Waiting for answer This question has not been answered yet. You can hire a professional tutor to get the answer.

QUESTION

Hello, I am looking for someone to write an essay on Forensics Project 2. It needs to be at least 750 words.Download file to see previous pages... It can be stated that the aforesaid tactics would gen

Hello, I am looking for someone to write an essay on Forensics Project 2. It needs to be at least 750 words.

Download file to see previous pages...

It can be stated that the aforesaid tactics would generally provide broader explanation to various legal aspects relating to the preservation of a computer and its data. Key Steps to Ensuring Legal Success in a Courtroom in a Forensics Case In order to determine the key steps ensuring legal success in a courtroom in a forensics case, it can be affirmed from a broader outlook that forensic readiness is often represented as the capability of an organization to increase its prospective to use modern digital evidences and at the same time, reducing the costs of an investigation by a certain degree. In this similar concern, the key steps towards ensuring legal success in a courtroom in a forensics case have been outlined below. Describing the business circumstances that need digital evidence Identifying current sources &amp. different kind of potential evidence Determining the evidence based collection obligation Establishing a strategy for secure storage plan &amp. handling of possible evidence Identifying the circumstances when a full formal investigation need to be initiated Documenting an evidence-related case explaining the incident and its manifold impact Ensuring legal appraisal to take necessary actions in response to the happening of any incident (Rowlingson, 2004). Conditions That Require Inclusion of Law Enforcement With regard to conclude the conditions that require inclusion of law enforcement, it can be affirmed that computer crime may be conducted through the violation of the policies associated with information technology relating to the preservation of a computer and its data. Generally, there pertain numerous conditions of crime related to the information technology that lays the requirement of the inclusion of law enforcement agencies. In this regard, according to Section 13 of the Cybercrime Prevention Act 2012, law can be enforced against any individual linked with preservation of computer data. The truthfulness of traffic data &amp. subscriber information relating to communication services shall be preserved for a minimum of six months. Moreover, content information shall likewise be preserved for a period of six months from the date of the order received from law enforcement authorities obliging its preservation. It can be stated that law enforcement system may provide extensions for the conduct of the aforesaid activities. It has been apparently observed that one of the conditions that require inclusion of law enforcement is that once computer data is preserved, conveyed or stored by a service provider, the data would be accessible only to authorized users It is the service provider who requires to preserve digital data as well as to keep those confidential and most significantly maintain their compliance by a certain degree. It is to be affirmed that if any computer operator violates or not comply with the order provided by the service provider, then the respective task will be regarded as a crime as and the operator will be punished under section 13 of the Cybercrime Prevention Act 2012 (The Office of the President of the Philippines, 2012). Possible Actions to Protect the Employer In accordance with the mentioned case, one of the possible actions could be the introduction of various data prevention plan which might protect the employer by a certain degree.

Show more
LEARN MORE EFFECTIVELY AND GET BETTER GRADES!
Ask a Question