Being able to handle Computer Investigation in-house stands us apart from other private investigators - we don't subcontract the work, enabling the fruits of an investigation to be relevantly applied to other aspects.
Follow the '
See next page - Computer Investigation ' button below for information about what can be achieved, and the immediate action you should take to preserve evidence
Many users think that deleting a computer file, or clearing browsing history will remove the data (and evidence) from their computer - a mistake many have found to their cost. A computer is a mathematical algorithm, and what has been removed can be returned when the machine is investigated; contents of files, with times and dates of when files were created and web sites visited, email and instant message transcripts, images, videos - anything that machine may have been used for since it was built
Make sure that nothing is compromised by your initial actions
Make sure nothing is damaged; it is best not to touch if other methodology - such as fingerprinting (including keyboards etc) - may be employed
A chain of custody shows the movements of the computer and that no-one else has had the opportunity to amend it
We keep the disruption to your business or personal environment to a minimum
News item in the Daily Telegraph regarding investigation of a computer used in a teacher's class who failed to prevent young pupils accessing pornographic images
We are Corporate Investigators with experience spanning several decades, using such as computer analysis and other forensic tools as an aid to investigation of business affairs
Investigation of a computer can be an evidential aid in litigation, particularly in emplyment matters where the actions of an employee can be determined from investigation of their company laptop