Once computer forensics investigator has ascertained legal authority and scope of investigation the task for a computer forensics investigator will be able to collect live volatile data from the suspect computers. Discuss with others what kinds of the data are considered volatile and the methods through which the investigators should collect and preserve the volatile data. Recognize the consequences of not collecting or preserving the volatile data to the investigation.