including documentation, snapshot management, and the cardinal rule of never attacking unauthorized systems — protect you legally and professionally.