Which of the following is a documentation of guidelines that computer forensics experts use to handle evidences?
Chain of evidence
Chain of custody
Incident response policy
Evidence access policy
Submit