StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Law of Digital Evidence - Essay Example

Cite this document
Summary
The unequivocal nature of information stored in computers as compared to other properties promoted the increases of concern on the determination of their warrants. Computers have…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER91.6% of users find it useful
Law of Digital Evidence
Read Text Preview

Extract of sample "Law of Digital Evidence"

Questions on search warrants for computers Given the nature of digital evidence, officers who execute any search warrant for computer devices can turn the search into a “general warrant”. Is this a valid concern? The argument is valid due to the comprehensive nature of computers as related to other properties. The unequivocal nature of information stored in computers as compared to other properties promoted the increases of concern on the determination of their warrants. Computers have an increased level of personal data.

Additionally, the control of such information, as stored in these devices, remains unwarranted by the user. It would not be argued that all the information established from a personal computer belongs to the user since some may be uploaded via virtual modes. Additionally, computers are known to save some files irrespective of the user having deleted them or considered them eliminated from the device. Such observations allow for the complicating the entire process of promoting a search warrant on these devices.

It further suggests that computer devices may not be classified along the regards or presentation of general warrants. It also implies that the interest of attributing computer searches to a different set of warrants acknowledges their unique qualities (Jarrett and Bailie, 100-114).Should judges require law enforcement to forego the plain view exception to the warrant requirement when they are executing search warrants on computer devices?Computers are general hubs of extremely personal information.

They are considered to host information that defines individuals in a wholesome manner. They, further, have customized safety measures to allow for the protection of the contained information. Such attributes allow for the reflection of the personal nature of the information hosted or stored in these devices. Additionally, computers are utilized extensively in the expression of their users. Such is achieved via the extensive programs that are installed in these devices. The observations map these devices as rather unique to be subjected to the plain view of a search warrant (Jarrett and Bailie, 112).

The decision over the approach that is considered to affect the respective computer devices remain advised by the nature of the information that aspires to be extracted. Apparently, search warrants are developed to in anticipation of the information to be established. Such observations regarding the particulars of these searches allows them to be regarded as rather exceptional from routine searches. The concern is further complicated by the elemental superiority associated to computers, especially on user security.

Additionally, computers remain regarded as the best exemplification of personal space. The implication of these thoughts proposes the enforcement of a search warrant on these devices. However, the warrant should not be regarded or spelt under the general terms due to the difference in interests (Jarrett and Bailie, 129).Assume that the courts in your jurisdiction are considering requiring a judicially-approved “search protocol” before a judge will sign a search warrant authorizing a search of any computer device.

 Do you support or refute this idea?I fully embrace the decision to develop a sense of protocol regarding the search warrants associated to computers. The decision is further advised by the prospective limitations that have been achieved in the conduct of these searches in previous cases. Computers may hold information that may not be anticipated by police. Additionally, they remain positioned to allow the autonomous discovery of information that is not found in the primary search warrant. The implication of such critical observation points on the essence of providing a committed, but particular approach to executing their warrants.

The considered warrants should be structured in a manner that allow for the realization of the flexibility associated with the information to be extracted from these devices. Additionally, the prospective of a customized search warrant allow for the inclusion of possible surprises that ay be envisioned in the entire process. Such measures may be critically essential for the proposed search activity (Jarrett and Bailie, 129).Work citedJarrett , Marshall, H. and Bailie, Michael, W. Searching and Seizing Computers and Obtaining Electronic Evidence in Criminal Investigations.

Washington, D.C: Computer Crime and Intellectual Property Section Criminal Division, Office of Legal Education: Executive Office for United States Attorneys, 2009. Internet resource.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Law of Digital Evidence Essay Example | Topics and Well Written Essays - 500 words”, n.d.)
Law of Digital Evidence Essay Example | Topics and Well Written Essays - 500 words. Retrieved from https://studentshare.org/law/1659556-law-of-digital-evidence
(Law of Digital Evidence Essay Example | Topics and Well Written Essays - 500 Words)
Law of Digital Evidence Essay Example | Topics and Well Written Essays - 500 Words. https://studentshare.org/law/1659556-law-of-digital-evidence.
“Law of Digital Evidence Essay Example | Topics and Well Written Essays - 500 Words”, n.d. https://studentshare.org/law/1659556-law-of-digital-evidence.
  • Cited: 0 times

CHECK THESE SAMPLES OF Law of Digital Evidence

Organizations Digital Investigation Process

Organization's digital investigation process Name Number Course Tutor Date Digital investigation is the process of preserving, collecting, validating, identifying, analyzing, interpreting, documenting, and presenting of digital evidence from digital sources.... Due to the delicate nature of digital evidence improper handling may lead to damaged or compromised data.... c) Identification and acquisition of relevant digital evidence?... hellip; The evidence may be used to facilitate the construction of events deemed to be criminal or in contrast with the laid down procedures....
5 Pages (1250 words) Essay

Forrensic computing - securing evidence

digital evidence is the information that is transmitted or stored in computers in binary form, and which is admissible in a court of law.... 4 principles of digital and electronic evidence are defined in the third version of the Good Practice Guide for Computer Based Evidence, and these will be described here.... evidence is the means and materials that enable a case to be proven.... The evidence shows the actual events that took place in any situation, and evidence can either be Digital, Electronic or physical....
4 Pages (1000 words) Essay

Electronic Evidence Admissibility and Disclosure

Mason in the 2nd edition of LexisNexis Butterworths defines Electronic evidence as “data that are manipulated, kept or communicated by a man made device, computer or computer system or transmitted over a communication system that has the potential to make the factual… Electronic evidence includes; digital images, information on hand held devices, computer evidence, information from the internet, information from location devices and electronic data Pp....
10 Pages (2500 words) Coursework

Digital investigation in the organization

hellip; The author of the paper states that the digital investigation for law enforcement yields digital evidence, the evidence however may involve the use of enhanced system and staff monitoring, physical and procedural ways of securing data to a standard to be accepted as evidence and considered admissible.... Many organizations are in a position to benefit more if they have the ability to gather and preserve digital evidence before an incident occurs and not after the incident has occurred(Robert, 2004)....
5 Pages (1250 words) Essay

Case Portfolio Analysis

A removable flash drive/disk: This drive can be used as evidence to show any data that was stored in it by Mr.... This evidence can be preserved by taking a forensic imaging of the keys.... Compact Disk: This disk similar to the first evidence could have been used to store data which might have appertained to the pending case.... This disk can also be preserved in a tamper proof evidence material/bag while awaiting transportation to the law enforcement agency or pending analysis....
6 Pages (1500 words) Essay

Digital Forensics in the Criminal Justice System

Yourprops work area, the company uses notebook as no digital evidence.... This paper looks at the information systems in custody evidence area of Mr.... This paper looks at the information systems in custody evidence area of Mr.... He/she should show evidence of authentication and certificate for searching.... Yourprop's work area, there are three main digital items evidence.... The files may help to get the manual information to support the evidence....
2 Pages (500 words) Essay

Application in Forensic Odontology

It specifically appropriately examines, handle and present dental evidence in court of justice.... Consequently, the court of law will be able to analyse criminal cases and arrive at an objective decision using the evidence established by forensic odontologists.... digital photography has been commonly used in recent times over traditional film photography.... However, there is a need to discuss first why odontology is significant in forensic medicine or in the provision of justice in the court of law to give a logical background on why the roles of forensic odontology in identifying unidentified remains and analysing bite marks is significant in criminal investigation....
12 Pages (3000 words) Essay

Digital Crime, Cybercrime

Implications of digital crime on criminology... digital crime analysisBurden and Palmer explains true cyber crime as crimes which happen in an online environment.... Policy makers and law enforcement agencies have continually developed ways of dealing with the ever increasing cyber crimes....
8 Pages (2000 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us