This document discusses digital evidence and its analysis methodology. Digital evidence includes information stored on electronic devices like computers, cell phones, hard drives, etc. It must be properly seized, secured and analyzed to avoid contamination. A bit-stream image of storage devices should be created and verified using hashing. Files, slack space and unallocated space are analyzed for keywords. File dates, names and anomalies are documented. The Information Technology Act of 2000 covers various cybercrimes and penalties.