Digital Evidence Collection and Use. CS 585 Fall 2009
|
|
|
- Anthony Howard
- 10 years ago
- Views:
Transcription
1 Digital Evidence Collection and Use CS 585 Fall 2009
2 Outline I. II. III. IV. Disclaimers Crime Scene Processing Legal considerations in Processing Digital Evidence A Question for Discussion
3 Disclaimers IANAL! This lesson is based on several publications from the National Institute of Justice (NIJ): [1] Electronic Crime Scene Investigation: A Guide for First Responders, Second Edition (April 2008, NCJ ) [2] Forensic Examination of Digital Evidence: A Guide for Law Enforcement (April 2004, NCJ ) [3] Digital Evidence in the Courtroom: A Guide for Law Enforcement and Prosecutors (January 2007, NCJ ) All available from This presentation does not make you an expert!
4 Disclaimers Law Enforcement perspective Federal focus State and local laws may vary Federal laws do not override local laws, except regarding actions by federal law enforcement personnel
5 Why This is Important Evidence is collected to be used at trial To be useful in court, it must be Admissible Collected legally, not hearsay Credible Authentic, reliable, not subject to challenges Persuasive Helps the prosecution s (or plaintiff s, or defendant s) case
6 II. Crime Scene Processing
7 First Responders Principles: I. The process of collecting, securing and transporting digital evidence should not change the evidence. II. III. Digital evidence is fragile; special care must be taken to preserve it. Digital evidence should be examined only by those trained specifically for that function. Trust is established by following techniques recognized by the courts as trustworthy. Everything done during the seizure, transportation, and storage of digital evidence should be fully documented, preserved, and available for review. Any gaps will lead to challenges and potential loss of credibility.
8 The First Step First responders need to either Be trained themselves, or Have access to someone with training in dealing with digital evidence First responders without the propoer training and skills should not attempt to explore the contents of or recover information from a computer or other electronic device other than to record what is visible on the display screen. Do not press any keys or click the mouse. NCJ
9 1. Evaluating the Crime Scene Primary considerations: Safety of Officers and everyone at the crime scene. Compliance with federal, state, and local laws. Visually identify all potential evidence and ensure its integrity is preserved.
10 2. Securing the Scene Follow department policy. Note: department should have a written policy! Immediately secure all electronic devices, including personal and portable devices. Ensure that no unauthorized person has access to any electronic devices at the scene. Refuse offers of help or technical assistance from any unauthorized persons. Remove all persons from the crime scene or the immediate area from which evidence is collected. Ensure that the condition of any electronic device is not altered (including on/off state!).
11 3. Checking state of Computers Is it on? Look, listen to find out If on, look for indications of what it s doing Running format or rm r... Look for in-progress communications, e.g. chat room windows
12 4. Interviewing Those Present Valuable source of initial information! Get as much information as possible: Names of users of computers/devices Internet user information including service provider, account names, screen names,... Purposes of computers and devices; who uses them Passwords if known Any offsite storage Documentation (e.g., manuals) for devices and installed software
13 5. Documenting the Scene Goal: create a record to be used in the investigation Record everything at the scene: Devices and their locations and states (power status, ongoing communications, running programs, etc.) Serial numbers of equipment Connections between devices Photograph or video-record the scene if possible Do all this before touching anything!
14 5. Documenting the Scene Other devices that may contain evidence: Audio recorders/players (ipod) GPS accessories Answering machines Computer chips Thumb drives Pagers Copy machines; multifunction machines Printers Telephone Caller ID units Fax machines
15 6. Collecting the Evidence (Generic Algorithm) 1. Secure the scene and get everyone away from devices. 2. If computer is OFF, goto 7 (do NOT turn it on!). 3. If trained personnel are available, get them and goto If the system is networked, STOP and get help from trained personnel. 5. If destructive processes are running, goto If evidence is visible on the screen, thoroughly document and photograph ALL of it. 7. Remove the power cord from the back of the computer. Put tape over the power switch. 8. Label all connections on computers and devices, as well as cables and power supplies.
16 6. Collecting the Evidence (Generic Algorithm) 9. Locate and secure all evidence within the scope of authority for the specific circumstances (if you ve come this far, you d better have a warrant!) 10. Document, log, and photograph all computers, devices, connections, cables, and power supplies. 11. Log and secure all evidence for forensic examination according to agency policies. Laptop modification: Remove battery as well as power supply cord.
17 7. Transporting and Storing Evidence Chain of custody: Be able to prove that evidence was secure and under the control of some particular party at all times. Take steps to ensure that evidence is not damaged in transit or storage. Example: if stored for a long time, batteries may die, causing loss of information in CMOS memory (e.g., BIOS configuration) Example: transport digital evidence in static-free containers: paper or special foil NOT plastic bags Nota Bene: Digital evidence has two parts the physical medium and the information (bits) itself Chain of custody must be maintained for both parts
18 7. Transporting and Storing Evidence At the evidence room or lab: inventory and store appropriately Storage: climate-controlled location not subject to temperature or humidity extremes Protect from exposure to magnetic fields, moisture, dust, vibration, etc. Defense Attorney: Isn t it true, officer, that you transported that hard drive on the seat of your Saab, with the seat warmer turned on?
19 Discussion List the things that first responders did wrong in the Ryan case.
20 III. Legal Considerations
21 Wiretap Act (18 USC 2510 et seq) Focuses on interception of content of communications in transit ( on the wire ) Telephone wiretaps Network sniffers Bugging a room to pick up conversations Prohibits anyone (in the US) who is not a participating party to a private communication from intercepting the communication among the participants using an electronic, mechanical or other device unless one of several statutory exemptions applies.
22 Wiretap Act Exception: court order authorizing interception issued by a court of competent jurisdiction. It is nontrivial to obtain such a court order. Violation can lead to criminal and civil liability. Violation by government officials may result in suppression of evidence obtained. Some states have versions of Wiretap Act that are more restrictive than the Federal version; state and local LE must comply with those acts even if Federal act does not apply.
23 Pen Register and Trap and Trace Statute (18 USC 3121 et seq) The Pen/Trap Statute Governs collection of dialing, routing, addressing and signaling information relating to communications. Telephony: numbers called and calling Internet: IP address and port information Forbids nonconsensual real-time acquisition of noncontent information by any person about a wire or electronic communication unless a statutory exception applies. Where no exception applies, LE must obtain a Pen/Trap order from the court before acquiring such information Again, some states have versions that are more restrictive.
24 ECPA (Stored Communications Provisions) Electronic Communications Privacy Act, stored communications chapter (18 USC 2701 et seq) Provides privacy protections to subscribers to certain communications services providers. Applies when LE seeks to obtain records (billing, dates of service, etc.) about a customer or subscriber from a communications service provider (cell phone, Internet) Says what information requires what kind of authorization for LE to obtain
25 ECPA (Stored Communications Provisions) Subpoena Identity info: name, address, phone numbers outgoing/ incoming, phone number, period of service, means of payment, DHCP address assigned Stored communications ( ) that a customer has retrieved but left on a private provider s server Note well: distinction between private and public provider (employer vs. ISP) Court Order Log of IP addresses communicated with Addresses of those with whom was exchanged Buddy lists Stored communications retrieved from public provider or unretrieved but older than 180 days
26 ECPA (Stored Communications Provisions) Search Warrant Unretrieved communications stored on a provider s server, whether public or private.
27 Privacy Protection Act (42 USC 2000aa et seq) Restricts what LE can seize under a search warrant Applies to materials possessed for the purpose of public dissemination Work products (e.g., a newsletter or pamphlet) Documentary materials (supporting information for work products)
28 Privacy Protection Act (42 USC 2000aa et seq) Does not apply when: Material is contraband (child pornography, e.g.) There is reason to believe seizure is necessary to prevent death or serious injury Material is believed to be related to commission of a crime Remedy: civil damages Note: violation of PPA does not lead to suppression
29 Fourth Amendment to the US Constitution In general: LE must obtain a warrant for any search of a location where a reasonable expectation of privacy applies Computer as closed container by some courts Warrantless search possible under the following exceptions: Consent Exigent Circumstances Search incident to arrest Inventory search (untested in courts) Plain view doctrine
30 Fourth Amendment Exceptions Consent may come from several sources Login banners Terms-of-use agreements Company policy Private-sector employer may consent to search of an employee s workplace computer Consent may be limited as to subject matter, duration, etc. Can be withdrawn at any time.
31 Fourth Amendment Exceptions Plain View Doctrine May apply to computers in some instances LE must legitimately be in position to observe evidence Incriminating nature must be immediately apparent cf. BALCO case!
32 Obtaining a Warrant Two requirements: Reasonable suspicion of a crime Description of the particular items sought These apply to electronic evidence as well Again, see the 9 th circuit decision in BALCO case
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
Massachusetts Digital Evidence Consortium. Digital Evidence Guide for First Responders
Massachusetts Digital Evidence Consortium Digital Evidence Guide for First Responders May 2015 Digital Evidence Guide for First Responders - MDEC A Note to the Reader There are an unlimited number of legal
Computer Forensics US-CERT
Computer Forensics US-CERT Overview This paper will discuss the need for computer forensics to be practiced in an effective and legal way, outline basic technical issues, and point to references for further
Digital Forensics for Attorneys Overview of Digital Forensics
Lars Daniel,, EnCE, ACE, CTNS Digital Forensic Examiner Digital Forensics for Attorneys Overview of Digital Forensics Digital Forensics For Attorneys Overview of Digital Forensics Types of Digital Evidence
Committee on Civil Liberties, Justice and Home Affairs - The Secretariat - Background Note on
Committee on Civil Liberties, Justice and Home Affairs - The Secretariat - Background Note on US Legal Instruments for Access and Electronic Surveillance of EU Citizens Introduction This note presents
Digital Evidence in the Courtroom: A Guide for Law Enforcement and Prosecutors
JAN. 07 U.S. Department of Justice Office of Justice Programs National Institute of Justice Special REPORT Digital Evidence in the Courtroom: A Guide for Law Enforcement and Prosecutors www.ojp.usdoj.gov/nij
Introduction to Network Security Comptia Security+ Exam. Computer Forensics. Evidence. Domain 5 Computer Forensics
Introduction to Network Security Comptia Security+ Exam Domain 5 Computer Forensics Computer Forensics Forensics relates to the application of scientific knowledge and method to legal problems Investigating
CYBERCRIMES CERTIFICATIONS COURSE
CYBERCRIMES CERTIFICATIONS COURSE TCLEOSE Course #3210 Sponsored by The Harris County Constables Office, Pct 4, 6831 Cypresswood Drive, Spring Texas 77379 WARNING This presentation is being given a rating
Best Practices for Incident Responders Collecting Electronic Evidence
Best Practices for Incident Responders Collecting Electronic Evidence rev. April 2013 Prepared by: Rick Clyde Forensic Examiner [email protected] M: (402) 709-6064 Chris Hoke Principal and Owner
1 of 3 3/29/2010 6:55 AM
Cox Communications - Cable, High Speed Internet and Telephone... http://www.cox.com/policy/leainformation/ 1 of 3 3/29/2010 6:55 AM Sign In Register Cox Centers Cart Order Now Select Location Search Cox
12.809 COURT ORDERS FOR TELEPHONE RECORDS
12.809 COURT ORDERS FOR TELEPHONE RECORDS References: United States Code (USC) 18USC2510-18USC2522, et al - Federal Wiretap Statutes 18USC2703 - Release of Subscriber Information to Law Enforcement under
Department of Justice Policy Guidance: Use of Cell-Site Simulator Technology
Department of Justice Policy Guidance: Use of Cell-Site Simulator Technology Cell-site simulator technology provides valuable assistance in support of important public safety objectives. Whether deployed
IAPE STANDARDS SECTION 16 DIGITAL EVIDENCE
IAPE STANDARDS SECTION 16 DIGITAL EVIDENCE IAPE STANDARD SECTION 16.1 DIGITAL EVIDENCE Standard: Digital evidence is a critical element of modern criminal investigation that should be maintained in strict
DEPARTMENT OF JUSTICE WHITE PAPER. Sharing Cyberthreat Information Under 18 USC 2702(a)(3)
DEPARTMENT OF JUSTICE WHITE PAPER Sharing Cyberthreat Information Under 18 USC 2702(a)(3) Background Improved information sharing is a critical component of bolstering public and private network owners
V 11.01.14. Seven areas are covered by this Notice:
Mediatti Broadband Communications, your local cable operator ( MBC ) is providing this Subscriber Privacy Notice ( Notice ) to inform you of its practices regarding personally identifiable information
Secretary of the Senate. Chief Clerk of the Assembly. Private Secretary of the Governor
Senate Bill No. 467 Passed the Senate September 10, 2013 Secretary of the Senate Passed the Assembly September 9, 2013 Chief Clerk of the Assembly This bill was received by the Governor this day of, 2013,
Southern Law Center Law Center Policy #IT0014. Title: Privacy Expectations for SULC Computing Resources
Southern Law Center Law Center Policy #IT0014 Title: Privacy Expectations for SULC Computing Resources Authority: Department Original Adoption: 5/7/2007 Effective Date: 5/7/2007 Last Revision: 9/17/2012
CHAPTER 18 CYBER CRIMES
CHAPTER 18 CYBER CRIMES 18.1 With increased use of computers in homes and offices, there has been a proliferation of computer-related crimes. These crimes include: Crimes committed by using computers as
Digital Forensics. Larry Daniel
Digital Forensics Larry Daniel Introduction A recent research report from The Yankee Group found that 67.6 percent of US households in 2002 contained at least one PC The investigators foresee three-quarters
SUBSCRIBER PRIVACY NOTICE
PRIVACY AND SECURITY NewWave will provide you with a copy of its privacy notice at the time Service is installed, and annually afterwards, or as otherwise permitted by law. Customer can view the most current
IN THE UNITED STATES DISTRICT COURT FOR THE WESTERN DISTRICT OF MISSOURI ST. JOSEPH DIVISION. v. Case No :09-00157-01,03,05/08-CR-W-SOW
IN THE UNITED STATES DISTRICT COURT FOR THE WESTERN DISTRICT OF MISSOURI ST. JOSEPH DIVISION UNITED STATES OF AMERICA, Plaintiff, v. Case No :09-00157-01,03,05/08-CR-W-SOW GARLAND HANKINS, STACEY M. WALKER,
October 19, 2015 POLICY DIRECTIVE 047-02. Assistant Secretary U.S. Immigration and Customs Enforcement
October 19, 2015 Deputy Secretary U.S. Department of Homeland Security Washington, DC 20528 Homeland Security POLICY DIRECTIVE 047-02 MEMORANDUM FOR: Sarah Saldana Assistant Secretary U.S. Immigration
Electronic Crime Scene Investigation: A Guide for First Responders, Second Edition
APR. 08 Electronic Crime Scene Investigation: A Guide for First Responders, Second Edition Cover photographs copyright 2001 PhotoDisc, Inc. NCJ 219941 Chapter 1. Electronic Devices: Types, Description,
CYBERCRIME LAWS OF THE UNITED STATES
CYBERCRIME LAWS OF THE UNITED STATES United States Code, Title 18, Chapter 121 STORED WIRE AND ELECTRONIC COMMUNICATIONS AND TRANSACTIONAL RECORDS ACCESS 2701. Unlawful access to stored communications
Immigration and Customs Enforcement Forensic Analysis of Electronic Media
for the Immigration and Customs Enforcement Forensic Analysis of Electronic Media DHS/ICE/PIA-042 May 11, 2015 Contact Point Peter T. Edge Executive Assistant Director Homeland Security Investigations
CHAPTER 124B COMPUTER MISUSE
1 L.R.O. 2005 Computer Misuse CAP. 124B CHAPTER 124B COMPUTER MISUSE ARRANGEMENT OF SECTIONS SECTION PART I PRELIMINARY 1. Short title. 2. Application. 3. Interpretation. PART II PROHIBITED CONDUCT 4.
Special REPORT APR. 08. Electronic Crime Scene Investigation: A Guide for First Responders, Second Edition. www.ojp.usdoj.gov/nij
APR. 08 U.S. Department of Justice Office of Justice Programs National Institute of Justice Special REPORT Electronic Crime Scene Investigation: A Guide for First Responders, Second Edition www.ojp.usdoj.gov/nij
HB659 151295-1. By Representative Hall. RFD: Judiciary. First Read: 23-APR-13. Page 0
HB -1 By Representative Hall RFD: Judiciary First Read: -APR-1 Page 0 -1:n:0/0/01:JET/mfc LRS01-1 1 1 1 1 1 1 1 1 0 1 SYNOPSIS: Under existing law, a court or magistrate may issue a warrant for the search
Best Practices for Computer Forensics
Scientific Working Group on Digital Evidence Best Practices for Computer Forensics Disclaimer: As a condition to the use of this document and the information contained therein, the SWGDE requests notification
Crimes (Computer Hacking)
2009-44 CRIMES (COMPUTER HACKING) ACT 2009 by Act 2011-23 as from 23.11.2012 Principal Act Act. No. 2009-44 Commencement except ss. 15-24 14.1.2010 (LN. 2010/003) Assent 3.12.2009 Amending enactments Relevant
About Your Presenter. Digital Forensics For Attorneys. Overview of Digital Forensics
Larry E. Daniel, EnCE, DFCP, BCE Digital Forensic Examiner Digital Forensics for Attorneys An Overview of Digital Forensics About Your Presenter EnCase Certified Examiner (EnCE) Digital Forensics Certified
Snapchat Law Enforcement Guide
Snapchat Law Enforcement Guide Last Updated: June 1, 2015 Download the most recent version at: https://www.snapchat.com/lawenforcement Mailing Address: Custodian of Records Snapchat, Inc. 63 Market Street
Chain of evidence refers to the continuity of custody of material and items collected as evidence.
University of Wisconsin Madison Police Policy: 83.2 SUBJECT: EVIDENCE PROCESSING EFFECTIVE DATE: 06/01/10 REVISED DATE: 12/31/11, 11/01/13 REVIEWED DATE: 01/07/15 INDEX: 83.2.1 COLLECTING, PROCESSING,
Scientific Working Group on Digital Evidence
Disclaimer: As a condition to the use of this document and the information contained therein, the SWGDE requests notification by e-mail before or contemporaneous to the introduction of this document, or
Legislative Language
Legislative Language SECTION 1. DEPARTMENT OF HOMELAND SECURITY CYBERSECURITY AUTHORITY. Title II of the Homeland Security Act of 2002 (6 U.S.C. 121 et seq.) is amended (a) in section 201(c) by striking
MISSISSIPPI DEPARTMENT OF HEALTH COMPUTER NETWORK AND INTERNET ACCESS POLICY
MEMORANDUM TO: FROM: RE: Employee Human Resources MISSISSIPPI DEPARTMENT OF HEALTH COMPUTER NETWORK AND INTERNET ACCESS POLICY Please find attached the above referenced policy that is being issued to each
Location and Cell Phone Tracking: Technology, Law, and Defense Strategy
Location and Cell Phone Tracking: Technology, Law, and Defense Strategy Part 1: Location Tracking Technology Cell Site Data Fine location data: GPS / Triangulation GPS Trackers (Homing devices, e.g. Jones)
MASSACHUSETTS WARRANTLESS CELL PHONE SEARCHES CASE HEADS TO THE SUPREME COURT
MASSACHUSETTS WARRANTLESS CELL PHONE SEARCHES CASE HEADS TO THE SUPREME COURT The Fourth Amendment Guarantees a Right to Privacy and Protects Against Unreasonable Searches and Seizures; If Your Fourth
COMPUTER MISUSE AND CYBERCRIME ACT
COMPUTER MISUSE AND CYBERCRIME ACT Act 22 of 2003 9 August 2003 ARRANGEMENT OF SECTIONS 1. Short title 2. Interpretation PART I PRELIMINARY PART II OFFENCES 3. Unauthorised access to computer data 4. Access
Information Security Program Management Standard
State of California California Information Security Office Information Security Program Management Standard SIMM 5305-A September 2013 REVISION HISTORY REVISION DATE OF RELEASE OWNER SUMMARY OF CHANGES
HOUSE BILL REPORT ESHB 1440
HOUSE BILL REPORT As Passed Legislature Title: An act relating to prohibiting the use of a cell site simulator device without a warrant. Brief Description: Prohibiting the use of a cell site simulator
Title 5: ADMINISTRATIVE PROCEDURES AND SERVICES
Title 5: ADMINISTRATIVE PROCEDURES AND SERVICES Chapter 337-A: PROTECTION FROM HARASSMENT Table of Contents Part 12. HUMAN RIGHTS... Section 4651. DEFINITIONS... 3 Section 4652. FILING OF COMPLAINT; JURISDICTION...
Legal Framework to Combat Cyber Crimes in the Region: Qatar as a Model. Judge Dr. Ehab Elsonbaty Cyber Crime expert ehabelsonbaty@hotmail.
Legal Framework to Combat Cyber Crimes in the Region: Qatar as a Model Judge Dr. Ehab Elsonbaty Cyber Crime expert [email protected] Why should we care about CYBER CRIME & CYBER SECURITY? Clarification
Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 13 Business Continuity
Security+ Guide to Network Security Fundamentals, Fourth Edition Chapter 13 Business Continuity Objectives Define environmental controls Describe the components of redundancy planning List disaster recovery
MCOLES Information and Tracking Network. Security Policy. Version 2.0
MCOLES Information and Tracking Network Security Policy Version 2.0 Adopted: September 11, 2003 Effective: September 11, 2003 Amended: September 12, 2007 1.0 POLICY STATEMENT The Michigan Commission on
Electronic Communications Privacy Protection Act. SECTION 1. {Title} This Act may be cited as the Electronic Communications Privacy Protection Act.
Summary: The proliferation of electronic communications presents new challenges for state laws protecting personal information from unauthorized search. This model act aims to provide some clarity for
PENNSYLVANIA IDENTITY THEFT RANKING BY STATE: Rank 14, 72.5 Complaints Per 100,000 Population, 9016 Complaints (2007) Updated January 29, 2009
PENNSYLVANIA IDENTITY THEFT RANKING BY STATE: Rank 14, 72.5 Complaints Per 100,000 Population, 9016 Complaints (2007) Updated January 29, 2009 Current Laws: A person commits the offense of identity theft
Department, Board, Or Commission Author Bill Number
BILL ANALYSIS Department, Board, Or Commission Author Bill Number Franchise Tax Board Leno SB 467 SUBJECT Privacy/Electronic Communication/Warrants SUMMARY The bill would require the department to obtain
Large Scale Cloud Forensics
Large Scale Cloud Forensics Edward L. Haletky AstroArch Consulting, Inc. Sam Curry RSA, The Security Division of EMC Session ID: STAR-302 Session Classification: Advanced Happenstance Lo and Behold Sam
JAN 2 2 2016. (a) The obstruction, impairment, or hindrance of the. (b) The obstruction, impairment, or hindrance of any
~ (c) S.B. NO. \ JAN 0 A BILL FOR AN ACT THE SENATE TWENTY-EIGHTH LEGISLATURE, 0 STATE OF HAWAII RELATING TO LAW ENFORCEMENT. BE IT ENACTED BY THE LEGISLATURE OF THE STATE OF HAWAII: ' SECTION. Section
Computer Forensics and Digital Evidence
Computer Forensics and Digital Evidence James Phelps, Ph.D. Angelo State University [email protected] 325-942-2167 Pre-Test So we can evaluate how well we do. The Chinese utilize a large, well-organized
Overview of Computer Forensics
Overview of Computer Forensics Don Mason, Associate Director National Center for Justice and the Rule of Law University of Mississippi School of Law [These materials are based on 4.3.1-4.3.3 in the National
ORDER GRANTING DEFENDANT'S MOTION TO SUPPRESS EVIDENCE
STATE OF FLORIDA, Plaintiff, v. RICARDO H. GLASCO, Defendant. Circuit Court, 18th Judicial Circuit in and for Brevard County. Case No. 05-2010-CF-021349-AXXX-XX. February 24, 2011. John M. Harris, Judge.
UNITED STATES DISTRICT COURT SOUTHERN DISTRICT OF TEXAS HOUSTON DIVISION
UNITED STATES DISTRICT COURT SOUTHERN DISTRICT OF TEXAS HOUSTON DIVISION IN THE MATTER OF APPLICATION FOR CELL TOWER RECORDS MAGISTRATE NO. H-15-136M UNDER 18 U.S.C. 2703(D) OPINION On February 10, 2015
HOUSE ENROLLED ACT No. 1009
Second Regular Session 118th General Assembly (2014) PRINTING CODE. Amendments: Whenever an existing statute (or a section of the Indiana Constitution) is being amended, the text of the existing provision
2016 -- H 7542 S T A T E O F R H O D E I S L A N D
LC00 01 -- H S T A T E O F R H O D E I S L A N D IN GENERAL ASSEMBLY JANUARY SESSION, A.D. 01 A N A C T RELATING TO PUBLIC UTILITIES AND CARRIERS - DUTIES OF UTILITIES AND CARRIERS Introduced By: Representatives
Troy Cablevision, Inc. Subscriber Privacy Policy
Troy Cablevision, Inc. Subscriber Privacy Policy Troy Cablevision, Inc. ( Troy Cable ) is committed to protecting and securely maintaining our customers privacy. The following privacy policy applies to
National Cyber Security Month 2015: Daily Security Awareness Tips
National Cyber Security Month 2015: Daily Security Awareness Tips October 1 New Threats Are Constantly Being Developed. Protect Your Home Computer and Personal Devices by Automatically Installing OS Updates.
plantemoran.com What School Personnel Administrators Need to know
plantemoran.com Data Security and Privacy What School Personnel Administrators Need to know Tomorrow s Headline Let s hope not District posts confidential data online (Tech News, May 18, 2007) In one of
C R I M E S C E N E. Forensic Science CC 30.07 Spring 2007 Prof. Nehru
C R I M E S C E N E Physical Evidence Crime laboratories run on physical evidence Physical evidence encompasses any and all objects that can establish that a crime has been committed or can provide a link
Packerland Broadband Subscriber Privacy Notice
Packerland Broadband Subscriber Privacy Notice What This Privacy Notice Covers This Notice describes our practices with respect to your "personally identifiable information" and certain other information.
Spoliation of Evidence. Prepared for:
Spoliation of Evidence Prepared for: Spoliation Nationwide anti-spoliation trend Cases can be thrown out of court Insurers can be denied subrogation claims An insured who destroys evidence of a claim can
What is Digital Forensics?
DEVELOPING AN UNDERGRADUATE COURSE IN DIGITAL FORENSICS Warren Harrison PSU Center for Information Assurance Portland State University Portland, Oregon 97207 [email protected] What is Digital Forensics?
IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF MARYLAND
IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF MARYLAND IN RE APPLICATION OF THE : UNITED STATES OF AMERICA FOR AN ORDER PURSUANT TO : Misc. No. 01-189 (Magistrate Judge Bredar) 18 U.S.C. 2703(d)
FINAL May 2005. Guideline on Security Systems for Safeguarding Customer Information
FINAL May 2005 Guideline on Security Systems for Safeguarding Customer Information Table of Contents 1 Introduction 1 1.1 Purpose of Guideline 1 2 Definitions 2 3 Internal Controls and Procedures 2 3.1
Online Research and Investigation
Online Research and Investigation This document is intended to provide guidance to police officers or staff engaged in research and investigation across the internet. This guidance is not a source of law
STATE OF TENNESSEE OFFICE OF THE ATTORNEY GENERAL. February 24, 2014. Opinion No. 14-21 QUESTIONS
STATE OF TENNESSEE OFFICE OF THE ATTORNEY GENERAL Searches and Arrests on School Property February 24, 2014 Opinion No. 14-21 QUESTIONS 1. Do public school students have any expectation of privacy in their
A Victim s Guide to Understanding the Criminal Justice System
A Victim s Guide to Understanding the Criminal Justice System The Bartholomew County Prosecutor s Office Victim Assistance Program Prosecutor: William Nash 234 Washington Street Columbus, IN 47201 Telephone:
Privacy is the ability of an individual or group to keep their lives and
Privacy Versus Security in the Workplace ALAN L. PEPPER AND BETHANIE F. THAU An important challenge facing employers today is balancing the security of the workplace versus the privacy rights of employees.
2.82.010 Government records findings--recognition of public policy.
Chapter 2.82 RECORDS MANAGEMENT 2.82.010 Government records findings--recognition of public policy. The council of Salt Lake County finds the following: A. It is in the best interests of Salt Lake County
HIPAA Training for Hospice Staff and Volunteers
HIPAA Training for Hospice Staff and Volunteers Hospice Education Network Objectives Explain the purpose of the HIPAA privacy and security regulations Name three patient privacy rights Discuss what you
Examples of CrimeS. Rationales for Criminal Punishments Deterrence Retribution Restraint Rehabilitation. Chapter 7 Crime
Chapter 7 Crime 1 Examples of CrimeS Rape Murder Robbery Drug dealing Medicare fraud Money laundering Embezzlement Wire fraud 2 Rationales for Criminal Punishments Deterrence Retribution Restraint Rehabilitation
Chapter 2.82 - RECORDS MANAGEMENT Sections:
Chapter 82 - RECORDS MANAGEMENT Sections: 8010 - Government records findings Recognition of public policy. The council of Salt Lake County finds the following: A. It is in the best interests of Salt Lake
Network Security Policy: Best Practices White Paper
Security Policy: Best Practices White Paper Document ID: 13601 Introduction Preparation Create Usage Policy Statements Conduct a Risk Analysis Establish a Security Team Structure Prevention Approving Security
United States vs. McNeely: Analysis and Implications for DWI Enforcement in Minnesota 1
United States vs. McNeely: Analysis and Implications for DWI Enforcement in Minnesota 1 By Peter Ivy and Peter Orput, MCPA Co-Counsel 2 1) McNeely Background and Supreme Court Holding On April 17, 2013,
STRIP SEARCH. Attorney General's Strip Search and Body Cavity Search Requirements and Procedures for Police Officers
STRIP SEARCH Attorney General's Strip Search and Body Cavity Search Requirements and Procedures for Police Officers Issued February 1993 Revised June 1995 TO: ALL COUNTY PROSECUTORS DATE: February 3, 1993
Information Technology Audit & Forensic Techniques. CMA Amit Kumar
Information Technology Audit & Forensic Techniques CMA Amit Kumar 1 Amit Kumar & Co. (Cost Accountants) A perfect blend of Tax, Audit & Advisory services Information Technology Audit & Forensic Techniques
Management of Crime Scenes
Management of Crime Scenes When the Call comes Document date, time, information received, and your actions and responses Prepare yourself Be calm Be safe Think Upon Arrival Duty to render aid Duty to protect
A MURDER SCENE EXCEPTION TO THE 4TH AMENDMENT WARRANT REQUIREMENT?
A MURDER SCENE EXCEPTION TO THE 4TH AMENDMENT WARRANT REQUIREMENT? Bryan R. Lemons Senior Legal Instructor It is firmly ingrained in our system of law that searches conducted outside the judicial process,
