Crucial Technologies is conducting post-incident forensics after a possible compromise of a system. Before the system gets to its destination it will pass through numerous employees in the IT department. What document needs to be updated with the system as it makes its way to the proper section?
Copy of the harddrive
The incident ticket
The operating system
Each employee's timecard
Chain of custody