SlideShare a Scribd company logo
1 of 21
9/3/2019
1/5
Week 6 - Assignment: Create an Issues Brief for the
Board
Instructions
The outcome from your executive-level meeting with your
leadership team, the top three
issues, and strategies to address the issues have been identified.
It is now time to inform
your board of trustees of your decisions and recommendations
using the Issue Brief format.
An Issue Brief is a concise method to define the issue, list the
recommendations, and identify
how the issue impacts on the organization. Briefs may be titled
differently depending on the
intended audience (e.g., Issue Brief, Policy Brief, or Health
Brief). Wong, Green, Bazemore,
and Miller (2017) provide examples of various briefs.
The Commonwealth Fund provides Issue Briefs on the analysis
and recommendations for
current healthcare trends. The Issue Brief example provided
pertains to the impact the
Affordable Care Act has on small businesses. As you prepare to
complete your assignment,
look at the issue brief example provided by Arensmeyer and
Chase (2018) found in your
resources for this week. In addition, Sarnak, Squires, Kuzmak,
& Bishop (2017) provides
commentary on an Issue Brief on prescriptions.
References
Arensmeyer, J., & Chase, D. (2018). The affordable care act’s
impact on small business. The
Commonwealth Fund Issue Brief.
Butler, M. (2017). Money troubles: Changing reimbursement
models shake up physician and
outpatient healthcare industry. Journal of AHIMA, 88(9), 14-17.
Sarnak, D. O., Squires, D., Kuzmak, G., & Bishop, S. (2017).
Paying for prescriptions around
the world: Why is the U. S. an outlier? The Commonwealth
Fund Issue Brief.
The Commonwealth Fund. (n.d.). About this site.
Wong, S. L., Green, L. A., Bazemore, A. W., & Miller, B. F.
(2017). How to write a health policy
brief. Families, Systems, & Health, 35(1), 21–24.
https://ncuone.ncu.edu/d2l/le/content/140607/navigateContent/3
13/Previous?pId=1406522
https://ncuone.ncu.edu/d2l/le/content/140607/navigateContent/3
13/Next?pId=1406522
https://ncuone.ncu.edu/d2l/home/140607
9/3/2019
2/5
For this assignment, you will create three Issue Briefs, one for
each of your top three issues—
with the financial challenges being the number one issue. An
example of a completed Issue
Brief on Technological Advances and Social Media is shown
below. If one of your top three
issues is also technological advances, be sure to select a
different subtopic than social media.
Instructions to complete the Issue Briefs are found within the <-
> symbols. The instructions
are there to guide you and should be deleted before submission
of your assignment. You will
create the Issue Brief using tables in a Word document.
Length: Your 3 Issue Briefs, one each for the top three issues
will be a minimum of 2 pages
each in length.
Resource: A minimum of 2 scholarly references for each Issue
Brief are required for this
assignment.
Upload your document and click the Submit to Dropbox button.
Table 6. Issue Brief Example
<Hospital Fictitious Name>
ISSUE BRIEF #1—Technological Advances
Prepared by <insert your name & title here>
Date <insert date submitted here>
Introduction
<Provide a brief
introduction of what
led to the selection of
this issue.>
Ex.: Under the auspices of our Chief Information
Officer, a number of issues and trends were identified
by our research staff and were presented to our senior
leadership team to review, prioritize, and select the
top three issues to become part of our strategic plan.
Issue
<State the issue and
briefly state why this
issue is important to
your organization and
Ex.: Technological advances—Social media platforms
offer patients a venue to publicize their level of
satisfaction with our hospital.
9/3/2019
3/5
y g
the relevance of the
issue to your
intended audience.>
Recommendation
<State the action you
seek relating to the
above-stated issue.
The recommendation
may indicate the
continuation,
elimination, or
amending of the
issue.>
Ex.: Closely monitor the hospital’s social media
platforms (e.g., Facebook, Twitter) to assess the
number and quality of responses to hospital services.
To accomplish this recommendation, we will recruit
and hire a social media expert to join our public
relations department.
Background
<Provide supporting
information relevant
to the issue and
recommendation:
List the actions
you employ or
activities in
which you
engage in that
demonstrate
the importance
of that issue to
you;
List the current
evidence-base
that supports
your actions or
activities or
suggests that
these actions or
Ex.: Increasing numbers of patients use social
media to seek information regarding the quality
of care delivered at any given hospital. The use
of Healthgrades, an online resource, provides
comprehensive information about physicians,
hospitals and healthcare providers and enables
prospective patients to compare and select a
physician or hospital based on the “grade” found
on the website.
9/3/2019
4/5
Submissions
No submissions yet. Drag and drop to upload your assignment
below.
activities lead
to a given
outcome.>
References/Resources
<List the
appropriate
citations for the
evidence you
provide within
the issue brief-
a minimum 3
required.>
Ex.: Vogenberg, R., & Santilli, J. (2018).
Healthcare trends for 2018. American Health &
Drug Benefits, 11(1), 48-54.
http://proxy1.ncu.edu/login?
url=https://search.ebscohost.com/login.aspx?
direct=true&db=ccm&AN=128026730&site=eds-
live
Contact Information
<List the individuals
the recipient of the
Issue Brief may
contact for more
information about the
issue.>
Ex.: Mr. John Doe, Chief Information Officer, Lead
Contact, 555.555.5555 mobile.
Project #2- Investigative Collection of Evidence
CCJS 321 Digital Forensics in the Criminal Justice System
Project #2 - Investigative Collection of Evidence
UMUC
By: Shreeji Patel
September 17, 2019
1. Summary of the incident
Mr. Newman, the Human Resources Director, made
notifications that the company's executive team had earlier on
dismissed Mr. John Belcamp from employment as the company's
engineer in New Product's Division due to constant lateness and
absenteeism. Mr. Newman reported that the former engineer had
made questionable statements about a highly profitable long
term project that the company is currently working on. He
feared that Mr. John Belcamp might have carried the company’s
intellectual property with him for use in his new employment in
the company rival’s premises. Mr. Newman feared that Mr. John
Belcamp might have carried the product’s source code. He gave
me a copy of the source code to aid my investigations as the
company’s Information Security Analyst.
As the Information Security Analyst, the US legal
authority as stated in the Fourth Amendment of the Constitution
to search and seize any document that would prove to have been
used for digital crime since there is a probable cause of
occurrence of crime and the place of search is well defined and
described. Chang (2018). By the power of the above legal
authority, I can search Mr. Belcamp’s office space and desk for
any allegedly suspicious electronic and paperwork material
which contains the product's source code content or such
relatable content.
Part II: Physical Evidence Acquisition
2. According to Mr. Belcamp’s office workspace as indicated
on the photo, the items that would most likely hold digital
evidence include a digital hard drive, a USB drive, a small
silver voice recorder, and a Dell model laptop.
The digital hard drive has an irregular rectangular shape, is
silver and black and has a green label. The hard drive, from the
manufacturer's information, can hold up to 1 TB of information,
is easily portable and has extra storage for large files, videos,
and photos. The drive might have stored information about the
company's new product and search code which makes it very
useful in the investigation and as digital evidence during
prosecution.
The USB flash has both metallic and plastic components,
has black and grey colors on both ends and has a minute hole on
one side. The accused might have used it to store data
transferred from computers and laptops in the form of document
files, videos, and photos which might be necessary during the
investigation. It would also provide digital and physical
evidence during prosecution. The voice recorder is small and
silver, it might contain audio recordings of the suspect's
conversations with other parties or recordings of his voice as
well. It would provide digital and physical evidence during
prosecution.
Finally, the laptop is a Dell model, black and about thirty
centimeters in length. It might have store audio, video, word
documents, and powerpoint presentations of the new product's
processing. It would provide digital and physical evidence and
additional information which might not be present in the hard
drive and the USB flash drive.
Steps to the careful handling of items to avoid contamination of
evidence
For the Western Digital Hard drive, digital photos should
be taken before it is picked from its original place. The
evidence custodian should then pick it in latex or chloroprene
gloved hand using a pair of tongs and place it in an airtight
antistatic bag that has a zip. Goodison, Davis, & Jackson
(2015). The bag should then be correctly labeled and put in the
evidence container. The handling measures would prevent
contamination of the already present fingerprints.
The laptop should be handled similarly. The evidence
custodian in chloroprene gloved hands should disconnect it from
any external power source, close it, and put it in a sizeable
antistatic container, label it correctly and carefully place it in
the evidence container. It should also be recorded in the
evidence book.
3.Items of non-digital evidence
The square, yellow sticky notes stuck on the desktop
computer and the shelf might contain handwritten reminders of
meetings or events related to the company's new product and
search code that the suspect might have recorded. They would
provide real evidence during prosecution. The papers placed on
the shelf might be typed, or handwritten documents containing
information, sketches, and frameworks of the company's new
product and search code written by the suspect. They would be
used as real evidence during prosecution as well.
There is also a notebook on the office work table. It is white
and has a blue logo on the left-hand side of the page. As is the
case with the other paper works, this too might contain written
notes about the new product and the search code which can be
used as real evidence during prosecution. Finally, there is a
white stapler with a stainless steel ream on the desk. It might
contain forensic evidence such as fingerprints which can be
used as supplementary evidence to back up the allegations
against the suspect.
Steps of collecting the items to mitigate the loss of evidence
First, the evidence custodian should take photographs of the
sticky notes and the paper documents on the shelves before
handling them physically. Second, they should pick the
documents in latex-gloved hands and put them in security bags
that have a zipper, each item in its bag, for forensic search and
descriptions. Third, the items should be put in evidence
containers ready for transport to the forensic science
laboratories. Lillis, Becker, O'Sullivan & Scanlon (2016).
4. Security procedures and environmental considerations for the
storage of evidence
(i) The evidence both digital and non-digital should be stored
in paper, envelope and antistatic containers, in case of the
laptop, and not plastic containers. Plastic produces static
electricity and allows humidity and condensation thus
interfering with the evidence. The digital evidence should be
stored in an area that has no extreme temperature, pressure, and
humidity. Li, Bajramovic, Gao, & Parekh (2016).
(ii) The digital evidence should be stored away from
magnetic fields caused by speakers, for example, vibrations and
moisture to mitigate alteration of evidence.
(iii)The digital evidence should be packaged in a way
that will prevent deformation. The packaging and storage
container can be a thick-walled antistatic container for safety.
(iv) For security purposes, all the evidence should be
labeled; the time of collection, the location, and its name. Each
item should then be recorded in a book for future reference and
to the checklist if all items are available.
(v) All the evidence should be recorded in the inventory
according to the agency’s policies and a chain of custody
maintained for any item removed from the storage area.
Prayudi, & Sn (2015).
5. Brian Duggers, made a commendable trial in describing the
digital materials collected for evidence in the evidence
document. His description incorporates most of the items’
specific features. The voice recorder, however, is scantly
described. He should have included its measurement
approximations to expound on how “small” it is. It also has
black coloring on the front part. Brian did not include the black
colour in his statement, which might cause ambiguity in case a
similar voice recorder is found elsewhere in the room. He
should also have included the initial location of the item
identified to avoid confusion in case a similar item is found.
References
Chang, C. H. (2018). New Development Regarding Search
Warrants under the Fourth Amendment of the US Constitution--
Jones, Jardines & Grady. EurAmerica, 48(2), 267-333.
Goodison, S. E., Davis, R. C., & Jackson, B. A. (2015). Digital
evidence and the US Criminal Justice System. Identifying
technology and other needs to more effectively acquire and
utilize digital evidence.
Lillis, D., Becker, B., O'Sullivan, T., & Scanlon, M. (2016).
Current challenges and future research areas for digital forensic
investigation. arXiv preprint arXiv:1604.03850.
Li, J., Bajramovic, E., Gao, Y., & Parekh, M. (2016). Graded
security forensics readiness of SCADA systems. Informatik
2016.
Prayudi, Y., & Sn, A. (2015). Digital chain of custody: State of
the art. International Journal of Computer Applications, 114(5).
ITEM 1
ITEM 2
ITEM 3
EVIDENCE / PROPERTY CUSTODY DOCUMENT
The proponent agency for this document is OHMR-PM
CONTROL NUMBER
REPORT CROSS-REFERENCE NUMBER
RECEIVING AGENCY
Makestuff IT Security
LOCATION
Makestuff Remote Office #4
NAME, GRADE AND TITLE OF PERSON FROM WHOM
RECEIVED OWNER Former work area of Mr. YOURPROP
OTHER
ADDRESS (Includes ZIP Code)
Bldg# 47, Martin Blvd, Faketown, NJ 12345
LOCATION FROM WHERE OBTAINED
Desk near west wall of office
REASON OBTAINED
Evaluation as evidence
TIME / DATE OBTAINED
1430, 04/01/2014
ITEM NO.
QUANTITY
DESCRIPTION OF ARTICLES
(Include model, serial number, conditions, and any unusual
marks or scratches)
1
2
3
---------
1
1
1
--------------
Voice recorder, small, silver, Olympus.
Western Digital, 1TB, silver and black with a green label,
roughly rectangular, affixed with a torn sticker on the front.
Thumb drive, USB, PNY-brand, 64GB in size, unknown serial
number, grey and black in color, approximately 1” x 2.5” x
0.5”, metal and plastic-type construction, printed with “PNY…
64GB”, with small hole on the side (which appears to be for a
lanyard.
--------------------------///LAST ITEM///-----------------------------
----------------------------------
CHAIN OF CUSTODY
ITEM NO.
DATE
RELEASED BY
RECEIVED BY
PURPOSE OF CHANGE OF CUSTODY
1-3
04/01/2014
SIGNATURE
CRIME SCENE
SIGNATURE
///original signed///
Evaluation as evidence
NAME, GRADE, TITLE
N/A
NAME. GRADE, TITLE
I.M. Helpful, Security Specialist
SIGNATURE
SIGNATURE
NAME, GRADE, TITLE
NAME. GRADE, TITLE
SIGNATURE
SIGNATURE
NAME, GRADE, TITLE
NAME. GRADE, TITLE
SIGNATURE
SIGNATURE
NAME, GRADE, TITLE
NAME. GRADE, TITLE
NAME, GRADE, TITLE
NAME. GRADE, TITLE
SIGNATURE
SIGNATURE
OHMR FORM 4137 front (Jul 91)
Project 1 Understanding Investigative Parameters
CCJS 321 Digital Forensics in the Criminal Justice System
Project #1- Understanding Investigative Parameters
UMUC
By: Shreeji Patel
September 3, 2019.
1. There are few benefits of a forensic readiness plan. The first
benefit is planning for the possible requirement for digital
proof. The second benefit is reducing the price of inspections.
The third benefit is stopping the chance for hateful insiders to
protect their paths. The fourth benefit is the decreasing amount
of supervisory or lawful needs for release of information. There
are two requirements to establish forensic readiness. The first
requirement is to classify possible proof sources and also the
kinds of evidence. The second requirement is to form ability for
safe proof collecting and assortment in an exceedingly
forensically sound way (Sule, 2014).
2. Yes, we can search Mr. Belcamp’s assigned locker in the
Company’s on-site gym for digital evidence because an
employer has right to search lockers or desk to see what they
have, but they also have to get the employee’s consent
(Johnson, n.d). Yes, we can use the master key to search Mr.
Belcamp’s desk, but only when it is necessary and only if Mr.
Belcamp had hidden some sort of threat in the desk (“Should
Employers Have Master Keys to Employees' Desk Drawers?”,
2019).
3. Yes, the security staff has the right to open Mr. Belcamp’s
briefcase and seize any potential digital evidence. The first
reason why the security staff has right to open Mr. Belcamp’s
briefcase is that to check whether Mr. Belcamp got any illegal
things in his briefcase and if Mr. Belcamp got illegal things in
his briefcase than security staff has right to seize the illegal
things. The second reason why the security staff has right to
open Mr. Belcamp’s briefcase is that to check if Mr. Belcamp
has stolen anything from the company and if Belcamp has stolen
anything from the company than the things that are stolen can
be seized (Johnson, n.d).
4. It does matter that Mr. Belcamp has never signed the receipt
page. It does matter because when the employees are asked to
sign the receipt page of the handbook, it tells the manager of the
company that the employees have read and comprehended the
handbook (Miller, 2014). The second reason why it matters
because the handbook shows evidence and rules that need to be
followed, so it is important for every employee that they sign
the receipt page of the handbook (Miller, 2014). So, it is
important that Mr. Belcamp signs the receipt page of the
handbook.
5. Search and seizure are when police examine a person’s home,
car, or job to search for proof that felony has been committed.
And If the police found the proof than they have to seize it.
Also, the police can arrest the person who created the crime
(“Search and Seizure”, n.d).
6. Chain of custody is a written record documenting once, how,
and by whom single things of real or electronic proof (Longley,
2019). Chain of custody is important as a result of if the proof
has been modified or it can not be demonstrated that it has been
not modified throughout the time between assortment and use in
court, then that proof is a smaller amount plausible or reliable
than it otherwise would be (Chen, 2016). If chain of custody is
not documented, then the important proof can be considered
lawfully useless (“The Importance of Chain of Custody for
Legal Proceedings”, 2017).
References
Chen, A. (2016, November 20). What is chain of custody? Why
is it important? Retrieved from
https://www.quora.com/What-is-chain-of-custody-Why-is-it-
important
Johnson, S. C. (n.d.). Does an employer have a right to search
an employee's locker or desk? Retrieved from
https://www.xperthr.com/faq/does-an-employer-have-a-right-to-
search-an-employees-locker-or-desk/6902/
Johnson, S. C. (n.d.). Does an employer have the right to search
an employee's purse or bag? Retrieved from
https://www.xperthr.com/faq/does-an-employer-have-the-right-
to- search-an-employees-purse-or-bag/6903/
Longley, R. (2019, March 13). What Is Chain of Custody?
Definition and Examples. Retrieved from
https://www.thoughtco.com/chain-of-custody-4589132
Miller, B. (2014, June 17). Employee Handbooks: The
Importance of Signed Acknowledgements. Retrieved from
https://hrdailyadvisor.blr.com/2014/06/17/employee-handbooks-
the- importance-of-signed-acknowledgements/
Sule, D. (2014). Importance of Forensic Readiness. Retrieved
from
https://www.isaca.org/Journal/archives/2014/Volume-
1/Pages/JOnline-Importance-of- Forensic-Readiness.aspx
(2019, June 13). Should Employers Have Master Keys to
Employees' Desk Drawers? - Fortress Safe and Lock -
Springdale. Retrieved from
https://nearsay.com/c/668424/24159/should-employers-
have-master-keys-to- employees-desk-drawers
(n.d.). Search and Seizure. Retrieved from
http://www.searchandseizure.org/
(2017, November 14). The Importance of Chain of Custody
for Legal Proceedings. Retrieved from
https://www.superiorbag.com/evidence-bags/importance-chain-
custody-legal-proceedings/
93201915Week 6 - Assignment Create an Issues Brief.docx

More Related Content

Similar to 93201915Week 6 - Assignment Create an Issues Brief.docx

The project will focus on identification and analysis of secondary d.docx
The project will focus on identification and analysis of secondary d.docxThe project will focus on identification and analysis of secondary d.docx
The project will focus on identification and analysis of secondary d.docx
oscars29
 
Ethical dilemma Identity TheftStakeholdersConfidentiality.docx
Ethical dilemma  Identity TheftStakeholdersConfidentiality.docxEthical dilemma  Identity TheftStakeholdersConfidentiality.docx
Ethical dilemma Identity TheftStakeholdersConfidentiality.docx
humphrieskalyn
 
Technological AdvancesThroughout history there have been grea.docx
Technological AdvancesThroughout history there have been grea.docxTechnological AdvancesThroughout history there have been grea.docx
Technological AdvancesThroughout history there have been grea.docx
jacqueliner9
 
Assignment 5 Senior Seminar Project Due Week 10 and worth 200 poi.docx
Assignment 5 Senior Seminar Project Due Week 10 and worth 200 poi.docxAssignment 5 Senior Seminar Project Due Week 10 and worth 200 poi.docx
Assignment 5 Senior Seminar Project Due Week 10 and worth 200 poi.docx
MatthewTennant613
 
ResourceDeveloping Effective Social Media PoliciesSolar Co. Inc.docx
ResourceDeveloping Effective Social Media PoliciesSolar Co. Inc.docxResourceDeveloping Effective Social Media PoliciesSolar Co. Inc.docx
ResourceDeveloping Effective Social Media PoliciesSolar Co. Inc.docx
sjennifer395
 
InstructionsPaper A Application of a decision making framework
InstructionsPaper A Application of a decision making framework InstructionsPaper A Application of a decision making framework
InstructionsPaper A Application of a decision making framework
lauricesatu
 
Application of a decision making framework to an IT-related ethical
Application of a decision making framework to an IT-related ethical Application of a decision making framework to an IT-related ethical
Application of a decision making framework to an IT-related ethical
mallisonshavon
 
First paragraph will Executive summary about our company 100 w.docx
First  paragraph will  Executive summary about our company 100 w.docxFirst  paragraph will  Executive summary about our company 100 w.docx
First paragraph will Executive summary about our company 100 w.docx
ernestc3
 
Step 1 Consider the Purpose for the ResearchYou have been given.docx
Step 1 Consider the Purpose for the ResearchYou have been given.docxStep 1 Consider the Purpose for the ResearchYou have been given.docx
Step 1 Consider the Purpose for the ResearchYou have been given.docx
whitneyleman54422
 
Paper A Application of a decision making framework to an IT-related.docx
Paper A Application of a decision making framework to an IT-related.docxPaper A Application of a decision making framework to an IT-related.docx
Paper A Application of a decision making framework to an IT-related.docx
honey690131
 
Paper A Application of a decision making framework to an IT-rel.docx
Paper A Application of a decision making framework to an IT-rel.docxPaper A Application of a decision making framework to an IT-rel.docx
Paper A Application of a decision making framework to an IT-rel.docx
honey690131
 
Paper A Application of a decision making framework to an IT-rel.docx
Paper A Application of a decision making framework to an IT-rel.docxPaper A Application of a decision making framework to an IT-rel.docx
Paper A Application of a decision making framework to an IT-rel.docx
smile790243
 
2 .docx
2                                                              .docx2                                                              .docx
2 .docx
RAJU852744
 
Unit VIII PowerPoint Presentation Review the processes of invent.docx
Unit VIII PowerPoint Presentation Review the processes of invent.docxUnit VIII PowerPoint Presentation Review the processes of invent.docx
Unit VIII PowerPoint Presentation Review the processes of invent.docx
marilucorr
 
This assignment is an opportunity to explore and apply a decisio.docx
This assignment is an opportunity to explore and apply a decisio.docxThis assignment is an opportunity to explore and apply a decisio.docx
This assignment is an opportunity to explore and apply a decisio.docx
rhetttrevannion
 

Similar to 93201915Week 6 - Assignment Create an Issues Brief.docx (18)

The project will focus on identification and analysis of secondary d.docx
The project will focus on identification and analysis of secondary d.docxThe project will focus on identification and analysis of secondary d.docx
The project will focus on identification and analysis of secondary d.docx
 
Ethical dilemma Identity TheftStakeholdersConfidentiality.docx
Ethical dilemma  Identity TheftStakeholdersConfidentiality.docxEthical dilemma  Identity TheftStakeholdersConfidentiality.docx
Ethical dilemma Identity TheftStakeholdersConfidentiality.docx
 
Technological AdvancesThroughout history there have been grea.docx
Technological AdvancesThroughout history there have been grea.docxTechnological AdvancesThroughout history there have been grea.docx
Technological AdvancesThroughout history there have been grea.docx
 
Assignment 5 Senior Seminar Project Due Week 10 and worth 200 poi.docx
Assignment 5 Senior Seminar Project Due Week 10 and worth 200 poi.docxAssignment 5 Senior Seminar Project Due Week 10 and worth 200 poi.docx
Assignment 5 Senior Seminar Project Due Week 10 and worth 200 poi.docx
 
ResourceDeveloping Effective Social Media PoliciesSolar Co. Inc.docx
ResourceDeveloping Effective Social Media PoliciesSolar Co. Inc.docxResourceDeveloping Effective Social Media PoliciesSolar Co. Inc.docx
ResourceDeveloping Effective Social Media PoliciesSolar Co. Inc.docx
 
InstructionsPaper A Application of a decision making framework
InstructionsPaper A Application of a decision making framework InstructionsPaper A Application of a decision making framework
InstructionsPaper A Application of a decision making framework
 
Application of a decision making framework to an IT-related ethical
Application of a decision making framework to an IT-related ethical Application of a decision making framework to an IT-related ethical
Application of a decision making framework to an IT-related ethical
 
First paragraph will Executive summary about our company 100 w.docx
First  paragraph will  Executive summary about our company 100 w.docxFirst  paragraph will  Executive summary about our company 100 w.docx
First paragraph will Executive summary about our company 100 w.docx
 
Step 1 Consider the Purpose for the ResearchYou have been given.docx
Step 1 Consider the Purpose for the ResearchYou have been given.docxStep 1 Consider the Purpose for the ResearchYou have been given.docx
Step 1 Consider the Purpose for the ResearchYou have been given.docx
 
Paper A Application of a decision making framework to an IT-related.docx
Paper A Application of a decision making framework to an IT-related.docxPaper A Application of a decision making framework to an IT-related.docx
Paper A Application of a decision making framework to an IT-related.docx
 
Paper A Application of a decision making framework to an IT-rel.docx
Paper A Application of a decision making framework to an IT-rel.docxPaper A Application of a decision making framework to an IT-rel.docx
Paper A Application of a decision making framework to an IT-rel.docx
 
Paper A Application of a decision making framework to an IT-rel.docx
Paper A Application of a decision making framework to an IT-rel.docxPaper A Application of a decision making framework to an IT-rel.docx
Paper A Application of a decision making framework to an IT-rel.docx
 
Sample Title Page For Thesis Proposal - How To
Sample Title Page For Thesis Proposal - How ToSample Title Page For Thesis Proposal - How To
Sample Title Page For Thesis Proposal - How To
 
2 .docx
2                                                              .docx2                                                              .docx
2 .docx
 
Unit VIII PowerPoint Presentation Review the processes of invent.docx
Unit VIII PowerPoint Presentation Review the processes of invent.docxUnit VIII PowerPoint Presentation Review the processes of invent.docx
Unit VIII PowerPoint Presentation Review the processes of invent.docx
 
Discussion 1. How do you describe the importance of data in ana.docx
Discussion 1. How do you describe the importance of data in ana.docxDiscussion 1. How do you describe the importance of data in ana.docx
Discussion 1. How do you describe the importance of data in ana.docx
 
G12-SLM11-EAPP-Final.pdf
G12-SLM11-EAPP-Final.pdfG12-SLM11-EAPP-Final.pdf
G12-SLM11-EAPP-Final.pdf
 
This assignment is an opportunity to explore and apply a decisio.docx
This assignment is an opportunity to explore and apply a decisio.docxThis assignment is an opportunity to explore and apply a decisio.docx
This assignment is an opportunity to explore and apply a decisio.docx
 

More from blondellchancy

1. Report contentThe report should demonstrate your understa.docx
1. Report contentThe report should demonstrate your understa.docx1. Report contentThe report should demonstrate your understa.docx
1. Report contentThe report should demonstrate your understa.docx
blondellchancy
 
1. Read the RiskReport to see what requirements are.2. Read the .docx
1. Read the RiskReport to see what requirements are.2. Read the .docx1. Read the RiskReport to see what requirements are.2. Read the .docx
1. Read the RiskReport to see what requirements are.2. Read the .docx
blondellchancy
 
1. Prof. Lennart Van der Zeil’s theorem says that any programmin.docx
1. Prof. Lennart Van der Zeil’s theorem says that any programmin.docx1. Prof. Lennart Van der Zeil’s theorem says that any programmin.docx
1. Prof. Lennart Van der Zeil’s theorem says that any programmin.docx
blondellchancy
 
1. Review the results of your assessment using the explanation.docx
1. Review the results of your assessment using the explanation.docx1. Review the results of your assessment using the explanation.docx
1. Review the results of your assessment using the explanation.docx
blondellchancy
 
1. Prepare a comparative table in which you contrast the charact.docx
1. Prepare a comparative table in which you contrast the charact.docx1. Prepare a comparative table in which you contrast the charact.docx
1. Prepare a comparative table in which you contrast the charact.docx
blondellchancy
 
1. Open the attached Excel Assignment.xlsx” file and name it LastN.docx
1. Open the attached Excel Assignment.xlsx” file and name it LastN.docx1. Open the attached Excel Assignment.xlsx” file and name it LastN.docx
1. Open the attached Excel Assignment.xlsx” file and name it LastN.docx
blondellchancy
 

More from blondellchancy (20)

1. Report contentThe report should demonstrate your understa.docx
1. Report contentThe report should demonstrate your understa.docx1. Report contentThe report should demonstrate your understa.docx
1. Report contentThe report should demonstrate your understa.docx
 
1. Research the assessment process for ELL students in your state. W.docx
1. Research the assessment process for ELL students in your state. W.docx1. Research the assessment process for ELL students in your state. W.docx
1. Research the assessment process for ELL students in your state. W.docx
 
1. Reply:2.Reply:.docx
1. Reply:2.Reply:.docx1. Reply:2.Reply:.docx
1. Reply:2.Reply:.docx
 
1. Review the three articles about Inflation that are of any choice..docx
1. Review the three articles about Inflation that are of any choice..docx1. Review the three articles about Inflation that are of any choice..docx
1. Review the three articles about Inflation that are of any choice..docx
 
1. Read the RiskReport to see what requirements are.2. Read the .docx
1. Read the RiskReport to see what requirements are.2. Read the .docx1. Read the RiskReport to see what requirements are.2. Read the .docx
1. Read the RiskReport to see what requirements are.2. Read the .docx
 
1. Quantitative According to the scoring criteria for the BAI, .docx
1. Quantitative According to the scoring criteria for the BAI, .docx1. Quantitative According to the scoring criteria for the BAI, .docx
1. Quantitative According to the scoring criteria for the BAI, .docx
 
1. Prof. Lennart Van der Zeil’s theorem says that any programmin.docx
1. Prof. Lennart Van der Zeil’s theorem says that any programmin.docx1. Prof. Lennart Van der Zeil’s theorem says that any programmin.docx
1. Prof. Lennart Van der Zeil’s theorem says that any programmin.docx
 
1. Review the results of your assessment using the explanation.docx
1. Review the results of your assessment using the explanation.docx1. Review the results of your assessment using the explanation.docx
1. Review the results of your assessment using the explanation.docx
 
1. Search the internet and learn about the cases of nurses Julie.docx
1. Search the internet and learn about the cases of nurses Julie.docx1. Search the internet and learn about the cases of nurses Julie.docx
1. Search the internet and learn about the cases of nurses Julie.docx
 
1. Qualitative or quantitative paperresearch required(Use stati.docx
1. Qualitative or quantitative paperresearch required(Use stati.docx1. Qualitative or quantitative paperresearch required(Use stati.docx
1. Qualitative or quantitative paperresearch required(Use stati.docx
 
1. Prepare a one page paper on associative analysis. You may researc.docx
1. Prepare a one page paper on associative analysis. You may researc.docx1. Prepare a one page paper on associative analysis. You may researc.docx
1. Prepare a one page paper on associative analysis. You may researc.docx
 
1. Prepare a comparative table in which you contrast the charact.docx
1. Prepare a comparative table in which you contrast the charact.docx1. Prepare a comparative table in which you contrast the charact.docx
1. Prepare a comparative table in which you contrast the charact.docx
 
1. Portfolio part II a) APRN protocol also known as collab.docx
1. Portfolio part II a) APRN protocol also known as collab.docx1. Portfolio part II a) APRN protocol also known as collab.docx
1. Portfolio part II a) APRN protocol also known as collab.docx
 
1. Post the link to one news article, preferably a piece of rece.docx
1. Post the link to one news article, preferably a piece of rece.docx1. Post the link to one news article, preferably a piece of rece.docx
1. Post the link to one news article, preferably a piece of rece.docx
 
1. Please explain fixed and flexible budgeting. Provide an examp.docx
1. Please explain fixed and flexible budgeting. Provide an examp.docx1. Please explain fixed and flexible budgeting. Provide an examp.docx
1. Please explain fixed and flexible budgeting. Provide an examp.docx
 
1. Open and print the Week 6 Assignment.2. The assignment .docx
1. Open and print the Week 6 Assignment.2. The assignment .docx1. Open and print the Week 6 Assignment.2. The assignment .docx
1. Open and print the Week 6 Assignment.2. The assignment .docx
 
1. Plato’s Republic takes as its point of departure the question of .docx
1. Plato’s Republic takes as its point of departure the question of .docx1. Plato’s Republic takes as its point of departure the question of .docx
1. Plato’s Republic takes as its point of departure the question of .docx
 
1. Objective Learn why and how to develop a plan that encompasses a.docx
1. Objective Learn why and how to develop a plan that encompasses a.docx1. Objective Learn why and how to develop a plan that encompasses a.docx
1. Objective Learn why and how to develop a plan that encompasses a.docx
 
1. Open the attached Excel Assignment.xlsx” file and name it LastN.docx
1. Open the attached Excel Assignment.xlsx” file and name it LastN.docx1. Open the attached Excel Assignment.xlsx” file and name it LastN.docx
1. Open the attached Excel Assignment.xlsx” file and name it LastN.docx
 
1. must be a research article from either pubmed or google scholar..docx
1. must be a research article from either pubmed or google scholar..docx1. must be a research article from either pubmed or google scholar..docx
1. must be a research article from either pubmed or google scholar..docx
 

Recently uploaded

The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 

Recently uploaded (20)

Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdfFICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
 
AIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptAIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.ppt
 
Philosophy of china and it's charactistics
Philosophy of china and it's charactisticsPhilosophy of china and it's charactistics
Philosophy of china and it's charactistics
 
Tatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsTatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf arts
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 

93201915Week 6 - Assignment Create an Issues Brief.docx

  • 1. 9/3/2019 1/5 Week 6 - Assignment: Create an Issues Brief for the Board Instructions The outcome from your executive-level meeting with your leadership team, the top three issues, and strategies to address the issues have been identified. It is now time to inform your board of trustees of your decisions and recommendations using the Issue Brief format. An Issue Brief is a concise method to define the issue, list the recommendations, and identify how the issue impacts on the organization. Briefs may be titled differently depending on the intended audience (e.g., Issue Brief, Policy Brief, or Health Brief). Wong, Green, Bazemore, and Miller (2017) provide examples of various briefs. The Commonwealth Fund provides Issue Briefs on the analysis and recommendations for
  • 2. current healthcare trends. The Issue Brief example provided pertains to the impact the Affordable Care Act has on small businesses. As you prepare to complete your assignment, look at the issue brief example provided by Arensmeyer and Chase (2018) found in your resources for this week. In addition, Sarnak, Squires, Kuzmak, & Bishop (2017) provides commentary on an Issue Brief on prescriptions. References Arensmeyer, J., & Chase, D. (2018). The affordable care act’s impact on small business. The Commonwealth Fund Issue Brief. Butler, M. (2017). Money troubles: Changing reimbursement models shake up physician and outpatient healthcare industry. Journal of AHIMA, 88(9), 14-17. Sarnak, D. O., Squires, D., Kuzmak, G., & Bishop, S. (2017). Paying for prescriptions around the world: Why is the U. S. an outlier? The Commonwealth Fund Issue Brief. The Commonwealth Fund. (n.d.). About this site. Wong, S. L., Green, L. A., Bazemore, A. W., & Miller, B. F. (2017). How to write a health policy
  • 3. brief. Families, Systems, & Health, 35(1), 21–24. https://ncuone.ncu.edu/d2l/le/content/140607/navigateContent/3 13/Previous?pId=1406522 https://ncuone.ncu.edu/d2l/le/content/140607/navigateContent/3 13/Next?pId=1406522 https://ncuone.ncu.edu/d2l/home/140607 9/3/2019 2/5 For this assignment, you will create three Issue Briefs, one for each of your top three issues— with the financial challenges being the number one issue. An example of a completed Issue Brief on Technological Advances and Social Media is shown below. If one of your top three issues is also technological advances, be sure to select a different subtopic than social media. Instructions to complete the Issue Briefs are found within the <- > symbols. The instructions are there to guide you and should be deleted before submission of your assignment. You will create the Issue Brief using tables in a Word document. Length: Your 3 Issue Briefs, one each for the top three issues will be a minimum of 2 pages
  • 4. each in length. Resource: A minimum of 2 scholarly references for each Issue Brief are required for this assignment. Upload your document and click the Submit to Dropbox button. Table 6. Issue Brief Example <Hospital Fictitious Name> ISSUE BRIEF #1—Technological Advances Prepared by <insert your name & title here> Date <insert date submitted here> Introduction <Provide a brief introduction of what led to the selection of this issue.> Ex.: Under the auspices of our Chief Information Officer, a number of issues and trends were identified by our research staff and were presented to our senior leadership team to review, prioritize, and select the top three issues to become part of our strategic plan. Issue <State the issue and briefly state why this
  • 5. issue is important to your organization and Ex.: Technological advances—Social media platforms offer patients a venue to publicize their level of satisfaction with our hospital. 9/3/2019 3/5 y g the relevance of the issue to your intended audience.> Recommendation <State the action you seek relating to the above-stated issue. The recommendation may indicate the continuation, elimination, or amending of the issue.> Ex.: Closely monitor the hospital’s social media platforms (e.g., Facebook, Twitter) to assess the number and quality of responses to hospital services. To accomplish this recommendation, we will recruit and hire a social media expert to join our public relations department.
  • 6. Background <Provide supporting information relevant to the issue and recommendation: List the actions you employ or activities in which you engage in that demonstrate the importance of that issue to you; List the current evidence-base that supports your actions or activities or suggests that these actions or Ex.: Increasing numbers of patients use social media to seek information regarding the quality of care delivered at any given hospital. The use of Healthgrades, an online resource, provides comprehensive information about physicians, hospitals and healthcare providers and enables prospective patients to compare and select a physician or hospital based on the “grade” found on the website.
  • 7. 9/3/2019 4/5 Submissions No submissions yet. Drag and drop to upload your assignment below. activities lead to a given outcome.> References/Resources <List the appropriate citations for the evidence you provide within the issue brief- a minimum 3 required.> Ex.: Vogenberg, R., & Santilli, J. (2018). Healthcare trends for 2018. American Health & Drug Benefits, 11(1), 48-54. http://proxy1.ncu.edu/login? url=https://search.ebscohost.com/login.aspx? direct=true&db=ccm&AN=128026730&site=eds- live Contact Information
  • 8. <List the individuals the recipient of the Issue Brief may contact for more information about the issue.> Ex.: Mr. John Doe, Chief Information Officer, Lead Contact, 555.555.5555 mobile. Project #2- Investigative Collection of Evidence CCJS 321 Digital Forensics in the Criminal Justice System Project #2 - Investigative Collection of Evidence UMUC By: Shreeji Patel September 17, 2019 1. Summary of the incident
  • 9. Mr. Newman, the Human Resources Director, made notifications that the company's executive team had earlier on dismissed Mr. John Belcamp from employment as the company's engineer in New Product's Division due to constant lateness and absenteeism. Mr. Newman reported that the former engineer had made questionable statements about a highly profitable long term project that the company is currently working on. He feared that Mr. John Belcamp might have carried the company’s intellectual property with him for use in his new employment in the company rival’s premises. Mr. Newman feared that Mr. John Belcamp might have carried the product’s source code. He gave me a copy of the source code to aid my investigations as the company’s Information Security Analyst. As the Information Security Analyst, the US legal authority as stated in the Fourth Amendment of the Constitution to search and seize any document that would prove to have been used for digital crime since there is a probable cause of occurrence of crime and the place of search is well defined and described. Chang (2018). By the power of the above legal authority, I can search Mr. Belcamp’s office space and desk for any allegedly suspicious electronic and paperwork material which contains the product's source code content or such relatable content. Part II: Physical Evidence Acquisition 2. According to Mr. Belcamp’s office workspace as indicated on the photo, the items that would most likely hold digital evidence include a digital hard drive, a USB drive, a small silver voice recorder, and a Dell model laptop. The digital hard drive has an irregular rectangular shape, is silver and black and has a green label. The hard drive, from the manufacturer's information, can hold up to 1 TB of information, is easily portable and has extra storage for large files, videos, and photos. The drive might have stored information about the company's new product and search code which makes it very useful in the investigation and as digital evidence during prosecution.
  • 10. The USB flash has both metallic and plastic components, has black and grey colors on both ends and has a minute hole on one side. The accused might have used it to store data transferred from computers and laptops in the form of document files, videos, and photos which might be necessary during the investigation. It would also provide digital and physical evidence during prosecution. The voice recorder is small and silver, it might contain audio recordings of the suspect's conversations with other parties or recordings of his voice as well. It would provide digital and physical evidence during prosecution. Finally, the laptop is a Dell model, black and about thirty centimeters in length. It might have store audio, video, word documents, and powerpoint presentations of the new product's processing. It would provide digital and physical evidence and additional information which might not be present in the hard drive and the USB flash drive. Steps to the careful handling of items to avoid contamination of evidence For the Western Digital Hard drive, digital photos should be taken before it is picked from its original place. The evidence custodian should then pick it in latex or chloroprene gloved hand using a pair of tongs and place it in an airtight antistatic bag that has a zip. Goodison, Davis, & Jackson (2015). The bag should then be correctly labeled and put in the evidence container. The handling measures would prevent contamination of the already present fingerprints. The laptop should be handled similarly. The evidence custodian in chloroprene gloved hands should disconnect it from any external power source, close it, and put it in a sizeable antistatic container, label it correctly and carefully place it in the evidence container. It should also be recorded in the evidence book. 3.Items of non-digital evidence The square, yellow sticky notes stuck on the desktop computer and the shelf might contain handwritten reminders of
  • 11. meetings or events related to the company's new product and search code that the suspect might have recorded. They would provide real evidence during prosecution. The papers placed on the shelf might be typed, or handwritten documents containing information, sketches, and frameworks of the company's new product and search code written by the suspect. They would be used as real evidence during prosecution as well. There is also a notebook on the office work table. It is white and has a blue logo on the left-hand side of the page. As is the case with the other paper works, this too might contain written notes about the new product and the search code which can be used as real evidence during prosecution. Finally, there is a white stapler with a stainless steel ream on the desk. It might contain forensic evidence such as fingerprints which can be used as supplementary evidence to back up the allegations against the suspect. Steps of collecting the items to mitigate the loss of evidence First, the evidence custodian should take photographs of the sticky notes and the paper documents on the shelves before handling them physically. Second, they should pick the documents in latex-gloved hands and put them in security bags that have a zipper, each item in its bag, for forensic search and descriptions. Third, the items should be put in evidence containers ready for transport to the forensic science laboratories. Lillis, Becker, O'Sullivan & Scanlon (2016). 4. Security procedures and environmental considerations for the storage of evidence (i) The evidence both digital and non-digital should be stored in paper, envelope and antistatic containers, in case of the laptop, and not plastic containers. Plastic produces static electricity and allows humidity and condensation thus interfering with the evidence. The digital evidence should be stored in an area that has no extreme temperature, pressure, and humidity. Li, Bajramovic, Gao, & Parekh (2016). (ii) The digital evidence should be stored away from magnetic fields caused by speakers, for example, vibrations and
  • 12. moisture to mitigate alteration of evidence. (iii)The digital evidence should be packaged in a way that will prevent deformation. The packaging and storage container can be a thick-walled antistatic container for safety. (iv) For security purposes, all the evidence should be labeled; the time of collection, the location, and its name. Each item should then be recorded in a book for future reference and to the checklist if all items are available. (v) All the evidence should be recorded in the inventory according to the agency’s policies and a chain of custody maintained for any item removed from the storage area. Prayudi, & Sn (2015). 5. Brian Duggers, made a commendable trial in describing the digital materials collected for evidence in the evidence document. His description incorporates most of the items’ specific features. The voice recorder, however, is scantly described. He should have included its measurement approximations to expound on how “small” it is. It also has black coloring on the front part. Brian did not include the black colour in his statement, which might cause ambiguity in case a similar voice recorder is found elsewhere in the room. He should also have included the initial location of the item identified to avoid confusion in case a similar item is found.
  • 13. References Chang, C. H. (2018). New Development Regarding Search Warrants under the Fourth Amendment of the US Constitution-- Jones, Jardines & Grady. EurAmerica, 48(2), 267-333. Goodison, S. E., Davis, R. C., & Jackson, B. A. (2015). Digital evidence and the US Criminal Justice System. Identifying technology and other needs to more effectively acquire and utilize digital evidence. Lillis, D., Becker, B., O'Sullivan, T., & Scanlon, M. (2016). Current challenges and future research areas for digital forensic investigation. arXiv preprint arXiv:1604.03850. Li, J., Bajramovic, E., Gao, Y., & Parekh, M. (2016). Graded security forensics readiness of SCADA systems. Informatik 2016. Prayudi, Y., & Sn, A. (2015). Digital chain of custody: State of the art. International Journal of Computer Applications, 114(5). ITEM 1 ITEM 2
  • 14. ITEM 3 EVIDENCE / PROPERTY CUSTODY DOCUMENT The proponent agency for this document is OHMR-PM CONTROL NUMBER REPORT CROSS-REFERENCE NUMBER RECEIVING AGENCY Makestuff IT Security LOCATION Makestuff Remote Office #4 NAME, GRADE AND TITLE OF PERSON FROM WHOM RECEIVED OWNER Former work area of Mr. YOURPROP OTHER ADDRESS (Includes ZIP Code) Bldg# 47, Martin Blvd, Faketown, NJ 12345 LOCATION FROM WHERE OBTAINED Desk near west wall of office REASON OBTAINED Evaluation as evidence TIME / DATE OBTAINED
  • 15. 1430, 04/01/2014 ITEM NO. QUANTITY DESCRIPTION OF ARTICLES (Include model, serial number, conditions, and any unusual marks or scratches) 1 2 3 --------- 1 1 1 -------------- Voice recorder, small, silver, Olympus. Western Digital, 1TB, silver and black with a green label, roughly rectangular, affixed with a torn sticker on the front. Thumb drive, USB, PNY-brand, 64GB in size, unknown serial number, grey and black in color, approximately 1” x 2.5” x 0.5”, metal and plastic-type construction, printed with “PNY… 64GB”, with small hole on the side (which appears to be for a lanyard. --------------------------///LAST ITEM///----------------------------- ---------------------------------- CHAIN OF CUSTODY ITEM NO. DATE RELEASED BY
  • 16. RECEIVED BY PURPOSE OF CHANGE OF CUSTODY 1-3 04/01/2014 SIGNATURE CRIME SCENE SIGNATURE ///original signed/// Evaluation as evidence NAME, GRADE, TITLE N/A NAME. GRADE, TITLE I.M. Helpful, Security Specialist SIGNATURE SIGNATURE NAME, GRADE, TITLE NAME. GRADE, TITLE SIGNATURE SIGNATURE NAME, GRADE, TITLE NAME. GRADE, TITLE
  • 17. SIGNATURE SIGNATURE NAME, GRADE, TITLE NAME. GRADE, TITLE NAME, GRADE, TITLE NAME. GRADE, TITLE SIGNATURE SIGNATURE OHMR FORM 4137 front (Jul 91) Project 1 Understanding Investigative Parameters CCJS 321 Digital Forensics in the Criminal Justice System Project #1- Understanding Investigative Parameters UMUC By: Shreeji Patel September 3, 2019.
  • 18. 1. There are few benefits of a forensic readiness plan. The first benefit is planning for the possible requirement for digital proof. The second benefit is reducing the price of inspections. The third benefit is stopping the chance for hateful insiders to protect their paths. The fourth benefit is the decreasing amount of supervisory or lawful needs for release of information. There are two requirements to establish forensic readiness. The first requirement is to classify possible proof sources and also the kinds of evidence. The second requirement is to form ability for safe proof collecting and assortment in an exceedingly forensically sound way (Sule, 2014). 2. Yes, we can search Mr. Belcamp’s assigned locker in the Company’s on-site gym for digital evidence because an employer has right to search lockers or desk to see what they have, but they also have to get the employee’s consent (Johnson, n.d). Yes, we can use the master key to search Mr. Belcamp’s desk, but only when it is necessary and only if Mr. Belcamp had hidden some sort of threat in the desk (“Should Employers Have Master Keys to Employees' Desk Drawers?”, 2019). 3. Yes, the security staff has the right to open Mr. Belcamp’s briefcase and seize any potential digital evidence. The first reason why the security staff has right to open Mr. Belcamp’s briefcase is that to check whether Mr. Belcamp got any illegal
  • 19. things in his briefcase and if Mr. Belcamp got illegal things in his briefcase than security staff has right to seize the illegal things. The second reason why the security staff has right to open Mr. Belcamp’s briefcase is that to check if Mr. Belcamp has stolen anything from the company and if Belcamp has stolen anything from the company than the things that are stolen can be seized (Johnson, n.d). 4. It does matter that Mr. Belcamp has never signed the receipt page. It does matter because when the employees are asked to sign the receipt page of the handbook, it tells the manager of the company that the employees have read and comprehended the handbook (Miller, 2014). The second reason why it matters because the handbook shows evidence and rules that need to be followed, so it is important for every employee that they sign the receipt page of the handbook (Miller, 2014). So, it is important that Mr. Belcamp signs the receipt page of the handbook. 5. Search and seizure are when police examine a person’s home, car, or job to search for proof that felony has been committed. And If the police found the proof than they have to seize it. Also, the police can arrest the person who created the crime (“Search and Seizure”, n.d). 6. Chain of custody is a written record documenting once, how, and by whom single things of real or electronic proof (Longley, 2019). Chain of custody is important as a result of if the proof has been modified or it can not be demonstrated that it has been not modified throughout the time between assortment and use in court, then that proof is a smaller amount plausible or reliable than it otherwise would be (Chen, 2016). If chain of custody is not documented, then the important proof can be considered lawfully useless (“The Importance of Chain of Custody for Legal Proceedings”, 2017). References
  • 20. Chen, A. (2016, November 20). What is chain of custody? Why is it important? Retrieved from https://www.quora.com/What-is-chain-of-custody-Why-is-it- important Johnson, S. C. (n.d.). Does an employer have a right to search an employee's locker or desk? Retrieved from https://www.xperthr.com/faq/does-an-employer-have-a-right-to- search-an-employees-locker-or-desk/6902/ Johnson, S. C. (n.d.). Does an employer have the right to search an employee's purse or bag? Retrieved from https://www.xperthr.com/faq/does-an-employer-have-the-right- to- search-an-employees-purse-or-bag/6903/ Longley, R. (2019, March 13). What Is Chain of Custody? Definition and Examples. Retrieved from https://www.thoughtco.com/chain-of-custody-4589132 Miller, B. (2014, June 17). Employee Handbooks: The Importance of Signed Acknowledgements. Retrieved from https://hrdailyadvisor.blr.com/2014/06/17/employee-handbooks- the- importance-of-signed-acknowledgements/ Sule, D. (2014). Importance of Forensic Readiness. Retrieved from https://www.isaca.org/Journal/archives/2014/Volume- 1/Pages/JOnline-Importance-of- Forensic-Readiness.aspx (2019, June 13). Should Employers Have Master Keys to Employees' Desk Drawers? - Fortress Safe and Lock - Springdale. Retrieved from https://nearsay.com/c/668424/24159/should-employers- have-master-keys-to- employees-desk-drawers (n.d.). Search and Seizure. Retrieved from http://www.searchandseizure.org/ (2017, November 14). The Importance of Chain of Custody for Legal Proceedings. Retrieved from https://www.superiorbag.com/evidence-bags/importance-chain- custody-legal-proceedings/