Well, seizing the computer in question comes first of course. But making sure that you have a right to seize the computer is essential. The Us Federal Guidelines for Searching & Seizing Computers is a guideline that can help diffrenciate that right. Seizing the wrong hardware and computers can harm businesses and waste crucial time. So let's say that there is an established reason for seizing the computer in question. Note-Contraband, evidence with information or used in instrmentality/hardware are established reasons.
Collecting the Evidence
There are many differing opinions on whether investigators should quickly turn the computer off or leave it on. Vital data can be lost forever, the computer may not come back on and the suspect could have left traps so it may be best to collect files and leave the computer running as it is. If a computer is turned off it is important to unplug it entirely from the sockets. Do not turn it off using the computer commands or pressing the power button.Investigators are only supposed to collect hardware, software and peripherals (such as printers, digital cameras, etc.), that they can articulate there being a reason to seize. This is referred to as the independent component doctrine.
BY collecting the evidence and hopefully obtaining everything you could from it, you also have to answer the who, what, where, and whys surrounding the case! Remembering that there will always be gaps in information and not to fully rely on the digital evidence is key. Important guidelines that must be adhered to:
Retrieving the Data
Now comes the fun part-finding whatever you are looking for. Depending on how much time you are alloted (based on the case and circumstances) determines how much information you are going to copy from the computer. A
Puting the Pieces together