Which action is least appropriate during documentation of chain of custody?

Prepare for the Computer Hacking Forensic Investigator v11 exam. Study with flashcards and multiple choice questions. Each question includes hints and explanations. Get exam-ready efficiently!

Multiple Choice

Which action is least appropriate during documentation of chain of custody?

Explanation:
Chain of custody is about preserving evidence in its original state while keeping a clear, auditable record of every handling step. Documenting who accessed the evidence and when builds accountability, time-stamping creates an immutable timeline of custody events, and sealing in tamper-evident bags protects the item from unauthorized access and makes any tampering evident. The action that is least appropriate is modifying the original evidence. Altering the original material directly compromises its integrity and can render it inadmissible in court. If any changes are truly needed, work from a verified copy or forensic image and document the process with a proper audit trail, leaving the original untouched. This preserves the evidentiary value and ensures a trustworthy chain of custody.

Chain of custody is about preserving evidence in its original state while keeping a clear, auditable record of every handling step. Documenting who accessed the evidence and when builds accountability, time-stamping creates an immutable timeline of custody events, and sealing in tamper-evident bags protects the item from unauthorized access and makes any tampering evident. The action that is least appropriate is modifying the original evidence. Altering the original material directly compromises its integrity and can render it inadmissible in court. If any changes are truly needed, work from a verified copy or forensic image and document the process with a proper audit trail, leaving the original untouched. This preserves the evidentiary value and ensures a trustworthy chain of custody.

Subscribe

Get the latest from Passetra

You can unsubscribe at any time. Read our privacy policy