Protecting computer evidence

          What steps must be taken to protect computer evidence from getting destroyed, contaminated, or corrupted?