General Principles For Digital Evidence
General Principles For Digital Evidence
PREAMBLE
The Conference of International Investigators (CII) has endorsed the Uniform Principles and
Guidelines for Investigations (the “Investigation Guidelines”).1 These General Principles for
Digital Evidence supplement the Investigation Guidelines and were endorsed by the CII at its
21st Conference in May 2021.
The purpose of these General Principles is to define common principles for the proper handling
of digital evidence by investigators, external service providers, or other functions within an
Organisation handling digital evidence on behalf of, or in collaboration with, Investigative
Offices.2
The most crucial aspect of digital investigations is to ensure the reliability of digital evidence.
In a digital age, most (if not all) investigations involve digital evidence, and all investigators
should be familiar with current best practices for handling digital evidence. These principles
will focus on the integrity, confidentiality and authenticity of digital evidence.
The General Principles for Digital Evidence synthesize recommendations from practitioners
who are knowledgeable about the subject matter, scientific research and best practices.
Because of the complex issues associated with digital evidence, these recommendations may
not be feasible in all situations. The principles do not offer the only possible correct course of
action but present the most widely accepted recommendations and practices.
These General Principles do not, and are not intended to, bind any Organisation, its
Investigative Office, or its personnel; confer, impose, or imply any duties, obligations, or rights
on them or on any third parties; or affect their rights and obligations under applicable rules,
policies, and procedures (their “Policies”), including any privileges and immunities afforded to
them by international treaty, customary international law, or the laws of any respective member
state. These General Principles are to be utilized within the framework of each Organisation’s
Policies and the exercise of an Investigative Office’s professional judgment and expertise.
GENERAL CONSIDERATIONS
1. Digital evidence is defined as information and data of potential value to an investigation
that is stored or transmitted in digital form. Digital evidence differs from traditional evidence
in multiple ways:
a. It is often highly complex, frequently scattered among different physical or virtual
locations, and requires expertise and tools to collect.
b. It can easily be altered, accidentally or intentionally, possibly without leaving any trace.
c. It can easily be copied and distributed, presenting challenges to preserving
confidentiality.
d. It can be temporary in nature: network logs, Internet browsing history, social media
posts, instant messages, cached data and deleted data can be lost if not preserved in
a timely manner.
1
The Investigation Guidelines were endorsed by the Fourth CII in 2003. The second edition was endorsed by the
Tenth CII in 2009.
2
Consistent with the Investigation Guidelines, "Organisation" includes all institutions participating in the CII, and
"Investigative Office" refers to the units or functions of an Organisation mandated to investigate allegations of
wrongdoing—as defined by the Organisation—within the Organisation or associated with its projects and activities.
Conference of International Investigators (CII 2021)
2
Conference of International Investigators (CII 2021)
CHAIN OF CUSTODY
12. The Chain of Custody for digital evidence is the chronological documentation of its handling
from the time of collection until its disposal. The Chain of Custody can consist of signed
paper forms, photographs, investigator’s notes, examination reports, automatically
generated logs and forensic hashes.
13. The Chain of Custody should uniquely identify the evidence. Computers, phones and other
storage media can be identified by recording the manufacturer’s name, model number and
serial number. If no unique identifier exists, evidence can be tagged, labelled or bar coded
for that specific purpose.
14. Digital evidence such as emails, digital documents, multimedia files or website captures
can be identified by how, when and from whom it was received; or by how, when and from
where it was collected.
15. As a minimum, the Chain of Custody should document the following:
d. Unique identifiers.
e. How the evidence was collected, including the tools and methods used.
FORENSIC HASHES
16. Forensic hashes, sometimes referred to as digital fingerprints, are values that uniquely
identify digital evidence. Forensic hashes are used to verify the integrity of all types of
digital evidence and to verify that copies are identical to the original.
17. Forensic hashes are computed using mathematical functions, most commonly the
Message Digest (MD5) and Secure Hash (SHA) algorithms. Forensic hashes should be
computed immediately when the evidence is collected or received and should be stored
securely together with the original evidence.
EXAMINATION
18. Examination of digital evidence should only be performed on work copies.
19. Computers, mobile devices and original external storage media should only be examined
by trained digital forensic examiners. Browsing a computer/mobile device or connecting an
external storage device to preview its content could compromise the integrity of digital
evidence and should be avoided.
20. When using analysis tools that use keyword searches, care should be taken that either an
Optical Character Recognition (OCR) tool was used to convert all non-searchable content
before indexing, or non-searchable documents such as document scans are manually
reviewed.
21. For data and network security reasons, it is recommended that digital evidence is examined
on a dedicated computer isolated from all networks.
3
Conference of International Investigators (CII 2021)
22. Using personal computers or storage media to store or view digital evidence and using
personal accounts to search for or download information from the Internet should be
avoided.
23. All tools and methods used for the examination of digital evidence should be documented.
AUTHENTICATION
24. Investigators should be aware that digital evidence can easily be manipulated without
leaving any trace.
25. It is recommended that digital evidence provided by third parties, e.g., subjects,
complainants or witnesses is authenticated. Evidence should preferably be collected
directly from its native environment, e.g., a computer, a mobile device, a social media
account or a website.
26. If collection from the source is not possible (e.g., a witness is not willing to submit their
personal device for digital forensic acquisition), the investigator should attempt to verify the
evidence by confirming its existence on the original device or the online account.
27. Document metadata that is not examined in its native environment (the device used to
create or modify the document) should not be taken at face value.
STORAGE, TRANSPORT AND DISPOSAL
28. To maintain confidentiality, access to all digital evidence (including work copies) should be
limited to authorized personnel only.
29. If evidence is stored on networked servers, or is being transmitted through networks, strict
access control and encrypted transmissions should be used. Portable storage devices
used to transport evidence should be encrypted.
30. Digital evidence should be transported in appropriate packaging and protected from
extreme temperatures, humidity, physical shock, static electricity and magnetic fields.
31. Every computer and storage device used to store or view digital evidence should be
properly sanitized before it is transferred to another user or recycled.
PUBLICATION AND IMPLEMENTING GUIDELINES
32. These General Principles have been endorsed by the CII. Any Organisation may refer to
these General Principles in its own Policies or may publish them itself in accordance with
its Policies. In addition to these General Principles, in July 2020 the Inter-Agency Digital
Investigations Working Group (DIG) published Digital Evidence Guidelines which may be
used for further non-binding guidance.