All content
Browse all articles and insights from the TrueScreen blog
Articles

How to certify a smartphone video as legal evidence in court (2026 guide)
When a smartphone video stands in court: lawful acquisition, file integrity, chain of custody, formal filing. Norms, case law and tech requirements 2026.

Agent-to-agent communication: provenance and audit trail for multi-agent AI ecosystems
Agent to agent communication provenance: how to build a verifiable multi-agent AI audit trail compliant with AI Act and admissible in court.

How chain of custody for digital evidence works in US proceedings
How US federal and state courts treat chain of custody for digital evidence under FRE 901, FRE 902(14), FRCP 37(e), Lorraine v. Markel, NIST SP...

Digital evidence in French civil procedure: chain of integrity under article 1366 Code civil and eIDAS
Article 1366 Code Civil and the eIDAS Regulation give electronic writing legal force in French civil litigation. Practitioner guide to the chain of integrity.

ISO/IEC 27037: The International Standard for Digital Evidence
ISO 27037 explained: 4 phases (identification, collection, acquisition, preservation), DEFR/DES roles, chain of custody, and the ISO forensic family.

WhatsApp evidence in court: 2026 guide to chats, screenshots and voice messages with legal value
WhatsApp evidence in court: how 2026 case law treats chats, voice notes and screenshots, what ISO/IEC 27037 and FRE 901 require for forensic acquisition.

eIDAS 2.0: 21 May 2026 deadline for remote digital seals
On 21 May 2026 the eIDAS 2.0 deadline for remote qualified signature and seal devices expires. Technical obligations for QTSPs and downstream businesses.

Italy’s deepfake law 132/2025: what changed after the Meloni case
Italy's law 132/2025 introduces a criminal offence for non-consensual AI deepfakes. What the law covers, the Meloni case, and how corporations should respond.

Virtual vehicle inspection: how certified photos prevent insurance fraud
Virtual vehicle inspections relying on uncertified photos are structurally vulnerable to AI manipulation. Learn how source-side certification protects insurers.

Trust by design: building SaaS products with verifiable integrity from the first line of code
Trust by design for SaaS: five architectural primitives for verifiable integrity, forensic audit trail and GDPR, NIS2, AI Act compliance in a single layer.

Deepfakes: what they are, how they’re made, the fraud they enable, and why detection alone is losing the war
Deepfakes in 2026: what they are, how AI generates them, the fraud they enable, and why source certification beats detection.

Digital evidence in Spanish civil procedure: cadena de custodia under article 326 LEC and eIDAS
How article 326 LEC, Ley 6/2020 and eIDAS shape digital-evidence admissibility in Spanish civil courts: presumption, chain of custody, QTSP integration.

PEC in court: legal weight, challenges and source-level certification
PEC probative value in court: what it proves, how it can be challenged, how to certify attachments at the source with forensic methodology and QTSP...

Short-Term Rental Documents: The Complete Guide for Hosts in 2026
Short-term rental documents hosts must collect, sign and archive: ID, contract, privacy, condition photos, AirCover and Booking claims.

Digital evidence in German civil procedure: chain of custody under § 371a ZPO and eIDAS
Verbatim explainer of § 371a ZPO, eIDAS Article 25, GoBD and Beweiskette: how digital evidence holds up in German civil and criminal courts.

How chain of custody for digital evidence works in UK proceedings
How chain of custody for digital evidence works under ACPO Principle 3, CPR Part 31 and Practice Direction 31B in UK courts and tribunals.

Image authentication for enterprises: the four levels that secure your visual assets
Enterprise image authentication explained: the four operational levels, when each is required, and how to embed them in document workflows beyond AI.

Voice cloning corporate fraud: the verifiable defense for CFOs after the Arup case
After the Arup 25.6M deepfake fraud, voice cloning targets corporate finance: the defense for CFOs with certified voice baseline and out-of-band rules.

Data integrity in the AI era: why source certification rewrites the paradigm
Classic data integrity falls short in the generative AI era. Source certification extends the guarantee to the moment data is born.

