In the field of computer forensics, what types of tools and techniques are used? What are the issues involved in protecting all of the organization’s information. Should all digital conversations be preserved and how, what are the legal aspects? How might an organization notify its users that all communications are being monitored and preserved? There have been several incidents lately in which backup media containing personal customer information were lost or stolen. How should backup media be secured? What about off-site storage of backups? As with any recovery strategy, an organization should schedule a full test rehearsal, what should the after-action review focus on?