All language subtitles for 4. Handling data

af Afrikaans
ak Akan
sq Albanian
am Amharic
ar Arabic Download
hy Armenian
az Azerbaijani
eu Basque
be Belarusian
bem Bemba
bn Bengali
bh Bihari
bs Bosnian
br Breton
bg Bulgarian
km Cambodian
ca Catalan
ceb Cebuano
chr Cherokee
ny Chichewa
zh-CN Chinese (Simplified)
zh-TW Chinese (Traditional)
co Corsican
hr Croatian
cs Czech
da Danish
nl Dutch
en English
eo Esperanto
et Estonian
ee Ewe
fo Faroese
tl Filipino
fi Finnish
fr French
fy Frisian
gaa Ga
gl Galician
ka Georgian
de German
el Greek
gn Guarani
gu Gujarati
ht Haitian Creole
ha Hausa
haw Hawaiian
iw Hebrew
hi Hindi
hmn Hmong
hu Hungarian
is Icelandic
ig Igbo
id Indonesian
ia Interlingua
ga Irish
it Italian
ja Japanese
jw Javanese
kn Kannada
kk Kazakh
rw Kinyarwanda
rn Kirundi
kg Kongo
ko Korean
kri Krio (Sierra Leone)
ku Kurdish
ckb Kurdish (Soranî)
ky Kyrgyz
lo Laothian
la Latin
lv Latvian
ln Lingala
lt Lithuanian
loz Lozi
lg Luganda
ach Luo
lb Luxembourgish
mk Macedonian
mg Malagasy
ms Malay
ml Malayalam
mt Maltese
mi Maori
mr Marathi
mfe Mauritian Creole
mo Moldavian
mn Mongolian
my Myanmar (Burmese)
sr-ME Montenegrin
ne Nepali
pcm Nigerian Pidgin
nso Northern Sotho
no Norwegian
nn Norwegian (Nynorsk)
oc Occitan
or Oriya
om Oromo
ps Pashto
fa Persian
pl Polish
pt-BR Portuguese (Brazil)
pt Portuguese (Portugal)
pa Punjabi
qu Quechua
ro Romanian
rm Romansh
nyn Runyakitara
ru Russian
sm Samoan
gd Scots Gaelic
sr Serbian
sh Serbo-Croatian
st Sesotho
tn Setswana
crs Seychellois Creole
sn Shona
sd Sindhi
si Sinhalese
sk Slovak
sl Slovenian
so Somali
es Spanish
es-419 Spanish (Latin American)
su Sundanese
sw Swahili
sv Swedish
tg Tajik
ta Tamil
tt Tatar
te Telugu
th Thai
ti Tigrinya
to Tonga
lua Tshiluba
tum Tumbuka
tr Turkish
tk Turkmen
tw Twi
ug Uighur
uk Ukrainian
ur Urdu
uz Uzbek
vi Vietnamese
cy Welsh
wo Wolof
xh Xhosa
yi Yiddish
yo Yoruba
zu Zulu
Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated: 1 00:00:00,210 --> 00:00:04,620 In this video, we're talking about handling data in dealing with informational overload. 2 00:00:05,790 --> 00:00:12,930 Now when you're running a health investigation, someone is most likely tasking you with running that 3 00:00:12,930 --> 00:00:13,770 investigation. 4 00:00:14,160 --> 00:00:17,490 So if that's the case, you'll probably want to get a few things in place. 5 00:00:18,530 --> 00:00:23,590 One, you want to get the contact information for whoever you need to deal with, whoever you need, 6 00:00:23,600 --> 00:00:26,030 update or hand over your report to. 7 00:00:26,870 --> 00:00:29,060 You also want to find out what the scope of work is. 8 00:00:30,240 --> 00:00:37,470 You want to see what was considered out of scope, especially things like those investigations tend 9 00:00:37,470 --> 00:00:41,730 to be very private, very confidential. 10 00:00:41,730 --> 00:00:44,880 So you do want to find out what's going to be outside that scope. 11 00:00:44,880 --> 00:00:47,790 And so that way you get a better idea of. 12 00:00:49,090 --> 00:00:57,370 How you need to frame your your investigation and not violate anything, whether it's legal or if it's 13 00:00:57,640 --> 00:00:59,650 work related or anything else. 14 00:01:00,880 --> 00:01:05,620 You want to find out if there's any special considerations you need to take in taking into account for, 15 00:01:06,190 --> 00:01:08,560 you want to see what the timeline is that way, you know? 16 00:01:09,550 --> 00:01:13,540 How quickly you need move on this or how thoroughly you can, you're able to be on it. 17 00:01:14,230 --> 00:01:17,080 You won't find out any special data retention requests. 18 00:01:17,080 --> 00:01:19,640 Things like does the data have to be encrypted? 19 00:01:19,660 --> 00:01:23,350 Do you need to file shredded afterwards things of that nature? 20 00:01:24,070 --> 00:01:31,330 You also want to find out or actually get in writing whether to email a letter type, what not. 21 00:01:32,780 --> 00:01:34,340 The entire scope of this work. 22 00:01:35,570 --> 00:01:37,400 There's a few reasons for that one. 23 00:01:37,940 --> 00:01:40,460 It makes it easier to actually have it in writing. 24 00:01:40,490 --> 00:01:47,150 In most cases, that way, you can go back and reference it and also it helps liability on both sides. 25 00:01:47,780 --> 00:01:53,030 If something goes wrong, you could point to, well, this is a scope of work that you gave me, and 26 00:01:53,030 --> 00:01:54,170 I stayed within the scope. 27 00:01:54,380 --> 00:02:00,830 Likewise, it works in favor of the employer or whoever's asking you from the investigation also to 28 00:02:00,830 --> 00:02:02,990 make sure that you do stay in that scope of work. 29 00:02:06,110 --> 00:02:10,460 So when it comes to data collection, you're going to be collecting a lot of different information during 30 00:02:10,460 --> 00:02:13,760 your investigation and most likely to collect a lot of things. 31 00:02:13,850 --> 00:02:19,700 These things like names, addresses, email addresses, phone numbers, social media posts, photos, 32 00:02:19,700 --> 00:02:22,010 text homes, passwords, et cetera. 33 00:02:22,820 --> 00:02:28,820 The amount of data you can collect can easily become overwhelming, especially when you're starting 34 00:02:28,820 --> 00:02:29,180 out. 35 00:02:31,300 --> 00:02:36,220 The uncertainty of what to keep and want to get rid of can also be pretty stressful. 36 00:02:37,350 --> 00:02:39,000 So how do we handle this? 37 00:02:39,030 --> 00:02:44,910 Well, there's a few tips in order to keep calm, and this is what I tend to do so. 38 00:02:46,030 --> 00:02:51,100 When I collect information, I first make sure that it's going to be within the scope of work. 39 00:02:52,050 --> 00:02:57,450 Anything and everything that may fall into that scope, I could I go ahead and collect? 40 00:02:57,750 --> 00:03:03,720 Once I get that information, I break it out in different sections phone numbers, names, social media 41 00:03:03,720 --> 00:03:06,390 posts, photos, whatnot. 42 00:03:07,500 --> 00:03:13,620 It helps breaking that information out, it helps consolidate down, and also when you're going back 43 00:03:13,620 --> 00:03:16,770 and reference in the information, it makes a little bit easier. 44 00:03:16,770 --> 00:03:20,310 You're not looking at a big jumble of information and trying to sort through it. 45 00:03:20,700 --> 00:03:25,200 No one's broken up into smaller sections say, Well, I need to get to the phone numbers. 46 00:03:25,210 --> 00:03:29,010 Let me check the phone numbers while I have it in this container right there. 47 00:03:29,100 --> 00:03:31,260 Listen names, friends, associates, whatnot. 48 00:03:31,260 --> 00:03:36,180 OK, I have that in this container I can look through there in it makes indexing it a lot quicker. 49 00:03:37,350 --> 00:03:43,650 And once I had my initial data, look at the scope work and determine what my next move is, if the 50 00:03:43,650 --> 00:03:46,700 job is done, if I see a Twitter user does it. 51 00:03:47,610 --> 00:03:50,070 I'll take a look at the the name. 52 00:03:50,460 --> 00:03:52,050 Is there a name associated in there? 53 00:03:52,170 --> 00:03:54,000 I'll take a look at their friends to their friends. 54 00:03:54,000 --> 00:03:56,140 Have give up a location or a name. 55 00:03:56,760 --> 00:03:58,560 Did they give orders or photos? 56 00:03:58,560 --> 00:04:01,290 I could pull the geo location off of things like that. 57 00:04:01,530 --> 00:04:07,920 So once you have your data, at least initial data and you started going through it and you review your 58 00:04:07,920 --> 00:04:12,510 scope of work, you can kind of figure out what your next move is going to be and kind of splinter off 59 00:04:12,510 --> 00:04:13,110 from there. 60 00:04:16,060 --> 00:04:18,430 So additional data handling considerations. 61 00:04:18,910 --> 00:04:23,560 You want to keep your investigation and data isolate to your virtual machine. 62 00:04:23,590 --> 00:04:25,090 No, there's a few reasons for that. 63 00:04:26,260 --> 00:04:31,930 Having your information isolate your virtual machine one, you can make sure your virtual machine is 64 00:04:31,930 --> 00:04:38,410 clean by reverting back to the snapshot before you do your investigation to if you make a backup of 65 00:04:38,410 --> 00:04:38,890 the VA. 66 00:04:40,000 --> 00:04:40,810 Anything happens. 67 00:04:40,810 --> 00:04:45,910 You can always you always have that backup and purity of that information. 68 00:04:46,960 --> 00:04:51,100 Also, it's easier to just go and encrypt that VM or if you're. 69 00:04:52,490 --> 00:04:57,200 Handing over the information information, you could make a copy of that volume through a USB drive 70 00:04:57,200 --> 00:04:57,860 for your client. 71 00:04:59,580 --> 00:05:02,340 You want it if you need to keep the operation secure. 72 00:05:02,370 --> 00:05:06,030 Consider encrypting your data in the VM, you can do things like. 73 00:05:07,630 --> 00:05:11,810 A number of data encryption options, encrypted small drive on on that. 74 00:05:12,860 --> 00:05:18,410 That way, if something have served him against compromise, your computer gets stolen whatnot, that 75 00:05:18,410 --> 00:05:19,730 information's encrypted. 76 00:05:20,090 --> 00:05:23,150 Likewise, you could encrypt the entire VM. 77 00:05:24,830 --> 00:05:31,430 I tried that a couple of times I have run into issues personally, but if if you're dealing with a lot 78 00:05:31,430 --> 00:05:33,050 of stuff, you might just want to encrypt the data. 79 00:05:33,050 --> 00:05:39,530 But again, if you're if you're need that extra layer security, you could always change the password 80 00:05:39,530 --> 00:05:45,170 default password on your VM for Trace Labs, the one that we're using here or whatever volume that you're 81 00:05:45,170 --> 00:05:45,680 using. 82 00:05:46,280 --> 00:05:48,320 And I do recommend doing that anyways. 83 00:05:49,550 --> 00:05:51,410 That's just an extra layer security. 84 00:05:52,330 --> 00:05:57,640 Also, depending on your scope of work, you may be working with a no contact investigation. 85 00:05:58,680 --> 00:06:01,260 Things like do not contact the target directly. 86 00:06:01,470 --> 00:06:09,330 Do not contact Target's friends or family, but things like do not send a password reset for, say, 87 00:06:09,330 --> 00:06:11,930 Facebook because it might alert the target. 88 00:06:11,940 --> 00:06:14,970 You need to pay special attention to these types of requests. 89 00:06:16,130 --> 00:06:21,710 And unless expressly allowed, do not share specific information about your investigation with anyone 90 00:06:21,710 --> 00:06:25,430 outside of the investigation group before, during or even after. 91 00:06:26,440 --> 00:06:30,460 Depending on what your investigation is, it's most likely going to be. 92 00:06:31,490 --> 00:06:36,620 Things are of a sensitive nature, and it could either tip people off, it could, it could hurt. 93 00:06:37,500 --> 00:06:38,880 Potentially hurt people. 94 00:06:40,440 --> 00:06:42,370 You may potentially become a target. 95 00:06:42,400 --> 00:06:43,250 What not you? 96 00:06:43,920 --> 00:06:45,540 And it also could be a legal issue. 97 00:06:45,540 --> 00:06:52,890 So my recommendation is don't share information about that investigation unless specifically are expressly 98 00:06:52,890 --> 00:06:53,460 allowed. 99 00:06:55,640 --> 00:07:00,620 So this was about data retention and handling data and trying not to get overloaded. 100 00:07:01,220 --> 00:07:02,060 Thank you for watching. 101 00:07:02,090 --> 00:07:03,020 We'll see you next VIDEO. 10208

Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.