0% found this document useful (0 votes)
12 views

Electronic Evidence Mind Mapping

The document outlines the processes involved in digital forensic investigation, focusing on evidence acquisition, preservation, and analysis. It details types of evidence, admissibility considerations, and the importance of maintaining a chain of custody, as well as legal compliance and integrity of evidence. Additionally, it emphasizes the use of approved forensic tools and secure storage methods to ensure the reliability and authenticity of collected digital evidence.

Uploaded by

Philipp A Isla
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as XLSX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
12 views

Electronic Evidence Mind Mapping

The document outlines the processes involved in digital forensic investigation, focusing on evidence acquisition, preservation, and analysis. It details types of evidence, admissibility considerations, and the importance of maintaining a chain of custody, as well as legal compliance and integrity of evidence. Additionally, it emphasizes the use of approved forensic tools and secure storage methods to ensure the reliability and authenticity of collected digital evidence.

Uploaded by

Philipp A Isla
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as XLSX, PDF, TXT or read online on Scribd
You are on page 1/ 3

0 1

Central Node: Digital Forensic


Investigation and Evidence
Acquisition.
Evidence Acquisition: Collection,
Preparation, imaging, and chain of
custody.
2 2

A. Evidence Collectio:
Preparation, imaging, and chain
of custody
1. Types of Evidence:

2. Admissibility
Considerations:

3. Chain of Custody:

4. Tools and Techniques:

B. Evidence Preservation:
Evidence Preservation:
Hashing, secure storage, and
limited access
1. Integrity of Evidence:

2. Legal Compliance:

C. Evidence Analysis
1. Authentication:

2. Evidentiary Weight:

3. Special Cases
2

Electronic Documents: Emails, logs, digital files, databases.


Ephemeral Communications: Text messages, chat logs, phone calls.
Audio/Video Evidence: Surveillance footage, voice recordings.
Photographic Evidence: Screenshots, digital camera captures.

Ensure compliance with Rule 3, Sec. 2 (authentication and reliability).


Best Evidence Rule under Rule 4, Sec. 1 and 2.

Document handling from seizure to court presentation.


Follow protocols for preservation to ensure data integrity
Approved forensic tools for data acquisition.
Use imaging software to create bit-by-bit copies.

Use secure storage for collected evidence (e.g., sealed drives, tamper-
proof bags).
Secure warrants as required for accessing devices or systems.
Adhere to the Data Privacy Act (R.A. 10173) to avoid mishandling
private information.
Secure warrants as required for accessing devices or systems.

o Electronic Documents: Prove authenticity as per Rule 5, Sec. 2


(digital signatures, integrity tests)
o Electronic Signatures: Authenticate using Rule 6, Sec. 2 (digital
signature methods)
Evaluate factors per Rule 7, Sec. 1, including
Reliability of generation/storage methods
System integrity and accuracy
o Audio/Video/Photo Evidence: Authenticate and explain recordings as
per Rule 11, Sec. 1.
o Ephemeral Communications: Prove via testimony or recorded
evidence per Rule 11, Sec. 2.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy