SlideShare a Scribd company logo
For this assignment, you will define ethics within the context of
digital forensics. You will then apply what you learned to your
life, developing an ethical code-of-conduct document.
Scenario:
Your manager has asked you to create a code-of-conduct
document for your organization to give to employees during
their new-hire orientation. In the code-of-conduct document,
you are asked to focus on the sharing of personal or
professional data and the ethics involved in sharing data.
Tasks:
Create a code-of-conduct document with the following:
Define ethics. Explain what it is and how it applies to digital
forensics, while also describing ethical and unethical handling
of forensic information.
Evaluate current or past news events related to each of the four
branches of digital forensics: Computer forensics, mobile
device forensics, network forensics, and database forensics.
Consider topics such as identity theft, the Patriot Act, or
Wikileaks. Share your thoughts on the major themes and ethical
concerns and give some insight into how it impacts you
personally and professionally.
Analyze current ethical considerations and issues.
Review the following articles:
When IT Is Asked to Spy
Lost Data Tied to CPP Claims: Ottawa Says USB Stick Has Info
on Applicants for Disability Benefits
Select two additional articles from this
list
that illustrate ethical considerations and issues. Ideally, you
should not have previously used these two articles for another
assignment in this class.
Create a code-of-conduct document you can use in professional
situations as it relates to accessing or sharing data. This can be
a checklist or bulleted list of "Do and Do Not Tasks." Consider
the examples and resources below when creating your code-of-
conduct document:
The International Society of Forensic Computer Examiners.
(n.d.).
Code of ethics and professional responsibility
. Retrieved from http://www.isfce.com/ethics2.htm
Barbara, J. (2008).
Ethical practices in digital forensics: Part 2
. Retrieved from http://www.forensicmag.com/article/ethical -
practices-digital-forensics-part-2
The American Society of Digital Forensics and eDiscovery.
(n.d.).
Domain 3 - Ethics and code of conduct
. Retrieved from
https://sites.google.com/site/asdfedorg/domain-3
Note
: Your final product should be a Microsoft Word document,
approximately seven to nine pages in length, incorporating five
to seven scholarly sources. Write in a clear, concise, and
organized manner; demonstrate ethical scholarship in the
accurate representation and attribution of sources (APA); and
display accurate spelling, grammar, and punctuation.

More Related Content

Similar to For this assignment, you will define ethics within the context o

Picture 1Picture 2InstructionsPaper B1 a matri.docx
Picture 1Picture 2InstructionsPaper B1 a matri.docxPicture 1Picture 2InstructionsPaper B1 a matri.docx
Picture 1Picture 2InstructionsPaper B1 a matri.docx
mattjtoni51554
 
Exercise 3You work as a forensic investigator. A recent inquiry .docx
Exercise 3You work as a forensic investigator. A recent inquiry .docxExercise 3You work as a forensic investigator. A recent inquiry .docx
Exercise 3You work as a forensic investigator. A recent inquiry .docx
rhetttrevannion
 
Application of a decision making framework to an IT-related ethical
Application of a decision making framework to an IT-related ethical Application of a decision making framework to an IT-related ethical
Application of a decision making framework to an IT-related ethical
mallisonshavon
 
Objective Apply decision making frameworks to IT-related ethica.docx
Objective Apply decision making frameworks to IT-related ethica.docxObjective Apply decision making frameworks to IT-related ethica.docx
Objective Apply decision making frameworks to IT-related ethica.docx
juliennehar
 
Paper B1 a matrix mapping of a key IT-related organizational (or pe.docx
Paper B1 a matrix mapping of a key IT-related organizational (or pe.docxPaper B1 a matrix mapping of a key IT-related organizational (or pe.docx
Paper B1 a matrix mapping of a key IT-related organizational (or pe.docx
jakeomoore75037
 
InstructionsPaper B1 a matrix mapping of a key IT-related organ
InstructionsPaper B1 a matrix mapping of a key IT-related organInstructionsPaper B1 a matrix mapping of a key IT-related organ
InstructionsPaper B1 a matrix mapping of a key IT-related organ
lauricesatu
 
View Attachment for all questions. All 21 Questions should be an.docx
View Attachment for all questions. All 21 Questions should be an.docxView Attachment for all questions. All 21 Questions should be an.docx
View Attachment for all questions. All 21 Questions should be an.docx
alehosickg3
 
This assignment gives you an opportunity to analyze a key IT-rel.docx
This assignment gives you an opportunity to analyze a key IT-rel.docxThis assignment gives you an opportunity to analyze a key IT-rel.docx
This assignment gives you an opportunity to analyze a key IT-rel.docx
gasciognecaren
 
Paper Ba matrix mapping of a key IT-related organizational .docx
Paper Ba matrix mapping of a key IT-related organizational .docxPaper Ba matrix mapping of a key IT-related organizational .docx
Paper Ba matrix mapping of a key IT-related organizational .docx
loganta
 
ethical issue.docx
ethical issue.docxethical issue.docx
ethical issue.docx
write4
 
Ethical dilemma Identity TheftStakeholdersConfidentiality.docx
Ethical dilemma  Identity TheftStakeholdersConfidentiality.docxEthical dilemma  Identity TheftStakeholdersConfidentiality.docx
Ethical dilemma Identity TheftStakeholdersConfidentiality.docx
humphrieskalyn
 
This assignment gives you an opportunity to analyze a key IT-r.docx
This assignment gives you an opportunity to analyze a key IT-r.docxThis assignment gives you an opportunity to analyze a key IT-r.docx
This assignment gives you an opportunity to analyze a key IT-r.docx
howardh5
 
Computer ForensicsDiscussion 1Forensics Certifications Ple.docx
Computer ForensicsDiscussion 1Forensics Certifications Ple.docxComputer ForensicsDiscussion 1Forensics Certifications Ple.docx
Computer ForensicsDiscussion 1Forensics Certifications Ple.docx
donnajames55
 
This assignment provides an opportunity to analyze a key IT-rela.docx
This assignment provides an opportunity to analyze a key IT-rela.docxThis assignment provides an opportunity to analyze a key IT-rela.docx
This assignment provides an opportunity to analyze a key IT-rela.docx
christalgrieg
 
The first step of this assignment is an opportunity to analyze a.docx
The first step of this assignment is an opportunity to analyze a.docxThe first step of this assignment is an opportunity to analyze a.docx
The first step of this assignment is an opportunity to analyze a.docx
rhetttrevannion
 
Paper Ba matrix mapping of a key IT-related organizational (o.docx
Paper Ba matrix mapping of a key IT-related organizational (o.docxPaper Ba matrix mapping of a key IT-related organizational (o.docx
Paper Ba matrix mapping of a key IT-related organizational (o.docx
aman341480
 
Objective There are two high-level objectives in this project ass.docx
Objective There are two high-level objectives in this project ass.docxObjective There are two high-level objectives in this project ass.docx
Objective There are two high-level objectives in this project ass.docx
juliennehar
 
Cis 438 Technology levels--snaptutorial.com
Cis 438 Technology levels--snaptutorial.comCis 438 Technology levels--snaptutorial.com
Cis 438 Technology levels--snaptutorial.com
sholingarjosh61
 

Similar to For this assignment, you will define ethics within the context o (18)

Picture 1Picture 2InstructionsPaper B1 a matri.docx
Picture 1Picture 2InstructionsPaper B1 a matri.docxPicture 1Picture 2InstructionsPaper B1 a matri.docx
Picture 1Picture 2InstructionsPaper B1 a matri.docx
 
Exercise 3You work as a forensic investigator. A recent inquiry .docx
Exercise 3You work as a forensic investigator. A recent inquiry .docxExercise 3You work as a forensic investigator. A recent inquiry .docx
Exercise 3You work as a forensic investigator. A recent inquiry .docx
 
Application of a decision making framework to an IT-related ethical
Application of a decision making framework to an IT-related ethical Application of a decision making framework to an IT-related ethical
Application of a decision making framework to an IT-related ethical
 
Objective Apply decision making frameworks to IT-related ethica.docx
Objective Apply decision making frameworks to IT-related ethica.docxObjective Apply decision making frameworks to IT-related ethica.docx
Objective Apply decision making frameworks to IT-related ethica.docx
 
Paper B1 a matrix mapping of a key IT-related organizational (or pe.docx
Paper B1 a matrix mapping of a key IT-related organizational (or pe.docxPaper B1 a matrix mapping of a key IT-related organizational (or pe.docx
Paper B1 a matrix mapping of a key IT-related organizational (or pe.docx
 
InstructionsPaper B1 a matrix mapping of a key IT-related organ
InstructionsPaper B1 a matrix mapping of a key IT-related organInstructionsPaper B1 a matrix mapping of a key IT-related organ
InstructionsPaper B1 a matrix mapping of a key IT-related organ
 
View Attachment for all questions. All 21 Questions should be an.docx
View Attachment for all questions. All 21 Questions should be an.docxView Attachment for all questions. All 21 Questions should be an.docx
View Attachment for all questions. All 21 Questions should be an.docx
 
This assignment gives you an opportunity to analyze a key IT-rel.docx
This assignment gives you an opportunity to analyze a key IT-rel.docxThis assignment gives you an opportunity to analyze a key IT-rel.docx
This assignment gives you an opportunity to analyze a key IT-rel.docx
 
Paper Ba matrix mapping of a key IT-related organizational .docx
Paper Ba matrix mapping of a key IT-related organizational .docxPaper Ba matrix mapping of a key IT-related organizational .docx
Paper Ba matrix mapping of a key IT-related organizational .docx
 
ethical issue.docx
ethical issue.docxethical issue.docx
ethical issue.docx
 
Ethical dilemma Identity TheftStakeholdersConfidentiality.docx
Ethical dilemma  Identity TheftStakeholdersConfidentiality.docxEthical dilemma  Identity TheftStakeholdersConfidentiality.docx
Ethical dilemma Identity TheftStakeholdersConfidentiality.docx
 
This assignment gives you an opportunity to analyze a key IT-r.docx
This assignment gives you an opportunity to analyze a key IT-r.docxThis assignment gives you an opportunity to analyze a key IT-r.docx
This assignment gives you an opportunity to analyze a key IT-r.docx
 
Computer ForensicsDiscussion 1Forensics Certifications Ple.docx
Computer ForensicsDiscussion 1Forensics Certifications Ple.docxComputer ForensicsDiscussion 1Forensics Certifications Ple.docx
Computer ForensicsDiscussion 1Forensics Certifications Ple.docx
 
This assignment provides an opportunity to analyze a key IT-rela.docx
This assignment provides an opportunity to analyze a key IT-rela.docxThis assignment provides an opportunity to analyze a key IT-rela.docx
This assignment provides an opportunity to analyze a key IT-rela.docx
 
The first step of this assignment is an opportunity to analyze a.docx
The first step of this assignment is an opportunity to analyze a.docxThe first step of this assignment is an opportunity to analyze a.docx
The first step of this assignment is an opportunity to analyze a.docx
 
Paper Ba matrix mapping of a key IT-related organizational (o.docx
Paper Ba matrix mapping of a key IT-related organizational (o.docxPaper Ba matrix mapping of a key IT-related organizational (o.docx
Paper Ba matrix mapping of a key IT-related organizational (o.docx
 
Objective There are two high-level objectives in this project ass.docx
Objective There are two high-level objectives in this project ass.docxObjective There are two high-level objectives in this project ass.docx
Objective There are two high-level objectives in this project ass.docx
 
Cis 438 Technology levels--snaptutorial.com
Cis 438 Technology levels--snaptutorial.comCis 438 Technology levels--snaptutorial.com
Cis 438 Technology levels--snaptutorial.com
 

More from DustiBuckner14

Your new clientsThe Wagner’s – Scott and Ella are a young marri.docx
Your new clientsThe Wagner’s – Scott and Ella are a young marri.docxYour new clientsThe Wagner’s – Scott and Ella are a young marri.docx
Your new clientsThe Wagner’s – Scott and Ella are a young marri.docx
DustiBuckner14
 
Writing Conclusions for Research PapersWhat is the purpose.docx
Writing Conclusions for Research PapersWhat is the purpose.docxWriting Conclusions for Research PapersWhat is the purpose.docx
Writing Conclusions for Research PapersWhat is the purpose.docx
DustiBuckner14
 
What Is Septic TankSeptic or septic typically is used t.docx
What Is Septic TankSeptic or septic typically is used t.docxWhat Is Septic TankSeptic or septic typically is used t.docx
What Is Septic TankSeptic or septic typically is used t.docx
DustiBuckner14
 
· You should respond to at least two of your peers by extending, r.docx
· You should respond to at least two of your peers by extending, r.docx· You should respond to at least two of your peers by extending, r.docx
· You should respond to at least two of your peers by extending, r.docx
DustiBuckner14
 
You are a medical student working your way throughcollege and ar.docx
You are a medical student working your way throughcollege and ar.docxYou are a medical student working your way throughcollege and ar.docx
You are a medical student working your way throughcollege and ar.docx
DustiBuckner14
 
[removed]THIS IEP INCLUDES FORMCHECKBOX Transitions.docx
[removed]THIS IEP INCLUDES     FORMCHECKBOX  Transitions.docx[removed]THIS IEP INCLUDES     FORMCHECKBOX  Transitions.docx
[removed]THIS IEP INCLUDES FORMCHECKBOX Transitions.docx
DustiBuckner14
 
Using the Integrated Model of Work Motivation Figure 12.1 (Latham, 2.docx
Using the Integrated Model of Work Motivation Figure 12.1 (Latham, 2.docxUsing the Integrated Model of Work Motivation Figure 12.1 (Latham, 2.docx
Using the Integrated Model of Work Motivation Figure 12.1 (Latham, 2.docx
DustiBuckner14
 
What We Can Afford” Poem By Shavar X. Seabrooks L.docx
What We Can Afford” Poem By Shavar  X. Seabrooks L.docxWhat We Can Afford” Poem By Shavar  X. Seabrooks L.docx
What We Can Afford” Poem By Shavar X. Seabrooks L.docx
DustiBuckner14
 
What are the techniques in handling categorical attributesHow.docx
What are the techniques in handling categorical attributesHow.docxWhat are the techniques in handling categorical attributesHow.docx
What are the techniques in handling categorical attributesHow.docx
DustiBuckner14
 
University of the CumberlandsSchool of Computer & Information .docx
University of the CumberlandsSchool of Computer & Information .docxUniversity of the CumberlandsSchool of Computer & Information .docx
University of the CumberlandsSchool of Computer & Information .docx
DustiBuckner14
 
Theresa and Mike fully support creating a code of conduct for th.docx
Theresa and Mike fully support creating a code of conduct for th.docxTheresa and Mike fully support creating a code of conduct for th.docx
Theresa and Mike fully support creating a code of conduct for th.docx
DustiBuckner14
 
Unit VII 1. Suppose a firm uses sugar in a product tha.docx
Unit VII         1. Suppose a firm uses sugar in a product tha.docxUnit VII         1. Suppose a firm uses sugar in a product tha.docx
Unit VII 1. Suppose a firm uses sugar in a product tha.docx
DustiBuckner14
 
Title PageThis spreadsheet supports STUDENT analysis of the case .docx
Title PageThis spreadsheet supports STUDENT analysis of the case .docxTitle PageThis spreadsheet supports STUDENT analysis of the case .docx
Title PageThis spreadsheet supports STUDENT analysis of the case .docx
DustiBuckner14
 
Title If a compensation system works well for one business, that .docx
Title If a compensation system works well for one business, that .docxTitle If a compensation system works well for one business, that .docx
Title If a compensation system works well for one business, that .docx
DustiBuckner14
 
Review the Article Below Keller, J. G., Miller, C., LasDulce, C.docx
Review the Article Below Keller, J. G., Miller, C., LasDulce, C.docxReview the Article Below Keller, J. G., Miller, C., LasDulce, C.docx
Review the Article Below Keller, J. G., Miller, C., LasDulce, C.docx
DustiBuckner14
 
Teachers reach diverse learners by scaffolding instruction in ways t.docx
Teachers reach diverse learners by scaffolding instruction in ways t.docxTeachers reach diverse learners by scaffolding instruction in ways t.docx
Teachers reach diverse learners by scaffolding instruction in ways t.docx
DustiBuckner14
 
ScenarioThe HIT Innovation Steering Committee of a large.docx
ScenarioThe HIT Innovation Steering Committee of a large.docxScenarioThe HIT Innovation Steering Committee of a large.docx
ScenarioThe HIT Innovation Steering Committee of a large.docx
DustiBuckner14
 
Space ... the final frontier.  So, as I am sure everyone knows, .docx
Space ... the final frontier.  So, as I am sure everyone knows, .docxSpace ... the final frontier.  So, as I am sure everyone knows, .docx
Space ... the final frontier.  So, as I am sure everyone knows, .docx
DustiBuckner14
 
The Internal EnvironmentInstitutionStudent’s name.docx
The Internal EnvironmentInstitutionStudent’s name.docxThe Internal EnvironmentInstitutionStudent’s name.docx
The Internal EnvironmentInstitutionStudent’s name.docx
DustiBuckner14
 
THE RESEARCH PROPOSAL BUS8100 8Chapter 2 - Literature ReviewTh.docx
THE RESEARCH PROPOSAL BUS8100 8Chapter 2 - Literature ReviewTh.docxTHE RESEARCH PROPOSAL BUS8100 8Chapter 2 - Literature ReviewTh.docx
THE RESEARCH PROPOSAL BUS8100 8Chapter 2 - Literature ReviewTh.docx
DustiBuckner14
 

More from DustiBuckner14 (20)

Your new clientsThe Wagner’s – Scott and Ella are a young marri.docx
Your new clientsThe Wagner’s – Scott and Ella are a young marri.docxYour new clientsThe Wagner’s – Scott and Ella are a young marri.docx
Your new clientsThe Wagner’s – Scott and Ella are a young marri.docx
 
Writing Conclusions for Research PapersWhat is the purpose.docx
Writing Conclusions for Research PapersWhat is the purpose.docxWriting Conclusions for Research PapersWhat is the purpose.docx
Writing Conclusions for Research PapersWhat is the purpose.docx
 
What Is Septic TankSeptic or septic typically is used t.docx
What Is Septic TankSeptic or septic typically is used t.docxWhat Is Septic TankSeptic or septic typically is used t.docx
What Is Septic TankSeptic or septic typically is used t.docx
 
· You should respond to at least two of your peers by extending, r.docx
· You should respond to at least two of your peers by extending, r.docx· You should respond to at least two of your peers by extending, r.docx
· You should respond to at least two of your peers by extending, r.docx
 
You are a medical student working your way throughcollege and ar.docx
You are a medical student working your way throughcollege and ar.docxYou are a medical student working your way throughcollege and ar.docx
You are a medical student working your way throughcollege and ar.docx
 
[removed]THIS IEP INCLUDES FORMCHECKBOX Transitions.docx
[removed]THIS IEP INCLUDES     FORMCHECKBOX  Transitions.docx[removed]THIS IEP INCLUDES     FORMCHECKBOX  Transitions.docx
[removed]THIS IEP INCLUDES FORMCHECKBOX Transitions.docx
 
Using the Integrated Model of Work Motivation Figure 12.1 (Latham, 2.docx
Using the Integrated Model of Work Motivation Figure 12.1 (Latham, 2.docxUsing the Integrated Model of Work Motivation Figure 12.1 (Latham, 2.docx
Using the Integrated Model of Work Motivation Figure 12.1 (Latham, 2.docx
 
What We Can Afford” Poem By Shavar X. Seabrooks L.docx
What We Can Afford” Poem By Shavar  X. Seabrooks L.docxWhat We Can Afford” Poem By Shavar  X. Seabrooks L.docx
What We Can Afford” Poem By Shavar X. Seabrooks L.docx
 
What are the techniques in handling categorical attributesHow.docx
What are the techniques in handling categorical attributesHow.docxWhat are the techniques in handling categorical attributesHow.docx
What are the techniques in handling categorical attributesHow.docx
 
University of the CumberlandsSchool of Computer & Information .docx
University of the CumberlandsSchool of Computer & Information .docxUniversity of the CumberlandsSchool of Computer & Information .docx
University of the CumberlandsSchool of Computer & Information .docx
 
Theresa and Mike fully support creating a code of conduct for th.docx
Theresa and Mike fully support creating a code of conduct for th.docxTheresa and Mike fully support creating a code of conduct for th.docx
Theresa and Mike fully support creating a code of conduct for th.docx
 
Unit VII 1. Suppose a firm uses sugar in a product tha.docx
Unit VII         1. Suppose a firm uses sugar in a product tha.docxUnit VII         1. Suppose a firm uses sugar in a product tha.docx
Unit VII 1. Suppose a firm uses sugar in a product tha.docx
 
Title PageThis spreadsheet supports STUDENT analysis of the case .docx
Title PageThis spreadsheet supports STUDENT analysis of the case .docxTitle PageThis spreadsheet supports STUDENT analysis of the case .docx
Title PageThis spreadsheet supports STUDENT analysis of the case .docx
 
Title If a compensation system works well for one business, that .docx
Title If a compensation system works well for one business, that .docxTitle If a compensation system works well for one business, that .docx
Title If a compensation system works well for one business, that .docx
 
Review the Article Below Keller, J. G., Miller, C., LasDulce, C.docx
Review the Article Below Keller, J. G., Miller, C., LasDulce, C.docxReview the Article Below Keller, J. G., Miller, C., LasDulce, C.docx
Review the Article Below Keller, J. G., Miller, C., LasDulce, C.docx
 
Teachers reach diverse learners by scaffolding instruction in ways t.docx
Teachers reach diverse learners by scaffolding instruction in ways t.docxTeachers reach diverse learners by scaffolding instruction in ways t.docx
Teachers reach diverse learners by scaffolding instruction in ways t.docx
 
ScenarioThe HIT Innovation Steering Committee of a large.docx
ScenarioThe HIT Innovation Steering Committee of a large.docxScenarioThe HIT Innovation Steering Committee of a large.docx
ScenarioThe HIT Innovation Steering Committee of a large.docx
 
Space ... the final frontier.  So, as I am sure everyone knows, .docx
Space ... the final frontier.  So, as I am sure everyone knows, .docxSpace ... the final frontier.  So, as I am sure everyone knows, .docx
Space ... the final frontier.  So, as I am sure everyone knows, .docx
 
The Internal EnvironmentInstitutionStudent’s name.docx
The Internal EnvironmentInstitutionStudent’s name.docxThe Internal EnvironmentInstitutionStudent’s name.docx
The Internal EnvironmentInstitutionStudent’s name.docx
 
THE RESEARCH PROPOSAL BUS8100 8Chapter 2 - Literature ReviewTh.docx
THE RESEARCH PROPOSAL BUS8100 8Chapter 2 - Literature ReviewTh.docxTHE RESEARCH PROPOSAL BUS8100 8Chapter 2 - Literature ReviewTh.docx
THE RESEARCH PROPOSAL BUS8100 8Chapter 2 - Literature ReviewTh.docx
 

Recently uploaded

special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
Multithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race conditionMultithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race condition
Mohammed Sikander
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
deeptiverma2406
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
Scholarhat
 
Marketing internship report file for MBA
Marketing internship report file for MBAMarketing internship report file for MBA
Marketing internship report file for MBA
gb193092
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Dr. Vinod Kumar Kanvaria
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Akanksha trivedi rama nursing college kanpur.
 
Advantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO PerspectiveAdvantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO Perspective
Krisztián Száraz
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
DhatriParmar
 

Recently uploaded (20)

special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
Multithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race conditionMultithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race condition
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
 
Marketing internship report file for MBA
Marketing internship report file for MBAMarketing internship report file for MBA
Marketing internship report file for MBA
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
 
Advantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO PerspectiveAdvantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO Perspective
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
 

For this assignment, you will define ethics within the context o

  • 1. For this assignment, you will define ethics within the context of digital forensics. You will then apply what you learned to your life, developing an ethical code-of-conduct document. Scenario: Your manager has asked you to create a code-of-conduct document for your organization to give to employees during their new-hire orientation. In the code-of-conduct document, you are asked to focus on the sharing of personal or professional data and the ethics involved in sharing data. Tasks: Create a code-of-conduct document with the following: Define ethics. Explain what it is and how it applies to digital forensics, while also describing ethical and unethical handling of forensic information. Evaluate current or past news events related to each of the four branches of digital forensics: Computer forensics, mobile device forensics, network forensics, and database forensics. Consider topics such as identity theft, the Patriot Act, or Wikileaks. Share your thoughts on the major themes and ethical concerns and give some insight into how it impacts you personally and professionally.
  • 2. Analyze current ethical considerations and issues. Review the following articles: When IT Is Asked to Spy Lost Data Tied to CPP Claims: Ottawa Says USB Stick Has Info on Applicants for Disability Benefits Select two additional articles from this list that illustrate ethical considerations and issues. Ideally, you should not have previously used these two articles for another assignment in this class. Create a code-of-conduct document you can use in professional situations as it relates to accessing or sharing data. This can be a checklist or bulleted list of "Do and Do Not Tasks." Consider the examples and resources below when creating your code-of- conduct document: The International Society of Forensic Computer Examiners. (n.d.). Code of ethics and professional responsibility . Retrieved from http://www.isfce.com/ethics2.htm
  • 3. Barbara, J. (2008). Ethical practices in digital forensics: Part 2 . Retrieved from http://www.forensicmag.com/article/ethical - practices-digital-forensics-part-2 The American Society of Digital Forensics and eDiscovery. (n.d.). Domain 3 - Ethics and code of conduct . Retrieved from https://sites.google.com/site/asdfedorg/domain-3 Note : Your final product should be a Microsoft Word document, approximately seven to nine pages in length, incorporating five to seven scholarly sources. Write in a clear, concise, and organized manner; demonstrate ethical scholarship in the accurate representation and attribution of sources (APA); and display accurate spelling, grammar, and punctuation.