. "In addition, information such as usernames and configuration information along with media, downloads and product keys should be documented and stored in a safe location." . . . .