Which of the following protocols would be MOST important in preserving digital evidence of criminal activity during an investigation?