In the context of computers and law enforcement use, it is an equivalent term to chain of custody. It involves the method of generation, transmission and storage of information that may be used to trace the origin of a piece of information processed by community resources.
Sources:
CNSSI 4009-2015
from
ISA SSA - Adapted