The Use of Technology to Enhance Investigation
|
|
- Muriel Lindsey
- 5 years ago
- Views:
Transcription
1 The Use of Technology to Enhance Investigation Of High Profile Corruption Cases. Centre for Socio-Legal Studies
2 Objectives By the end of this keynote, participants will be knowledgeable on: 1. Open Source Intelligence and how it can be used to gather evidence for investigation; 2. How government agencies database are useful for investigations; and 3. Private Digital Sources of Evidence.
3 Introduction It s not always about interview or confessional statements. Looking outside the box or outside the obvious. Connecting the dots; using what s available to obtain what is not so readily available
4 Elements to consider: Does the person(s) involved own a smartphone?does this person own a laptop? Does he/she have an address? Is he/she on Facebook or any social media? How about their family members? What online/offline presence do they have?
5 Basic types of technology used in gathering 50 information for investigation Open Source. Agencies Database. Private Private Digital The higher the difficulty in obtaining, the greater the result/yield. First pass through OS and AD to know what to look out for in PD. PD is most accurate, OS is least accurate
6 Open Source Intelligence Publicly available information that anyone can lawfully obtain by request, purchase, or observation. Nigeria s 2011 enactment of the FOI Act makes public records & information more accessible to the general public foia.justice.gov.ng Internet has become a primary source of information since Nigeria embraced the worldwide web in mid-2000.
7 Open Source Intelligence 2015: 52% of Nigeria s population are internet users with social media-related sites being the most visited websites on the web. Most federal and many state bodies in Nigeria have websites where some of their basic information and resources are made available to the public e.g. Rivers State Judiciary website
8 Examples of Open Source
9 Examples of Open Source Intelligence Freedom of Information Act (resources) foia.justice.gov.ng Debt management Office Infrastructure Concession Regulatory Commission Twitter Public search of registered companies Instagram Wikis
10 Some Politically Exposed Persons/Family on SM
11 Usefulness of Open Source Primarily: to identify and verify a wide range of facts: personal identity addresses phone numbers addresses photograph property records vehicle information spending information directors of a company Friends & associates Family members Location on a said day etc.
12 Government Agencies Database Some agencies have registers like CBN (BVN register), FRSC (registered vehicles), NIS (travel information) Access to these registers is allowed to law enforcement agencies directly on presenting proper identification or obtaining necessary judicial or administrative authority Ongoing National ID card registration by NIMC
13 Private Digital Sources of Evidence What are these? Information and data of value to an investigation that is stored on, received, or transmitted by an electronic device. Acquired when data or electronic devices are seized and secured for examination
14 Examples of Private Digital Sources of Evidence Computers Source Examples Call logs, SMS sent & received, contact list; Documents and files created by user e.g. from Microsoft Word/Excel; search engine history Mobile Devices Social Media Platforms, Instant Messaging platforms, GPS, search engine history, photos, videos, contacts etc Removable media & external storage Electronic Money Calendars s, notes, letters Flash drives, Hard Drives, Memory cards Mobile banking, online banking platforms Digital & physical; Set reminders Sent and received mail; draft mail; hard copy letters, notes around the office, notes stored in computers & phones Telephone Records Accounting or Record Keeping software Call logs, SMS sent & received, obtained from the network provider Sage, Peachtree, Microsoft Excel etc.
15 Using Private Digital Sources of Evidence Useful in investigations, tracing assets and can be used in Court Investigator may need physical access to this information by obtaining the relevant devices, passwords, fingerprint, etc from the subject
16 Using Private Digital Sources of Evidence obtaining this level of information requires a specialised process of collection, preservation, and analysis before its presentation for litigation and that these activities require the assistance of a digital forensic expert A government with the political will to fight corruption in Nigeria must equip the Investigation departments of the anti-corruptions agencies (ACAs) with relevant tools and budget to employ or contract with experts in this discipline
17 Single types of Private Digital Evidence 25% 25% Hash Values Metadata Mobile phones & cellular systems s 25% 25%
18 PD: Hash Values Technically, a hash value is is a string value (of specific length), which is the result of calculation of a Hashing Algorithm Simply, it is the fingerprints for files. The contents of a file are processed through a cryptographic algorithm and the hash value is the result that helps to identify the contents of the file.
19 PD: Hash Values Use of Hash Values: to verify that the forensic image of the digital evidence has not been modified and is exactly the same as the original. If the contents are modified in any way, the value of the hash will also change significantly. To discover hidden files on a computer; this is useful when the hash value of the original file is known To determine whether or not, a file with a known hash value is on a particular computer
20 PD: Metadata This is information that is stored about another data Useful for investigators because it answers questions about files and documents Metadata is usually found in electronic documents, pictures, webpages, browsers & file systems
21 Metadata showing browser history PD: Metadata
22 PD: s is fast becoming one of the richest sources of evidence available to investigators. This is due to the following: users often use it informally and for work; users believe that s can easily be deleted s can easily be copied or forwarded by the investigator
23 PD: s Information that can be retrieved from an contents, sender s identification and location, receiver s identification. s may be found on personal devices like computers, phones, tablets & ipads. s are difficult to delete because most s have 4 copies in different places.
24 PD: s - 4 copies of s in different locations
25 PD: Mobile Phones & Cellular Systems The usage of mobile phones by suspects, gives investigators access to: data stored on the cell phone such as text messages, contact list,pictures and other documents. call log information which reveals: date and time a call was made or received; the number that called or received the call, whether it was a voice call, data call, or SMS
26 PD: Mobile Phones & Cellular Systems The usage of mobile phones by suspects, gives investigators access to: Cell phone location: this might not be the exact position but reveals the general area which corresponds to the radius of coverage of the cell tower (mast) that was connected to the phone at that time
27 Basic types of technology used in gathering 50 information for investigation Open Source. Agencies Database. Private Private Digital The higher the difficulty in obtaining, the greater the result/yield. First pass through OS and AD to know what to look out for in PD. PD is most accurate, OS is least accurate
28 Conclusion: Call-to-Action Google the PEPs you are investigating try to get ALL the FREE information about them first Open Source Check with the Agencies Databases everything you can find about PEP and their family. We recommend that Investigating agencies sign MoUs with the agencies they usually work with to grant access to their investigators upon proper identification. Infrastructure & engagement of digital forensic experts
Michael Phelps Foundation: Privacy Policy
Effective November 7, 2018 Michael Phelps Foundation: Privacy Policy General Understanding of Our Privacy Policy The Michael Phelps Foundation ( the Foundation, We, Us, or Our ) understands and respects
More informationTrends in Mobile Forensics from Cellebrite
Trends in Mobile Forensics from Cellebrite EBOOK 1 Cellebrite Survey Cellebrite is a well-known name in the field of computer forensics, and they recently conducted a survey as well as interviews with
More informationPrivacy Information - Privacy and Cookies Policy In Full
Privacy Information - Privacy and Cookies Policy In Full Contents 1. Introduction & General Terms 2. Who are we? 3. What information will Gaucho collect about me? 4. How will Gaucho use the information
More informationDIGITAL EVIDENCE TOOL BOX
DIGITAL EVIDENCE TOOL BOX Toolbox Page 1 of 23 Introduction This guide is meant to provide a basic understanding of the industry standards, best practices and practical applications for the use of digital
More informationAlthea UK and Ireland Limited Privacy Policy
Althea UK and Ireland Limited Privacy Policy BMS Ref: ALT23 V1.1 Page 1 of 7 Document Control Version Date Author/Reviewer/Approver Revision notes V1.0 Draft 18-5-18 Legal Author Authors draft V1.1 20-5-18
More informationTOP ETF PICKS PRIVACY NOTICE Last updated October 2018
TOP ETF PICKS PRIVACY NOTICE Last updated October 2018 INTRODUCTION Thank you for choosing to be part of our community at TopETFpicks ( company, we, us, or our ). We are committed to protecting your personal
More informationAccessData offers a broad array of training options.
Forensics Training AccessData offers a broad array of training options. Our trainers have more than two centuries of cumulative experience in their respective fields. Take Advantage of the All Access Pass
More informationDuncanPowell RESTRUCTURING TURNAROUND FORENSIC
Forensic Technology and the Cloud DuncanPowell RESTRUCTURING TURNAROUND FORENSIC 12 October 2017 DucanPowell Forensic Team Peter Lanthois Partner Office: (08) 8223 8107 Mobile: 0407 258 959 Email: planthois@duncanpowell.com.au
More informationELECTRIC APP - PRIVACY POLICY
By accessing the website at http://electricchats.com ( Electric Site ) or any Electric mobile application (e.g., Electric ios, or Electric Android,) ( Electric App ) (collectively, the Electric Service
More informationESTABLISHMENT OF AN OFFICE OF FORENSIC SCIENCES AND A FORENSIC SCIENCE BOARD WITHIN THE DEPARTMENT OF JUSTICE
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 ESTABLISHMENT OF AN OFFICE OF FORENSIC SCIENCES AND A FORENSIC SCIENCE BOARD WITHIN
More informationOutside the Box: Networks and The Internet
Outside the Box: Networks and The Internet Don Mason Associate Director Copyright 2011 National Center for Justice and the Rule of Law All Rights Reserved Inside vs. Outside Inside the Box What the computer
More informationWhen Recognition Matters WHITEPAPER CLFE CERTIFIED LEAD FORENSIC EXAMINER.
When Recognition Matters WHITEPAPER CLFE www.pecb.com CONTENT 3 4 5 6 6 7 7 8 8 Introduction So, what is Computer Forensics? Key domains of a CLFE How does a CLFE approach the investigation? What are the
More informationInside vs. Outside. Inside the Box What the computer owner actually has possession of 1/18/2011
Outside the Box: Networks and The Internet Don Mason Associate Director Copyright 2011 National Center for Justice and the Rule of Law All Rights Reserved Inside vs. Outside Inside the Box What the computer
More informationVistra International Expansion Limited PRIVACY NOTICE
Effective Date: from 25 May 2018 Vistra International Expansion Limited PRIVACY NOTICE This Privacy Notice explains how particular companies in the Vistra Group collect, use and disclose your personal
More informationKIK s GUIDE FOR LAW ENFORCEMENT
Thanks for checking out our law enforcement guide. We take the safety of our users very seriously, and we hope this guide will be a useful tool for you. It includes information about our app; the features
More informationFritztile is a brand of The Stonhard Group THE STONHARD GROUP Privacy Notice The Stonhard Group" Notice Whose Personal Data do we collect?
Fritztile is a brand of The Stonhard Group THE STONHARD GROUP Privacy Notice For the purposes of applicable data protection and privacy laws, The Stonhard Group, a division of Stoncor Group, Inc. ( The
More informationProposal for a Regulation on Privacy and Electronic Communications
Proposal for a Regulation on Privacy and Electronic Communications reinforcing trust and security in the Digital Single Market #eprivacy17 Brussels, January 2017 eprivacy European Commission proposal Agenda
More informationSeattle University Identity Theft Prevention Program. Purpose. Definitions
Seattle University Identity Theft Prevention Program Purpose The purpose of the program is to establish an Identity Theft Prevention Program designed to detect, prevent and mitigate identity theft in connection
More informationPrivacy Policy. Information we collect about you
Privacy Policy Briefly.co.za ( we, and us ) respects the privacy of its users and has developed this Privacy Policy to demonstrate its commitment to protecting your privacy. This Privacy Policy describes
More informationMobile Devices Villanova University Department of Computing Sciences D. Justin Price Spring 2014
Mobile Devices Villanova University Department of Computing Sciences D. Justin Price Spring 2014 INTRODUCTION The field of computer forensics has long been centered on traditional media like hard drives.
More informationDigital Evidence: I know it s there, how do I get it?
: I know it s there, how do I get it? January 24, 2019 Matthew Rollins Senior Assistant District Attorney Paulding County Judicial Circuit Josh Reed Network Intrusion Forensic Analyst United States Secret
More informationPhones & Location. How do abusers misuse phones and location devices? What are survivors telling you? CELL PHONES: SPYING & MONITORING
Phones & Location Technology Summit 2016 San Francisco, CA Erica Olsen 2016 NNEDV How do abusers misuse phones and location devices? What are survivors telling you? 2016 NNEDV 2 CELL PHONES: SPYING & MONITORING
More informationCoastal Babysitters Privacy Policy
. Coastal Babysitters Privacy Policy Orly Isa Muscat trading as "Coastal Babysitters" (ABN 66 206 628 086) ("we", "us" or the "Company") is committed to privacy protection. At http://coastalbabysitters.com.au/
More informationWe offer background check and identity verification services to employers, businesses, and individuals. For example, we provide:
This Privacy Policy applies to the websites, screening platforms, mobile applications, and APIs (each, a Service ) owned and/or operated by Background Research Solutions, LLC ("we"/ BRS ). It also describes
More informationThe information we collect
Phone: (02) 8035 8000 Web: www.carnextdoor.com.au Email: info@carnextdoor.com.au Address: Level 3, 55 Pyrmont Bridge Rd, Pyrmont, NSW, 2009 CAR NEXT DOOR PRIVACY POLICY AND CREDIT REPORTING POLICY Last
More informationPRIVACY POLICY TABLE OF CONTENTS. Last updated October 05, 2018
PRIVACY POLICY Last updated October 05, 2018 Thank you for choosing to be part of Vistalytics Inc., ( Company, we, us, or our ). We are committed to protecting your personal information and your right
More informationInformation Security Incident Response Plan
Information Security Incident Response Plan Purpose It is the objective of the university to maintain secure systems and data. In order to comply with federal, state, and local law and contractual obligations,
More informationTo review material modifications and their effective dates scroll to the bottom of the page.
PRIVACY POLICY Effective Date: October 1, 2016 To review material modifications and their effective dates scroll to the bottom of the page. Cobra Trading, Inc. ("Cobra") owns and operates this cobratrading.com
More informationTake control of your e-discovery process. Increase efficiency, reduce risk and keep costs in line with an integrated solution.
AD ediscovery Collect, Audit and Analyze with a Seamless, Secure Solution Take control of your e-discovery process. Increase efficiency, reduce risk and keep costs in line with an integrated solution.
More informationGoogle Hangout Lin Zhong
Tutorial on Google Hangout, Fall, 2012. 1 Page Google Hangout Lin Zhong This tutorial will demonstrate how to make video chat with more than one people at once and how to share screen and video with group
More informationPrivacy Policy. Our Policy applies to all visitors, users, and others who access the Service ("Users").
Privacy Policy Welcome to Taptot. At Taptot we respect your privacy and want to provide a safe, fun, worry-free, and hassle-free give-and-take platform for all our members (Taptot registered users). It
More informationVISTRA (CYPRUS) LTD. PRIVACY NOTICE
Effective Date: from 25 May 2018 VISTRA (CYPRUS) LTD. PRIVACY NOTICE This Privacy Notice explains how particular companies in the Vistra Group collect, use and disclose your personal data, and your rights
More informationWay to new challenges
Way to new challenges Yves Vandermeer MSC Computer Forensics and Cybercrime Investigations PhD researcher yves.vandermeer@ When? Since 2001, informal working group starting with a few members from EU Law
More informationThis chapter should be read in conjuction with the Search and Surveilance Act 2012 and the Search chapters of the Police Manual.
events This chapter contains the following topics: Summary Recording equipment must be Police-issued and approved Benefits for Police of recording operations and events - Media filming of Police operations
More informationRippleMatch Privacy Policy
RippleMatch Privacy Policy This Privacy Policy describes the policies and procedures of RippleMatch Inc. ( we, our or us ) on the collection, use and disclosure of your information on https://www.ripplematch.com/
More informationDigital Forensics at a University. Calvin Weeks Director, Oklahoma Digital Forensics Lab University of Oklahoma
Digital Forensics at a University Calvin Weeks Director, University of Oklahoma Calvin Weeks Director, Former Director of IT Security Certified EnCASE Examiner (EnCE) VP of the local chapter of HTCIA Co-Chair
More informationThis regulation outlines the policy and procedures for the implementation of wireless networking for the University Campus.
UAR NUMBER: 400.01 TITLE: Wireless Network Policy and Procedure INITIAL ADOPTION: 11/6/2003 REVISION DATES: PURPOSE: Set forth the policy for using wireless data technologies and assigns responsibilities
More informationImportant Information
Important Information Important Information Effective from 13 January 2018 1. Your information 1.1 Who we are We are Coutts & Co, of 440 Strand, London WC2R OQS. We are a member of The Royal Bank of Scotland
More informationVISTRA MONACO PRIVACY NOTICE
Effective Date: from 25 May 2018 VISTRA MONACO PRIVACY NOTICE This Privacy Notice explains how particular companies in the Vistra Group collect, use and disclose your personal data, and your rights in
More informationUCD Centre for Cybersecurity & Cybercrime Investigation
UCD Centre for Cybersecurity & Cybercrime Investigation Formally established in 2006 Assist in the fight against cybercrime Capacity Building with international organisations Extensive global stakeholder
More informationSOCIAL NETWORKING'S EFFECT ON BUSINESS SECURITY CONTROLS
SOCIAL NETWORKING'S EFFECT ON BUSINESS SECURITY CONTROLS Jon Hanny Director of Information Security and Assurance, Buckley Sandler LLP Gaurav Chikara Senior Security Engineer, Cooley LLP AGENDA Social
More informationETSY.COM - PRIVACY POLICY
At Etsy, we value our community. You trust us with your information, and we re serious about that responsibility. We believe in transparency, and we re committed to being upfront about our privacy practices,
More information1.3 Please follow the links below for further information. Where relevant, we have made a distinction between different categories of data subjects:
PRIVACY STATEMENT Last date of revision: 18-05-2018 1. WHO DOES THIS GDPR PRIVACY STATEMENT APPLY TO? 1.1 Claeys & Engels cvba ( We or Claeys & Engels ) is a specialist law firm offering a full range of
More informationConsolidated Privacy Notice
Privacy Notice Overview Consolidated Privacy Notice The Southern California Edison Privacy Notice was updated on January 31, 2018 It is important to Southern California Edison (SCE) to protect your information
More informationWe collect information from you when You register for an Traders account to use the Services or Exchange and when You use such Services. V.
Privacy Policy General A. The parties involved in reference to this policy are Company and You, the User of these sites: www.bittrademarket.com A.1 Bittrade Market decentralize system is the publisher
More informationMobile Devices. Questions. NCJRL ICAC Webinar Mobile Devices October 25, Don Mason Associate Director, NCJRL. Presenter
Mobile Devices Presenter Don Mason Associate Director, NCJRL 662-915-6898 drmason@olemiss.edu Questions Feel free to email any time to: drmason@olemiss.edu Please include your phone number In case it might
More informationPrevention of Identity Theft in Student Financial Transactions AP 5800
Reference: Fair and Accurate Credit Transactions Act (Pub. L. 108-159) The Board recognizes that some activities of the Shasta-Tehama-Trinity Joint Community College District, "District," are subject to
More informationNATIONAL COMMISSION ON FORENSIC SCIENCE
NATIONAL COMMISSION ON FORENSIC SCIENCE Recommendation for the Accreditation of Digital and Multimedia Forensic Science Service Providers 1 Subcommittee Date of Current Version 25/02/16 Accreditation and
More informationAdkin s Privacy Information Notice for Clients, Contractors, Suppliers and Business Contacts
Adkin s Privacy Information Notice for Clients, Contractors, Suppliers and Business Contacts POLICY STATEMENT Adkin is committed to protecting and respecting the privacy of all of our clients. This Policy
More informationNOTIFICATION FOR PRIOR CHECKING INFORMATION TO BE GIVEN(2)
To be filled out in the EDPS' office REGISTER NUMBER: 895 NOTIFICATION FOR PRIOR CHECKING Date of submission: 10/09/2012 Case number: 2012-0782 Institution: European Commission Legal basis: Article 27.2.(a)
More information(Geo)Location, Location, Location.!! Matt Blaze University of Pennsylvania
(Geo)Location, Location, Location!! Matt Blaze University of Pennsylvania Mobile Devices Computers, but you carry them with you they have lots of sensors (GPS, etc) they transmit (cell, wifi, bluetooth,
More informationCanadian Anti-Spam Legislation (CASL) Campaign and Database Compliance Checklist
Canadian Anti-Spam Legislation (CASL) Campaign and Database Compliance Checklist Database Checklist Use this Checklist as a guide to assessing existing databases for compliance with Canada s Anti-Spam
More informationTechnology Safety Quick Tips
Technology Safety Quick Tips Spyware: Computer & Phone Monitoring Software It enables a person to secretly monitor someone else s entire computer activity. It can be installed remotely by sending an email,
More informationAMCTHEATRES.COM - PRIVACY POLICY
Thank you for visiting AMCTheatres.com. AMC Entertainment Inc. values its relationship with guests, members and clients, and is committed to responsible information handling practices. This privacy policy
More informationMOBILE DEVICE FORENSICS
MOBILE DEVICE FORENSICS Smart phones and other handheld electronics have become an important part of our everyday lives and the ever changing technology is making these devices a major source of digital
More informationPayThankYou LLC Privacy Policy
PayThankYou LLC Privacy Policy Last Revised: August 7, 2017. The most current version of this Privacy Policy may be viewed at any time on the PayThankYou website. Summary This Privacy Policy covers the
More informationShaw Privacy Policy. 1- Our commitment to you
Privacy Policy last revised on: Sept 16, 2016 Shaw Privacy Policy If you have any questions regarding Shaw s Privacy Policy please contact: privacy@shaw.ca or use the contact information shown on any of
More informationMASTERCARD PRICELESS SPECIALS INDIA PRIVACY POLICY
Effective Date: 12 September 2017 MASTERCARD PRICELESS SPECIALS INDIA PRIVACY POLICY Mastercard respects your privacy. This Privacy Policy describes how we process personal data, the types of personal
More informationBISHOP GROSSETESTE UNIVERSITY. Document Administration. This policy applies to staff, students, and relevant data subjects
BISHOP GROSSETESTE UNIVERSITY Document Administration Document Title: Document Category: Privacy Policy Policy Version Number: 1.0 Status: Reason for development: Scope: Author / developer: Owner Approved
More informationPost-Conference Auditing and Investigating Fraud Seminar
Post-Conference Auditing and Investigating Fraud Seminar General Session Sources of Information 2014 Association of Certified Fraud Examiners, Inc. 1 of 13 Using Information Sources Understand how scheme
More informationTrends in Electronic Evidence.
Trends in Electronic Evidence. Collecting and Processing Large Data Sets in Digital Forensic Investigations With Dr Allan Watt CFCE, CFE Webinar outline Authentication of electronic documents: contracts,
More informationSocial Media Tools. March 13, 2010 Presented by: Noble Studios, Inc.
March 13, 2010 Presented by: Noble Studios, Inc. 1 Communication Timeline 2 Familiar Social Media Sites According to Facebook, more than 1.5 million local businesses have active pages on Facebook According
More informationCreating a Cell Phone Investigation Toolkit: Basic Hardware and Software Specifications
Creating a Cell Phone Investigation Toolkit: Basic Hardware and Software Specifications SEARCH Training Services May 2006 SEARCH The National Consortium for Justice Information and Statistics 7311 Greenhaven
More informationUse of Technology to Stalk
Use of Technology to Stalk Use of Technology to Stalk Sue Ryan, Program Attorney Phones calls, messages, texts, pics, video Cameras Global Positioning Systems (GPS) Computers Social networking sites Email
More informationAddendum 1 Emerald Coast Convention & Visitor Bureau Website Development RFP TDD 87-17
Addendum 1 Emerald Coast Convention & Visitor Bureau Website Development RFP TDD 87-17 This addendum is to answer the following questions: 1. Whether companies from Outside USA can apply for this? There
More informationVISTRA ZURICH AG - PRIVACY NOTICE
Effective Date: from 25 May 2018 VISTRA ZURICH AG - PRIVACY NOTICE This Privacy Notice explains how particular companies in the Vistra Group collect, use and disclose your personal data, and your rights
More informationMailChimp Basics. A step by step guide to MailChimp Course developed by Virginia Ridley
MailChimp Basics A step by step guide to MailChimp Course developed by Virginia Ridley By the end of this course you will: Know why a newsletter is important Have a brief understanding of Canada s Anti
More informationCompTIA CAS-003. CompTIA Advanced Security Practitioner (CASP)
CompTIA CAS-003 CompTIA Advanced Security Practitioner (CASP) http://killexams.com/pass4sure/exam-detail/cas-003 DEMO Find some pages taken from full version Killexams CAS-003 questions and answers are
More informationPRIVACY POLICY/YOUR PRIVACY RIGHTS
P.O. Box 14720 Herbert C. Hoover Building Washington, D.C. 20044-4720 Room B-0038 A (202) 808.3600 www.docfcu.org Washington, D.C. 20230 PRIVACY POLICY/YOUR PRIVACY RIGHTS Department of Commerce Federal
More informationTolbert Family SPADE Foundation Privacy Policy
Tolbert Family SPADE Foundation Privacy Policy We collect the following types of information about you: Information you provide us directly: We ask for certain information such as your username, real name,
More informationBYOD (Bring Your Own Device): Employee-owned Technology in the Workplace
BYOD (Bring Your Own Device): Employee-owned Technology in the Workplace MCHRMA Spring Conference April 4, 2014 PRESENTED BY: Sonya Guggemos MCIT Staff Counsel for Risk Control sguggemos@mcit.org The information
More informationPrivacy Notice. Contents. How Glasgow Credit Union uses your personal information
Privacy Notice How Glasgow Credit Union uses your personal information Contents 1 Who we are 2 2 The information we process 2 3 How we obtain information 3 4 Your rights 3 Table A Your Rights 4 5 Failure
More informationG, William James. The smartphone & tablet have changed the course of real estate
Mobile Office Solutions For REALTORS : Must-Have Tools For The Agent s Mobile Office A mobile professional s guide to knowing Which wireless technologies work for you G. William James Handheld Computer
More informationPOMONA EUROPE ADVISORS LIMITED
POMONA EUROPE ADVISORS LIMITED Personal Information Notice Pomona Europe Advisors Limited (Pomona, we/us/our) wants you to be familiar with how we collect, use and disclose personal information. This Personal
More informationUse of Personal Mobile Phone Whilst on Duty
Use of Personal Mobile Phone Whilst on Duty (Incorporating Smartphones and Hand Held Devices) Standard Operating Procedure Notice: This document has been made available through the Police Service of Scotland
More informationBeam Technologies Inc. Privacy Policy
Beam Technologies Inc. Privacy Policy Introduction Beam Technologies Inc., Beam Dental Insurance Services LLC, Beam Insurance Administrators LLC, Beam Perks LLC, and Beam Insurance Services LLC, (collectively,
More informatione180 Privacy Policy July 2018
e180 Privacy Policy July 2018 We are e180, the creators of Braindate. We care deeply about protecting your personal information, so we ve outlined everything you need to know about it here. Last modified:
More informationThe State of the Trust Gap in 2015
The State of the Trust Gap in 2015 The widespread use of mobile devices for work has driven a profound change in how employees think about the privacy of their personal data on mobile devices. Ten years
More informationHSBC INTRODUCES A SOCIAL P2P PAYMENT APP TO HONG KONG Easy to use and available to everyone
News Release 7 February 2017 HSBC INTRODUCES A SOCIAL P2P PAYMENT APP TO HONG KONG Easy to use and available to everyone HSBC today announced PayMe, a simple and secure social payment app that allows HSBC
More informationStarflow Token Sale Privacy Policy
Starflow Token Sale Privacy Policy Last Updated: 23 March 2018 Please read this Privacy Policy carefully. By registering your interest to participate in the sale of STAR tokens (the Token Sale ) through
More informationFEATURES & BENEFITS. Key word search function both inside and outside projects. Intuitive application makes creating profiles quick and easy
R2S Forensic provides R2S software and media support capabilities that assist in effective law enforcement, criminal investigation and public protection. We work with police forces, legal bodies, government
More informationWYNN SOCIAL CASINO PRIVACY POLICY
WYNN SOCIAL CASINO PRIVACY POLICY This privacy policy for the Wynn Slots App ( App ), made available by Wynn Social Gaming, LLC ( Wynn Social, Us, We, or Our ), describes our privacy practices (the "Privacy
More information3. How is technology used to serve our advertisements on other Sites that you visit and what choices do you have?
Privacy Policy for U.S. Websites Scope. This Privacy Policy applies to personal information collected online, used and disclosed by Stanley Black & Decker, Inc. s affiliates including but not limited to
More informationPrivacy Policy. When you create an account or use our Service, we collect the following types of information from you:
Privacy Policy Last updated: 24 th July, 2017 Welcome to Kwalee.com (the Site ), provided by Kwalee Ltd. ( Kwalee ). This Kwalee.com Privacy Policy ( Policy ) describes the information we gather from you
More informationCyberpeace A Guide to. Social Networking And Privacy Settings
Cyberpeace A Guide to Social Networking And Privacy Settings facebook Facebook gives the user the ability to choose his or her own privacy settings. By clicking the arrow and then the link that says Privacy
More information11, 2018 PRIVACY POLICY
Last Updated: March 11, 2018 PRIVACY POLICY BY USING OR ACCESSING THE WEBSITES, SYSTEMS OR SERVICES OF THE COMPANY AND (OR) ANY OF ITS AFFILIATES YOU SIGNIFY YOUR ACKNOWLEDGMENT AND ASSENT TO THE PRIVACY
More informationRed Flags/Identity Theft Prevention Policy: Purpose
Red Flags/Identity Theft Prevention Policy: 200.3 Purpose Employees and students depend on Morehouse College ( Morehouse ) to properly protect their personal non-public information, which is gathered and
More informationTITLE SOCIAL MEDIA AND COLLABORATION POLICY
DATE 9/20/2010 TITLE 408.01 SOCIAL MEDIA AND COLLABORATION POLICY ORG. AGENCY Department of Communications Approved AFT As more and more citizens in our community make the shift towards, or include the
More informationVETDATA PRIVACY POLICY
Last Updated: April 20, 2018. VETDATA PRIVACY POLICY PLEASE READ THIS PRIVACY POLICY CAREFULLY. Direct Vet Marketing, Inc. and its consolidated affiliates (hereinafter, Vets First Choice, we, us, our )
More informationOur Privacy Policy gives you detailed information on when and why we collect your personal information, how we use it and how we keep it secure.
Junction.co.uk Privacy Policy www.junction.co.uk is owned and operated by Cambridge Junction. We are committed to safeguarding your privacy online and to this end have developed the following Privacy Policy
More informationInformation we collect about you: (Rewritten)
Local Search Titan, LLC ( LST, "we", "us" or "our") respects the privacy of our users and has developed this Privacy Policy to demonstrate its commitment to protecting your privacy. The intention of this
More informationPrivacy Statement. Your privacy and trust are important to us and this Privacy Statement ( Statement ) provides important information
Privacy Statement Introduction Your privacy and trust are important to us and this Privacy Statement ( Statement ) provides important information about how IT Support (UK) Ltd handle personal information.
More informationPPR TOKENS SALE PRIVACY POLICY. Last updated:
PPR TOKENS SALE PRIVACY POLICY Last updated: 05.03.2018 STATUS AND ACCEPTANCE OF PRIVACY POLICY 1. This Privacy Policy (hereinafter referred to as the Policy ) sets forth the general rules of Participant
More informationIdentity Theft Victim s Complaint and Affidavit
Average time to complete: 10 minutes Identity Theft Victim s Complaint and Affidavit A voluntary form for filing a report with law enforcement, and disputes with credit reporting agencies and creditors
More informationSafaricom Data Privacy Statement
Safaricom Data Privacy Statement Page 1 of 7 Table of Content 1.0 Introduction... 3 2.0 Definitions... 3 3.0 Statement Details... 3 3.1 Collection of Information... 3 3.2 What Customer Information is Collected?...
More informationUnit A: Computer and Internet Basics
Unit A: Computer and Internet Basics TRUE/FALSE 1. Cars and appliances include digital electronics. ANS: T PTS: 1 REF: Concepts 2 2. Usually when people talk about computers, they are talking about a PC.
More informationIdentifying and Seizing Electronic Evidence. Tyler Wotring Director of Cyber Forensics National White Collar Crime Center
Identifying and Seizing Electronic Evidence Tyler Wotring Director of Cyber Forensics National White Collar Crime Center twotring@nw3c.org Cyber Forensics How does technology affect forensics? How does
More informationEmployee Privacy, Digital Evidence, and the CFE. Kenneth C. Citarella, M.B.A., J.D., CFE Managing Director, Investigations Guidepost Solutions LLC
Employee Privacy, Digital Evidence, and the CFE Kenneth C. Citarella, M.B.A., J.D., CFE Managing Director, Investigations Guidepost Solutions LLC The Good Old Days CFE s Aerial View 1. What Information
More informationOverview Bank IT examination perspective Background information Elements of a sound plan Customer notifications
Gramm-Leach Bliley Act Section 501(b) and Customer Notification Roger Pittman Director of Operations Risk Federal Reserve Bank of Atlanta Overview Bank IT examination perspective Background information
More informationAndroid Forensics Concept
Android Forensics Concept Written by Zlatko Jovanovic Widely use of personal handheld devices, opened the new area in computer forensics field, called phone, cell, or mobile forensics. In the last few
More information