It is deemed crucial to obtain pertinent evidence nowadays because over 70 percent of data stored in the computer is never obtained in a hard-copy format. Many times, important pieces of information like date and time information can only be obtained electronically making the pertinent data more crucial. Simply obtaining the electronic evidence is not sufficient for obtaining the relevant information. Hence, it is crucial to learn and comprehend the accurate collection process that ensures the authenticity and admissibility of the electronic evidence in the court of law. Here are the steps to obtain electronic evidence like a pro.
- Send an application to all the concerned parties by updating them on the solicitation ofelectronic evidence.
Such a letter will make sure that the electronic evidence is present. Moreover, a protective order can also be issued at this point to make sure that every party safeguards the electronic leads that may be helpful to the case.
- Specifications in relation to electronic information should always be included in the writtendiscovery request.
All the precise documents needed, instructions and particular questions must be attached in this request, also include the form of production, in soft copy or hard copy format. Moreover, requests for specialists such as Elijaht cyber forensics experts to practically inspect and analyse the computer hard drives should always be admitted. Interrogations may also be conducted if required.
- Solicit backup tapes from the concerned parties
As these tapes possess information that would be quite helpful for the company to recover in case of a disaster. These tapes are usually made on the basis of a routine and usually possess information that is no longer available on the computer’s hard drive.
- Solicit detachable media like CDs, pen drives, hard drives etc.
As similar to the case with the backup tapes, detachable media usually possesses information that is not readily available on the hard drive of the computer system. Additionally, such removable media might possess ad hoc backups of the data.
- Interrogate all the available witnesses about their computer usage.
All witnesses have the right to be asked about how they particularly store the data on their computer. Moreover, witnesses must be interrogated about their personal computers as it is quite likely that they have eradicated all the information from their professional computers and transferred them to their personal systems.