The “FAW – Forensics Acquisition of Websites” software was developed and is kept updated following the regulatory indications of international standards on the subject of computer data acquisition, it also complies with the other standards, in terms of Network Forensics and Cloud Forensics, established and recognized by the technical-scientific community at national and international level.

FAW is compliant with the following regulations and guidelines:

International Organization for Standardization, ISO/IEC 27037/2012: Information technology – Security techniques – Guidelines for identification, collection, acquisition and preservation of digital evidence;

IACIS, IFI Training Program, Internet Forensics and Investigation, 2015;

Sudhanshu Chauhan & Nutan Kumar Panda, Hacking Web Intelligence: Open Source Intelligence and Web Reconnaissance Concepts and Techniques, Syngress – Elsevier, 225 Wyman Street, Waltham, MA 02451, USA, 2015;

Bill Nelson – Amelia Phillip – Christopher Steuart, Guide to Computer Forensics and Investigations, Fifth Edition, Cengage Learning, 2015;

Meyer, G., & Stander, A. (2015). Cloud computing: The digital forensics challenge. Proceedings of Informing Science & IT Education Conference (InSITE) 2015, 285- 299;

NIST Interagency Report 8006 NIST Cloud Computing Forensic Science Challenges, 2014;

Darren Quick – Ben Martini – Kim-Kwang Raymond Choo – Brett Shavers, Technical Editor, Cloud Storage Forensics, Syngress – Elsevier, 225 Wyman Street, Waltham, MA 02451, USA, 2014;

Todd G. Shipley & Art Bowker, Investigating Internet Crimes: An Introduction to Solving Crimes in Cyberspace, Syngress – Elsevier, 225 Wyman Street, Waltham, MA 02451, USA, 2014;

Barbara Endicott-Popovsky, ICCSM2014-Proceedings of the International Conference on Cloud Security, The cedars Univeristy of Reading, UK, 23-24 October 2014;

Gilbert Peterson & Sujeet Shenoi, Advances in Digital Forensics IX: 9th IFIP WG 11.9 International Conference on Digital Forensics, Orlando, FL, USA, January 28-30, 2013, Revised. In Information and Communication Technology, Springer Heidelberg NewYork Dordrecht London;

Ruan, Keyun, Cybercrime and Cloud Forensics: Applications for Investigation Processes, University College Dublin, Igi Global, 2013;

CSA (Cloud Security Alliance) “Mapping the Forensic Standard ISO/IEC 27037 to Cloud Computing” – June 2013;

CoE Electronic Evidence Guide, Data Protection and Cybercrime Division – Council of Europe, Strasbourg, France, 18 March 2013;

NIST Interagency Report 8006 NIST Cloud Computing Forensic Science Challenges, 2014;

International Conference On Forensic Computer Science (ICOFCS), Cloud Forensics. Best Practice And Challenges For Process Efficiency Of Investigations And Digital Forensics, Brasilia, Brazil, 2013;

IISFA Italian Chapter, IISFA Memberbook 2013 Digital Forensics: Condivisione della conoscenza tra i membri dell’IISFA Italian Chapter;

ACPO Good Practice Guide for Digital Evidence, Association of Chief Policy Officers, Version 5, 2012.

Harjinder Singh Lallie – Lee Pimlott, Challenges in applying the ACPO principles in cloud forensic investigations – Applying the ACPO Principles in Public Cloud Forensic Investigations, in Journal of Digital Forensics, Security and Law, Vol. 7 (1), 2012;

Sherri Davidoff – Jonathan Ham, Network Forensics Tracking Hackers through Cyberspace, Prentice Hall – Pearson Education, Westford, Massachusetts, 2012;

Josiah Dykstra-Alan T. Sherman, Acquiring forensic evidence from infrastructure-as-a-service cloud computing: Exploring and evaluating tools, trust, and techniques, Digital Investigation 9 (2012) S90 – S98, Elsevier, 2012;

E.S.Pilli, R.C.Joshi, R.Niyogi, Digital Forensics and Cyber Crime – Proceedings of the 2nd international ICST Conference ICDF2C 2010 – “An IP Traceback Model for Network Forensics”, Springer, 2011;

Gilbert Peterson,Sujeet Shenoi, Advances in Digital Forensics VII – Proceedings of the VII IFIP WG international conference on Digital Forensics 2011 – “Cloud Forensics” (K.Ruan, J.Carthy, T.Kechadi, M. Crosbie), Addison-Wesley, Boston, Massachusetts, 2011;

Guide to Integrating Forensic Techniques into Incident Response – NIST Special Publication 800-86;

V. Roussev – L. Wang – G Richard – L. Marziale, A cloud computing platform for large-scale forensic computing, in Advances in Digital Forensics V, G. Peterson and S. Shenoi (Eds.), Springer, Heidelberg, Germany, 2009;

RFC 3227 – Guidelines for Evidence Collection and Archiving, 2002;

Law 48 of 18 March 2008 “Ratification and implementation of the Council of Europe Convention on Cybercrime, signed in Budapest on 23 November 2001”;

Budapest Convention on Cybercrime – Council of Europe – 23 November 2001.