Part 1 –Computer Forensic; The limits of the truth What do you do with what you know? Is it sufficient to answer what you re asked or to reveal everything that you know about a particular situation?...

1 answer below »
Part 1 –Computer Forensic; The limits of the truth

What do you do with what you know? Is it sufficient to answer what you re asked or to reveal everything that you know about a particular situation? To what degree does context matter? Imagine that you are engaged by a law firm to examine evidence for the defence. You uncover evidence that does not help your client’s case which was not discovered by the prosecution. Later in court you are asked a question that will reveal this evidence if answered fully and truthfully. What will be your response: Do you opt for full disclosure, or do you try to evade the question?

To complete this Paper

Submit an essay in which Come to a decision on how you would respond. Discuss your decision from varying perspectives on how to present the truth. Provide examples to support your decision.
(at least 600 words)

Referencing guideline (Citation style : Harvard-Coventry)

  • No wikis, no forums, Quora sites

  • Website from reputable sources allowed


  • Required to have at least 2 peer reviewed papers



  • In-text citation is required for all reference



Part 2 - Computer Forensic; Over the border Different societies have different perspectives on law and order, privacy and security. Within their territorial borders, nation-states impose these perspectives through a set of laws. The new digital reality calls into question the stability of national boundaries, particularly when it comes to cybercrime. What is against the law in one jurisdiction may not be illegal on the other side of the boundary line.


To complete this Paper:


Post:Discuss the differences of laws in at least two different countries and their impact on computer forensics.
.(at least 600 words)


Referencing guideline (Citation style : Harvard-Coventry)

  • No wikis, no forums, Quora sites

  • Website from reputable sources allowed


  • Required to have at least 2 peer reviewed papers



  • In-text citation is required for all reference

Answered Same DayDec 26, 2021

Answer To: Part 1 –Computer Forensic; The limits of the truth What do you do with what you know? Is it...

Robert answered on Dec 26 2021
115 Votes
Running head: PART 2 1
Part 2 - Computer Forensic; Over the border
Student Name
Course Name
Profess
or Name
University Name
August 19, 2017
PART 2 2

Part 2 - Computer Forensic; Over the border
Overview
Different societies have different perspectives on law and order, privacy and security.
Within their territorial borders, nation-states impose these perspectives through a set of laws. The
new digital reality calls into question the stability of national boundaries, particularly when it
comes to cybercrime. What is against the law in one jurisdiction may not be illegal on the other
side of the boundary line. For the assignment, we aim to explain the differences of the various
laws in two nations e.g. United States and Europe (EU) respectively. These two nations have
different regulations set apart for the criminal activities and other perspectives of the crime e.g.
cybercrime and digital security concerns. These involves the laws and rules that affect the
computer forensics effectively since they executed and applied differently in these states. The
differences in the state cybercrime laws of the states are discussed in the next segment.
Differences of laws in the United States and EU
The most important and prominent difference apprehensions the legitimate security of
private data. Whereas data security and confidentiality are central privileges in the EU besides
are likewise pertinent in the LE framework, there is no corresponding defense in the US (Waxer,
2016). The EU information protection standard comprises of numerous principles that mainly
relate autonomously of the environment. They comprise, amid others, laws on information
superiority standards, self-regulating supervision, on subtle statistics, the determination control
principle, laws on transmission of information to third states or inter-agency conversation, time
restrictions for the maintenance of records,...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here