{"id":2179,"date":"2020-03-17T11:11:10","date_gmt":"2020-03-17T11:11:10","guid":{"rendered":"https:\/\/isf.tvz.hr\/?p=2179"},"modified":"2020-04-07T11:38:45","modified_gmt":"2020-04-07T11:38:45","slug":"digital-forensics-legal-aspects","status":"publish","type":"post","link":"https:\/\/isf.tvz.hr\/index.php\/2020\/03\/17\/digital-forensics-legal-aspects\/","title":{"rendered":"Digital Forensics Legal Aspects"},"content":{"rendered":"<div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\"  style='background-color: rgba(255,255,255,0);background-position: center center;background-repeat: no-repeat;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;'><div class=\"fusion-builder-row fusion-row \"><div  class=\"fusion-layout-column fusion_builder_column fusion_builder_column_1_3 fusion-builder-column-0 fusion-one-third fusion-column-first 1_3\"  style='margin-top:10px;margin-bottom:10px;width:33.33%;width:calc(33.33% - ( ( 4% ) * 0.3333 ) );margin-right: 4%;'><div class=\"fusion-column-wrapper\" style=\"padding: 0px 0px 0px 0px;background-position:left top;background-repeat:no-repeat;-webkit-background-size:cover;-moz-background-size:cover;-o-background-size:cover;background-size:cover;\"   data-bg-url=\"\"><span class=\"fusion-imageframe imageframe-none imageframe-1 hover-type-none\"><img loading=\"lazy\" src=\"https:\/\/isf.tvz.hr\/wp-content\/uploads\/2020\/03\/covjek_stoji_450.jpg\" data-orig-src=\"https:\/\/isf.tvz.hr\/wp-content\/uploads\/2020\/03\/covjek_stoji_450.jpg\" width=\"450\" height=\"686\" alt=\"\" title=\"covjek_stoji_450\" class=\"lazyload img-responsive wp-image-2264\" srcset=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%27450%27%20height%3D%27686%27%20viewBox%3D%270%200%20450%20686%27%3E%3Crect%20width%3D%27450%27%20height%3D%273686%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-srcset=\"https:\/\/isf.tvz.hr\/wp-content\/uploads\/2020\/03\/covjek_stoji_450-200x305.jpg 200w, https:\/\/isf.tvz.hr\/wp-content\/uploads\/2020\/03\/covjek_stoji_450-400x610.jpg 400w, https:\/\/isf.tvz.hr\/wp-content\/uploads\/2020\/03\/covjek_stoji_450.jpg 450w\" data-sizes=\"auto\" data-orig-sizes=\"(max-width: 1000px) 100vw, 450px\" \/><\/span><div class=\"fusion-clearfix\"><\/div><\/div><\/div><div  class=\"fusion-layout-column fusion_builder_column fusion_builder_column_2_3 fusion-builder-column-1 fusion-two-third fusion-column-last 2_3\"  style='margin-top:10px;margin-bottom:10px;width:66.66%;width:calc(66.66% - ( ( 4% ) * 0.6666 ) );'><div class=\"fusion-column-wrapper\" style=\"padding: 0px 0px 0px 0px;background-position:left top;background-repeat:no-repeat;-webkit-background-size:cover;-moz-background-size:cover;-o-background-size:cover;background-size:cover;\"   data-bg-url=\"\"><style type=\"text\/css\"><\/style><div class=\"fusion-title title fusion-title-1 fusion-sep-none fusion-title-text fusion-title-size-three\" style=\"margin-top:0px;margin-bottom:30px;\"><h3 class=\"title-heading-left\" style=\"margin:0;color:#d20000;\">Semester 1 \/ ECTS Credits: 6 ECTS<\/h3><\/div><div class=\"fusion-text\"><h3><b>Course Description:<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">The aim of the Digital Forensics Law course is to acquire knowledge of the legal bases of legal action in digital forensics. It will give special attention to the legal authority and then to the lawful treatment of the exclusion of digital evidence. So that students will be able to understand the importance and know the role of legislation and will be able to evaluate and interpret the work with digital data and information generated by digital forensic analysis in accordance with normative acts. Students will know, in accordance with EU directives, how to protect the fundamental rights and freedoms of individuals with regard to data processing and how to ensure the free flow of personal data between Member States. Students will be trained in threat identification and risk analysis, as well as ways to deduce the consequences that may arise from the realization of those threats, especially when it comes to classified information. Students will acquire knowledge of legal regulations relating to the security of business cooperation and be able to expertly assist in the process of obtaining a business security certificate and concluding contracts containing classified information and information. Upon completion of the course, students will be able to select and apply appropriate legal standards in preventative and curative protection against information attacks, and will also be trained in the selection and use, appropriate concepts of PKI encryption and cryptographic protection, as well as digital signatures and digital certificates. Students will also be able to consolidate and relate the results of a digital forensic investigation into the restoration function and establish its foundation on conventions, laws and regulations to conclude the legality of the conduct and the validity of the evidence. Students will learn how to lawfully handle the process of collecting, processing and analyzing digital evidence, preparing digital forensic investigation reports, handling stored and stored digital evidence, and will also be trained to make expert judgments about digital forensic materials in accordance with normative acts.<\/span><\/p>\n<h3><b>Learning Outcomes:<\/b><\/h3>\n<ol>\n<li><span style=\"font-weight: 400;\"> Students will be able to understand the importance and know the role of legal regulation and will be able to evaluate and interpret work with digital data and information generated by digital forensic analysis in accordance with normative acts.<\/span><\/li>\n<li><span style=\"font-weight: 400;\"> Students will know, in accordance with EU directives, the protection of fundamental rights and freedoms of the individual with regard to data processing and how the free flow of personal data between Member States is ensured.\u00a0<\/span><\/li>\n<li><span style=\"font-weight: 400;\"> Students will be trained to identify threats and risk analysis as well as ways to conclude the consequences that may arise from the realization of these threats, especially when it comes to classified information.<\/span><\/li>\n<li><span style=\"font-weight: 400;\"> Students will master the knowledge of legal regulations related to business cooperation security and be able to expertly assist in the process of obtaining a business security certificate and concluding contracts that contain classified information and information.<\/span><\/li>\n<li><span style=\"font-weight: 400;\"> Students will be able to choose and use appropriate legal standards in preventative and curative protection against information attacks, and will also be trained in selection and use, appropriate PKI encryption and cryptographic protection concepts, and digital signatures and digital certificates.<\/span><\/li>\n<li><span style=\"font-weight: 400;\"> Students will be able to consolidate and link the results of a digital forensic investigation into the function of reconstruction, and to establish its founding on conventions, laws and regulations in order to conclude on the legality of the conduct and validity of evidence.<\/span><\/li>\n<li><span style=\"font-weight: 400;\"> Students will learn to legitimately handle the process of collecting, processing and analyzing digital evidence, creating digital forensic investigation reports, handling stored and stored digital evidence, and also being trained to make expert judgments about digital forensic materials in accordance with normative acts.<\/span><\/li>\n<\/ol>\n<h3><b>Course content lectures:<\/b><\/h3>\n<ol>\n<li><span style=\"font-weight: 400;\"> Cyber security at the global, regional and national level.<\/span><\/li>\n<li><span style=\"font-weight: 400;\"> International Strategic and Normative Framework (Resolutions, Conventions, Directives, .).<\/span><\/li>\n<li><span style=\"font-weight: 400;\"> Convention on cybercrime.<\/span><\/li>\n<li><span style=\"font-weight: 400;\"> The Convention on the Prevention of Terrorism VE.<\/span><\/li>\n<li><span style=\"font-weight: 400;\"> Directive (EU) 2016\/679 of the European Parliament and of the Council on the protection of individuals with regard to the processing of personal data and on the free movement of such data.<\/span><\/li>\n<li><span style=\"font-weight: 400;\"> DIRECTIVE 2009\/140\/EC of the European Parliament and of the Council of 25 November 2009 amending Directives 2002\/21\/EC on a common regulatory framework for electronic communications networks and services, 2002\/19\/EC on access to, and interconnection of, electronic communications networks and associated facilities, and 2002\/20\/EC on the authorisation of electronic communications networks and services.<\/span><\/li>\n<li><span style=\"font-weight: 400;\"> Directive (EU) 2016\/1148 of the European Parliament and of the Council of 6 July 2016 on measures for a high level of security in the area of information and communication networks across the Union.<\/span><\/li>\n<li><span style=\"font-weight: 400;\"> Cybernetic Security of Key Operators and Digital Service Providers Act, Electronic Communications Act.<\/span><\/li>\n<li><span style=\"font-weight: 400;\"> National legislation and cyber security.<\/span><\/li>\n<li><span style=\"font-weight: 400;\"> The National Cyber Security Strategy.<\/span><\/li>\n<li><span style=\"font-weight: 400;\"> National Strategy for the Prevention and Suppression of Terrorism.<\/span><\/li>\n<li><span style=\"font-weight: 400;\"> Law on the Security Intelligence System of the Republic of Croatia, Information Security Act.<\/span><\/li>\n<li><span style=\"font-weight: 400;\"> Security Policy and Information Risk Management.<\/span><\/li>\n<li><span style=\"font-weight: 400;\"> Role and Tasks: UVNS, ZSIS and National CERT in the Information Security System of the Republic of Croatia.<\/span><\/li>\n<li><span style=\"font-weight: 400;\"> Directive on Information Security Measures.<\/span><\/li>\n<li><span style=\"font-weight: 400;\"> Secrecy Act, Rulebook on Data Secrecy.<\/span><\/li>\n<li><span style=\"font-weight: 400;\"> The Electronic Commerce Act, the Electronic Signature Act, the Personal Data Protection Act, authoring and related in virtual environments.<\/span><\/li>\n<li><span style=\"font-weight: 400;\"> Basic Legal Framework for Criminal Investigation and Criminal Procedure (pre-trial and investigation).<\/span><\/li>\n<li><span style=\"font-weight: 400;\"> Criminal process framework.<\/span><\/li>\n<li><span style=\"font-weight: 400;\"> Criminal Procedure Act.<\/span><\/li>\n<li><span style=\"font-weight: 400;\"> International Legal Co-operation in Criminal Matters.<\/span><\/li>\n<li><span style=\"font-weight: 400;\"> Law on Police Affairs and Authorities, Law on the State Attorney&#8217;s Office.<\/span><\/li>\n<li><span style=\"font-weight: 400;\"> Organizational structure of police and other state bodies for criminal investigation.<\/span><\/li>\n<li><span style=\"font-weight: 400;\"> Standard operating procedures for handling digital evidence.<\/span><\/li>\n<li><span style=\"font-weight: 400;\"> Sources of digital evidence.<\/span><\/li>\n<li><span style=\"font-weight: 400;\"> Recognition and treatment of exclusion of digital evidence.<\/span><\/li>\n<li><span style=\"font-weight: 400;\"> Review and search of digital evidence holders and their exclusion.<\/span><\/li>\n<li><span style=\"font-weight: 400;\"> Lawful interception by carrying out special evidence actions and applying secret data collection measures.<\/span><\/li>\n<li><span style=\"font-weight: 400;\"> Packaging, transfer and storage of digital evidence, a chain of evidence, Structuring the forensic report.<\/span><\/li>\n<li><span style=\"font-weight: 400;\"> Civil Procedure Act , expert judgment of materials created by digital forensics, digital evidence reconstruction, digital evidence.<\/span><\/li>\n<\/ol>\n<\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div><style type=\"text\/css\">.fusion-fullwidth.fusion-builder-row-1 a:not(.fusion-button):not(.fusion-builder-module-control):not(.fusion-social-network-icon):not(.fb-icon-element):not(.fusion-countdown-link):not(.fusion-rollover-link):not(.fusion-rollover-gallery):not(.fusion-button-bar):not(.add_to_cart_button):not(.show_details_button):not(.product_type_external):not(.fusion-quick-view):not(.fusion-rollover-title-link):not(.fusion-breadcrumb-link) , .fusion-fullwidth.fusion-builder-row-1 a:not(.fusion-button):not(.fusion-builder-module-control):not(.fusion-social-network-icon):not(.fb-icon-element):not(.fusion-countdown-link):not(.fusion-rollover-link):not(.fusion-rollover-gallery):not(.fusion-button-bar):not(.add_to_cart_button):not(.show_details_button):not(.product_type_external):not(.fusion-quick-view):not(.fusion-rollover-title-link):not(.fusion-breadcrumb-link):before, .fusion-fullwidth.fusion-builder-row-1 a:not(.fusion-button):not(.fusion-builder-module-control):not(.fusion-social-network-icon):not(.fb-icon-element):not(.fusion-countdown-link):not(.fusion-rollover-link):not(.fusion-rollover-gallery):not(.fusion-button-bar):not(.add_to_cart_button):not(.show_details_button):not(.product_type_external):not(.fusion-quick-view):not(.fusion-rollover-title-link):not(.fusion-breadcrumb-link):after {color: #d20000;}.fusion-fullwidth.fusion-builder-row-1 a:not(.fusion-button):not(.fusion-builder-module-control):not(.fusion-social-network-icon):not(.fb-icon-element):not(.fusion-countdown-link):not(.fusion-rollover-link):not(.fusion-rollover-gallery):not(.fusion-button-bar):not(.add_to_cart_button):not(.show_details_button):not(.product_type_external):not(.fusion-quick-view):not(.fusion-rollover-title-link):not(.fusion-breadcrumb-link):hover, .fusion-fullwidth.fusion-builder-row-1 a:not(.fusion-button):not(.fusion-builder-module-control):not(.fusion-social-network-icon):not(.fb-icon-element):not(.fusion-countdown-link):not(.fusion-rollover-link):not(.fusion-rollover-gallery):not(.fusion-button-bar):not(.add_to_cart_button):not(.show_details_button):not(.product_type_external):not(.fusion-quick-view):not(.fusion-rollover-title-link):not(.fusion-breadcrumb-link):hover:before, .fusion-fullwidth.fusion-builder-row-1 a:not(.fusion-button):not(.fusion-builder-module-control):not(.fusion-social-network-icon):not(.fb-icon-element):not(.fusion-countdown-link):not(.fusion-rollover-link):not(.fusion-rollover-gallery):not(.fusion-button-bar):not(.add_to_cart_button):not(.show_details_button):not(.product_type_external):not(.fusion-quick-view):not(.fusion-rollover-title-link):not(.fusion-breadcrumb-link):hover:after {color: #d20000;}.fusion-fullwidth.fusion-builder-row-1 .pagination a.inactive:hover, .fusion-fullwidth.fusion-builder-row-1 .fusion-filters .fusion-filter.fusion-active a {border-color: #d20000;}.fusion-fullwidth.fusion-builder-row-1 .pagination .current {border-color: #d20000; background-color: #d20000;}.fusion-fullwidth.fusion-builder-row-1 .fusion-filters .fusion-filter.fusion-active a, .fusion-fullwidth.fusion-builder-row-1 .fusion-date-and-formats .fusion-format-box, .fusion-fullwidth.fusion-builder-row-1 .fusion-popover, .fusion-fullwidth.fusion-builder-row-1 .tooltip-shortcode {color: #d20000;}#main .fusion-fullwidth.fusion-builder-row-1 .post .blog-shortcode-post-title a:hover {color: #d20000;}<\/style>\n","protected":false},"excerpt":{"rendered":"<p>Semester 1 \/ ECTS Credits: 6 ECTS<\/p>\n","protected":false},"author":1,"featured_media":2415,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[20],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Digital Forensics Legal Aspects - TVZ - Information Security and Digital Forensics<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/isf.tvz.hr\/index.php\/2020\/03\/17\/digital-forensics-legal-aspects\/\" \/>\n<meta property=\"og:locale\" content=\"hr_HR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Digital Forensics Legal Aspects - TVZ - Information Security and Digital Forensics\" \/>\n<meta property=\"og:description\" content=\"Semester 1 \/ ECTS Credits: 6 ECTS\" \/>\n<meta property=\"og:url\" content=\"https:\/\/isf.tvz.hr\/index.php\/2020\/03\/17\/digital-forensics-legal-aspects\/\" \/>\n<meta property=\"og:site_name\" content=\"TVZ - Information Security and Digital Forensics\" \/>\n<meta property=\"article:published_time\" content=\"2020-03-17T11:11:10+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-04-07T11:38:45+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/isf.tvz.hr\/wp-content\/uploads\/2020\/03\/semester_1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"400\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Napisao\/la\" \/>\n\t<meta name=\"twitter:data1\" content=\"webadmin1\" \/>\n\t<meta name=\"twitter:label2\" content=\"Procijenjeno vrijeme \u010ditanja\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minuta\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/isf.tvz.hr\/#website\",\"url\":\"https:\/\/isf.tvz.hr\/\",\"name\":\"TVZ - Information Security and Digital Forensics\",\"description\":\"Study Programme\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/isf.tvz.hr\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"hr\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/isf.tvz.hr\/index.php\/2020\/03\/17\/digital-forensics-legal-aspects\/#primaryimage\",\"inLanguage\":\"hr\",\"url\":\"https:\/\/isf.tvz.hr\/wp-content\/uploads\/2020\/03\/semester_1.jpg\",\"contentUrl\":\"https:\/\/isf.tvz.hr\/wp-content\/uploads\/2020\/03\/semester_1.jpg\",\"width\":800,\"height\":400},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/isf.tvz.hr\/index.php\/2020\/03\/17\/digital-forensics-legal-aspects\/#webpage\",\"url\":\"https:\/\/isf.tvz.hr\/index.php\/2020\/03\/17\/digital-forensics-legal-aspects\/\",\"name\":\"Digital Forensics Legal Aspects - TVZ - Information Security and Digital Forensics\",\"isPartOf\":{\"@id\":\"https:\/\/isf.tvz.hr\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/isf.tvz.hr\/index.php\/2020\/03\/17\/digital-forensics-legal-aspects\/#primaryimage\"},\"datePublished\":\"2020-03-17T11:11:10+00:00\",\"dateModified\":\"2020-04-07T11:38:45+00:00\",\"author\":{\"@id\":\"https:\/\/isf.tvz.hr\/#\/schema\/person\/10016457ba19578af899f6dfefacbf35\"},\"breadcrumb\":{\"@id\":\"https:\/\/isf.tvz.hr\/index.php\/2020\/03\/17\/digital-forensics-legal-aspects\/#breadcrumb\"},\"inLanguage\":\"hr\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/isf.tvz.hr\/index.php\/2020\/03\/17\/digital-forensics-legal-aspects\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/isf.tvz.hr\/index.php\/2020\/03\/17\/digital-forensics-legal-aspects\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/isf.tvz.hr\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Digital Forensics Legal Aspects\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/isf.tvz.hr\/#\/schema\/person\/10016457ba19578af899f6dfefacbf35\",\"name\":\"webadmin1\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/isf.tvz.hr\/#personlogo\",\"inLanguage\":\"hr\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/ea28ae2a1a9b191433250aaaffa620a3?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/ea28ae2a1a9b191433250aaaffa620a3?s=96&d=mm&r=g\",\"caption\":\"webadmin1\"},\"url\":\"https:\/\/isf.tvz.hr\/index.php\/author\/webadmin1\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Digital Forensics Legal Aspects - TVZ - Information Security and Digital Forensics","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/isf.tvz.hr\/index.php\/2020\/03\/17\/digital-forensics-legal-aspects\/","og_locale":"hr_HR","og_type":"article","og_title":"Digital Forensics Legal Aspects - TVZ - Information Security and Digital Forensics","og_description":"Semester 1 \/ ECTS Credits: 6 ECTS","og_url":"https:\/\/isf.tvz.hr\/index.php\/2020\/03\/17\/digital-forensics-legal-aspects\/","og_site_name":"TVZ - Information Security and Digital Forensics","article_published_time":"2020-03-17T11:11:10+00:00","article_modified_time":"2020-04-07T11:38:45+00:00","og_image":[{"width":800,"height":400,"url":"https:\/\/isf.tvz.hr\/wp-content\/uploads\/2020\/03\/semester_1.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Napisao\/la":"webadmin1","Procijenjeno vrijeme \u010ditanja":"9 minuta"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/isf.tvz.hr\/#website","url":"https:\/\/isf.tvz.hr\/","name":"TVZ - Information Security and Digital Forensics","description":"Study Programme","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/isf.tvz.hr\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"hr"},{"@type":"ImageObject","@id":"https:\/\/isf.tvz.hr\/index.php\/2020\/03\/17\/digital-forensics-legal-aspects\/#primaryimage","inLanguage":"hr","url":"https:\/\/isf.tvz.hr\/wp-content\/uploads\/2020\/03\/semester_1.jpg","contentUrl":"https:\/\/isf.tvz.hr\/wp-content\/uploads\/2020\/03\/semester_1.jpg","width":800,"height":400},{"@type":"WebPage","@id":"https:\/\/isf.tvz.hr\/index.php\/2020\/03\/17\/digital-forensics-legal-aspects\/#webpage","url":"https:\/\/isf.tvz.hr\/index.php\/2020\/03\/17\/digital-forensics-legal-aspects\/","name":"Digital Forensics Legal Aspects - TVZ - Information Security and Digital Forensics","isPartOf":{"@id":"https:\/\/isf.tvz.hr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/isf.tvz.hr\/index.php\/2020\/03\/17\/digital-forensics-legal-aspects\/#primaryimage"},"datePublished":"2020-03-17T11:11:10+00:00","dateModified":"2020-04-07T11:38:45+00:00","author":{"@id":"https:\/\/isf.tvz.hr\/#\/schema\/person\/10016457ba19578af899f6dfefacbf35"},"breadcrumb":{"@id":"https:\/\/isf.tvz.hr\/index.php\/2020\/03\/17\/digital-forensics-legal-aspects\/#breadcrumb"},"inLanguage":"hr","potentialAction":[{"@type":"ReadAction","target":["https:\/\/isf.tvz.hr\/index.php\/2020\/03\/17\/digital-forensics-legal-aspects\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/isf.tvz.hr\/index.php\/2020\/03\/17\/digital-forensics-legal-aspects\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/isf.tvz.hr\/"},{"@type":"ListItem","position":2,"name":"Digital Forensics Legal Aspects"}]},{"@type":"Person","@id":"https:\/\/isf.tvz.hr\/#\/schema\/person\/10016457ba19578af899f6dfefacbf35","name":"webadmin1","image":{"@type":"ImageObject","@id":"https:\/\/isf.tvz.hr\/#personlogo","inLanguage":"hr","url":"https:\/\/secure.gravatar.com\/avatar\/ea28ae2a1a9b191433250aaaffa620a3?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ea28ae2a1a9b191433250aaaffa620a3?s=96&d=mm&r=g","caption":"webadmin1"},"url":"https:\/\/isf.tvz.hr\/index.php\/author\/webadmin1\/"}]}},"_links":{"self":[{"href":"https:\/\/isf.tvz.hr\/index.php\/wp-json\/wp\/v2\/posts\/2179"}],"collection":[{"href":"https:\/\/isf.tvz.hr\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/isf.tvz.hr\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/isf.tvz.hr\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/isf.tvz.hr\/index.php\/wp-json\/wp\/v2\/comments?post=2179"}],"version-history":[{"count":4,"href":"https:\/\/isf.tvz.hr\/index.php\/wp-json\/wp\/v2\/posts\/2179\/revisions"}],"predecessor-version":[{"id":2512,"href":"https:\/\/isf.tvz.hr\/index.php\/wp-json\/wp\/v2\/posts\/2179\/revisions\/2512"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/isf.tvz.hr\/index.php\/wp-json\/wp\/v2\/media\/2415"}],"wp:attachment":[{"href":"https:\/\/isf.tvz.hr\/index.php\/wp-json\/wp\/v2\/media?parent=2179"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/isf.tvz.hr\/index.php\/wp-json\/wp\/v2\/categories?post=2179"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/isf.tvz.hr\/index.php\/wp-json\/wp\/v2\/tags?post=2179"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}