• ADVANCED FORENSIC ANALYSIS

    A small company must produce accounting information for an administrative appeal, but relevant data is not accessible because it’s stored on a legacy and non-standard, custom-made and obsolete application, and the developer can not be contacted.
    Is there such a thing as “digital forensic archaeology”?

  • ECONOMIC-DIGITAL FORENSICS

    A company has filed for bankrupcy and several people with access to the accounting system are suspected of fund diversion.
    Is it feasable to reconstruct the chain of events of the last months? With enough warranties? Is it possible to spot missing digital assets?

  • FORENSIC READINESS AND CORPORATE COMPLIANCE

    The new regulations in Spain establish the criminal responsabily of companies that fail to properly control the activities of their employees.
    How should a company prepare in order to have electronic evidence at their disposal? Is it possible to prevent fraud and the commission of illicit activities?

  • E-DISCOVERY

    A significant volume of documentation must be reviewed in a short period of time.
    Which is the most efficient way to conduct this review? How long can it take, and how many internal resources must be allocated?

  • ONLINE REPUTATION (Community Manager Support)

    A company is being slandered throuch anonymous e-mails, posts on online forums, and social networks.
    Is the company able to do something about it, or is resignation the only option?

  • FORENSIC ANALYSIS OF E-MAIL

    Two companies are in dispute over the amount of a debt. One of them has e-mails where the other one acknowledging the exact owed amount.
    Do the printouts of those emails carry any probatory value? Can they be challenged? How should those e-mails be presented?

  • UNFAIR COMPETITION

    An employee has given sensitive and confidential information to a direct competitor.
    How can a solid digital forensics investigation be conducted, in order to get authorisation for a preliminary injunction against the competitor?

  • MISUSE OF CORPORATE ASSETS

    An employee spends most of his working hours using the corporate IT resources for personal purposes.
    How, and to which extent, can the inadequate use of corporate resources be proved?

  • PROTOCOL FOR THE MANAGEMENT OF DIGITAL ASSETS

    A high-ranking executive has finished his professional involvement with a company and, after a while, appears as the visible head of a new company that poses direct competition. The executive had signed a non-competition agreement.
    Which precautions should be undertaken with the digital assets assigned to executives for professional use?

  • VIOLATION OF THE SECRECY OF COMMUNICATIONS

    The CEO of a multinational company has been alerted of an an unauthorized access to his e-mail inbox.
    How accessed the messages? Exactly which information was accessed? Can it be documented and proved, so that legal actions can be initiated against the author?

  • DATA PROTECTION

    A bank has been imposed a fine by the Spanish Data Protection Agency.
    Are there any unsupervised databases on the IT equipment of a company? How many secondary or temporary databases exist in the company?

  • LEAK OF CONFIDENTIAL INFORMATION

    An investment group wants to acquire a company holding several patents.
    Has any information related to those patents been leaked to the outside? Through which channel? Is sensitive information traceable throughout the company?

  • Valor – Análisis Forense Avanzado
  • Valor – Análisis Forense Informático-Económico
  • Valor – Forensic Readiness y Corporate Compliance
  • Valor – E-discovery
  • Valor – Reputación Online (Community Manager Support)
  • Valor – Análisis Forense de Correo Electrónico
  • Valor – Competencia Desleal
  • Valor – Abuso de Recursos Corporativos
  • Valor – Protocolo de Gestión de Activos Informáticos
  • Valor – Violación del Secreto de las Comunicaciones
  • Valor – Protección de Datos
  • Valor  – Fuga de Información Confidencial
 
 
 

Forest Digital Evidence provides added value based on: Counseling, Experience, Credibility, Reliability, Simplicity and Confidentiality.

Our mission is to aid in the solution of a problem, the mitigation of a concern, and ultimately to achieve full customer satisfaction.