Access Control List (ACL)

Download as pdf or txt
Download as pdf or txt
You are on page 1of 5

Certificate u/s 65B of the Indian Evidence Act, 1872

For educational purposes only. Not for use in judicial proceedings.

Generated by: MOHAMAD MAGDOM AMIYAZ S/O MOHAMED ABDUL NASZER


Generated on: 20-Oct-2024
Category: Digital Evidence from Operating System (Non-Volatile Data)
Source: Access Control List (ACL)

Created using the student edition of ASCL-65B Generator


Certificate u/s 65B of the Indian Evidence Act, 1872
For educational purposes only. Not for use in judicial proceedings.

I, MOHAMAD MAGDOM AMIYAZ S/O MOHAMED ABDUL NASZER, the undersigned, state to
the best of my knowledge and belief that:

1. The 'information contained in an electronic record', hereinafter referred to as INFORMATION,


refers to data from Access Control List (ACL). Annexure A briefly explains the commonly
understood meaning of Access Control List (ACL).

2. 'Computer output' refers to the printout of INFORMATION, taken using the computer resource
described in Annexure B.
or
2. 'Computer output' refers to the optical or magnetic media described in Annexure B, on which the
INFORMATION has been stored, recorded or copied.

3. The manner in which the COMPUTER OUTPUT was produced is described in Annexure C.

4. The COMPUTER OUTPUT containing the information was produced by the computer during the
period over which the computer was used regularly to store or process information for the purposes of
any activities regularly carried on over that period by the person having lawful control over the use of
the computer. During the said period, information of the kind contained in the electronic record or of
the kind from which the information so contained is derived was regularly fed into the computer in
the ordinary course of the said activities. Throughout the material part of the said period, the computer
was operating properly or, if not, then in respect of any period in which it was not operating properly
or was out of operation during that part of the period, was not such as to affect the electronic record or
the accuracy of its contents. The information contained in the electronic record reproduces or is
derived from such information fed into the computer in the ordinary course of the said activities.

5. I occupy a responsible official position in relation to the operation of the relevant device.
or
5. I occupy a responsible official position in relation to the relevant activities

Signed on: 20-Oct-2024


Name: MOHAMAD MAGDOM AMIYAZ S/O MOHAMED ABDUL NASZER
Father's name:
Address:
Designation:
Organization
Annexure A: Access Control List (ACL)
Category of Digital Evidence:
Digital Evidence from Operating System (Non-Volatile Data)

Brief Explanation of Category of Digital Evidence:


Operating System data exists in both non-volatile and volatile states. Non-volatile data refers to data
that persists even after a computer is powered down, such as a filesystem stored on a hard drive.
Volatile data refers to data on a live system that is lost after a computer is powered down, such as the
current network connections to and from the system. The primary source of non-volatile data within
an Operating System is the filesystem. The filesystem is also usually the largest and richest source of
data within the Operating System, containing most of the information recovered during a typical
forensic event. The filesystem provides storage for the Operating System on one or more media.
Types of data that are commonly found within Operating System file-systems are as Configuration
Files, Users and Group, Password Files, and Scheduled Jobs.

Source of Digital Evidence:


Access Control List (ACL)

Brief Explanation of Source of Digital Evidence:


An access control list (ACL), with respect to a computer file system, is a list of permissions attached
to an object. An ACL specifies which users or system processes are granted access to objects, as well
as what operations are allowed on given objects. Each entry in a typical ACL specifies a subject and
an operation. For instance, if a file object has an ACL that contains (Arti: read,write; Rohit: read), this
would give Arti permission to read and write the file and Rohit to only read it.
Annexure B: Details of Computer Resource
Describe the printer or optical or magnetic media.
Annexure C: Manner in which the COMPUTER OUTPUT was
produced

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy