Cyber technology broadly refers to computer technology that involves the Internet. Cyber technology has become greatly embedded into our everyday lives. The cell phone is one prime example of how globalized and deeply penetrated cyber technology has become. Individuals of all backgrounds own cell phones and a significant gap has now been bridged as we are able to communicate faster and more efficiently to persons on other sides of the world. In a study done by Pew Research Centre, Poushter, 2016
Indeed, proposals for amendment of Kenya’s cyber laws have been scrutinised with a keen human rights eye to ensure that rights are safeguarded. Considering that crimes must be defined before anyone can be punished for committing them, human right practitioners are always wary of the personal rights
in the investigation and establishment of facts or evidences to be used in legal cases or other proceedings. The scope of forensic analysis varies from information retrieval to reconstructing series of events that have occurred in the past. In this paper we would be discussing the meaning of the term ‘COMPUTER FORENSICS’, its uses, the users of computer forensics, steps involved in this type of forensic investigation, its requirements, various methods of hiding and recovering data, the meaning of anti-forensics