Evidence Security

Understanding Roles and Permissions in DEM
Introduction Administration, control, and access of various entities in a Portal play a key role in application management with respect to an organization....
Thu, Oct 27, 2022 at 4:46 AM
How to Enable Content Tamper Detection App
Overview Evidence tampering is a criminal offense. It is an act in which a person alters, falsifies, or conceals evidence with the intent to interfer...
Thu, Oct 27, 2022 at 7:29 AM
Understanding Alert Generation Policy for Sensitive Evidence and Cases
Introduction A digital evidence may undergo changes within its lifecycle (moderation, update, delete, re-upload so on and so forth) - most of these activit...
Thu, Oct 27, 2022 at 6:36 AM
How to Subscribe to Alerts on Flagged (Sensitive) Evidence Files
Overview Once a user has been authorized to flag content, they can subscribe to a list of events applicable to an evidence or case that they have access to...
Thu, Oct 27, 2022 at 7:32 AM
Understanding Log Access Levels
Introduction In Law Enforcement Organizations, there are multiple teams which  include a Case Investigation Team and a team that is responsible for Auditin...
Thu, Oct 27, 2022 at 7:37 AM
How to Enable and Assign Log Access Level
Overview Limiting access to the Audit Logs and Chain of Custody is a vital security functionality of Digital Evidence Management. Log Access Level works in...
Thu, Oct 27, 2022 at 7:38 AM
Understanding Reason Provisioning on Access of Evidence or Cases
Introduction Digital Evidence and Cases are the building blocks of any Digital Evidence Management System. The delicacy and sensitivity around the access o...
Thu, Oct 27, 2022 at 8:00 AM