What is the chain of custody in the context of evidence acquisitions?
The method for shredding files to prevent data leaks
The technique of encrypting data to protect its integrity
The documented and unbroken record of evidence handling and transfer
The process of removing unauthorized users from a system