the chance to question the other side's expert.

So if there's a piece of evidence based on an email sent from Alice to Bob, the way the evidence gets introduced is that it gets authenticated, by someone who would be in a position to speak to whether a particular document is authentic. The other side can seek to exclude the evidence if the basis for authentication isn't strong enough. Or, it comes in, and the other side might want to challenge that the document actually represents what the other side wants to prove: maybe casting doubt on whether other people had access to Alice's account, etc.

Or if you want to use a surveillance camera video, you'd generally have someone who maintains the system testify as to how the system records, where it stores the data, and how it adds timestamps to different videos. Then that technical person can usually testify that the timestamp is accurate, etc., and might have to answer questions about what happens when the system loses power or a connection, etc.

So it's not that the courts in the US actually test the validity of evidence. It's that the parties involved in the case can challenge the validity if the circumstances call for it.

[–] Zwuzelmaus@feddit.org 1 points 5 days ago

All of that is only true in the British legal system, and most of their colonies ofc.

[–] bamboo@lemmy.blahaj.zone 3 points 5 days ago

What are you planning OP??

[–] radix@lemmy.world 2 points 5 days ago (1 children)

Expanding on some of the other answers...

A court in the US or UK is going to look and act a lot different than courts in, like, Thailand or India or whatever.

But taking the US as an example, both sides will get a copy of relevant data, and whichever side wants to allege tampering will hire an expert to try to make that case to the judge or jury. The court itself doesn't verify any evidence. Both sides present their version, and the jury decides what happens - with the prosecution in a criminal trial having a higher burden of proof, at least in theory.

[–] Ziggurat@jlai.lu 1 points 5 days ago

The court itself doesn't verify any evidence. Both

Being from a country with an inquisutory justice system where a judge oversee the investigation it seems crazy to me that the court doesn't verify the evidences

[–] homesweethomeMrL@lemmy.world 2 points 5 days ago
[–] fodor@lemmy.zip 2 points 5 days ago (1 children)

If you have a computer at home and the cops think you might have evidence on it of some crime, they ask the judge for a warrant and then they take the machine and they put it in their evidence locker. Then nobody can manipulate it. I mean that assumes the cops are clean, which they aren't, but it's not every day that they tamper with evidence inside of evidence lockers.

Or maybe you're asking about data stored in the cloud, like if you have some possibly incriminating spreadsheet in your Google account. Then the pigs would ask Google to make a copy of the data stored in your account, and Google would probably do that, then sharing the data with the pigs. So if you decided to edit the data later, it would be too late, the copy would already be out there.

Civil litigation in the US has different rules. At some point when you find out that someone is going to be suing you or is in fact suing you, you have a legal duty not to fuck with the evidence that's likely to be relevant. If it is later discovered that you were fucking with the evidence, then the judge or jury might be able to assume that whatever you touched would have made you look bad. Of course the details matter. But anyway, suppose you want to edit some log file so you SSH into your server and then edit it, but that in turn creates a history of your login and commands that you executed, so then maybe you decide to delete your own history, but then the absence of your history is itself evidence of fuckery... All of that being said, we can be sure that some people are somewhat slick and somewhat lucky and get away with altering data from time to time. We just don't know how often on account of them not getting caught.

[–] haloduder@thelemmy.club 1 points 5 days ago* (last edited 5 days ago)

I'm asking about data stored on servers.

Lemmy, for example, has its instances owned by people and those people can do whatever they want with the data that is stored on their servers. If there is ever a legal issue involving a user's posts on Lemmy, how can courts or law enforcement determine that the owner hasn't manipulated the data to protect or harm the user?

Sure, they can look at other servers' since Lemmy is federated. But in the case of a non-federated service (which most are) or instance, this kind of verification wouldn't be possible.

[–] bacon_pdp@lemmy.world 1 points 5 days ago

Well, the courts only have copies of evidence submitted. And both sides of every court case should have copies as well.

[–] corsicanguppy@lemmy.ca 1 points 5 days ago (1 children)

It's complex. Chain of custody is important.

Also the pluralized noun is for Band or Football; the mass noun is still just "practice" like you'd say for a doctor's practice.

[–] gravitywell@sh.itjust.works 1 points 5 days ago (1 children)

The data gets cloned to an image first, that image is then whats gets used as evidence.

[–] haloduder@thelemmy.club 2 points 5 days ago (2 children)

Thanks.

That seems like it would prevent tampering after a certain point, but it doesn't verify that the data hasn't been maliciously altered before the image is created.

[–] mkwt@lemmy.world 3 points 5 days ago

Speaking for the United States, any document or other exhibit is only admitted into evidence when a witness gets on the stand and testifies under oath as to what the document is. So if someone wants a court to believe that, say, a computer log is authentic, they have to produce a witness to testify about the authenticity. This is where anti tampering measures can be discussed, if relevant.

That witness is then subject to cross examination, which can reveal any holes or gaps. Cross examination can also be used to impeach the credibility of the witness themself.

Once an exhibit is admitted into evidence, the trier of fact, either a judge or jury, will assign a credibility level to it based on the sum total of evidence presented and their own common sense.

[–] gravitywell@sh.itjust.works 2 points 5 days ago (1 children)

A proper forensic analysis would take into account things like modification times and other factors that could be used to determine if there was alterations.

Its the same with physical documents, a company can get a legal order to not shred documents and keep everything pertaining to a given subject, if they internally ignore it and shred documents anyway, they might get away with it, but its a pretty big risk for a company to take.

[–] Onomatopoeia@lemmy.cafe 1 points 5 days ago (1 children)

I don't know about it being a big risk, it really depends.

Look at Enron - they shredded (I believe literally) tons of documents.

There's a penalty for destroying such things, but you'd really have to prove what it was for the worst penalties. Better in Enron' s perspective to prevent the bigger issue, and shred the evidence that would certainly convict their C-suite.

[–] gravitywell@sh.itjust.works 1 points 5 days ago

Yeah for large corporations like Enron and their C-suites the rules are a bit different, but if its not some rich corpo exec then there are usually consequences. They might get away with the original crime but charged instead with obstructing or worse, they might still be convicted on the first thing plus an obstruction charge.