Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Clustering (2)
- Computer forensics (2)
- Cyber crime (2)
- Digital forensics (2)
- Disk analysis (2)
-
- APIHook (1)
- Accounting (1)
- Amendment (1)
- Anti-Tamper (1)
- Anti-analysis (1)
- Anti-forensics (1)
- Auditing (1)
- Bitlocker (1)
- Civil procedure (1)
- Computer Forensics (1)
- Computer crime (1)
- Curriculum design. (1)
- Cybercrime Provenance (1)
- Data Mining (1)
- Data destruction (1)
- Data disposal (1)
- Data leakage (1)
- Data map (1)
- Data mapping (1)
- Data mining. (1)
- Data recovery (1)
- Digital Forensics (1)
- Digital Records Forensics (1)
- Digital evidence (1)
- Digital forensic analysis (1)
Articles 31 - 33 of 33
Full-Text Articles in Law
The 2009 Analysis Of Information Remaining On Disks Offered For Sale On The Second Hand Market, Andy Jones, Craig Valli, Glenn S. Dardick, Iain Sutherland, G. Dabibi, Gareth Davies
The 2009 Analysis Of Information Remaining On Disks Offered For Sale On The Second Hand Market, Andy Jones, Craig Valli, Glenn S. Dardick, Iain Sutherland, G. Dabibi, Gareth Davies
Journal of Digital Forensics, Security and Law
The ever increasing use and reliance upon computers in both the public and private sector has led to enormous numbers of computers being disposed of at the end of their useful life within an organisation. As the cost of computers has dropped, their use in the home has also continued to increase. In most organisations, computers have a relatively short life and are replaced on a regular basis with the result that, if not properly cleansed of data, they are released into the public domain containing data that can be relatively up to date. This problem is exacerbated by the …
Avoiding Sanctions At The E-Discovery Meet-And-Confer In Common Law Countries, Milton Luoma, Vicki Luoma
Avoiding Sanctions At The E-Discovery Meet-And-Confer In Common Law Countries, Milton Luoma, Vicki Luoma
Journal of Digital Forensics, Security and Law
The rules of civil procedure in common law countries have been amended to better deal with the requirements of electronic discovery. One of the key changes in case management is the scheduling of a meet-and-confer session where the parties to litigation must meet early in the case before any discovery procedures have begun to exchange information regarding the nature, location, formats, and pertinent facts regarding custody and control of a party’s electronically stored information (ESI). Failure to abide by the rules and participate in good faith at the meet-and-confer session can have dire consequences for the parties and lawyers involved. …
Table Of Contents
Journal of Digital Forensics, Security and Law
No abstract provided.