NotesFAQContact Us
Collection
Advanced
Search Tips
Back to results
Peer reviewed Peer reviewed
Direct linkDirect link
ERIC Number: EJ784077
Record Type: Journal
Publication Date: 2008-Jan
Pages: 4
Abstractor: ERIC
ISBN: N/A
ISSN: ISSN-0192-592X
EISSN: N/A
CSI: Hard Drive
Sturgeon, Julie
T.H.E. Journal, v35 n1 p22-24, 26, 28 Jan 2008
Acting on information from students who reported seeing a classmate looking at inappropriate material on a school computer, school officials used forensics software to plunge the depths of the PC's hard drive, searching for evidence of improper activity. Images were found in a deleted Internet Explorer cache as well as deleted file space. Additional evidence collected from log files was joined with the software-gathered evidence to identify the student who was logged on at the time the images appeared on the computer. Once the investigation concluded, the offending student was suspended for three days. Later, in a suit brought by the student's parents, the district successfully defended its position by showing the use of proven evidence-collecting methods and procedures--and by providing a written appropriate use policy that the student was shown to have violated. Today, forensic software tools can root out the truth of any misappropriated computers. Two computer investigative software programs are described, and tips for using these types of programs are suggested.
1105 Media, Inc. Available from: T.H.E. Journal Magazine. P.O. Box 2170, Skokie, IL 60076. Tel: 866-293-3194; Tel: 866-886-3036; Fax: 847-763-9564; e-mail: THEJournal@1105service.com; Web site: http://www.thejournal.com/
Publication Type: Journal Articles; Reports - Descriptive
Education Level: N/A
Audience: N/A
Language: English
Sponsor: N/A
Authoring Institution: N/A
Grant or Contract Numbers: N/A