Call toll free: +1 (304) 900-6229 or Request a call

You are a digital forensics intern at Azorian Computer Forensics,

 You are a digital forensics intern at Azorian Computer Forensics, a privately owned forensics investigations and data recovery firm in the Denver, Colorado area. Azorian has been called to a client’s site to work on a security incident involving five laptop computers. You are assisting Pat, one of Azorian’s lead investigators. Pat is working with the client’s IT security staff team leader, Marta, and an IT staff member, Suhkrit, to seize and process the five computers. Marta is overseeing the process, whereas Suhkrit is directly involved in handling the computers.

The computers must be removed from the employees’ work areas and moved to a secure location within the client’s premises. From there, you will assist Pat in preparing the computers for transporting them to the Azorian facility.


Chain of Custody

Evidence is always in the custody of someone or in secure storage. The chain of custody form documents who have the evidence in their possession at any given time. Whenever evidence is transferred from one person to another or one place to another, the chain of custody must be updated. A chain of custody document shows:

  • What was collected (description, serial numbers, and so on)
  • Who obtained the evidence
  • Where and when it was obtained
  • Who secured it
  • Who had control or possession of it

The chain of custody requires that every transfer of evidence be provable that nobody else could have accessed that evidence. It is best to keep the number of transfers as low as possible.

Chain of Custody Form

Fields in a chain of custody form may include the following: 

  • Case
  • Reason of evidence obtained
  • Name
  • Title
  • Address from person received
  • Location obtained from
  • Date/time obtained
  • Item number
  • Quantity
  • Description

For each evidence item, include the following information:

  • Item number
  • Date
  • Released by (signature, name, title)
  • Received by (signature, name, title)
  • Purpose of chain of custody

For this assignment:

  1. Walk through the process of removal of computers described above from employees’ work areas to the client’s secure location and eventually to the Azorian facility. Who might have possession of the computers during each step? Design a flow chart of the process.
  2. Each transfer of possession requires chain of custody documentation. Each transfer requires a signature from the person releasing the evidence and the person receiving the evidence. Include the from/to information in your diagram or flow chart.

Submission Requirements

  • Format: Microsoft Word Document or PowerPoint (or compatible) or the drawing program of your choice; file saved as a PDF
  • Length: 1–3 pages

Table of Contents

Calculate your order
Pages (275 words)
Standard price: $0.00

Latest Reviews

Impressed with the sample above? Wait there is more

Related Questions

Nadia Boulanger’s life and teaching style

Write a 2-3 page paper on composition teacher Nadia Boulanger (p. 295-296). Conduct some research and read more about Nadia Boulanger’s life and teaching style.

Crime Victim Processing – Premium Paper Help

Premium Paper Help is a professional writing service that provides original papers. Our products include academic papers of varying complexity and other personalized services, along

New questions

Don't Let Questions or Concerns Hold You Back - Make a Free Inquiry Now!