Many cases involve data that has a direct bearing on the outcome of the case. Sometimes this data is easily subpoenaed, sometimes the other party might not even realize it exists. This data could be on legacy systems and be capable of totally changing the outcome of the case
This screen above is from a computer that we originally installed in December of 1994. It was finally retired in 2018 after being used every day and attached to a Novell server to run a dos-based custom program that runs the entire business. Evidence for any kind of action would require information from this network. We are capable of harvesting information like this for our clients. We are experts at retrieving information from these “Legacy” systems to provide a complete picture. Finding someone that has the background and knowledge to access this older data is almost impossible. We can help you!
Does your company have proprietary data that it needs to protect? Are you concerned that someone may be stealing information from your company? We provide consultations to determine if your business is being properly managed from an IT perspective. We conduct audits of company IT effectiveness both in tandem with IT personnel and audits of the IT personnel at the direction of boards, CFOs and CEOs. We are also available to assist in the interview of IT candidates to ensure they have the knowledge their CV claims.