Thanks for your reply Jason—great to hear your perspective.
One problem is that your argument for importance also underscores how difficult and risky for an organization to “alter, fabricate, and/or destroy evidence” in the way you describe.
We understand it is risky, but could you clarify why it would be difficult for an organization to “alter, fabricate, and/or destroy evidence?” In many cases, wouldn’t it be as simple as changing values in a spreadsheet?
It’s not difficult to try. I believe it would be difficult to succeed (or even not get easily caught) because the evidence exists in too many third-party hands outside the organization’s custody and control. Thus, absent special circumstances, it is very unlikely an organization would even try; the difficulty of success would deter them.
(I meant “risk” to refer more to the consequences of being caught—that it would pose a grave risk to the organization’s continued existence, and to the careers of those who attempted the tampering.)
Thanks for your reply Jason—great to hear your perspective.
We understand it is risky, but could you clarify why it would be difficult for an organization to “alter, fabricate, and/or destroy evidence?” In many cases, wouldn’t it be as simple as changing values in a spreadsheet?
It’s not difficult to try. I believe it would be difficult to succeed (or even not get easily caught) because the evidence exists in too many third-party hands outside the organization’s custody and control. Thus, absent special circumstances, it is very unlikely an organization would even try; the difficulty of success would deter them.
(I meant “risk” to refer more to the consequences of being caught—that it would pose a grave risk to the organization’s continued existence, and to the careers of those who attempted the tampering.)