This article is devoted to extracting of extraction and the study of computer information when investigating computer crimes. Analysis of procedural issues in the implementation of inspection and search of computer systems. We substantiate the possibility of these investigations. There is a need to develop tactics remote computer systems and studies of their data.