SlideShare une entreprise Scribd logo
1  sur  6
Télécharger pour lire hors ligne
Codes of Practice and
Conduct
Appendix: Digital Forensic Services

FSR-C-107-001

Consultation Draft




  This is a consultation draft and therefore should not be regarded or used as a standard. This draft is issued to allow comments
  from interested parties; all comments will be given consideration prior to publication. Comments should be sent to
  FSRConsultation2@homeoffice.gsi.gov.uk using the form available from http://www.homeoffice.gov.uk/agencies-public-
  bodies/fsr/ and should be submitted by 10 MARCH 2013. This mailbox is not for general correspondence and is not routinely
  monitored so no acknowledgement will normally be sent.
  THIS DRAFT IS NOT CURRENT BEYOND 10 MARCH 2013.




© Crown Copyright 2012

The text in this document (excluding the Forensic Science Regulator’s logo and material quoted from other sources) may be
reproduced free of charge in any format or medium providing it is reproduced accurately and not used in a misleading context. The
material must be acknowledged as Crown Copyright and its title specified.
Codes of Practice and Conduct




1.         INTRODUCTION

1.1.1      The provider of digital forensic science (the provider) shall comply with the
           Codes of Practice and Conduct (the Codes) and be accredited to BS EN
           ISO/IEC 17020:2004 for any crime scene activity and BS EN ISO/IEC
           17025:2005 for any laboratory function (such as the recovery or imaging of
           electronic data).

1.1.2      This appendix provides further explanation of some of the requirements of the
           Codes specifically pertaining to the provision of digital analysis.

1.1.3      This appendix should be read alongside with the Codes, BS EN ISO/IEC
           17025:2005 and ILAC-G19 and will generally follow the heading titles used in
           the Codes with cross references to ISO 17025:2005 given in parentheses.

2.         SCOPE
2.1.1      This appendix covers digital forensics work only as it applies to the
           identification, capture, preservation, investigation, evaluation, reporting and
           storage of data on digital data storage devices and mobile phone devices.

3.         TECHNICAL RECORDS (ISO 17025:2005, 4.13.2)
3.1.1      The provider shall include in policies and procedures, appropriate to the device
           and/or scope of the planned activity, which incorporate:

           a.   Keeping a record of the state, mode and physical condition of any seized
                device and any potentially relevant information; and
           b.   Labelling the components of the device and taking legible photographs
                (screen, computer front and back, and the area around the device to be
                seized) and/or sketching of the device’s connections and surrounding area
                where relevant.

3.1.2      A contemporaneous audit trail to be retained, to show all changes to the data
           without obscuring the original data. It shall be possible to associate all changes
           to data with the person having made those changes, for example by the use of
           timed and dated (electronic) signatures. Reasons for changes shall be given.

3.1.3      The provider shall ensure that an audit trail is created and preserved for all
           processes or methods applied to computer-based electronic evidence, to the

FSR-C-107-001 Consultation Draft                                                   Page 2 of 6
Codes of Practice and Conduct



           extent that an independent third party would be able to examine and repeat the
           processes and achieve the same result.

4.         TEST METHODS AND METHOD VALIDATION

4.1        Selection of methods (ISO 17025:2005, 5.4.22)
4.1.1      With consideration of any instructions from the customer the provider shall
           consider, in the context of each specific case and the type of evidence being
           sought (e.g. photographs, spreadsheets, documents, databases, financial
           records), the potential value of obtaining:

           a.   Additional information regarding the case (e.g. aliases, e-mail accounts, e-
                mail addresses, ISP used, names, network configuration and users,
                system logs, passwords, user names);additional digital evidence (e.g. by
                sending a preservation order to an Internet Service Provider (ISP),
                identifying remote storage locations, obtaining e-mail); and
           b.   The relevance of peripheral components to the investigation (for example,
                in forgery or fraud cases, non-computer equipment such as laminators,
                credit card blanks, cheque paper, scanners, and printers; in child
                pornography cases, digital cameras).

4.1.2      The provider shall take account of the need for backup and redundancy when
           working on cases, to ensure that a single technical failure (e.g. a power loss or
           disk corruption) will not result in loss of data on working copies.

4.1.3      Software, hardware and software tools whose operation has an impact in
           obtaining results will require validation, or any existing validation to be verified,
           as laid out in section 5, Validation of methods.

4.1.4      The provider shall ensure that, for the range of digital forensics tools it uses, the
           validation requirements take account of staff competency levels, the nature and
           difficulty of the tasks to be carried out, and the level of acceptance of the tool in
           the wider forensic science and criminal justice community.




FSR-C-107-001 Consultation Draft                                                      Page 3 of 6
Codes of Practice and Conduct



5.         VALIDATION OF METHODS

5.1        Risk assessment of the method
5.1.1      The risk assessment process detailed in the Codes is intended to determine the
           impact of the overall method and the operation of deployed software tools in the
           digital forensic science process may have. It is important to look at how the how
           the method or tool is to be used, the configuration and to systematically look at
           the types of risk that might occur. For instance, when imaging storage media,
           the risks may include:

           a.    Writing onto the evidential machine storage;
           b.    Returning incomplete and/or misleading data; or
           c.    Incorrectly determining the media to be unreadable.

5.1.2      In certain parts of the process, the competent use of a suite of software tools or
           the use of visual/manual checks could be demonstrated to mitigate the
           identified risks in the method. Proper consideration of the nature of risks at this
           stage should feed into the development of the method as well as the validation
           strategy.

5.1.3      The development of the forensic science process and the subsequent validation
           shall set out how the identified risks are being addressed and how the
           effectiveness of the action will be tested along with the end-user requirements.

5.2        Validation of measurement based methods (Codes, 20.8)

5.2.1      Measurement based methods can include extraction processes using
           automated tools or manual methods for the purpose of providing data.

5.2.2      Any of the functional and performance requirements listed a-m under paragraph
           29 in this section of the Codes may be applicable, however it is expected that
           the following from the list in section 20.8.2 of the Codes shall normally be given
           greater consideration for software or digital applications:

           a.    The competence requirements of the analyst/user;
           b.    Environmental constraints;
           ...




FSR-C-107-001 Consultation Draft                                                    Page 4 of 6
Codes of Practice and Conduct



           f.   The ability of the sampling process to provide a representative sample of
                the exhibit;

           l.   The results are consistent, reliable, accurate, robust and with an
                uncertainty measurement; and

           m.   The limitations of applicability.

5.3        Verification of the validation of adopted methods (Codes, 20.10)

5.3.1      In most cases adopted methods or software tools and scripts should follow a
           tailored process for the validation of measurement based methods. However, as
           an adopted method would normally be expected to be already well supported
           through documentation, available validation studies, testing-house studies or
           published papers much of the required work may only require verifying as
           detailed in the Codes.

5.3.2      There is a requirement in the Codes for the production of an available library of
           documents relevant to the authorisation of the method and production of the
           certificate of validation completion.

5.3.3      The final requirement in the Codes is to demonstrate the method works in the
           hands of the intended users.

5.4        Verification of minor changes in methods

5.4.1      Methods are validated to a specific configuration; therefore any changes in any
           constituent parts (hardware, firmware, script, operating system etc.) may affect
           its overall operation and any dependant systems which could invalidate the
           results.

5.4.2      Any proposed change should be risk assessed at the method level as even a
           patch in a software tool may adversely affect the operation of a second tool or
           process using its output e.g. giving a plausible but incorrect date stamp. Other
           examples include at tool inadvertently becoming write-enabled through a
           firmware update.




FSR-C-107-001 Consultation Draft                                                  Page 5 of 6
Codes of Practice and Conduct



5.5        Implementation plan and any constraints

5.5.1      The implementation plan is required to include monitoring of controls and
           communication which in the digital forensic sciences should include
           configuration management, dependencies, how identified
           software/firmware/hardware bugs are to be handled and how patches etc. are to
           be controlled (see Verification of minor changes in methods).

6.         HANDLING OF TEST ITEMS (ISO 17025:2005, 5.8)

6.1        Exhibit handling, protection and storage

6.1.1      The provider shall ensure that the value of any other type of evidence that may
           be present is not compromised during the capture, preservation and
           investigation of the digital evidence.

6.1.2      The provider shall ensure that devices containing potential digital evidence are
           packaged, sealed and transported in such a way as to protect the integrity of
           the digital evidence.

6.1.3      There are two main issues to consider in the transporting of digital evidence:

           a.   The security of the device and digital evidence to ensure that access to it
                is correctly supervised when moving it from the scene to the laboratory or
                other location; and

           b.   Protection of the device and digital evidence to ensure that it is not
                affected by physical shock, electromagnetic interference, extremes of heat
                and humidity or other environmental hazard.




FSR-C-107-001 Consultation Draft                                                   Page 6 of 6

Contenu connexe

Tendances

CSV - Computer System Validation
CSV - Computer System Validation CSV - Computer System Validation
CSV - Computer System Validation JayaKrishna161
 
Computer system validations
Computer system validations Computer system validations
Computer system validations Saikiran Koyalkar
 
21 CFR Part11_CSV Training_Katalyst HLS
21 CFR Part11_CSV Training_Katalyst HLS21 CFR Part11_CSV Training_Katalyst HLS
21 CFR Part11_CSV Training_Katalyst HLSKatalyst HLS
 
Computer System Validation Training
Computer System Validation TrainingComputer System Validation Training
Computer System Validation TrainingNetZealous LLC
 
Process and Regulated Processes Software Validation Elements
Process and Regulated Processes Software Validation ElementsProcess and Regulated Processes Software Validation Elements
Process and Regulated Processes Software Validation ElementsArta Doci
 
IRJET- A Survey for Block Chaining based Cyber Security System for Fiscal Dev...
IRJET- A Survey for Block Chaining based Cyber Security System for Fiscal Dev...IRJET- A Survey for Block Chaining based Cyber Security System for Fiscal Dev...
IRJET- A Survey for Block Chaining based Cyber Security System for Fiscal Dev...IRJET Journal
 
Computer-System-Validation
Computer-System-ValidationComputer-System-Validation
Computer-System-ValidationHal Plant
 
Csv 21 Cfr11
Csv 21 Cfr11Csv 21 Cfr11
Csv 21 Cfr11aquitazol
 
Computerized system validation_final
Computerized system validation_finalComputerized system validation_final
Computerized system validation_finalDuy Tan Geek
 
CISA exam 100 practice question
CISA exam 100 practice questionCISA exam 100 practice question
CISA exam 100 practice questionArshad A Javed
 
Computer System Validation
Computer System ValidationComputer System Validation
Computer System ValidationEric Silva
 
21 cfr part 11 an approach towards compliance
21 cfr part 11   an approach towards compliance21 cfr part 11   an approach towards compliance
21 cfr part 11 an approach towards compliancedeepak mishra
 
WP_UL Compliance wth 21CFR Part_11
WP_UL Compliance wth 21CFR Part_11WP_UL Compliance wth 21CFR Part_11
WP_UL Compliance wth 21CFR Part_11Jamie Corn, MBA
 
Computer system validation review article by-mahesh b wazade
Computer system validation review article by-mahesh b wazadeComputer system validation review article by-mahesh b wazade
Computer system validation review article by-mahesh b wazadeMahesh B. Wazade
 
Achieving a 21 CFR Part 11 Compliant eTMF
Achieving a 21 CFR Part 11 Compliant eTMFAchieving a 21 CFR Part 11 Compliant eTMF
Achieving a 21 CFR Part 11 Compliant eTMFpaulkfenton
 

Tendances (20)

CSV - Computer System Validation
CSV - Computer System Validation CSV - Computer System Validation
CSV - Computer System Validation
 
Computer system validations
Computer system validations Computer system validations
Computer system validations
 
21 CFR Part11_CSV Training_Katalyst HLS
21 CFR Part11_CSV Training_Katalyst HLS21 CFR Part11_CSV Training_Katalyst HLS
21 CFR Part11_CSV Training_Katalyst HLS
 
Computer System Validation Training
Computer System Validation TrainingComputer System Validation Training
Computer System Validation Training
 
Process and Regulated Processes Software Validation Elements
Process and Regulated Processes Software Validation ElementsProcess and Regulated Processes Software Validation Elements
Process and Regulated Processes Software Validation Elements
 
IRJET- A Survey for Block Chaining based Cyber Security System for Fiscal Dev...
IRJET- A Survey for Block Chaining based Cyber Security System for Fiscal Dev...IRJET- A Survey for Block Chaining based Cyber Security System for Fiscal Dev...
IRJET- A Survey for Block Chaining based Cyber Security System for Fiscal Dev...
 
Computer system validations
Computer system validationsComputer system validations
Computer system validations
 
Computer-System-Validation
Computer-System-ValidationComputer-System-Validation
Computer-System-Validation
 
21 CFR PART 11
21 CFR PART 1121 CFR PART 11
21 CFR PART 11
 
Computer systems compliance
Computer systems complianceComputer systems compliance
Computer systems compliance
 
Csv 21 Cfr11
Csv 21 Cfr11Csv 21 Cfr11
Csv 21 Cfr11
 
Computerized system validation_final
Computerized system validation_finalComputerized system validation_final
Computerized system validation_final
 
CISA exam 100 practice question
CISA exam 100 practice questionCISA exam 100 practice question
CISA exam 100 practice question
 
Understanding 21 cfr part 11
Understanding 21 cfr part 11Understanding 21 cfr part 11
Understanding 21 cfr part 11
 
Computer System Validation
Computer System ValidationComputer System Validation
Computer System Validation
 
21 cfr part 11 an approach towards compliance
21 cfr part 11   an approach towards compliance21 cfr part 11   an approach towards compliance
21 cfr part 11 an approach towards compliance
 
WP_UL Compliance wth 21CFR Part_11
WP_UL Compliance wth 21CFR Part_11WP_UL Compliance wth 21CFR Part_11
WP_UL Compliance wth 21CFR Part_11
 
Computer system validation review article by-mahesh b wazade
Computer system validation review article by-mahesh b wazadeComputer system validation review article by-mahesh b wazade
Computer system validation review article by-mahesh b wazade
 
Achieving a 21 CFR Part 11 Compliant eTMF
Achieving a 21 CFR Part 11 Compliant eTMFAchieving a 21 CFR Part 11 Compliant eTMF
Achieving a 21 CFR Part 11 Compliant eTMF
 
21 cfr part 11
21 cfr part 1121 cfr part 11
21 cfr part 11
 

En vedette

Cxair Tech Overview V5
Cxair Tech Overview V5Cxair Tech Overview V5
Cxair Tech Overview V5keesgelderblom
 
When developer's api simplify user mode rootkits developing.
When developer's api simplify user mode rootkits developing.When developer's api simplify user mode rootkits developing.
When developer's api simplify user mode rootkits developing.Yury Chemerkin
 
Whitepaper Multidomain Mdm
Whitepaper Multidomain MdmWhitepaper Multidomain Mdm
Whitepaper Multidomain Mdmkeesgelderblom
 
Blackberry playbook – new challenges
Blackberry playbook – new challengesBlackberry playbook – new challenges
Blackberry playbook – new challengesYury Chemerkin
 
Social network privacy guide
Social network privacy guideSocial network privacy guide
Social network privacy guideYury Chemerkin
 
Windows 8. important considerations for computer forensics and electronic dis...
Windows 8. important considerations for computer forensics and electronic dis...Windows 8. important considerations for computer forensics and electronic dis...
Windows 8. important considerations for computer forensics and electronic dis...Yury Chemerkin
 
Krzysztof kotowicz. something wicked this way comes
Krzysztof kotowicz. something wicked this way comesKrzysztof kotowicz. something wicked this way comes
Krzysztof kotowicz. something wicked this way comesYury Chemerkin
 
Uxue,josu and aitor
Uxue,josu and aitorUxue,josu and aitor
Uxue,josu and aitorabmorlans3rd
 
Accu link’s intelimailer new digital letter package 3 13-with video
Accu link’s intelimailer new digital letter package 3 13-with videoAccu link’s intelimailer new digital letter package 3 13-with video
Accu link’s intelimailer new digital letter package 3 13-with videoArt Morrison
 
N 20081214 el coltán - regalo envenenado del congo
N 20081214 el coltán - regalo envenenado del congoN 20081214 el coltán - regalo envenenado del congo
N 20081214 el coltán - regalo envenenado del congorubindecelis32
 
Sin título 1
Sin título 1Sin título 1
Sin título 1lmrn599
 
Introducing the CGIAR in Ethiopia
Introducing the CGIAR in EthiopiaIntroducing the CGIAR in Ethiopia
Introducing the CGIAR in EthiopiaILRI
 
Gcsp módulo 1
Gcsp módulo 1Gcsp módulo 1
Gcsp módulo 1diegomilka
 
Filip palian mateuszkocielski. simplest ownage human observed… routers
Filip palian mateuszkocielski. simplest ownage human observed… routersFilip palian mateuszkocielski. simplest ownage human observed… routers
Filip palian mateuszkocielski. simplest ownage human observed… routersYury Chemerkin
 
Педагогические специальности
Педагогические специальностиПедагогические специальности
Педагогические специальностиlabdua
 
Revista Ejército nº 897 del mes diciembre de 2015
Revista Ejército nº 897 del mes diciembre de 2015Revista Ejército nº 897 del mes diciembre de 2015
Revista Ejército nº 897 del mes diciembre de 2015Ejército de Tierra
 
ทฤษฎีพัฒนาการของเพียเจต์
ทฤษฎีพัฒนาการของเพียเจต์ทฤษฎีพัฒนาการของเพียเจต์
ทฤษฎีพัฒนาการของเพียเจต์suraidabungasayu
 
le marché du e-learning : l'offre
le marché du e-learning : l'offrele marché du e-learning : l'offre
le marché du e-learning : l'offreVirginie Lanlo
 

En vedette (20)

Tío andy
Tío andyTío andy
Tío andy
 
Cxair Tech Overview V5
Cxair Tech Overview V5Cxair Tech Overview V5
Cxair Tech Overview V5
 
When developer's api simplify user mode rootkits developing.
When developer's api simplify user mode rootkits developing.When developer's api simplify user mode rootkits developing.
When developer's api simplify user mode rootkits developing.
 
Whitepaper Multidomain Mdm
Whitepaper Multidomain MdmWhitepaper Multidomain Mdm
Whitepaper Multidomain Mdm
 
Blackberry playbook – new challenges
Blackberry playbook – new challengesBlackberry playbook – new challenges
Blackberry playbook – new challenges
 
Social network privacy guide
Social network privacy guideSocial network privacy guide
Social network privacy guide
 
Windows 8. important considerations for computer forensics and electronic dis...
Windows 8. important considerations for computer forensics and electronic dis...Windows 8. important considerations for computer forensics and electronic dis...
Windows 8. important considerations for computer forensics and electronic dis...
 
Krzysztof kotowicz. something wicked this way comes
Krzysztof kotowicz. something wicked this way comesKrzysztof kotowicz. something wicked this way comes
Krzysztof kotowicz. something wicked this way comes
 
Uxue,josu and aitor
Uxue,josu and aitorUxue,josu and aitor
Uxue,josu and aitor
 
Accu link’s intelimailer new digital letter package 3 13-with video
Accu link’s intelimailer new digital letter package 3 13-with videoAccu link’s intelimailer new digital letter package 3 13-with video
Accu link’s intelimailer new digital letter package 3 13-with video
 
N 20081214 el coltán - regalo envenenado del congo
N 20081214 el coltán - regalo envenenado del congoN 20081214 el coltán - regalo envenenado del congo
N 20081214 el coltán - regalo envenenado del congo
 
Sin título 1
Sin título 1Sin título 1
Sin título 1
 
Mystuff
MystuffMystuff
Mystuff
 
Introducing the CGIAR in Ethiopia
Introducing the CGIAR in EthiopiaIntroducing the CGIAR in Ethiopia
Introducing the CGIAR in Ethiopia
 
Gcsp módulo 1
Gcsp módulo 1Gcsp módulo 1
Gcsp módulo 1
 
Filip palian mateuszkocielski. simplest ownage human observed… routers
Filip palian mateuszkocielski. simplest ownage human observed… routersFilip palian mateuszkocielski. simplest ownage human observed… routers
Filip palian mateuszkocielski. simplest ownage human observed… routers
 
Педагогические специальности
Педагогические специальностиПедагогические специальности
Педагогические специальности
 
Revista Ejército nº 897 del mes diciembre de 2015
Revista Ejército nº 897 del mes diciembre de 2015Revista Ejército nº 897 del mes diciembre de 2015
Revista Ejército nº 897 del mes diciembre de 2015
 
ทฤษฎีพัฒนาการของเพียเจต์
ทฤษฎีพัฒนาการของเพียเจต์ทฤษฎีพัฒนาการของเพียเจต์
ทฤษฎีพัฒนาการของเพียเจต์
 
le marché du e-learning : l'offre
le marché du e-learning : l'offrele marché du e-learning : l'offre
le marché du e-learning : l'offre
 

Similaire à Digital forensic-cons

VAL-210-Computer-Validati-Plan-sample.pdf
VAL-210-Computer-Validati-Plan-sample.pdfVAL-210-Computer-Validati-Plan-sample.pdf
VAL-210-Computer-Validati-Plan-sample.pdfSamehMostafa33
 
Calibration/PM and Asset Management in Bio-Med Applications
Calibration/PM and Asset Management in Bio-Med ApplicationsCalibration/PM and Asset Management in Bio-Med Applications
Calibration/PM and Asset Management in Bio-Med ApplicationsSanjay Dhal , MS, MBA
 
Computer System Validation A Review
Computer System Validation A ReviewComputer System Validation A Review
Computer System Validation A Reviewijtsrd
 
Safety System Modularity
Safety System ModularitySafety System Modularity
Safety System ModularityFasiul Alam
 
A GAMP Approach to Data Integrity, Electronic Records & Signatures & Operati...
A GAMP Approach to Data Integrity, Electronic Records & Signatures &  Operati...A GAMP Approach to Data Integrity, Electronic Records & Signatures &  Operati...
A GAMP Approach to Data Integrity, Electronic Records & Signatures & Operati...sazalsutra
 
PICS - Good Comp Systems - URS.pdf
PICS - Good Comp Systems - URS.pdfPICS - Good Comp Systems - URS.pdf
PICS - Good Comp Systems - URS.pdfPhmHuNgcVinh
 
GOOD AUTOMATED LABORATORY PRACTICE
GOOD AUTOMATED LABORATORY PRACTICEGOOD AUTOMATED LABORATORY PRACTICE
GOOD AUTOMATED LABORATORY PRACTICEjagrutivasava
 
1 - Introduction to Computerized Systems Validation - for review.pptx
1 - Introduction to Computerized Systems Validation - for review.pptx1 - Introduction to Computerized Systems Validation - for review.pptx
1 - Introduction to Computerized Systems Validation - for review.pptxpatemalabanan
 
Trackment
TrackmentTrackment
Trackmentmeaannn
 
Concept of URS,DQ,IQ,OQ,PQ
Concept of URS,DQ,IQ,OQ,PQConcept of URS,DQ,IQ,OQ,PQ
Concept of URS,DQ,IQ,OQ,PQdhavalrock24
 
Project Business Case and Capital Justification for Implementation of Applica...
Project Business Case and Capital Justification for Implementation of Applica...Project Business Case and Capital Justification for Implementation of Applica...
Project Business Case and Capital Justification for Implementation of Applica...Duane Bodle
 
Auditing In Computer Environment Presentation
Auditing In Computer Environment PresentationAuditing In Computer Environment Presentation
Auditing In Computer Environment PresentationEMAC Consulting Group
 
DIACAP IA CONTROLS Requirements Document
DIACAP IA CONTROLS Requirements DocumentDIACAP IA CONTROLS Requirements Document
DIACAP IA CONTROLS Requirements DocumentNicole Gaehle, MSIST
 
Digital Security by Design: ISCF Digital Security by Design Research Projects...
Digital Security by Design: ISCF Digital Security by Design Research Projects...Digital Security by Design: ISCF Digital Security by Design Research Projects...
Digital Security by Design: ISCF Digital Security by Design Research Projects...KTN
 
January 2013 world Pipeline magazine Article
January  2013 world Pipeline magazine ArticleJanuary  2013 world Pipeline magazine Article
January 2013 world Pipeline magazine ArticleLayne Tucker
 

Similaire à Digital forensic-cons (20)

VAL-210-Computer-Validati-Plan-sample.pdf
VAL-210-Computer-Validati-Plan-sample.pdfVAL-210-Computer-Validati-Plan-sample.pdf
VAL-210-Computer-Validati-Plan-sample.pdf
 
Calibration/PM and Asset Management in Bio-Med Applications
Calibration/PM and Asset Management in Bio-Med ApplicationsCalibration/PM and Asset Management in Bio-Med Applications
Calibration/PM and Asset Management in Bio-Med Applications
 
Computer System Validation A Review
Computer System Validation A ReviewComputer System Validation A Review
Computer System Validation A Review
 
Safety System Modularity
Safety System ModularitySafety System Modularity
Safety System Modularity
 
A GAMP Approach to Data Integrity, Electronic Records & Signatures & Operati...
A GAMP Approach to Data Integrity, Electronic Records & Signatures &  Operati...A GAMP Approach to Data Integrity, Electronic Records & Signatures &  Operati...
A GAMP Approach to Data Integrity, Electronic Records & Signatures & Operati...
 
PICS - Good Comp Systems - URS.pdf
PICS - Good Comp Systems - URS.pdfPICS - Good Comp Systems - URS.pdf
PICS - Good Comp Systems - URS.pdf
 
Computer system overview
Computer system overviewComputer system overview
Computer system overview
 
GOOD AUTOMATED LABORATORY PRACTICE
GOOD AUTOMATED LABORATORY PRACTICEGOOD AUTOMATED LABORATORY PRACTICE
GOOD AUTOMATED LABORATORY PRACTICE
 
1 - Introduction to Computerized Systems Validation - for review.pptx
1 - Introduction to Computerized Systems Validation - for review.pptx1 - Introduction to Computerized Systems Validation - for review.pptx
1 - Introduction to Computerized Systems Validation - for review.pptx
 
commissioning c-3
commissioning c-3commissioning c-3
commissioning c-3
 
Chapter 6
Chapter 6Chapter 6
Chapter 6
 
Trackment
TrackmentTrackment
Trackment
 
Concept of URS,DQ,IQ,OQ,PQ
Concept of URS,DQ,IQ,OQ,PQConcept of URS,DQ,IQ,OQ,PQ
Concept of URS,DQ,IQ,OQ,PQ
 
Vaidation ppt.pptx
Vaidation ppt.pptxVaidation ppt.pptx
Vaidation ppt.pptx
 
Project Business Case and Capital Justification for Implementation of Applica...
Project Business Case and Capital Justification for Implementation of Applica...Project Business Case and Capital Justification for Implementation of Applica...
Project Business Case and Capital Justification for Implementation of Applica...
 
Auditing In Computer Environment Presentation
Auditing In Computer Environment PresentationAuditing In Computer Environment Presentation
Auditing In Computer Environment Presentation
 
Equipment Qualification
Equipment QualificationEquipment Qualification
Equipment Qualification
 
DIACAP IA CONTROLS Requirements Document
DIACAP IA CONTROLS Requirements DocumentDIACAP IA CONTROLS Requirements Document
DIACAP IA CONTROLS Requirements Document
 
Digital Security by Design: ISCF Digital Security by Design Research Projects...
Digital Security by Design: ISCF Digital Security by Design Research Projects...Digital Security by Design: ISCF Digital Security by Design Research Projects...
Digital Security by Design: ISCF Digital Security by Design Research Projects...
 
January 2013 world Pipeline magazine Article
January  2013 world Pipeline magazine ArticleJanuary  2013 world Pipeline magazine Article
January 2013 world Pipeline magazine Article
 

Plus de Yury Chemerkin

Security Vulnerability Notice SE-2012-01-PUBLIC [Security vulnerabilities in ...
Security Vulnerability Notice SE-2012-01-PUBLIC [Security vulnerabilities in ...Security Vulnerability Notice SE-2012-01-PUBLIC [Security vulnerabilities in ...
Security Vulnerability Notice SE-2012-01-PUBLIC [Security vulnerabilities in ...Yury Chemerkin
 
Red october. detailed malware description
Red october. detailed malware descriptionRed october. detailed malware description
Red october. detailed malware descriptionYury Chemerkin
 
Comment crew indicators of compromise
Comment crew indicators of compromiseComment crew indicators of compromise
Comment crew indicators of compromiseYury Chemerkin
 
Appendix g iocs readme
Appendix g iocs readmeAppendix g iocs readme
Appendix g iocs readmeYury Chemerkin
 
Appendix f (digital) ssl certificates
Appendix f (digital)   ssl certificatesAppendix f (digital)   ssl certificates
Appendix f (digital) ssl certificatesYury Chemerkin
 
Appendix e (digital) md5s
Appendix e (digital)   md5sAppendix e (digital)   md5s
Appendix e (digital) md5sYury Chemerkin
 
Appendix d (digital) fqd ns
Appendix d (digital)   fqd nsAppendix d (digital)   fqd ns
Appendix d (digital) fqd nsYury Chemerkin
 
6071f3f4 40e6-4c7b-8868-3b0b21a9f601
6071f3f4 40e6-4c7b-8868-3b0b21a9f6016071f3f4 40e6-4c7b-8868-3b0b21a9f601
6071f3f4 40e6-4c7b-8868-3b0b21a9f601Yury Chemerkin
 
Zane lackey. security at scale. web application security in a continuous depl...
Zane lackey. security at scale. web application security in a continuous depl...Zane lackey. security at scale. web application security in a continuous depl...
Zane lackey. security at scale. web application security in a continuous depl...Yury Chemerkin
 
The stuxnet computer worm. harbinger of an emerging warfare capability
The stuxnet computer worm. harbinger of an emerging warfare capabilityThe stuxnet computer worm. harbinger of an emerging warfare capability
The stuxnet computer worm. harbinger of an emerging warfare capabilityYury Chemerkin
 
Stuxnet. analysis, myths, realities
Stuxnet. analysis, myths, realitiesStuxnet. analysis, myths, realities
Stuxnet. analysis, myths, realitiesYury Chemerkin
 
Stuxnet redux. malware attribution & lessons learned
Stuxnet redux. malware attribution & lessons learnedStuxnet redux. malware attribution & lessons learned
Stuxnet redux. malware attribution & lessons learnedYury Chemerkin
 
Sophos ransom ware fake antivirus
Sophos ransom ware fake antivirusSophos ransom ware fake antivirus
Sophos ransom ware fake antivirusYury Chemerkin
 
Six months later – a report card on google’s demotion of pirate sites
Six months later – a report card on google’s demotion of pirate sitesSix months later – a report card on google’s demotion of pirate sites
Six months later – a report card on google’s demotion of pirate sitesYury Chemerkin
 
Security in the cloud planning guide
Security in the cloud planning guideSecurity in the cloud planning guide
Security in the cloud planning guideYury Chemerkin
 
Security configuration recommendations for apple i os 5 devices
Security configuration recommendations for apple i os 5 devicesSecurity configuration recommendations for apple i os 5 devices
Security configuration recommendations for apple i os 5 devicesYury Chemerkin
 
Render man. hacker + airplanes = no good can come of this
Render man. hacker + airplanes = no good can come of thisRender man. hacker + airplanes = no good can come of this
Render man. hacker + airplanes = no good can come of thisYury Chemerkin
 
Mario heiderich. got your nose! how to steal your precious data without using...
Mario heiderich. got your nose! how to steal your precious data without using...Mario heiderich. got your nose! how to steal your precious data without using...
Mario heiderich. got your nose! how to steal your precious data without using...Yury Chemerkin
 

Plus de Yury Chemerkin (20)

Security Vulnerability Notice SE-2012-01-PUBLIC [Security vulnerabilities in ...
Security Vulnerability Notice SE-2012-01-PUBLIC [Security vulnerabilities in ...Security Vulnerability Notice SE-2012-01-PUBLIC [Security vulnerabilities in ...
Security Vulnerability Notice SE-2012-01-PUBLIC [Security vulnerabilities in ...
 
Red october. detailed malware description
Red october. detailed malware descriptionRed october. detailed malware description
Red october. detailed malware description
 
Comment crew indicators of compromise
Comment crew indicators of compromiseComment crew indicators of compromise
Comment crew indicators of compromise
 
Appendix g iocs readme
Appendix g iocs readmeAppendix g iocs readme
Appendix g iocs readme
 
Appendix f (digital) ssl certificates
Appendix f (digital)   ssl certificatesAppendix f (digital)   ssl certificates
Appendix f (digital) ssl certificates
 
Appendix e (digital) md5s
Appendix e (digital)   md5sAppendix e (digital)   md5s
Appendix e (digital) md5s
 
Appendix d (digital) fqd ns
Appendix d (digital)   fqd nsAppendix d (digital)   fqd ns
Appendix d (digital) fqd ns
 
6071f3f4 40e6-4c7b-8868-3b0b21a9f601
6071f3f4 40e6-4c7b-8868-3b0b21a9f6016071f3f4 40e6-4c7b-8868-3b0b21a9f601
6071f3f4 40e6-4c7b-8868-3b0b21a9f601
 
Jp3 13
Jp3 13Jp3 13
Jp3 13
 
Zane lackey. security at scale. web application security in a continuous depl...
Zane lackey. security at scale. web application security in a continuous depl...Zane lackey. security at scale. web application security in a continuous depl...
Zane lackey. security at scale. web application security in a continuous depl...
 
The stuxnet computer worm. harbinger of an emerging warfare capability
The stuxnet computer worm. harbinger of an emerging warfare capabilityThe stuxnet computer worm. harbinger of an emerging warfare capability
The stuxnet computer worm. harbinger of an emerging warfare capability
 
Stuxnet. analysis, myths, realities
Stuxnet. analysis, myths, realitiesStuxnet. analysis, myths, realities
Stuxnet. analysis, myths, realities
 
Stuxnet redux. malware attribution & lessons learned
Stuxnet redux. malware attribution & lessons learnedStuxnet redux. malware attribution & lessons learned
Stuxnet redux. malware attribution & lessons learned
 
Sophos ransom ware fake antivirus
Sophos ransom ware fake antivirusSophos ransom ware fake antivirus
Sophos ransom ware fake antivirus
 
Six months later – a report card on google’s demotion of pirate sites
Six months later – a report card on google’s demotion of pirate sitesSix months later – a report card on google’s demotion of pirate sites
Six months later – a report card on google’s demotion of pirate sites
 
Security in the cloud planning guide
Security in the cloud planning guideSecurity in the cloud planning guide
Security in the cloud planning guide
 
Security configuration recommendations for apple i os 5 devices
Security configuration recommendations for apple i os 5 devicesSecurity configuration recommendations for apple i os 5 devices
Security configuration recommendations for apple i os 5 devices
 
Render man. hacker + airplanes = no good can come of this
Render man. hacker + airplanes = no good can come of thisRender man. hacker + airplanes = no good can come of this
Render man. hacker + airplanes = no good can come of this
 
Msft oracle brief
Msft oracle briefMsft oracle brief
Msft oracle brief
 
Mario heiderich. got your nose! how to steal your precious data without using...
Mario heiderich. got your nose! how to steal your precious data without using...Mario heiderich. got your nose! how to steal your precious data without using...
Mario heiderich. got your nose! how to steal your precious data without using...
 

Dernier

(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 

Dernier (20)

(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 

Digital forensic-cons

  • 1. Codes of Practice and Conduct Appendix: Digital Forensic Services FSR-C-107-001 Consultation Draft This is a consultation draft and therefore should not be regarded or used as a standard. This draft is issued to allow comments from interested parties; all comments will be given consideration prior to publication. Comments should be sent to FSRConsultation2@homeoffice.gsi.gov.uk using the form available from http://www.homeoffice.gov.uk/agencies-public- bodies/fsr/ and should be submitted by 10 MARCH 2013. This mailbox is not for general correspondence and is not routinely monitored so no acknowledgement will normally be sent. THIS DRAFT IS NOT CURRENT BEYOND 10 MARCH 2013. © Crown Copyright 2012 The text in this document (excluding the Forensic Science Regulator’s logo and material quoted from other sources) may be reproduced free of charge in any format or medium providing it is reproduced accurately and not used in a misleading context. The material must be acknowledged as Crown Copyright and its title specified.
  • 2. Codes of Practice and Conduct 1. INTRODUCTION 1.1.1 The provider of digital forensic science (the provider) shall comply with the Codes of Practice and Conduct (the Codes) and be accredited to BS EN ISO/IEC 17020:2004 for any crime scene activity and BS EN ISO/IEC 17025:2005 for any laboratory function (such as the recovery or imaging of electronic data). 1.1.2 This appendix provides further explanation of some of the requirements of the Codes specifically pertaining to the provision of digital analysis. 1.1.3 This appendix should be read alongside with the Codes, BS EN ISO/IEC 17025:2005 and ILAC-G19 and will generally follow the heading titles used in the Codes with cross references to ISO 17025:2005 given in parentheses. 2. SCOPE 2.1.1 This appendix covers digital forensics work only as it applies to the identification, capture, preservation, investigation, evaluation, reporting and storage of data on digital data storage devices and mobile phone devices. 3. TECHNICAL RECORDS (ISO 17025:2005, 4.13.2) 3.1.1 The provider shall include in policies and procedures, appropriate to the device and/or scope of the planned activity, which incorporate: a. Keeping a record of the state, mode and physical condition of any seized device and any potentially relevant information; and b. Labelling the components of the device and taking legible photographs (screen, computer front and back, and the area around the device to be seized) and/or sketching of the device’s connections and surrounding area where relevant. 3.1.2 A contemporaneous audit trail to be retained, to show all changes to the data without obscuring the original data. It shall be possible to associate all changes to data with the person having made those changes, for example by the use of timed and dated (electronic) signatures. Reasons for changes shall be given. 3.1.3 The provider shall ensure that an audit trail is created and preserved for all processes or methods applied to computer-based electronic evidence, to the FSR-C-107-001 Consultation Draft Page 2 of 6
  • 3. Codes of Practice and Conduct extent that an independent third party would be able to examine and repeat the processes and achieve the same result. 4. TEST METHODS AND METHOD VALIDATION 4.1 Selection of methods (ISO 17025:2005, 5.4.22) 4.1.1 With consideration of any instructions from the customer the provider shall consider, in the context of each specific case and the type of evidence being sought (e.g. photographs, spreadsheets, documents, databases, financial records), the potential value of obtaining: a. Additional information regarding the case (e.g. aliases, e-mail accounts, e- mail addresses, ISP used, names, network configuration and users, system logs, passwords, user names);additional digital evidence (e.g. by sending a preservation order to an Internet Service Provider (ISP), identifying remote storage locations, obtaining e-mail); and b. The relevance of peripheral components to the investigation (for example, in forgery or fraud cases, non-computer equipment such as laminators, credit card blanks, cheque paper, scanners, and printers; in child pornography cases, digital cameras). 4.1.2 The provider shall take account of the need for backup and redundancy when working on cases, to ensure that a single technical failure (e.g. a power loss or disk corruption) will not result in loss of data on working copies. 4.1.3 Software, hardware and software tools whose operation has an impact in obtaining results will require validation, or any existing validation to be verified, as laid out in section 5, Validation of methods. 4.1.4 The provider shall ensure that, for the range of digital forensics tools it uses, the validation requirements take account of staff competency levels, the nature and difficulty of the tasks to be carried out, and the level of acceptance of the tool in the wider forensic science and criminal justice community. FSR-C-107-001 Consultation Draft Page 3 of 6
  • 4. Codes of Practice and Conduct 5. VALIDATION OF METHODS 5.1 Risk assessment of the method 5.1.1 The risk assessment process detailed in the Codes is intended to determine the impact of the overall method and the operation of deployed software tools in the digital forensic science process may have. It is important to look at how the how the method or tool is to be used, the configuration and to systematically look at the types of risk that might occur. For instance, when imaging storage media, the risks may include: a. Writing onto the evidential machine storage; b. Returning incomplete and/or misleading data; or c. Incorrectly determining the media to be unreadable. 5.1.2 In certain parts of the process, the competent use of a suite of software tools or the use of visual/manual checks could be demonstrated to mitigate the identified risks in the method. Proper consideration of the nature of risks at this stage should feed into the development of the method as well as the validation strategy. 5.1.3 The development of the forensic science process and the subsequent validation shall set out how the identified risks are being addressed and how the effectiveness of the action will be tested along with the end-user requirements. 5.2 Validation of measurement based methods (Codes, 20.8) 5.2.1 Measurement based methods can include extraction processes using automated tools or manual methods for the purpose of providing data. 5.2.2 Any of the functional and performance requirements listed a-m under paragraph 29 in this section of the Codes may be applicable, however it is expected that the following from the list in section 20.8.2 of the Codes shall normally be given greater consideration for software or digital applications: a. The competence requirements of the analyst/user; b. Environmental constraints; ... FSR-C-107-001 Consultation Draft Page 4 of 6
  • 5. Codes of Practice and Conduct f. The ability of the sampling process to provide a representative sample of the exhibit; l. The results are consistent, reliable, accurate, robust and with an uncertainty measurement; and m. The limitations of applicability. 5.3 Verification of the validation of adopted methods (Codes, 20.10) 5.3.1 In most cases adopted methods or software tools and scripts should follow a tailored process for the validation of measurement based methods. However, as an adopted method would normally be expected to be already well supported through documentation, available validation studies, testing-house studies or published papers much of the required work may only require verifying as detailed in the Codes. 5.3.2 There is a requirement in the Codes for the production of an available library of documents relevant to the authorisation of the method and production of the certificate of validation completion. 5.3.3 The final requirement in the Codes is to demonstrate the method works in the hands of the intended users. 5.4 Verification of minor changes in methods 5.4.1 Methods are validated to a specific configuration; therefore any changes in any constituent parts (hardware, firmware, script, operating system etc.) may affect its overall operation and any dependant systems which could invalidate the results. 5.4.2 Any proposed change should be risk assessed at the method level as even a patch in a software tool may adversely affect the operation of a second tool or process using its output e.g. giving a plausible but incorrect date stamp. Other examples include at tool inadvertently becoming write-enabled through a firmware update. FSR-C-107-001 Consultation Draft Page 5 of 6
  • 6. Codes of Practice and Conduct 5.5 Implementation plan and any constraints 5.5.1 The implementation plan is required to include monitoring of controls and communication which in the digital forensic sciences should include configuration management, dependencies, how identified software/firmware/hardware bugs are to be handled and how patches etc. are to be controlled (see Verification of minor changes in methods). 6. HANDLING OF TEST ITEMS (ISO 17025:2005, 5.8) 6.1 Exhibit handling, protection and storage 6.1.1 The provider shall ensure that the value of any other type of evidence that may be present is not compromised during the capture, preservation and investigation of the digital evidence. 6.1.2 The provider shall ensure that devices containing potential digital evidence are packaged, sealed and transported in such a way as to protect the integrity of the digital evidence. 6.1.3 There are two main issues to consider in the transporting of digital evidence: a. The security of the device and digital evidence to ensure that access to it is correctly supervised when moving it from the scene to the laboratory or other location; and b. Protection of the device and digital evidence to ensure that it is not affected by physical shock, electromagnetic interference, extremes of heat and humidity or other environmental hazard. FSR-C-107-001 Consultation Draft Page 6 of 6