StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Law of digital evidence - Essay Example

Cite this document
Summary
Such arbitrary searches are gross violation of privacy thus basic human rights. Computers constitute private property that law enforcers can never search arbitrarily without approval from a judge…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER95.6% of users find it useful
Law of digital evidence
Read Text Preview

Extract of sample "Law of digital evidence"

Law of digital evidence General warrant Searching a suspect’s private belonging is illegal under the Fourth Amendment. Such arbitrary searches are gross violation of privacy thus basic human rights. Computers constitute private property that law enforcers can never search arbitrarily without approval from a judge. Law enforcers such as the police must always obtain court orders, also known as search warrants in order to search private belonging key among which are computers. Search warranties must indicate the type of searches they approve (Marshall & Baillie 5).

Computer searches vary from general searches a fact that makes turning a computer search warrant into a general search. In case they do so, they must always prove a probable cause for such actions. Plain view exceptionLaw enforcers should always seize evidence in plain view a feature that remains impossible in computer searches given the soft copy nature of such files. The plain view exception thus exempts computer searches from such conditions. However, law enforcers should always carry out an exhaustive search of the computer thus ensuring that they search every file in the computer and avail their contents whenever required.

Search protocolI refute the idea of a observing a search protocol which requires the approval of a court of law before carrying out a search. Criminals can easily delete and manipulate any incriminating evidence in their computers thus making it difficult for the law enforcers to prove their guilt. As such, the law should permit law enforcers to confiscate computers at the time of arrest as they await search warrants. This way, they safeguard the evidence in the computers by making it difficult for the suspect to tamper with the contents of the computer.

Work citedMarshall, Casey & Baillie, Eoghan. Digital Evidence and Computer Crime: Forensic Science, Computers, and the Internet. Burlington: Elsevier Science, 2011. Internet resource.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Law of digital evidence Essay Example | Topics and Well Written Essays - 250 words”, n.d.)
Law of digital evidence Essay Example | Topics and Well Written Essays - 250 words. Retrieved from https://studentshare.org/law/1661186-law-of-digital-evidence
(Law of Digital Evidence Essay Example | Topics and Well Written Essays - 250 Words)
Law of Digital Evidence Essay Example | Topics and Well Written Essays - 250 Words. https://studentshare.org/law/1661186-law-of-digital-evidence.
“Law of Digital Evidence Essay Example | Topics and Well Written Essays - 250 Words”, n.d. https://studentshare.org/law/1661186-law-of-digital-evidence.
  • Cited: 0 times

CHECK THESE SAMPLES OF Law of digital evidence

Evidence in the case of Donald who May have Hit Doris

evidence in the Case of Donald who May have Hit Doris evidence in the Case of Donald who May have Hit Doris Introduction There are typically three kinds of evidence that is given in a trial: evidence that is fact, evidence that is an opinion, and evidence that is hearsay.... In addition, The nature of a court case is not to find the truth, “but to establish that a version of what occurred has an acceptable probability of being correct” through the introduction of evidence that leads to what is intended to be the truth....
4 Pages (1000 words) Essay

Organizations Digital Investigation Process

Organization's digital investigation process Name Number Course Tutor Date Digital investigation is the process of preserving, collecting, validating, identifying, analyzing, interpreting, documenting, and presenting of digital evidence from digital sources.... Due to the delicate nature of digital evidence improper handling may lead to damaged or compromised data.... c) Identification and acquisition of relevant digital evidence?... hellip; The evidence may be used to facilitate the construction of events deemed to be criminal or in contrast with the laid down procedures....
5 Pages (1250 words) Essay

The Return of Stock

There are three lower outliers and 1 upper outlier in the data as seen in the box plot graph. … e) This test can be used to detect tax evasions as the Bedford's law of distribution of the first digits of numbers in tax returns is NOT uniform.... uestion # 4 Distribution of leading digits using Ben ford's law of distribution.... 77DigitObserved FrequencyExpected Frequency based on Benford's law(Observed- expected) / expected....
3 Pages (750 words) Essay

Forrensic computing - securing evidence

digital evidence is the information that is transmitted or stored in computers in binary form, and which is admissible in a court of law.... 4 principles of digital and electronic evidence are defined in the third version of the Good Practice Guide for Computer Based Evidence, and these will be described here.... evidence is the means and materials that enable a case to be proven.... The evidence shows the actual events that took place in any situation, and evidence can either be Digital, Electronic or physical....
4 Pages (1000 words) Essay

Digital investigation in the organization

hellip; The author of the paper states that the digital investigation for law enforcement yields digital evidence, the evidence however may involve the use of enhanced system and staff monitoring, physical and procedural ways of securing data to a standard to be accepted as evidence and considered admissible.... Many organizations are in a position to benefit more if they have the ability to gather and preserve digital evidence before an incident occurs and not after the incident has occurred(Robert, 2004)....
5 Pages (1250 words) Essay

Case Portfolio Analysis

A removable flash drive/disk: This drive can be used as evidence to show any data that was stored in it by Mr.... This evidence can be preserved by taking a forensic imaging of the keys.... Compact Disk: This disk similar to the first evidence could have been used to store data which might have appertained to the pending case.... This disk can also be preserved in a tamper proof evidence material/bag while awaiting transportation to the law enforcement agency or pending analysis....
6 Pages (1500 words) Essay

Mercantile Law Investigations

In the paper “Mercantile Law” the author discusses the issue that it is impossible to search Yourprops personal vehicle currently parked in the Company parking lot for digital evidence as a result of the fact that there is no evidence to show that he has committed a criminal offense.... Yourprops' supervisor has no right by law to search Yourprops assigned locker in the Company's on-site gym for digital evidence without his knowledge and consent.... Yourprops supervisor cannot use a master key to search Yourprops locked desk after he has left the premises for digital evidence....
2 Pages (500 words) Essay

Digital Forensics in the Criminal Justice System

Yourprops work area, the company uses notebook as no digital evidence.... This paper looks at the information systems in custody evidence area of Mr.... This paper looks at the information systems in custody evidence area of Mr.... He/she should show evidence of authentication and certificate for searching.... Yourprop's work area, there are three main digital items evidence.... The files may help to get the manual information to support the evidence....
2 Pages (500 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us