Digital Forensics Key to Preserving the Victim’s Right to Privacy

The Internet Crimes Against Children Task Force (ICAC) faced a complex case where child sexual abuse was suspected. However, they faced a serious challenge in finding the right mobile forensics tool that would only collect strictly relevant data without examining

Forging Trust in Digital Forensics as Technology Evolves

A person holding a tablet with brightly lit icons representing law, trust, compliance
February’s publications continued a trending topic in recent research: establishing reliability in forensic science as a whole, and digital forensics particularly. Even as some works explored the decryption of encrypted data, and the use of “hacked” data from encrypted devices,

Internet Of Things Mobility Forensics

by K M Sabidur Rahman & Matt Bishop (University of California Davis) and Albert Holt (NSA) Abstract The Internet of Things (IoT) comes with great possibilities as well as major security and privacy issues. Although digital forensics has long been

Corporate Investigations and the UK Data Protection Act

First published September 2007 by Rowenna Fielding INTRODUCTION A number of requirements of the Data Protection Act apply to workplace monitoring. While the DPA does not prohibit employee monitoring and investigation, any such activity must conform to the requirements of