Menu
Menu (tap to expand)
Menu
Once you are ready to download a Forensic Note or Forensic Notebook, refer to the Download FAQ section.
Information on how to validate your files is also discussed.
Menu (tap to expand)
Once you are ready to download a Forensic Note or Forensic Notebook, refer to the Download FAQ section.
Information on how to validate your files is also discussed.
Menu (tap to expand)
Once you have decided what type of Notebook you want to create, you can create the type of notebook you need within the “All Notebooks” panel.
Changing Notebook Name:
In the video above, the user double-clicks on the notebook name to go into edit mode so that the Notebook name can be changed.
Edit Note Name
Double-clicking Notebook and Note name to go into edit mode works on both desktop and mobile devices.
The new Notebook will automatically show up within the “Selected Notebook” panel when it is created.
A new note within the Notebook can now be created by clicking the “New” button.
A new non-timestamped note will then be created.
The advanced editor has many features including an auto-save feature to ensure you do not lose your notes.
Auto-Save – Date & Time Displayed
The editor will display the last time a note was saved in the lower right corner.
The editor also has the following features:
For information on how to complete the above tasks and many more, refer to our Editor FAQ page.
When you are ready to Timestamp your note, click the “Timestamp” button below the editor.
This will:
Generating a Forensic Note is like carving your note in solid granite.
Once you generate a Forensic Note, you will not be able to change that note.
Editable copies of your Forensic Note can be created but the original Forensic Note will remain un-altered.
If you are interested in the technical details of timestamping a note, please refer to our detailed article “Timestamping Authority (TSA)“.
To edit a note, click the “Edit Note” button as shown below.
As shown in the above video, you do not have to re-timestamp the new note until you are ready.
Each time you edit a timestamped note (Forensic Note), you create a copy of the original and edit the new copy.
The original Forensic Note (Timestamped Note) remains un-altered.
Although you can change the date and time of the note entry, this does not affect the actual timestamp which can be used to show when you saved the note.
As a result, editing Forensic Notes should only occur to correct minor mistakes such as spelling, grammar or to further clarify existing information.
Attempting to change a notes original meaning or removing information you no longer want disclosed can be discovered by the opposing party.
This is because the original note will be part of the Forensic Notebook you download for legal disclosure.
Instead of removing information, you should instead Redact the information as you normally would.
Forensic Notes increases your credibility because you can prove that you are providing all information you have related to an incident.
As discussed within the “Types of Notebooks” section, only the following notebooks allow editing of Forensic Notes:
As shown in the image above, you can view All Timestamped Notes (Forensic Notes) by clicking on the icon indicated which will result in the following view.
As you can see above, the original Timestamped note (Forensic Note) is still visible and available for download.
All versions of a Forensic Note will be displayed in this view with each version clearly identified.
When you download a Forensic Notebook, it will include all previous versions of Forensic Notes to provide full disclosure.
Menu (tap to expand)
Within the “Selected Notebook” panel, you have several options as shown in the image below.
This option will allow you to either create a new note or folder.
Folders are solely for helping to organize your notes within the Forensic Notes application.
Folders do not affect the final Notebook when it is generated as a PDF.
This option will allow you to download either a single Timestamped Note (Forensic Note) or a Notebook depending on if you have the root node (Notebook) or an individual Forensic Note selected.
This option will allow you to delete a non-Timestamped Forensic Notes.
See below for information on “Mark Forensic Notes as Deleted” option.
Forensic Notes cannot be deleted once they are timestamped.
Similar to the idea that you cannot permanently remove or cover up a note written in pen in a paper notebook, you can’t permanently delete a timestamped note in your electronic notebook.
Instead, we allow you mark the note as deleted which still allows the note to be readable, but crossed out to indicate that a mistake was made.
You are also able to provide a reason for the deletion which will be included in your Forensic Notebook PDFs.
For further information on how to Mark Forensic Notes as Deleted, refer to the
“FAQ – How Do I?” section.
Audit Logs within this section only show actions taken against the currently selected Forensic Notebook.
Audit Logs are only generated for actions involving Forensic Notebooks and Forensic Notes. Actions against Non-Timestamped Notes and General Notebooks are not captured.
This option is only available to Administrators of your account.
Regular users will not be able to see the audit logs.
For more information on managing Team Members, click here.
This option is only available for:
This option allows you to view all timestamped notes associated with your Forensic Notebook including older versions.
Both General and Forensic Notebooks (w/ edits) allow you to edit existing notes and re-timestamp as required.
When you choose to edit a timestamped note, the system will make a copy of your original timestamped note to edit. The original timestamped note (Forensic Note) will remain un-altered and available if required.
To switch back to viewing “Active Documents”, click the Notebook icon as shown in the image below.
The Note Editor contains many features, for further details refer to our “FAQs – Editor Features” section.
Menu (tap to expand)
Within the “All Notebooks” panel, you have several options as shown in the image below.
We will now break down each option in more detail.
Forensic Notes Professional accounts offer three (3) different types of notebooks:
Starter accounts are limited to “General Notebooks” only.
To determine which notebook you should use, refer to “Types of Notebooks” section.
As you can see in the image, you can also create Folders so that you can organize your Notebooks to suit you or your organization’s needs.
Only Administrators will be able to re-arrange notes and create folders within the “All Notebooks” section.
By default, the user who created the account will be set as an Administrator.
For more information on managing users within Team accounts, click here.
By default, all Starter and Professional accounts are setup to invite other Team Members.
This option will allow you to delete the currently selected notebook if no Forensic Notes exist within that notebook.
Audit Logs in this section show a history of activities that have occurred in your account including, but not limited to:
Audit Logs are only generated for actions involving Forensic Notebooks and Forensic Notes.
Actions involving Non-Timestamped Notes and General Notebooks are not captured.
This option is only available to Administrators of your account.
Team Members will not be able to see the audit logs.
For more information on managing Team Members, click here.
Menu (tap to expand)
Menu (tap to expand)
After you create your account, you will be logged into the Forensic Notes application.
The applications Terms and Conditions will be presented to you upon login.
Please check (and read) each term and then click the “I Accept” button.
Selecting the appropriate Time Zone will allow all date/times to be displayed in your local time in the application and any PDF reports.
All times are stored in UTC within the system which will allow you to change the time zone later if required.
Document Workplace Bullying Harassment & Discrimination for Free
Court-Ready Documentation!
Forensic Notes are securely stored and encrypted so only you can access and read your notes until you decide to provide them to others.
All private data is encrypted at rest and in transit.
The ability to prove when you wrote a note or saved a document is essential in both civil and criminal court.
However, the reality is that it is very easy to change the date of most computer files such as MS Word documents.
Forensic Notes protects your credibility when questioned!
Every Forensic Note PDF is Timestamped by an independent Timestamping Authority (TSA) and then Digitally Signed. A second Timestamp is then obtained before all the information is entered into our proprietary Validation Tool.
Validating a Forensic Note is fast and easy. Simply Drag & Drop!
No Obligation – No Payment Information Required
Let Us Help You Through This Tough Time!
Workplace harassment is an all-too-common phenomenon in today’s workplaces which can lead to physical and mental health issues such as anxiety, depression and panic attacks among those who are victims of it. While it isfrequently of a sexual nature, workplace harassment also takes other forms andmay involve violence, bullying or other abusive, threatening or demeaning behavior…With adequate evidence, such as those which Forensic Notes empowers victims to assemble, a victim of workplace harassment can confidently fight against harassment and potentially receive compensation that could be in the hundreds of thousands of dollars…
Stop Sexual Harassment in the Workplace
With Forensic Notes, you will be able to state in detail all occurrences of workplace harassment, who witnessed the harassment and how you felt as a result of the harassment years after the incident. Would your credibility be questioned in court if you can state in detail what happened two years prior not only for one incident, but numerous incidents and also prove that you had made those notes two years prior?
Disclaimer: * “Prove” does NOT indicate that Forensic Notes provides 100% undeniable proof that something occurred, rather Forensic Notes helps you as the author prove your information taking into account your evidence, background and articulation of the events. With Forensic Notes, you can help prove that you entered the note on a given date and time.
Forensic Notes supports the current and prior major releases of Chrome, Safari, Edge and Firefox (desktop only). Forensic Notes is committed to providing the best user experience to it users through new technology which is offered by the latest browsers. New browsers also provide additional security and protection of your sensitive information, which is Forensic Notes #1 priority.
Forensic Notes supports the following browsers:
Cookies and JavaScript must be enabled to use Forensic Notes.
Electronic signatures (eSignatures) are the equivalent of a handwritten signature in the paper world. In simple terms, an electronic signature is simply a digital image of a signature displayed within an electronic document.
Digital signatures strengthen electronic signatures by encrypting the contents of a document which allows applications to detect if the document was tampered with or altered.
Although digital signatures appear to be complicated, the knowledge required to use and validate digitally signed documents associated with Forensic Notes is minimal.
For most people using Forensic Notes, the above information is all that is needed to understand the Digital Signing process.
Forensic Notes Proprietary Validation Tool will complete the complex validation and simply display the validity of the document as either being Valid (Green) or Invalid (Red).
The digital signature relies on a digital fingerprint which is a SHA-512 Hash value. The Hash value is calculated using a one-way encryption algorithm which generates the unique value for the document.
The only way to generate a duplicate SHA-512 Hash value is if an exact duplicate file is analyzed.
The digital fingerprint is then encrypted with a Private Key through a process involving Public Key Infrastructure (PKI).
As part of the Digital Signing process utilized by Forensic Notes, an independent digital timestamp is obtained from DigiStamp, our Timstamping Authority (TSA).
DigiStamp is trusted by large banks, government agencies and global organizations.
The digital timestamp is embedded within the Digital Signature at the time of signing. This allows the person viewing the document to know the exact data and time the document was digitally signed.
The result is an electronic document that is designed to detect tampering and modifications. If any modification or tampering of the document occurs, the signature becomes invalid and will fail to validate using Forensic Notes Proprietary Validation Tool.
In addition, the digital signature can be checked and validated within Adobe Reader or Adobe Acrobat.
From a legal perspective, this allows the creator of the Forensic Note to prove that a note or attached document existed at the date and time specified.
Not only can the owner prove that the note or attachment existed, but also that it has not been modified or altered since the signature was applied.
This is vital for admitting documents into a court room – as there may be challenges about the reliability of your documents and the time they were actually written.
Many people are not aware that a document can be easily manipulated to appear as if it was created days, months or even years in the past. The process can be easily accomplished by:
The result will be a document that appears to have been created in the past. Although it may be possible for an experienced digital forensic examiner to determine the original date, the process to do so is both difficult and time consuming.
Digital Signatures and Forensic Notes Proprietary Validation Tool solves the problem of being unable to prove when a document was saved. This ensures that the author of each Forensic Note can easily PROVE when a note or document was created.
As a result, you will be able to present your notes and documents and face any scrutiny with credibility and integrity.
Forensic Notes allows you to validate the authenticity of notes and attachments by physical file or by providing a SHA-512 Hash. To determine the SHA-512 Hash of your physical file, we suggest you download the following tool. Although it looks a bit ‘dated’, it is one of the easier to use applications for this purpose.
HashMyFiles by NirSoft
http://www.nirsoft.net/utils/hash_my_files.html
Download links can be found near the bottom of the page.
Every Forensic Note and Forensic Notebook is Digitally Signed by a Digital Signing Certificate issued by GlobalSign, a Certificate Authority (CA). By default, Adobe Reader / Acrobat do not have knowledge of the certificate which results in the warning “At least one signature has problems” (as shown below).
To properly validate your Forensic Notes and Forensic Notebooks, follow the steps outlined below which will add the Digital Signing Certificate to your list of Truststed Certificates. The following steps only need to be completed once on each computer viewing Forensic Notes and Notebooks.
NOTE: The following instructions are for Adobe Acrobat Reader CS. Other versions of Adobe Acrobat will have similar features and options.
1. Click on “Signature Panel”
2. Click the dropdown menu next to “Validate All”
3. Click on “Validate Signature”
4. Click the “Signature Properties…” button
The following menu shows the properties of the Digital Signature. As shown, the Forensic Note has not been modified since it was Digitally Signed.
1. Click the “Show Signer’s Certificate…” button
The following menu shows further information related to the Digital Certificate.
1. Click the “Trust” tab
The following menu shows that the associated Digital Certificate is not trusted.
1. Click the “Add to Trusted Certificates…” button
This following menu allows you to set the Trust level for the Digital Certificate associated with Forensic Notes and Notebooks. To properly validate Forensic Notes and Notebooks, you only need to ensure that the following two (2) options are selected:
1. Use this certificate as a trusted root
2. Certified documents
3. Click “Ok” to save changes
Dynamic Content, Embedded high privilege JavaScript and Privileged system operation options do NOT need to be selected. These can cause potential security concerns in some environments and are not required for validating Forensic Notes.
Now that the Digital Certificate is trusted within Adobe Reader/Acrobat, the Forensic Note or Notebook must be re-validated as it will continue to show errors until completed.
1. Click on menu icon next to “Validate All”
2. Click on “Validate Signature”
The Digital Signature will be re-validated now that the Digital Certificate is trusted.
The Signature Panel should now show the following message:
“Signed and all signatures are valid”
To view the list of Trusted Certificates within Adobe Reader, following these steps:
1. Click “Preferences…” within “Edit” menu
2. Click “Signatures”
3. Click “More…” button within “Identities & Trusted Certificates”
4. View list of Trusted Certificates
Each Forensic Note PDF has been Digitally Signed by DocumentSigning@ForensicNotes.com. As a result, any attempts to change the Forensic Notes PDF will result in a warning to the user when the Forensic Note is viewed within Adobe Reader / Acrobat as shown below.
The above warnings indicate that the Forensic Note was modified in some way since it was originally saved and signed within the Forensic Notes application.
The certificate associated with the Digital Signature has not been trusted on the computer viewing the Forensic Note. This is expected when first viewing a Forensic Note on a computer for the first time. For steps on how to trust the Digital Certificate associated with the Digital Signature, go to How to Trust Digital Signing Certificate.
The instructions within this article are provided to validate a Forensic Note via Adobe Reader or Adobe Acrobat. However, validation via the Forensic Notes Proprietary Validation Tool is recommended due to its ease of use and validation capabilities.
1. Open a Forensic Note / Notebook within Adobe Reader or Acrobat and ensure that the “Valid Forensic Note” signature panel is displayed (see below). If Digital Certificate has not been trusted, go to Trust Digital Signing Certificate and follow the instructions before proceeding.
2. Confirm that the PDF has been Digitally Signed by DocumentSigning@forensicnotes.com
3. Confirm that the document has not been modified since the signature was applied.
4. Confirm that the signing time of the document approximately matches the time you have recorded within the Forensic Note or Forensic Notebook. To view the signing time of the Forensic Note, you must “Show Signature Properties…”.
While validating a Forensic Note or a Forensic Notebook, up to three (3) different dates & times may be found which will all be valid if they fall within a couple minutes of each other due to how Forensic Notes are processed. Forensic Notes are processed in three (3) distinctive steps:
Forensic Note information in saved read-only into the database. The date and time associated with saving the data into the Forensic Notes application is recorded and printed within the generated PDF.
A Forensic Notes PDF is generated which includes the printed date and time from Step #1. The Forensic Note PDF is then Digitally Signed with a Digital Signing Certificate. The date and time associated with the Digital Signature is recorded within the Digital Signature. This Digital Signature’s signing date can then be displayed within the PDF as the Signing Date & Time. (see Validate via Adobe Reader / Acrobat – Step #4)
A one-way HASH of the Forensic Note PDF is sent to our independent and trusted third-party Timestamping Authority (TSA) which provides a timestamp of the Forensic Note or Forensic Notebook. The date and time associated with the timestamping is recorded within the Digital Timestamp Certificate and returned to the Forensic Notes application. (see Validate via Timestamp Certificate)
These three (3) steps are normally processed quickly resulting in minimal differences in times associated with all three steps. However, larger documents or heavy network utilization may result in longer delays between steps causing more significant time differences. As a result, times should approximately match within a couple minutes’ difference.
Fake a Date – File Metadata | ForensicNoteshttps://forensicnotes.wistia.com/medias/yco44b3enj
Change File Dates | Forensic Noteshttps://forensicnotes.wistia.com/medias/kq058tduv5
EEOC – What is the EEOC? | Forensic Noteshttps://forensicnotes.wistia.com/medias/3zmgro9ige
Workplace Harassment, Bullying & Discrimination | Forensic Noteshttps://forensicnotes.wistia.com/medias/zg6dqhow7q
Validate Forensic Notebooks, Notes and Attachments – How To | Forensic Noteshttps://forensicnotes.wistia.com/medias/93n0zsywsf
© TwiceSafe Software Solutions Inc. | All Rights Reserved
TwiceSafe Software Solutions Inc. DOES NOT provide any legal advice and users of this web site should consult with a lawyer to determine if the information provided on this site is valid for their given circumstances. Use of this web site is governed by our Terms & Conditions; refer to this document for more information.
Menu (tap to expand)
Multi-Factor Authentication (MFA) further secures your account from un-authorized access should someone obtain your username and password.
We highly recommend that you use your cellphone number and ensure you always have access to this device when logging into the application.
With MFA, you have two (2) options:
MFA via Text Message is the most common way that users authenticate, but this does require you to manually enter the code provided within the login form after viewing it on your cellphone.
We recommend that you use the “Call Me” feature as it is often the faster method.
MFA via “Call Me” simply requires that you acknowledge the login by pressing the “#” (pound key) upon answering a call from Microsoft Azure on your authentication device (cellphone).
Upon granting access, the application will log into Forensic Notes.
Here are the 16 questions we get asked the most.
And our answers…
We understand this concern! In fact, there is a so much misinformation about the ‘cloud’ in the media, and TV and movies – we don’t blame you for being uncertain.
The reality is, however, that modern cloud storage solutions are often more secure and more reliable than what can be provided by your in-house IT department.
Let us convince you!
First, let us look at some facts:
Can your IT department:
Chances are, your IT department just can’t do all of the above. Forensic Notes hosted on Microsoft Azure is your answer!
We worked hard to find the best solution for a secure cloud solution, and BizTech Magazine appears to agree with our choice! Read their article Why Enterprises That Value Security Trust Microsoft Azure
As a client of Forensic Notes, your organization can benefit from Azures world-class cyber security expertise and leverage the benefits of Microsoft’s annual Billion-dollar investment in technology and cyber security.
With this kind of support and proactive cyber security protection from Microsoft, you can have peace of mind that you are using the highest industry standards for cyber security.
Forensic Notes currently hosts data in Azure datacenters located in the USA, but Professional clients who upgrade to Professional+ can choose to host within the United States of America, Canada or the United Kingdom.
You’ll have complete control over where your data resides, and we can work with your IT department or Chief Security Officer (CSO) to determine the best solution for your organization’s security needs.
For more information, see the Professional+ section.
In some circumstances, organizations will choose this route depending on their needs and existing investment in their own security solution.
We can offer a variety of Enterprise options to meet your needs. Click here to view Enterprise solutions available. Please contact us if you have any questions.
Once again, this does depend on your organizations setup and current investment in security hardware and knowledge.
Forensic Notes utilizes several key Microsoft Azure Services that offer additional security not found in most IT environments, including:
Click here to view detailed information on our security features.
Professional clients can choose to upgrade to Professional+ which restricts access by IP address and allows you to choose the location of the server. For more information, see the Professional+ section.
Professional+ is an upgrade offered to Professional clients (10+ users) that require enhanced security features, ability to select the data storage location and desire premium support.
Professional+ offers:
Professional+ is designed for Law Enforcement, Government Agencies and Professional Digital Forensic Labs that require enhanced security. As a result, application access is granted to authorized IP’s only. This means that you will not be able to access the application from public internet connections unless you are going through an internal network via VPN.
By default, all accounts are setup within the United States. If you would like to upgrade to Professional+, please be aware that we will not be able to transfer your already existing account to a different region. A new account will need to be setup.
If you are unsure if Forensic Notes is right for your organization, please use the regular signup process and test with non-production data. Once you are confident that Forensic Notes is right for you, we will setup your account in the country of your choice once payment has been received.
For Professional+ pricing, please refer to our Pricing page.
You are not alone with this concern. Sites have been compromised in the past which has resulted in billions of passwords being stolen.
This is why Forensic Notes does NOT store any passwords.
All account creation, logins and Multi-Factor Authentication is handled by Azure Active Directory B2C service which can handle billions of authentications daily. As a result, we are only able to initiate a password reset and have no ability to view or retrieve your password.
Azure B2C is trusted by organizations and government agencies around the globe, including the State of Indiana which utilizes Azure and B2C to manage numerous applications for its 6 million citizens.
As a result of using Azure B2C, you will notice that upon signup or login, your browser address bar will redirect to
https://login.microsoftonline.com/forensicnotes.onmicrosoft.com/….
This is normal and upon successful login, you will be redirected to the Forensic Notes application.
One of the main reasons Forensic Notes was created was to provide a solution to Law Enforcement agencies to move away from paper notebooks towards electronic documentation.
The State of Indiana is now utilizing Azure to host multiple applications to service approximately 6 million citizens within the state.
The State of Indiana is not alone in trusting Azure. Other governments, healthcare, insurance and technology agencies like Somerset County Council (UK), Medisys (Canada), Geico (USA) and Citrix (Worldwide) also trust Azure with their sensitive data.
View 880+ case studies detailing how organizations in Banking, Education, Government and Healthcare are using Microsoft Azure.
The reality is that government agencies are trusting Azure Cloud solutions to host some of their most sensitive information as Azure now offers a Government only cloud hosting which is currently available in both the United States and Canada.
In fact, Azure Government is Level 5 DoD approved.
If you are a Government agency and require an Enterprise solution that uses Azure Government, contact us to find out what options exist.
As a user, access to your application may be considered less secure if you decide to use Social Login. But the reason why is not so obvious.
Multi-Factor Authentication (MFA) greatly enhances the security of any account but like anything security related, you must take the proper precautions to secure not only your credentials, but more importantly your MFA device.
Many people will leave their Gmail, Facebook or LinkedIn accounts logged in on their computer or phone. If a person obtains your cellphone, then they will also have access to your Multi-Factor Authentication (MFA) device. This would allow them to click on the login, select your appropriate social account and then utilize your phone to provide access via MFA.
Therefore, the security of your account is dependent on proper security of your MFA device (usually your cellphone).
Why do you allow Social Logins?
Many users want the convenience that Social Logins provide. By using a Social Login, you do not need to re-enter a password each time you login. This is why many organization offer Single Sign-On (SSO) services.
Some experts believe that SSO can enhance account security because when users are forced to provide a unique password for every account they manage, human nature says the result will be less-than satisfactory.
A Social Login does not inherently make your account less secure as the main security issue is the potential loss of an un-secured cellphone that is utilized as your MFA device.
If you are concerned about the use of social login, you can create a local account.
In addition, we provided a list below on how the security of ANY account can be further secured if you adhere and follow all of the following recommendations:
This is the reality of any application, be it online or offline. From a network perspective, Microsoft Azure protects client websites with a “distributed denial-of-service (DDoS) defense system that is part of the Azure continuous monitoring and penetration-testing process. The Azure DDoS defense system is designed not only to withstand attacks from the outside, but also from other Azure tenants”.
To handles application specific attacks, Forensics Notes utilizes various programming detection techniques and dynamic IP blocking.
Professional+ and Enterprise clients are further protected by using unique non-descriptive URLs and IP blocking of any unknown IP addresses.
If you ever encounter a problem when using Forensic Notes, please contact support@forensicnotes.com
As discussed within the Security & Encryption page, every individual note and associated attachment is encrypted using a unique 256-bit symmetric key (Content Encryption Key – CEK).
This CEK is then encrypted using the public key of a 2048-bit asymmetric encryption key (Key Encryption Key – KEK).
The Private key (KEK) used to decrypt all data is stored and only accessible within the HSM Azure Key Vault.
As a result, even if a ‘hacker’ gained access to an individual service, they would not be able to decrypt the information as the system works in tandem to create the overall security of the application.
Each service is locked down to only operate with other specified services.
According to Wikipedia…
“breaking a symmetric 256-bit key by brute force requires 2128 times more computational power than a 128-bit key. Fifty supercomputers that could check a billion (1018) AES keys per second (if such a device could ever be made) would, in theory, require about 3×1051 years to exhaust the 256-bit key space.”
Each note you create and store is individually secured with unique 256-bit key!
We are committed to maintaining and securing your important data. We send out reminders about payment for overdue accounts.
For significantly overdue accounts we may disable your ability to add new notes, but we would never hold notes or files hostage for payment nor delete your data without providing you with a reasonable opportunity to bring your account up-to-date.
Any company could theoretically go out of business. We are committed to our customers and would never leave our valued clients without options or without providing significant notice of a pending shutdown.
We would do everything in our power to keep the site accessible to download existing files and records.
For Enterprise and Professional+ accounts, we would provide all source-code and instructions for properly deploying the application within your own Azure hosting environment.
For those organizations that require legal agreements, we would be happy to setup a software escrow for an additional fee.
Click here to find out more about Software Escrows.
Yes, we recognize that Forensic Notes will be a critical software solution within your organization. As a result, Premium Support is standard when you upgrade to Professional+.
All Professional and Enterprise accounts have standard Priority Email Support during the hours of 8am to 6pm PST.
Forensic Notes was founded by a group of guys living in Canada.
And who doesn’t trust Canadians?
These guys have a lot of experience involving technology and legal matters, both criminal and civil.
And no, it’s not because they’ve been arrested or sued a lot.
If you want to know more, please check out our Bio’s.
Back to Pricing Page
Forensic Notes offers three (3) different types of Notebooks to meet your specific needs.
* Professional account is required for Forensic Notebooks. [more info]
Back to Pricing Page
Target of Workplace Bullying, Discrimination or Harassment?
Experts Agree
Documentation is Essential
if you are a Target of Bullying
Click image below to play video
Nurse bullying has been around since we donned our white uniforms.
I’m quite sure that nurses back in the early 1800s experienced the same behaviors we see today (intimidation, open criticism, exclusion, etc.).
Every nurse has heard the phrase, “nurses eat their young” and were warned about the mean, crusty nurses when they were in nursing school. The problem is, now we eat our young, our old, and everything in between!
With the increased attention on professional practice, inter-professional relationships, innovation and advanced education, shouldn’t nurse bullying be decreasing?
As I travel the globe helping individuals and organizations eliminate workplace bullying, this question often comes up.
Is bullying getting better or worse?
Hostile work environment is any situation that makes a person feel consistently uncomfortable at their place of employment.
However, in order for an employee to utilize the legal system, there must be proof of inappropriate conduct.
Under the Civil Rights Act of 1964 and other applicable Federal laws, inappropriate conduct that creates a hostile working environment includes situations in which a person is harassed or discriminated against due to their race, religion, gender, national origin, age or disability.
Furthermore, hostile environment must be pervasive and severe enough that it deviates from the terms and conditions of a person’s employment.
It must create an environment that is abusive and not conducive for an employee to operate in, thereby affecting the quality of their work.
The test is that a reasonable person would find the environment to be hostile or abusive.
Are you being treated unfairly at work?
Do you feel like your manager or co-worker is targeting you by making discriminating comments about your age, sex or ethnic background which has you feeling upset and emotionally drained?
Workplace discrimination can stop you from promotions, higher pay and the career you deserve.
Over the last 10 years, the Equal Employment Opportunity Commission (EEOC) which handles discrimination cases in the United States, has received over 91,000 individual charge filings per year.
Simply put… you are not alone!
Understanding how the EEOC operates is key to knowing >how to handle workplace discrimination.
Once you understand your options and the mistakes to avoid when dealing with the EEOC, you will greatly increase your chances of a successful outcome.
Fulfill your career aspirations to work in a positive and supportive work environment.
The Equal Employment Opportunity Commission (EEOC) is a Federal agency in the United States which enforces employment laws.
The agency was established by the Civil Rights Act of 1964 with the task to enforce a variety of anti-discrimination laws.
The EEOC is often the place of first recourse when they have a grievance against an employer.
An employee must go through the EEOC and/or their state counterparts before trying to sue for discrimination in Federal court.
An employee can file a complaint with the EEOC against their employer if they believe they have been discriminated against on the basis of a variety of factors.
In Canada, the appropriate organization depends on who the employer is.
If it is the Federal agency or a workplace regulated by the Canada Labour Code, then workers are covered under the Canadian Human Rights Act, while others recourse to their Provincial or Territorial labor rights agency.
Are you being treated unfairly at work?
Do you feel like your manager or co-worker is targeting you by making discriminating comments about your age, sex or ethnic background which has you feeling upset and emotionally drained?
Workplace discrimination can stop you from promotions, higher pay and the career you deserve.
Over the last 10 years, the Equal Employment Opportunity Commission, which handles discrimination cases in the United States, has received over 91,000 individual charge filings per year.
Simply put…you are not alone!
Understanding how the EEOC operates is key to knowing how to handle workplace discrimination.
Once you understand your options and the mistakes to avoid when dealing with the EEOC, you will greatly increase your chances of a successful outcome.
Fulfill your career aspirations to work in a positive and supportive work environment.
Everything you want to know about the EEOC and EEO can be found here, including: