Question

Take the following scenario and map out the chain of custody. Scenario: A co-worker is suspected...

Take the following scenario and map out the chain of custody.

Scenario: A co-worker is suspected of surfing the Internet on their work machine and downloading pornographic material and printing some of it on the department printer during the evening hours when most people have gone home. You are responsible to collect data to support the worker's dismissal. Describe the data you need to obtain, the methods you would use to get it, and the chain of custody of the data once collected. Don't just list the steps the book give you for the chain of custody, explain in detail where/how/who will hold the evidence at which step and why it is important to follow each step. What could happen to the data at each step if the chain of custody is not followed?

0 0
Add a comment Improve this question Transcribed image text
Answer #1

Answer:-

Contemporary technology permits managers to monitor every step of an employee's online footprint. 66% of companies take benefit of this classy technology and select to monitor the Internet actions of their employees. Employers who chose to monitor in this way might discover that their employees are committing crimes or viewing pornography online. In such cases, employers can discipline or terminate the offender quickly and increase their chances of fending off vicarious liability.

A piece of "Computer hardware or software that avoids illegal access to private data (as on a company's local area network or intranet) by outsider computer users (as of the internet)” it can also be '’programmed to analyse the network traffic curving between computer and the Internet”; It then compares the information it monitors with a set of rules in its database,” and if sees something not allowed the firewall can block and prevent the action.” Further, [most] "firewall programs let us adjust the rules to allow certain types of data to flow freely back and forth without interface.

Filters are similar and, therefore, will be incorporated in the firewall Label for the remainder of this section

Add a comment
Know the answer?
Add Answer to:
Take the following scenario and map out the chain of custody. Scenario: A co-worker is suspected...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT