Certificate of Proficiency in Digital Evidence & eDiscovery Law Practice in Nigeria

Weekly training modules are based on the textbook: DIGITAL EVIDENCE & eDISCOVERY LAW PRACTICE IN NIGERIA by the Convener of the course Emeka Arinze Esq, LLM, M.I.T (info-tech), CBSP (Certified Biometric & Surveillance Professional, CDEA (Certified Digital Evidence Analyst), CCI (Certified Cybercrime Investigator), CFP (Certified Forensic Professional).

Learn More About Emeka Arinze

WEEK

14

5 hours to complete
Cryptography and Blockchain: The Backbone of Digital Evidence Authentication. See Chapter 14 of the book for further reading

Section 84 of the Evidence Act is generally concerned with the reliability of the manner in which data or statement contained in a document produced by a computer was generated, stored or communicated; the reliability of the manner in which the integrity of the data was maintained; the manner in which the origin of the data was established and perhaps any other relevant factor that could aid in the authentication of the process employed in the production of the document. It therefore, follows that the credibility and reliance on data implies that its source is authorised and unchanged. However, it is often believed that when data is accessible to many different persons, the possibility of modification and or tempering exists.

The Focus of this Weekly Module

The integrity of digital evidence ensures that the information presented is complete and unaltered from the time of its acquisition and final disposition. If you can effectively demonstrate that a particular data (the subject of admissibility) was properly acquired and secured, it becomes easier to convince the court of its authenticity. The focus of this module is on security measures that could be implemented beforehand to help secure and preserve the authenticity of potential evidence.

Gains and Benefit

On completion of the lecture as espoused in the video, reading activity, quiz and assessment, you will be able to understand:

  • the general concept of Cryptography, incorporating public and private key infrastructure;
  • cryptographic hash function;
  • use of Hash Value as Digital Fingerprints of Electronic Document in Court Proceedings;
  • Blockchain Technology;
  • Blockchain and Admissibility Issues;
  • The Use, Relevance and Application of Hash Function in Cryptographic Process.
0 Videos (Total 00 min), 1 reading, 1 quiz, 1 assignment SEE ALL
0 videos
General concept of Cryptography (incorporating public and private key infrastructure);
Cryptographic Hash Function;
Use of Hash Value as Digital Fingerprints of Electronic Document in Court Proceedings;
Blockchain Technology;
Blockchain and Admissibility Issues;
The Use, Relevance and Application of Hash Function in Cryptographic Process
1 readings
Module Guide
1 quiz
Activity - Answer a 30 min question & answer test
1 assignment
Assignment title goes here