A Brief Overview of Computer Forensics


Each department shall create protocols for informing the high-technology crime investigation unit about high-tech crimes and occurrences linked to them by the GEC high-technology crime investigation policy and as indicated in the IRPD. Because of how GEC operates, every employee is responsible for safeguarding the information systems and the data they store, process, and communicate. Due to their management responsibilities, GEC’s managers are expected to ensure the company’s assets. Therefore, based on each department’s particular situation with GEC and the high-technology crime investigator’s reasoning, upper management agreed that each department should adhere to the IRPD.


The high-technology crime investigative manager or investigator must decide as soon as feasible regarding who will be in charge of planning and carrying out the high-technology crime computer forensics endeavor. This will depend partly on the available resources and what is known at the time. Naturally, one may have to rely on the corporation’s investigator, assisted by pertinent IT team members, if a high-technology crime investigator is not on staff.

Computer forensics and high-tech criminal investigations shouldn’t be handled by non-investigative personnel. If specialists are needed, they should work directly under the high-tech crime investigator’s supervision. Neither IT nor audit staff has the necessary knowledge to conduct interviews and interrogations properly, gather and preserve evidence, or carry out computer forensics independently.

Use data to bring criminals to justice.

To create official documentation for a criminal prosecution, detectives employ data gathered from the crime scene, suspects, victims, and witnesses, as well as crime analysis reports.

Detectives must also complete other data-intensive activities, including writing supplementary reports, asking crime lab technicians for lab reports, and asking transcriptionists for transcripts of all interviews. Additionally, to compile all the data into a comprehensive dossier that serves as the foundation for the prosecution, detectives from various departmental units, county attorney offices, and courts frequently work together during this stage. Knowing the challenges of illegal data mining in light of the investigation process is helpful for data mining practitioners.