Information Technology Reference
In-Depth Information
Figure 6.1 Maintaining.the.integrity.of.electronic.evidence.will.require.
securing.the.data.
data.in.question..Thinking.about.how.you.would.classify.the.
data.you.are.trying.to.secure.will.inform.you.as.to.the.degree.
to.which.you.need.to.secure.it..For.instance,.if.the.data.you.
are.working.with.are.publicly.available,.easily.recreated,.and.
not.subject.to.any.question.of.legitimacy.(either.because.the.
data.contain.well-established.information.or.because.they.are.
simply. not. very. important. to. the. case. at. hand),. you. might.
classify.the.data.as.nonsensitive,.low-security.data.
On.the.other.hand,.if.the.data.contain.private.information.
about.an.individual,.protected.information.about.intellectual.
property.or.critical.infrastructure,.or.simply.information.that.
could.be.used.by.your.adversary.to.your.disadvantage,.the.data.
might. be. classiied. as. sensitive. or. conidential.. Information.
considered. work. product. or. privileged. in. a. legal. deinition.
would.also.be.classiied.as.conidential..Of.course,.if.you.are.
working.for.or.with.the.military.or.an.intelligence.organiza-
tion,.there.will.be.other.levels.of.classiication.that.determine.
exactly.who.has.the.right.or.ability.to.see.that.data..These.can.
include,.among.others.depending.on.the.organization,
•. For.oficial.use.only.(FOUO)
•. Law.enforcement.sensitive.(LES)
•. Secret
Search WWH ::




Custom Search