{"id":256,"date":"2012-12-30T08:43:51","date_gmt":"2012-12-30T16:43:51","guid":{"rendered":"http:\/\/inlandinvestigationsgroup.com\/main\/?p=256"},"modified":"2013-01-05T17:31:29","modified_gmt":"2013-01-06T01:31:29","slug":"separating-work-and-personal-data-in-a-digital-industry-for-peace-officers-published-082011-porac-magazine","status":"publish","type":"post","link":"https:\/\/inlanddiscovery.com\/?p=256","title":{"rendered":"Separating Work and Personal Data in a Digital Industry &#8211; For Peace Officers"},"content":{"rendered":"<p>This article was\u00a0originally\u00a0published by PORAC Magazine August 2011.<\/p>\n<p><em>\u201cI can never fear that things will go far wrong where common sense has fair play.\u201d<\/em><br \/>\n<em> \u2013 Thomas Jefferson<\/em><\/p>\n<p>Over the last twenty years, technology has become an integral part of society. Consequently, law enforcement relies on various technologies to perform daily operations efficiently.<\/p>\n<p>As a new patrol officer almost eighteen years ago, I went 10-8 with a note pad and a map book to navigate the city. Today, calls are transmitted to an officer\u2019s patrol unit and viewed on an MDC (Mobile Data Computer) or MDT (Message Distribution Terminal). GPS mapping systems assist officers in locating addresses and in finding the most feasible routes to calls. We\u2019ve traded our note pads for computers and our map books for satellites.<\/p>\n<p>Patrol officers are commonly issued mobile computers, SmartPhones, GPS navigation units, and other technologies to aid with their duties. Over the last few years governmental agencies have been making a concerted effort to update their employee policy regarding the use of these types of devices. Unfortunately, problems can arise when department-issued electronic equipment is utilized for personal activities. In this context, personal activities are defined as the implementation of work-issued technologies for purposes that do not involve work-related tasks.<\/p>\n<p>On the side I own and operate an investigations and consulting business, where I contract computer forensic services to other entities involved in handling personnel investigations. Most of these examinations involve employees who\u2019ve used company equipment for inappropriate activities. Additionally, I\u2019m often asked to examine the content and duration of Internet usage for work-related violations. I generally do not participate with internal affairs investigations by way of my employment at the Corona Police Department. Some of the private sector investigations I\u2019ve conducted begin with seemingly minor offenses, but result in employee termination after the auditing of company-issued devices.<\/p>\n<p>Most agencies have computer usage policies in which department equipment containing electronically stored information, commonly referred to as ESI, can be seized and audited by employers at any time, for any reason. Auditing includes the careful examination of any data, including PERSONAL DATA, stored on these devices. Data is magnetic information stored on metal platters of hard drives or flash memory chips. Keep in mind that funny or gag emails and texts sent by family, friends, and colleagues often contain off-color images or videos. In other words, if you store any personal information on a department-issued device, either intentionally or unintentionally, your employer has access to it. What\u2019s more, sometimes agency-issued computers, cell phones, and emails belonging to government employees may be viewed, by the public and the media, via an FOIA (Freedom of Information Act) request.<\/p>\n<p>Depending on the group policy settings your I.T. Department configures on its devices, inappropriate data might be deletable. However, in a Windows environment, simply deleting the file doesn&#8217;t remove the data. Therefore, computer forensic examiners routinely recover deleted information from unallocated disk space.<\/p>\n<p>The only way to ensure that data is removed from your device\u2019s storage media is to \u201cwipe\u201d the data. Wiping involves a process of overwriting (replacing) old data with new data. Often, the subject data is overwritten with zeros. Importantly, studies show that most of today\u2019s media can be effectively cleared by one overwrite.<\/p>\n<p>Sometimes cited as a standard for sanitization to counter data remanence, a more comprehensive wiping method of wiping is known as the DOD 5220.22-M U.S. Standard 7 pass wipe. Wiping data in a Windows environment may remove the contents of a file; however, it will leave behind trace artifacts showing that the file was present on the device.<\/p>\n<p>It\u2019s important to note that some agencies may have policies regarding the destruction of departmental data. In this case, attempts to completely wipe issued devices of all data, including software installed by your agency, could result in a policy violation. Be sure you review your department\u2019s computer usage policies to comply with their policies.<\/p>\n<p><strong>The following are steps you can take to prevent your work and personal data from being commingled:<\/strong><\/p>\n<p><strong>1. If you are issued a work laptop, do NOT use if for personal business (i.e. checking your personal email, bank balances, YouTube or video hosting sites, or ANY social networking accounts).<\/strong> Consider purchasing your own WebBook or Netbook (they cost around $300.00 at Costco or Sam\u2019s Club).<\/p>\n<p><strong>2. Purchase your own personal cell phone or Smartphone.<\/strong> Don\u2019t use your work phone to make personal calls, access your personal email, surf the web, or store your data. The adage \u201cbetter safe than sorry\u201d applies here. Also, keep in mind that most cell phone carriers now have the ability to provide GPS tacking for their cellular products. This gives your employer the potential to know your exact location any time you\u2019re carrying the device.<\/p>\n<p><strong>3. Do NOT use your work e-mail account for personal business.<\/strong> Tell your friends, family, and colleagues to send those messages to your private email account. Work email is the easiest ESI for agencies to audit and represents the foremost electronic data disciplinary problem for law enforcement. If you don\u2019t have a personal email account, get one for free at gmail.com.<\/p>\n<p><strong>4. Unless asking questions directly relating to calls or work activities consider an \u201c87\u201d and meet with your partner to discuss personal business.<\/strong> DON\u2019T use your MDT\/ MDC for this type of communication. THINK about what you\u2019re saying! Imagine having your MDT\/ MDC comments read in open court. Take the following example:<\/p>\n<p><em>&#8220;I haven&#8217;t beaten anyone this bad in a long time.&#8221; &#8212; Officer Laurence Powell <\/em><br \/>\n<em>(MDT message from Powell to another officer after his encounter with Rodney King in 1991).<\/em><\/p>\n<p><strong>5. If you\u2019re involved in a major incident, assume that any device in your possession (personal or department-issued) can have its ESI subpoenaed and reviewed.<\/strong> Consider taking a digital break for at least 48 hours (no cell phones, texting, computers, emails, etc.). At the very least, wait until you\u2019ve had the opportunity to get professional legal guidance.<\/p>\n<p><strong>6. If you have a social networking account (e.g. Twitter, FriendFinder, Facebook, LinkedIn or MySpace), do not access it during work hours.<\/strong> Don\u2019t post law enforcement-related pictures or references on your account. This is a safety issue and probably, depending on your agency, will result in policy violation. Assume that your employer or supervisor will routinely browse your social networking accounts.<\/p>\n<p><strong>7. Don\u2019t post any potentially damaging information on social networking accounts; it may be cited in court.<\/strong> Your social networking activities can be used by the prosecution or defense as a character reference against you. The Facebook newsfeed post you made about arresting the defendant could be cited in court during preliminary or trial. As a general rule, use the most restrictive privacy settings on your social networking accounts and \u2018vet\u2019 your friends. Even with privacy settings in place, you should still be very conservative with the information you post.<\/p>\n<p>There is no such thing as being too cautious where private data is concerned. By following these simple guidelines and using common sense, you\u2019re choosing not to be a victim of circumstance.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>This article was\u00a0originally\u00a0published by PORAC Magazine August 2011. \u201cI can never fear that things will go far wrong where common sense has fair play.\u201d \u2013 Thomas Jefferson Over the last twenty years, technology has become an integral part of society. Consequently, law enforcement relies on various technologies to perform daily &hellip; <a href=\"https:\/\/inlanddiscovery.com\/?p=256\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[5,4],"tags":[],"class_list":["post-256","post","type-post","status-publish","format-standard","hentry","category-computer-information","category-internet-safety"],"_links":{"self":[{"href":"https:\/\/inlanddiscovery.com\/index.php?rest_route=\/wp\/v2\/posts\/256","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/inlanddiscovery.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/inlanddiscovery.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/inlanddiscovery.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/inlanddiscovery.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=256"}],"version-history":[{"count":9,"href":"https:\/\/inlanddiscovery.com\/index.php?rest_route=\/wp\/v2\/posts\/256\/revisions"}],"predecessor-version":[{"id":324,"href":"https:\/\/inlanddiscovery.com\/index.php?rest_route=\/wp\/v2\/posts\/256\/revisions\/324"}],"wp:attachment":[{"href":"https:\/\/inlanddiscovery.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=256"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/inlanddiscovery.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=256"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/inlanddiscovery.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=256"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}