Key takeaways AI is becoming a major tool to fight social and tax fraud, but it is still underused by public authorities. AI technologies (machine learning, deep learning, generative AI) can process large volumes of data and detect increasingly...
Articles
All our articles on Timestamping
Discover the power of qualified timestamping in proving the exact time and integrity of your digital evidence. Our blog posts explain how timestamping enhances trust, supports legal admissibility, and seamlessly integrates into your digital workflows for secure, automated proof management.
Contract lifecycle management (CLM): managing the contract lifecycle and legal traceability
Key takeaways on CLM Contract lifecycle management (CLM) enables the structured organisation and effective oversight of the contract lifecycle, from drafting through to archiving. CLM tools enhance contractual governance by centralising documents,...
How to add undisputed traceability to digital registered mail?
Key takeaways about traceability in digital registered mail Registered mail serves an evidential function: it is used to prove that a legally significant communication was sent and received. The evidential value of registered...
How to verify the authenticity of a document and prevent fraud
Key points to keep in mind about the authenticity of a document Authenticating a document means verifying its origin, its integrity and its conformity with the original. Documentary fraud is increasing: 69% of French companies are targeted by...
Interview: Is trustworthy AI possible?
Key takeaways of this interview: Trust in AI is not limited to the quality and lawfulness of training data. Above all, it requires effective capabilities for evaluating, testing and monitoring systems and their uses. The availability and quality of...
Trust service provider (TSP): definition, role and legal implications of trust services
Key points on trust service providers A trust service provider (TSP) delivers trust services intended to guarantee the authenticity, integrity and legally reliable dating of electronic documents and data. The reference legal framework is the eIDAS...
Interview – AI: proving human intervention
Key takeaways from this interview Copyright protection for a work created using AI requires proof of substantial human intervention, as content generated solely by an AI system is not eligible for protection. Traceability of the creative process...
Legal Tech: what role does AI play in the management of digital evidence?
Key takeaways 71% of legal departments already use generative AI for their research AI can analyse and sort evidence, but does not certify either its date or its integrity Deepfakes represent a growing threat to the authenticity of evidence Only a...
Transitioning from paper to digital without losing trust. The example of road construction and French AQP framework
Key points to remember about the French AQP norm: The AQP / NF P 98-750 scheme addresses an evidential requirement: securing the traceability of asphalt deliveries and limiting fraud (theft, falsification, disputes). The weighbridge ticket is a key...
What is the role of an HSM (Hardware Security Module) in securing corporate data?
Key points to remember about HSMs: An HSM is a hardware device dedicated to the secure protection, generation and management of cryptographic keys. It provides the technical foundation for digital trust...
How to detect document fraud in business? Guide and solutions
Key points Document fraud is based on a deliberate intention to deceive and can involve any type of document (contracts, invoices, documentary evidence, identity documents). There are many forms of fraud: falsification, counterfeiting, identity...
Admissible digital evidence: what safeguards should be required in the event of a dispute?
Key points on admissible digital evidence An electronic record has the same evidential weight as a paper document, subject to certain conditions. Two fundamental requirements apply: identification of the author and integrity of the document. The...
What role does NTP (Network Time Protocol) play in the security of electronic data?
Key points on NTP Protocol The NTP protocol is a technical mechanism designed to synchronise the clocks of computer systems within a network. This shared time reference becomes decisive where the date and time of an event are relied upon for...
Understanding the role of hashing in electronic timestamping
Key points about hashing Hashing generates a unique, irreversible fingerprint that enables the integrity of a document to be verified without disclosing its content. Any alteration to the file immediately changes the fingerprint, making attempts at...
DORA Regulation: key considerations, obligations and compliance strategies
Key takeaways DORA regulation establishes a unified EU framework for managing digital risks, ensuring that all financial institutions and their technology providers can maintain operations even during severe IT disruptions. The regulation...
Strengthening business trust through Corporate Digital Identity
Key takeaways Corporate digital identity is a pillar of digital trust. It enables authentication of the issuing legal entity and ensures the integrity of the documents it produces. Failure to address this identity exposes organisations to...
Understanding the NIS 2 Directive: definition, scope and entities concerned
Key takeaways on the NIS 2 Directive The NIS 2 Directive strengthens the European cybersecurity framework and applies to a broader range of public and private sector organisations. It distinguishes between two categories of entities, essential...
The deepfake threat: an immediate challenge for digital evidence
Key takeaways: deepfakes and digital evidence The deepfake threat is real: $25.5 million lost through a fake videoconference; 70% of French companies targeted by fraud in 2022. The European legal framework is strengthening: eIDAS 2 and the AI Act...
What is Digital Trust and how to implement it in your business?
Key takeaways Digital trust has become a strategic issue in securing digital workflows in the face of the increase in cyberattacks, fraud and regulatory requirements. It is based on four core pillars: data integrity, authenticity of the issuer,...
GDPR: how to secure consent collection using Qualified Timestamping and Electronic Seal
Key takeaways Digital consent does not always take the form of a signature. A click, a ticked box or the validation of a form must nevertheless be demonstrated in a reliable and legally enforceable manner. Qualified timestamping provides a legally...
AI Act: how high-risk AI operators can meet EU compliance requirements
Key takeaways The AI Act establishes a risk-based approach, with enhanced obligations for so-called “high-risk” AI systems used in sensitive sectors. The organisations concerned are not limited to developers, but also include AI deployers, who are...
How digitalisation is transforming claims management for insurers
Key takeaways Claims management is becoming increasingly digital, with widespread use of online claims notifications and strong expectations of simplicity and speed on the part of policyholders. This transformation requires insurers to reassess...
Adapting evidence strategies in the digital era
Key takeaways The dematerialisation of exchanges is profoundly reshaping the law of evidence and requires legal professionals to adapt their strategies in the face of increased risks of falsification and challenge. Digital evidence is legally...
Optimising market data cost management through qualified timestamping
Key takeaways Market data represents a high strategic cost for financial institutions, with significant risks of overspend arising from audits and a lack of transparency regarding actual usage. Discrepancies between the effective use of financial...
Checklist for CTOs: How to choose the right Qualified Trust Service Provider
Key takeaways The selection of a Qualified Trust Service Provider is a strategic decision to ensure the legal effect, integrity and regulatory compliance of digital documents and transactions. An eIDAS-compliant solution must deliver high...
The challenges of digital transformation for Chief Legal Officers (CLOs)
Key takeaways Digital transformation has placed Chief Legal Officers (CLOs) at the centre of dematerialisation challenges, with responsibility for reconciling operational efficiency, legal certainty and regulatory compliance. Legal departments must...
eIDAS 2.0: strengthening European digital identity
Key takeaways The eIDAS 2.0 Regulation strengthens the European legal framework for electronic transactions by extending its scope and increasing the level of security applicable to trust services. It introduces the European Digital Identity Wallet...
Timestamping: prove price compliance with Omnibus Directive
Key takeaways The Omnibus Directive, which entered into force on 28 May 2022, significantly strengthens consumer protection against misleading commercial practices, particularly within the digital economy. It prohibits false promotions by requiring...
What is Electronic Timestamping and how does it work?
What is electronic timestamping? Timestamping origins All computer systems are equipped with a real-time clock which indicates the current date and time for various operations carried out on the device, such as creating a file or sending an email....
Timestamping: the benefits for Electronic Invoices
Key takeaways Timestamping provides an immutable and verifiable record of when an electronic invoice is created, sent, or received, ensuring integrity and traceability. By leveraging cryptographic mechanisms, timestamping protects electronic...
What is eIDAS Qualified Timestamping?
Key takeaways on eIDAS qualified timestamping Electronic timestamping makes it possible to prove that a digital document existed at a specific date and time and that it has not been altered since. When it is eIDAS-qualified and issued by a...
8 good reasons to use electronic timestamping
Key takeaways In matters of intellectual property, electronic timestamping makes it possible to establish evidence of prior creation and integrity of digital works. From a regulatory perspective, it facilitates the demonstration of compliance, in...
What is a Timestamping Token? Technical explanation
Key takeaways on timestamp tokens A timestamp token reliably associates a date and time with a data item in order to prove its existence and integrity at a given point in time. Evidency’s timestamping solution is based on recognised cryptographic...
































