Our computer forensics technology extracts and collects all files on the computer. This includes PDFs, Word files, photographs, videos, metadata, and other evidence. We are also able to extract data from most laptops, desktops, PCs, MacBooks, Windows Computers, and more.
- Data collection and preservation of up to 2 TB.
- Backup recovery services.
- Flat Fee Services – Includes free encrypted data storage for 2 years.
- Defensible, remote collection.
- Opposing party production available.
- Use evidence reports to create trial exhibits.
Explore Our Computer Evidence Packages
Computer Forensics Covers all Computers & File Types
We secure digital evidence from almost all types of desktops, laptops, and computer applications. For example, we collect, preserve, and produce all documents, PDFs, Word Files, spreadsheets, photographs, emails, and more. Here is a list of the most common devices and file types:
- Mac Computers
- Windows Computers
- Servers
- Financial Files: QuickBooks, Quicken, QuickTax, and more.
- Text Files: MS Word, PDFs, WordPerfect, Rich text, etc.
- Spreadsheet Files: Numbers, Excel, and others.
- Database Files: SQL, MS Access, FileMaker, etc
- And many more!
Digital Evidence for Your Case
Our eDiscovery and computer forensics services are designed by lawyers for lawyers. After consulting, we will assist you with strategies on devices to search, evidence to look for, how to cull the vast data troves, and how to efficiently produce evidence for opposing counsel and for trial. We work on all types of cases, for example:
Intellectual Property cases with copyright disputes.
Family Law cases to negotiate property division, spousal support, custody arrangements, or identify hidden assets and accounts when there has been financial infidelity.
Employment Law to prove or disprove allegations of sexual harassment, racial discrimination, or wrongful termination.
Business Litigation for contract disputes, business valuation concerns, and more.
Criminal Law for defense or prosecution.
Probate Administration where there is a will contest or need to identify assets for probate.
Remote Collection Services Wherever You Are
We handle the data extraction remotely with our Remote Collection Unit. This means we will ship you our Black Box and conduct the forensic examination remotely. Then you return the Black Box to us using our pre-paid shipping label and box. Once complete, we provide you with an Evidence Report for easy legal review.
Legal Review of Your Digital Evidence Made Easy
We provide Evidence Reports with a list of the most important documents, including all metadata, and links to source files and attachments.
Computer Forensics Process
To ensure data integrity, we create two identical images of a computer. The first is an “Evidence Drive” that is preserved for trial, and the second is a “Review Drive”. This latter drive is the one you or your lawyers will use for reviewing the digital evidence. We collect all data on encrypted hard drives with secure delivery services to anywhere in the US that UPS or FedEx delivers. Our digital evidence collection services are fully defensible.
Digital Evidence Admissibility & Authentication
In federal court, evidence admissibility is governed by the federal rules of evidence. Generally, you must show that a given email or another piece of evidence is relevant, and, that it is not barred by hearsay rules. Additionally, you must authenticate the item in question. For example, by authenticating Word document, you must demonstrate that no one has altered it and that it comes from the stated source. Our computer forensics will establish the authenticity of your evidence.
Learn more about different evidence sources and types
- Backups
- Computer and Smartphone Forensics
- File Types
- Internet History
- Log Files
- Metadata
- Web Bookmarks
- Google Docs & Sheets
- Mac Computers
- Photos & Images
- Servers
- Videos
- Virtual Machine Conversion
- Windows Computer
- Word, Excel, PDF files