Obtaining Digital Evidence
Viewing of any pornographic material is prohibited in any firm including company x. the employee found viewing and forwarding child pornography from the office was thus legitimately fired. It is the responsibility of the law enforcement to investigate and prosecute the culprit for the crime. The head of the security of the company has a duty to assist the law enforcers in obtaining variable data to be used as evidence against the suspect (SEARCH. 2001). Possession of child pornographic material and forwarding of the same, are among the most targeted issues for investigation by the federal as well as state law enforcement authorities. The law enforcers have a duty to prove that the employee was aware of the pornographic material. This is because according to the law, an individual has to knowingly possess pornographic material for them to be guilty of such an offense (Persson, 2001).
The responsibility of the head of security in the company is to assist the law enforcers to prove that the pornographic material was not transferred to the employer's computer without his knowledge or intention. This situation will require the application of expert computer forensic knowledge to establish that may not be readily accessed by the investors (Brown, 2002). Since the law enforcers will likely be having a search warrant permitting them to seize computers and any other devices such as CDs and external storage material. The head of security head should facilitate the search process by directing the investigating officers to the computer office of the employee. The office should ensure that no information is deleted from the computers and no hardware is removed or destroyed by the employee (Brown, 2002).
Law enforcement agencies, as well as the Internet, have developed new considerations and avenues for prosecuting child pornographic cases. This is because Internet child pornography cases may be difficult and might require special resources. Computers need to be upgraded in order to collect enough data to launch an investigation. This calls for various changes in the investigation process. Experts would be required to work online to collect the necessary data and in some instances, particular digital technology may be required to track the culprits. In extreme cases, law enforcement agencies may be required to incorporate both traditional and undercover investigation procedures. The main challenge to the law enforcers investigating this case would be to prove that the images discovered fit the appropriate definitions child pornography. The head of security will be required to fully assist the law enforcement agencies in accessing any useful material for the investigation (Brown, 2002).