ProductsLogo
LogoStudy Documents
LogoAI Grader
LogoAI Answer
LogoAI Code Checker
LogoPlagiarism Checker
LogoAI Paraphraser
LogoAI Quiz
LogoAI Detector
PricingBlogAbout Us
logo

Global Investigations

Verified

Added on  2023/04/07

|4
|632
|274
AI Summary
This document discusses the discipline of forensics and its role in criminal investigations. It also explores GDPR compliance and the use of e-discovery technology for capturing emails and attachments. Additionally, it covers digital forensic methods for network protocols.

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Running head: INFORMATION TECHNOLOGY
Global Investigations
Name of Student-
Name of University-
Author’s Note-

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1INFORMATION TECHNOLOGY
Question 1:
Forensics is a scientific discipline that is considered under the criminal offenses. The
discipline states a particular way by which the investigator collects the data, documents them, as
well as analyzes the facts that are related to crimes. The investigator needs to collect all the
pieces of evidence that are related to criminal offence. Legal procedure that is involved in
forensic collection is criminology (Safari, 2016). This is a crime study that consists of
contribution from different academic disciplines that includes biology, law, anthropology,
psychology as well as sociology. Criminology is considered as the root that comes in diverse
areas, the criminology is becoming more intertwined with additional sciences as well as
professional fields that includes public health, social work and the geography. All actions that are
related to identification, packaging, storage, collection as well as digital evidence.
Question 2:
A plan that would be considered adherence to the GDPR and the use of e-discovery
technology for capturing e-mails and attachments without privacy laws is as follows:
i) Creation of Email Marketing Team for Capturing Emails and Attachments:
The first step is to create an email marketing team for capturing emails and attachments (Voigt &
Von dem Bussche, 2017). This is required for ensuring compliance after considering standards
and frameworks of GDPR.
ii) Modelling of Personal Data Store and IT: GDPR legislation helps to govern
information with the process and reason of capturing emails and attachments. Modelling of
personal data store and IT is the second step in this plan. A multi user collaboration is being
supported with e-discovery technology.
Document Page
2INFORMATION TECHNOLOGY
iii) Using Encrypted Email Services: The third step is to use encrypted email
services like NHS (Goddard, 2017). This is required as encryption and password protection is
adhered to GDPR for easier email and attachment capturing. Moreover, data security is also
enhanced in this plan.
Question 3:
The digital forensic methods that can be applied on the network protocols or the layers of
protocol are examined through Data link as well as physical layer. There are methods that are
achieved through eavesdropping the bit stream on layer of Ethernet in the OSI Model. This can
also be examined through the transport layer and the network layer. There are network layer that
provides information that are based on the router on routing table presenting all the routers and
authentication for the log evidence (Team, 2017). The traffic can also be examined on the base of
use case. The internet has a vast number of services that includes chat, file transfer and many
more. That makes the digital evidence rich. There are even wireless methods that are included
for collecting as well as analyzing the traffic from the wireless network and the wireless devices.
GDPR is the regulation that helps in bringing light to matter in different ways by forcing the
affected companies to publicly announce their issues and act accordingly.
Conclusion:
Therefore, it can be concluded that the above mentioned procedures and plans would be
extremely effective for the forensic professionals. These plans will ensure that there is no such
occurrence of data or design theft.
Document Page
3INFORMATION TECHNOLOGY
References
Goddard, M. (2017). The EU General Data Protection Regulation (GDPR): European regulation
that has a global impact. International Journal of Market Research, 59(6), 703-705.
Safari, B. A. (2016). Intangible privacy rights: How europe's gdpr will set a new global standard
for personal data protection. Seton Hall L. Rev., 47, 809.
Team, I. P. (2017). EU general data protection regulation (GDPR): an implementation and
compliance guide. IT Governance Ltd.
Voigt, P., & Von dem Bussche, A. (2017). The EU General Data Protection Regulation
(GDPR). A Practical Guide, 1st Ed., Cham: Springer International Publishing.
1 out of 4
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]