Use this digital forensics investigation checklist to capture essential case information and maintain chain-of-evidence integrity. Record case number, incident date, location, investigator, and device details including type, make, operating system, serial number, and user accounts. Document incident description, access method, targeted evidence, and potential data deletion. Track key timeline events, preservation steps, and device state during handling. Note who had access, linked accounts, permission changes, active apps, suspicious communications, and social media ties. Add additional notes to support clear, defensible reporting.
With SafetyCulture you can
With SafetyCulture you can
About author
This community page makes available free workplace checklists and templates created by other users within the SafetyCulture community. SafetyCulture has re-published this content and where possible, has credited the original author. SafetyCulture has not verified the accuracy, reliability or suitability of any community content. You agree that your use of any of this content is in accordance with SafetyCulture’s Terms and Conditions.
