Our forensic services provide:
- Prompt identification of relevant ESI sources
- Compliance and monitoring of preservation obligations and litigation holds
- Data mapping of your clients’ storage and IT infrastructure
- Preparation of a data collection protocol tailored to the matter and your strategy
- Collection and analysis of less traditional data sources including mobile devices, cloud-based data and social media sites
- Forensic recovery of deleted data and carving out documents from unallocated spaces on storage media to investigate spoliation charges
We discover, gather and analyze:
- Standard directory files, hidden files, deleted files and file fragments
- Internet history and file access history
- USB device activity
- E-mails and deleted e-mails
- Passwords, logs and login IDs
- Password-protected files
- Temporary, encrypted and stegged files
- Searches performed
- Cookies
- Network traces
- Time-stamp information
WeDiscoverData knows it takes more than just software to ensure your success. In addition to our technology solutions, we have a dedicated team of highly experienced forensic examiners ready to help.
Our team captures forensic data from:
- Laptops
- Social media
- Workstations
- Network servers and sources
- Email servers and sources
- Desktops
- Cloud-based environments
- RDBMs
- Raid arrays
- Live systems
- Backup tapes
- CDs/DVDs
- Cell phones
- Apple systems
- Phones
- PDAs
- Third-party storage sources
- Internet-based services: Hotmail, Gmail, AIM, ICQ, MSN and Yahoo
- SharePoint servers spoliation charges