Computer Forensics, Search Strategies, and the Particularity Requirement

  • Jekot W
N/ACitations
Citations of this article
5Readers
Mendeley users who have this article in their library.

Abstract

Assuming that a person subject to a search and seizure of his or her computer has a reasonable expectation of privacy in the contents of the computer, and thus a warrant is required, should the warrant outline a “search strategy”? Or should comprehensive computer searches be permitted? In other words, how should the particularity requirement be applied to computer searches? Correspondingly, what can a forensic examiner do under a warrant while collecting potential evidence from a computer? [...]

Cite

CITATION STYLE

APA

Jekot, W. (2007). Computer Forensics, Search Strategies, and the Particularity Requirement. Pittsburgh Journal of Technology Law and Policy, 7. https://doi.org/10.5195/tlp.2007.29

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free