Computer Forensics

Do you suspect that there is evidence that could assist you in a corporate investigation stored on a digital device? With Internet and digital media usage increasing all the time, the need for Computer and Digital Forensics is also growing, and can be performed on behalf of individuals, companies, law firms or government departments.

What is Computer Forensics?
Computer Forensics focuses on finding and isolating evidence on digital devices such as desktop computers, laptops, network servers, mobile phones, smart phones, portable storage media and digital cameras. A structured examination can identify information that is stored on the device, as well as data that has been deleted or hidden, as well as ascertaining the timeline and the perpetrator of the activity. Computer Forensics is normally performed as part of an investigation into:

• Criminal activity such as fraud or theft within the organisation
Employee misconduct such as viewing of offensive material in the workplace
• Misuse of electronic equipment such as for own personal use or operating own business from work
• Workplace bullying or unfair treatment
• Organisation policy breaches such as sending inappropriate or offensive emails
• Execution of a search warrant or civil search such as Anton Piller Order
• Data theft or compromise of Intellectual Property
• Regular Computer Forensics audits within the organisation
• Civil cases which involve the movement of data on digital devices

Undertaking Computer Forensics
Where Computer Forensics is required, it should be performed as soon as possible in order to avoid tampering with or disposal of devices. Before charging IT personnel within your organisation with Computer Forensics, it is important to consider whether they are aware of the stringent requirements covering data handling and examination should you require the evidence for legal purposes at a later date. Devices need to be imaged, examined and investigated in the correct way, to ensure the integrity and admissibility of the evidence before any court, tribunal or hearing.

Regents’ Approach
Regents’ Computer Forensics experts have a wide range of tools that assist with the examination and processing of data including email files, browsing activity, document history and stored or viewed images and video. We can retrieve information that has been deleted, determining the circumstances of deletion, be they accidental or intentional.

Regents’ Computer Forensics experts follow specific steps, including:

• Identification of the device in question
• Imaging [copying] of the device to a separate medium for preservation of data
• Collection of relevant data
• Analysis and interpretation of relevant data
• Production of an expert report detailing the findings
• Expert witness presentation, if required

Contact Us
To discuss Computer Forensics on a confidential basis, email contactus@regentsriskadvisory.com.