Civil Cases - ANSWER ==Violation of contracts and lawsuits
Criminal Cases - ANSWER ==warrant authority can seize computers, forensic
investigation
... [Show More] violation of law
Administrative Cases - ANSWER ==noncriminal, violating of orgs policies, misuse of
resources. Results in disciplinary action
rules of evidence - ANSWER ==Admissible in a court of law: understandable,
admissible, authentic, reliable, complete
Best Evidence Rule - ANSWER ==original evidence rather than copy, duplicate
accepted if court finds duplicate genuine
Rule 102 - ANSWER ==Purpose ability to proceed failure, without unjustifiable
expense and delay, development of evidence law
Rule 103 - ANSWER ==Rules on Evidence
Preserving a Claim of error, No Need to Renew an Objection or Offer proof, prevent jury
haring inadmissible evidence
Rule 104 - ANSWER ==Preliminary Questions court decides if witness is qualified and
evidence
Rule 105 - ANSWER ==Limited Admissibility
Rule 801, 803, 804 - ANSWER ==Hearsay Rules
Rule 1001 - ANSWER ==Definitions content of writings, recordings and photogrraphs.
Definition of original evidence
Rule 1002 - ANSWER ==Requirement of original evidence
Rule 1003 - ANSWER ==Admissibility of Duplicates evidence
Rule 1004 - ANSWER ==Admissibility of Other Evidence of Content
Scientific Working Group on Digital Evidence (SWGDE) - ANSWER ==Principle 1,
accuracy and reliability of the evidence
Standards and Criteria, SOP then review and record in scientific manner
Forensic Readiness - ANSWER ==Orgs ability to optimally use digital evidence in
limited time and minimal costs. Minimal disruption
Maintain business continuity. Prevent repeat attacks.
Forensics Readiness Planning - ANSWER ==Set of processes
Identify potential evidence, sources of evidence, policy to collect, policy to handle and
store, full or formal investigations, SOP, legal advisory board creation, incident
response team
Enterprise Theory of Investigation (ETI) - ANSWER ==Solving one crime can tie it
back to a criminal organizations activity
Code of Ethics - ANSWER ==behavior of an investigator. SOP, morals, integrity of the
evidence, laws, honesty,
Groups for Computers Forensics Resources - ANSWER ==Computer Technology
Investigators Network, High Technology Crime Investigation Association, Network of
computer forensic experts, Journals, Case studies
Fourth Amendment - ANSWER ==Protects against unreasonable search and seizure
without a search warrant
Gramm-Leach-Bliley Act (GLBA) - ANSWER ==Financial institutions safeguard
sensitive data
Federal Information Security Modernization Act of 2014 (FISMA) - ANSWER
==federal information systems to have information security controls in place
Health Insurance Portability And Accountability Act of 1996 (HIPPA) - ANSWER
==PHI, Privacy Rule - disclosure of health info, Security Rule - standards,
The Electronic Communications Privacy Act - ANSWER ==regulates the interception
of electronic communications by individuals as well as the government
General Data Protection Regulation (GDPR) - ANSWER ==Encryption and
anomalous of data, CIA and resilience, processing information requests
Data Protection Act of 2018 - ANSWER ==Regulation on processing of ingo relating
to individuals
PCI DSS (Payment Card Industry Data Security Standard) - ANSWER ==Credit cards
Sarbanes-Oxley Act (SOX) 2002 - ANSWER ==Protect investors from fraudulent
accounts activities by companies [Show Less]