This preview shows pages 1–2. Sign up to view the full content.
This preview has intentionally blurred sections. Sign up to view the full version.View Full Document
Unformatted text preview: Page 1 of 2 Computer Forensic: Siezing the Evidence Click here to Listen to this Article Use this article on your own website: Syndication Guidelines Contributed by Andrew Whitehead Legal Aspects of Computer Forensic Evidence The computer forensic experts have to conform with many rules and regulations if the evidence they uncover is to be acceptable to the courts. The first step in obtaining computer forensic evidence is obtaining a search warrant to seize the suspect system. This warrant must include wording allowing the investigators to seize not only the computer, but also any peripherals thought to be connected with the crime. A suspected counterfeiter, for instance, may have used his computer, a scanner, and a printer to produce his counterfeit documents, in which case all three items would need to be seized to provide evidence. If it is thought that evidence is contained in emails, this also should specifically mentioned in the search warrant. Email is a sensitive area as it can be considered personal, so solid justification is search warrant....
View Full Document
This note was uploaded on 04/06/2011 for the course CS 6963 taught by Professor Walterbruehs during the Spring '10 term at NYU Poly.
- Spring '10