What is Certified Evidence — and why does it matter in appraisal and litigation?
Julio Sánchez
CEO & Founder, Estimatics
Every property professional has said some version of this in a carrier dispute: "I have photos." It is the most common defense when an estimate is challenged, and it is also the weakest.
Having photos is not the same as having evidence. Evidence requires provenance — a verifiable answer to three questions: When was this captured? Where was it captured? Has it been altered since capture?
Most field documentation cannot answer any of these questions with certainty. And that gap between "I have photos" and "I have verifiable evidence" is exactly where claims die.
The problem with "I have photos"
A photograph stored on a phone, uploaded to a cloud service, downloaded to a laptop, and attached to an email has passed through at least four systems. Each of those systems may have compressed the image, stripped its EXIF metadata, or modified its file properties. By the time it reaches the carrier's desk, the photo is just a JPEG — a file with no verifiable provenance.
A desk adjuster or appraisal panel looking at that photo has no way to confirm it was taken at the claimed property, on the claimed date, by the claimed inspector. They have to take the submitter's word for it. And in disputed claims — the claims where documentation matters most — taking someone's word is not enough.
This is not a hypothetical problem. It is the reason carriers can dismiss photographic evidence with a single sentence: "The submitted documentation does not sufficiently establish the scope of loss." They are not saying the damage does not exist. They are saying you have not proven it.
What a cryptographic hash chain is
Certified Evidence uses a technology called a cryptographic hash chain. The concept is simpler than it sounds, and the best analogy is an old one: a wax seal.
Imagine you write a letter, fold it, and press a wax seal over the fold. Anyone who receives the letter can verify two things: the seal is intact (the letter has not been opened), and the seal bears your insignia (you are the one who sealed it). If the seal is broken, everyone knows the letter may have been tampered with.
A cryptographic hash works the same way, but digitally and with mathematical certainty. When Estimatics certifies a piece of evidence — a photograph, a moisture reading, a field note — the system generates a unique digital fingerprint of that file. This fingerprint, called a hash, is a fixed-length string of characters derived from every single byte of the original file. Change one pixel in the photograph, and the hash changes completely.
The "chain" part is what makes this powerful for claims documentation. Each piece of evidence is not just individually hashed — it is linked to the evidence that came before it. The hash of photo number one becomes part of the input for the hash of photo number two, and so on. This creates an unbreakable sequence: if any single piece of evidence in the chain is altered, every subsequent hash becomes invalid. The tampering is not just detectable — it is mathematically provable.
This is the same foundational technology used in blockchain systems, financial audit trails, and legal e-discovery platforms. Estimatics applies it specifically to property claims documentation.
What Estimatics certifies
When evidence is captured through the Estimatics platform, the system locks the following data into the hash chain at the moment of capture:
The image file itself. The complete, uncompressed photograph as captured by the device sensor.
Geolocation data. GPS coordinates verified by the device at the time of capture, establishing that the evidence was created at the claimed property.
Timestamp. The precise date and time of capture, synchronized against a verified time source, not the device clock alone.
Device metadata. The specific device that captured the evidence, including hardware identifiers that tie the image to a known, authenticated user.
User identity. The authenticated account of the professional who captured the evidence, linked to their credentials within the platform.
All of these data points are locked together at the moment of capture. They cannot be modified after the fact without breaking the hash chain — and a broken chain is immediately detectable by anyone who verifies it.
What it means in appraisal and litigation
In an appraisal proceeding, the strength of your documentation often determines the outcome. Appraisers evaluate competing evidence from the policyholder and the carrier, and the party that presents more credible, verifiable evidence typically prevails.
Certified Evidence changes the nature of this evaluation. Instead of presenting photographs that an appraiser must take on faith, you present evidence with a mathematically verifiable chain of custody. The appraiser can confirm, independently, that the photograph was taken at the property, on the date claimed, and has not been modified. This does not guarantee the appraiser will agree with your scope — but it removes the carrier's ability to attack your evidence on authenticity grounds.
In litigation, the stakes are higher and the scrutiny is more intense. Attorneys routinely challenge the admissibility of photographic evidence by questioning its chain of custody. Was the photo taken when the plaintiff claims? Has it been edited or enhanced? Can anyone verify it was captured at the subject property? Certified Evidence provides cryptographically verifiable answers to each of these questions, making the evidence significantly harder to exclude or impeach.
What it does not certify
Transparency matters, and it is important to be clear about what Certified Evidence does not do.
Certification proves authenticity and integrity — that the evidence is what it claims to be and has not been altered. It does not prove that the damage shown in a photograph was caused by the claimed peril. It does not prove that an estimate line item is correctly priced. It does not substitute for professional judgment about the scope of loss.
A certified photograph of a water stain proves that the water stain existed at that location on that date. It does not prove that the water stain resulted from a covered plumbing failure rather than long-term deferred maintenance. That determination still requires professional expertise, and it always will.
What certification does is ensure that when a professional makes that determination and presents their evidence, the evidence itself is beyond reproach. The argument shifts from "Can we trust this documentation?" to "Do we agree with this assessment?" — and that is a fundamentally better position for any property professional to be in.
Who needs this
Certified Evidence is most valuable in the cases where documentation is most likely to be challenged: large-loss claims, disputed scopes, appraisal proceedings, and litigation.
Public adjusters who regularly negotiate with carriers on behalf of policyholders benefit from evidence that carriers cannot dismiss on procedural grounds. When every photograph carries verifiable provenance, the negotiation centers on scope and pricing rather than documentation adequacy.
Restoration contractors who need to justify their work scope to carriers or property owners benefit from a tamper-proof record of conditions as found, work performed, and results achieved.
Property attorneys who represent policyholders in coverage disputes or bad faith litigation benefit from evidence that meets the highest standard of admissibility and is resistant to chain-of-custody challenges.
Independent adjusters working on behalf of carriers benefit from documentation that protects them professionally — evidence that proves their inspection was thorough, timely, and accurately reported.
The standard for property claims documentation is rising. Certified Evidence is how professionals meet it.
