Personnel of the company acknowledged the receipt of the handbook which confirms that no matter what is brought to business property, comprising of employees themselves, are likely …show more content…
It might display, activity logs, login information, emails, databases, internet history, documents or files and images (Solomon et al., 2011). These can later prove to be incriminating. To properly get hold of and transfer the computer, I initially photographed the anterior and posterior, the cables, and the attached devices as I found them. I also gathered any instruction manuals, documentation, and notes for the desktop. I could therefore visually notice the computer was on, I photographed the monitor of the computer because it was presenting an image. I was cautious not to touch the keyboard or mouse at this point. I enquired about potential username and password arrangements and wrote down the ones given to me. I took memo of the numerous applications that were running on the desktop. After asking the essential questions, I unplugged the power cable from the tower. I then kept record of the make, model, and serial numbers associated with the computer and its equipment. I unplugged all the cords from the computer tower and packed it in a way that inhibits it from being physically broken or distorted and then labeled them as delicate cargo (U.S. Department of Homeland Security, U.S. Secret Service, 2007). Paper bags and anti-static bags were used to package the computer and its equipment. During transportation, the computer must be sheltered from overheating, moisture, and electro-static discharge. The …show more content…
A handwritten phrase “Purple 743” appears on it. This portion of written proof might not mean much by itself, but it is possibly a password, codename, or partial email address (U.S. Department of Justice, 2008). To transport and store this item, will be retained into a typical evidence bag, likely an enlarged envelope, and documented on the chain of custody.
In addition, the piece of non-digital data to seize is the NASA notepad located at the top-left corner of the keyboard. This documented evidence is important because it comprises of notes, ostensibly written by Mr. McBride, that prompts him to contact Bob at Widgets, Inc and Maria about safekeeping and storage. Moreover, these people may know some info about him and his goals. They could be possibly included in the investigation down the road. The notepad should be placed into a customary evidence bag and documented on the chain of custody as