This report will examine the situation regarding cyber forensics as it stands, detailing why the circumstances of these investigations may be concerning for firms in regards to the security of their private information. …show more content…
A piece titled “Protecting digital data privacy in Computer Forensic Examination,” explains how multiple parties are affected by investigations, “There are instances when investigation is required on a corporate email server. The email server only contains a small portion of emails that are related to the investigation subject but the process allows the digital investigator to access millions of emails which are not related to the case. Regardless of the investigator focusing on email messages… there may be occasions during which other messages are read by the investigator.”(Law, …show more content…
As we have learned, there are many instances in which investigating authorities will collect information that not related to the case. “With the advent of computer forensic tools, it is also simple to search and locate specific data sets, such as emails, credit card numbers, passport numbers, telephone numbers, identity card numbers, photographs, videos etc.” (Law,