Assuming that a person subject to a search and seizure of his or her computer has a reasonable expectation of privacy in the contents of the computer, and thus a warrant is required, should the warrant outline a “search strategy”? Or should comprehensive computer searches be permitted? In other words, how should the particularity requirement be applied to computer searches? Correspondingly, what can a forensic examiner do under a warrant while collecting potential evidence from a computer? [...]
CITATION STYLE
Jekot, W. (2007). Computer Forensics, Search Strategies, and the Particularity Requirement. Pittsburgh Journal of Technology Law and Policy, 7. https://doi.org/10.5195/tlp.2007.29
Mendeley helps you to discover research relevant for your work.