You've detected a computer crime and decided to report that activity to law enforcement. Before you touch the affected machine, open a single event log, or run another program, you must secure all digital evidence. Yet the steps necessary to maintain the integrity of digital evidence often run contrary to common IT practices. Our Computer crime evidence-preservation checklist tells you what to do and what not to do in the aftermath of a computer crime.
Download and review the checklist:
Then, use this discussion to share your experiences with the aftermath of computer crime.
Also, let us know if our Computer crime evidence-preservation checklist provided helpful information and if there's anything we can do to improve the document's format.
Keep Up with TechRepublic