Computer forensics retrieval; retrieval of data from any digital device can prove vital in a commercial or legal investigation. Furthermore, the potential evidence should be gathered and preserved by a forensic investigator as a priority.
Getting Started With Computer Forensics Retrieval
If you have a suspicion that the device holds data then either turn it off. Alternatively, you can put into sleep mode or leave it alone as a last resort. This is because even an IT department can inadvertently corrupt any evidence or intelligence that may be on the device. As they will not have the retrieval software to gather, preserve and present that evidence.
Evidence can be lawfully gathered from:
- Laptop
- Desktop
- Palmtop
- Mobile phone
- Satnav
- Printer and fax
Our Latest Case Study
When three employees, from three key roles, including one Director, left our clients business there was a suspicion that the employees had set up a competing business in breach of their contract. It was believed that they had stolen data from the business in order to establish and have rapid growth in their new enterprise.
An immediate computer forensics investigation was conducted on the computers and mobile phones which they had used in the course of their business for our client. From an initial phone conversation the following day our forensics team retrieved the devices and two days later produced a report showing conclusive evidence that the three employees had planned to leave the client business together at a coordinated time and had taken crucial relevant data, including client contact details with them.
In addition evidence was found that they had diverted forthcoming contracts from our client to their newly formed business.
Armed with this evidence the client was able to go via the legal process to find a swift and effective resolution to the breach of contract and theft of data causing minimal financial harm and disruption to their business.
BOOK A CONSULTATION