The law and practice referred to in this article or webinar has been paraphrased or summarised. It might not be up-to-date with changes in the law and we do not guarantee the accuracy of any information provided at the time of reading. It should not be construed or relied upon as legal advice in relation to a specific set of circumstances.
What can be found on a computer, phone or other device seized? What does ‘deleted’ mean? What can an expert or the police find that you can’t? The forensic and technical analysis of hardware and the exploration of material in unallocated clusters, a cache, or otherwise beyond the retrieval of a normal user is very much a topic of the expert practitioner. Intention is key. An analysis of search terms or internet history, as well as highly personal interrogation, will typically form an important part of any police investigation. Our IT forensics’ services, in collaboration with leading experts, make sure only the right people end up in the dock.