Managed Solutions
- Foreign Corrupt Practices Act
- Third Party Vendor Screening
- Conflicts of Interest
- Threat & Risk Assessment
- Workplace Violence & Bullying
- IT & Physical Security Reviews
View the Due Diligence & Compliance brochure.
View the Digital Forensics brochure.
| |
Computer Forensics and Digital Forensics
Computer Forensics
- Email data recovery in compliance with industry best practices and applicable law
- Evidence preservation with best practices chain-of-custody protocols and mirror-imaging technology
- Access active data files
- Recover deleted data files and/or file fragments
- Recreate time-critical computer events
- Recover data due to hardware or software malfunction or destruction
- Access password-protected or encrypted files
- Internet and VOIP communications
- GPS and video analysis
e-Discovery
- Locate electronic information/evidence and/or documents that are relevant to the litigation and/or responsive to discovery requests
- Locate the electronic information/evidence and documents from computers, electronic storage media and corporate information systems utilizing state-of-the-art computer hardware and software
- Retrieve the relevant and responsive electronic information/evidence and documents utilizing state-of-the-art collection methods and computer technologies
- Preserve the relevant and responsive electronic information/evidence and documents
- Review the collected electronic information and documents to determine what portion are relevant and responsive, utilizing trained investigators, and state-of-the-art computer hardware and software in a cost-effective manner
- Sort privileged electronic information and records out of the production set, and create appropriate logs in compliance with best practices and applicable law
- Prepare a written report containing the relevant and responsive electronic information/evidence and documents in a cost-effective manner
|