Certificate of Proficiency in Digital Evidence & eDiscovery Law Practice in Nigeria

Weekly training modules are based on the textbook: DIGITAL EVIDENCE & eDISCOVERY LAW PRACTICE IN NIGERIA by the Convener of the course Emeka Arinze Esq, LLM, M.I.T (info-tech), CBSP (Certified Biometric & Surveillance Professional, CDEA (Certified Digital Evidence Analyst), CCI (Certified Cybercrime Investigator), CFP (Certified Forensic Professional).

Learn More About Emeka Arinze

WEEK

15

5 hours to complete
Chain of Custody: It’s Application to Digital Evidence. See Chapter 15 of the book for further reading

Proper documentation and the ability to validate evidence for admissibility are essential when a matter goes to trial. Ideally, a party seeking to introduce an item of physical evidence in court must prove that the item was that which was taken from a particular person or place which makes the item relevant as evidence in the trial. Such proof is provided by testimony identifying the item as having been taken from that person or place, and by evidence tracing custody of the item from the time it was taken until it is offered in evidence. It is important to, not only document what is being obtained, but who is doing the collection, when it was collected, and other details that validate the evidence. A party's ability to present evidence in a case rests heavily on their ability to prove that the collection process was sound. If a mis-step occurred and was not properly documented, it can invalidate evidence, which can ultimately change the narratives and the entire outcome of a case.

The Focus of this Weekly Module

The essential element in digital forensics is its faithful adherence to chain of custody, with a view to preserving the integrity of the digital evidence as well as a procedure for performing documentation chronologically. In this case, chain of custody documents the terms related to where, when, why, who, how in the use of evidence at any stage of the investigative process. This weekly module focuses on a sound chain of custody that verifies that information is not altered either in the copying process or during analysis. From the moment evidence is obtained, a trail must document how it has been handled, by whom and for what purpose.

Gains and Benefit

On completion of the lecture as espoused in the video, reading activity, quiz and assessment, you will be able to understand:

  • the Phrase, “Chain of Custody” and Its Documentation;
  • Chain of Custody in the Digital Environment;
  • Chain of Custody in Certain eDocument and their Authentication Process, such as Audio and Video Files;
  • Party Admitting and Party Objecting to Digital Chain of Custody: What to Watch Out For
4 Videos (Total 00 min), 1 reading, 1 quiz, 1 assignment SEE ALL
4 videos
Chain of Custody and Its Documentation;
Chain of Custody in the Digital Environment;
Chain of Custody in Certain eDocument and their Authentication Process, such as Audio and Video Files;
Party Admitting and Party Objecting to Digital Chain of Custody: What to Watch Out For.
1 readings
Module Guide
1 quiz
Activity - Answer a 30 min question & answer test
1 assignment
Assignment title goes here