Do's and Don’ts for Digital Evidence

By Dave Lang, CPP

One Friday afternoon, the information technology director of a major telecommunications provider (we’ll call him Jim) rushed up to the office of the company’s president (whom we’ll call Tom). Jim was carrying a corporate notebook computer that had previously been used by an employee who had just been terminated. Jim quickly related to Tom that while reconfiguring the computer—standard procedure before reissuing it to another employee—the IT staff had found what appeared to be child pornography on it.



The Magazine — Past Issues


Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.