Laws and Resources. Understanding Case Law  Technology is evolving at an exponential pace  Existing laws and statutes can’t keep up change  Case law.

Slides:



Advertisements
Similar presentations
Chapter Nine: Ethical Issues for Criminal Prosecutors
Advertisements

Ethics Ethics are the rules of personal behavior and conduct established by a social group for those existing within the established framework of the social.
ICS 417: The ethics of ICT 4.2 The Ethics of Information and Communication Technologies (ICT) in Business by Simon Rogerson IMIS Journal May 1998.
Congress and Contractor Personal Conflicts of Interest May 21, 2008 Jon Etherton Etherton and Associates, Inc.
Ethical Justice Chapter Six: Ethical Issues for Police Officers & Criminal Investigators.
Computer & Network Forensics
Chapter 10 White-Collar and Organized Crime. Introduction ► White-collar crimes – criminal offenses committed by people in upper socioeconomic strata.
COS 413 DAY 2. Agenda Questions? Assignment 1 due next class Finish Discussion on Preparing for Computing Investigations Begin Discussion on Understanding.
COS/PSA 413 DAY 1. Guide to Computer Forensics and Investigations, 2e2 Agenda Roll Call Introduction WebCT Overview Syllabus Review Introduction to eMarketing.
COS/PSA 413 Day 10. Agenda Lab 4 Write-ups are in –Will have corrected by next class Lab 5 write-ups due Oct 19 Assignment 3 posted (due Oct 21) Capstone.
Computer Forensics Day 1
Guide to Computer Forensics and Investigations Third Edition
Jeopardy The Sexual Harassment Edition. Definitions Rules, Regulations, Guidelines & Law What Next (or What’s Not Next)? Facts About Sexual Harassment.
Business Law Unit 1 Law, Justice, and You
INTERNET and CODE OF CONDUCT
INTRODUCTION TO THE LAW OF EVIDENCE
Guide to Computer Forensics and Investigations Third Edition
Chapter Two Ethical & Legal Issues.
Unit Five Lesson 31 How do the Fourth and Fifth Amendments Protect Against Unreasonable Law Enforcement Procedures.
24 Legal and Ethical Considerations. 24 Legal and Ethical Considerations.
Guide to Computer Forensics and Investigations, Second Edition
Guide to Computer Forensics and Investigations Fourth Edition Chapter 1 Computer Forensics and Investigations as a Profession.
P A R T P A R T Regulation of Business Administrative Agencies The Federal Trade Commission Act and Consumer Protection Laws Antitrust: The Sherman Act.
Ethics and professional Conducts for Civil engineers
SUMMER BRIDGE PROGRAM DR. HWAJUNG LEE DR. ASHLEY PODHRADSKY Computer Forensics.
Electronic Use Policies.   Social Media  Internet.
NATIONAL COMMUNICATIONS COMMISSION REGULATORY PRACTICES WORKSHOP MODULE: 4 INVESTIGATION.
Objective 5.02 Understand ethics and ethical decision-making.
M. ANGELA JIMENEZ 1 UNIT 5. REGULATION OF EXTERNAL AUDIT IFAC AND E.C.
 An orderly analysis, investigation, inquiry, test, inspection, or examination along a “paper trail” in the search for fraud, embezzlement, or hidden.
Chapter 2 Interrogation and Forensic Reporting
Section 12.2 You and the Legal System Back to Table of Contents.
Computer Forensics Principles and Practices
Guide to Computer Forensics and Investigations Fourth Edition Chapter 1 Computer Forensics and Investigations as a Profession.
Lecture 11: Law and Ethics
Medical Law and Ethics, Third Edition Bonnie F. Fremgen Copyright ©2009 by Pearson Education, Inc. Upper Saddle River, New Jersey All rights reserved.
Chapter 2 Legal Aspects of Investigation © 2009 McGraw-Hill Higher Education. All rights reserved. LEARNING OBJECTIVES Explain the historical evolution.
Chapter 43 Administrative Law and Regulatory Agencies
Chapter 1 Computer Forensics and Investigations as a Profession.
1 “Hello, I’m your local HSE officer” by ANDREW SWAN SHORT RICHARDSON & FORTH LLP 26 th June 2015.
 What is the exclusionary rule  Explain stop and frisk  What is the plain view doctrine  What did Miranda v Arizona require police to do  What happens.
Guide to Computer Forensics and Investigations, Second Edition Chapter 1 Computer Forensics and Investigations as a Profession.
© 2011 Delmar, Cengage Learning Part IV Control Processes in Police Management Chapter 14 Accountability.
Understanding Business Ethics 2 nd Edition © 2014 SAGE Publications, Inc. Chapter 13 Evaluating Corporate Ethics Understanding Business Ethics Stanwick.
Principles of LPSCS. Copyright © Texas Education Agency All rights reserved. Images and other multimedia content used with permission. Copyright.
HOSPITALITY & TOURISM 5.02A Interpret the nature of business ethics and social responsibility 5.02B Exemplify legal issues affecting businesses.
31 October The African Policing Civilian Oversight Forum (APCOF) is a network of state and civil society African practitioners active in policing.
 Lawyers spend a lot of time doing research finding facts in books, on computers and in other places.  Lawyers also interview people to get information.
Legal Studies * Mr. Marinello ARRESTS AND WARRANTS.
ONLINE COURSES - SIFS FORENSIC SCIENCE PROGRAMME - 2 Our online course instructors are working professionals handling real-life cases related to various.
Computer Forensics By Chris Brown. Computer Forensics Defined Applying computer science to aid in the legal process Utilization of predefined set of procedures.
Professional Behavior What Supervisors Need to Know.
Criminal Justice Process: The Investigation The criminal justice process includes everything that happens to a person from the moment of arrest, through.
You are accessing a U.S. Government (USG) Information System (IS) that is provided for USG-authorized use only. By using this IS (which includes any device.
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
Law and Ethics INFORMATION SECURITY MANAGEMENT
Criminal Justice Process: The Investigation
VI. CRIMINAL PROCESS FROM ARREST TO CONCLUSION
The 4th Amendment Notes 5-3.
Guide to Computer Forensics and Investigations Fourth Edition
Lesson # 7 A Practical Guide to Computer Forensics Investigations
Computer Forensics 1 1.
Employee Privacy and Privacy of Employee Information
Citizens and the Law Civics Ch. 15.
The 4th Amendment Notes 5-3.
Guide to Computer Forensics and Investigations Fourth Edition
Ethics IN PRIVATE SECURITY
Chapter 43 Administrative Law and Regulatory Agencies
Chapter 23 Government Regulation and Administrative Law
Introduction to Digital Forensics
Presentation transcript:

Laws and Resources

Understanding Case Law  Technology is evolving at an exponential pace  Existing laws and statutes can’t keep up change  Case law used when statutes or regulations don’t exist  Case law allows legal counsel to use previous cases similar to the current one  Because the laws don’t yet exist  Each case is evaluated on its own merit and issues

Developing Computer Forensics Resources  You must know more than one computing platform  Such as DOS, Windows 9x, Linux, Macintosh, and current Windows platforms  Join as many computer user groups as you can  Computer Technology Investigators Network (CTIN)  Meets monthly to discuss problems that law enforcement and corporations face

Developing Computer Forensics Resources (continued)  High Technology Crime Investigation Association (HTCIA)  Exchanges information about techniques related to computer investigations and security  User groups can be helpful  Build a network of computer forensics experts and other professionals  And keep in touch through  Outside experts can provide detailed information you need to retrieve digital evidence

Public and Private Investigations

Preparing for Computer Investigations  Computer investigations and forensics falls into two distinct categories  Public investigations  Private or corporate investigations  Public investigations  Involve government agencies responsible for criminal investigations and prosecution  Organizations must observe legal guidelines  Law of search and seizure  Protects rights of all people, including suspects

Preparing for Computer Investigations (continued)

 Private or corporate investigations  Deal with private companies, non-law-enforcement government agencies, and lawyers  Aren’t governed directly by criminal law or Fourth Amendment issues  Governed by internal policies that define expected employee behavior and conduct in the workplace  Private corporate investigations also involve litigation disputes  Investigations are usually conducted in civil cases

Understanding Law Enforcement Agency Investigations  In a criminal case, a suspect is tried for a criminal offense  Such as burglary, murder, or molestation  Computers and networks are sometimes only tools that can be used to commit crimes  Many states have added specific language to criminal codes to define crimes involving computers, such as theft of computer data  Following the legal process  Legal processes depend on local custom, legislative standards, and rules of evidence

Understanding Law Enforcement Agency Investigations (continued)  Following the legal process (continued)  Criminal case follows three stages  The complaint, the investigation, and the prosecution

Understanding Law Enforcement Agency Investigations (continued)  Following the legal process (continued)  A criminal case begins when someone finds evidence of an illegal act  Complainant makes an allegation, an accusation or supposition of fact  A police officer interviews the complainant and writes a report about the crime  Police blotter provides a record of clues to crimes that have been committed previously  Investigators delegate, collect, and process the information related to the complaint

Police Blotter  Link Ch 1c

Understanding Law Enforcement Agency Investigations (continued)  Following the legal process (continued)  After you build a case, the information is turned over to the prosecutor  Affidavit  Sworn statement of support of facts about or evidence of a crime  Submitted to a judge to request a search warrant  Have the affidavit notarized under sworn oath  Judge must approve and sign a search warrant  Before you can use it to collect evidence

Understanding Law Enforcement Agency Investigations (continued)

C ORPORATE I NVESTIGATIONS

U NDERSTANDING C ORPORATE I NVESTIGATIONS Private or corporate investigations Involve private companies and lawyers who address company policy violations and litigation disputes Corporate computer crimes can involve: harassment Falsification of data Gender and age discrimination Embezzlement Sabotage Industrial espionage

U NDERSTANDING C ORPORATE I NVESTIGATIONS ( CONTINUED ) Establishing company policies One way to avoid litigation is to publish and maintain policies that employees find easy to read and follow Published company policies provide a line of authority For a business to conduct internal investigations Well-defined policies Give computer investigators and forensic examiners the authority to conduct an investigation Displaying Warning Banners Another way to avoid litigation

U NDERSTANDING C ORPORATE I NVESTIGATIONS ( CONTINUED ) Displaying Warning Banners (continued) Warning banner Usually appears when a computer starts or connects to the company intranet, network, or virtual private network Informs end users that the organization reserves the right to inspect computer systems and network traffic at will Establishes the right to conduct an investigation Removes expectation of privacy As a corporate computer investigator Make sure company displays well-defined warning banner

U NDERSTANDING C ORPORATE I NVESTIGATIONS ( CONTINUED )

 Designating an authorized requester  Authorized requester has the power to conduct investigations  Policy should be defined by executive management  Groups that should have direct authority to request computer investigations  Corporate Security Investigations  Corporate Ethics Office  Corporate Equal Employment Opportunity Office  Internal Auditing  The general counsel or Legal Department

U NDERSTANDING C ORPORATE I NVESTIGATIONS ( CONTINUED ) Conducting security investigations Types of situations Abuse or misuse of corporate assets abuse Internet abuse Be sure to distinguish between a company’s abuse problems and potential criminal problems Corporations often follow the silver-platter doctrine evidence turned over to federal officials by state officials would not be suppressed even though it was obtained by means of an illegal search. What happens when a civilian or corporate investigative agent delivers evidence to a law enforcement officer

U NDERSTANDING C ORPORATE I NVESTIGATIONS ( CONTINUED ) Distinguishing personal and company property Many company policies distinguish between personal and company computer property One area that’s difficult to distinguish involves PDAs, cell phones, and personal notebook computers The safe policy is to not allow any personally owned devices to be connected to company-owned resources Limiting the possibility of commingling personal and company data

P ROFESSIONAL C ONDUCT

M AINTAINING P ROFESSIONAL C ONDUCT Professional conduct Determines your credibility Includes ethics, morals, and standards of behavior Maintaining objectivity means you must form and sustain unbiased opinions of your cases Maintain an investigation’s credibility by keeping the case confidential In the corporate environment, confidentiality is critical In rare instances, your corporate case might become a criminal case as serious as murder

M AINTAINING P ROFESSIONAL C ONDUCT ( CONTINUED ) Enhance your professional conduct by continuing your training Record your fact-finding methods in a journal Attend workshops, conferences, and vendor courses Membership in professional organizations adds to your credentials Achieve a high public and private standing and maintain honesty and integrity