• INCITS/ISO/IEC 27037 : 2014

    Superseded A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.

    INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR IDENTIFICATION, COLLECTION, ACQUISITION AND PRESERVATION OF DIGITAL EVIDENCE

    Available format(s):  Hardcopy, PDF

    Superseded date:  18-02-2020

    Language(s):  English

    Published date:  01-01-2014

    Publisher:  Information Technology Industry Council

    Add To Cart

    Table of Contents - (Show below) - (Hide below)

    Foreword
    Introduction
    1 Scope
    2 Normative reference
    3 Terms and definitions
    4 Abbreviated terms
    5 Overview
    6 Key components of identification, collection, acquisition and
      preservation of digital evidence
    7 Instances of identification, collection, acquisition
      and preservation
    Annex A (informative) - DEFR core skills and competency
            description
    Annex B (informative) - Minimum documentation requirements
            for evidence transfer
    Bibliography

    Abstract - (Show below) - (Hide below)

    Gives guidelines for specific activities in handling digital evidence, which are identification, collection, acquisition and preservation of digital evidence that may be of evidential value.

    General Product Information - (Show below) - (Hide below)

    Document Type Standard
    Publisher Information Technology Industry Council
    Status Superseded
    Superseded By

    Standards Referencing This Book - (Show below) - (Hide below)

    ISO/IEC 17025:2005 General requirements for the competence of testing and calibration laboratories
    ISO/IEC 27001:2013 Information technology — Security techniques — Information security management systems — Requirements
    ISO/IEC 27035:2011 Information technology Security techniques Information security incident management
    ISO/IEC 27031:2011 Information technology Security techniques Guidelines for information and communication technology readiness for business continuity
    ISO/IEC 24760-1:2011 Information technology Security techniques A framework for identity management Part 1: Terminology and concepts
    ISO/IEC 27002:2013 Information technology Security techniques Code of practice for information security controls
    ISO/IEC 17020:2012 Conformity assessment — Requirements for the operation of various types of bodies performing inspection
    ISO/IEC 17043:2010 Conformity assessment — General requirements for proficiency testing
    ISO/IEC 17024:2012 Conformity assessment — General requirements for bodies operating certification of persons
    ISO/TR 15801:2017 Document management — Electronically stored information — Recommendations for trustworthiness and reliability
    ISO/IEC 27000:2016 Information technology Security techniques Information security management systems Overview and vocabulary
    • Access your standards online with a subscription

      Features

      • Simple online access to standards, technical information and regulations
      • Critical updates of standards and customisable alerts and notifications
      • Multi - user online standards collection: secure, flexibile and cost effective