
Sign up to save your podcasts
Or


This episode explores the legal and ethical responsibilities of handling data and software in IT environments. We start with licensing—understanding the difference between OEM, volume, and subscription licenses, and how misuse can result in compliance violations. Then we discuss Digital Rights Management (DRM), which limits copying or modifying media and software based on licensing terms.
We also explore chain of custody procedures, especially for incidents involving stolen devices, legal evidence, or internal investigations. Maintaining a documented path of who accessed what, when, and how is essential for both legal and security purposes. CompTIA expects technicians to know not just how to use tools, but how to do so within legal boundaries. Brought to you by BareMetalCyber.com.
By Dr. Jason Edwards5
22 ratings
This episode explores the legal and ethical responsibilities of handling data and software in IT environments. We start with licensing—understanding the difference between OEM, volume, and subscription licenses, and how misuse can result in compliance violations. Then we discuss Digital Rights Management (DRM), which limits copying or modifying media and software based on licensing terms.
We also explore chain of custody procedures, especially for incidents involving stolen devices, legal evidence, or internal investigations. Maintaining a documented path of who accessed what, when, and how is essential for both legal and security purposes. CompTIA expects technicians to know not just how to use tools, but how to do so within legal boundaries. Brought to you by BareMetalCyber.com.

229,106 Listeners

27,748 Listeners

230 Listeners

6,434 Listeners

8,012 Listeners

368,665 Listeners

44,300 Listeners

1,410 Listeners

20 Listeners

7,794 Listeners

19 Listeners

3 Listeners

3 Listeners

0 Listeners

3 Listeners