Chain of Custody
the chronological documentation of the seizure, possession, exchange, analysis, and dissolution of evidence in the criminal justice system.
Computer Forensics
“the preservation, identification, extraction, interpretation, and documentation of computer evidence, to include the rules of evidence, legal processes, integrity of evidence, factual reporting of the information found, and providing expert opinion in a court of law or other legal and/or administrative proceeding as to what was found.
Digital Forensics
the application of computer science and investigative procedures for a legal purpose involving the analysis of digital evidence after proper search authority, chain of custody, validation with mathematics, use of validated tools, repeatability, reporting, and possible expert presentation (Zatyko, 2007).
Forensics
the application of science to solve a legal problem.
McDonaldization Theory
the evidence of rational operations in modern organizational bureaucracies, based on the precepts of (i)efficiency, (ii) calculability and (iii) predictability.
Hash value
a unique algorithm that mirrors the path for an electronic file.
Panopticon
a circular watch tower in a prison complex
Stored Communications Act – – (SCA, codified at 18 U.S.C. Chapter 121 §§ 2701–2712)
a law that addresses voluntary and compelled disclosure of “stored wire and electronic communications and transactional records” held by third-party internet service providers (ISPs).