View free policies procedures examples from all manuals. No obligation, no credit card!
If you have an IT security incident involving digital assets (i.e. laptops, cellphones, tablets, etc.) then you need a consistent, routine methodology for investigating the security violation to ensure all evidence is collected properly. The National Institute of Justice (NIJ) published a 91-page digital evidence guide entitled Forensic Examination of Digital Evidence: A Guide for Law Enforcement – April 2004. Read more →