What is MetaData?Post navigationPrevious: Previous post: Best Practices on Information SecurityNext: Next post: Admissibility and Authentication of (Some) Electronic Evidence