Why is a chain of custody important in a cybercrime case?