You are working with digital evidence of criminal activity. What is the most important protocol in this situation?