Just for sure: do you represent the eligible entity? Please read this page, before you may need the below procedure.
Sometimes, even though the current operation is legal, you would like to hide its details. The exact reason is up to you. With Drive Badger, it is possible, as long you follow the below procedure and prevention methods.
Do whatever's possible to either turn off the computer, or disconnect the USB drive with Drive Badger.
Persistent partition is encrypted to protect exfiltrated data from being accessed by any third party person - but also to protect you from being proven guilty of data exfiltration, industrial espionage etc. There is no way to distinguish between Drive Badger and ordinary Kali Linux, or to prove the fact of data exfiltration, until:
You will still need to find a good explanation, why you tried to run Kali Linux Live on someone's computer without even asking for permission.
First of all, use encrypted persistent partitions where possible. Having some spare Drive Badger devices to handle old computers should be an exception - while in normal circumstances you should always encrypt everything.
Use different passwords:
P0lic3Dr1v3S@msungG0ld
, P0lic3Dr1v3S@msungR3d
, P0lic3Dr1v3S@nd1skPr0
)Use good passwords: strong, but easy to remember by attack operators.
Give passwords to people that you trust enough (in both their intentions, and their carefulness).
Use a password manager (eg. KeePass) to store passwords. Avoid writing them on paper - and if you have to, write password and other detail on separate papers.
Don't make any labels on your drives.
When entering the password, make sure that noone is watching your keyboard.
Avoid USB hardware keyloggers: if possible, try to check the keyboard cable for any suspicious looking devices, eg. adapters, cable extensions that aren't justified by the distance between keyboard and computer. If you have doubts, disconnect the keyboard and use a different one. Also, avoid wireless keyboards.