Privacy needed to be considered when collecting computer evidence

* Respect the privacy rules and guidelines of your company and your legal jurisdiction.  In particular, make sure no information collected along with the evidence you are searching for is available to anyone who would not normally have access to this information.  This includes access to log files (which may reveal patterns of user behaviour) as well as personal data

* Do not intrude on people’s privacy without strong justification.  In particular, do not collect information from areas you do not normally have reason to access (such as personal file stores) unless you have sufficient indication that there is a real incident.

* Make sure you have the backing of your company’s established procedures in taking the steps you do to collect evidence of an incident.

54 Comments to “Privacy needed to be considered when collecting computer evidence”

  1. .

    ñýíêñ çà èíôó….

  2. Rex


    ñïñ çà èíôó!!…

  3. dan


    ñïñ çà èíôó!!…

  4. Lee


    thanks for information!…

Leave a Reply

You must be logged in to post a comment.