Data Extracted in Computer Forensics Results in Additional Charges
Even though the protocol and process a computer forensics investigator uses to extract and analyze data from a computer are the same no matter who owns the computer, ownership does make a difference in the outcome once the facts are uncovered. For one thing, the owner of the machine has to provide appropriate permission for the computer forensics investigators to access data on the device. What the users are allowed to do on the machine also comes into play depending on whether the computer is owned by a private individual, a corporation or a municipality. For example, had a case where our computer forensic experts were asked to extract data from a computer owned by a municipality. An employee was suspected of using municipal funds [...]