Question: Describe an accepted method for ensuring data integrity during computer investigations, making sure to note at least one possible risk associated with using this methodology. Explain why data integrity matters when submitting information from an investigation into evidence.