{"id":1278,"date":"2021-07-30T10:27:21","date_gmt":"2021-07-30T08:27:21","guid":{"rendered":"https:\/\/forhumanity.dev\/web\/blog\/2021\/07\/30\/chain-of-custody\/"},"modified":"2023-02-08T16:53:59","modified_gmt":"2023-02-08T15:53:59","slug":"chain-of-custody","status":"publish","type":"post","link":"https:\/\/forhumanity.center\/bok\/chain-of-custody\/","title":{"rendered":"Chain-of Custody"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"1278\" class=\"elementor elementor-1278\" data-elementor-settings=\"[]\">\n\t\t\t\t\t\t\t<div class=\"elementor-section-wrap\">\n\t\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-33f3d66 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"33f3d66\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-34ecdb7e\" data-id=\"34ecdb7e\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7ba606b1 elementor-widget elementor-widget-text-editor\" data-id=\"7ba606b1\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.5.2 - 22-12-2021 *\/\n.elementor-widget-text-editor.elementor-drop-cap-view-stacked .elementor-drop-cap{background-color:#818a91;color:#fff}.elementor-widget-text-editor.elementor-drop-cap-view-framed .elementor-drop-cap{color:#818a91;border:3px solid;background-color:transparent}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap{margin-top:8px}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap-letter{width:1em;height:1em}.elementor-widget-text-editor .elementor-drop-cap{float:left;text-align:center;line-height:1;font-size:50px}.elementor-widget-text-editor .elementor-drop-cap-letter{display:inline-block}<\/style>\t\t\t\t<!-- wp:paragraph {\"align\":\"center\"} -->\n<p>A Chain of Custody is the exhaustive traceability (\u201cpaper trail,\u201d physical or otherwise) that chronologically records the ownership, viewing, analysis, and transformations of a data record or data sources.\u00a0 Although commonly a term known for evidence in criminal law and police procedure, the same fundamental concepts apply to data provenance for frameworks like GDPR, Sarbanes-Oxley (SOX) compliance, and more.<\/p>\n<!-- \/wp:paragraph --><!-- wp:paragraph -->\n<p>A Chain of Custody fulfills two purposes. Firstly, it guarantees a list of all Actions performed on items it tracks. Thus, one can know exactly what has (or has not) been done with said Assets.\u00a0 Secondly, it shows any Actors (generally people) that have had access to (\u201ctouched\u201d) the Asset while being tracked.<\/p>\n<!-- \/wp:paragraph --><!-- wp:paragraph -->\n<p>A simple yet useful example would be customer records at a bank. Using Chain of Custody principles, the record management system at the bank should track every change to a customer account, but should also include <em>who <\/em>(which Actor), <em>what <\/em>(which Action), <em>when<\/em> (a timestamp), and more.\u00a0 Some systems also include a <em>why<\/em> component, allowing an Actor to include a comment or note.\u00a0 Lastly, and arguably most importantly, such a system should track who has viewed the data, even if no changes to the data has been performed.<\/p>\n<!-- \/wp:paragraph --><!-- wp:paragraph -->\n<p><strong>Definitions<\/strong><\/p>\n<!-- \/wp:paragraph --><!-- wp:list -->\n<ul><!-- wp:list-item -->\n<li><strong>Assets <\/strong>are the items being tracked as part of a Chain of Custody (for example, a database of personal records, metadata, etc.)<\/li>\n<!-- \/wp:list-item --><!-- wp:list-item -->\n<li><strong>Actors <\/strong>are any people or systems (\u201cagents\u201d) involved with Assets.<\/li>\n<!-- \/wp:list-item --><!-- wp:list-item -->\n<li><strong>Actions <\/strong>are transactions (generally <em>verbs<\/em>) that Actors perform on Assets (updated, deleting, etc.) and can also include passive Actions (e.g. viewing, counting).<\/li>\n<!-- \/wp:list-item --><!-- wp:list-item -->\n<li><strong>Authentication <\/strong>is the process of validation that an Actor is who they say they are.<\/li>\n<!-- \/wp:list-item --><!-- wp:list-item -->\n<li><strong>Authorization <\/strong>is the process of assigning permissions to an Actor: certain Actors can only do certain Actions to Assets.<\/li>\n<!-- \/wp:list-item --><!-- wp:list-item -->\n<li><strong>Logging <\/strong>is just that &#8211; an unchangeable log of all Actions that an Actor performed on the tracked Asset.<\/li>\n<!-- \/wp:list-item --><!-- wp:list-item -->\n<li><strong>Log Entries<\/strong> are individual entries that map to a unique Actor performing an Action on given Asset(s).<\/li>\n<!-- \/wp:list-item --><\/ul>\n<!-- \/wp:list --><!-- wp:paragraph -->\n<p><strong>Criteria for a good Chain of Custody:<\/strong><\/p>\n<!-- \/wp:paragraph --><!-- wp:paragraph -->\n<p><strong>N.B. <\/strong>\u2018Must\u2019 statements = sufficient, \u2018Should\u2019 statements = mature<\/p>\n<!-- \/wp:paragraph --><!-- wp:list {\"ordered\":true} -->\n<ol><!-- wp:list-item -->\n<li>The system must have a list of tracked Assets.<\/li>\n<!-- \/wp:list-item --><!-- wp:list-item -->\n<li>The system must have an acceptable list of Actors.<\/li>\n<!-- \/wp:list-item --><!-- wp:list-item -->\n<li>The system must use Authentication to ensure Actors cannot be faked.<\/li>\n<!-- \/wp:list-item --><!-- wp:list-item -->\n<li>The system must have a Logging system for any Actions performed on Assets.<\/li>\n<!-- \/wp:list-item --><!-- wp:list-item -->\n<li>The Logging system must be unchangeable, such that the Log Entries cannot be changed afterwards. Furthermore, the system should be able to verifiably show that no tampering has occurred.<\/li>\n<!-- \/wp:list-item --><!-- wp:list-item -->\n<li>The system should track data Assets at both a macro level (e.g. \u201cdatabase table\u201d) and atomic level (e.g. \u201cindividual rows in a database table\u201d).<\/li>\n<!-- \/wp:list-item --><!-- wp:list-item -->\n<li>The system should have an acceptable list of Actions.<\/li>\n<!-- \/wp:list-item --><!-- wp:list-item -->\n<li>The system should have an Authorization system in order to limit an Actor\u2019s scope of Actions.<\/li>\n<!-- \/wp:list-item --><!-- wp:list-item -->\n<li>The Logging system should have an interface for the viewing, searching, and filtering of log entries (of note: such viewing should be considered an Action in its own right).<\/li>\n<!-- \/wp:list-item --><\/ol>\n<!-- \/wp:list --><!-- wp:heading {\"level\":3} -->\n<h3><strong>Sufficient &#8211; <\/strong>Enough to pass the audit<\/h3>\n<!-- \/wp:heading --><!-- wp:heading {\"level\":3} -->\n<h3>\u00a0<\/h3>\n<!-- \/wp:heading --><!-- wp:heading {\"level\":3} -->\n<h3><strong>Mature &#8211; <\/strong>More than enough to pass the audit<\/h3>\n<!-- \/wp:heading --><!-- wp:heading {\"level\":3} -->\n<h3><strong>Insufficient &#8211; <\/strong>Not enough to pass the audit<\/h3>\n<!-- \/wp:heading --><!-- wp:separator --><hr class=\"wp-block-separator has-alpha-channel-opacity\" \/><!-- \/wp:separator --><!-- wp:paragraph -->\n<p>Definitions and examples in the table below will be specific to this Knowledge Store and should be populated by the Knowledge Store Owner. You are trying to capture the best summary of criteria that puts an audit response or piece of audit evidence, into these categories.\u00a0<\/p>\n<!-- \/wp:paragraph --><!-- wp:table -->\n<figure class=\"wp-block-table\">\n<table>\n<tbody>\n<tr>\n<td><strong>Sufficient<\/strong><\/td>\n<td><strong>Essential inclusions:<br \/><\/strong>&#8211; A Chain of Custody must be Comprehensive, in that the system covers all relevant data sources and types (\u201cItems\u201d), not only a subset<br \/>&#8211; Where appropriate consideration for Relevant Legal Frameworks, in other words if the law, regulations or regulatory guidance dictates the categories of data or information to include that must be included in the Chain of Custody<br \/>&#8211; A Chain of Custody must be Exhaustive, in that it covers all Actions and Actors that may interact on the data sources and types<br \/>&#8211; The ability to review, search, and filter aspects of the Chain of Custody logs<br \/>&#8211; For it to achieve Chain of Custody status it must log every interaction and every change without exception<br \/><br \/><strong>Benchmarks for good practice:<br \/><\/strong>&#8211; That there are no Actors (even root\/administrators) with the ability to edit previous Chain of Custody Log Entries<br \/>&#8211; That no Actors, Actions, or Assets fall outside of the coverage of the Chain of Custody<br \/>&#8211; That the same backup \/ disaster recovery protocols in place for the Assets also cover the Chain of Custody Log and\/or metadata as well<\/td>\n<\/tr>\n<tr>\n<td><strong>Sufficient<\/strong><\/td>\n<td><strong>Examples:<\/strong><br \/>&#8211; Software version control systems have a rigorous (if ancillary) Chain of Command system, whereby code and files (Assets) are tracked for any changes included in the System of Record<br \/>&#8211; CanFor\u2019s accreditation to the Forest Stewardship Council: \u00a0 <a href=\"https:\/\/www.canfor.com\/docs\/responsibility\/3)-chain-of-custody-documented-control-system.pdf?sfvrsn=2\" class=\"broken_link\">https:\/\/www.canfor.com\/docs\/responsibility\/3)-chain-of-custody-documented-control-system.pdf?sfvrsn=2<\/a><br \/>&#8211; Loring Laboratories uses Chain of Custody protocols for the tracking of its lab Assets: <a href=\"https:\/\/www.loringlabs.net\/chain_of_custody.html\">https:\/\/www.loringlabs.net\/chain_of_custody.html<\/a><\/td>\n<\/tr>\n<tr>\n<td><strong>Mature<\/strong><\/td>\n<td><strong>Indicators that related controls and practices have reached a mature state:<\/strong><br \/>&#8211; A workflow engine to ensure standardization across different use cases and departments<br \/>&#8211; Sufficient backup and recovery policies and procedures to ensure redundancy and disaster recovery<br \/>&#8211; If scale is a concern, Log Entries as a separate (\u201cnon-production,\u201d \u201canalytical\u201d) system for reporting<br \/>&#8211; A capability to manage Actors management for after such Actors are no longer part of the Chain of Custody and\/or relevant organization<br \/>&#8211; The ability to share and\/or export aspects of the Chain of Custody Log Entries<br \/>&#8211; Minimizes both the number of Actors and their relevant Actions to the minimum required to perform their roles.<br \/>&#8211; Have a well-documented process and\/or swimlanes as part of a corporate policy system<br \/>&#8211; Standard templates to store Chain of Custody information, where automated ingestion and tracking is not possible or reasonable<br \/>&#8211; Where staleness \/ expiration is a risk, mature systems will ensure that the quality of Assets is maintained, including relevant metadata to measure as such<\/td>\n<\/tr>\n<tr>\n<td><strong>Mature<\/strong><\/td>\n<td><strong>Examples:<\/strong><br \/>&#8211; Almost all system of a litigious nature (either criminal or civil) will have a mature Chain of Command\u00a0<br \/>&#8211; The EPA Handbook includes factors to ensure the quality of Assets is maintained: <a href=\"https:\/\/www3.epa.gov\/ttnamti1\/files\/ambient\/pm25\/qa\/vol2sec08.pdf\">https:\/\/www3.epa.gov\/ttnamti1\/files\/ambient\/pm25\/qa\/vol2sec08.pdf<\/a><br \/>&#8211; EPIC e-health records include Chain of Custody protocols as part of regulatory compliance (e.g. HIPPA): <a href=\"https:\/\/www.harmonyhit.com\/securing-chain-of-custody-for-your-electronic-medical-records\">https:\/\/www.harmonyhit.com\/securing-chain-of-custody-for-your-electronic-medical-records<\/a><\/td>\n<\/tr>\n<tr>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/figure>\n<!-- \/wp:table --><!-- wp:heading -->\n<h2><strong>FAQs<\/strong><\/h2>\n<!-- \/wp:heading --><!-- wp:table -->\n<figure class=\"wp-block-table\">\n<table>\n<tbody>\n<tr>\n<td><strong>Question<\/strong><\/td>\n<td><strong>Answer<\/strong><\/td>\n<\/tr>\n<tr>\n<td>Can\u2019t people just use manual systems?\u00a0 Why all the overhead?<\/td>\n<td>Theoretically, yes. But a strong Chain of Custody system should be provably verifiable that the Logs have not been tampered.\u00a0 Such a task is difficult with manual systems.<\/td>\n<\/tr>\n<tr>\n<td>How do you make logs untamperable?<\/td>\n<td>There are a variety of clever and\/or complex ways to ensure this (checksums, or at the extreme example, blockchain).\u00a0 Fundamentally, the concept is that of proving that such logs haven\u2019t changed since their creation.<\/td>\n<\/tr>\n<tr>\n<td>How does chain of custody work for physical items (papers, assets, etc.)<\/td>\n<td>Most document management and records management systems can handle both electronic and physical assets, usually with a mapping of physical box IDs in a warehouse to a virtual list within the custodial system.\u00a0 For more sensitive assets, locked boxes or sealed bags and signature chains can be used to ensure nothing was tampered with.<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/figure>\n<!-- \/wp:table --><!-- wp:heading -->\n<h2><strong>Linked Knowledge Stores and Content<\/strong><\/h2>\n<!-- \/wp:heading --><!-- wp:paragraph -->\n<p>This is where you list or link to other related knowledge stores e.g. Ethics Curriculum would link to Code of Ethics. It would also link to GDPR articles, AI Audit criteria, Audit Explanatory Notes, relevant laws and regulations.\u00a0<\/p>\n<!-- \/wp:paragraph --><!-- wp:table -->\n<figure class=\"wp-block-table\">\n<table>\n<tbody>\n<tr>\n<td><strong>Content Type<\/strong><\/td>\n<td><strong>Content Description and Link<\/strong><\/td>\n<\/tr>\n<tr>\n<td>Code of Data Ethics<\/td>\n<td><a href=\"https:\/\/forhumanity.center\/bok\/code-of-data-ethics\">https:\/\/forhumanity.center\/bok\/code-of-data-ethics<\/a><\/td>\n<\/tr>\n<tr>\n<td>Risk Management Framework<\/td>\n<td><a href=\"https:\/\/forhumanity.center\/bok\/risk-management\">https:\/\/forhumanity.center\/bok\/risk-management<\/a><\/td>\n<\/tr>\n<tr>\n<td>AAA Systems Log<\/td>\n<td>AAA refers to Authentication (to identify), Authorization (to give permission) and Accounting (to log an audit trail) [<a href=\"https:\/\/en.wikipedia.org\/wiki\/AAA_(computer_security)\">wikipedia<\/a>]<\/td>\n<\/tr>\n<tr>\n<td>Information Quality<\/td>\n<td>\u201cTraditionally, information has been viewed as a by-product of a computer system or an event. From this viewpoint, the focus is on designing and delivering computer systems, rather than designing and delivering information\u201d [<a href=\"https:\/\/link.springer.com\/referenceworkentry\/10.1007\/978-0-387-39940-9_497\">springer, for example<\/a>]<\/td>\n<\/tr>\n<tr>\n<td>EU Artificial Intelligence Act<\/td>\n<td>A starting point from the EU website: <a href=\"https:\/\/digital-strategy.ec.europa.eu\/en\/policies\/european-approach-artificial-intelligence\">https:\/\/digital-strategy.ec.europa.eu\/en\/policies\/european-approach-artificial-intelligence<\/a><\/td>\n<\/tr>\n<tr>\n<td>Data Taxonomy (via Sundar N.)<\/td>\n<td><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/lh6.googleusercontent.com\/1ykUuaZCRNnPyNJftlj9sNSnSm0cblEOu855nU0873ftMtY-l3-q23O0QxrFCvEOublXflqbYOW3vVHrtVRqum3jxlF4E-x12S0Rsx2Bt4tVuQZh29pkhl7D4PaljgODI9ukRWWMef_wtq-geXbWE8JwenCVTBQKOs9Fukk0HVrJl2onSbht8AJ4\" width=\"411\" height=\"231\" \/><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/figure>\n<!-- \/wp:table -->\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Use Case host: Jim Provost<\/p>\n","protected":false},"author":1,"featured_media":3026,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[9],"tags":[],"class_list":["post-1278","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-bok"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Chain-of Custody - Body of Knowledge<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/forhumanity.center\/bok\/chain-of-custody\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Chain-of Custody - Body of Knowledge\" \/>\n<meta property=\"og:description\" content=\"Use Case host: Jim Provost\" \/>\n<meta property=\"og:url\" content=\"https:\/\/forhumanity.center\/bok\/chain-of-custody\/\" \/>\n<meta property=\"og:site_name\" content=\"Body of Knowledge\" \/>\n<meta property=\"article:published_time\" content=\"2021-07-30T08:27:21+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-02-08T15:53:59+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/forhumanity.center\/bok\/wp-content\/uploads\/sites\/5\/2022\/01\/green.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1417\" \/>\n\t<meta property=\"og:image:height\" content=\"1417\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Admin4Human\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/forhumanity.center\/bok\/#website\",\"url\":\"https:\/\/forhumanity.center\/bok\/\",\"name\":\"Body of Knowledge\",\"description\":\"ForHumanity - Independent Audit of AI Systems\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/forhumanity.center\/bok\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-GB\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/forhumanity.center\/bok\/chain-of-custody\/#primaryimage\",\"inLanguage\":\"en-GB\",\"url\":\"https:\/\/forhumanity.center\/bok\/wp-content\/uploads\/sites\/5\/2022\/01\/green.jpg\",\"contentUrl\":\"https:\/\/forhumanity.center\/bok\/wp-content\/uploads\/sites\/5\/2022\/01\/green.jpg\",\"width\":1417,\"height\":1417},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/forhumanity.center\/bok\/chain-of-custody\/#webpage\",\"url\":\"https:\/\/forhumanity.center\/bok\/chain-of-custody\/\",\"name\":\"Chain-of Custody - Body of Knowledge\",\"isPartOf\":{\"@id\":\"https:\/\/forhumanity.center\/bok\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/forhumanity.center\/bok\/chain-of-custody\/#primaryimage\"},\"datePublished\":\"2021-07-30T08:27:21+00:00\",\"dateModified\":\"2023-02-08T15:53:59+00:00\",\"author\":{\"@id\":\"https:\/\/forhumanity.center\/bok\/#\/schema\/person\/9fe92282828f1bcb1c7428e918e2da10\"},\"breadcrumb\":{\"@id\":\"https:\/\/forhumanity.center\/bok\/chain-of-custody\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/forhumanity.center\/bok\/chain-of-custody\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/forhumanity.center\/bok\/chain-of-custody\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/forhumanity.center\/bok\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Chain-of Custody\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/forhumanity.center\/bok\/#\/schema\/person\/9fe92282828f1bcb1c7428e918e2da10\",\"name\":\"Admin4Human\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/forhumanity.center\/bok\/#personlogo\",\"inLanguage\":\"en-GB\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/45764ad1c4858ce9ebfc83b3d26f2f053be31f0e608c4caced31fe7cb92b63de?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/45764ad1c4858ce9ebfc83b3d26f2f053be31f0e608c4caced31fe7cb92b63de?s=96&d=mm&r=g\",\"caption\":\"Admin4Human\"},\"sameAs\":[\"http:\/\/forhumanity.dev\/web\"],\"url\":\"https:\/\/forhumanity.center\/bok\/author\/admin4human\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Chain-of Custody - Body of Knowledge","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/forhumanity.center\/bok\/chain-of-custody\/","og_locale":"en_GB","og_type":"article","og_title":"Chain-of Custody - Body of Knowledge","og_description":"Use Case host: Jim Provost","og_url":"https:\/\/forhumanity.center\/bok\/chain-of-custody\/","og_site_name":"Body of Knowledge","article_published_time":"2021-07-30T08:27:21+00:00","article_modified_time":"2023-02-08T15:53:59+00:00","og_image":[{"width":1417,"height":1417,"url":"https:\/\/forhumanity.center\/bok\/wp-content\/uploads\/sites\/5\/2022\/01\/green.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Admin4Human","Estimated reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/forhumanity.center\/bok\/#website","url":"https:\/\/forhumanity.center\/bok\/","name":"Body of Knowledge","description":"ForHumanity - Independent Audit of AI Systems","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/forhumanity.center\/bok\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-GB"},{"@type":"ImageObject","@id":"https:\/\/forhumanity.center\/bok\/chain-of-custody\/#primaryimage","inLanguage":"en-GB","url":"https:\/\/forhumanity.center\/bok\/wp-content\/uploads\/sites\/5\/2022\/01\/green.jpg","contentUrl":"https:\/\/forhumanity.center\/bok\/wp-content\/uploads\/sites\/5\/2022\/01\/green.jpg","width":1417,"height":1417},{"@type":"WebPage","@id":"https:\/\/forhumanity.center\/bok\/chain-of-custody\/#webpage","url":"https:\/\/forhumanity.center\/bok\/chain-of-custody\/","name":"Chain-of Custody - Body of Knowledge","isPartOf":{"@id":"https:\/\/forhumanity.center\/bok\/#website"},"primaryImageOfPage":{"@id":"https:\/\/forhumanity.center\/bok\/chain-of-custody\/#primaryimage"},"datePublished":"2021-07-30T08:27:21+00:00","dateModified":"2023-02-08T15:53:59+00:00","author":{"@id":"https:\/\/forhumanity.center\/bok\/#\/schema\/person\/9fe92282828f1bcb1c7428e918e2da10"},"breadcrumb":{"@id":"https:\/\/forhumanity.center\/bok\/chain-of-custody\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/forhumanity.center\/bok\/chain-of-custody\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/forhumanity.center\/bok\/chain-of-custody\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/forhumanity.center\/bok\/"},{"@type":"ListItem","position":2,"name":"Chain-of Custody"}]},{"@type":"Person","@id":"https:\/\/forhumanity.center\/bok\/#\/schema\/person\/9fe92282828f1bcb1c7428e918e2da10","name":"Admin4Human","image":{"@type":"ImageObject","@id":"https:\/\/forhumanity.center\/bok\/#personlogo","inLanguage":"en-GB","url":"https:\/\/secure.gravatar.com\/avatar\/45764ad1c4858ce9ebfc83b3d26f2f053be31f0e608c4caced31fe7cb92b63de?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/45764ad1c4858ce9ebfc83b3d26f2f053be31f0e608c4caced31fe7cb92b63de?s=96&d=mm&r=g","caption":"Admin4Human"},"sameAs":["http:\/\/forhumanity.dev\/web"],"url":"https:\/\/forhumanity.center\/bok\/author\/admin4human\/"}]}},"acf":[],"_links":{"self":[{"href":"https:\/\/forhumanity.center\/bok\/wp-json\/wp\/v2\/posts\/1278","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/forhumanity.center\/bok\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/forhumanity.center\/bok\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/forhumanity.center\/bok\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/forhumanity.center\/bok\/wp-json\/wp\/v2\/comments?post=1278"}],"version-history":[{"count":12,"href":"https:\/\/forhumanity.center\/bok\/wp-json\/wp\/v2\/posts\/1278\/revisions"}],"predecessor-version":[{"id":3806,"href":"https:\/\/forhumanity.center\/bok\/wp-json\/wp\/v2\/posts\/1278\/revisions\/3806"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/forhumanity.center\/bok\/wp-json\/wp\/v2\/media\/3026"}],"wp:attachment":[{"href":"https:\/\/forhumanity.center\/bok\/wp-json\/wp\/v2\/media?parent=1278"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/forhumanity.center\/bok\/wp-json\/wp\/v2\/categories?post=1278"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/forhumanity.center\/bok\/wp-json\/wp\/v2\/tags?post=1278"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}