A log shows that a user has copied proprietary data to his computer. The organization wants to

Question:

A log shows that a user has copied proprietary data to his computer. The organization wants to take legal action against him, so it seizes the computer as evidence. What should be established as soon as the computer is seized?

A. Chain of command

B. Forensic chain

C. Permission from the user

D. Chain of custody

E. All of the above

Fantastic news! We've Found the answer you've been seeking!

Step by Step Answer:

Related Book For  book-img-for-question

Managing Risk In Information Systems

ISBN: 9781284193602

3rd Edition

Authors: Darril Gibson, Andy Igonor

Question Posted: