The persons present at the search, or other person aware of the operation of the computer system, can give important information. Each witness should be interviewed on how the lifted systems are used. There are revealed the methods of input, sorting and storing data on the computer, and practices related to various aspects of its current use.
Where is investigating incidents of intrusions into computer systems of businesses, often the undertaking victim specialists are the most important source of information for the investigators. Thus investigators should not use active penetration techniques in system for sampling, enjoying the support of those who administer the system.
In some special cases, the computers of other people, located in the same location, may have relevant evidence. For example, it cites relevant cases in which the documents have been found within the computers of secretaries of individuals under investigation.