Kericu’s Violation
Kericu’s Violation
Chain of custody log and verification of evident image
The chain of custody log should contain several steps. Firstly, the name of the evidence recipient should be provided. Secondly, the chain should be followed by the date, time and place where the evidence was received. Again, the name of the custodian, data obtained description and description of data collection procedures. Data description of collected should be provided as part of the procedures used in data collection. The data collection procedure should have information on the outcome, the name of individual through the procedure and the tools used in each procedure.
Smoking guns indicative of law violations
At Kericu, the CEO Rodger Lewis is well known for his computer skills. The Department of justice had recently indicated him as using his skills to evil use by boosting the company’s earnings. Kericu did his evil actions and left a clean track where evidence was had to find (US-Cert, n.d). In order to provide evidence against Lewis, Paluchi, the executive vice president of finance, agree to testify in exchange for his freedom. Other evidence used to testify against Lewis was an email on earning that had been sent to all executives but was no one to ask for assistance.
Federal or statutes laws violated
Security professionals are required to consider their policy decision making within the context of existing laws. The three areas of law related to computer forensics a US constitution, the fourth amendment, and Fifth Amendment (US-Cert, n.d). Fromm the fourth amendment, every person is protected from unreasonable searches and seizures. In this case, Lewis cannot be searched unreasonably as this will result to violation of his rights. Therefore, a search warrant is necessary in order to perform a search without interfering with his life. Through the Fifth Amendment, citizens have protection against self incrimination. Any violation of these laws results to federal felony (US-Cert, n.d).
References
US-Cert, (n.d). Computer forensics. Retrieved from www.us-cert.gov/reading_room/forensics.pdf
Is this your assignment or some part of it?
We can do it for you! Click to Order!