Skip to content
Forensicon
CALL US NOW 888-427-5667
  • Home
  • AboutExpand
    • Computer Forensics Team
    • Chicago Computer Forensics
    • Forensicon Noted Cases
    • Careers at QDiscovery
    • Testimonials
  • Practice AreasExpand
    • Trade SecretsExpand
      • Trade Secrets Misappropriation
    • Employment LitigationExpand
      • Employment Litigation Defense
      • Wage & Hour Litigation
    • Internal InvestigationsExpand
      • Corporate Identity Theft
      • Corporate Security Breach
      • Illicit Employee Activity
    • Family Law
  • ServicesExpand
    • Computer Forensics ServicesExpand
      • Computer Forensics Expert Witness Testimony
      • Computer Forensic Analysis
      • Database Forensics
      • Enterprise Storage Failure & Data Recovery
    • Cell Phone Forensics
    • ConsultingExpand
      • Cyber Security Data Breach Response
      • Expert Witness Testimony & Reports
      • ESI Preservation & Collection
      • Online Content Preservation
    • e-DiscoveryExpand
      • Data Removal & Certification
      • Online Content Preservation
    • Internet Investigations
    • DVR Recovery Forensics
  • ResourcesExpand
    • Articles
    • Case Summaries
    • Computer Forensics Resources
    • Resource Documents
    • Forensicon Newsletters
    • Resource Links
  • News & EventsExpand
    • Forensicon News
    • Forensics Blotter
  • Contact Us
Forensicon
Home / Resources / Articles / What is Metadata?

What is Metadata?

Metadata is often described as “data about data” and is used to provide information about a specific file or document. Computer forensics experts use metadata to understand what activities were transpiring on a digital device such as a computer. Most metadata fields are hidden and not easily seen or accessible by the end user. Sometimes individuals make an effort to alter or purge metadata. When a person tries to cover his or her tracks by tampering with metadata, inconsistencies across various metadata points can sometimes reveal clues of evidence tampering or destruction of crucial discovery. Only an expert skilled in forensic examinations has the necessary skills and experience to testify credibly in a court of law about computer evidence tampering. It is important that you retain a skilled and experienced forensic expert to preserve the metadata through forensic imaging or other industry accepted forensic methods and perform the necessary metadata analysis for your matter.

Examples of metadata include

  • File name
  • File extension
  • File size
  • Hash value
  • Date last accessed
  • Date created
  • Date last modified

Common types of metadata

  • Application metadata
  • Document metadata
  • File System metadata
  • Email metadata
  • Embedded metadata
  • User-Added metadata
  • Vendor-Added Metadata

A complete description and examples of each type of metadata are available in The Sedona Conference® Commentary on Ethics & Metadata.

Metadata is important no matter what type of investigation you are involved in. For example, electronic medical records metadata is crucial when investigating whether a medical practitioner altered a patient’s medical record to reflect information that isn’t accurate. A more detailed analysis of metadata’s role in healthcare is available in “Electronic Medical Records: Metadata as Evidence in Litigation” an Illinois bar article co-authored by Lee Neubecker, President of Forensicon.

Read More Articles…

Back to Resources…

Search

Related Service Offerings

Computer Forensic Analysis
Forensic Vault Service
Expert Witness Testimony & Reports
...more services

Articles

What is Forensic Hard Drive Imaging?
What is Metadata?
The Liability of Email as Evidence
Track Former Employee’s Computer Activities
Exploring fseventsd Forensics Techniques
...more articles

Forensicon © 2025. All Rights Reserved.

  • Website Privacy Policy
  • SiteMap
  • Website Disclaimer
Corporate Headquarters:
309 W Washington St., Ste 1300
Chicago, IL 60606
v. (888) 427-5667 f. (312) 427-5668
Contact us
Computer Forensics Experts
ESI Discovery Consultants
Digital Cyber Forensic Analysis
Computer Forensics Company
Michigan PI Agency# 3701205872
  • Home
  • About
    • Computer Forensics Team
    • Chicago Computer Forensics
    • Forensicon Noted Cases
    • Careers at QDiscovery
    • Testimonials
  • Practice Areas
    • Trade Secrets
      • Trade Secrets Misappropriation
    • Employment Litigation
      • Employment Litigation Defense
      • Wage & Hour Litigation
    • Internal Investigations
      • Corporate Identity Theft
      • Corporate Security Breach
      • Illicit Employee Activity
    • Family Law
  • Services
    • Computer Forensics Services
      • Computer Forensics Expert Witness Testimony
      • Computer Forensic Analysis
      • Database Forensics
      • Enterprise Storage Failure & Data Recovery
    • Cell Phone Forensics
    • Consulting
      • Cyber Security Data Breach Response
      • Expert Witness Testimony & Reports
      • ESI Preservation & Collection
      • Online Content Preservation
    • e-Discovery
      • Data Removal & Certification
      • Online Content Preservation
    • Internet Investigations
    • DVR Recovery Forensics
  • Resources
    • Articles
    • Case Summaries
    • Computer Forensics Resources
    • Resource Documents
    • Forensicon Newsletters
    • Resource Links
  • News & Events
    • Forensicon News
    • Forensics Blotter
  • Contact Us