DIGITAL FORENSICS & INFORMATION SECURITY
Overview

Quest has done extensive research and monitoring of the growing risks associated with electronic data transfer technology, the Internet, and the use of technology for financial fraud and other criminal activities. Quest and its information security and computer forensics team have responded to this developing area of concern with professionals trained in data retrieval analysis and technologies.

 

Computer forensics deals with the restoration, preservation, identification, extraction and documentation of computer evidence. Evidence might be sought in a wide range of computer crime or misuse, including but not limited to theft of trade secrets, theft or destruction of intellectual property, and fraud. Many types of criminal and civil proceedings can and do make use of evidence revealed by computer forensics.

 

Quest's services include:

 

  • Contingency planning/business recovery
  • Interface and access point analysis
  • Deleted data identification and recovery services
  • Contents of files protected by passwords
  • Detailed histories of Internet and email usage
  • Identity and recovery of concealed documents and images
  • Expert witness testimony concerning the installation, use, and deletion of software
  • Analysis of information security systems and procedures
  • Departing employee data collection

 

Additionally:

 

  • Corporations utilize Quest's information security and computer forensics team to ascertain evidence relating to sexual harassment, embezzlement, theft or misappropriation of trade secrets, and other internal/confidential information.
  • Individuals utilize Quest's information security and computer forensics team in possible claims of wrongful termination, sexual harassment, or age discrimination.
  • Quest works with criminal prosecutors who use computer evidence in prosecuting a variety of crimes, such as homicide, financial fraud, drug and embezzlement record keeping, and child pornography.
  • Quest works with civil litigators who utilize personal and business records found on computer systems in fraud, discrimination, and harassment cases.
  • Quest works with insurance companies that may be able to mitigate costs by using discovered computer evidence of possible fraud in accident, arson, and workman's compensation cases.
  • Quest works with law enforcement officials who require assistance in pre-search warrant preparations and post-seizure handling of the computer equipment.

 

HIGHLIGHTS