Chat with us, powered by LiveChat Policy Review Assignment (Please Type Your Responses) Yo - STUDENT SOLUTION USA

Policy Review Assignment (Please Type Your Responses)

You have been provided with numerous examples of actual policies from various law enforcement agencies. The policies are all on the topics of Cybercrime Investigations, Digital Evidence, and/or Computer Forensics.

For this assignment you may select one of these policies for analysis or you may use a policy on one of these specific topics from an agency of your choosing, such as an agency in your home town, your favorite city, or your employer. NOTE: if you elect to bring in your own policy, you are required to provide the Instructor with a PDF copy of the policy along with your analysis.

This assignment is based on the characteristics of a High-Quality SOP as discussed in the Module 2 Lecture. You are to use this discussion to evaluate a policy for this assignment in two parts: (1) Rate the policy on each of the established criteria and (2) Explain
in detail
your reason for the rating that you chose.

Name of Agency and Title of Policy: ____________________________________________
___________________________________________________________________________

Format: (circle one) BAD 0 – 1 – 2 – 3 – 4 – 5 – 6 – 7 – 8 – 9 – 10 EXCELLENT

Reason for Rating: ____________________________________________________________

____________________________________________________________________________

____________________________________________________________________________


Structure:
(circle one) BAD 0 – 1 – 2 – 3 – 4 – 5 – 6 – 7 – 8 – 9 – 10 EXCELLENT

Reason for Rating: ____________________________________________________________

____________________________________________________________________________

____________________________________________________________________________

Concise: (circle one) BAD 0 – 1 – 2 – 3 – 4 – 5 – 6 – 7 – 8 – 9 – 10 EXCELLENT

Reason for Rating: ____________________________________________________________

____________________________________________________________________________

____________________________________________________________________________

Well-written: (circle one) BAD 0 – 1 – 2 – 3 – 4 – 5 – 6 – 7 – 8 – 9 – 10 EXCELLENT

Reason for Rating: ____________________________________________________________

____________________________________________________________________________

__________________________________________________________________________


Procedural Precision:
(circle one) BAD 0 – 1 – 2 – 3 – 4 – 5 – 6 – 7 – 8 – 9 – 10 EXCELLENT

Reason for Rating: ____________________________________________________________

____________________________________________________________________________

____________________________________________________________________________

Clarity: (circle one) BAD 0 – 1 – 2 – 3 – 4 – 5 – 6 – 7 – 8 – 9 – 10 EXCELLENT

Reason for Rating: ____________________________________________________________

____________________________________________________________________________

____________________________________________________________________________

1

HONOLULU POLICE DEPARTMENT

POLICY
AUXILIARY AND TECHNICAL SERVICES

I October 3, 2015 Policy Number 8.18 I

RECOVERING DIGITAL EVIDENCE

POLICY

The Information Technology Division (ITD) shall provide technical
support and expertise to investigators who seize computers or

other digital devices as part of their investigation.

PROCEDURE

I. THE ITD ROLE

The ITD has established a digital forensics laboratory that

is equipped with a wide range of digital forensics software
tools. This facility provides a secure environment for

imaging media and recovering evidence.

The ITD digital forensics personnel will provide expert

technical support to investigators for the preservation,

recovery, and analysis of evidence.

A. Although the ITD digital forensics personnel may assist

with computer-related tasks for a case, the appropriate

investigative unit shall remain responsible for the

case;

B. The ITD digital forensics personnel shall accommodate

requests to respond to search warrants and other

on-site investigations that require technical

expertise;

C. Requests for support shall be initiated by submitting a

Digital Forensics Work Request, HPD-513E form, to the
ITD and shall be subject to approval by the ITD major,

captain, or digital forensics supervisor.

Requests will be accepted by the ITD during normal

business hours, Monday through Friday, 0745 to

1630 hours; and

Reviewed for Public Release

October 3, 2015 Policy Number 8.18

Page2

D. Emergency requests outside of normal business hours

shall be made through the Communications Division, who

will contact the digital forensics supervisor or

designee.

II. RECOVERING DIGITAL EVIDENCE

In accordance with Policy 8.13, HANDLING OF EVIDENCE AND

FOUND PROPERTY, the Property Report, HPD-192A form, shall be

prepared by each departmental employee who accepts,

recovers, or seizes devices that may contain digital

evidence. The report shall describe the factors and
circumstances by which the property was obtained and itemize

each piece of property. As evidence, the equipment must be

safeguarded against tampering and the chain of custody must

be strictly maintained.

A. Investigators shall provide the ITD digital forensics

personnel with the relevant facts and circumstances of

the case and a copy of the search warrant, consent

form, or administrative request form;

B. Investigators are not required to notify the ITD in

advance of seizing computers or other digital devices

as evidence; and

C. Computers and digital devices shall be submitted for

storage to the Evidence Room of the Records and

Identification Division. The ITD may accept custody of

devices during normal business hours with prior

notification and agreement with the ITD digital

forensics personnel.

Post on bulletin

board for one week

Policy first issued

July 1, 2003

l��rKLJYQ
LOUIS M. KEALOHA

Chief of Police

Reviewed for Public Release

error: Content is protected !!