Once the computer forensics investigator has ascertained the legal authority and scope of the investigation the task for a computer forensics investigator will be able to collect live volatile data from the suspect computers. Discuss with others what types of data are considered volatile and the methods by which investigators must collect and preserve volatile data. Identify the consequences of not collecting or preserving volatile data to the investigation.