Educause Security Discussion mailing list archives

Re: Federal Rules of Evidence


From: "Myers, Julie" <julie.myers () ROCHESTER EDU>
Date: Fri, 2 Sep 2011 10:28:10 -0400

Me too. Thanks!

 

Julie Myers 
Chief Information Security Officer 

University of  Rochester - University IT

julie.myers () rochester edu <mailto:julie.myers () rochester edu>   

p: 585.273.1804  c: 585.208.0939  

P Think twice before you print

 CONFIDENTIALITY: This email (including any attachments) may contain
confidential, proprietary and privileged information, and unauthorized
disclosure or use is prohibited. If you received this email in error,
please notify the sender and delete this email from your system. Thank
you.

 

From: The EDUCAUSE Security Constituent Group Listserv
[mailto:SECURITY () LISTSERV EDUCAUSE EDU] On Behalf Of Wayne Bullock
Sent: Friday, September 02, 2011 10:24 AM
To: SECURITY () LISTSERV EDUCAUSE EDU
Subject: Re: [SECURITY] Federal Rules of Evidence

 

I would very much like to see it. Thanks!

 

Wayne Bullock, MSCIS, CCNA
Associate Director 

Information Security

Information Resource Management 
Florida Atlantic University 
777 Glades Road
Boca Raton, FL 33431
wayne () fau edu 

 

From: The EDUCAUSE Security Constituent Group Listserv
[mailto:SECURITY () LISTSERV EDUCAUSE EDU] On Behalf Of Daniel Bennett
Sent: Friday, September 02, 2011 10:21 AM
To: SECURITY () LISTSERV EDUCAUSE EDU
Subject: Re: [SECURITY] Federal Rules of Evidence

 

Yes... Please send my way.  Thanks.

 

Daniel Bennett

IT Security Analyst

Vice-Chair North Central PA Members Alliance

 

Pennsylvania College of Technology

One College Ave

Williamsport, PA 17701

 

P:570.329.4989

E:dbennett () pct edu

 

From: The EDUCAUSE Security Constituent Group Listserv
[mailto:SECURITY () LISTSERV EDUCAUSE EDU] On Behalf Of Mclaughlin, Kevin
(mclaugkl)
Sent: Friday, September 02, 2011 10:19 AM
To: SECURITY () LISTSERV EDUCAUSE EDU
Subject: Re: [SECURITY] Federal Rules of Evidence

 

Daniel:

We have a pretty comprehensive Standard Operating Procedure manual (SOP)
that contains portions of what you are looking for but most likely not
in a format that you might have in mind.  I can send you - and anyone
else - a copy of the Investigations section if you want.  Just let me
know.  Being an X-Fed and then state detective I think it covers chain
of custody fairly well.  I can also send you our department retention
schedule that covers active/inactive case retention limits.

 

- Kevin

 

 

Kevin L. McLaughlin,  CISM, CISSP, GIAC-GSLC, CRISC, PMP, ITIL Master
Certified

Assistant Vice President, Information Security & Special Projects

University of Cincinnati

513-556-9177

 

The University of Cincinnati is one of America's top public research
institutions and the region's largest employer, with a student
population of more than 41,000.

 

 

 

From: The EDUCAUSE Security Constituent Group Listserv
[mailto:SECURITY () LISTSERV EDUCAUSE EDU] On Behalf Of Bradley, Stephen W.
Mr.
Sent: Friday, September 02, 2011 9:24 AM
To: SECURITY () LISTSERV EDUCAUSE EDU
Subject: Re: [SECURITY] Federal Rules of Evidence

 

I too would be interested in your findings.

 

thx 

steve 

From: The EDUCAUSE Security Constituent Group Listserv
[mailto:SECURITY () listserv educause edu] On Behalf Of Mark Reboli
Sent: Friday, September 02, 2011 9:22 AM
To: SECURITY () listserv educause edu
Subject: Re: [SECURITY] Federal Rules of Evidence

 

daniel we do not have this in place but i would be very interested if
you could share your results.  i would add a checklist would be great as
well to ensure no step is missed.

 

m

Mark Reboli

Network/Telecom/IT security Manager

Misericordia University

570-674-6753

 

 

 

From: The EDUCAUSE Security Constituent Group Listserv
[mailto:SECURITY () LISTSERV EDUCAUSE EDU] On Behalf Of Daniel Bennett
Sent: Friday, September 02, 2011 9:09 AM
To: SECURITY () LISTSERV EDUCAUSE EDU
Subject: [SECURITY] Federal Rules of Evidence

 

Hello All,

 

I am wondering if anyone has developed guidelines, policy, or procedures
that you follow for every IT investigation?  This would cover chain of
custody, line of authorities, retention of information, report formats,
etc.  I am looking to standardize all investigations so if an internal
investigation ever becomes civil or criminal all evidence will  hold up.

 

Please reply on or off list.

 

Thanks,

 

Daniel Bennett

IT Security Analyst

Vice-Chair North Central PA Members Alliance

 

Pennsylvania College of Technology

One College Ave

Williamsport, PA 17701

 

P:570.329.4989

E:dbennett () pct edu

 


Current thread: