The Treatment of PCs

  • Sammes T
  • Jenkinson B
N/ACitations
Citations of this article
3Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Up to this point, we have concentrated in the book on the technicalissues: on how computers work and their construction; on how informationis stored; and, in particular, on how and where information can behidden or inadvertently left on hard disk drives. This technicalunderstanding gives us both the knowledge and the confidence thatwill enable us to find information of evidential value from a PC.However, unless we carry out the investigative processes in wayswhichguarantee the integrity of that evidence, it is unlikely to be admissiblein court. Thus we now need to concern ourselves with perhaps themost important part of all: the processes that we need to carry outand the practices that we need to observe in order to extract informationfrom PCs and present it as admissible evidence in court.

Cite

CITATION STYLE

APA

Sammes, T., & Jenkinson, B. (2007). The Treatment of PCs. In Forensic Computing (pp. 277–299). Springer London. https://doi.org/10.1007/978-1-84628-732-9_7

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free