SlideShare ist ein Scribd-Unternehmen logo
1 von 6
Downloaden Sie, um offline zu lesen
Codes of Practice and
Conduct
Appendix: Digital Forensic Services

FSR-C-107-001

Consultation Draft




  This is a consultation draft and therefore should not be regarded or used as a standard. This draft is issued to allow comments
  from interested parties; all comments will be given consideration prior to publication. Comments should be sent to
  FSRConsultation2@homeoffice.gsi.gov.uk using the form available from http://www.homeoffice.gov.uk/agencies-public-
  bodies/fsr/ and should be submitted by 10 MARCH 2013. This mailbox is not for general correspondence and is not routinely
  monitored so no acknowledgement will normally be sent.
  THIS DRAFT IS NOT CURRENT BEYOND 10 MARCH 2013.




© Crown Copyright 2012

The text in this document (excluding the Forensic Science Regulator’s logo and material quoted from other sources) may be
reproduced free of charge in any format or medium providing it is reproduced accurately and not used in a misleading context. The
material must be acknowledged as Crown Copyright and its title specified.
Codes of Practice and Conduct




1.         INTRODUCTION

1.1.1      The provider of digital forensic science (the provider) shall comply with the
           Codes of Practice and Conduct (the Codes) and be accredited to BS EN
           ISO/IEC 17020:2004 for any crime scene activity and BS EN ISO/IEC
           17025:2005 for any laboratory function (such as the recovery or imaging of
           electronic data).

1.1.2      This appendix provides further explanation of some of the requirements of the
           Codes specifically pertaining to the provision of digital analysis.

1.1.3      This appendix should be read alongside with the Codes, BS EN ISO/IEC
           17025:2005 and ILAC-G19 and will generally follow the heading titles used in
           the Codes with cross references to ISO 17025:2005 given in parentheses.

2.         SCOPE
2.1.1      This appendix covers digital forensics work only as it applies to the
           identification, capture, preservation, investigation, evaluation, reporting and
           storage of data on digital data storage devices and mobile phone devices.

3.         TECHNICAL RECORDS (ISO 17025:2005, 4.13.2)
3.1.1      The provider shall include in policies and procedures, appropriate to the device
           and/or scope of the planned activity, which incorporate:

           a.   Keeping a record of the state, mode and physical condition of any seized
                device and any potentially relevant information; and
           b.   Labelling the components of the device and taking legible photographs
                (screen, computer front and back, and the area around the device to be
                seized) and/or sketching of the device’s connections and surrounding area
                where relevant.

3.1.2      A contemporaneous audit trail to be retained, to show all changes to the data
           without obscuring the original data. It shall be possible to associate all changes
           to data with the person having made those changes, for example by the use of
           timed and dated (electronic) signatures. Reasons for changes shall be given.

3.1.3      The provider shall ensure that an audit trail is created and preserved for all
           processes or methods applied to computer-based electronic evidence, to the

FSR-C-107-001 Consultation Draft                                                   Page 2 of 6
Codes of Practice and Conduct



           extent that an independent third party would be able to examine and repeat the
           processes and achieve the same result.

4.         TEST METHODS AND METHOD VALIDATION

4.1        Selection of methods (ISO 17025:2005, 5.4.22)
4.1.1      With consideration of any instructions from the customer the provider shall
           consider, in the context of each specific case and the type of evidence being
           sought (e.g. photographs, spreadsheets, documents, databases, financial
           records), the potential value of obtaining:

           a.   Additional information regarding the case (e.g. aliases, e-mail accounts, e-
                mail addresses, ISP used, names, network configuration and users,
                system logs, passwords, user names);additional digital evidence (e.g. by
                sending a preservation order to an Internet Service Provider (ISP),
                identifying remote storage locations, obtaining e-mail); and
           b.   The relevance of peripheral components to the investigation (for example,
                in forgery or fraud cases, non-computer equipment such as laminators,
                credit card blanks, cheque paper, scanners, and printers; in child
                pornography cases, digital cameras).

4.1.2      The provider shall take account of the need for backup and redundancy when
           working on cases, to ensure that a single technical failure (e.g. a power loss or
           disk corruption) will not result in loss of data on working copies.

4.1.3      Software, hardware and software tools whose operation has an impact in
           obtaining results will require validation, or any existing validation to be verified,
           as laid out in section 5, Validation of methods.

4.1.4      The provider shall ensure that, for the range of digital forensics tools it uses, the
           validation requirements take account of staff competency levels, the nature and
           difficulty of the tasks to be carried out, and the level of acceptance of the tool in
           the wider forensic science and criminal justice community.




FSR-C-107-001 Consultation Draft                                                      Page 3 of 6
Codes of Practice and Conduct



5.         VALIDATION OF METHODS

5.1        Risk assessment of the method
5.1.1      The risk assessment process detailed in the Codes is intended to determine the
           impact of the overall method and the operation of deployed software tools in the
           digital forensic science process may have. It is important to look at how the how
           the method or tool is to be used, the configuration and to systematically look at
           the types of risk that might occur. For instance, when imaging storage media,
           the risks may include:

           a.    Writing onto the evidential machine storage;
           b.    Returning incomplete and/or misleading data; or
           c.    Incorrectly determining the media to be unreadable.

5.1.2      In certain parts of the process, the competent use of a suite of software tools or
           the use of visual/manual checks could be demonstrated to mitigate the
           identified risks in the method. Proper consideration of the nature of risks at this
           stage should feed into the development of the method as well as the validation
           strategy.

5.1.3      The development of the forensic science process and the subsequent validation
           shall set out how the identified risks are being addressed and how the
           effectiveness of the action will be tested along with the end-user requirements.

5.2        Validation of measurement based methods (Codes, 20.8)

5.2.1      Measurement based methods can include extraction processes using
           automated tools or manual methods for the purpose of providing data.

5.2.2      Any of the functional and performance requirements listed a-m under paragraph
           29 in this section of the Codes may be applicable, however it is expected that
           the following from the list in section 20.8.2 of the Codes shall normally be given
           greater consideration for software or digital applications:

           a.    The competence requirements of the analyst/user;
           b.    Environmental constraints;
           ...




FSR-C-107-001 Consultation Draft                                                    Page 4 of 6
Codes of Practice and Conduct



           f.   The ability of the sampling process to provide a representative sample of
                the exhibit;

           l.   The results are consistent, reliable, accurate, robust and with an
                uncertainty measurement; and

           m.   The limitations of applicability.

5.3        Verification of the validation of adopted methods (Codes, 20.10)

5.3.1      In most cases adopted methods or software tools and scripts should follow a
           tailored process for the validation of measurement based methods. However, as
           an adopted method would normally be expected to be already well supported
           through documentation, available validation studies, testing-house studies or
           published papers much of the required work may only require verifying as
           detailed in the Codes.

5.3.2      There is a requirement in the Codes for the production of an available library of
           documents relevant to the authorisation of the method and production of the
           certificate of validation completion.

5.3.3      The final requirement in the Codes is to demonstrate the method works in the
           hands of the intended users.

5.4        Verification of minor changes in methods

5.4.1      Methods are validated to a specific configuration; therefore any changes in any
           constituent parts (hardware, firmware, script, operating system etc.) may affect
           its overall operation and any dependant systems which could invalidate the
           results.

5.4.2      Any proposed change should be risk assessed at the method level as even a
           patch in a software tool may adversely affect the operation of a second tool or
           process using its output e.g. giving a plausible but incorrect date stamp. Other
           examples include at tool inadvertently becoming write-enabled through a
           firmware update.




FSR-C-107-001 Consultation Draft                                                  Page 5 of 6
Codes of Practice and Conduct



5.5        Implementation plan and any constraints

5.5.1      The implementation plan is required to include monitoring of controls and
           communication which in the digital forensic sciences should include
           configuration management, dependencies, how identified
           software/firmware/hardware bugs are to be handled and how patches etc. are to
           be controlled (see Verification of minor changes in methods).

6.         HANDLING OF TEST ITEMS (ISO 17025:2005, 5.8)

6.1        Exhibit handling, protection and storage

6.1.1      The provider shall ensure that the value of any other type of evidence that may
           be present is not compromised during the capture, preservation and
           investigation of the digital evidence.

6.1.2      The provider shall ensure that devices containing potential digital evidence are
           packaged, sealed and transported in such a way as to protect the integrity of
           the digital evidence.

6.1.3      There are two main issues to consider in the transporting of digital evidence:

           a.   The security of the device and digital evidence to ensure that access to it
                is correctly supervised when moving it from the scene to the laboratory or
                other location; and

           b.   Protection of the device and digital evidence to ensure that it is not
                affected by physical shock, electromagnetic interference, extremes of heat
                and humidity or other environmental hazard.




FSR-C-107-001 Consultation Draft                                                   Page 6 of 6

Weitere ähnliche Inhalte

Was ist angesagt?

CSV - Computer System Validation
CSV - Computer System Validation CSV - Computer System Validation
CSV - Computer System Validation JayaKrishna161
 
Computer system validations
Computer system validations Computer system validations
Computer system validations Saikiran Koyalkar
 
21 CFR Part11_CSV Training_Katalyst HLS
21 CFR Part11_CSV Training_Katalyst HLS21 CFR Part11_CSV Training_Katalyst HLS
21 CFR Part11_CSV Training_Katalyst HLSKatalyst HLS
 
Computer System Validation Training
Computer System Validation TrainingComputer System Validation Training
Computer System Validation TrainingNetZealous LLC
 
Process and Regulated Processes Software Validation Elements
Process and Regulated Processes Software Validation ElementsProcess and Regulated Processes Software Validation Elements
Process and Regulated Processes Software Validation ElementsArta Doci
 
IRJET- A Survey for Block Chaining based Cyber Security System for Fiscal Dev...
IRJET- A Survey for Block Chaining based Cyber Security System for Fiscal Dev...IRJET- A Survey for Block Chaining based Cyber Security System for Fiscal Dev...
IRJET- A Survey for Block Chaining based Cyber Security System for Fiscal Dev...IRJET Journal
 
Computer-System-Validation
Computer-System-ValidationComputer-System-Validation
Computer-System-ValidationHal Plant
 
Csv 21 Cfr11
Csv 21 Cfr11Csv 21 Cfr11
Csv 21 Cfr11aquitazol
 
Computerized system validation_final
Computerized system validation_finalComputerized system validation_final
Computerized system validation_finalDuy Tan Geek
 
CISA exam 100 practice question
CISA exam 100 practice questionCISA exam 100 practice question
CISA exam 100 practice questionArshad A Javed
 
Computer System Validation
Computer System ValidationComputer System Validation
Computer System ValidationEric Silva
 
21 cfr part 11 an approach towards compliance
21 cfr part 11   an approach towards compliance21 cfr part 11   an approach towards compliance
21 cfr part 11 an approach towards compliancedeepak mishra
 
WP_UL Compliance wth 21CFR Part_11
WP_UL Compliance wth 21CFR Part_11WP_UL Compliance wth 21CFR Part_11
WP_UL Compliance wth 21CFR Part_11Jamie Corn, MBA
 
Computer system validation review article by-mahesh b wazade
Computer system validation review article by-mahesh b wazadeComputer system validation review article by-mahesh b wazade
Computer system validation review article by-mahesh b wazadeMahesh B. Wazade
 
Achieving a 21 CFR Part 11 Compliant eTMF
Achieving a 21 CFR Part 11 Compliant eTMFAchieving a 21 CFR Part 11 Compliant eTMF
Achieving a 21 CFR Part 11 Compliant eTMFpaulkfenton
 

Was ist angesagt? (20)

CSV - Computer System Validation
CSV - Computer System Validation CSV - Computer System Validation
CSV - Computer System Validation
 
Computer system validations
Computer system validations Computer system validations
Computer system validations
 
21 CFR Part11_CSV Training_Katalyst HLS
21 CFR Part11_CSV Training_Katalyst HLS21 CFR Part11_CSV Training_Katalyst HLS
21 CFR Part11_CSV Training_Katalyst HLS
 
Computer System Validation Training
Computer System Validation TrainingComputer System Validation Training
Computer System Validation Training
 
Process and Regulated Processes Software Validation Elements
Process and Regulated Processes Software Validation ElementsProcess and Regulated Processes Software Validation Elements
Process and Regulated Processes Software Validation Elements
 
IRJET- A Survey for Block Chaining based Cyber Security System for Fiscal Dev...
IRJET- A Survey for Block Chaining based Cyber Security System for Fiscal Dev...IRJET- A Survey for Block Chaining based Cyber Security System for Fiscal Dev...
IRJET- A Survey for Block Chaining based Cyber Security System for Fiscal Dev...
 
Computer system validations
Computer system validationsComputer system validations
Computer system validations
 
Computer-System-Validation
Computer-System-ValidationComputer-System-Validation
Computer-System-Validation
 
21 CFR PART 11
21 CFR PART 1121 CFR PART 11
21 CFR PART 11
 
Computer systems compliance
Computer systems complianceComputer systems compliance
Computer systems compliance
 
Csv 21 Cfr11
Csv 21 Cfr11Csv 21 Cfr11
Csv 21 Cfr11
 
Computerized system validation_final
Computerized system validation_finalComputerized system validation_final
Computerized system validation_final
 
CISA exam 100 practice question
CISA exam 100 practice questionCISA exam 100 practice question
CISA exam 100 practice question
 
Understanding 21 cfr part 11
Understanding 21 cfr part 11Understanding 21 cfr part 11
Understanding 21 cfr part 11
 
Computer System Validation
Computer System ValidationComputer System Validation
Computer System Validation
 
21 cfr part 11 an approach towards compliance
21 cfr part 11   an approach towards compliance21 cfr part 11   an approach towards compliance
21 cfr part 11 an approach towards compliance
 
WP_UL Compliance wth 21CFR Part_11
WP_UL Compliance wth 21CFR Part_11WP_UL Compliance wth 21CFR Part_11
WP_UL Compliance wth 21CFR Part_11
 
Computer system validation review article by-mahesh b wazade
Computer system validation review article by-mahesh b wazadeComputer system validation review article by-mahesh b wazade
Computer system validation review article by-mahesh b wazade
 
Achieving a 21 CFR Part 11 Compliant eTMF
Achieving a 21 CFR Part 11 Compliant eTMFAchieving a 21 CFR Part 11 Compliant eTMF
Achieving a 21 CFR Part 11 Compliant eTMF
 
21 cfr part 11
21 cfr part 1121 cfr part 11
21 cfr part 11
 

Andere mochten auch

Cxair Tech Overview V5
Cxair Tech Overview V5Cxair Tech Overview V5
Cxair Tech Overview V5keesgelderblom
 
When developer's api simplify user mode rootkits developing.
When developer's api simplify user mode rootkits developing.When developer's api simplify user mode rootkits developing.
When developer's api simplify user mode rootkits developing.Yury Chemerkin
 
Whitepaper Multidomain Mdm
Whitepaper Multidomain MdmWhitepaper Multidomain Mdm
Whitepaper Multidomain Mdmkeesgelderblom
 
Blackberry playbook – new challenges
Blackberry playbook – new challengesBlackberry playbook – new challenges
Blackberry playbook – new challengesYury Chemerkin
 
Social network privacy guide
Social network privacy guideSocial network privacy guide
Social network privacy guideYury Chemerkin
 
Windows 8. important considerations for computer forensics and electronic dis...
Windows 8. important considerations for computer forensics and electronic dis...Windows 8. important considerations for computer forensics and electronic dis...
Windows 8. important considerations for computer forensics and electronic dis...Yury Chemerkin
 
Krzysztof kotowicz. something wicked this way comes
Krzysztof kotowicz. something wicked this way comesKrzysztof kotowicz. something wicked this way comes
Krzysztof kotowicz. something wicked this way comesYury Chemerkin
 
Uxue,josu and aitor
Uxue,josu and aitorUxue,josu and aitor
Uxue,josu and aitorabmorlans3rd
 
Accu link’s intelimailer new digital letter package 3 13-with video
Accu link’s intelimailer new digital letter package 3 13-with videoAccu link’s intelimailer new digital letter package 3 13-with video
Accu link’s intelimailer new digital letter package 3 13-with videoArt Morrison
 
N 20081214 el coltán - regalo envenenado del congo
N 20081214 el coltán - regalo envenenado del congoN 20081214 el coltán - regalo envenenado del congo
N 20081214 el coltán - regalo envenenado del congorubindecelis32
 
Sin título 1
Sin título 1Sin título 1
Sin título 1lmrn599
 
Introducing the CGIAR in Ethiopia
Introducing the CGIAR in EthiopiaIntroducing the CGIAR in Ethiopia
Introducing the CGIAR in EthiopiaILRI
 
Gcsp módulo 1
Gcsp módulo 1Gcsp módulo 1
Gcsp módulo 1diegomilka
 
Filip palian mateuszkocielski. simplest ownage human observed… routers
Filip palian mateuszkocielski. simplest ownage human observed… routersFilip palian mateuszkocielski. simplest ownage human observed… routers
Filip palian mateuszkocielski. simplest ownage human observed… routersYury Chemerkin
 
Педагогические специальности
Педагогические специальностиПедагогические специальности
Педагогические специальностиlabdua
 
Revista Ejército nº 897 del mes diciembre de 2015
Revista Ejército nº 897 del mes diciembre de 2015Revista Ejército nº 897 del mes diciembre de 2015
Revista Ejército nº 897 del mes diciembre de 2015Ejército de Tierra
 
ทฤษฎีพัฒนาการของเพียเจต์
ทฤษฎีพัฒนาการของเพียเจต์ทฤษฎีพัฒนาการของเพียเจต์
ทฤษฎีพัฒนาการของเพียเจต์suraidabungasayu
 
le marché du e-learning : l'offre
le marché du e-learning : l'offrele marché du e-learning : l'offre
le marché du e-learning : l'offreVirginie Lanlo
 

Andere mochten auch (20)

Tío andy
Tío andyTío andy
Tío andy
 
Cxair Tech Overview V5
Cxair Tech Overview V5Cxair Tech Overview V5
Cxair Tech Overview V5
 
When developer's api simplify user mode rootkits developing.
When developer's api simplify user mode rootkits developing.When developer's api simplify user mode rootkits developing.
When developer's api simplify user mode rootkits developing.
 
Whitepaper Multidomain Mdm
Whitepaper Multidomain MdmWhitepaper Multidomain Mdm
Whitepaper Multidomain Mdm
 
Blackberry playbook – new challenges
Blackberry playbook – new challengesBlackberry playbook – new challenges
Blackberry playbook – new challenges
 
Social network privacy guide
Social network privacy guideSocial network privacy guide
Social network privacy guide
 
Windows 8. important considerations for computer forensics and electronic dis...
Windows 8. important considerations for computer forensics and electronic dis...Windows 8. important considerations for computer forensics and electronic dis...
Windows 8. important considerations for computer forensics and electronic dis...
 
Krzysztof kotowicz. something wicked this way comes
Krzysztof kotowicz. something wicked this way comesKrzysztof kotowicz. something wicked this way comes
Krzysztof kotowicz. something wicked this way comes
 
Uxue,josu and aitor
Uxue,josu and aitorUxue,josu and aitor
Uxue,josu and aitor
 
Accu link’s intelimailer new digital letter package 3 13-with video
Accu link’s intelimailer new digital letter package 3 13-with videoAccu link’s intelimailer new digital letter package 3 13-with video
Accu link’s intelimailer new digital letter package 3 13-with video
 
N 20081214 el coltán - regalo envenenado del congo
N 20081214 el coltán - regalo envenenado del congoN 20081214 el coltán - regalo envenenado del congo
N 20081214 el coltán - regalo envenenado del congo
 
Sin título 1
Sin título 1Sin título 1
Sin título 1
 
Mystuff
MystuffMystuff
Mystuff
 
Introducing the CGIAR in Ethiopia
Introducing the CGIAR in EthiopiaIntroducing the CGIAR in Ethiopia
Introducing the CGIAR in Ethiopia
 
Gcsp módulo 1
Gcsp módulo 1Gcsp módulo 1
Gcsp módulo 1
 
Filip palian mateuszkocielski. simplest ownage human observed… routers
Filip palian mateuszkocielski. simplest ownage human observed… routersFilip palian mateuszkocielski. simplest ownage human observed… routers
Filip palian mateuszkocielski. simplest ownage human observed… routers
 
Педагогические специальности
Педагогические специальностиПедагогические специальности
Педагогические специальности
 
Revista Ejército nº 897 del mes diciembre de 2015
Revista Ejército nº 897 del mes diciembre de 2015Revista Ejército nº 897 del mes diciembre de 2015
Revista Ejército nº 897 del mes diciembre de 2015
 
ทฤษฎีพัฒนาการของเพียเจต์
ทฤษฎีพัฒนาการของเพียเจต์ทฤษฎีพัฒนาการของเพียเจต์
ทฤษฎีพัฒนาการของเพียเจต์
 
le marché du e-learning : l'offre
le marché du e-learning : l'offrele marché du e-learning : l'offre
le marché du e-learning : l'offre
 

Ähnlich wie Digital forensic-cons

VAL-210-Computer-Validati-Plan-sample.pdf
VAL-210-Computer-Validati-Plan-sample.pdfVAL-210-Computer-Validati-Plan-sample.pdf
VAL-210-Computer-Validati-Plan-sample.pdfSamehMostafa33
 
Calibration/PM and Asset Management in Bio-Med Applications
Calibration/PM and Asset Management in Bio-Med ApplicationsCalibration/PM and Asset Management in Bio-Med Applications
Calibration/PM and Asset Management in Bio-Med ApplicationsSanjay Dhal , MS, MBA
 
Computer System Validation A Review
Computer System Validation A ReviewComputer System Validation A Review
Computer System Validation A Reviewijtsrd
 
Safety System Modularity
Safety System ModularitySafety System Modularity
Safety System ModularityFasiul Alam
 
A GAMP Approach to Data Integrity, Electronic Records & Signatures & Operati...
A GAMP Approach to Data Integrity, Electronic Records & Signatures &  Operati...A GAMP Approach to Data Integrity, Electronic Records & Signatures &  Operati...
A GAMP Approach to Data Integrity, Electronic Records & Signatures & Operati...sazalsutra
 
PICS - Good Comp Systems - URS.pdf
PICS - Good Comp Systems - URS.pdfPICS - Good Comp Systems - URS.pdf
PICS - Good Comp Systems - URS.pdfPhmHuNgcVinh
 
GOOD AUTOMATED LABORATORY PRACTICE
GOOD AUTOMATED LABORATORY PRACTICEGOOD AUTOMATED LABORATORY PRACTICE
GOOD AUTOMATED LABORATORY PRACTICEjagrutivasava
 
1 - Introduction to Computerized Systems Validation - for review.pptx
1 - Introduction to Computerized Systems Validation - for review.pptx1 - Introduction to Computerized Systems Validation - for review.pptx
1 - Introduction to Computerized Systems Validation - for review.pptxpatemalabanan
 
Trackment
TrackmentTrackment
Trackmentmeaannn
 
Concept of URS,DQ,IQ,OQ,PQ
Concept of URS,DQ,IQ,OQ,PQConcept of URS,DQ,IQ,OQ,PQ
Concept of URS,DQ,IQ,OQ,PQdhavalrock24
 
Project Business Case and Capital Justification for Implementation of Applica...
Project Business Case and Capital Justification for Implementation of Applica...Project Business Case and Capital Justification for Implementation of Applica...
Project Business Case and Capital Justification for Implementation of Applica...Duane Bodle
 
Auditing In Computer Environment Presentation
Auditing In Computer Environment PresentationAuditing In Computer Environment Presentation
Auditing In Computer Environment PresentationEMAC Consulting Group
 
DIACAP IA CONTROLS Requirements Document
DIACAP IA CONTROLS Requirements DocumentDIACAP IA CONTROLS Requirements Document
DIACAP IA CONTROLS Requirements DocumentNicole Gaehle, MSIST
 
Digital Security by Design: ISCF Digital Security by Design Research Projects...
Digital Security by Design: ISCF Digital Security by Design Research Projects...Digital Security by Design: ISCF Digital Security by Design Research Projects...
Digital Security by Design: ISCF Digital Security by Design Research Projects...KTN
 
January 2013 world Pipeline magazine Article
January  2013 world Pipeline magazine ArticleJanuary  2013 world Pipeline magazine Article
January 2013 world Pipeline magazine ArticleLayne Tucker
 

Ähnlich wie Digital forensic-cons (20)

VAL-210-Computer-Validati-Plan-sample.pdf
VAL-210-Computer-Validati-Plan-sample.pdfVAL-210-Computer-Validati-Plan-sample.pdf
VAL-210-Computer-Validati-Plan-sample.pdf
 
Calibration/PM and Asset Management in Bio-Med Applications
Calibration/PM and Asset Management in Bio-Med ApplicationsCalibration/PM and Asset Management in Bio-Med Applications
Calibration/PM and Asset Management in Bio-Med Applications
 
Computer System Validation A Review
Computer System Validation A ReviewComputer System Validation A Review
Computer System Validation A Review
 
Safety System Modularity
Safety System ModularitySafety System Modularity
Safety System Modularity
 
A GAMP Approach to Data Integrity, Electronic Records & Signatures & Operati...
A GAMP Approach to Data Integrity, Electronic Records & Signatures &  Operati...A GAMP Approach to Data Integrity, Electronic Records & Signatures &  Operati...
A GAMP Approach to Data Integrity, Electronic Records & Signatures & Operati...
 
PICS - Good Comp Systems - URS.pdf
PICS - Good Comp Systems - URS.pdfPICS - Good Comp Systems - URS.pdf
PICS - Good Comp Systems - URS.pdf
 
Computer system overview
Computer system overviewComputer system overview
Computer system overview
 
GOOD AUTOMATED LABORATORY PRACTICE
GOOD AUTOMATED LABORATORY PRACTICEGOOD AUTOMATED LABORATORY PRACTICE
GOOD AUTOMATED LABORATORY PRACTICE
 
1 - Introduction to Computerized Systems Validation - for review.pptx
1 - Introduction to Computerized Systems Validation - for review.pptx1 - Introduction to Computerized Systems Validation - for review.pptx
1 - Introduction to Computerized Systems Validation - for review.pptx
 
commissioning c-3
commissioning c-3commissioning c-3
commissioning c-3
 
Chapter 6
Chapter 6Chapter 6
Chapter 6
 
Trackment
TrackmentTrackment
Trackment
 
Concept of URS,DQ,IQ,OQ,PQ
Concept of URS,DQ,IQ,OQ,PQConcept of URS,DQ,IQ,OQ,PQ
Concept of URS,DQ,IQ,OQ,PQ
 
Vaidation ppt.pptx
Vaidation ppt.pptxVaidation ppt.pptx
Vaidation ppt.pptx
 
Project Business Case and Capital Justification for Implementation of Applica...
Project Business Case and Capital Justification for Implementation of Applica...Project Business Case and Capital Justification for Implementation of Applica...
Project Business Case and Capital Justification for Implementation of Applica...
 
Auditing In Computer Environment Presentation
Auditing In Computer Environment PresentationAuditing In Computer Environment Presentation
Auditing In Computer Environment Presentation
 
Equipment Qualification
Equipment QualificationEquipment Qualification
Equipment Qualification
 
DIACAP IA CONTROLS Requirements Document
DIACAP IA CONTROLS Requirements DocumentDIACAP IA CONTROLS Requirements Document
DIACAP IA CONTROLS Requirements Document
 
Digital Security by Design: ISCF Digital Security by Design Research Projects...
Digital Security by Design: ISCF Digital Security by Design Research Projects...Digital Security by Design: ISCF Digital Security by Design Research Projects...
Digital Security by Design: ISCF Digital Security by Design Research Projects...
 
January 2013 world Pipeline magazine Article
January  2013 world Pipeline magazine ArticleJanuary  2013 world Pipeline magazine Article
January 2013 world Pipeline magazine Article
 

Mehr von Yury Chemerkin

Security Vulnerability Notice SE-2012-01-PUBLIC [Security vulnerabilities in ...
Security Vulnerability Notice SE-2012-01-PUBLIC [Security vulnerabilities in ...Security Vulnerability Notice SE-2012-01-PUBLIC [Security vulnerabilities in ...
Security Vulnerability Notice SE-2012-01-PUBLIC [Security vulnerabilities in ...Yury Chemerkin
 
Red october. detailed malware description
Red october. detailed malware descriptionRed october. detailed malware description
Red october. detailed malware descriptionYury Chemerkin
 
Comment crew indicators of compromise
Comment crew indicators of compromiseComment crew indicators of compromise
Comment crew indicators of compromiseYury Chemerkin
 
Appendix g iocs readme
Appendix g iocs readmeAppendix g iocs readme
Appendix g iocs readmeYury Chemerkin
 
Appendix f (digital) ssl certificates
Appendix f (digital)   ssl certificatesAppendix f (digital)   ssl certificates
Appendix f (digital) ssl certificatesYury Chemerkin
 
Appendix e (digital) md5s
Appendix e (digital)   md5sAppendix e (digital)   md5s
Appendix e (digital) md5sYury Chemerkin
 
Appendix d (digital) fqd ns
Appendix d (digital)   fqd nsAppendix d (digital)   fqd ns
Appendix d (digital) fqd nsYury Chemerkin
 
6071f3f4 40e6-4c7b-8868-3b0b21a9f601
6071f3f4 40e6-4c7b-8868-3b0b21a9f6016071f3f4 40e6-4c7b-8868-3b0b21a9f601
6071f3f4 40e6-4c7b-8868-3b0b21a9f601Yury Chemerkin
 
Zane lackey. security at scale. web application security in a continuous depl...
Zane lackey. security at scale. web application security in a continuous depl...Zane lackey. security at scale. web application security in a continuous depl...
Zane lackey. security at scale. web application security in a continuous depl...Yury Chemerkin
 
The stuxnet computer worm. harbinger of an emerging warfare capability
The stuxnet computer worm. harbinger of an emerging warfare capabilityThe stuxnet computer worm. harbinger of an emerging warfare capability
The stuxnet computer worm. harbinger of an emerging warfare capabilityYury Chemerkin
 
Stuxnet. analysis, myths, realities
Stuxnet. analysis, myths, realitiesStuxnet. analysis, myths, realities
Stuxnet. analysis, myths, realitiesYury Chemerkin
 
Stuxnet redux. malware attribution & lessons learned
Stuxnet redux. malware attribution & lessons learnedStuxnet redux. malware attribution & lessons learned
Stuxnet redux. malware attribution & lessons learnedYury Chemerkin
 
Sophos ransom ware fake antivirus
Sophos ransom ware fake antivirusSophos ransom ware fake antivirus
Sophos ransom ware fake antivirusYury Chemerkin
 
Six months later – a report card on google’s demotion of pirate sites
Six months later – a report card on google’s demotion of pirate sitesSix months later – a report card on google’s demotion of pirate sites
Six months later – a report card on google’s demotion of pirate sitesYury Chemerkin
 
Security in the cloud planning guide
Security in the cloud planning guideSecurity in the cloud planning guide
Security in the cloud planning guideYury Chemerkin
 
Security configuration recommendations for apple i os 5 devices
Security configuration recommendations for apple i os 5 devicesSecurity configuration recommendations for apple i os 5 devices
Security configuration recommendations for apple i os 5 devicesYury Chemerkin
 
Render man. hacker + airplanes = no good can come of this
Render man. hacker + airplanes = no good can come of thisRender man. hacker + airplanes = no good can come of this
Render man. hacker + airplanes = no good can come of thisYury Chemerkin
 
Mario heiderich. got your nose! how to steal your precious data without using...
Mario heiderich. got your nose! how to steal your precious data without using...Mario heiderich. got your nose! how to steal your precious data without using...
Mario heiderich. got your nose! how to steal your precious data without using...Yury Chemerkin
 

Mehr von Yury Chemerkin (20)

Security Vulnerability Notice SE-2012-01-PUBLIC [Security vulnerabilities in ...
Security Vulnerability Notice SE-2012-01-PUBLIC [Security vulnerabilities in ...Security Vulnerability Notice SE-2012-01-PUBLIC [Security vulnerabilities in ...
Security Vulnerability Notice SE-2012-01-PUBLIC [Security vulnerabilities in ...
 
Red october. detailed malware description
Red october. detailed malware descriptionRed october. detailed malware description
Red october. detailed malware description
 
Comment crew indicators of compromise
Comment crew indicators of compromiseComment crew indicators of compromise
Comment crew indicators of compromise
 
Appendix g iocs readme
Appendix g iocs readmeAppendix g iocs readme
Appendix g iocs readme
 
Appendix f (digital) ssl certificates
Appendix f (digital)   ssl certificatesAppendix f (digital)   ssl certificates
Appendix f (digital) ssl certificates
 
Appendix e (digital) md5s
Appendix e (digital)   md5sAppendix e (digital)   md5s
Appendix e (digital) md5s
 
Appendix d (digital) fqd ns
Appendix d (digital)   fqd nsAppendix d (digital)   fqd ns
Appendix d (digital) fqd ns
 
6071f3f4 40e6-4c7b-8868-3b0b21a9f601
6071f3f4 40e6-4c7b-8868-3b0b21a9f6016071f3f4 40e6-4c7b-8868-3b0b21a9f601
6071f3f4 40e6-4c7b-8868-3b0b21a9f601
 
Jp3 13
Jp3 13Jp3 13
Jp3 13
 
Zane lackey. security at scale. web application security in a continuous depl...
Zane lackey. security at scale. web application security in a continuous depl...Zane lackey. security at scale. web application security in a continuous depl...
Zane lackey. security at scale. web application security in a continuous depl...
 
The stuxnet computer worm. harbinger of an emerging warfare capability
The stuxnet computer worm. harbinger of an emerging warfare capabilityThe stuxnet computer worm. harbinger of an emerging warfare capability
The stuxnet computer worm. harbinger of an emerging warfare capability
 
Stuxnet. analysis, myths, realities
Stuxnet. analysis, myths, realitiesStuxnet. analysis, myths, realities
Stuxnet. analysis, myths, realities
 
Stuxnet redux. malware attribution & lessons learned
Stuxnet redux. malware attribution & lessons learnedStuxnet redux. malware attribution & lessons learned
Stuxnet redux. malware attribution & lessons learned
 
Sophos ransom ware fake antivirus
Sophos ransom ware fake antivirusSophos ransom ware fake antivirus
Sophos ransom ware fake antivirus
 
Six months later – a report card on google’s demotion of pirate sites
Six months later – a report card on google’s demotion of pirate sitesSix months later – a report card on google’s demotion of pirate sites
Six months later – a report card on google’s demotion of pirate sites
 
Security in the cloud planning guide
Security in the cloud planning guideSecurity in the cloud planning guide
Security in the cloud planning guide
 
Security configuration recommendations for apple i os 5 devices
Security configuration recommendations for apple i os 5 devicesSecurity configuration recommendations for apple i os 5 devices
Security configuration recommendations for apple i os 5 devices
 
Render man. hacker + airplanes = no good can come of this
Render man. hacker + airplanes = no good can come of thisRender man. hacker + airplanes = no good can come of this
Render man. hacker + airplanes = no good can come of this
 
Msft oracle brief
Msft oracle briefMsft oracle brief
Msft oracle brief
 
Mario heiderich. got your nose! how to steal your precious data without using...
Mario heiderich. got your nose! how to steal your precious data without using...Mario heiderich. got your nose! how to steal your precious data without using...
Mario heiderich. got your nose! how to steal your precious data without using...
 

Kürzlich hochgeladen

Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 

Kürzlich hochgeladen (20)

Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 

Digital forensic-cons

  • 1. Codes of Practice and Conduct Appendix: Digital Forensic Services FSR-C-107-001 Consultation Draft This is a consultation draft and therefore should not be regarded or used as a standard. This draft is issued to allow comments from interested parties; all comments will be given consideration prior to publication. Comments should be sent to FSRConsultation2@homeoffice.gsi.gov.uk using the form available from http://www.homeoffice.gov.uk/agencies-public- bodies/fsr/ and should be submitted by 10 MARCH 2013. This mailbox is not for general correspondence and is not routinely monitored so no acknowledgement will normally be sent. THIS DRAFT IS NOT CURRENT BEYOND 10 MARCH 2013. © Crown Copyright 2012 The text in this document (excluding the Forensic Science Regulator’s logo and material quoted from other sources) may be reproduced free of charge in any format or medium providing it is reproduced accurately and not used in a misleading context. The material must be acknowledged as Crown Copyright and its title specified.
  • 2. Codes of Practice and Conduct 1. INTRODUCTION 1.1.1 The provider of digital forensic science (the provider) shall comply with the Codes of Practice and Conduct (the Codes) and be accredited to BS EN ISO/IEC 17020:2004 for any crime scene activity and BS EN ISO/IEC 17025:2005 for any laboratory function (such as the recovery or imaging of electronic data). 1.1.2 This appendix provides further explanation of some of the requirements of the Codes specifically pertaining to the provision of digital analysis. 1.1.3 This appendix should be read alongside with the Codes, BS EN ISO/IEC 17025:2005 and ILAC-G19 and will generally follow the heading titles used in the Codes with cross references to ISO 17025:2005 given in parentheses. 2. SCOPE 2.1.1 This appendix covers digital forensics work only as it applies to the identification, capture, preservation, investigation, evaluation, reporting and storage of data on digital data storage devices and mobile phone devices. 3. TECHNICAL RECORDS (ISO 17025:2005, 4.13.2) 3.1.1 The provider shall include in policies and procedures, appropriate to the device and/or scope of the planned activity, which incorporate: a. Keeping a record of the state, mode and physical condition of any seized device and any potentially relevant information; and b. Labelling the components of the device and taking legible photographs (screen, computer front and back, and the area around the device to be seized) and/or sketching of the device’s connections and surrounding area where relevant. 3.1.2 A contemporaneous audit trail to be retained, to show all changes to the data without obscuring the original data. It shall be possible to associate all changes to data with the person having made those changes, for example by the use of timed and dated (electronic) signatures. Reasons for changes shall be given. 3.1.3 The provider shall ensure that an audit trail is created and preserved for all processes or methods applied to computer-based electronic evidence, to the FSR-C-107-001 Consultation Draft Page 2 of 6
  • 3. Codes of Practice and Conduct extent that an independent third party would be able to examine and repeat the processes and achieve the same result. 4. TEST METHODS AND METHOD VALIDATION 4.1 Selection of methods (ISO 17025:2005, 5.4.22) 4.1.1 With consideration of any instructions from the customer the provider shall consider, in the context of each specific case and the type of evidence being sought (e.g. photographs, spreadsheets, documents, databases, financial records), the potential value of obtaining: a. Additional information regarding the case (e.g. aliases, e-mail accounts, e- mail addresses, ISP used, names, network configuration and users, system logs, passwords, user names);additional digital evidence (e.g. by sending a preservation order to an Internet Service Provider (ISP), identifying remote storage locations, obtaining e-mail); and b. The relevance of peripheral components to the investigation (for example, in forgery or fraud cases, non-computer equipment such as laminators, credit card blanks, cheque paper, scanners, and printers; in child pornography cases, digital cameras). 4.1.2 The provider shall take account of the need for backup and redundancy when working on cases, to ensure that a single technical failure (e.g. a power loss or disk corruption) will not result in loss of data on working copies. 4.1.3 Software, hardware and software tools whose operation has an impact in obtaining results will require validation, or any existing validation to be verified, as laid out in section 5, Validation of methods. 4.1.4 The provider shall ensure that, for the range of digital forensics tools it uses, the validation requirements take account of staff competency levels, the nature and difficulty of the tasks to be carried out, and the level of acceptance of the tool in the wider forensic science and criminal justice community. FSR-C-107-001 Consultation Draft Page 3 of 6
  • 4. Codes of Practice and Conduct 5. VALIDATION OF METHODS 5.1 Risk assessment of the method 5.1.1 The risk assessment process detailed in the Codes is intended to determine the impact of the overall method and the operation of deployed software tools in the digital forensic science process may have. It is important to look at how the how the method or tool is to be used, the configuration and to systematically look at the types of risk that might occur. For instance, when imaging storage media, the risks may include: a. Writing onto the evidential machine storage; b. Returning incomplete and/or misleading data; or c. Incorrectly determining the media to be unreadable. 5.1.2 In certain parts of the process, the competent use of a suite of software tools or the use of visual/manual checks could be demonstrated to mitigate the identified risks in the method. Proper consideration of the nature of risks at this stage should feed into the development of the method as well as the validation strategy. 5.1.3 The development of the forensic science process and the subsequent validation shall set out how the identified risks are being addressed and how the effectiveness of the action will be tested along with the end-user requirements. 5.2 Validation of measurement based methods (Codes, 20.8) 5.2.1 Measurement based methods can include extraction processes using automated tools or manual methods for the purpose of providing data. 5.2.2 Any of the functional and performance requirements listed a-m under paragraph 29 in this section of the Codes may be applicable, however it is expected that the following from the list in section 20.8.2 of the Codes shall normally be given greater consideration for software or digital applications: a. The competence requirements of the analyst/user; b. Environmental constraints; ... FSR-C-107-001 Consultation Draft Page 4 of 6
  • 5. Codes of Practice and Conduct f. The ability of the sampling process to provide a representative sample of the exhibit; l. The results are consistent, reliable, accurate, robust and with an uncertainty measurement; and m. The limitations of applicability. 5.3 Verification of the validation of adopted methods (Codes, 20.10) 5.3.1 In most cases adopted methods or software tools and scripts should follow a tailored process for the validation of measurement based methods. However, as an adopted method would normally be expected to be already well supported through documentation, available validation studies, testing-house studies or published papers much of the required work may only require verifying as detailed in the Codes. 5.3.2 There is a requirement in the Codes for the production of an available library of documents relevant to the authorisation of the method and production of the certificate of validation completion. 5.3.3 The final requirement in the Codes is to demonstrate the method works in the hands of the intended users. 5.4 Verification of minor changes in methods 5.4.1 Methods are validated to a specific configuration; therefore any changes in any constituent parts (hardware, firmware, script, operating system etc.) may affect its overall operation and any dependant systems which could invalidate the results. 5.4.2 Any proposed change should be risk assessed at the method level as even a patch in a software tool may adversely affect the operation of a second tool or process using its output e.g. giving a plausible but incorrect date stamp. Other examples include at tool inadvertently becoming write-enabled through a firmware update. FSR-C-107-001 Consultation Draft Page 5 of 6
  • 6. Codes of Practice and Conduct 5.5 Implementation plan and any constraints 5.5.1 The implementation plan is required to include monitoring of controls and communication which in the digital forensic sciences should include configuration management, dependencies, how identified software/firmware/hardware bugs are to be handled and how patches etc. are to be controlled (see Verification of minor changes in methods). 6. HANDLING OF TEST ITEMS (ISO 17025:2005, 5.8) 6.1 Exhibit handling, protection and storage 6.1.1 The provider shall ensure that the value of any other type of evidence that may be present is not compromised during the capture, preservation and investigation of the digital evidence. 6.1.2 The provider shall ensure that devices containing potential digital evidence are packaged, sealed and transported in such a way as to protect the integrity of the digital evidence. 6.1.3 There are two main issues to consider in the transporting of digital evidence: a. The security of the device and digital evidence to ensure that access to it is correctly supervised when moving it from the scene to the laboratory or other location; and b. Protection of the device and digital evidence to ensure that it is not affected by physical shock, electromagnetic interference, extremes of heat and humidity or other environmental hazard. FSR-C-107-001 Consultation Draft Page 6 of 6