Copyright (c) 2026 MindMesh Academy. All rights reserved. This content is proprietary and may not be reproduced or distributed without permission.

2.2.4. Investigation Types and Evidence Standards

💡 First Principle: The type of investigation determines what evidence is needed, how it must be collected and preserved, and who has authority over the process. Treating all investigations as criminal investigations — collecting evidence as if for prosecution — is usually overkill and creates unnecessary legal risk; treating a potential criminal matter as merely administrative can destroy evidence that law enforcement needs.

Five investigation types and their requirements:
TypeWho ConductsStandardObjectiveEvidence Implications
AdministrativeHR/managementInternal policyPolicy violation, HR actionInternal policies govern; maintain chain of custody anyway
CriminalLaw enforcement (FBI, local PD)Beyond reasonable doubtProsecutionStrict chain of custody; do NOT tamper; law enforcement takes lead
CivilPrivate parties (attorneys)Preponderance of evidenceDamages, injunctionseDiscovery applies; litigation hold required; scope defined by courts
RegulatoryGovernment agencies (FTC, SEC, OCR)Agency-specificCompliance determination, penaltiesAgency may compel document production; scope defined by regulation
Industry StandardsQSAs, auditors, standards bodiesContractual termsCertification statusDefined by standard (PCI DSS, ISO 27001 audit requirements)

Digital evidence and chain of custody — for any evidence that may be used in legal proceedings:

  1. Identify — Determine what evidence exists and where
  2. Preserve — Prevent alteration (write blockers for storage media, legal holds for documents)
  3. Collect — Create forensic copies using verified tools; hash originals
  4. Examine — Analyze copies, never originals
  5. Document — Every person who touches evidence signs the chain of custody log
  6. Present — Demonstrate integrity from collection to presentation

Chain of custody documents who had possession of evidence, when, and what was done with it. A break in chain of custody can make evidence inadmissible even if the evidence itself is valid.

eDiscovery — in civil litigation, parties must preserve and produce electronically stored information (ESI) relevant to the case. The legal hold is issued before any evidence is deleted under normal retention schedules. Failure to preserve can result in spoliation sanctions — including the court instructing the jury to assume the missing evidence was harmful to the party that destroyed it.

⚠️ Exam Trap: When a security team discovers evidence of criminal activity, they should NOT continue investigating independently — they should preserve evidence and contact law enforcement. Continued investigation by untrained staff can contaminate evidence and alert the subject. The security team's role is to preserve and hand off, not to prosecute.

Reflection Question: During a routine audit, you discover evidence that an employee has been systematically stealing customer credit card data for six months. HR wants to handle it administratively and terminate the employee quietly. Legal wants to involve law enforcement. What are the competing considerations, and what should the security professional recommend?

Alvin Varughese
Written byAlvin Varughese
Founder15 professional certifications