Which of the following is a documentation of guidelines that computer forensics experts use to handle evidences?
Evidence access policy
Incident responsepolicy
Chain of custody
Chain of evidence
Submit