This document provides guidance for human resources professionals on conducting digital investigations of computer system abuse in the workplace. It outlines best practices for gathering digital evidence, preserving data, interviewing employees, and documenting the investigation process. Key steps include defining the scope of the investigation, identifying and securing relevant data sources, maintaining a formal chain of custody for any collected evidence, and keeping detailed but objective records. The goals are to thoroughly and neutrally investigate potential policy violations while treating any obtained information with appropriate confidentiality.