... determine
that the person is authorized to view the data, and can then open the file.
Whether a person is permitted to access the data is based on the user account that is being
used when opening the file. ... before concluding the investigation.
6. The forensic investigator hands the sensitive report information to the client, who
reviews it to see whether they want to pres...