Before powering down, assess the need to capture RAM or "live" data, especially if encryption software is active.
Generate cryptographic hashes (MD5 or SHA-1/SHA-256) of both the original data and the forensic image to verify they are bit-for-bit identical. Before powering down, assess the need to capture
Use hardware write-blockers during acquisition to prevent any changes to the original source media. Before powering down