A user’s computer is suspected of hosting illegal files. The IT department has removed the computer and placed it in a secured, cypher-locked room, where it will remain until the local authorities arrive.
Which of the following actions should the IT department perform NEXT?
- Preserve data integrity
- Identify violations of acceptable use
- Collect evidence of illegal activity
- Report through proper channels