Educause Security Discussion mailing list archives

Re: Federal Rules of Evidence


From: "Dennis Bolton, sent from mobile" <bolton () OAKLAND EDU>
Date: Wed, 7 Sep 2011 22:13:35 +0000

Hello,

I would love a copy of this as well

Thanks,

Dennis

------Original Message------
From: Gordie Mah <gordie () ualberta ca>
To: <SECURITY () listserv educause edu>
Date: Wednesday, September 7, 2011 12:16:53 PM GMT-0600
Subject: Re: [SECURITY] Federal Rules of Evidence

Hi Kevin

Please add me to the list too.

Thanks!
Gordie

-----------------
Gordie Mah
Information Technology Security Officer
Office of the Provost and Vice-President (Academic)
University of Alberta
780.492.8607 | gordie () ualberta ca

On Wed, Sep 7, 2011 at 12:13 PM, Walter Petruska <wpetruska () usfca edu>wrote:

And please add me to the list- this must be a record number of replies
looking to be copied!

Walter Petruska CISA, CISSP, CGEIT
Information Security Officer
University of San Francisco




On Wed, Sep 7, 2011 at 10:48 AM, Bliven, Gary B. <
Gary.Bliven () quinnipiac edu> wrote:

****

Iā€™d love a copy as well.  Thanks.****

** **

-Gary****

** **

*From:* The EDUCAUSE Security Constituent Group Listserv [mailto:
SECURITY () LISTSERV EDUCAUSE EDU] *On Behalf Of *Matthew Junod
*Sent:* Wednesday, September 07, 2011 1:26 PM

*To:* SECURITY () LISTSERV EDUCAUSE EDU
*Subject:* Re: [SECURITY] Federal Rules of Evidence****

  ** **

Kevin -****

 ****

This would be great if posted to the list, but if you decide not to, I'd
love to have a copy.****

 ****

Thanks!****

 ****

Matthew C. Junod****

Information Security Officer****

Owens Community College****

"Mclaughlin, Kevin (mclaugkl)" <mclaugkl () UCMAIL UC EDU> 9/2/2011
10:18 AM >>>****

Daniel:****

We have a pretty comprehensive Standard Operating Procedure manual (SOP)
that contains portions of what you are looking for but most likely not in a
format that you might have in mind.  I can send you ā€“ and anyone else ā€“ a
copy of the Investigations section if you want.  Just let me know.  Being an
X-Fed and then state detective I think it covers chain of custody fairly
well.  I can also send you our department retention schedule that covers
active/inactive case retention limits.****

** **

- Kevin****

** **

** **

Kevin L. McLaughlin,  CISM, CISSP, GIAC-GSLC, CRISC, PMP, ITIL Master
Certified****

Assistant Vice President, Information Security & Special Projects****

University of Cincinnati****

513-556-9177****

 ****

The University of Cincinnati is one of America's top public research
institutions and the region's largest employer, with a student population of
more than 41,000.****

** **

[image: cid:image002.gif@01C879E9.E20A0EF0]****

** **

*From:* The EDUCAUSE Security Constituent Group Listserv
[mailto:SECURITY () LISTSERV EDUCAUSE EDU] *On Behalf Of *Bradley, Stephen
W. Mr.
*Sent:* Friday, September 02, 2011 9:24 AM
*To:* SECURITY () LISTSERV EDUCAUSE EDU
*Subject:* Re: [SECURITY] Federal Rules of Evidence****

** **

I too would be interested in your findings.****

** **

thx ****

steve ****

*From:* The EDUCAUSE Security Constituent Group Listserv
[mailto:SECURITY () listserv educause edu] *On Behalf Of *Mark Reboli
*Sent:* Friday, September 02, 2011 9:22 AM
*To:* SECURITY () listserv educause edu
*Subject:* Re: [SECURITY] Federal Rules of Evidence****

** **

daniel we do not have this in place but i would be very interested if you
could share your results.  i would add a checklist would be great as well to
ensure no step is missed.****

** **

m****

Mark Reboli****

Network/Telecom/IT security Manager****

Misericordia University****

570-674-6753****

** **

** **

** **

*From:* The EDUCAUSE Security Constituent Group Listserv
[mailto:SECURITY () LISTSERV EDUCAUSE EDU] *On Behalf Of *Daniel Bennett
*Sent:* Friday, September 02, 2011 9:09 AM
*To:* SECURITY () LISTSERV EDUCAUSE EDU
*Subject:* [SECURITY] Federal Rules of Evidence****

** **

Hello All,****

** **

I am wondering if anyone has developed guidelines, policy, or procedures
that you follow for every IT investigation?  This would cover chain of
custody, line of authorities, retention of information, report formats,
etc.  I am looking to standardize all investigations so if an internal
investigation ever becomes civil or criminal all evidence will  hold up.*
***

** **

Please reply on or off list.****

** **

Thanks,****

** **

Daniel Bennett****

*IT Security Analyst*

*Vice-Chair North Central PA Members Alliance*

* *

Pennsylvania College of Technology****

One College Ave****

Williamsport, PA 17701****

** **

P:570.329.4989****

E:dbennett () pct edu****

** **




--
*Walter Petruska CISSP, CISA, CGEIT*
*Information Security Officer*
infosec.usfca.edu

*University of San Francisco*
Lone Mountain North - 2nd Floor
2130 Fulton Street
San Francisco, CA 94117
*ITS Help Desk*, Phone: 415-422-6668
Fax: 415-422-6719





Current thread: