The document provides guidelines for investigating crime scenes involving computers. It outlines steps such as mapping the area, determining equipment needs, creating a plan of attack, preparing search warrants, securing the scene, interviewing suspects, and documenting findings. Key aspects are having the necessary tools and media for backups, assigning team roles and responsibilities, and thoroughly documenting all steps of the process.