How computer forensics evidence is protected