Policy Review Assignment (Please Type Your Responses)
You have been provided with numerous examples of actual policies from various law enforcement agencies. The policies are all on the topics of Cybercrime Investigations, Digital Evidence, and/or Computer Forensics.
This assignment is based on the characteristics of a High-Quality SOP as discussed in the Module 2 Lecture. You are to use this discussion to evaluate a policy for this assignment in two parts: (1) Rate the policy on each of the established criteria and (2) Explain
in detail
your reason for the rating that you chose.
Name of Agency and Title of Policy: ____________________________________________
___________________________________________________________________________
Format: (circle one) BAD 0 – 1 – 2 – 3 – 4 – 5 – 6 – 7 – 8 – 9 – 10 EXCELLENT
Reason for Rating: ____________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
Structure: (circle one) BAD 0 – 1 – 2 – 3 – 4 – 5 – 6 – 7 – 8 – 9 – 10 EXCELLENT
Reason for Rating: ____________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
Concise: (circle one) BAD 0 – 1 – 2 – 3 – 4 – 5 – 6 – 7 – 8 – 9 – 10 EXCELLENT
Reason for Rating: ____________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
Well-written: (circle one) BAD 0 – 1 – 2 – 3 – 4 – 5 – 6 – 7 – 8 – 9 – 10 EXCELLENT
Reason for Rating: ____________________________________________________________
____________________________________________________________________________
__________________________________________________________________________
Procedural Precision: (circle one) BAD 0 – 1 – 2 – 3 – 4 – 5 – 6 – 7 – 8 – 9 – 10 EXCELLENT
Reason for Rating: ____________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
Clarity: (circle one) BAD 0 – 1 – 2 – 3 – 4 – 5 – 6 – 7 – 8 – 9 – 10 EXCELLENT
Reason for Rating: ____________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
1
HONOLULU POLICE DEPARTMENT
POLICY
AUXILIARY AND TECHNICAL SERVICES
I October 3, 2015 Policy Number 8.18 I
RECOVERING DIGITAL EVIDENCE
POLICY
The Information Technology Division (ITD) shall provide technical
support and expertise to investigators who seize computers or
other digital devices as part of their investigation.
PROCEDURE
I. THE ITD ROLE
The ITD has established a digital forensics laboratory that
is equipped with a wide range of digital forensics software
tools. This facility provides a secure environment for
imaging media and recovering evidence.
The ITD digital forensics personnel will provide expert
technical support to investigators for the preservation,
recovery, and analysis of evidence.
A. Although the ITD digital forensics personnel may assist
with computer-related tasks for a case, the appropriate
investigative unit shall remain responsible for the
case;
B. The ITD digital forensics personnel shall accommodate
requests to respond to search warrants and other
on-site investigations that require technical
expertise;
C. Requests for support shall be initiated by submitting a
Digital Forensics Work Request, HPD-513E form, to the
ITD and shall be subject to approval by the ITD major,
captain, or digital forensics supervisor.
Requests will be accepted by the ITD during normal
business hours, Monday through Friday, 0745 to
1630 hours; and
Reviewed for Public Release
October 3, 2015 Policy Number 8.18
Page2
D. Emergency requests outside of normal business hours
shall be made through the Communications Division, who
will contact the digital forensics supervisor or
designee.
II. RECOVERING DIGITAL EVIDENCE
In accordance with Policy 8.13, HANDLING OF EVIDENCE AND
FOUND PROPERTY, the Property Report, HPD-192A form, shall be
prepared by each departmental employee who accepts,
recovers, or seizes devices that may contain digital
evidence. The report shall describe the factors and
circumstances by which the property was obtained and itemize
each piece of property. As evidence, the equipment must be
safeguarded against tampering and the chain of custody must
be strictly maintained.
A. Investigators shall provide the ITD digital forensics
personnel with the relevant facts and circumstances of
the case and a copy of the search warrant, consent
form, or administrative request form;
B. Investigators are not required to notify the ITD in
advance of seizing computers or other digital devices
as evidence; and
C. Computers and digital devices shall be submitted for
storage to the Evidence Room of the Records and
Identification Division. The ITD may accept custody of
devices during normal business hours with prior
notification and agreement with the ITD digital
forensics personnel.
Post on bulletin
board for one week
Policy first issued
July 1, 2003
l��rKLJYQ
LOUIS M. KEALOHA
Chief of Police
Reviewed for Public Release