Explain the usual process for maintaining a chain of custody.

What will be an ideal response?

The usual process is that the field investigator maintains personal custody and control of the sealed item until it is logged into the chain of custody log at the evidence storage room. Each time the item is removed (for analysis, copying, etc.), it is logged out, forming a documented trail of who accessed the information and when that access occurred.

Computer Science & Information Technology

You might also like to view...

Which of the following Linux commands can be used for block file copy and for hard disk backup and restore?

a. rdiff b. dd c. pwd d. xcopy

Computer Science & Information Technology

Identify the following statements which will: Format a string to contain the word “Name” in a column of 20 characters wide, followed by the word “Address” in a second column, also 20 characters wide.

a. String.Format(“{0, 20}{1, 20}”, “Name”, “Address”) b. String.Format(“{ 20}{ 20}”, “Name”, “Address”) c. String.Format(20, 20, “Name”, “Address”) d. String.Format(20, 40, “Name”, “Address”)

Computer Science & Information Technology