Define how the parameters of search and seizure

Assignment Help Other Subject
Reference no: EM131575260

Project #1 - Understanding Investigative Parameters

Instructions

Project #1 - Understanding Investigative Parameters

No directly quoted material may be used in this project paper. Resources should be summarized or paraphrased with appropriate in-text and Resource page citations.

Scenario Characters:

You: Information Security Specialist, Greenwood Company

Hubert Jenkins: Human Resources Director, Greenwood Company

Mike McBride: (former) engineer, New Product's Division, Greenwood Co.

**Characters will carry through Project 1, 2 and the Final Project. However, please remain conscious of who you are/what roll you play in

EACH project and in regards to specific questions.

For the purposes of this project, imagine you are an Information Security (InfoSec) Specialist, an employee of the Greenwood Company and assigned to the company's Incident Response Team.

In this case, you have been notified by Mr. Hubert Jenkins, Human Resources Director for the Greenwood Company, that the company has just terminated Mr. Mike McBride, a former engineer in the company's New Products Division, for cause (consistent tardiness and absences from work). Mr. Jenkins tells you that at Mr. McBride's exit interview earlier that day, the terminated employee made several statements to the effect of "it is okay because I have a new job already and they were VERY happy to have me come from Greenwood, with ALL I have to offer."

McBride's statements made Mr. Jenkins fear he might be taking Greenwood's intellectual property with him to his new employer (undoubtedly a Greenwood competitor). In particular, Mr. Jenkins is worried about the loss of the source code for "Product X," which the company is counting on to earn millions in revenue over the next three years. Mr. Jenkins provides you a copy of the source code to use in your investigation. Lastly, Mr. Jenkins tells you to remember that the Company wants to retain the option to refer the investigation to law enforcement in the future, so anything you do should be with thought about later potential admissibility in court.

The 4th Amendment to the U.S. Constitution reads, "The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no warrants shall issue, but upon probable cause, supported by oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized." While the 4th Amendment is most commonly interpreted to only affect/restrict governmental power (e.g., law enforcement), the fact that a formal criminal investigation is a possibility (and the Company has no desire to be named in a civil lawsuit) means you must consider its effect to your actions.

With the above scenario in mind, thoroughly answer the following questions (in paragraph format, properly citing materials used in this course as well as outside research, where appropriate).

Prior to any incident happening, it is important for any company to implement a "forensic readiness" plan. Discuss the benefits of a forensic readiness plan and name what you believe are the top three (3) requirements to establish forensic readiness within a private sector business.

Support your answers. (Please note that while cyber security and digital forensics have overlaps in incident response preparation, please limit your answers here to forensic readiness in the digital forensic arena, not cyber security.)

Each questions should be answered with a minimum of 1-2 paragraphs, so be specific, be detailed, and demonstrate your knowledge;

1. Mr. Jenkins, out of concern for the theft/sharing of the "Product X" source code, is requesting that you or your supervisor start searching the areas in which Mr. McBride had access within the building. Can you or Mr. McBride's supervisor search McBride's assigned locker in the Company's on-site gym for digital evidence? Support your answer.

Each questions should be answered with a minimum of 1-2 paragraphs, be specific, be detailed, and demonstrate your knowledge;

2. Can you or Mr. McBride's supervisor use a master key to search McBride's locked desk for digital evidence, after McBride has left the premises? Support your answer.

Each questions should be answered with a minimum of 1-2 paragraphs, be specific, be detailed, and demonstrate your knowledge;

3. The police have not been called or involved yet, however, Mr. Jenkins asks how involving the police will change your incident response.

Develop a response to Mr. Jenkins that addresses how the parameters of search and seizure will change by involving the police in the investigation at this time. Support your answer.

Each questions should be answered with a minimum of 1-2 paragraphs, be specific, be detailed, and demonstrate your knowledge;

4. There is a page in the Company's "Employee Handbook" that states that anything brought onto the Company's property, including the employees themselves, are subject to random search for items belonging to the Company. There is a space for the employee to acknowledge receipt of this notice. Mr. McBride has a copy of the handbook but never signed the page. Does that matter? Explain.

Each questions should be answered with a minimum of 1-2 paragraphs, be specific, be detailed, and demonstrate your knowledge;

5. Greenwood Company uses a security checkpoint at the entrance to the building. A sign adjacent to the checkpoint states that the purpose of the checkpoint is for security staff to check for weapons or other materials that may be detrimental to the working environment or employee safety. Screening is casual and usually consists of verification of an employee's Company ID card. Can security staff at this checkpoint be directed to open Mr. McBride's briefcase and seize any potential digital evidence? Support your answer.

Each questions should be answered with a minimum of 1-2 paragraphs, be specific, be detailed, and demonstrate your knowledge;

6. You know that it is important to document the details of your investigation if the company wants to insure admissibility of any evidence collected in the future. However, Mr. Jenkins has never heard of the term "chain of custody." Write an explanation to Mr. Jenkins of what the chain of custody is, why it is important, and what could occur if the chain of custody is not documented. Support your answer.

Each questions should be answered with a minimum of 1-2 paragraphs, be specific, be detailed, and demonstrate your knowledge;

Reference no: EM131575260

Questions Cloud

Assess your satisfaction with the company you researched : Assess your satisfaction with the company you researched and make recommendations about how that company could modify its business-level strategy.
Develop a profile of the so-called perfect candidate : Develop a profile of the so-called perfect candidate to participate in an intensive supervised probation program
Develop an analysis from the results : Develop an analysis of 250 words from the results, addressing your organization's readiness level, possible project barriers and facilitators.
Determine the companys capabilities and core competencies : Determine the company's resources, capabilities, and core competencies. Give your opinion on corporation's greatest strengths and most significant weaknesses.
Define how the parameters of search and seizure : Develop a response to Mr. Jenkins that addresses how the parameters of search and seizure will change by involving the police in the investigation at this time
Analyze how your company applies compensation practice : Analyze how your company applies compensation practice to determine the positive or negative impact to the company and its stakeholders.
Develop an initial reference list to assure : Develop an initial reference list to assure that there is adequate literature to support your evidence-based practice project.
What is distributed hash table : General Review of DHT - What is distributed hash table (DHT)? How is the hash function performed in DHT? What distributed services can be built on DHT
The united states government to fight identity theft : United States government is not doing enough to fight identity theft

Reviews

Write a Review

Other Subject Questions & Answers

  Cross-cultural opportunities and conflicts in canada

Short Paper on Cross-cultural Opportunities and Conflicts in Canada.

  Sociology theory questions

Sociology are very fundamental in nature. Role strain and role constraint speak about the duties and responsibilities of the roles of people in society or in a group. A short theory about Darwin and Moths is also answered.

  A book review on unfaithful angels

This review will help the reader understand the social work profession through different concepts giving the glimpse of why the social work profession might have drifted away from its original purpose of serving the poor.

  Disorder paper: schizophrenia

Schizophrenia does not really have just one single cause. It is a possibility that this disorder could be inherited but not all doctors are sure.

  Individual assignment: two models handout and rubric

Individual Assignment : Two Models Handout and Rubric,    This paper will allow you to understand and evaluate two vastly different organizational models and to effectively communicate their differences.

  Developing strategic intent for toyota

The following report includes the description about the organization, its strategies, industry analysis in which it operates and its position in the industry.

  Gasoline powered passenger vehicles

In this study, we examine how gasoline price volatility and income of the consumers impacts consumer's demand for gasoline.

  An aspect of poverty in canada

Economics thesis undergrad 4th year paper to write. it should be about 22 pages in length, literature review, economic analysis and then data or cost benefit analysis.

  Ngn customer satisfaction qos indicator for 3g services

The paper aims to highlight the global trends in countries and regions where 3G has already been introduced and propose an implementation plan to the telecom operators of developing countries.

  Prepare a power point presentation

Prepare the power point presentation for the case: Santa Fe Independent School District

  Information literacy is important in this environment

Information literacy is critically important in this contemporary environment

  Associative property of multiplication

Write a definition for associative property of multiplication.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd