Sunday, November 3, 2019
Forensics Research Project 2 Paper Example | Topics and Well Written Essays - 750 words
Forensics Project 2 - Research Paper Example It can be stated that the aforesaid tactics would generally provide broader explanation to various legal aspects relating to the preservation of a computer and its data. Key Steps to Ensuring Legal Success in a Courtroom in a Forensics Case In order to determine the key steps ensuring legal success in a courtroom in a forensics case, it can be affirmed from a broader outlook that forensic readiness is often represented as the capability of an organization to increase its prospective to use modern digital evidences and at the same time, reducing the costs of an investigation by a certain degree. In this similar concern, the key steps towards ensuring legal success in a courtroom in a forensics case have been outlined below. Describing the business circumstances that need digital evidence Identifying current sources & different kind of potential evidence Determining the evidence based collection obligation Establishing a strategy for secure storage plan & handling of possible evidence Identifying the circumstances when a full formal investigation need to be initiated Documenting an evidence-related case explaining the incident and its manifold impact Ensuring legal appraisal to take necessary actions in response to the happening of any incident (Rowlingson, 2004). Conditions That Require Inclusion of Law Enforcement With regard to conclude the conditions that require inclusion of law enforcement, it can be affirmed that computer crime may be conducted through the violation of the policies associated with information technology relating to the preservation of a computer and its data. Generally, there pertain numerous conditions of crime related to the information technology that lays the requirement of the inclusion of law enforcement agencies. In this regard, according to Section 13 of the Cybercrime Prevention Act 2012, law can be enforced against any individual linked with preservation of computer data. The truthfulness of traffic data & subscriber information relating to communication services shall be preserved for a minimum of six months. Moreover, content information shall likewise be preserved for a period of six months from the date of the order received from law enforcement authorities obliging its preservation. It can be stated that law enforcement system may provide extensions for the conduct of the aforesaid activities. It has been apparently observed that one of the conditions that require inclusion of law enforcement is that once computer data is preserved, conveyed or stored by a service provider, the data would be accessible only to authorized users It is the service provider who requires to preserve digital data as well as to keep those confidential and most significantly maintain their compliance by a certain degree. It is to be affirmed that if any computer operator violates or not comply with the order provided by the service provider, then the respective task will be regarded as a crime as and the operator will be punis hed under section 13 of the Cybercrime Prevention Act 2012 (The Office of the President of the Philippines, 2012). Possible Actions to Protect the Employer In accordance with the mentioned case, one of the possible actions could be the introduction of various data prevention plan which might protect the employer by a certain degree. In this similar concern, it can be affirmed that the employer can take the help of a law enforcement group for collecting as well as
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.