About

This blog began as a way to support the activities of the International High Technology Crime Investigation Association (HTCIA). As the HTCIA “encourages, promotes, aids and effects the voluntary interchange of data, information, experience, ideas and knowledge about methods, processes, and techniques relating to investigations and security”… then our blog shows members and prospective members how we do that.

We blog on a variety of issues, everything from who and what will be at our conferences (and those of our chapters), to highlights of our discussions on the HTCIA listserv and in our newsletter. We hope you’ll join us in comments to express your views, either about the issues or about what we’re doing. A few things to keep in mind:

In order to maintain the integrity of this blog as an official representation of the High Technology Crime Investigation Association, our formal comment policy is as follows.

Comment Moderation

All comments, trackbacks, and pingbacks are moderated. We work to review and approve comments as quickly as possible; please do not resubmit your comment if it does not appear right away. Anonymous comments are not allowed.

Language and Format

This blog has an audience that reaches around the globe, to people whose opinions, cultural norms and sensibilities may diverge. Thus, please avoid profanity, “flaming,” threats, and other harsh language. It will not be tolerated.

If an entry provokes strong reaction, please consider publishing your thoughts on your own blog and trackback to ours, or alternatively, leave a comment summarizing your entry with a link to continue reading it.

Links

You have the ability to link to your website when you leave your name. Please don’t use your comment to overtly promote or advertise your website in comments you leave here. Excessive and/or inappropriate links will be removed.

Adding a signature is optional. If you decide to include one, please keep it short (3 line maximum) and do not include a link to your website.

Subscribing to Comments via E-mail

If you would like to receive notification of comments left after yours (beneficial in order to continue a conversation), you must provide a valid e-mail address. We will not use your e-mail to subscribe you to a mailing list, and you can have your e-mail address removed at any time by visiting the comment subscription manager.

To sign up for comments, make sure to check the box next to “Notify me of follow up comments via e-mail” before submitting your comment.

Copyright

Your words are yours and you can take them elsewhere as you see fit, but by posting comments to the blog you grant us the right, in perpetuity, to use, alter, and/or display them in whatever manner we see fit.

Editing Comments

We reserve the right to edit or delete comments as we feel necessary, depending on the extent to which they add to discussion. Comments that contain unnecessarily volatile or controversial remarks, but lend overall value to a conversation, will be edited. Extreme spelling and grammatical errors will also be edited. We will note edits at the end of the comment. At no time will we attempt to alter any comment’s core meaning.

Again, we look forward to hearing your thoughts on our posts. If you have any questions about this or any other policy, please contact International Executive Committee members at https://www.htcia.org/contactus.shtml.

Meanwhile, please also join us on Twitter, Facebook and LinkedIn!

One Response to About

  1. Kingsley Mosenye says:

    Dear Sir/Madam

    Kindly give advise on the value of computer forensic investigation as currently am studying A+ and N+ as pre-requisites for the course.Have been in security industry for over 13 year though the physical part,and wish to upgrade to the above mentioned .I also wish to find out chapter of the course.

    Your positive respond will be highly appreciated.

    Kind Regards

    Kingsley Mosenye

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

%d bloggers like this: