Question: A log shows that a user has copied proprietary data to his computer. The organization wants to take legal action against him, so it seizes
A log shows that a user has copied proprietary data to his computer. The organization wants to take legal action against him, so it seizes the computer as evidence. What should be established as soon as the computer is seized?
A. Chain of command
B. Forensic chain
C. Permission from the user
D. Chain of custody
E. All of the above
Step by Step Solution
★★★★★
3.28 Rating (154 Votes )
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
D Chain of custody When seizing a computer as evidence it is crucial to establish ... View full answer
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
