We assist with conducting investigations into fraud and corruption through the use and focus of Forensic Technology and eDiscovery services. We offer specialist support in the preservation and analysis of electronic evidence (forensic imaging and analysis of computers, cell phones and cyber crime scene management) to ensure that organisations are guarded against the ever growing security related threats. The approach we adopt takes a holistic view of the role of Forensic Technology in an organisation and in support to a forensic investigation or litigation matter.

eDiscovery Approach and Methodology

eDiscovery is the general term used to describe the initial phase of a litigation matter, where the parties in a dispute are required to provide each other relevant information and records, along with all other evidence related to the case. This data includes all electronic information which typically comprise of:

  • Word documents;
  • Spreadsheets;
  • Databases;
  • Calendar entries;
  • Emails;
  • Multi-media files; and
  • Viruses, Trojans and spyware.

Emails and SMS/MMS and Social Media messages can be valuable source of evidence in civil or criminal litigation, because people are often less careful in these exchanges than in hard copy correspondence such as written memos and postal letters.

Exactech eDiscovery applications and technology (E2DS) enable organizations to pull information and records from the massive volumes spanning an enterprise and eliminate exact copies to reduce the effort and cost of reviewing the remaining content. We also offer proactive advisory services to assist with ensuring that organisations achieve Digital Forensic Readiness (DFR). The latter is particularly important during litigation as it lowers costs and management of eDiscovery actions, while enabling the electronic discovery of Electronically Stored Information (ESI).

1st Generation Exactech eDiscovery Methodology

Through a simple 5 step process, we allow organisations to tap into our technical skills through assisting with the imaging, processing, analysis and reporting phases of an enquiry.

While traditional in many ways, Computer forensics (CF) is a specialized form of eDiscovery in which an investigation is carried out on the contents of the hard drive of a specific computer. After physically isolating the computer, our investigators make a digital copy of the hard drive. All investigation is done on the digital copy.

2nd Generation Exactech eDiscovery Methodology

Comparable to the 1st Generation approach, the key differentiator is that this method puts the investigative and discovery power into the hands of the client.

Our role is merely to secure and harvest ESI so as to have it in a format that is user friendly. This approach is most beneficial for organisations with investigative resources but lacking a digital forensic skillset. The client simply logs into our E2DS environment, analyses the indexed data and generates reports to facilitate the investigation or litigation matter.