Transcript text: that:
describes a post-seizure strategy for screening the privileged files.
they swear not to reveal privileged information.
outlines the need to utilize the privileged information.
the information collected will only be released to the judge.
15. In every computer search investigators should strive to:
minimize unwarranted intrusions upon privacy.
collect as much information regarding the suspect as possible.
destroy all unrelated files on the suspect computer.
expand the search of the seized files to identify additional crimes.
SUBMIT
1
2
13:17
Type here to search