Data Breach Incident Response

Forensic Recovery can help your business investigate and recover from a potential data breach.

After a scoping call, we can engage and recommend the best course of action to help you identify the cause of a breach and address any other questions you need to answer. We work with a select group of extremely experienced and efficient analysts and responders, and our rates are competitive.

Whether your copmpany is made up of a sole practitioner or a a large business, we will take your inquiry seriously. We also have legal resources to help you navigate the various laws and regulations governing data breach notification across jurisdictions.

Common Case Scenarios

  • Intellectual Property Theft
    An employee or executive leaves an employer to start a new company or work for a competitor. The previous employer ends up in a legal dispute because the employee took with him client contacts, confidential trade secrets and intellectual property, or left a backdoor for remote access to the network at a later time. We can help determine how the employee acted prior to leaving the company or at the onset of litigation.
  • Child Pornography Charges (Peer-to-Peer))
    The government continues to adapt to the changing environment related to Internet Crimes Against Children (ICAC). Chat room interactions, traveler investigations, and possession and distribution have long been the focus of such investigations. Defendants are often charged with possession or distribution of child pornography and need support to analyze the reports and electronic evidence the prosecution presents through discovery. When necessary, we will arrange for our independent review of electroic evidence, following the Adam Walsh Act and State Laws, providing the attorney with an unbiased interpretation of the Government''s case and what the electronic evidence tells us.
  • Child Exploitation Investigation
    (Knowledge and Control))

    A key element of possession of child pornography involves knowledge and control by the alleged offender. There are numerous areas of electronic evidence that provides explicit evidence as to knowledge and control.
  • Counter Terrorism Investigation
    In 2007, Forensic Recovery, LLC was hired by the Federal Public Defenders Office to conduct a review of evidence in a highly publicized terrorism case. Over a period of almost one year, the government continued to examine evidence and provide such findings as discovery.
  • Date and Time Stamps of Computer Files
    (timestamp)

    In 2009, an individual was arrested for violating his terms of supervised release for possessing child pornography. It should be noted the original charge and subsequent incarceration was also for possession of child pornography.
  • Divorce Inquiries
    In 2009, a West Palm Beach client requested a complete examination of his computer's hard drive. This request came after a filing for divorce and an allegation by the client's wife that child pornography had been seen on the client's hard drive.