O'Reilly logo

Computer Forensics JumpStart, Second Edition by Diane Barrett, Neil Broom, Ed Tittel, K Rudolph, Michael G. Solomon

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Know Your Limits

When an intrusion is detected, you must know to what lengths you can go to minimize the damage and also whether you can seize property. For example, let’s say that you have determined that an employee has installed hacking tools on your network and he has hacked into a business partner’s network. He then proceeded to steal passwords. Can you search his computer for evidence without a warrant? What about that UFD he carries on his keychain? Is that a work-related item or a personal item? These are the types of questions you’ll need to answer before you act.

Legal Organizational Rights and Limits

Employers can be either public or private. This distinction is important because government employers are bound by the Fourth Amendment, ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required