Description: When it comes to a post incident self-collection of digital data such as: employee dismissal, data exfiltration, inappropriate behavior/computer usage, or security breach, there is potential for litigation. Whatever the situation, IT personnel should utilize forensic best practices to assure that the information is accurate, admissible, and that the data and original sources are preserved. This presentation will show attendees how to properly conduct a forensic collection adhering to current best practices using freely available and vetted tools and techniques.