Notifications
Clear all

Protocol for 'Adversarial' Computer Forensic Examination

1 Posts
1 Users
0 Likes
267 Views
(@john_grancarich)
Posts: 8
Active Member
Topic starter
 

Hello - I am working on a matter which involves the deletion of data from a Unix-based enterprise system. The opposing party in the matter has acknowledged that data was deleted from the system during the relevant time period - the open questions relate to the scope of the deletion, when the deletions occurred and what data can actually be recovered. These questions are being addressed in a separate examination protocol that both sides must agree to.

The parties in the matter have also been ordered by the court to prepare and submit a joint report which will describe how the computer forensic experts from both sides will address questions of cooperation, confidentiality, access to systems and so forth. If you know of any successful models on these points that can be shared I would be most appreciative to hear from you. This matter is based in a US Federal Court.

Thank you.

John

 
Posted : 22/05/2009 6:58 pm
Share: