Explain the usual process for maintaining a chain of custody.

What will be an ideal response?


The usual process is that the field investigator maintains personal custody and control of the sealed item until it is logged into the chain of custody log at the evidence storage room. Each time the item is removed (for analysis, copying, etc.), it is logged out, forming a documented trail of who accessed the information and when that access occurred.

Computer Science & Information Technology

You might also like to view...

The __________ mode of operation is designed to be parallelizable so that it can provide high throughput with low cost and low latency.

A. DAA B. CCM C. GCM D. CTR

Computer Science & Information Technology

Case-Based Critical Thinking QuestionsCase 2-1Megan is having a lot of fun with Adobe Flash CS6 because she is an excellent artist with a knack for quickly learning new software and applying her considerable artistic skills to her multimedia work. Megan began to use the Eyedropper tool when the phone rang. After she returns to her laptop, she glances at the screen. How does she know if the last thing she did was to click a fill?

A. The pointer has changed to an eyedropper and paintbrush. B. The pointer has changed to an eyedropper. C. The pointer has changed to a paint bucket. D. The pointer has changed to an inkwell.

Computer Science & Information Technology

When you add a custom field to a query, you need to enter a(n) ________ after the field name

Fill in the blank(s) with correct word

Computer Science & Information Technology

‘____' is not one of the forms of ethical standards in Davis' model.

A. Principles B. Laws C. Rules D. Ideals

Computer Science & Information Technology