Feeds

US laws restrict computer forensics to gumshoes

Jobs for the boys?

Choosing a cloud hosting partner with confidence

More US states are moving towards laws that limit computer forensics work to those with Private Investigator licences, or people contracted to work for licensed investigative agencies.

Pending legislation in South Carolina would limit the specialist work of capturing and making sense of evidence on computer discs and server logs to businesses whose main line of work is serving legal process or matrimonial investigations. The bill covers computers forensic evidence presented in court.

Computer evidence compiled by unlicensed practitioners would be excluded from admission in either civil or criminal cases under the regulation. Those caught practicing without a licence to collect evidence for court (though not on a private basis) could face criminal prosecution.

Enterprises or private individuals would still be free to hire anyone they choose for private investigations. Computer forensics is often used as an internal investigatory tool following computer intrusions, or in response to suspicion of staff misuse of internet resources.

Georgia, New York, Nevada, North Carolina, Texas, Virginia and Washington already have similar legislation, Baseline Magazine reports. The idea is that by restricting the preparation of computer forensics work for presentation in court promotes higher standards and keeps out the cowboys.

However, expecting computer forensics experts to have a PI licence makes about as much sense as requiring PIs to have computer science degrees. Most private investigators come from a police or forces background. The regulations smack of protectionism.

Commonly, specialist agencies handle IT-related work such as counter-surveillance and forensic examination. Data recovery firms and others with computer forensics expertise may be equally capable in preserving and processing computer evidence, but are locked out of the business in the US, unlike other countries such as the UK where such firms are typically swamped with work. ®

Choosing a cloud hosting partner with confidence

More from The Register

next story
UK smart meters arrive in 2020. Hackers have ALREADY found a flaw
Energy summit bods warned of free energy bonanza
DRUPAL-OPCALYPSE! Devs say best assume your CMS is owned
SQLi hole was hit hard, fast, and before most admins knew it needed patching
Knock Knock tool makes a joke of Mac AV
Yes, we know Macs 'don't get viruses', but when they do this code'll spot 'em
Feds seek potential 'second Snowden' gov doc leaker – report
Hang on, Ed wasn't here when we compiled THIS document
Mozilla releases geolocating WiFi sniffer for Android
As if the civilians who never change access point passwords will ever opt out of this one
Why weasel words might not work for Whisper
CEO suspends editor but privacy questions remain
prev story

Whitepapers

Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
Website security in corporate America
Find out how you rank among other IT managers testing your website's vulnerabilities.