SlideShare une entreprise Scribd logo
1  sur  3
For this assignment, you will define ethics within the context of
digital forensics. You will then apply what you learned to your
life, developing an ethical code-of-conduct document.
Scenario:
Your manager has asked you to create a code-of-conduct
document for your organization to give to employees during
their new-hire orientation. In the code-of-conduct document,
you are asked to focus on the sharing of personal or
professional data and the ethics involved in sharing data.
Tasks:
Create a code-of-conduct document with the following:
Define ethics. Explain what it is and how it applies to digital
forensics, while also describing ethical and unethical handling
of forensic information.
Evaluate current or past news events related to each of the four
branches of digital forensics: Computer forensics, mobile
device forensics, network forensics, and database forensics.
Consider topics such as identity theft, the Patriot Act, or
Wikileaks. Share your thoughts on the major themes and ethical
concerns and give some insight into how it impacts you
personally and professionally.
Analyze current ethical considerations and issues.
Review the following articles:
When IT Is Asked to Spy
Lost Data Tied to CPP Claims: Ottawa Says USB Stick Has Info
on Applicants for Disability Benefits
Select two additional articles from this
list
that illustrate ethical considerations and issues. Ideally, you
should not have previously used these two articles for another
assignment in this class.
Create a code-of-conduct document you can use in professional
situations as it relates to accessing or sharing data. This can be
a checklist or bulleted list of "Do and Do Not Tasks." Consider
the examples and resources below when creating your code-of-
conduct document:
The International Society of Forensic Computer Examiners.
(n.d.).
Code of ethics and professional responsibility
. Retrieved from http://www.isfce.com/ethics2.htm
Barbara, J. (2008).
Ethical practices in digital forensics: Part 2
. Retrieved from http://www.forensicmag.com/article/ethical -
practices-digital-forensics-part-2
The American Society of Digital Forensics and eDiscovery.
(n.d.).
Domain 3 - Ethics and code of conduct
. Retrieved from
https://sites.google.com/site/asdfedorg/domain-3
Note
: Your final product should be a Microsoft Word document,
approximately seven to nine pages in length, incorporating five
to seven scholarly sources. Write in a clear, concise, and
organized manner; demonstrate ethical scholarship in the
accurate representation and attribution of sources (APA); and
display accurate spelling, grammar, and punctuation.

Contenu connexe

Similaire à For this assignment, you will define ethics within the context o

Picture 1Picture 2InstructionsPaper B1 a matri.docx
Picture 1Picture 2InstructionsPaper B1 a matri.docxPicture 1Picture 2InstructionsPaper B1 a matri.docx
Picture 1Picture 2InstructionsPaper B1 a matri.docx
mattjtoni51554
 
Exercise 3You work as a forensic investigator. A recent inquiry .docx
Exercise 3You work as a forensic investigator. A recent inquiry .docxExercise 3You work as a forensic investigator. A recent inquiry .docx
Exercise 3You work as a forensic investigator. A recent inquiry .docx
rhetttrevannion
 
Application of a decision making framework to an IT-related ethical
Application of a decision making framework to an IT-related ethical Application of a decision making framework to an IT-related ethical
Application of a decision making framework to an IT-related ethical
mallisonshavon
 
Objective Apply decision making frameworks to IT-related ethica.docx
Objective Apply decision making frameworks to IT-related ethica.docxObjective Apply decision making frameworks to IT-related ethica.docx
Objective Apply decision making frameworks to IT-related ethica.docx
juliennehar
 
Paper B1 a matrix mapping of a key IT-related organizational (or pe.docx
Paper B1 a matrix mapping of a key IT-related organizational (or pe.docxPaper B1 a matrix mapping of a key IT-related organizational (or pe.docx
Paper B1 a matrix mapping of a key IT-related organizational (or pe.docx
jakeomoore75037
 
InstructionsPaper B1 a matrix mapping of a key IT-related organ
InstructionsPaper B1 a matrix mapping of a key IT-related organInstructionsPaper B1 a matrix mapping of a key IT-related organ
InstructionsPaper B1 a matrix mapping of a key IT-related organ
lauricesatu
 
View Attachment for all questions. All 21 Questions should be an.docx
View Attachment for all questions. All 21 Questions should be an.docxView Attachment for all questions. All 21 Questions should be an.docx
View Attachment for all questions. All 21 Questions should be an.docx
alehosickg3
 
This assignment gives you an opportunity to analyze a key IT-rel.docx
This assignment gives you an opportunity to analyze a key IT-rel.docxThis assignment gives you an opportunity to analyze a key IT-rel.docx
This assignment gives you an opportunity to analyze a key IT-rel.docx
gasciognecaren
 
Paper Ba matrix mapping of a key IT-related organizational .docx
Paper Ba matrix mapping of a key IT-related organizational .docxPaper Ba matrix mapping of a key IT-related organizational .docx
Paper Ba matrix mapping of a key IT-related organizational .docx
loganta
 
Ethical dilemma Identity TheftStakeholdersConfidentiality.docx
Ethical dilemma  Identity TheftStakeholdersConfidentiality.docxEthical dilemma  Identity TheftStakeholdersConfidentiality.docx
Ethical dilemma Identity TheftStakeholdersConfidentiality.docx
humphrieskalyn
 
This assignment gives you an opportunity to analyze a key IT-r.docx
This assignment gives you an opportunity to analyze a key IT-r.docxThis assignment gives you an opportunity to analyze a key IT-r.docx
This assignment gives you an opportunity to analyze a key IT-r.docx
howardh5
 
Computer ForensicsDiscussion 1Forensics Certifications Ple.docx
Computer ForensicsDiscussion 1Forensics Certifications Ple.docxComputer ForensicsDiscussion 1Forensics Certifications Ple.docx
Computer ForensicsDiscussion 1Forensics Certifications Ple.docx
donnajames55
 
This assignment provides an opportunity to analyze a key IT-rela.docx
This assignment provides an opportunity to analyze a key IT-rela.docxThis assignment provides an opportunity to analyze a key IT-rela.docx
This assignment provides an opportunity to analyze a key IT-rela.docx
christalgrieg
 
The first step of this assignment is an opportunity to analyze a.docx
The first step of this assignment is an opportunity to analyze a.docxThe first step of this assignment is an opportunity to analyze a.docx
The first step of this assignment is an opportunity to analyze a.docx
rhetttrevannion
 
Objective There are two high-level objectives in this project ass.docx
Objective There are two high-level objectives in this project ass.docxObjective There are two high-level objectives in this project ass.docx
Objective There are two high-level objectives in this project ass.docx
juliennehar
 

Similaire à For this assignment, you will define ethics within the context o (18)

Picture 1Picture 2InstructionsPaper B1 a matri.docx
Picture 1Picture 2InstructionsPaper B1 a matri.docxPicture 1Picture 2InstructionsPaper B1 a matri.docx
Picture 1Picture 2InstructionsPaper B1 a matri.docx
 
Exercise 3You work as a forensic investigator. A recent inquiry .docx
Exercise 3You work as a forensic investigator. A recent inquiry .docxExercise 3You work as a forensic investigator. A recent inquiry .docx
Exercise 3You work as a forensic investigator. A recent inquiry .docx
 
Application of a decision making framework to an IT-related ethical
Application of a decision making framework to an IT-related ethical Application of a decision making framework to an IT-related ethical
Application of a decision making framework to an IT-related ethical
 
Objective Apply decision making frameworks to IT-related ethica.docx
Objective Apply decision making frameworks to IT-related ethica.docxObjective Apply decision making frameworks to IT-related ethica.docx
Objective Apply decision making frameworks to IT-related ethica.docx
 
Paper B1 a matrix mapping of a key IT-related organizational (or pe.docx
Paper B1 a matrix mapping of a key IT-related organizational (or pe.docxPaper B1 a matrix mapping of a key IT-related organizational (or pe.docx
Paper B1 a matrix mapping of a key IT-related organizational (or pe.docx
 
InstructionsPaper B1 a matrix mapping of a key IT-related organ
InstructionsPaper B1 a matrix mapping of a key IT-related organInstructionsPaper B1 a matrix mapping of a key IT-related organ
InstructionsPaper B1 a matrix mapping of a key IT-related organ
 
View Attachment for all questions. All 21 Questions should be an.docx
View Attachment for all questions. All 21 Questions should be an.docxView Attachment for all questions. All 21 Questions should be an.docx
View Attachment for all questions. All 21 Questions should be an.docx
 
This assignment gives you an opportunity to analyze a key IT-rel.docx
This assignment gives you an opportunity to analyze a key IT-rel.docxThis assignment gives you an opportunity to analyze a key IT-rel.docx
This assignment gives you an opportunity to analyze a key IT-rel.docx
 
Paper Ba matrix mapping of a key IT-related organizational .docx
Paper Ba matrix mapping of a key IT-related organizational .docxPaper Ba matrix mapping of a key IT-related organizational .docx
Paper Ba matrix mapping of a key IT-related organizational .docx
 
ethical issue.docx
ethical issue.docxethical issue.docx
ethical issue.docx
 
Ethical dilemma Identity TheftStakeholdersConfidentiality.docx
Ethical dilemma  Identity TheftStakeholdersConfidentiality.docxEthical dilemma  Identity TheftStakeholdersConfidentiality.docx
Ethical dilemma Identity TheftStakeholdersConfidentiality.docx
 
This assignment gives you an opportunity to analyze a key IT-r.docx
This assignment gives you an opportunity to analyze a key IT-r.docxThis assignment gives you an opportunity to analyze a key IT-r.docx
This assignment gives you an opportunity to analyze a key IT-r.docx
 
Computer ForensicsDiscussion 1Forensics Certifications Ple.docx
Computer ForensicsDiscussion 1Forensics Certifications Ple.docxComputer ForensicsDiscussion 1Forensics Certifications Ple.docx
Computer ForensicsDiscussion 1Forensics Certifications Ple.docx
 
This assignment provides an opportunity to analyze a key IT-rela.docx
This assignment provides an opportunity to analyze a key IT-rela.docxThis assignment provides an opportunity to analyze a key IT-rela.docx
This assignment provides an opportunity to analyze a key IT-rela.docx
 
The first step of this assignment is an opportunity to analyze a.docx
The first step of this assignment is an opportunity to analyze a.docxThe first step of this assignment is an opportunity to analyze a.docx
The first step of this assignment is an opportunity to analyze a.docx
 
Paper Ba matrix mapping of a key IT-related organizational (o.docx
Paper Ba matrix mapping of a key IT-related organizational (o.docxPaper Ba matrix mapping of a key IT-related organizational (o.docx
Paper Ba matrix mapping of a key IT-related organizational (o.docx
 
Objective There are two high-level objectives in this project ass.docx
Objective There are two high-level objectives in this project ass.docxObjective There are two high-level objectives in this project ass.docx
Objective There are two high-level objectives in this project ass.docx
 
Cis 438 Technology levels--snaptutorial.com
Cis 438 Technology levels--snaptutorial.comCis 438 Technology levels--snaptutorial.com
Cis 438 Technology levels--snaptutorial.com
 

Plus de DustiBuckner14

Your new clientsThe Wagner’s – Scott and Ella are a young marri.docx
Your new clientsThe Wagner’s – Scott and Ella are a young marri.docxYour new clientsThe Wagner’s – Scott and Ella are a young marri.docx
Your new clientsThe Wagner’s – Scott and Ella are a young marri.docx
DustiBuckner14
 
Writing Conclusions for Research PapersWhat is the purpose.docx
Writing Conclusions for Research PapersWhat is the purpose.docxWriting Conclusions for Research PapersWhat is the purpose.docx
Writing Conclusions for Research PapersWhat is the purpose.docx
DustiBuckner14
 
What Is Septic TankSeptic or septic typically is used t.docx
What Is Septic TankSeptic or septic typically is used t.docxWhat Is Septic TankSeptic or septic typically is used t.docx
What Is Septic TankSeptic or septic typically is used t.docx
DustiBuckner14
 
· You should respond to at least two of your peers by extending, r.docx
· You should respond to at least two of your peers by extending, r.docx· You should respond to at least two of your peers by extending, r.docx
· You should respond to at least two of your peers by extending, r.docx
DustiBuckner14
 
[removed]THIS IEP INCLUDES FORMCHECKBOX Transitions.docx
[removed]THIS IEP INCLUDES     FORMCHECKBOX  Transitions.docx[removed]THIS IEP INCLUDES     FORMCHECKBOX  Transitions.docx
[removed]THIS IEP INCLUDES FORMCHECKBOX Transitions.docx
DustiBuckner14
 
What We Can Afford” Poem By Shavar X. Seabrooks L.docx
What We Can Afford” Poem By Shavar  X. Seabrooks L.docxWhat We Can Afford” Poem By Shavar  X. Seabrooks L.docx
What We Can Afford” Poem By Shavar X. Seabrooks L.docx
DustiBuckner14
 
University of the CumberlandsSchool of Computer & Information .docx
University of the CumberlandsSchool of Computer & Information .docxUniversity of the CumberlandsSchool of Computer & Information .docx
University of the CumberlandsSchool of Computer & Information .docx
DustiBuckner14
 
Unit VII 1. Suppose a firm uses sugar in a product tha.docx
Unit VII         1. Suppose a firm uses sugar in a product tha.docxUnit VII         1. Suppose a firm uses sugar in a product tha.docx
Unit VII 1. Suppose a firm uses sugar in a product tha.docx
DustiBuckner14
 
Title PageThis spreadsheet supports STUDENT analysis of the case .docx
Title PageThis spreadsheet supports STUDENT analysis of the case .docxTitle PageThis spreadsheet supports STUDENT analysis of the case .docx
Title PageThis spreadsheet supports STUDENT analysis of the case .docx
DustiBuckner14
 
ScenarioThe HIT Innovation Steering Committee of a large.docx
ScenarioThe HIT Innovation Steering Committee of a large.docxScenarioThe HIT Innovation Steering Committee of a large.docx
ScenarioThe HIT Innovation Steering Committee of a large.docx
DustiBuckner14
 
Space ... the final frontier.  So, as I am sure everyone knows, .docx
Space ... the final frontier.  So, as I am sure everyone knows, .docxSpace ... the final frontier.  So, as I am sure everyone knows, .docx
Space ... the final frontier.  So, as I am sure everyone knows, .docx
DustiBuckner14
 
The Internal EnvironmentInstitutionStudent’s name.docx
The Internal EnvironmentInstitutionStudent’s name.docxThe Internal EnvironmentInstitutionStudent’s name.docx
The Internal EnvironmentInstitutionStudent’s name.docx
DustiBuckner14
 
THE RESEARCH PROPOSAL BUS8100 8Chapter 2 - Literature ReviewTh.docx
THE RESEARCH PROPOSAL BUS8100 8Chapter 2 - Literature ReviewTh.docxTHE RESEARCH PROPOSAL BUS8100 8Chapter 2 - Literature ReviewTh.docx
THE RESEARCH PROPOSAL BUS8100 8Chapter 2 - Literature ReviewTh.docx
DustiBuckner14
 

Plus de DustiBuckner14 (20)

Your new clientsThe Wagner’s – Scott and Ella are a young marri.docx
Your new clientsThe Wagner’s – Scott and Ella are a young marri.docxYour new clientsThe Wagner’s – Scott and Ella are a young marri.docx
Your new clientsThe Wagner’s – Scott and Ella are a young marri.docx
 
Writing Conclusions for Research PapersWhat is the purpose.docx
Writing Conclusions for Research PapersWhat is the purpose.docxWriting Conclusions for Research PapersWhat is the purpose.docx
Writing Conclusions for Research PapersWhat is the purpose.docx
 
What Is Septic TankSeptic or septic typically is used t.docx
What Is Septic TankSeptic or septic typically is used t.docxWhat Is Septic TankSeptic or septic typically is used t.docx
What Is Septic TankSeptic or septic typically is used t.docx
 
· You should respond to at least two of your peers by extending, r.docx
· You should respond to at least two of your peers by extending, r.docx· You should respond to at least two of your peers by extending, r.docx
· You should respond to at least two of your peers by extending, r.docx
 
You are a medical student working your way throughcollege and ar.docx
You are a medical student working your way throughcollege and ar.docxYou are a medical student working your way throughcollege and ar.docx
You are a medical student working your way throughcollege and ar.docx
 
[removed]THIS IEP INCLUDES FORMCHECKBOX Transitions.docx
[removed]THIS IEP INCLUDES     FORMCHECKBOX  Transitions.docx[removed]THIS IEP INCLUDES     FORMCHECKBOX  Transitions.docx
[removed]THIS IEP INCLUDES FORMCHECKBOX Transitions.docx
 
Using the Integrated Model of Work Motivation Figure 12.1 (Latham, 2.docx
Using the Integrated Model of Work Motivation Figure 12.1 (Latham, 2.docxUsing the Integrated Model of Work Motivation Figure 12.1 (Latham, 2.docx
Using the Integrated Model of Work Motivation Figure 12.1 (Latham, 2.docx
 
What We Can Afford” Poem By Shavar X. Seabrooks L.docx
What We Can Afford” Poem By Shavar  X. Seabrooks L.docxWhat We Can Afford” Poem By Shavar  X. Seabrooks L.docx
What We Can Afford” Poem By Shavar X. Seabrooks L.docx
 
What are the techniques in handling categorical attributesHow.docx
What are the techniques in handling categorical attributesHow.docxWhat are the techniques in handling categorical attributesHow.docx
What are the techniques in handling categorical attributesHow.docx
 
University of the CumberlandsSchool of Computer & Information .docx
University of the CumberlandsSchool of Computer & Information .docxUniversity of the CumberlandsSchool of Computer & Information .docx
University of the CumberlandsSchool of Computer & Information .docx
 
Theresa and Mike fully support creating a code of conduct for th.docx
Theresa and Mike fully support creating a code of conduct for th.docxTheresa and Mike fully support creating a code of conduct for th.docx
Theresa and Mike fully support creating a code of conduct for th.docx
 
Unit VII 1. Suppose a firm uses sugar in a product tha.docx
Unit VII         1. Suppose a firm uses sugar in a product tha.docxUnit VII         1. Suppose a firm uses sugar in a product tha.docx
Unit VII 1. Suppose a firm uses sugar in a product tha.docx
 
Title PageThis spreadsheet supports STUDENT analysis of the case .docx
Title PageThis spreadsheet supports STUDENT analysis of the case .docxTitle PageThis spreadsheet supports STUDENT analysis of the case .docx
Title PageThis spreadsheet supports STUDENT analysis of the case .docx
 
Title If a compensation system works well for one business, that .docx
Title If a compensation system works well for one business, that .docxTitle If a compensation system works well for one business, that .docx
Title If a compensation system works well for one business, that .docx
 
Review the Article Below Keller, J. G., Miller, C., LasDulce, C.docx
Review the Article Below Keller, J. G., Miller, C., LasDulce, C.docxReview the Article Below Keller, J. G., Miller, C., LasDulce, C.docx
Review the Article Below Keller, J. G., Miller, C., LasDulce, C.docx
 
Teachers reach diverse learners by scaffolding instruction in ways t.docx
Teachers reach diverse learners by scaffolding instruction in ways t.docxTeachers reach diverse learners by scaffolding instruction in ways t.docx
Teachers reach diverse learners by scaffolding instruction in ways t.docx
 
ScenarioThe HIT Innovation Steering Committee of a large.docx
ScenarioThe HIT Innovation Steering Committee of a large.docxScenarioThe HIT Innovation Steering Committee of a large.docx
ScenarioThe HIT Innovation Steering Committee of a large.docx
 
Space ... the final frontier.  So, as I am sure everyone knows, .docx
Space ... the final frontier.  So, as I am sure everyone knows, .docxSpace ... the final frontier.  So, as I am sure everyone knows, .docx
Space ... the final frontier.  So, as I am sure everyone knows, .docx
 
The Internal EnvironmentInstitutionStudent’s name.docx
The Internal EnvironmentInstitutionStudent’s name.docxThe Internal EnvironmentInstitutionStudent’s name.docx
The Internal EnvironmentInstitutionStudent’s name.docx
 
THE RESEARCH PROPOSAL BUS8100 8Chapter 2 - Literature ReviewTh.docx
THE RESEARCH PROPOSAL BUS8100 8Chapter 2 - Literature ReviewTh.docxTHE RESEARCH PROPOSAL BUS8100 8Chapter 2 - Literature ReviewTh.docx
THE RESEARCH PROPOSAL BUS8100 8Chapter 2 - Literature ReviewTh.docx
 

Dernier

Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 

Dernier (20)

SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Tatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsTatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf arts
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & Systems
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
latest AZ-104 Exam Questions and Answers
latest AZ-104 Exam Questions and Answerslatest AZ-104 Exam Questions and Answers
latest AZ-104 Exam Questions and Answers
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 

For this assignment, you will define ethics within the context o

  • 1. For this assignment, you will define ethics within the context of digital forensics. You will then apply what you learned to your life, developing an ethical code-of-conduct document. Scenario: Your manager has asked you to create a code-of-conduct document for your organization to give to employees during their new-hire orientation. In the code-of-conduct document, you are asked to focus on the sharing of personal or professional data and the ethics involved in sharing data. Tasks: Create a code-of-conduct document with the following: Define ethics. Explain what it is and how it applies to digital forensics, while also describing ethical and unethical handling of forensic information. Evaluate current or past news events related to each of the four branches of digital forensics: Computer forensics, mobile device forensics, network forensics, and database forensics. Consider topics such as identity theft, the Patriot Act, or Wikileaks. Share your thoughts on the major themes and ethical concerns and give some insight into how it impacts you personally and professionally.
  • 2. Analyze current ethical considerations and issues. Review the following articles: When IT Is Asked to Spy Lost Data Tied to CPP Claims: Ottawa Says USB Stick Has Info on Applicants for Disability Benefits Select two additional articles from this list that illustrate ethical considerations and issues. Ideally, you should not have previously used these two articles for another assignment in this class. Create a code-of-conduct document you can use in professional situations as it relates to accessing or sharing data. This can be a checklist or bulleted list of "Do and Do Not Tasks." Consider the examples and resources below when creating your code-of- conduct document: The International Society of Forensic Computer Examiners. (n.d.). Code of ethics and professional responsibility . Retrieved from http://www.isfce.com/ethics2.htm
  • 3. Barbara, J. (2008). Ethical practices in digital forensics: Part 2 . Retrieved from http://www.forensicmag.com/article/ethical - practices-digital-forensics-part-2 The American Society of Digital Forensics and eDiscovery. (n.d.). Domain 3 - Ethics and code of conduct . Retrieved from https://sites.google.com/site/asdfedorg/domain-3 Note : Your final product should be a Microsoft Word document, approximately seven to nine pages in length, incorporating five to seven scholarly sources. Write in a clear, concise, and organized manner; demonstrate ethical scholarship in the accurate representation and attribution of sources (APA); and display accurate spelling, grammar, and punctuation.