Saturday, May 25, 2019

Examine computer Forensics and Privacy Essay

Although the Fourth Amendment of the Constitution protects us from illegal searches and seizures, it left somewhat of a grey area when it came to electronic communications. With each the technological advances almost every person uses some kind of device to communicate electronically that goes out to the Internet. When using these devices to communicate knowledge can be intercepted and even adapted in some ways. Because of these advances in technology Congress has implemented laws to protect people from having information stolen or accessed illegally by individuals or even in some shifts Law Enforcement.In the advent of Computer Forensics, certain guidelines must be met before obtaining any information either by intercepting the transmission, securing the device or acquiring the information by means of remotely connecting into the device. Several laws have been implemented to protect a persons rights with regards to accessing their electronically stored data. The Wire water fauce t Act is one of these laws. This law prohibits any interception of a communication between two private parties without an order issued by a court. each violation of this Act will result in criminal or civil liability, and a violation by governmental officials in a look could result in a suppression of that evidence.Both the Stored Wired and Electronic Communications Act, and the Pen Registers and Trap and Trace Devices Statute identify the need for protect the privacy of individuals with regards to computers and the data within them. Initially this act was regarding phone numbers that an individual called, but since the implementation of the Patriot Act, I.P addresses can now be accessed on with emails ,communication ports, and what Web sites are being accessed from either your computer or cell phone. Investigators must obtain legal access to computers before obtaining any data from them. The case of Jamie Staley provided an example of how such an intrusion of computer privacy ca n in fact take place.This case involved the defendant Jamie Staley intercepting emails from members of her husbands family withinformation pertaining to a bitter divorce and child custody battle. Through computer forensic analysis it was determined that in fact Jamie had intercepted and in some cases altered electronic transmissions do by her ex husbands grandparents and their attorney. This was clearly a violation of the Attorney Client privilege and also the Wire Tap Act, which clearly stated that electronic data being transmitted cannot be intercepted by a third party.An argument can also be made that the Stored Wired and Communications Act regarding accessing stored data had also been violated. When gathering evidence the individual who is responsible for the process has an obligation to obtain the data as accurately and responsibly as possible. Data must be collected both legally and proficiently, in order to protect the rights of the individuals being investigated. Both polic ies and procedures must be followed to protect the integrity, and reliability of the evidence being collected.Sources1. Stored Communications Act http//en.wikipedia.org/wiki/Stored_Communications_Act2. Pen Registers and Trap and Trace Deviceshttps//ssd.eff.org/wire/govt/pen-registers3. Computer Security and Forensics Law Checklist By tease Wepman http//www.ehow.com/list_6746948_computer-security-forensics-law-checklist.html

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.

Innocence Lost by Nathaniel Hawthorne Essay -- Nathaniel Hawthorne Inn

Blamelessness Lost by Nathaniel Hawthorne My Kinsman, Major Molineux and Young Goodman Brown present Nathaniel Hawthorne’s faith i...