Deck 9: The Future of E-Discovery

Full screen (f)
exit full mode
Question
Which law proposed by the European Parliament would require explicit consent to being tracked on Web sites?

A) Cookie Law
B) Wiretap Act
C) FOIA
D) Fourth Amendment
Use Space or
up arrow
down arrow
to flip the card.
Question
When exigent circumstances exist, a warrant is always needed to search property.
Question
Which of the following rules and regulations does the ArchiveSocial Web site NOT claim to follow?

A) FINRA
B) SEC
C) Cookie Law
D) Sarbanes-Oxley Act
Question
Under what circumstances may police search data on a cell phone taken from a man that is arrested?

A) in all circumstances
B) in no circumstances
C) when the phone is powered on
D) in exigent circumstances
Question
Privacy laws have kept pace with technology advancements quite closely.
Question
If a backpack is carried by a suspect who is arrested, police may inventory its contents?
Question
Which of the following is the capability to store a variety of communication types in the same inbox?

A) BYOA
B) event data recording
C) unified messaging
D) common message digest
Question
Accessing voicemail stored on the service provider's servers requires a subpoena or a warrant.
Question
Which concept is illustrated by the scenario in which a person's car is searched after it has been impounded for being illegally parked?

A) search incident to arrest
B) closed container
C) immediate control
D) inventory search
Question
The Fourth Amendment states that an expectation of privacy inside the home is considered reasonable.
Question
When the Recycle Bin is emptied in Windows, the files it contains can no longer be recovered.
Question
The proposed OCGPA amendment to the ECPA does which of the following?

A) restricts tracking citizens using GPS locators
B) enables law enforcement warrantless access to all electronic communications
C) requires organizations to notify people when personal information about them is collected
D) restricts eavesdropping on mobile devices
Question
Which of the following poses a security risk in the form of embedded malware?

A) unified messaging
B) DEFR
C) BYOA
D) GPS tracking
Question
ISO 27037:2012 was developed for which of the following purposes?

A) to address readiness for digital investigations
B) to describe how to respond to an investigation after the fact or in real time
C) to teach law enforcement about digital evidence tampering
D) to replace the FRCP in criminal cases
Question
Which of the following is authorized and trained to collect and transport digital evidence at an investigation scene as defined in ISO, 2012.

A) DEFR
B) BYOA
C) EDR
D) PIPEDA
Question
If you suspect computer discovery material has been deleted or altered, what should you try to acquire?

A) hard copies of files
B) hard drive image
C) copies of files on a removable disk
D) the file allocation table
Question
Which case illustrated a Fourth Amendment violation of "search incident to arrest?"

A) California v. Acevedo
B) Chimel v. California
C) Schlossberg v. Solesbee
D) United States v. Kolon Indus., Inc.
Question
Files that are stored in the cloud storage service called DropBox are never copied to the computer from which they are accessed.
Question
Which of the following is true about ECPA and SCA?

A) only stored e-mail is protected
B) they guarantee privacy for all electronic communication
C) they are ahead of technological advances
D) e-mail older than 180 days requires a subpoena
Question
Which controversial technology did the NHTSC propose legislation to make them mandatory for all new cars?

A) EDRs
B) DVRs
C) Cloud storage
D) GPS trackers
Question
Match between columns
Canada's privacy act
EDRs
Canada's privacy act
search incident to arrest
Canada's privacy act
OCGPA
Canada's privacy act
DEFR
Canada's privacy act
closed container
Canada's privacy act
anti-forensics
Canada's privacy act
Fourth Amendment
Canada's privacy act
BYOA
Canada's privacy act
unified messaging
Canada's privacy act
PIPEDA
Question
Match between columns
the capability to store audio, video, text, SMS, and other data formats in the same mailbox in a mobile device
EDRs
the capability to store audio, video, text, SMS, and other data formats in the same mailbox in a mobile device
search incident to arrest
the capability to store audio, video, text, SMS, and other data formats in the same mailbox in a mobile device
OCGPA
the capability to store audio, video, text, SMS, and other data formats in the same mailbox in a mobile device
DEFR
the capability to store audio, video, text, SMS, and other data formats in the same mailbox in a mobile device
closed container
the capability to store audio, video, text, SMS, and other data formats in the same mailbox in a mobile device
anti-forensics
the capability to store audio, video, text, SMS, and other data formats in the same mailbox in a mobile device
Fourth Amendment
the capability to store audio, video, text, SMS, and other data formats in the same mailbox in a mobile device
BYOA
the capability to store audio, video, text, SMS, and other data formats in the same mailbox in a mobile device
unified messaging
the capability to store audio, video, text, SMS, and other data formats in the same mailbox in a mobile device
PIPEDA
Question
Match between columns
a term encompassing the more than half a million third-party applications available to be installed on mobile devices
EDRs
a term encompassing the more than half a million third-party applications available to be installed on mobile devices
search incident to arrest
a term encompassing the more than half a million third-party applications available to be installed on mobile devices
OCGPA
a term encompassing the more than half a million third-party applications available to be installed on mobile devices
DEFR
a term encompassing the more than half a million third-party applications available to be installed on mobile devices
closed container
a term encompassing the more than half a million third-party applications available to be installed on mobile devices
anti-forensics
a term encompassing the more than half a million third-party applications available to be installed on mobile devices
Fourth Amendment
a term encompassing the more than half a million third-party applications available to be installed on mobile devices
BYOA
a term encompassing the more than half a million third-party applications available to be installed on mobile devices
unified messaging
a term encompassing the more than half a million third-party applications available to be installed on mobile devices
PIPEDA
Question
Match between columns
states that an expectation of privacy inside the home is considered reasonable
EDRs
states that an expectation of privacy inside the home is considered reasonable
search incident to arrest
states that an expectation of privacy inside the home is considered reasonable
OCGPA
states that an expectation of privacy inside the home is considered reasonable
DEFR
states that an expectation of privacy inside the home is considered reasonable
closed container
states that an expectation of privacy inside the home is considered reasonable
anti-forensics
states that an expectation of privacy inside the home is considered reasonable
Fourth Amendment
states that an expectation of privacy inside the home is considered reasonable
BYOA
states that an expectation of privacy inside the home is considered reasonable
unified messaging
states that an expectation of privacy inside the home is considered reasonable
PIPEDA
Question
Match between columns
methods of deleting, altering, or hiding evidence to obstruct a digital forensics investigation
EDRs
methods of deleting, altering, or hiding evidence to obstruct a digital forensics investigation
search incident to arrest
methods of deleting, altering, or hiding evidence to obstruct a digital forensics investigation
OCGPA
methods of deleting, altering, or hiding evidence to obstruct a digital forensics investigation
DEFR
methods of deleting, altering, or hiding evidence to obstruct a digital forensics investigation
closed container
methods of deleting, altering, or hiding evidence to obstruct a digital forensics investigation
anti-forensics
methods of deleting, altering, or hiding evidence to obstruct a digital forensics investigation
Fourth Amendment
methods of deleting, altering, or hiding evidence to obstruct a digital forensics investigation
BYOA
methods of deleting, altering, or hiding evidence to obstruct a digital forensics investigation
unified messaging
methods of deleting, altering, or hiding evidence to obstruct a digital forensics investigation
PIPEDA
Question
When a(n) __________ request is filed, government agencies must produce this information in a reasonable amount of time.
Question
Match between columns
computers have been treated as these in a legal sense, much like a filing cabinet or a plastic container
EDRs
computers have been treated as these in a legal sense, much like a filing cabinet or a plastic container
search incident to arrest
computers have been treated as these in a legal sense, much like a filing cabinet or a plastic container
OCGPA
computers have been treated as these in a legal sense, much like a filing cabinet or a plastic container
DEFR
computers have been treated as these in a legal sense, much like a filing cabinet or a plastic container
closed container
computers have been treated as these in a legal sense, much like a filing cabinet or a plastic container
anti-forensics
computers have been treated as these in a legal sense, much like a filing cabinet or a plastic container
Fourth Amendment
computers have been treated as these in a legal sense, much like a filing cabinet or a plastic container
BYOA
computers have been treated as these in a legal sense, much like a filing cabinet or a plastic container
unified messaging
computers have been treated as these in a legal sense, much like a filing cabinet or a plastic container
PIPEDA
Question
Match between columns
authorized and trained to collect and transport digital evidence at an investigation scene
EDRs
authorized and trained to collect and transport digital evidence at an investigation scene
search incident to arrest
authorized and trained to collect and transport digital evidence at an investigation scene
OCGPA
authorized and trained to collect and transport digital evidence at an investigation scene
DEFR
authorized and trained to collect and transport digital evidence at an investigation scene
closed container
authorized and trained to collect and transport digital evidence at an investigation scene
anti-forensics
authorized and trained to collect and transport digital evidence at an investigation scene
Fourth Amendment
authorized and trained to collect and transport digital evidence at an investigation scene
BYOA
authorized and trained to collect and transport digital evidence at an investigation scene
unified messaging
authorized and trained to collect and transport digital evidence at an investigation scene
PIPEDA
Question
An officer is allowed to search a(n) ____________ person and his or her immediate surroundings.
Question
At the end of 2012, a new _______ standard was created to help set more specific guidelines for digital evidence in an attempt to standardize practices worldwide.
Question
The ____________ Amendment of the United States constitution covers unreasonable search and seizure without probable cause.
Question
One new product is Recommind, which uses ____________ coding to sort through thousands of terabytes of data.
Question
Mobile devices that access a company's wireless network show up in the network server ________.
Question
Match between columns
a bill proposed to amend the ECPA that would limit access to e-mail and GPS location information
EDRs
a bill proposed to amend the ECPA that would limit access to e-mail and GPS location information
search incident to arrest
a bill proposed to amend the ECPA that would limit access to e-mail and GPS location information
OCGPA
a bill proposed to amend the ECPA that would limit access to e-mail and GPS location information
DEFR
a bill proposed to amend the ECPA that would limit access to e-mail and GPS location information
closed container
a bill proposed to amend the ECPA that would limit access to e-mail and GPS location information
anti-forensics
a bill proposed to amend the ECPA that would limit access to e-mail and GPS location information
Fourth Amendment
a bill proposed to amend the ECPA that would limit access to e-mail and GPS location information
BYOA
a bill proposed to amend the ECPA that would limit access to e-mail and GPS location information
unified messaging
a bill proposed to amend the ECPA that would limit access to e-mail and GPS location information
PIPEDA
Question
Match between columns
a term used to specify that law enforcement can search an arrested person and anything in the immediate vicinity
EDRs
a term used to specify that law enforcement can search an arrested person and anything in the immediate vicinity
search incident to arrest
a term used to specify that law enforcement can search an arrested person and anything in the immediate vicinity
OCGPA
a term used to specify that law enforcement can search an arrested person and anything in the immediate vicinity
DEFR
a term used to specify that law enforcement can search an arrested person and anything in the immediate vicinity
closed container
a term used to specify that law enforcement can search an arrested person and anything in the immediate vicinity
anti-forensics
a term used to specify that law enforcement can search an arrested person and anything in the immediate vicinity
Fourth Amendment
a term used to specify that law enforcement can search an arrested person and anything in the immediate vicinity
BYOA
a term used to specify that law enforcement can search an arrested person and anything in the immediate vicinity
unified messaging
a term used to specify that law enforcement can search an arrested person and anything in the immediate vicinity
PIPEDA
Question
With the advent of the Internet and related technology, _________ concerns extended to places such as e-mail and voicemail.
Question
Police can search a suspect's shoulder bag when that suspect is arrested due to the principal of ___________ searches.
Question
Another challenge that has plagued the digital forensics community has been qualifications for digital forensics ______________.
Question
The OCGPA severely restricts tracking citizens by using _________ locators in mobile devices.
Question
Match between columns
devices that record the use of airbags, brakes, safety belts, and so forth
EDRs
devices that record the use of airbags, brakes, safety belts, and so forth
search incident to arrest
devices that record the use of airbags, brakes, safety belts, and so forth
OCGPA
devices that record the use of airbags, brakes, safety belts, and so forth
DEFR
devices that record the use of airbags, brakes, safety belts, and so forth
closed container
devices that record the use of airbags, brakes, safety belts, and so forth
anti-forensics
devices that record the use of airbags, brakes, safety belts, and so forth
Fourth Amendment
devices that record the use of airbags, brakes, safety belts, and so forth
BYOA
devices that record the use of airbags, brakes, safety belts, and so forth
unified messaging
devices that record the use of airbags, brakes, safety belts, and so forth
PIPEDA
Question
What is the principle of "closed container" with respect to a computer? Give an example.
Question
What new bill was proposed as a result of the Petraeus scandal with respect to GPS tracking? Describe that bill.
Question
Describe how privacy can be an issue with cloud storage.
Question
Describe anti-forensics. What are some anti-forensics behaviors?
Question
What are some of the questions raised by technological advances such as the cloud?
Question
Describe United States v. Karo and how the Fourth Amendment came into play in that case.
Question
What are some of the data that might be found on mobile devices and where might the data be stored?
Question
What has been done to address the lack of standards for digital forensics investigators?
Question
How does ISO 27037:2012 help with the fact that law often lags behind technology?
Question
Describe the "search incident to arrest" principle and how it was applied in Chimel v. California.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/50
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 9: The Future of E-Discovery
1
Which law proposed by the European Parliament would require explicit consent to being tracked on Web sites?

A) Cookie Law
B) Wiretap Act
C) FOIA
D) Fourth Amendment
A
2
When exigent circumstances exist, a warrant is always needed to search property.
False
3
Which of the following rules and regulations does the ArchiveSocial Web site NOT claim to follow?

A) FINRA
B) SEC
C) Cookie Law
D) Sarbanes-Oxley Act
C
4
Under what circumstances may police search data on a cell phone taken from a man that is arrested?

A) in all circumstances
B) in no circumstances
C) when the phone is powered on
D) in exigent circumstances
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
5
Privacy laws have kept pace with technology advancements quite closely.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
6
If a backpack is carried by a suspect who is arrested, police may inventory its contents?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
7
Which of the following is the capability to store a variety of communication types in the same inbox?

A) BYOA
B) event data recording
C) unified messaging
D) common message digest
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
8
Accessing voicemail stored on the service provider's servers requires a subpoena or a warrant.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
9
Which concept is illustrated by the scenario in which a person's car is searched after it has been impounded for being illegally parked?

A) search incident to arrest
B) closed container
C) immediate control
D) inventory search
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
10
The Fourth Amendment states that an expectation of privacy inside the home is considered reasonable.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
11
When the Recycle Bin is emptied in Windows, the files it contains can no longer be recovered.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
12
The proposed OCGPA amendment to the ECPA does which of the following?

A) restricts tracking citizens using GPS locators
B) enables law enforcement warrantless access to all electronic communications
C) requires organizations to notify people when personal information about them is collected
D) restricts eavesdropping on mobile devices
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
13
Which of the following poses a security risk in the form of embedded malware?

A) unified messaging
B) DEFR
C) BYOA
D) GPS tracking
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
14
ISO 27037:2012 was developed for which of the following purposes?

A) to address readiness for digital investigations
B) to describe how to respond to an investigation after the fact or in real time
C) to teach law enforcement about digital evidence tampering
D) to replace the FRCP in criminal cases
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
15
Which of the following is authorized and trained to collect and transport digital evidence at an investigation scene as defined in ISO, 2012.

A) DEFR
B) BYOA
C) EDR
D) PIPEDA
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
16
If you suspect computer discovery material has been deleted or altered, what should you try to acquire?

A) hard copies of files
B) hard drive image
C) copies of files on a removable disk
D) the file allocation table
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
17
Which case illustrated a Fourth Amendment violation of "search incident to arrest?"

A) California v. Acevedo
B) Chimel v. California
C) Schlossberg v. Solesbee
D) United States v. Kolon Indus., Inc.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
18
Files that are stored in the cloud storage service called DropBox are never copied to the computer from which they are accessed.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
19
Which of the following is true about ECPA and SCA?

A) only stored e-mail is protected
B) they guarantee privacy for all electronic communication
C) they are ahead of technological advances
D) e-mail older than 180 days requires a subpoena
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
20
Which controversial technology did the NHTSC propose legislation to make them mandatory for all new cars?

A) EDRs
B) DVRs
C) Cloud storage
D) GPS trackers
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
21
Match between columns
Canada's privacy act
EDRs
Canada's privacy act
search incident to arrest
Canada's privacy act
OCGPA
Canada's privacy act
DEFR
Canada's privacy act
closed container
Canada's privacy act
anti-forensics
Canada's privacy act
Fourth Amendment
Canada's privacy act
BYOA
Canada's privacy act
unified messaging
Canada's privacy act
PIPEDA
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
22
Match between columns
the capability to store audio, video, text, SMS, and other data formats in the same mailbox in a mobile device
EDRs
the capability to store audio, video, text, SMS, and other data formats in the same mailbox in a mobile device
search incident to arrest
the capability to store audio, video, text, SMS, and other data formats in the same mailbox in a mobile device
OCGPA
the capability to store audio, video, text, SMS, and other data formats in the same mailbox in a mobile device
DEFR
the capability to store audio, video, text, SMS, and other data formats in the same mailbox in a mobile device
closed container
the capability to store audio, video, text, SMS, and other data formats in the same mailbox in a mobile device
anti-forensics
the capability to store audio, video, text, SMS, and other data formats in the same mailbox in a mobile device
Fourth Amendment
the capability to store audio, video, text, SMS, and other data formats in the same mailbox in a mobile device
BYOA
the capability to store audio, video, text, SMS, and other data formats in the same mailbox in a mobile device
unified messaging
the capability to store audio, video, text, SMS, and other data formats in the same mailbox in a mobile device
PIPEDA
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
23
Match between columns
a term encompassing the more than half a million third-party applications available to be installed on mobile devices
EDRs
a term encompassing the more than half a million third-party applications available to be installed on mobile devices
search incident to arrest
a term encompassing the more than half a million third-party applications available to be installed on mobile devices
OCGPA
a term encompassing the more than half a million third-party applications available to be installed on mobile devices
DEFR
a term encompassing the more than half a million third-party applications available to be installed on mobile devices
closed container
a term encompassing the more than half a million third-party applications available to be installed on mobile devices
anti-forensics
a term encompassing the more than half a million third-party applications available to be installed on mobile devices
Fourth Amendment
a term encompassing the more than half a million third-party applications available to be installed on mobile devices
BYOA
a term encompassing the more than half a million third-party applications available to be installed on mobile devices
unified messaging
a term encompassing the more than half a million third-party applications available to be installed on mobile devices
PIPEDA
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
24
Match between columns
states that an expectation of privacy inside the home is considered reasonable
EDRs
states that an expectation of privacy inside the home is considered reasonable
search incident to arrest
states that an expectation of privacy inside the home is considered reasonable
OCGPA
states that an expectation of privacy inside the home is considered reasonable
DEFR
states that an expectation of privacy inside the home is considered reasonable
closed container
states that an expectation of privacy inside the home is considered reasonable
anti-forensics
states that an expectation of privacy inside the home is considered reasonable
Fourth Amendment
states that an expectation of privacy inside the home is considered reasonable
BYOA
states that an expectation of privacy inside the home is considered reasonable
unified messaging
states that an expectation of privacy inside the home is considered reasonable
PIPEDA
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
25
Match between columns
methods of deleting, altering, or hiding evidence to obstruct a digital forensics investigation
EDRs
methods of deleting, altering, or hiding evidence to obstruct a digital forensics investigation
search incident to arrest
methods of deleting, altering, or hiding evidence to obstruct a digital forensics investigation
OCGPA
methods of deleting, altering, or hiding evidence to obstruct a digital forensics investigation
DEFR
methods of deleting, altering, or hiding evidence to obstruct a digital forensics investigation
closed container
methods of deleting, altering, or hiding evidence to obstruct a digital forensics investigation
anti-forensics
methods of deleting, altering, or hiding evidence to obstruct a digital forensics investigation
Fourth Amendment
methods of deleting, altering, or hiding evidence to obstruct a digital forensics investigation
BYOA
methods of deleting, altering, or hiding evidence to obstruct a digital forensics investigation
unified messaging
methods of deleting, altering, or hiding evidence to obstruct a digital forensics investigation
PIPEDA
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
26
When a(n) __________ request is filed, government agencies must produce this information in a reasonable amount of time.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
27
Match between columns
computers have been treated as these in a legal sense, much like a filing cabinet or a plastic container
EDRs
computers have been treated as these in a legal sense, much like a filing cabinet or a plastic container
search incident to arrest
computers have been treated as these in a legal sense, much like a filing cabinet or a plastic container
OCGPA
computers have been treated as these in a legal sense, much like a filing cabinet or a plastic container
DEFR
computers have been treated as these in a legal sense, much like a filing cabinet or a plastic container
closed container
computers have been treated as these in a legal sense, much like a filing cabinet or a plastic container
anti-forensics
computers have been treated as these in a legal sense, much like a filing cabinet or a plastic container
Fourth Amendment
computers have been treated as these in a legal sense, much like a filing cabinet or a plastic container
BYOA
computers have been treated as these in a legal sense, much like a filing cabinet or a plastic container
unified messaging
computers have been treated as these in a legal sense, much like a filing cabinet or a plastic container
PIPEDA
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
28
Match between columns
authorized and trained to collect and transport digital evidence at an investigation scene
EDRs
authorized and trained to collect and transport digital evidence at an investigation scene
search incident to arrest
authorized and trained to collect and transport digital evidence at an investigation scene
OCGPA
authorized and trained to collect and transport digital evidence at an investigation scene
DEFR
authorized and trained to collect and transport digital evidence at an investigation scene
closed container
authorized and trained to collect and transport digital evidence at an investigation scene
anti-forensics
authorized and trained to collect and transport digital evidence at an investigation scene
Fourth Amendment
authorized and trained to collect and transport digital evidence at an investigation scene
BYOA
authorized and trained to collect and transport digital evidence at an investigation scene
unified messaging
authorized and trained to collect and transport digital evidence at an investigation scene
PIPEDA
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
29
An officer is allowed to search a(n) ____________ person and his or her immediate surroundings.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
30
At the end of 2012, a new _______ standard was created to help set more specific guidelines for digital evidence in an attempt to standardize practices worldwide.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
31
The ____________ Amendment of the United States constitution covers unreasonable search and seizure without probable cause.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
32
One new product is Recommind, which uses ____________ coding to sort through thousands of terabytes of data.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
33
Mobile devices that access a company's wireless network show up in the network server ________.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
34
Match between columns
a bill proposed to amend the ECPA that would limit access to e-mail and GPS location information
EDRs
a bill proposed to amend the ECPA that would limit access to e-mail and GPS location information
search incident to arrest
a bill proposed to amend the ECPA that would limit access to e-mail and GPS location information
OCGPA
a bill proposed to amend the ECPA that would limit access to e-mail and GPS location information
DEFR
a bill proposed to amend the ECPA that would limit access to e-mail and GPS location information
closed container
a bill proposed to amend the ECPA that would limit access to e-mail and GPS location information
anti-forensics
a bill proposed to amend the ECPA that would limit access to e-mail and GPS location information
Fourth Amendment
a bill proposed to amend the ECPA that would limit access to e-mail and GPS location information
BYOA
a bill proposed to amend the ECPA that would limit access to e-mail and GPS location information
unified messaging
a bill proposed to amend the ECPA that would limit access to e-mail and GPS location information
PIPEDA
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
35
Match between columns
a term used to specify that law enforcement can search an arrested person and anything in the immediate vicinity
EDRs
a term used to specify that law enforcement can search an arrested person and anything in the immediate vicinity
search incident to arrest
a term used to specify that law enforcement can search an arrested person and anything in the immediate vicinity
OCGPA
a term used to specify that law enforcement can search an arrested person and anything in the immediate vicinity
DEFR
a term used to specify that law enforcement can search an arrested person and anything in the immediate vicinity
closed container
a term used to specify that law enforcement can search an arrested person and anything in the immediate vicinity
anti-forensics
a term used to specify that law enforcement can search an arrested person and anything in the immediate vicinity
Fourth Amendment
a term used to specify that law enforcement can search an arrested person and anything in the immediate vicinity
BYOA
a term used to specify that law enforcement can search an arrested person and anything in the immediate vicinity
unified messaging
a term used to specify that law enforcement can search an arrested person and anything in the immediate vicinity
PIPEDA
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
36
With the advent of the Internet and related technology, _________ concerns extended to places such as e-mail and voicemail.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
37
Police can search a suspect's shoulder bag when that suspect is arrested due to the principal of ___________ searches.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
38
Another challenge that has plagued the digital forensics community has been qualifications for digital forensics ______________.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
39
The OCGPA severely restricts tracking citizens by using _________ locators in mobile devices.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
40
Match between columns
devices that record the use of airbags, brakes, safety belts, and so forth
EDRs
devices that record the use of airbags, brakes, safety belts, and so forth
search incident to arrest
devices that record the use of airbags, brakes, safety belts, and so forth
OCGPA
devices that record the use of airbags, brakes, safety belts, and so forth
DEFR
devices that record the use of airbags, brakes, safety belts, and so forth
closed container
devices that record the use of airbags, brakes, safety belts, and so forth
anti-forensics
devices that record the use of airbags, brakes, safety belts, and so forth
Fourth Amendment
devices that record the use of airbags, brakes, safety belts, and so forth
BYOA
devices that record the use of airbags, brakes, safety belts, and so forth
unified messaging
devices that record the use of airbags, brakes, safety belts, and so forth
PIPEDA
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
41
What is the principle of "closed container" with respect to a computer? Give an example.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
42
What new bill was proposed as a result of the Petraeus scandal with respect to GPS tracking? Describe that bill.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
43
Describe how privacy can be an issue with cloud storage.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
44
Describe anti-forensics. What are some anti-forensics behaviors?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
45
What are some of the questions raised by technological advances such as the cloud?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
46
Describe United States v. Karo and how the Fourth Amendment came into play in that case.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
47
What are some of the data that might be found on mobile devices and where might the data be stored?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
48
What has been done to address the lack of standards for digital forensics investigators?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
49
How does ISO 27037:2012 help with the fact that law often lags behind technology?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
50
Describe the "search incident to arrest" principle and how it was applied in Chimel v. California.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 50 flashcards in this deck.