Wednesday, June 19, 2019

Forensics Research Project 2 Paper Example | Topics and Well Written Essays - 750 words

Forensics Project 2 - Research Paper ExampleIt shadower be stated that the aforesaid tactics would generally provide broader explanation to various legal aspects relating to the preservation of a computer and its data. Key Steps to Ensuring legal Success in a Courtroom in a Forensics Case In order to determine the key steps ensuring legal success in a courtroom in a forensics case, it can be affirmed from a broader outlook that forensic readiness is often represented as the dexterity of an organization to increase its prospective to use modern digital evidences and at the same time, reducing the costs of an investigation by a certain degree. In this similar concern, the key steps towards ensuring legal success in a courtroom in a forensics case have been outlined below. Describing the business quite a little that need digital evidence Identifying current sources & different kind of potential evidence Determining the evidence based collection obligation Establishing a strategy fo r secure storage plan & handling of viable evidence Identifying the circumstances when a full formal investigation need to be initiated Documenting an evidence-related case explaining the concomitant and its manifold impact Ensuring legal appraisal to take necessary actions in response to the happening of any incident (Rowlingson, 2004). Conditions That Require Inclusion of Law Enforcement With imagine to conclude the conditions that require inclusion of law enforcement, it can be affirmed that computer crime may be conducted through the violation of the policies associated with information engine room relating to the preservation of a computer and its data. Generally, there pertain numerous conditions of crime related to the information technology that lays the requirement of the inclusion of law enforcement agencies. In this regard, fit to Section 13 of the Cybercrime Prevention Act 2012, law can be enforced against any individual linked with preservation of computer data. T he truthfulness of vocation data & subscriber information relating to communication services shall be uphold for a minimum of six months. Moreover, content information shall likewise be preserved for a period of six months from the date of the order received from law enforcement authorities obliging its preservation. It can be stated that law enforcement system may provide extensions for the conduct of the aforesaid activities. It has been apparently observed that one of the conditions that require inclusion of law enforcement is that once computer data is preserved, conveyed or stored by a service provider, the data would be accessible only to authorized users It is the service provider who requires to preserve digital data as well as to intimidate those confidential and most significantly maintain their compliance by a certain degree. It is to be affirmed that if any computer operator violates or not comply with the order provided by the service provider, then the respective ta sk go out be regarded as a crime as and the operator will be punished under section 13 of the Cybercrime Prevention Act 2012 (The Office of the President of the Philippines, 2012). Possible Actions to Protect the Employer In accordance with the mentioned case, one of the possible actions could be the introduction of various data prevention plan which might protect the employer by a certain degree. In this similar concern, it can be affirmed that the employer can take the help of a law enforcement group for collecting as well as

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.