SlideShare una empresa de Scribd logo
1 de 15
www.tusconsultoreslegales.com [email_address] Internet/Digital evidence (COMPUTER FORENSICS) CORPORATE CRIMINAL LIABILITY
www.tusconsultoreslegales.com [email_address] INTERNET/INVESTIGATION OF DIGITAL EVIDENCE/COMPUTER FORENSICS  4. PREVENTIVE ANALYSIS OF CORPORATE CRIMINAL LIABILITY  3. HOW TO PREVENT AND/OR MINIMISE CORPORATE CRIMINAL LIABILITY  2. LEGAL FRAMEWORK OF CORPORATE CRIMINAL LIABILITY AND DIGITAL EVIDENCE  6. REASONS FOR A FORENSICS INVESTIGATION 1. SITUATIONS WHICH SHOULD BE AVOIDED: REFLECTIONS  5. STAGES OF THE COMPUTER FORENSICS PROCESS
www.tusconsultoreslegales.com [email_address] ,[object Object],[object Object],[object Object],1. SITUATIONS WHICH SHOULD BE AVOIDED REFLECTIONS:
www.tusconsultoreslegales.com [email_address] ,[object Object],[object Object],1. SITUATIONS WHICH SHOULD BE AVOIDED REFLECTIONS:
www.tusconsultoreslegales.com [email_address] 2. LEGAL FRAMEWORK OF CORPORATE CRIMINAL LIABILITY AND DIGITAL EVIDENCE (1/2)  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
www.tusconsultoreslegales.com [email_address] 2. LEGAL FRAMEWORK OF CORPORATE CRIMINAL LIABILITY AND DIGITAL EVIDENCE (2/2)  ,[object Object],[object Object],[object Object],[object Object]
www.tusconsultoreslegales.com [email_address] 2. LEGAL FRAMEWORK OF CORPORATE CRIMINAL LIABILITY AND DIGITAL EVIDENCE (2/2)  ,[object Object],[object Object],[object Object],[object Object],[object Object]
www.tusconsultoreslegales.com [email_address] 3. HOW TO PREVENT AND/OR MINIMISE CORPORATE CRIMINAL LIABILITY PREVENTIVE MEASURES: 1-  Establishing control measures: Implementing an internal corporate policy  5-  Detecting and preserving evidence which allow a proactive legal defence: Minimising the consequences of the crime 2- Establishing technical and organisational measures: Complying with personal data protection obligations (Organic Law on Personal Data Projection and Implementing Legislation) 3-  Implementing security certificates: Preventing identity theft COMPUTER  FORENSICS 4-  Establishing cover measures: Having an insurance policy which also covers legal services
www.tusconsultoreslegales.com [email_address] An internal corporate policy with clear guidelines, specifying the permitted use of both the company's internal and external means of communication, with the corresponding behaviours, expressly indicated, through control measures established by the employer as provided in article 20.3 of the Workers' Statute. 4. PREVENTIVE ANALYSIS OF CORPORATE CRIMINAL LIABILITY (1/3) 1-  Establishing control measures: Implementing an internal corporate policy  2- Establishing technical and organisational measures: Complying with personal data protection obligations (Organic Law on Personal Data Projection and Implementing Legislation) Having complied with the obligations established by the Organic Law on Personal Data Protection and implementing regulations to establish the technical and organisational measures necessary, as well as efficient control measures in accordance with article 20.3 of the Workers' Statute which are compatible with the worker's privacy. Above all, ensuring control of both internal and external means of communication.
www.tusconsultoreslegales.com [email_address] 4. PREVENTIVE ANALYSIS OF CORPORATE CRIMINAL LIABILITY (2/3) 3-  Implementing security certificates: Preventing identity theft Need to have an insurance policy which also contributes to establishing cover for legal defence.     4-  Establishing cover measures: Having an insurance policy which also covers legal services ,[object Object],[object Object],[object Object],[object Object]
www.tusconsultoreslegales.com [email_address] 4. PREVENTIVE ANALYSIS OF CORPORATE CRIMINAL LIABILITY (3/3) The detection, preservation and investigation of electronic proof or evidence which may be used to defend the company against possible criminal liability is known as COMPUTER FORENSICS.  This discipline is basically divided into four major stages or processes, which can be carried out independently, or consecutively, according to the company's needs.  The stages of Computer Forensics go from prevention up to implementing proof in the trial. 5-  Detecting and preserving evidence which allow a legal defence oriented towards minimising possible criminal consequences  COMPUTER  FORENSICS
www.tusconsultoreslegales.com [email_address] 5. STAGES OF THE COMPUTER FORENSICS PROCESS PREVENTION FORENSIC  READINESS Objective:  Facilitating a possible digital investigation How: Establishing and implementing traceability procedures Example: Intrusion Detection  Systems LOCATING  INFORMATION E-DISCOVERY Objective:  Search for specific data from a  large quantity of information How: Use of search and filter mechanisms in file systems and databases  Example: Search for deleted accounting data DATA ACQUISITION CHAIN OF CUSTODY Objective:  Correctly initiating the chain of custody of future proof How: Bit by bit copy of digital information before a notary Example: Copies of information from a mobile telephone EVIDENCE ANALYSIS EXPERT REPORT Objective:  Analysing digital information and searching for  possible evidence. How: Blind and automated search for suspicious activities Example: Analysis of the PC of an ex-employee for  possible information theft
www.tusconsultoreslegales.com [email_address] 6. REASONS FOR A DIGITAL INVESTIGATION ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
www.tusconsultoreslegales.com [email_address] 6. REASONS FOR A FORENSIC INVESTIGATION  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
www.tusconsultoreslegales.com [email_address] Thank you for your interest [email_address] To purchase documents: www.yourlegalconsultants.com To hire the services of an expert, please contact:

Más contenido relacionado

La actualidad más candente

10 Things You Need To Know About Privacy
10 Things You Need To Know About Privacy10 Things You Need To Know About Privacy
10 Things You Need To Know About PrivacyNow Dentons
 
Pli workplace privacy in the year 2013 2013-6-13
Pli workplace privacy in the year 2013   2013-6-13Pli workplace privacy in the year 2013   2013-6-13
Pli workplace privacy in the year 2013 2013-6-13mkeane
 
Privacy in India: Legal issues
Privacy in India: Legal issuesPrivacy in India: Legal issues
Privacy in India: Legal issuesSagar Rahurkar
 
Workplace Privacy Presentation
Workplace Privacy PresentationWorkplace Privacy Presentation
Workplace Privacy PresentationSarah Forbes
 
General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR)General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR)BenjaminShalevSalovi
 
Law firm information security overview focus on encryption by dave cunningh...
Law firm information security overview   focus on encryption by dave cunningh...Law firm information security overview   focus on encryption by dave cunningh...
Law firm information security overview focus on encryption by dave cunningh...David Cunningham
 
Data Protection Bill 2019 Participative Role of General Public
Data Protection Bill 2019 Participative Role of General PublicData Protection Bill 2019 Participative Role of General Public
Data Protection Bill 2019 Participative Role of General Publicijtsrd
 
Data Protection & Security Breakfast Briefing - Master Slides_28 June_final
Data Protection & Security Breakfast Briefing - Master Slides_28 June_finalData Protection & Security Breakfast Briefing - Master Slides_28 June_final
Data Protection & Security Breakfast Briefing - Master Slides_28 June_finalDr. Donald Macfarlane
 
An Indian Outline on Database Protection
An Indian Outline on Database ProtectionAn Indian Outline on Database Protection
An Indian Outline on Database ProtectionSinghania2015
 
Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...
Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...
Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...Raleigh ISSA
 

La actualidad más candente (13)

10 Things You Need To Know About Privacy
10 Things You Need To Know About Privacy10 Things You Need To Know About Privacy
10 Things You Need To Know About Privacy
 
Pli workplace privacy in the year 2013 2013-6-13
Pli workplace privacy in the year 2013   2013-6-13Pli workplace privacy in the year 2013   2013-6-13
Pli workplace privacy in the year 2013 2013-6-13
 
Privacy in India: Legal issues
Privacy in India: Legal issuesPrivacy in India: Legal issues
Privacy in India: Legal issues
 
ScifoBYODSample
ScifoBYODSampleScifoBYODSample
ScifoBYODSample
 
elec reporting
elec reportingelec reporting
elec reporting
 
Workplace Privacy Presentation
Workplace Privacy PresentationWorkplace Privacy Presentation
Workplace Privacy Presentation
 
General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR)General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR)
 
Law firm information security overview focus on encryption by dave cunningh...
Law firm information security overview   focus on encryption by dave cunningh...Law firm information security overview   focus on encryption by dave cunningh...
Law firm information security overview focus on encryption by dave cunningh...
 
Data Protection Bill 2019 Participative Role of General Public
Data Protection Bill 2019 Participative Role of General PublicData Protection Bill 2019 Participative Role of General Public
Data Protection Bill 2019 Participative Role of General Public
 
Data Protection & Security Breakfast Briefing - Master Slides_28 June_final
Data Protection & Security Breakfast Briefing - Master Slides_28 June_finalData Protection & Security Breakfast Briefing - Master Slides_28 June_final
Data Protection & Security Breakfast Briefing - Master Slides_28 June_final
 
An Indian Outline on Database Protection
An Indian Outline on Database ProtectionAn Indian Outline on Database Protection
An Indian Outline on Database Protection
 
201 CMR 17.00
201 CMR 17.00201 CMR 17.00
201 CMR 17.00
 
Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...
Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...
Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...
 

Destacado

Evidence Preservation
Evidence PreservationEvidence Preservation
Evidence Preservationamckean
 
Child GPS Tracking Device
Child GPS Tracking DeviceChild GPS Tracking Device
Child GPS Tracking Devicestelamala
 
Digital investigation
Digital investigationDigital investigation
Digital investigationunnilala11
 
Crime scene management
Crime scene managementCrime scene management
Crime scene managementHafeez Bhutta
 
Teaching Computer Forensics Using Student Developed Evidence Files
Teaching Computer Forensics Using Student Developed Evidence FilesTeaching Computer Forensics Using Student Developed Evidence Files
Teaching Computer Forensics Using Student Developed Evidence Filesamiable_indian
 
The Deep Web, TOR Network and Internet Anonymity
The Deep Web, TOR Network and Internet AnonymityThe Deep Web, TOR Network and Internet Anonymity
The Deep Web, TOR Network and Internet AnonymityAbhimanyu Singh
 
Digital Crime & Forensics - Presentation
Digital Crime & Forensics - PresentationDigital Crime & Forensics - Presentation
Digital Crime & Forensics - Presentationprashant3535
 
Gps tracking system
Gps tracking system Gps tracking system
Gps tracking system Sumit Kumar
 

Destacado (12)

Evidence Preservation
Evidence PreservationEvidence Preservation
Evidence Preservation
 
Child GPS Tracking Device
Child GPS Tracking DeviceChild GPS Tracking Device
Child GPS Tracking Device
 
Digital investigation
Digital investigationDigital investigation
Digital investigation
 
Digital Forensic
Digital ForensicDigital Forensic
Digital Forensic
 
Crime scene management
Crime scene managementCrime scene management
Crime scene management
 
Teaching Computer Forensics Using Student Developed Evidence Files
Teaching Computer Forensics Using Student Developed Evidence FilesTeaching Computer Forensics Using Student Developed Evidence Files
Teaching Computer Forensics Using Student Developed Evidence Files
 
Deep Web - what to do and what not to do
Deep Web - what to do and what not to do	Deep Web - what to do and what not to do
Deep Web - what to do and what not to do
 
The Deep Web, TOR Network and Internet Anonymity
The Deep Web, TOR Network and Internet AnonymityThe Deep Web, TOR Network and Internet Anonymity
The Deep Web, TOR Network and Internet Anonymity
 
Digital Crime & Forensics - Presentation
Digital Crime & Forensics - PresentationDigital Crime & Forensics - Presentation
Digital Crime & Forensics - Presentation
 
The Deep and Dark Web
The Deep and Dark WebThe Deep and Dark Web
The Deep and Dark Web
 
Gps tracking system
Gps tracking system Gps tracking system
Gps tracking system
 
Security analysis of emerging smart home applications 11.2016
Security analysis of emerging smart home applications 11.2016Security analysis of emerging smart home applications 11.2016
Security analysis of emerging smart home applications 11.2016
 

Similar a Prevent Corporate Criminal Liability with Digital Evidence Analysis

Corporate Criminal Compliance in Spain
Corporate Criminal Compliance in SpainCorporate Criminal Compliance in Spain
Corporate Criminal Compliance in SpainTAG Alliances
 
The New Massachusetts Privacy Rules (February 2, 2010)
The New Massachusetts Privacy Rules (February 2, 2010)The New Massachusetts Privacy Rules (February 2, 2010)
The New Massachusetts Privacy Rules (February 2, 2010)stevemeltzer
 
Internet. electronic invoicement. legal requirements
Internet. electronic invoicement. legal requirementsInternet. electronic invoicement. legal requirements
Internet. electronic invoicement. legal requirementsyourlegalconsultants
 
Internet:: Electronic Invoicement: Legal requirements
Internet:: Electronic Invoicement: Legal requirementsInternet:: Electronic Invoicement: Legal requirements
Internet:: Electronic Invoicement: Legal requirementsCristina Villavicencio
 
Computer Forensics-An Introduction of New Face to the Digital World
Computer Forensics-An Introduction of New Face to the Digital WorldComputer Forensics-An Introduction of New Face to the Digital World
Computer Forensics-An Introduction of New Face to the Digital Worldrahulmonikasharma
 
Integrated criminal and justice information system of Korea
Integrated criminal and justice information system of KoreaIntegrated criminal and justice information system of Korea
Integrated criminal and justice information system of KoreaYoungTae (Henry) Huh
 
Crossing the streams: How security professionals can leverage the NZ Privacy ...
Crossing the streams: How security professionals can leverage the NZ Privacy ...Crossing the streams: How security professionals can leverage the NZ Privacy ...
Crossing the streams: How security professionals can leverage the NZ Privacy ...Chris Hails
 
Data protection process information
Data protection process informationData protection process information
Data protection process informationyourlegalconsultants
 
CCSP_Self_Domain_6.ppt
CCSP_Self_Domain_6.pptCCSP_Self_Domain_6.ppt
CCSP_Self_Domain_6.pptSamir Jha
 
Introduction to Data Security Breach Preparedness with Model Data Security Br...
Introduction to Data Security Breach Preparedness with Model Data Security Br...Introduction to Data Security Breach Preparedness with Model Data Security Br...
Introduction to Data Security Breach Preparedness with Model Data Security Br...- Mark - Fullbright
 
Data Risks In A Digital Age
Data Risks In A Digital Age Data Risks In A Digital Age
Data Risks In A Digital Age padler01
 
10. law invest & ethics
10. law invest & ethics10. law invest & ethics
10. law invest & ethics7wounders
 

Similar a Prevent Corporate Criminal Liability with Digital Evidence Analysis (20)

Social Networks
Social NetworksSocial Networks
Social Networks
 
Social Networks
Social NetworksSocial Networks
Social Networks
 
Social Networks
Social NetworksSocial Networks
Social Networks
 
Corporate Criminal Compliance in Spain
Corporate Criminal Compliance in SpainCorporate Criminal Compliance in Spain
Corporate Criminal Compliance in Spain
 
The New Massachusetts Privacy Rules (February 2, 2010)
The New Massachusetts Privacy Rules (February 2, 2010)The New Massachusetts Privacy Rules (February 2, 2010)
The New Massachusetts Privacy Rules (February 2, 2010)
 
Internet. electronic invoicement. legal requirements
Internet. electronic invoicement. legal requirementsInternet. electronic invoicement. legal requirements
Internet. electronic invoicement. legal requirements
 
Dpl october 2017 colombia
Dpl october 2017   colombiaDpl october 2017   colombia
Dpl october 2017 colombia
 
Internet:: Electronic Invoicement: Legal requirements
Internet:: Electronic Invoicement: Legal requirementsInternet:: Electronic Invoicement: Legal requirements
Internet:: Electronic Invoicement: Legal requirements
 
Computer Forensics-An Introduction of New Face to the Digital World
Computer Forensics-An Introduction of New Face to the Digital WorldComputer Forensics-An Introduction of New Face to the Digital World
Computer Forensics-An Introduction of New Face to the Digital World
 
Itet3 its forensics
Itet3 its forensicsItet3 its forensics
Itet3 its forensics
 
Integrated criminal and justice information system of Korea
Integrated criminal and justice information system of KoreaIntegrated criminal and justice information system of Korea
Integrated criminal and justice information system of Korea
 
Crossing the streams: How security professionals can leverage the NZ Privacy ...
Crossing the streams: How security professionals can leverage the NZ Privacy ...Crossing the streams: How security professionals can leverage the NZ Privacy ...
Crossing the streams: How security professionals can leverage the NZ Privacy ...
 
Data protection process information
Data protection process informationData protection process information
Data protection process information
 
CCSP_Self_Domain_6.ppt
CCSP_Self_Domain_6.pptCCSP_Self_Domain_6.ppt
CCSP_Self_Domain_6.ppt
 
Quick guide gdpr
Quick guide gdprQuick guide gdpr
Quick guide gdpr
 
Professional issues in IT
Professional issues in IT Professional issues in IT
Professional issues in IT
 
Introduction to Data Security Breach Preparedness with Model Data Security Br...
Introduction to Data Security Breach Preparedness with Model Data Security Br...Introduction to Data Security Breach Preparedness with Model Data Security Br...
Introduction to Data Security Breach Preparedness with Model Data Security Br...
 
Data Risks In A Digital Age
Data Risks In A Digital Age Data Risks In A Digital Age
Data Risks In A Digital Age
 
10. law invest & ethics
10. law invest & ethics10. law invest & ethics
10. law invest & ethics
 
Workplace Privacy (excerpt)
Workplace Privacy (excerpt)Workplace Privacy (excerpt)
Workplace Privacy (excerpt)
 

Último

Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort ServiceCall US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Servicecallgirls2057
 
Investment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy CheruiyotInvestment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy Cheruiyotictsugar
 
Annual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesAnnual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesKeppelCorporation
 
Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Seta Wicaksana
 
2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis UsageNeil Kimberley
 
Innovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfInnovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfrichard876048
 
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCRashishs7044
 
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu MenzaYouth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menzaictsugar
 
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City GurgaonCall Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaoncallgirls2057
 
Digital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfDigital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfJos Voskuil
 
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,noida100girls
 
Islamabad Escorts | Call 03070433345 | Escort Service in Islamabad
Islamabad Escorts | Call 03070433345 | Escort Service in IslamabadIslamabad Escorts | Call 03070433345 | Escort Service in Islamabad
Islamabad Escorts | Call 03070433345 | Escort Service in IslamabadAyesha Khan
 
International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...ssuserf63bd7
 
8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCRashishs7044
 
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptxContemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptxMarkAnthonyAurellano
 
Buy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy Verified Accounts
 
Future Of Sample Report 2024 | Redacted Version
Future Of Sample Report 2024 | Redacted VersionFuture Of Sample Report 2024 | Redacted Version
Future Of Sample Report 2024 | Redacted VersionMintel Group
 
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCRashishs7044
 
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdfNewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdfKhaled Al Awadi
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...lizamodels9
 

Último (20)

Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort ServiceCall US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
 
Investment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy CheruiyotInvestment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy Cheruiyot
 
Annual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesAnnual General Meeting Presentation Slides
Annual General Meeting Presentation Slides
 
Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...
 
2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage
 
Innovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfInnovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdf
 
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
 
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu MenzaYouth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
 
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City GurgaonCall Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
 
Digital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfDigital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdf
 
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
 
Islamabad Escorts | Call 03070433345 | Escort Service in Islamabad
Islamabad Escorts | Call 03070433345 | Escort Service in IslamabadIslamabad Escorts | Call 03070433345 | Escort Service in Islamabad
Islamabad Escorts | Call 03070433345 | Escort Service in Islamabad
 
International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...
 
8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR
 
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptxContemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
 
Buy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail Accounts
 
Future Of Sample Report 2024 | Redacted Version
Future Of Sample Report 2024 | Redacted VersionFuture Of Sample Report 2024 | Redacted Version
Future Of Sample Report 2024 | Redacted Version
 
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
 
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdfNewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
 

Prevent Corporate Criminal Liability with Digital Evidence Analysis

  • 1. www.tusconsultoreslegales.com [email_address] Internet/Digital evidence (COMPUTER FORENSICS) CORPORATE CRIMINAL LIABILITY
  • 2. www.tusconsultoreslegales.com [email_address] INTERNET/INVESTIGATION OF DIGITAL EVIDENCE/COMPUTER FORENSICS 4. PREVENTIVE ANALYSIS OF CORPORATE CRIMINAL LIABILITY 3. HOW TO PREVENT AND/OR MINIMISE CORPORATE CRIMINAL LIABILITY 2. LEGAL FRAMEWORK OF CORPORATE CRIMINAL LIABILITY AND DIGITAL EVIDENCE 6. REASONS FOR A FORENSICS INVESTIGATION 1. SITUATIONS WHICH SHOULD BE AVOIDED: REFLECTIONS 5. STAGES OF THE COMPUTER FORENSICS PROCESS
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8. www.tusconsultoreslegales.com [email_address] 3. HOW TO PREVENT AND/OR MINIMISE CORPORATE CRIMINAL LIABILITY PREVENTIVE MEASURES: 1- Establishing control measures: Implementing an internal corporate policy 5- Detecting and preserving evidence which allow a proactive legal defence: Minimising the consequences of the crime 2- Establishing technical and organisational measures: Complying with personal data protection obligations (Organic Law on Personal Data Projection and Implementing Legislation) 3- Implementing security certificates: Preventing identity theft COMPUTER FORENSICS 4- Establishing cover measures: Having an insurance policy which also covers legal services
  • 9. www.tusconsultoreslegales.com [email_address] An internal corporate policy with clear guidelines, specifying the permitted use of both the company's internal and external means of communication, with the corresponding behaviours, expressly indicated, through control measures established by the employer as provided in article 20.3 of the Workers' Statute. 4. PREVENTIVE ANALYSIS OF CORPORATE CRIMINAL LIABILITY (1/3) 1- Establishing control measures: Implementing an internal corporate policy 2- Establishing technical and organisational measures: Complying with personal data protection obligations (Organic Law on Personal Data Projection and Implementing Legislation) Having complied with the obligations established by the Organic Law on Personal Data Protection and implementing regulations to establish the technical and organisational measures necessary, as well as efficient control measures in accordance with article 20.3 of the Workers' Statute which are compatible with the worker's privacy. Above all, ensuring control of both internal and external means of communication.
  • 10.
  • 11. www.tusconsultoreslegales.com [email_address] 4. PREVENTIVE ANALYSIS OF CORPORATE CRIMINAL LIABILITY (3/3) The detection, preservation and investigation of electronic proof or evidence which may be used to defend the company against possible criminal liability is known as COMPUTER FORENSICS. This discipline is basically divided into four major stages or processes, which can be carried out independently, or consecutively, according to the company's needs. The stages of Computer Forensics go from prevention up to implementing proof in the trial. 5- Detecting and preserving evidence which allow a legal defence oriented towards minimising possible criminal consequences COMPUTER FORENSICS
  • 12. www.tusconsultoreslegales.com [email_address] 5. STAGES OF THE COMPUTER FORENSICS PROCESS PREVENTION FORENSIC READINESS Objective: Facilitating a possible digital investigation How: Establishing and implementing traceability procedures Example: Intrusion Detection Systems LOCATING INFORMATION E-DISCOVERY Objective: Search for specific data from a large quantity of information How: Use of search and filter mechanisms in file systems and databases Example: Search for deleted accounting data DATA ACQUISITION CHAIN OF CUSTODY Objective: Correctly initiating the chain of custody of future proof How: Bit by bit copy of digital information before a notary Example: Copies of information from a mobile telephone EVIDENCE ANALYSIS EXPERT REPORT Objective: Analysing digital information and searching for possible evidence. How: Blind and automated search for suspicious activities Example: Analysis of the PC of an ex-employee for possible information theft
  • 13.
  • 14.
  • 15. www.tusconsultoreslegales.com [email_address] Thank you for your interest [email_address] To purchase documents: www.yourlegalconsultants.com To hire the services of an expert, please contact: