Theres a chain of custody that the auditors can follow. That will most likely be broken because we know in some states mail in envelopes were deatroyed and adjucation occured at extremely high rates. This is a good legal area to start in.
You can look for deleted files and time stamps to look or tampering. They can image the drives to take off site for further testiglng. I would hope they can test directly on one of the machines too.
The forensic guys should have more info on the internals of the machine. I'm sure there is plenty more for them to do when it comes to checking what the software did. One key item that look at is why they used floating point calculations.
I am not an auditor, I'm basing this statement off my decades or IT work.
Restore bits and bytes from the hw if they tried to delete it from the software. Not sure what these types of overpriced 5 in one scanner/printers can do in whatever software they have, but it sure looks like we have a solid autist on the job!
Theres a chain of custody that the auditors can follow. That will most likely be broken because we know in some states mail in envelopes were deatroyed and adjucation occured at extremely high rates. This is a good legal area to start in.
You can look for deleted files and time stamps to look or tampering. They can image the drives to take off site for further testiglng. I would hope they can test directly on one of the machines too.
The forensic guys should have more info on the internals of the machine. I'm sure there is plenty more for them to do when it comes to checking what the software did. One key item that look at is why they used floating point calculations.
I am not an auditor, I'm basing this statement off my decades or IT work.
Restore bits and bytes from the hw if they tried to delete it from the software. Not sure what these types of overpriced 5 in one scanner/printers can do in whatever software they have, but it sure looks like we have a solid autist on the job!