Services

Our forensic services provide:

  • Prompt identification of relevant ESI sources
  • Compliance and monitoring of preservation obligations and litigation holds
  • Data mapping of your clients’ storage and IT infrastructure
  • Preparation of a data collection protocol tailored to the matter and your strategy
  • Collection and analysis of less traditional data sources including mobile devices, cloud-based data and social media sites
  • Forensic recovery of deleted data and carving out documents from unallocated spaces on storage media to investigate spoliation charges

We discover, gather and analyze:

  • Standard directory files, hidden files, deleted files and file fragments
  • Internet history and file access history
  • USB device activity
  • E-mails and deleted e-mails
  • Passwords, logs and login IDs
  • Password-protected files
  • Temporary, encrypted and stegged files
  • Searches performed
  • Cookies
  • Network traces
  • Time-stamp information

WeDiscoverData knows it takes more than just software to ensure your success. In addition to our technology solutions, we have a dedicated team of highly experienced forensic examiners ready to help.


Our team captures forensic data from:

  • Laptops
  • Social media
  • Workstations
  • Network servers and sources
  • Email servers and sources
  • Desktops
  • Cloud-based environments
  • RDBMs
  • Raid arrays
  • Live systems
  • Backup tapes
  • CDs/DVDs
  • Cell phones
  • Apple systems
  • Phones
  • PDAs
  • Third-party storage sources
  • Internet-based services: Hotmail, Gmail, AIM, ICQ, MSN and Yahoo
  • SharePoint servers spoliation charges