We use cookies to give you the best experience possible. By continuing we’ll assume you’re on board with our cookie policy

See Pricing

What's Your Topic?

Hire a Professional Writer Now

The input space is limited by 250 symbols

What's Your Deadline?

Choose 3 Hours or More.
Back
2/4 steps

How Many Pages?

Back
3/4 steps

Sign Up and See Pricing

"You must agree to out terms of services and privacy policy"
Back
Get Offer

Exmine Computer Forensic And Privacy

Hire a Professional Writer Now

The input space is limited by 250 symbols

Deadline:2 days left
"You must agree to out terms of services and privacy policy"
Write my paper

Because of these advances in technology Congress as implemented laws to protect people from having information stolen or accessed illegally by individuals or even in some cases Law Enforcement. In the advent of Computer Forensics, certain guidelines must be met before obtaining any information either by intercepting the transmission, securing the device or acquiring the information by means of remotely connecting into the device. Several laws have been implemented to protect a person’s rights with regards to accessing their electronically stored data.

Don't use plagiarized sources. Get Your Custom Essay on
Exmine Computer Forensic And Privacy
Just from $13,9/Page
Get custom paper

The Wire Tap Act is one of these laws. This law prohibits any interception of a communication between two riveter parties without an order issued by a court. Any violation of this Act will result in criminal or civil liability, and a violation by governmental officials in a case could result in a suppression of that evidence. Both the Stored Wired and Electronic Communications Act, and the Pen Registers and Trap and Trace Devices Statute identify the need for protecting the privacy of individuals with regards to computers and the data within them.

Initially this act was regarding phone numbers that an individual called, but since the implementation of the Patriot Act, I. P addresses can now be accessed along with emails ,communication ports, and what Web sites are being accessed from either your computer or cell phone. Investigators must obtain legal access to computers before obtaining any data from them. The case of Jamie Staley provided an example of how such an intrusion of computer privacy can in fact take place.

This case involved the defendant Jamie Staley intercepting emails from members of her husband’s family with information pertaining to a bitter divorce and child custody battle. Through computer forensic analysis it was determined that in fact Jamie had intercepted and in some cases altered electronic transmissions made by her ex husband’s grandparents and their attorney. This was clearly a violation of the Attorney Client privilege and also the Wire Tap Act, which clearly stated that electronic data being transmitted cannot be intercepted by a third party.

An argument can also be made that the Stored Wired and Communications Act regarding accessing stored data had also been violated. When gathering evidence the individual who is responsible for the process has an obligation to obtain the data as accurately and responsibly as possible. Data must be collected both legally and proficiently, in order to protect the rights of the individuals being investigated.

Cite this Exmine Computer Forensic And Privacy

Exmine Computer Forensic And Privacy. (2018, Jun 27). Retrieved from https://graduateway.com/exmine-computer-forensic-and-privacy/

Show less
  • Use multiple resourses when assembling your essay
  • Get help form professional writers when not sure you can do it yourself
  • Use Plagiarism Checker to double check your essay
  • Do not copy and paste free to download essays
Get plagiarism free essay

Search for essay samples now

Haven't found the Essay You Want?

Get my paper now

For Only $13.90/page