The level of training of both: professionals in information security and institutions of governmental nature to address crimes against digital information, are the objectives of the present article, which involves a discipline called forensic computing; their uses, methods for procedures and use of methodologies are in accordance to current legislation and international standards such as the norm ISO/IEC 27037 - 2012, which refers to information technology, security techniques and Guidelines for identification, collection, acquisition, and preservation of digital evidence. The document sets the process exhaustively as well as the elements of hardware and software used for this kind of studies; methods of obtaining data, and the true value of developing and maintaining a chain of custody with the collected evidences.