The electronic devices such as the ones shown below may contain potential evidence associated with certain activity. Unless an emergency exists, the device should not be operated. Should it be necessary to access information from the device, all actions associated with the manipulation of the device should be documented. Many of the items below may contain data that could be lost if not handled properly.

dictation machine
cables
mobile telephones
photocopier
digital cameras (still and video)
games consoles
external drives
flash memory cards
GPS devices e.g. TomTom
pagers
printers (if active, allow to complete printing)
scanners
telephones
answering machines
caller ID devices
other hardware
PDA device
removable media, USB devices
CD jukeboxes
fax machines
floppies, diskettes, CDROM, DVD
PCMCIA cards
MP3 Players
dongle   or  other  hardware  protection devices (keys) for software
smart cards/secure ID tokens
wireless access point

Note: When seizing removable media, ensure that you take the associated device that created the media (e.g. tape drive, cartridge drives such as Zip, Jaz).

principle: Computer evidence, like all other evidence, must be handled carefully and in a manner that preserves its evidential value. This relates not just to the integrity of an item or device, but also to the electronic data it contains. Certain types of computer evidence therefore require special collection, packaging, and transportation. Consideration should be given to protect data that may be susceptible to damage or alteration from electromagnetic fields such as those generated by static electricity, magnets, radio transmitters, and other devices.

policy: Electronic evidence should be collected according to your organizational guidelines. In the absence of guidelines outlining procedures for electronic evidence collection, the following procedures are recommended.

Note: Prior to collection of evidence, it is assumed that locating and documenting has been done as previously described. Appreciate that other types of evidence such as DNA, or fingerprints may exist.

Data recovery Salon welcomes your comments and share with us your ideas, suggestions and experience. Data recovery salon is dedicated in sharing the most useful data recovery information with our users and only if you are good at data recovery or related knowledge, please kindly drop us an email and we will publish your article here. We need to make data recovery Salon to be the most professional and free data recovery E-book online.