Typical cases

Employer-Employee conflict:

  • Data entry and extraction (deleted or not) using a protocol established by the courts
  • Rigorous computer system analysis
  • Computer system information search using keywords
  • Inventory of this information, taking care to exclude confidential or private information so as to protect commercial and/or professional confidentiality
  • Production of reports and testimonies in accordance with court requirements


Amicus Curiae (friend of the court)

  • Computer support upon any Amicus Curiae request, which requires a unique and proven procedure before the Court
  • Data entry and extraction (deleted or not)
  • Computer system information search using keywords
  • Inventory of this information, taking care to exclude confidential or private information so as to protect commercial and/or professional confidentiality
  • Editing to preserve access to incriminating data
  • Legal computer expert advice in terms of Investigative and forensic accounting and computer forensics


Anton Piller Order

  • Drafting advice
  • Data entry during the search and extraction of data, deleted or not
  • Rigorous computer system analysis
  • Computer system information search using keywords in order to optimize efficacy
  • Inventory of this information, taking care to exclude confidential or private information so as to protect commercial and/or professional confidentiality
  • Preparation of an expert’s report in accordance with court prescribed procedure
  • Expert testimony in the field of Investigative and forensic accounting and computer forensics:


Expert testimony

  • Analysis and detailed review of a computer file
  • Preparation of an expert’s report and supportive testimony in accordance with court prescribed procedure
  • CV of an expert available to testify to the credibility of the expert’s report


Conflict between two companies

  • Second opinion (if necessary)

Data entry and extraction (deleted or not)

  • Computer system information search using keywords
  • Inventory of this information, taking care to exclude confidential or private information so as to protect commercial and/or professional confidentiality
  • Expert testimony in the field of Investigative and forensic accounting and computer forensics and advice on the procedure to be implemented with respect to your computer system


Computer forensics (file support)

  • Comprehensive audit of public databases, of social media networks as well as any information content information in sub-networks that are hard for the general public to gain access to
  • Use of software specially designed to create information profiles on individuals/companies.
  • Rigorous verification and meticulous analysis of computer evidence
  • Computer system information search using keywords in order to optimize efficacy
  • Inventory of this information, taking care to exclude confidential or private information so as to protect commercial and/or professional confidentiality


Document/email review

  • Viewing and extraction of documents relevant to a file so that it is all eventually produced in previewing mode
  • Preservation of information integrity
  • Production of expert report and expert testimony in terms of Investigative and forensic accounting and computer forensics

Computer evidence

  • Safeguarding of evidence in order to maintain its integrity and to ensure its validity until it is presented in Court.
  • Management of seized objects and monitoring of all documentation in a secure environment designed for the conservation of fingerprint evidence.