(Answered) Understanding Investigative Parameters

0
(0)

 No directly quoted material may be used in this project paper. Resources should be summarized or paraphrased with appropriate in-text and Resource page citations. For the purposes of this project, imagine you are a Data Security Analyst, an employee of the Allied Technology Systems and assigned to the company’s Data Protection Team. In this case, you have been notified by Mr. Devin Roberts, Human Resources Director for Allied Technology Systems, that the company has just terminated Mr. Keith Jackson, a former engineer in the company’s New Products Division, for cause (consistent tardiness and absences from work). Mr. Roberts tells you that during Mr. Jackson’s exit interview earlier that day, the terminated employee made several statements to the effect of “it is okay because I have a new job already and they were VERY happy to have me come from ATS, with ALL I have to offer.” Jackson’s statements made Mr. Roberts fear he might be taking Allied’s intellectual property with him to his new employer (undoubtedly a competitor). In particular, Mr. Roberts is worried about the loss of the source code for “Product X,” which the company is counting on to earn millions in revenue over the next several years. Mr. Roberts provides you a copy of the source code to use in your investigation. Lastly, Mr. Roberts tells you to remember that the Company wants to retain the option to refer the investigation to law enforcement in the future, so anything you do should be with thought about later potential admissibility in court. The 4th Amendment to the U.S. Constitution reads, “The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no warrants shall issue, but upon probable cause, supported by oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.” While the 4th Amendment is most commonly interpreted to only affect/restrict governmental power (e.g., law enforcement), the fact that a formal criminal investigation is a possibility (and the Company has no desire to be named in a civil lawsuit) means you must consider its effect to your actions. With the above scenario in mind, thoroughly answer the following questions (in paragraph format, properly referring to and citing materials used in this course as well as outside research, where appropriate, and within a reference page at the end of the project paper). 1. Prior to any incident happening, it is important for any company to implement a “forensic readiness” plan. Discuss the benefits of a forensic readiness plan and name what you believe are the top three (3) requirements to establish forensic readiness within a private sector business like Allied Technology Systems. Support your answers. (Please note that while cyber security and digital forensics have overlaps in incident response preparation, please limit your answers here to forensic readiness in the digital forensic arena, not cyber security.) 2. Mr. Roberts, out of concern for the theft/sharing of the “Product X” source code, is requesting that you, your supervisor, or Mr. Dewberry start searching the areas in which Mr. Jackson had access within the building. Can you or Mr. Dewberry search Jackson’s assigned locker in the Company’s on-site gym for digital evidence? Support your answer. 3. Can you or Mr. Dewberry use a master key to search Jackson’s locked desk for digital evidence, after Keith Jackson has left the premises? Support your answer. 4. The police have not been called or involved yet, however, Mr. Roberts asks how involving the police will change your incident response. Describe how you will respond to Mr. Roberts concerning how the parameters of search and seizure will change by involving the police in the investigation at this time. Support your answer. 5. There is a page in the Company’s “Employee Handbook” that states that anything brought onto the Company’s property, including the employees themselves, are subject to random search for items belonging to Allied Technology Systems. There is a space for the employee to acknowledge receipt of this notice. Mr. Jackson has a copy of the handbook but never signed the receipt page. Does that matter? Explain. 6. Allied Technology Systems uses a security checkpoint at the entrance to the building. A sign adjacent to the checkpoint states that the purpose of the checkpoint is for security staff to check for weapons or other materials that may be detrimental to the working environment and employee safety. Screening is casual and usually consists of verification of an employee’s Company ID card. Can security staff at this checkpoint be directed to open Mr. Jackson’s briefcase and seize any potential digital evidence? Support your answer. 7. You know that it is important to document the details of your investigation if the company wants to insure admissibility of any evidence collected in the future. However, Mr. Roberts has never heard of the term “chain of custody.” How would you explain to Mr. Roberts what the chain of custody means, why it is important, and what could occur if the chain of custody is not documented. Support your answer. Project Requirements: • Each question should be answered with a minimum of 1 paragraphs, so do your research, be specific, be detailed, and demonstrate your knowledge; submitting your project through the appropriate assignment folder. • Answers to the above questions should be submitted in a single Microsoft Word document (.DOC/.DOCX), with answers separated and/or numbered in respect to the question, so as to make it clear which question is being answered. It may be in a question and answer format, or as described with answers to the associated question numbers; • The paper should be written in third-person grammar, not first person (I, me, myself, etc.); • The submission is to have a cover page that includes course number, course title, title of paper, student’s name, and the date of submission per APA writing format; • Format: 12-point font, double-space, one-inch margins;

#Understanding #Investigative #Parameters

How useful was this post?

Click on a star to rate it!

Average rating 0 / 5. Vote count: 0

No votes so far! Be the first to rate this post.

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

(Answered) Task 2: Argumentative Research Paper- Organic foods verses GMOs

0 (0) Writing a research paper gives you an opportunity to explore a topic of special interest, research that topic, and organize your research findings in writing for an academic audience.   Through your preparation work, you have established an argumentative thesis statement and have planned a clear organization of

(Answered) M3A1: Citizens United

0 (0) (copy and paste the link) Review Campaign Finance: Abuses and Reforms. [Video File] [48 min 25 sec] before you participate in this activity. Parts of the video will discuss aspects of campaign finance and reform. Before engaging in this activity, please return to the first discussion topic on

(Answered) The decision in Williams v Roffey Bros signals that the courts in deciding whether or not to enforce a promise, may be guided less by technical questions of consideration than by questions of fairness, reasonableness and commercial utility.

0 (0) The decision in Williams v Roffey Bros signals that the courts in deciding whether or not to enforce a promise, may be guided less by technical questions of consideration than by questions of fairness, reasonableness and commercial utility.   The assignment will be in accordance with the following

(Answered) What are the effects of Ketamine treatment on treatment resistant depression?

0 (0) • Introductory statement clearly describes the phenomenon and main health issue • Clearly identifies the problem and gives an argument for examining the problem • Thesis statement is clear and well-articulated • Clearly articulates the particular population with clinical setting provided 1. Operational Definitions • Operational definitions of

(Answered) Management and Organizational Behavior.

0 (0) Description Exercise 17: Read Annual Pay Raises (W-68-69). This is located in the color-coded workbook section in the back of your book. ( Uhl-Bien, M., Osborn, R. N., & Schermerhorn, J. R. (2014).) Organizational Behavior. Hoboken, NJ: Wiley. ISBN:9781118517376 Review the exercise and complete steps 1 and 2.

(Answered) The Wall of Silence Reflective Journal

0 (0)  Assignment Instructions: For this course, you will be reading The Wall of Silence by Gibson and Singh (2003). Please read the book and reflect upon what you have read, and complete the assignment as described. The purpose of this reflective assignment is to provide the approach for connecting

(Answered) HEPATITIS C USING APRI SCORE

0 (0) Determination of Human Subjects Research Form and my project proposal. please, research about IRB. write the Description. Referencing the Determination Checklist on Page 2, briefly describe project objectives, the subject population and types of data/specimens to be collected and analyzed, how the data/specimens will be obtained, and why

(Answered) Company Description and SWOT

0 (0) Non Alcoholic Beverage company!!!! n this assignment, you will conduct a SWOT (Strength, Weakness, Opportunity, and Threat) analysis for the type of beverage you have selected, and for your company overall. As you work on the assignment, consider why you have chosen one type of non-alcoholic beverage over

(Answered) Oral Language chart of phone conversation

0 (0) Instructions In an APA formatted paper, paste the template found in doc. sharing. Define each of the terms and then watch the video of two children talking on the phone. Rate the language development of one of the two children in the video found at Use the SOLOM.

(Answered) Motivations of Private-Sector Organizations

0 (0)  Presidential Policy Directive 8 (PPD-8) is part of the national preparedness goal and provides a description for preparing for the threats in an all-hazards approach that pose the greatest risk to the United States. Community preparedness is a shared responsibility of the whole community. In addition to the

(Answered) Effective Resource Allocation

0 (0)  The discussion assignment for this week includes a review of the Key Assignment Outline completed by one of your classmates, as well as a substantial response to at least one other student. Primary Task Response: Your first task is to post your own Key Assignment Outline to the

(Answered) Ethics Case Study

0 (0) A student’s analysis of the ethic case must use the following written structural framework, which can be written as a memorandum to the file. Without the bullet points – these indicate required headings for each of the four sections. The following the description heading below to form a

(Answered) The Relativist Ethical Position.

0 (0)  In your post, address the following: To what extent would you agree with the view that research should rely on a relativist ethical position—rules or duties may vary across different communities and professional groups? What examples could you suggest to support this view? References: – Doing Research in

(Answered) Poverty in the classroom

0 (0) A four-unit research paper in APA formatting centered around the effects of poverty in education. The first unit needs to be about the effects poverty has on students in the classroom and needs to be 8-10 pages. Second unit is on the effects of substance abuse on students

(Answered) Causes of America’s War in Vietnam

0 (0) Description Formatting 12 font or smaller, standard script (e.g. Calibri, New Times Roman), 1.00-1.25 margins maximum, double spaced, clean appearance, etc. Basic organization is simple— don’t make it difficult Title— choose one that reflects your views on the topic to inform and engage your reader from the start,

(Answered) Workflows in telemetry

0 (0) Workflow analysis aims to determine workflow patterns that maximize the effective use of resources and minimize activities that do not add value. There are a variety of tools that can be used to analyze the workflow of processes and clarify potential avenues for eliminating waste. Flowcharts are a

(Answered) Critical Decision Making for Providers

0 (0) View the scenario called “Critical Decision Making for Providers”. In a 750-1,200 word paper, describe the scenario involving Mike, the lab technician, and answer the following questions: What were the consequences of a failure to report? What impact did his decision have on patient safety, on the risk