As a digital forensics analyst, you've been tasked with investigating a suspected data breach in your organization. You need to collect evidence from various compromised digital devices. Proper procedures are crucial to ensure that the evidence is admissible in court. Which step is MOST critical when beginning the collection of digital evidence to ensure its admissibility in court?
A. Making a copy of all data on the device
B. Analyzing the contents of volatile memory
C. Documenting the scene and creating a chain of custody form
D. Interviewing individuals who had access to the devices