A log shows that a user has copied proprietary data to his computer. The organization wants to
Question:
A log shows that a user has copied proprietary data to his computer. The organization wants to take legal action against him, so it seizes the computer as evidence. What should be established as soon as the computer is seized?
A. Chain of command
B. Forensic chain
C. Permission from the user
D. Chain of custody
E. All of the above
Fantastic news! We've Found the answer you've been seeking!
Step by Step Answer:
Related Book For
Managing Risk In Information Systems
ISBN: 9781284193602
3rd Edition
Authors: Darril Gibson, Andy Igonor
Question Posted: