After you record the scene and shut down the system, you bag and tag the evidence. Describe the steps to follow for bagging and tagging evidence.?

What will be an ideal response?


The following steps are to be followed when bagging and tagging evidence: Assign one person, if possible, to collect and log all evidence. Minimize the number of people handling evidence to ensure its integrity.Ta?g all the evidence you collect with the current date and time, serial numbers or unique features, make and model, and name of the person who collected it.Maintain two separate logs of collected evidence to be reconciled for audit control purposes and to verify everything you have collected.Maintain constant control of the collected evidence and the crime or incident scene.

Computer Science & Information Technology

You might also like to view...

The _________ , or hypervisor, abstracts the physical hardware from the virtual machines it supports.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Animation that moves an object or text off the screen is called a(n) ________ effect

Fill in the blank(s) with correct word

Computer Science & Information Technology

Each Office application's start page displays:

A) posts. B) recent documents. C) home pages. D) contacts.

Computer Science & Information Technology

Most business documents are best formatted using an 11- or 12-point serif font

Indicate whether the statement is true or false

Computer Science & Information Technology