0% found this document useful (0 votes)
22 views13 pages

Procedure For Seizing and Collecting Digital Evidence

Uploaded by

jovina dimacale
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
22 views13 pages

Procedure For Seizing and Collecting Digital Evidence

Uploaded by

jovina dimacale
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 13

Procedure for

Seizing and
Collecting
Digital
Evidence
Understand the importance
of proper procedures in
handling digital evidence.

Learn the steps for seizing


Objectives and collecting digital
evidence.

Highlight best practices to


maintain the integrity of
evidence.
What is Digital Evidence?

Definition Any information stored or


of Digital transmitted in digital form
that may be
Evidence Examples:
Emails, texts,
documents, images,
used in legal videos.
Metadata, logs, internet
proceedings. browsing history.
Data on computers,
mobile devices, and
cloud storage.
Importance of Proper Handling

Ensures Maintains
admissibility in evidence
court. integrity.

Supports Prevents
successful accusations of
prosecution of tampering or
cybercrimes. contamination.
Legal Basis

R.A. 10175
(Cybercrime
Defines rules for evidence handling.
Prevention Act of
2012):

Rules on Electronic
Admissibility of digital evidence in legal proceedings.
Evidence:

Chain of Custody
Ensures evidence authenticity.
Requirements:
Procedure for Seizing Digital Evidence

Preparation Securing the Scene Identification of


Evidence
Obtain proper authorization Ensure safety and restrict Locate devices, storage media,
(warrant, consent). access to the area. and other potential sources of
Assemble the necessary tools Identify and isolate devices to data.
and personnel. prevent tampering. Take note of device status (on,
off, connected to networks).
Collection of Digital Evidence

Document the Preserve Evidence Label and Package


Evidence Integrity Devices
Take photographs or videos of the Avoid altering or tampering with Assign unique identifiers to each
devices and surroundings. the device. item.
Record serial numbers, device Use write blockers to prevent Seal devices in anti-static bags to
models, and physical condition. changes to data. prevent damage.
Securing Digital Data

Imaging the Hashing: Documentatio


Data:
Create exact copies Generate hash values n:step taken
Record every
(forensic images) of (MD5/SHA-1) to verify during the collection
digital evidence. data integrity. process.
Use tools like EnCase, FTK
Imager, or open-source
tools.
Chain of Custody

Definition: The chronological documentation showing the


seizure,

custody, control, transfer, analysis, and disposition of


evidence.
• Key Elements:
• Date and time of collection.

Name and signature of individuals handling the evidence.

Purpose of each transfer.


Storage and Preservation

STORE EVIDENCE IN A LIMIT ACCESS TO REGULARLY VERIFY


SECURE, TEMPERATURE- AUTHORIZED INTEGRITY USING HASH
CONTROLLED PERSONNEL. VALUES.
ENVIRONMENT.
Challenges in Seizing Digital Evidence

Devices with encryption Cloud-based evidence Volatile data (e.g., RAM Cross-border jurisdiction
or password protection. requiring additional content) that may be issues in accessing
legal steps. lost if not captured remote servers.
immediately.
Best Practices

Have Always have legal authority (search warrant or consent).

Document Document every action meticulously.

Use Use certified forensic tools and trained personnel.

Maintain the chain of custody to ensure admissibility in


Maintain court.
Conclusion

Proper procedures in crucial for successful Integrity, Continuous training


seizing and investigations and authenticity, and and adherence to
collecting digital prosecution. legality must always best practices are
evidence are be upheld. essential.

You might also like