Privacy Concerns With Digital Forensics

Privacy Concerns With Digital Forensics

Neil C. Rowe
ISBN13: 9781522588979|ISBN10: 1522588973|EISBN13: 9781522588986
DOI: 10.4018/978-1-5225-8897-9.ch073
Cite Chapter Cite Chapter

MLA

Rowe, Neil C. "Privacy Concerns With Digital Forensics." Cyber Law, Privacy, and Security: Concepts, Methodologies, Tools, and Applications, edited by Information Resources Management Association, IGI Global, 2019, pp. 1464-1481. https://doi.org/10.4018/978-1-5225-8897-9.ch073

APA

Rowe, N. C. (2019). Privacy Concerns With Digital Forensics. In I. Management Association (Ed.), Cyber Law, Privacy, and Security: Concepts, Methodologies, Tools, and Applications (pp. 1464-1481). IGI Global. https://doi.org/10.4018/978-1-5225-8897-9.ch073

Chicago

Rowe, Neil C. "Privacy Concerns With Digital Forensics." In Cyber Law, Privacy, and Security: Concepts, Methodologies, Tools, and Applications, edited by Information Resources Management Association, 1464-1481. Hershey, PA: IGI Global, 2019. https://doi.org/10.4018/978-1-5225-8897-9.ch073

Export Reference

Mendeley
Favorite

Abstract

Digital forensics is a rapidly growing technology for examining the contents of computers and digital devices. It raises many challenges to conventional notions of privacy because it involves a considerably more detailed search of digital data than is possible with other techniques, and it can be done surreptitiously. However, there are analogies to homes and the rights of individuals to be free from unwarranted searches and seizures in their private spaces. Even though commercial software and data comprises most of digital space, there are clearly enclaves of data that deserves to be kept private. We discuss the techniques of digital forensics and investigative targets. We identify key challenges to privacy, and outline both the legal protections and the technical protections available. Unfortunately, privacy laws are ineffective in most countries, and users need to take their own measures to protect themselves.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.