Watch this video on YouTube
During a cyber investigation, it is critical that any time evidence changes hands, it is documented. What is this process known as?