One may find several crucial aspects that address the challenges in the collection of electronically stored information. The current ways of storing the data in the mobile devices bear the risk of leaking the information. In the cases of dealing with suspects, there is still a slight risk that the information may be altered and become an obstacle in the evidence collection on suspects. Some of the legal issues for cyber forensics are rather general.
For instance, the primary legal challenge in the data collection is linked to the facilitated access to the information through the computing devices. But proving the legal admissibility of the gained information is a challenge in itself. In the particularly difficult cases when the evidence may be difficult to collect, such legal challenge may be particularly ground-breaking.
No less important is to mention that the possession of the legal knowledge of the investigators is an issue, too. The recent trends of shifting to the computer forensics should also respond to such issues as data trails. In that case, different recommendations apply when it comes to searching for warrants and searches without warrants.
If investigators use the IP data trail to discover the ESI, they should comply with the format approved in their facilities. There is no single recommendation on the type of data one must use, but one must take the internet service provider into account and use the web analytics software for processing the data.
The data that originated from the ESI helps structure the data and sort it only into such that is mostly used. It helps to identify whether the material is relevant to the investigation as well as benefits in categorizing the files. The ESI comprises the most straightforward way of incorporating the information into the general resort in the more thorough and comprehensive way.