Log every individual who handles the evidence, including the date, time, and purpose of the interaction. Field vs. Lab Considerations Best Practices for Computer Forensics
Take detailed photographs of the scene, including screen contents, device serial numbers (IMEI for phones), and physical connections. Log every individual who handles the evidence, including
Before powering down, assess the need to capture RAM or "live" data, especially if encryption software is active. including the date