This is a dedicated watch page for a single video.
After identifying a root kit used to capture detailed accounts receivable information and isolating the server, what should be the next step to ensure admissibility of evidence from a legal standpoint?