The legal key is you can pull information to a secured server that's securely protected and authorized so you can fix the problems now you can subpoena that information when the time comes but during the process you have to analyze everything to so responses reactions and learn all the measures and See more...