Share
Explore BrainMass

Planning a Digital Theft Investigation

Assume that you feel that your (or your boss's) email content was always leaked (e.g., some confidential information in your email was known to many others). You decide to carry out an investigation. Write a plan for this investigation. The plan should include: digital evidence source identification, recovery, collection, documentation, and report. The required tools should also be included.

Solution Preview

Assume that you feel that your (or your boss's) email content was always leaked (e.g., some confidential information in your email was known to many others). You decide to carry out an investigation. Write a plan for this investigation. The plan should include: digital evidence source identification, recovery, collection, documentation, and report. The required tools should also be included.

Email has become one of the most important communication tools. Its advantages are that it is quick, personalized and can be professional. Therefore email is very much popular as a business tool and as a person to person communications method.

But the convenience of email as a business communications tool also exposes enterprises to a wide variety of legal, financial and regulatory risks associated with outbound email.

With the ...

Solution Summary

This Solution contains over 300 words and 1 reference.

$2.19