Abstract :
"Computer forensics" is defined as the recovery of deleted computer-based information and the science of examining and piecing back together the who, what, when, where, and how of computer-related conduct. According to the other definition, computer forensics deals with the preservation, identification, extraction, and documentation of computer evidence as stated in A.J. Marcella and R.S. Greenfield (2002). More and more venture companies and risk consultant company try to apply this computer forensics into the business in US. Seminars to advertise their forensic business are held even in Japan these days. Forensic services includes (1) expert testimony and reporting services, (2) research and recreate critical events, (3) custom forensic analysis, (4) legal and technical consulting. And more broadly, it involves the identifying "hackers" who try to intrude into the systems of ISP and /or deny the service of them. Many books of which titles are such as "Computer forensics" are published. NPA published their concern about the "computer forensics" in their WebPages. In the nature, "computer forensics" has close relationships with legal system. The purpose of this article is to make a comparative study of influences over the forensic approach by the differences of the legal systems.
Keywords :
Internet; computer crime; consultancies; information industry; risk management; ISP; Japan these; WebPages; comparative study; computer evidence; computer forensics business; computer-related conduct; custom forensic analysis; deleted computer-based information; expert testimony; forensic approach; forensic services; hackers identification; legal consulting; legal system; recreate critical events; reporting services; research critical events; risk consultant company; technical consulting; venture companies; Books; Companies; Computer hacking; Data mining; Documentation; Forensics; Law; Legal factors; Seminars; Testing;