📄️ How to Enable and Assign Log Access Level
Limiting access to the Audit Logs and Chain of Custody is a vital security functionality of Digital Evidence Management. Log Access Level works in a way that Users with higher access levels can view the Activity trail of users with the same and lower access levels. Whereas, Users with lower access levels are unable to view the Audit Logs and Chain of Custody of users with higher Log Access Level.
📄️ How to Enable Content Tamper Detection App
Evidence tampering is a criminal offense. It is an act in which a person alters, falsifies, or conceals evidence with the intent to interfere with an investigation process being monitored by law enforcement, government or regulatory authority. To help detect Evidence integrity, VIDIZMO provides Tamper Detection functionality in its Digital Evidence Management (DEM) system.
📄️ How to Subscribe to Alerts on Flagged or Sensitive Evidence Files
Once a user has flagged content, they can subscribe to a list of events applicable to an evidence or case that they have access to within the portal.
📄️ Understanding Alert Generation Policy for Sensitive Evidence and Cases
A digital evidence may undergo changes within its lifecycle (moderation, update, delete, re-upload so on and so forth) - most of these activities warrant attention from the designated officers who then can take necessary actions. Hence, it is imperative for Digital Evidence Management solutions to have the capabilities to allow users to keep tabs on confidential or sensitive digital evidence or cases. In order to streamline the process of notifying the concerned authorities, a robust mechanism has been engineered in VIDIZMO application to ensure that alerts specific to certain events can be subscribed to.
📄️ Understanding Log Access Levels
In Law Enforcement Organizations, there are multiple teams which include a Case Investigation Team and a team that is responsible for Auditing and Monitoring the activities of the former team. Utilization of a single Portal of Digital Evidence Management is a probability in these cases. Hence, it is essential to limit access to certain content, settings, and especially Audit Trails for any organization's utmost security.