SlideShare une entreprise Scribd logo
1  sur  15
www.tusconsultoreslegales.com [email_address] Internet/Digital evidence (COMPUTER FORENSICS) CORPORATE CRIMINAL LIABILITY
www.tusconsultoreslegales.com [email_address] INTERNET/INVESTIGATION OF DIGITAL EVIDENCE/COMPUTER FORENSICS  4. PREVENTIVE ANALYSIS OF CORPORATE CRIMINAL LIABILITY  3. HOW TO PREVENT AND/OR MINIMISE CORPORATE CRIMINAL LIABILITY  2. LEGAL FRAMEWORK OF CORPORATE CRIMINAL LIABILITY AND DIGITAL EVIDENCE  6. REASONS FOR A FORENSICS INVESTIGATION 1. SITUATIONS WHICH SHOULD BE AVOIDED: REFLECTIONS  5. STAGES OF THE COMPUTER FORENSICS PROCESS
www.tusconsultoreslegales.com [email_address] ,[object Object],[object Object],[object Object],1. SITUATIONS WHICH SHOULD BE AVOIDED REFLECTIONS:
www.tusconsultoreslegales.com [email_address] ,[object Object],[object Object],1. SITUATIONS WHICH SHOULD BE AVOIDED REFLECTIONS:
www.tusconsultoreslegales.com [email_address] 2. LEGAL FRAMEWORK OF CORPORATE CRIMINAL LIABILITY AND DIGITAL EVIDENCE (1/2)  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
www.tusconsultoreslegales.com [email_address] 2. LEGAL FRAMEWORK OF CORPORATE CRIMINAL LIABILITY AND DIGITAL EVIDENCE (2/2)  ,[object Object],[object Object],[object Object],[object Object]
www.tusconsultoreslegales.com [email_address] 2. LEGAL FRAMEWORK OF CORPORATE CRIMINAL LIABILITY AND DIGITAL EVIDENCE (2/2)  ,[object Object],[object Object],[object Object],[object Object],[object Object]
www.tusconsultoreslegales.com [email_address] 3. HOW TO PREVENT AND/OR MINIMISE CORPORATE CRIMINAL LIABILITY PREVENTIVE MEASURES: 1-  Establishing control measures: Implementing an internal corporate policy  5-  Detecting and preserving evidence which allow a proactive legal defence: Minimising the consequences of the crime 2- Establishing technical and organisational measures: Complying with personal data protection obligations (Organic Law on Personal Data Projection and Implementing Legislation) 3-  Implementing security certificates: Preventing identity theft COMPUTER  FORENSICS 4-  Establishing cover measures: Having an insurance policy which also covers legal services
www.tusconsultoreslegales.com [email_address] An internal corporate policy with clear guidelines, specifying the permitted use of both the company's internal and external means of communication, with the corresponding behaviours, expressly indicated, through control measures established by the employer as provided in article 20.3 of the Workers' Statute. 4. PREVENTIVE ANALYSIS OF CORPORATE CRIMINAL LIABILITY (1/3) 1-  Establishing control measures: Implementing an internal corporate policy  2- Establishing technical and organisational measures: Complying with personal data protection obligations (Organic Law on Personal Data Projection and Implementing Legislation) Having complied with the obligations established by the Organic Law on Personal Data Protection and implementing regulations to establish the technical and organisational measures necessary, as well as efficient control measures in accordance with article 20.3 of the Workers' Statute which are compatible with the worker's privacy. Above all, ensuring control of both internal and external means of communication.
www.tusconsultoreslegales.com [email_address] 4. PREVENTIVE ANALYSIS OF CORPORATE CRIMINAL LIABILITY (2/3) 3-  Implementing security certificates: Preventing identity theft Need to have an insurance policy which also contributes to establishing cover for legal defence.     4-  Establishing cover measures: Having an insurance policy which also covers legal services ,[object Object],[object Object],[object Object],[object Object]
www.tusconsultoreslegales.com [email_address] 4. PREVENTIVE ANALYSIS OF CORPORATE CRIMINAL LIABILITY (3/3) The detection, preservation and investigation of electronic proof or evidence which may be used to defend the company against possible criminal liability is known as COMPUTER FORENSICS.  This discipline is basically divided into four major stages or processes, which can be carried out independently, or consecutively, according to the company's needs.  The stages of Computer Forensics go from prevention up to implementing proof in the trial. 5-  Detecting and preserving evidence which allow a legal defence oriented towards minimising possible criminal consequences  COMPUTER  FORENSICS
www.tusconsultoreslegales.com [email_address] 5. STAGES OF THE COMPUTER FORENSICS PROCESS PREVENTION FORENSIC  READINESS Objective:  Facilitating a possible digital investigation How: Establishing and implementing traceability procedures Example: Intrusion Detection  Systems LOCATING  INFORMATION E-DISCOVERY Objective:  Search for specific data from a  large quantity of information How: Use of search and filter mechanisms in file systems and databases  Example: Search for deleted accounting data DATA ACQUISITION CHAIN OF CUSTODY Objective:  Correctly initiating the chain of custody of future proof How: Bit by bit copy of digital information before a notary Example: Copies of information from a mobile telephone EVIDENCE ANALYSIS EXPERT REPORT Objective:  Analysing digital information and searching for  possible evidence. How: Blind and automated search for suspicious activities Example: Analysis of the PC of an ex-employee for  possible information theft
www.tusconsultoreslegales.com [email_address] 6. REASONS FOR A DIGITAL INVESTIGATION ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
www.tusconsultoreslegales.com [email_address] 6. REASONS FOR A FORENSIC INVESTIGATION  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
www.tusconsultoreslegales.com [email_address] Thank you for your interest [email_address] To purchase documents: www.yourlegalconsultants.com To hire the services of an expert, please contact:

Contenu connexe

Tendances

10 Things You Need To Know About Privacy
10 Things You Need To Know About Privacy10 Things You Need To Know About Privacy
10 Things You Need To Know About PrivacyNow Dentons
 
Pli workplace privacy in the year 2013 2013-6-13
Pli workplace privacy in the year 2013   2013-6-13Pli workplace privacy in the year 2013   2013-6-13
Pli workplace privacy in the year 2013 2013-6-13mkeane
 
Privacy in India: Legal issues
Privacy in India: Legal issuesPrivacy in India: Legal issues
Privacy in India: Legal issuesSagar Rahurkar
 
Workplace Privacy Presentation
Workplace Privacy PresentationWorkplace Privacy Presentation
Workplace Privacy PresentationSarah Forbes
 
General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR)General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR)BenjaminShalevSalovi
 
Law firm information security overview focus on encryption by dave cunningh...
Law firm information security overview   focus on encryption by dave cunningh...Law firm information security overview   focus on encryption by dave cunningh...
Law firm information security overview focus on encryption by dave cunningh...David Cunningham
 
Data Protection Bill 2019 Participative Role of General Public
Data Protection Bill 2019 Participative Role of General PublicData Protection Bill 2019 Participative Role of General Public
Data Protection Bill 2019 Participative Role of General Publicijtsrd
 
Data Protection & Security Breakfast Briefing - Master Slides_28 June_final
Data Protection & Security Breakfast Briefing - Master Slides_28 June_finalData Protection & Security Breakfast Briefing - Master Slides_28 June_final
Data Protection & Security Breakfast Briefing - Master Slides_28 June_finalDr. Donald Macfarlane
 
An Indian Outline on Database Protection
An Indian Outline on Database ProtectionAn Indian Outline on Database Protection
An Indian Outline on Database ProtectionSinghania2015
 
Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...
Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...
Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...Raleigh ISSA
 

Tendances (13)

10 Things You Need To Know About Privacy
10 Things You Need To Know About Privacy10 Things You Need To Know About Privacy
10 Things You Need To Know About Privacy
 
Pli workplace privacy in the year 2013 2013-6-13
Pli workplace privacy in the year 2013   2013-6-13Pli workplace privacy in the year 2013   2013-6-13
Pli workplace privacy in the year 2013 2013-6-13
 
Privacy in India: Legal issues
Privacy in India: Legal issuesPrivacy in India: Legal issues
Privacy in India: Legal issues
 
ScifoBYODSample
ScifoBYODSampleScifoBYODSample
ScifoBYODSample
 
elec reporting
elec reportingelec reporting
elec reporting
 
Workplace Privacy Presentation
Workplace Privacy PresentationWorkplace Privacy Presentation
Workplace Privacy Presentation
 
General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR)General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR)
 
Law firm information security overview focus on encryption by dave cunningh...
Law firm information security overview   focus on encryption by dave cunningh...Law firm information security overview   focus on encryption by dave cunningh...
Law firm information security overview focus on encryption by dave cunningh...
 
Data Protection Bill 2019 Participative Role of General Public
Data Protection Bill 2019 Participative Role of General PublicData Protection Bill 2019 Participative Role of General Public
Data Protection Bill 2019 Participative Role of General Public
 
Data Protection & Security Breakfast Briefing - Master Slides_28 June_final
Data Protection & Security Breakfast Briefing - Master Slides_28 June_finalData Protection & Security Breakfast Briefing - Master Slides_28 June_final
Data Protection & Security Breakfast Briefing - Master Slides_28 June_final
 
An Indian Outline on Database Protection
An Indian Outline on Database ProtectionAn Indian Outline on Database Protection
An Indian Outline on Database Protection
 
201 CMR 17.00
201 CMR 17.00201 CMR 17.00
201 CMR 17.00
 
Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...
Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...
Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...
 

En vedette

Evidence Preservation
Evidence PreservationEvidence Preservation
Evidence Preservationamckean
 
Child GPS Tracking Device
Child GPS Tracking DeviceChild GPS Tracking Device
Child GPS Tracking Devicestelamala
 
Digital investigation
Digital investigationDigital investigation
Digital investigationunnilala11
 
Crime scene management
Crime scene managementCrime scene management
Crime scene managementHafeez Bhutta
 
Teaching Computer Forensics Using Student Developed Evidence Files
Teaching Computer Forensics Using Student Developed Evidence FilesTeaching Computer Forensics Using Student Developed Evidence Files
Teaching Computer Forensics Using Student Developed Evidence Filesamiable_indian
 
The Deep Web, TOR Network and Internet Anonymity
The Deep Web, TOR Network and Internet AnonymityThe Deep Web, TOR Network and Internet Anonymity
The Deep Web, TOR Network and Internet AnonymityAbhimanyu Singh
 
Digital Crime & Forensics - Presentation
Digital Crime & Forensics - PresentationDigital Crime & Forensics - Presentation
Digital Crime & Forensics - Presentationprashant3535
 
Gps tracking system
Gps tracking system Gps tracking system
Gps tracking system Sumit Kumar
 

En vedette (12)

Evidence Preservation
Evidence PreservationEvidence Preservation
Evidence Preservation
 
Child GPS Tracking Device
Child GPS Tracking DeviceChild GPS Tracking Device
Child GPS Tracking Device
 
Digital investigation
Digital investigationDigital investigation
Digital investigation
 
Digital Forensic
Digital ForensicDigital Forensic
Digital Forensic
 
Crime scene management
Crime scene managementCrime scene management
Crime scene management
 
Teaching Computer Forensics Using Student Developed Evidence Files
Teaching Computer Forensics Using Student Developed Evidence FilesTeaching Computer Forensics Using Student Developed Evidence Files
Teaching Computer Forensics Using Student Developed Evidence Files
 
Deep Web - what to do and what not to do
Deep Web - what to do and what not to do	Deep Web - what to do and what not to do
Deep Web - what to do and what not to do
 
The Deep Web, TOR Network and Internet Anonymity
The Deep Web, TOR Network and Internet AnonymityThe Deep Web, TOR Network and Internet Anonymity
The Deep Web, TOR Network and Internet Anonymity
 
Digital Crime & Forensics - Presentation
Digital Crime & Forensics - PresentationDigital Crime & Forensics - Presentation
Digital Crime & Forensics - Presentation
 
The Deep and Dark Web
The Deep and Dark WebThe Deep and Dark Web
The Deep and Dark Web
 
Gps tracking system
Gps tracking system Gps tracking system
Gps tracking system
 
Security analysis of emerging smart home applications 11.2016
Security analysis of emerging smart home applications 11.2016Security analysis of emerging smart home applications 11.2016
Security analysis of emerging smart home applications 11.2016
 

Similaire à Prevent Corporate Criminal Liability with Digital Evidence Analysis

Corporate Criminal Compliance in Spain
Corporate Criminal Compliance in SpainCorporate Criminal Compliance in Spain
Corporate Criminal Compliance in SpainTAG Alliances
 
The New Massachusetts Privacy Rules (February 2, 2010)
The New Massachusetts Privacy Rules (February 2, 2010)The New Massachusetts Privacy Rules (February 2, 2010)
The New Massachusetts Privacy Rules (February 2, 2010)stevemeltzer
 
Internet. electronic invoicement. legal requirements
Internet. electronic invoicement. legal requirementsInternet. electronic invoicement. legal requirements
Internet. electronic invoicement. legal requirementsyourlegalconsultants
 
Internet:: Electronic Invoicement: Legal requirements
Internet:: Electronic Invoicement: Legal requirementsInternet:: Electronic Invoicement: Legal requirements
Internet:: Electronic Invoicement: Legal requirementsCristina Villavicencio
 
Computer Forensics-An Introduction of New Face to the Digital World
Computer Forensics-An Introduction of New Face to the Digital WorldComputer Forensics-An Introduction of New Face to the Digital World
Computer Forensics-An Introduction of New Face to the Digital Worldrahulmonikasharma
 
Integrated criminal and justice information system of Korea
Integrated criminal and justice information system of KoreaIntegrated criminal and justice information system of Korea
Integrated criminal and justice information system of KoreaYoungTae (Henry) Huh
 
Crossing the streams: How security professionals can leverage the NZ Privacy ...
Crossing the streams: How security professionals can leverage the NZ Privacy ...Crossing the streams: How security professionals can leverage the NZ Privacy ...
Crossing the streams: How security professionals can leverage the NZ Privacy ...Chris Hails
 
Data protection process information
Data protection process informationData protection process information
Data protection process informationyourlegalconsultants
 
CCSP_Self_Domain_6.ppt
CCSP_Self_Domain_6.pptCCSP_Self_Domain_6.ppt
CCSP_Self_Domain_6.pptSamir Jha
 
Introduction to Data Security Breach Preparedness with Model Data Security Br...
Introduction to Data Security Breach Preparedness with Model Data Security Br...Introduction to Data Security Breach Preparedness with Model Data Security Br...
Introduction to Data Security Breach Preparedness with Model Data Security Br...- Mark - Fullbright
 
Data Risks In A Digital Age
Data Risks In A Digital Age Data Risks In A Digital Age
Data Risks In A Digital Age padler01
 
10. law invest & ethics
10. law invest & ethics10. law invest & ethics
10. law invest & ethics7wounders
 

Similaire à Prevent Corporate Criminal Liability with Digital Evidence Analysis (20)

Social Networks
Social NetworksSocial Networks
Social Networks
 
Social Networks
Social NetworksSocial Networks
Social Networks
 
Social Networks
Social NetworksSocial Networks
Social Networks
 
Corporate Criminal Compliance in Spain
Corporate Criminal Compliance in SpainCorporate Criminal Compliance in Spain
Corporate Criminal Compliance in Spain
 
The New Massachusetts Privacy Rules (February 2, 2010)
The New Massachusetts Privacy Rules (February 2, 2010)The New Massachusetts Privacy Rules (February 2, 2010)
The New Massachusetts Privacy Rules (February 2, 2010)
 
Internet. electronic invoicement. legal requirements
Internet. electronic invoicement. legal requirementsInternet. electronic invoicement. legal requirements
Internet. electronic invoicement. legal requirements
 
Dpl october 2017 colombia
Dpl october 2017   colombiaDpl october 2017   colombia
Dpl october 2017 colombia
 
Internet:: Electronic Invoicement: Legal requirements
Internet:: Electronic Invoicement: Legal requirementsInternet:: Electronic Invoicement: Legal requirements
Internet:: Electronic Invoicement: Legal requirements
 
Computer Forensics-An Introduction of New Face to the Digital World
Computer Forensics-An Introduction of New Face to the Digital WorldComputer Forensics-An Introduction of New Face to the Digital World
Computer Forensics-An Introduction of New Face to the Digital World
 
Itet3 its forensics
Itet3 its forensicsItet3 its forensics
Itet3 its forensics
 
Integrated criminal and justice information system of Korea
Integrated criminal and justice information system of KoreaIntegrated criminal and justice information system of Korea
Integrated criminal and justice information system of Korea
 
Crossing the streams: How security professionals can leverage the NZ Privacy ...
Crossing the streams: How security professionals can leverage the NZ Privacy ...Crossing the streams: How security professionals can leverage the NZ Privacy ...
Crossing the streams: How security professionals can leverage the NZ Privacy ...
 
Data protection process information
Data protection process informationData protection process information
Data protection process information
 
CCSP_Self_Domain_6.ppt
CCSP_Self_Domain_6.pptCCSP_Self_Domain_6.ppt
CCSP_Self_Domain_6.ppt
 
Quick guide gdpr
Quick guide gdprQuick guide gdpr
Quick guide gdpr
 
Professional issues in IT
Professional issues in IT Professional issues in IT
Professional issues in IT
 
Introduction to Data Security Breach Preparedness with Model Data Security Br...
Introduction to Data Security Breach Preparedness with Model Data Security Br...Introduction to Data Security Breach Preparedness with Model Data Security Br...
Introduction to Data Security Breach Preparedness with Model Data Security Br...
 
Data Risks In A Digital Age
Data Risks In A Digital Age Data Risks In A Digital Age
Data Risks In A Digital Age
 
10. law invest & ethics
10. law invest & ethics10. law invest & ethics
10. law invest & ethics
 
Workplace Privacy (excerpt)
Workplace Privacy (excerpt)Workplace Privacy (excerpt)
Workplace Privacy (excerpt)
 

Dernier

International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...ssuserf63bd7
 
8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCRashishs7044
 
PB Project 1: Exploring Your Personal Brand
PB Project 1: Exploring Your Personal BrandPB Project 1: Exploring Your Personal Brand
PB Project 1: Exploring Your Personal BrandSharisaBethune
 
Annual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesAnnual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesKeppelCorporation
 
Appkodes Tinder Clone Script with Customisable Solutions.pptx
Appkodes Tinder Clone Script with Customisable Solutions.pptxAppkodes Tinder Clone Script with Customisable Solutions.pptx
Appkodes Tinder Clone Script with Customisable Solutions.pptxappkodes
 
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCRashishs7044
 
TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024Adnet Communications
 
Investment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy CheruiyotInvestment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy Cheruiyotictsugar
 
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City GurgaonCall Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaoncallgirls2057
 
Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Seta Wicaksana
 
Memorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMMemorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMVoces Mineras
 
Market Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMarket Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMintel Group
 
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort ServiceCall US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Servicecallgirls2057
 
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdfNewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdfKhaled Al Awadi
 
Entrepreneurship lessons in Philippines
Entrepreneurship lessons in  PhilippinesEntrepreneurship lessons in  Philippines
Entrepreneurship lessons in PhilippinesDavidSamuel525586
 
Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Peter Ward
 
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!Doge Mining Website
 

Dernier (20)

International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...
 
No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...
No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...
No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...
 
8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR
 
PB Project 1: Exploring Your Personal Brand
PB Project 1: Exploring Your Personal BrandPB Project 1: Exploring Your Personal Brand
PB Project 1: Exploring Your Personal Brand
 
Annual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesAnnual General Meeting Presentation Slides
Annual General Meeting Presentation Slides
 
Appkodes Tinder Clone Script with Customisable Solutions.pptx
Appkodes Tinder Clone Script with Customisable Solutions.pptxAppkodes Tinder Clone Script with Customisable Solutions.pptx
Appkodes Tinder Clone Script with Customisable Solutions.pptx
 
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
 
TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024
 
Investment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy CheruiyotInvestment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy Cheruiyot
 
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City GurgaonCall Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
 
Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...
 
Memorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMMemorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQM
 
Market Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMarket Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 Edition
 
Corporate Profile 47Billion Information Technology
Corporate Profile 47Billion Information TechnologyCorporate Profile 47Billion Information Technology
Corporate Profile 47Billion Information Technology
 
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort ServiceCall US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
 
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdfNewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
 
Entrepreneurship lessons in Philippines
Entrepreneurship lessons in  PhilippinesEntrepreneurship lessons in  Philippines
Entrepreneurship lessons in Philippines
 
Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...
 
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
 
Call Us ➥9319373153▻Call Girls In North Goa
Call Us ➥9319373153▻Call Girls In North GoaCall Us ➥9319373153▻Call Girls In North Goa
Call Us ➥9319373153▻Call Girls In North Goa
 

Prevent Corporate Criminal Liability with Digital Evidence Analysis

  • 1. www.tusconsultoreslegales.com [email_address] Internet/Digital evidence (COMPUTER FORENSICS) CORPORATE CRIMINAL LIABILITY
  • 2. www.tusconsultoreslegales.com [email_address] INTERNET/INVESTIGATION OF DIGITAL EVIDENCE/COMPUTER FORENSICS 4. PREVENTIVE ANALYSIS OF CORPORATE CRIMINAL LIABILITY 3. HOW TO PREVENT AND/OR MINIMISE CORPORATE CRIMINAL LIABILITY 2. LEGAL FRAMEWORK OF CORPORATE CRIMINAL LIABILITY AND DIGITAL EVIDENCE 6. REASONS FOR A FORENSICS INVESTIGATION 1. SITUATIONS WHICH SHOULD BE AVOIDED: REFLECTIONS 5. STAGES OF THE COMPUTER FORENSICS PROCESS
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8. www.tusconsultoreslegales.com [email_address] 3. HOW TO PREVENT AND/OR MINIMISE CORPORATE CRIMINAL LIABILITY PREVENTIVE MEASURES: 1- Establishing control measures: Implementing an internal corporate policy 5- Detecting and preserving evidence which allow a proactive legal defence: Minimising the consequences of the crime 2- Establishing technical and organisational measures: Complying with personal data protection obligations (Organic Law on Personal Data Projection and Implementing Legislation) 3- Implementing security certificates: Preventing identity theft COMPUTER FORENSICS 4- Establishing cover measures: Having an insurance policy which also covers legal services
  • 9. www.tusconsultoreslegales.com [email_address] An internal corporate policy with clear guidelines, specifying the permitted use of both the company's internal and external means of communication, with the corresponding behaviours, expressly indicated, through control measures established by the employer as provided in article 20.3 of the Workers' Statute. 4. PREVENTIVE ANALYSIS OF CORPORATE CRIMINAL LIABILITY (1/3) 1- Establishing control measures: Implementing an internal corporate policy 2- Establishing technical and organisational measures: Complying with personal data protection obligations (Organic Law on Personal Data Projection and Implementing Legislation) Having complied with the obligations established by the Organic Law on Personal Data Protection and implementing regulations to establish the technical and organisational measures necessary, as well as efficient control measures in accordance with article 20.3 of the Workers' Statute which are compatible with the worker's privacy. Above all, ensuring control of both internal and external means of communication.
  • 10.
  • 11. www.tusconsultoreslegales.com [email_address] 4. PREVENTIVE ANALYSIS OF CORPORATE CRIMINAL LIABILITY (3/3) The detection, preservation and investigation of electronic proof or evidence which may be used to defend the company against possible criminal liability is known as COMPUTER FORENSICS. This discipline is basically divided into four major stages or processes, which can be carried out independently, or consecutively, according to the company's needs. The stages of Computer Forensics go from prevention up to implementing proof in the trial. 5- Detecting and preserving evidence which allow a legal defence oriented towards minimising possible criminal consequences COMPUTER FORENSICS
  • 12. www.tusconsultoreslegales.com [email_address] 5. STAGES OF THE COMPUTER FORENSICS PROCESS PREVENTION FORENSIC READINESS Objective: Facilitating a possible digital investigation How: Establishing and implementing traceability procedures Example: Intrusion Detection Systems LOCATING INFORMATION E-DISCOVERY Objective: Search for specific data from a large quantity of information How: Use of search and filter mechanisms in file systems and databases Example: Search for deleted accounting data DATA ACQUISITION CHAIN OF CUSTODY Objective: Correctly initiating the chain of custody of future proof How: Bit by bit copy of digital information before a notary Example: Copies of information from a mobile telephone EVIDENCE ANALYSIS EXPERT REPORT Objective: Analysing digital information and searching for possible evidence. How: Blind and automated search for suspicious activities Example: Analysis of the PC of an ex-employee for possible information theft
  • 13.
  • 14.
  • 15. www.tusconsultoreslegales.com [email_address] Thank you for your interest [email_address] To purchase documents: www.yourlegalconsultants.com To hire the services of an expert, please contact: