There are two sides to this - and from the point of view of this thread the relevant one is tainted or contaminated evidence. This does not necessarily mean that anything has ACTUALLY happened to the evidence - just that it may have done so. In courts all over the world the concept exists of chain of custody and continuation of evidence.
This means that the evidence which may be adduced to a court must be in the same state in which is was found. Not tampered with or altered in any way. The accepted mechanism for doing this is to show that it was preserved (i.e locked down) and that nothing HAS or COULD HAVE happened to it from that time until a forensic expert got to it. In most courts all evidence and especially computer evidence is not admitted (i.e it is ignored and thrown out) unless you have chain of custody proved.
So for the dive computer - if this was a case where the evidence from the computer was critical, downloading data and scrolling through logs and so on could make that computer inadmissible in court. Because the chance exists that the data may in some way have been altered or changed, a new version saved internally or so on.
So contaminated is a LEGAL concept that may mean that the data is inadmissible.
In the case of PC's it gets even stricter - even switching a computer on after it has been seized can make it inadmissible. When I was an active investigator if we thought the computer data critical to the case the first thing we did was take a complete disk image of the hard drive and all attached storage media at the point of seizure, and this was to secure the data. We even had mobile equipment that allows us to do this in situ without unplugging or disconnecting the computer or components.
So I agree with Peter69_56 the likelihood that data on a dive computer will actuallybe changed is small - however for a court even that small chance is enough to get the evidence excluded.
In this example, perhaps it's not critical, but if you were investigating a case of manslaughter by negligence, or worse, then your whole case could go out the window because of a poor evidence handling protocol. - Phil
This means that the evidence which may be adduced to a court must be in the same state in which is was found. Not tampered with or altered in any way. The accepted mechanism for doing this is to show that it was preserved (i.e locked down) and that nothing HAS or COULD HAVE happened to it from that time until a forensic expert got to it. In most courts all evidence and especially computer evidence is not admitted (i.e it is ignored and thrown out) unless you have chain of custody proved.
So for the dive computer - if this was a case where the evidence from the computer was critical, downloading data and scrolling through logs and so on could make that computer inadmissible in court. Because the chance exists that the data may in some way have been altered or changed, a new version saved internally or so on.
So contaminated is a LEGAL concept that may mean that the data is inadmissible.
In the case of PC's it gets even stricter - even switching a computer on after it has been seized can make it inadmissible. When I was an active investigator if we thought the computer data critical to the case the first thing we did was take a complete disk image of the hard drive and all attached storage media at the point of seizure, and this was to secure the data. We even had mobile equipment that allows us to do this in situ without unplugging or disconnecting the computer or components.
So I agree with Peter69_56 the likelihood that data on a dive computer will actuallybe changed is small - however for a court even that small chance is enough to get the evidence excluded.
In this example, perhaps it's not critical, but if you were investigating a case of manslaughter by negligence, or worse, then your whole case could go out the window because of a poor evidence handling protocol. - Phil