8.6. Collecting, Seizing and Protecting Evidence Notes | IT Ethics and Cybersecurity BIM | TU | TABFlux