Preview

CCJS321 Project 2

Better Essays
Open Document
Open Document
1909 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
CCJS321 Project 2
Project 2 – Identifying and Collecting Digital Evidence
CCJS 321 Digital Forensics
University of Maryland University College
July 18, 2015

Project 2 – Identifying and Collecting Digital Evidence
1. What permissions/authorities should you have before you search Mr. Yourprop’s former Company work area, and how would you document that authority?
Generally speaking, an employer can search an employee’s desk or work area without expecting any legal repercussions. The desk is property of the employer, therefore the employee should not be entitled to a reasonable expectation of privacy in their work area (Privacy at Work: What Are Your Rights?, 2015). Even though this is generally the case, its best practice, by and large, to have authorities such as this published in the company policy and employee handbook. This gives the employer a stronger leg to stand on, legally speaking, and provides full disclosure to the employees with regards to employee privacy (Searches at Work - Legal Issues to Consider, n.d.).
In this situation specifically, the employer already has a few things in their favor concerning permissions/authorities to search the work area in question. First of all, Mr. Yourprop is a former employee. He no longer works for Makestuff Company, so it’s not even his work area anymore. Also, during his exit interview Mr. Yourprop gave reasonable cause for the Company to search his belongings due to nature of his suspicious statements. When you factor these thoughts combined with Makestuff’s policy on searches, they would be fully prepared to defend themselves if Mr. Yourprop tries to make claims of an invasion of privacy (Searches at Work - Legal Issues to Consider, n.d.).
2. Look at the photo of Mr. Yourprop’s work area provided for Project 2 in the Week 5 Overview area. Identify three (3) potential items of digital evidence you see in the photo. For EACH item of digital evidence you identified, explain what potential use that item would be to your



References: Amazon. (2013). PNY Turbo 64GB USB 3.0 Flash Drive. Retrieved from Amazon: http://www.amazon.com/PNY-Turbo-64GB-Flash-Drive/dp/B00FDUHDAC International Association for Property and Evidence. (2015, March 8). Professional Standards, v.2.5.1. Retrieved from IAPE: http://www.iape.org/Standards_2015.PDFs/Stands%202.5.1%20Approved%20Clean.pdf Microsoft. (2015). What is a BitLocker Drive Encryption Key or PIN? Retrieved from Microsoft: http://windows.microsoft.com/en-us/windows-vista/what-is-a-bitlocker-drive-encryption-startup-key-or-pin Privacy at Work: What Are Your Rights? (2015). Retrieved from FindLaw: http://employment.findlaw.com/workplace-privacy/privacy-at-work-what-are-your-rights.html Searches at Work - Legal Issues to Consider. (n.d.). Retrieved from Texas Workforce Commission: http://www.twc.state.tx.us/news/efte/searches_at_work_legal_issues_to_consider.html Soloman, M. G., Rudolph, K., Tittel, E., Broom, N., & Barrett, D. (2011). Computer Forensics JumpStart, Second Edition. Retrieved from http://common.books24x7.com.ezproxy.umuc.edu/toc.aspx?bookid=41065 U.S. Department of Justice. (2008). Electronic Crime Scene Investigation: A Guide for First Responders, Second Edition. Retrieved from National Criminal Justice Reference Service: https://www.ncjrs.gov/pdffiles1/nij/219941.pdf U.S. Dept of Homeland Security, U.S. Secret Service. (2007). Best Practices for Seizing Electronic Evidence v.3. Retrieved from Foward Edge II: http://www.forwardedge2.com/pdf/bestPractices.pdf

You May Also Find These Documents Helpful

  • Better Essays

    Employers have a right to protect their relationships with their customers and their confidential information, but former employees have a right to earn a living.…

    • 1509 Words
    • 7 Pages
    Better Essays
  • Satisfactory Essays

    Iscs 451 Assignment 6

    • 576 Words
    • 3 Pages

    A checklist should be created off of the operating procedures and brought to each crime scene by the investigator. Every electronic device should be photographed before touching anything. The checklist should be followed step by step and every item needs to be put into an evidence bag and tagged. Then a chain of custody document needs to be created for every piece of evidence. No analysis should be done on the original copy of any device. All analysis should be done on system image copies of each…

    • 576 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Forensics2E Lab02 AW

    • 256 Words
    • 2 Pages

    1. Why is the unallocated space of a Windows system so important to a forensic…

    • 256 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Case Project 5-3 & 5-5

    • 865 Words
    • 4 Pages

    Under the silver platter doctrine, evidence obtained by state agents in an unreasonable search and seizure was admissible in a federal criminal trial, where no federal agent participated in a search and seizure and the state officers did not act solely on behalf of the United States (Hills, 1999). Simply put, federal officers cannot allow state police to do the dirty work, and then claim that they did not violate search and seizure rights. By analogy, no government agent can stand by, allow a private citizen to violate search and seizure strictures on the government 's behalf, and then claim innocence as to the violation (Hills, 1999).…

    • 865 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Cheetum Case Summary

    • 938 Words
    • 4 Pages

    A court is more apt to find an employee has standing to challenge the seizure of personal items or the search of an area where personal items are stored than the search or seizure of work-related documents or materials; this is true for employees who bring personal possession into the workplace as well. U.S. v. Anderson, 154 F.3d 1231. Cheetum choose to bring his credenza from home into the workplace in order to use it for work and personal related…

    • 938 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Lab 1

    • 414 Words
    • 2 Pages

    5. Which item or items within DevManView’s list would you consider to be of critical importance in a computer forensic investigation?…

    • 414 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    2.07 Review

    • 560 Words
    • 2 Pages

    The most difficult part of securing the crime scene would be keeping track of all the evidence and making…

    • 560 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Ohio as well. Clancy (n.d.) says, officers can search large areas that will most likely contain a weapon. Officers should not conduct a detailed search such as turning out pockets. Clancy (n.d.) goes onto say, “Within that framework, the scope of any protective search is based on the circumstances of each case, guided by the principle that the scope of the intrusion must be reasonably related to its…

    • 866 Words
    • 4 Pages
    Better Essays
  • Best Essays

    Beaufort-Moore, D. (2009) Crime Scene Management and Evidence Recovery. Oxford: Oxford University Press. Chapter 2 (p26- 37)…

    • 1293 Words
    • 6 Pages
    Best Essays
  • Better Essays

    Courtroom Workgroup Paper

    • 1190 Words
    • 5 Pages

    References: * Byrd, M. (2001). Crime Scene Evidence: A Guide to the Recovery and Collection of Physical…

    • 1190 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    however there are circumstances when an employer has a legitimate right to monitor, investigate, and review the activities of its employees. The following identifies business practices that may be enacted to ensure the integrity of company products and property, workplace safety, and the monitoring of employee productivity.…

    • 1411 Words
    • 7 Pages
    Powerful Essays
  • Powerful Essays

    References: M/SSgt Hayden B. Baldwin, Retired Illinois State Police." Crime Scene Processing Protocol. Illinois State Police, 22 Jan. 2011. Web. 03 Feb. 2013. http://www.feinc.net/cs-proc.htm…

    • 1328 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    Often the issues regarding privacy rights in the workplace focuses on employee rights to privacy in the workplace . Most advocacies support employee rights and criticize the efforts of companies to…

    • 917 Words
    • 4 Pages
    Good Essays
  • Good Essays

    This policy fell short with the use of a personal email. This finding circulated many rumors about Clinton ranging from conspires theories to leaking of pertinent information. To silence all the allegations Clinton had her legal team turn over anything that looked work related. Work place privacy should be limited to personal devices if allowed any. Anything dealing with company information or practice should be followed by set guidelines of your employer; this would allow for complete work place transparency. You have to look at all the factors specifically when looking at work place privacy. Your employer has virtually unrestricted access to your use of any business owned property (i.e. electronics). However, your belief of privacy in say a closed door meeting will be different from your expectation of privacy on the phone in an office-cubicle layout. There may be ethical/moral limits, but the legal boundaries may be less restrictive than you think. For instance, contrary to belief, the employer normally does not need a warrant to search your locker, it's their…

    • 540 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Big Brother

    • 428 Words
    • 2 Pages

    * If P&G had a right to investigate, is there a limit to the steps it can take? Suppose P&G had searched only the company’s own telephone records or confined its search to the home telephone records of P&G employees. Would the company have kept within permissible limits?…

    • 428 Words
    • 2 Pages
    Good Essays