Understanding Investigative Parameters

 No directly quoted material may be used in this project paper. Resources should be summarized or paraphrased with appropriate in-text and Resource page citations. For the purposes of this project, imagine you are a Data Security Analyst, an employee of the Allied Technology Systems and assigned to the company’s Data Protection Team. In this case, you have been notified by Mr. Devin Roberts, Human Resources Director for Allied Technology Systems, that the company has just terminated Mr. Keith Jackson, a former engineer in the company’s New Products Division, for cause (consistent tardiness and absences from work). Mr. Roberts tells you that during Mr. Jackson’s exit interview earlier that day, the terminated employee made several statements to the effect of “it is okay because I have a new job already and they were VERY happy to have me come from ATS, with ALL I have to offer.” Jackson’s statements made Mr. Roberts fear he might be taking Allied’s intellectual property with him to his new employer (undoubtedly a competitor). In particular, Mr. Roberts is worried about the loss of the source code for “Product X,” which the company is counting on to earn millions in revenue over the next several years. Mr. Roberts provides you a copy of the source code to use in your investigation. Lastly, Mr. Roberts tells you to remember that the Company wants to retain the option to refer the investigation to law enforcement in the future, so anything you do should be with thought about later potential admissibility in court. The 4th Amendment to the U.S. Constitution reads, “The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no warrants shall issue, but upon probable cause, supported by oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.” While the 4th Amendment is most commonly interpreted to only affect/restrict governmental power (e.g., law enforcement), the fact that a formal criminal investigation is a possibility (and the Company has no desire to be named in a civil lawsuit) means you must consider its effect to your actions. With the above scenario in mind, thoroughly answer the following questions (in paragraph format, properly referring to and citing materials used in this course as well as outside research, where appropriate, and within a reference page at the end of the project paper). 1. Prior to any incident happening, it is important for any company to implement a “forensic readiness” plan. Discuss the benefits of a forensic readiness plan and name what you believe are the top three (3) requirements to establish forensic readiness within a private sector business like Allied Technology Systems. Support your answers. (Please note that while cyber security and digital forensics have overlaps in incident response preparation, please limit your answers here to forensic readiness in the digital forensic arena, not cyber security.) 2. Mr. Roberts, out of concern for the theft/sharing of the “Product X” source code, is requesting that you, your supervisor, or Mr. Dewberry start searching the areas in which Mr. Jackson had access within the building. Can you or Mr. Dewberry search Jackson’s assigned locker in the Company’s on-site gym for digital evidence? Support your answer. 3. Can you or Mr. Dewberry use a master key to search Jackson’s locked desk for digital evidence, after Keith Jackson has left the premises? Support your answer. 4. The police have not been called or involved yet, however, Mr. Roberts asks how involving the police will change your incident response. Describe how you will respond to Mr. Roberts concerning how the parameters of search and seizure will change by involving the police in the investigation at this time. Support your answer. 5. There is a page in the Company’s “Employee Handbook” that states that anything brought onto the Company’s property, including the employees themselves, are subject to random search for items belonging to Allied Technology Systems. There is a space for the employee to acknowledge receipt of this notice. Mr. Jackson has a copy of the handbook but never signed the receipt page. Does that matter? Explain. 6. Allied Technology Systems uses a security checkpoint at the entrance to the building. A sign adjacent to the checkpoint states that the purpose of the checkpoint is for security staff to check for weapons or other materials that may be detrimental to the working environment and employee safety. Screening is casual and usually consists of verification of an employee’s Company ID card. Can security staff at this checkpoint be directed to open Mr. Jackson’s briefcase and seize any potential digital evidence? Support your answer. 7. You know that it is important to document the details of your investigation if the company wants to insure admissibility of any evidence collected in the future. However, Mr. Roberts has never heard of the term “chain of custody.” How would you explain to Mr. Roberts what the chain of custody means, why it is important, and what could occur if the chain of custody is not documented. Support your answer. Project Requirements: • Each question should be answered with a minimum of 1 paragraphs, so do your research, be specific, be detailed, and demonstrate your knowledge; submitting your project through the appropriate assignment folder. • Answers to the above questions should be submitted in a single Microsoft Word document (.DOC/.DOCX), with answers separated and/or numbered in respect to the question, so as to make it clear which question is being answered. It may be in a question and answer format, or as described with answers to the associated question numbers; • The paper should be written in third-person grammar, not first person (I, me, myself, etc.); • The submission is to have a cover page that includes course number, course title, title of paper, student’s name, and the date of submission per APA writing format; • Format: 12-point font, double-space, one-inch margins;

#Understanding #Investigative #Parameters

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

Analyze the potential financial impacts of hiring a new health

Instructions For this assessment, you will create two deliverables. First, create a 2–3-page executive summary that summarizes the need for the position; this will be presented to leadership prior to posting the job description and advertising it to potential candidates. Second, create a 1–2-page job description detailing the position of

Many new technologies are becoming available within nursing care, such

Many new technologies are becoming available within nursing care, such as home dialysis equipment or new infusion pumps that change the nursing staff’s daily routines. In addition, all kinds of technologies that support distant care, such as telecare technology, have consequences for nursing practice. Another development is the introduction of

Instructions For this assignment, you will read a case and

Instructions For this assignment, you will read a case and answer a series of questions concerning an analysis of ethical considerations governing marketing practices, as leaders are responsible for such endeavors. Begin by reading the following case, which can be located within the Business Source Ultimate database of the CSU

Compare and contrast the late nineteenth century industrialization process in

 Compare and contrast the late nineteenth century industrialization process in the United States to that of other industrializing countries. Why did the process come as quickly and completely as it did? Why did one historian characterize the post civil war era as “The Great Barbeque?” What did Twain suggest about

Have a conversation with your classmates on your favorite. Define

Premium Paper Help is a professional writing service that provides original papers. Our products include academic papers of varying complexity and other personalized services, along with research materials for assistance purposes only. All the materials from our website should be used with proper references.

Coaching – Human Resources Case Study

STEPS TO WRITE THE CASE STUDY: 1. Please use the following attached file for case study format and structure • Case_Study_format • Instruction 2. The case study write of should be completely based off of the following two attached files: • Story • Case study Source 3. When writing the

My first assignment; I received a 29 out of 50

  My first assignment; I received a 29 out of 50 which is a F. Please read the feedback from my instructor on the first assignment to improve on the second assignment. I have attached the first assignment and instruction to help you with the second assignment.  The assignment is Research

There has been a significant trend toward more victim involvement

There has been a significant trend toward more victim involvement in the criminal justice system in recent years. Legislation has been passed to provide victims with certain rights, and there has been a movement to alter the U.S. Constitution with an amendment concerning victims’ rights. Victims have also participated in

Please see attached for details! Please read the scenario below,

Please see attached for details! Please read the scenario below, and then answer the questions that follow in a 3-page analysis. The questions will guide your analysis of the situation, but they need to be presented as part of the discussion preparation that you are completing for your boss. Scenario:

Intellectual property includes copyrights, trademarks, patents and trade secrets. For

  Intellectual property includes copyrights, trademarks, patents and trade secrets. For each of these four intellectual properties, write a paper that: Provides an explanation of the intellectual property Describes the law and how it protects each intellectual property Describes typical violations of the law Describes how to remain in compliance

Identify at least four challenges to deploying new innovations in both

Write a report in which you outline your strategy to deploy new innovations in both a local and global context. Be sure to include the following: 1.Include an executive summary as the first page of your report. 2.Identify at least four challenges to deploying new innovations in both a local

Chapter 13 In describing the role of the therapist in

Chapter 13 In describing the role of the therapist in structural family therapy, the therapist should never be a ‘player’ in the family interaction, but instead works to change the family structure without becoming a part of it. Discuss how this can be done and why it is important to

Mythology is a subject that I am unfortunately not familiar

Mythology is a subject that I am unfortunately not familiar with, even though I have always found it quite interesting to hear about. My roommate just so happens to be Greek, so she and her family have greek God sculptures and artworks everywhere. To be honest, the only God I

Companies often use leverage to augment profits. Based on what

 Companies often use leverage to augment profits.  Based on what you learned this week, please explain the following in detail: With regards to Operating Leverage, please explain why a company with HIGH Operating Leverage faces greater financial risk in a declining sales period compared to a company with LOW Operating

Topic 7 DQ 1 Disseminating the results of evidence-based practice

  Topic 7 DQ 1 Disseminating the results of evidence-based practice projects is important in nursing practice. The dissemination informs nurses about new practice interventions that can be adopted to improve care outcomes. Internal and external methods can be used to achieve the objective. The internal method that would be adopted