SlideShare a Scribd company logo
1 of 15
www.tusconsultoreslegales.com [email_address] Internet/Digital evidence (COMPUTER FORENSICS) CORPORATE CRIMINAL LIABILITY
www.tusconsultoreslegales.com [email_address] INTERNET/INVESTIGATION OF DIGITAL EVIDENCE/COMPUTER FORENSICS  4. PREVENTIVE ANALYSIS OF CORPORATE CRIMINAL LIABILITY  3. HOW TO PREVENT AND/OR MINIMISE CORPORATE CRIMINAL LIABILITY  2. LEGAL FRAMEWORK OF CORPORATE CRIMINAL LIABILITY AND DIGITAL EVIDENCE  6. REASONS FOR A FORENSICS INVESTIGATION 1. SITUATIONS WHICH SHOULD BE AVOIDED: REFLECTIONS  5. STAGES OF THE COMPUTER FORENSICS PROCESS
www.tusconsultoreslegales.com [email_address] ,[object Object],[object Object],[object Object],1. SITUATIONS WHICH SHOULD BE AVOIDED REFLECTIONS:
www.tusconsultoreslegales.com [email_address] ,[object Object],[object Object],1. SITUATIONS WHICH SHOULD BE AVOIDED REFLECTIONS:
www.tusconsultoreslegales.com [email_address] 2. LEGAL FRAMEWORK OF CORPORATE CRIMINAL LIABILITY AND DIGITAL EVIDENCE (1/2)  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
www.tusconsultoreslegales.com [email_address] 2. LEGAL FRAMEWORK OF CORPORATE CRIMINAL LIABILITY AND DIGITAL EVIDENCE (2/2)  ,[object Object],[object Object],[object Object],[object Object]
www.tusconsultoreslegales.com [email_address] 2. LEGAL FRAMEWORK OF CORPORATE CRIMINAL LIABILITY AND DIGITAL EVIDENCE (2/2)  ,[object Object],[object Object],[object Object],[object Object],[object Object]
www.tusconsultoreslegales.com [email_address] 3. HOW TO PREVENT AND/OR MINIMISE CORPORATE CRIMINAL LIABILITY PREVENTIVE MEASURES: 1-  Establishing control measures: Implementing an internal corporate policy  5-  Detecting and preserving evidence which allow a proactive legal defence: Minimising the consequences of the crime 2- Establishing technical and organisational measures: Complying with personal data protection obligations (Organic Law on Personal Data Projection and Implementing Legislation) 3-  Implementing security certificates: Preventing identity theft COMPUTER  FORENSICS 4-  Establishing cover measures: Having an insurance policy which also covers legal services
www.tusconsultoreslegales.com [email_address] An internal corporate policy with clear guidelines, specifying the permitted use of both the company's internal and external means of communication, with the corresponding behaviours, expressly indicated, through control measures established by the employer as provided in article 20.3 of the Workers' Statute. 4. PREVENTIVE ANALYSIS OF CORPORATE CRIMINAL LIABILITY (1/3) 1-  Establishing control measures: Implementing an internal corporate policy  2- Establishing technical and organisational measures: Complying with personal data protection obligations (Organic Law on Personal Data Projection and Implementing Legislation) Having complied with the obligations established by the Organic Law on Personal Data Protection and implementing regulations to establish the technical and organisational measures necessary, as well as efficient control measures in accordance with article 20.3 of the Workers' Statute which are compatible with the worker's privacy. Above all, ensuring control of both internal and external means of communication.
www.tusconsultoreslegales.com [email_address] 4. PREVENTIVE ANALYSIS OF CORPORATE CRIMINAL LIABILITY (2/3) 3-  Implementing security certificates: Preventing identity theft Need to have an insurance policy which also contributes to establishing cover for legal defence.     4-  Establishing cover measures: Having an insurance policy which also covers legal services ,[object Object],[object Object],[object Object],[object Object]
www.tusconsultoreslegales.com [email_address] 4. PREVENTIVE ANALYSIS OF CORPORATE CRIMINAL LIABILITY (3/3) The detection, preservation and investigation of electronic proof or evidence which may be used to defend the company against possible criminal liability is known as COMPUTER FORENSICS.  This discipline is basically divided into four major stages or processes, which can be carried out independently, or consecutively, according to the company's needs.  The stages of Computer Forensics go from prevention up to implementing proof in the trial. 5-  Detecting and preserving evidence which allow a legal defence oriented towards minimising possible criminal consequences  COMPUTER  FORENSICS
www.tusconsultoreslegales.com [email_address] 5. STAGES OF THE COMPUTER FORENSICS PROCESS PREVENTION FORENSIC  READINESS Objective:  Facilitating a possible digital investigation How: Establishing and implementing traceability procedures Example: Intrusion Detection  Systems LOCATING  INFORMATION E-DISCOVERY Objective:  Search for specific data from a  large quantity of information How: Use of search and filter mechanisms in file systems and databases  Example: Search for deleted accounting data DATA ACQUISITION CHAIN OF CUSTODY Objective:  Correctly initiating the chain of custody of future proof How: Bit by bit copy of digital information before a notary Example: Copies of information from a mobile telephone EVIDENCE ANALYSIS EXPERT REPORT Objective:  Analysing digital information and searching for  possible evidence. How: Blind and automated search for suspicious activities Example: Analysis of the PC of an ex-employee for  possible information theft
www.tusconsultoreslegales.com [email_address] 6. REASONS FOR A DIGITAL INVESTIGATION ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
www.tusconsultoreslegales.com [email_address] 6. REASONS FOR A FORENSIC INVESTIGATION  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
www.tusconsultoreslegales.com [email_address] Thank you for your interest [email_address] To purchase documents: www.yourlegalconsultants.com To hire the services of an expert, please contact:

More Related Content

What's hot

10 Things You Need To Know About Privacy
10 Things You Need To Know About Privacy10 Things You Need To Know About Privacy
10 Things You Need To Know About PrivacyNow Dentons
 
Pli workplace privacy in the year 2013 2013-6-13
Pli workplace privacy in the year 2013   2013-6-13Pli workplace privacy in the year 2013   2013-6-13
Pli workplace privacy in the year 2013 2013-6-13mkeane
 
Privacy in India: Legal issues
Privacy in India: Legal issuesPrivacy in India: Legal issues
Privacy in India: Legal issuesSagar Rahurkar
 
Workplace Privacy Presentation
Workplace Privacy PresentationWorkplace Privacy Presentation
Workplace Privacy PresentationSarah Forbes
 
General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR)General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR)BenjaminShalevSalovi
 
Law firm information security overview focus on encryption by dave cunningh...
Law firm information security overview   focus on encryption by dave cunningh...Law firm information security overview   focus on encryption by dave cunningh...
Law firm information security overview focus on encryption by dave cunningh...David Cunningham
 
Data Protection Bill 2019 Participative Role of General Public
Data Protection Bill 2019 Participative Role of General PublicData Protection Bill 2019 Participative Role of General Public
Data Protection Bill 2019 Participative Role of General Publicijtsrd
 
Data Protection & Security Breakfast Briefing - Master Slides_28 June_final
Data Protection & Security Breakfast Briefing - Master Slides_28 June_finalData Protection & Security Breakfast Briefing - Master Slides_28 June_final
Data Protection & Security Breakfast Briefing - Master Slides_28 June_finalDr. Donald Macfarlane
 
An Indian Outline on Database Protection
An Indian Outline on Database ProtectionAn Indian Outline on Database Protection
An Indian Outline on Database ProtectionSinghania2015
 
Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...
Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...
Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...Raleigh ISSA
 

What's hot (13)

10 Things You Need To Know About Privacy
10 Things You Need To Know About Privacy10 Things You Need To Know About Privacy
10 Things You Need To Know About Privacy
 
Pli workplace privacy in the year 2013 2013-6-13
Pli workplace privacy in the year 2013   2013-6-13Pli workplace privacy in the year 2013   2013-6-13
Pli workplace privacy in the year 2013 2013-6-13
 
Privacy in India: Legal issues
Privacy in India: Legal issuesPrivacy in India: Legal issues
Privacy in India: Legal issues
 
ScifoBYODSample
ScifoBYODSampleScifoBYODSample
ScifoBYODSample
 
elec reporting
elec reportingelec reporting
elec reporting
 
Workplace Privacy Presentation
Workplace Privacy PresentationWorkplace Privacy Presentation
Workplace Privacy Presentation
 
General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR)General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR)
 
Law firm information security overview focus on encryption by dave cunningh...
Law firm information security overview   focus on encryption by dave cunningh...Law firm information security overview   focus on encryption by dave cunningh...
Law firm information security overview focus on encryption by dave cunningh...
 
Data Protection Bill 2019 Participative Role of General Public
Data Protection Bill 2019 Participative Role of General PublicData Protection Bill 2019 Participative Role of General Public
Data Protection Bill 2019 Participative Role of General Public
 
Data Protection & Security Breakfast Briefing - Master Slides_28 June_final
Data Protection & Security Breakfast Briefing - Master Slides_28 June_finalData Protection & Security Breakfast Briefing - Master Slides_28 June_final
Data Protection & Security Breakfast Briefing - Master Slides_28 June_final
 
An Indian Outline on Database Protection
An Indian Outline on Database ProtectionAn Indian Outline on Database Protection
An Indian Outline on Database Protection
 
201 CMR 17.00
201 CMR 17.00201 CMR 17.00
201 CMR 17.00
 
Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...
Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...
Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...
 

Viewers also liked

Evidence Preservation
Evidence PreservationEvidence Preservation
Evidence Preservationamckean
 
Child GPS Tracking Device
Child GPS Tracking DeviceChild GPS Tracking Device
Child GPS Tracking Devicestelamala
 
Digital investigation
Digital investigationDigital investigation
Digital investigationunnilala11
 
Crime scene management
Crime scene managementCrime scene management
Crime scene managementHafeez Bhutta
 
Teaching Computer Forensics Using Student Developed Evidence Files
Teaching Computer Forensics Using Student Developed Evidence FilesTeaching Computer Forensics Using Student Developed Evidence Files
Teaching Computer Forensics Using Student Developed Evidence Filesamiable_indian
 
The Deep Web, TOR Network and Internet Anonymity
The Deep Web, TOR Network and Internet AnonymityThe Deep Web, TOR Network and Internet Anonymity
The Deep Web, TOR Network and Internet AnonymityAbhimanyu Singh
 
Digital Crime & Forensics - Presentation
Digital Crime & Forensics - PresentationDigital Crime & Forensics - Presentation
Digital Crime & Forensics - Presentationprashant3535
 
Gps tracking system
Gps tracking system Gps tracking system
Gps tracking system Sumit Kumar
 

Viewers also liked (12)

Evidence Preservation
Evidence PreservationEvidence Preservation
Evidence Preservation
 
Child GPS Tracking Device
Child GPS Tracking DeviceChild GPS Tracking Device
Child GPS Tracking Device
 
Digital investigation
Digital investigationDigital investigation
Digital investigation
 
Digital Forensic
Digital ForensicDigital Forensic
Digital Forensic
 
Crime scene management
Crime scene managementCrime scene management
Crime scene management
 
Teaching Computer Forensics Using Student Developed Evidence Files
Teaching Computer Forensics Using Student Developed Evidence FilesTeaching Computer Forensics Using Student Developed Evidence Files
Teaching Computer Forensics Using Student Developed Evidence Files
 
Deep Web - what to do and what not to do
Deep Web - what to do and what not to do	Deep Web - what to do and what not to do
Deep Web - what to do and what not to do
 
The Deep Web, TOR Network and Internet Anonymity
The Deep Web, TOR Network and Internet AnonymityThe Deep Web, TOR Network and Internet Anonymity
The Deep Web, TOR Network and Internet Anonymity
 
Digital Crime & Forensics - Presentation
Digital Crime & Forensics - PresentationDigital Crime & Forensics - Presentation
Digital Crime & Forensics - Presentation
 
The Deep and Dark Web
The Deep and Dark WebThe Deep and Dark Web
The Deep and Dark Web
 
Gps tracking system
Gps tracking system Gps tracking system
Gps tracking system
 
Security analysis of emerging smart home applications 11.2016
Security analysis of emerging smart home applications 11.2016Security analysis of emerging smart home applications 11.2016
Security analysis of emerging smart home applications 11.2016
 

Similar to Prevent Corporate Criminal Liability with Digital Evidence Analysis

Corporate Criminal Compliance in Spain
Corporate Criminal Compliance in SpainCorporate Criminal Compliance in Spain
Corporate Criminal Compliance in SpainTAG Alliances
 
The New Massachusetts Privacy Rules (February 2, 2010)
The New Massachusetts Privacy Rules (February 2, 2010)The New Massachusetts Privacy Rules (February 2, 2010)
The New Massachusetts Privacy Rules (February 2, 2010)stevemeltzer
 
Internet. electronic invoicement. legal requirements
Internet. electronic invoicement. legal requirementsInternet. electronic invoicement. legal requirements
Internet. electronic invoicement. legal requirementsyourlegalconsultants
 
Internet:: Electronic Invoicement: Legal requirements
Internet:: Electronic Invoicement: Legal requirementsInternet:: Electronic Invoicement: Legal requirements
Internet:: Electronic Invoicement: Legal requirementsCristina Villavicencio
 
Computer Forensics-An Introduction of New Face to the Digital World
Computer Forensics-An Introduction of New Face to the Digital WorldComputer Forensics-An Introduction of New Face to the Digital World
Computer Forensics-An Introduction of New Face to the Digital Worldrahulmonikasharma
 
Integrated criminal and justice information system of Korea
Integrated criminal and justice information system of KoreaIntegrated criminal and justice information system of Korea
Integrated criminal and justice information system of KoreaYoungTae (Henry) Huh
 
Crossing the streams: How security professionals can leverage the NZ Privacy ...
Crossing the streams: How security professionals can leverage the NZ Privacy ...Crossing the streams: How security professionals can leverage the NZ Privacy ...
Crossing the streams: How security professionals can leverage the NZ Privacy ...Chris Hails
 
Data protection process information
Data protection process informationData protection process information
Data protection process informationyourlegalconsultants
 
CCSP_Self_Domain_6.ppt
CCSP_Self_Domain_6.pptCCSP_Self_Domain_6.ppt
CCSP_Self_Domain_6.pptSamir Jha
 
Introduction to Data Security Breach Preparedness with Model Data Security Br...
Introduction to Data Security Breach Preparedness with Model Data Security Br...Introduction to Data Security Breach Preparedness with Model Data Security Br...
Introduction to Data Security Breach Preparedness with Model Data Security Br...- Mark - Fullbright
 
Data Risks In A Digital Age
Data Risks In A Digital Age Data Risks In A Digital Age
Data Risks In A Digital Age padler01
 
10. law invest & ethics
10. law invest & ethics10. law invest & ethics
10. law invest & ethics7wounders
 

Similar to Prevent Corporate Criminal Liability with Digital Evidence Analysis (20)

Social Networks
Social NetworksSocial Networks
Social Networks
 
Social Networks
Social NetworksSocial Networks
Social Networks
 
Social Networks
Social NetworksSocial Networks
Social Networks
 
Corporate Criminal Compliance in Spain
Corporate Criminal Compliance in SpainCorporate Criminal Compliance in Spain
Corporate Criminal Compliance in Spain
 
The New Massachusetts Privacy Rules (February 2, 2010)
The New Massachusetts Privacy Rules (February 2, 2010)The New Massachusetts Privacy Rules (February 2, 2010)
The New Massachusetts Privacy Rules (February 2, 2010)
 
Internet. electronic invoicement. legal requirements
Internet. electronic invoicement. legal requirementsInternet. electronic invoicement. legal requirements
Internet. electronic invoicement. legal requirements
 
Dpl october 2017 colombia
Dpl october 2017   colombiaDpl october 2017   colombia
Dpl october 2017 colombia
 
Internet:: Electronic Invoicement: Legal requirements
Internet:: Electronic Invoicement: Legal requirementsInternet:: Electronic Invoicement: Legal requirements
Internet:: Electronic Invoicement: Legal requirements
 
Computer Forensics-An Introduction of New Face to the Digital World
Computer Forensics-An Introduction of New Face to the Digital WorldComputer Forensics-An Introduction of New Face to the Digital World
Computer Forensics-An Introduction of New Face to the Digital World
 
Itet3 its forensics
Itet3 its forensicsItet3 its forensics
Itet3 its forensics
 
Integrated criminal and justice information system of Korea
Integrated criminal and justice information system of KoreaIntegrated criminal and justice information system of Korea
Integrated criminal and justice information system of Korea
 
Crossing the streams: How security professionals can leverage the NZ Privacy ...
Crossing the streams: How security professionals can leverage the NZ Privacy ...Crossing the streams: How security professionals can leverage the NZ Privacy ...
Crossing the streams: How security professionals can leverage the NZ Privacy ...
 
Data protection process information
Data protection process informationData protection process information
Data protection process information
 
CCSP_Self_Domain_6.ppt
CCSP_Self_Domain_6.pptCCSP_Self_Domain_6.ppt
CCSP_Self_Domain_6.ppt
 
Quick guide gdpr
Quick guide gdprQuick guide gdpr
Quick guide gdpr
 
Professional issues in IT
Professional issues in IT Professional issues in IT
Professional issues in IT
 
Introduction to Data Security Breach Preparedness with Model Data Security Br...
Introduction to Data Security Breach Preparedness with Model Data Security Br...Introduction to Data Security Breach Preparedness with Model Data Security Br...
Introduction to Data Security Breach Preparedness with Model Data Security Br...
 
Data Risks In A Digital Age
Data Risks In A Digital Age Data Risks In A Digital Age
Data Risks In A Digital Age
 
10. law invest & ethics
10. law invest & ethics10. law invest & ethics
10. law invest & ethics
 
Workplace Privacy (excerpt)
Workplace Privacy (excerpt)Workplace Privacy (excerpt)
Workplace Privacy (excerpt)
 

Recently uploaded

Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMRavindra Nath Shukla
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLSeo
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...anilsa9823
 
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangaloreamitlee9823
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageMatteo Carbone
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxAndy Lambert
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Dipal Arora
 
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...lizamodels9
 
John Halpern sued for sexual assault.pdf
John Halpern sued for sexual assault.pdfJohn Halpern sued for sexual assault.pdf
John Halpern sued for sexual assault.pdfAmzadHosen3
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756dollysharma2066
 
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...rajveerescorts2022
 
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Delhi Call girls
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...Paul Menig
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...Aggregage
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayNZSG
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with CultureSeta Wicaksana
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfPaul Menig
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Centuryrwgiffor
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityEric T. Tung
 

Recently uploaded (20)

Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSM
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
 
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usage
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptx
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
 
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
 
John Halpern sued for sexual assault.pdf
John Halpern sued for sexual assault.pdfJohn Halpern sued for sexual assault.pdf
John Halpern sued for sexual assault.pdf
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
 
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
 
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 May
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with Culture
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdf
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Century
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League City
 

Prevent Corporate Criminal Liability with Digital Evidence Analysis

  • 1. www.tusconsultoreslegales.com [email_address] Internet/Digital evidence (COMPUTER FORENSICS) CORPORATE CRIMINAL LIABILITY
  • 2. www.tusconsultoreslegales.com [email_address] INTERNET/INVESTIGATION OF DIGITAL EVIDENCE/COMPUTER FORENSICS 4. PREVENTIVE ANALYSIS OF CORPORATE CRIMINAL LIABILITY 3. HOW TO PREVENT AND/OR MINIMISE CORPORATE CRIMINAL LIABILITY 2. LEGAL FRAMEWORK OF CORPORATE CRIMINAL LIABILITY AND DIGITAL EVIDENCE 6. REASONS FOR A FORENSICS INVESTIGATION 1. SITUATIONS WHICH SHOULD BE AVOIDED: REFLECTIONS 5. STAGES OF THE COMPUTER FORENSICS PROCESS
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8. www.tusconsultoreslegales.com [email_address] 3. HOW TO PREVENT AND/OR MINIMISE CORPORATE CRIMINAL LIABILITY PREVENTIVE MEASURES: 1- Establishing control measures: Implementing an internal corporate policy 5- Detecting and preserving evidence which allow a proactive legal defence: Minimising the consequences of the crime 2- Establishing technical and organisational measures: Complying with personal data protection obligations (Organic Law on Personal Data Projection and Implementing Legislation) 3- Implementing security certificates: Preventing identity theft COMPUTER FORENSICS 4- Establishing cover measures: Having an insurance policy which also covers legal services
  • 9. www.tusconsultoreslegales.com [email_address] An internal corporate policy with clear guidelines, specifying the permitted use of both the company's internal and external means of communication, with the corresponding behaviours, expressly indicated, through control measures established by the employer as provided in article 20.3 of the Workers' Statute. 4. PREVENTIVE ANALYSIS OF CORPORATE CRIMINAL LIABILITY (1/3) 1- Establishing control measures: Implementing an internal corporate policy 2- Establishing technical and organisational measures: Complying with personal data protection obligations (Organic Law on Personal Data Projection and Implementing Legislation) Having complied with the obligations established by the Organic Law on Personal Data Protection and implementing regulations to establish the technical and organisational measures necessary, as well as efficient control measures in accordance with article 20.3 of the Workers' Statute which are compatible with the worker's privacy. Above all, ensuring control of both internal and external means of communication.
  • 10.
  • 11. www.tusconsultoreslegales.com [email_address] 4. PREVENTIVE ANALYSIS OF CORPORATE CRIMINAL LIABILITY (3/3) The detection, preservation and investigation of electronic proof or evidence which may be used to defend the company against possible criminal liability is known as COMPUTER FORENSICS. This discipline is basically divided into four major stages or processes, which can be carried out independently, or consecutively, according to the company's needs. The stages of Computer Forensics go from prevention up to implementing proof in the trial. 5- Detecting and preserving evidence which allow a legal defence oriented towards minimising possible criminal consequences COMPUTER FORENSICS
  • 12. www.tusconsultoreslegales.com [email_address] 5. STAGES OF THE COMPUTER FORENSICS PROCESS PREVENTION FORENSIC READINESS Objective: Facilitating a possible digital investigation How: Establishing and implementing traceability procedures Example: Intrusion Detection Systems LOCATING INFORMATION E-DISCOVERY Objective: Search for specific data from a large quantity of information How: Use of search and filter mechanisms in file systems and databases Example: Search for deleted accounting data DATA ACQUISITION CHAIN OF CUSTODY Objective: Correctly initiating the chain of custody of future proof How: Bit by bit copy of digital information before a notary Example: Copies of information from a mobile telephone EVIDENCE ANALYSIS EXPERT REPORT Objective: Analysing digital information and searching for possible evidence. How: Blind and automated search for suspicious activities Example: Analysis of the PC of an ex-employee for possible information theft
  • 13.
  • 14.
  • 15. www.tusconsultoreslegales.com [email_address] Thank you for your interest [email_address] To purchase documents: www.yourlegalconsultants.com To hire the services of an expert, please contact: