EFORENSICS & EDISCLOSURE

"I was very satisfied with MD5's performance in relation to the recent eDisclosure exercise with which they assisted."

Russel Ward - WARDHADAWAY

eForensics & eDisclosure at MD5

At MD5 our eForensics & eDisclosure process is flexible and highly customisable depending on the requirements set by our clients. We have used our eDisclosure process to assist investigations into:

  • Commercial litigation
  • Intellectual property
  • Employment cases
  • Money Laundering, Fraud and Business Crime
  • Insolvency
  • Internet investigations
  • Tax Investigations
  • Drug & People Trafficking

All employees of MD5 are security cleared. We are currently accredited to ISO 27001 for Data Security and hold Cyber Essentials Plus Certification, meaning that your data is secure throughout the whole process. We can also implement ‘two factor authentication’ to access our Online Review Platform to ensure your data is protected.

 

The MD5 eForensics & eDisclosure Process

 

Data Collection

  • Expert investigators are available to perform onsite collections.
  • MD5’s laboratory complies with ISO 27001, ISO 17025 & Cyber Essentials Plus policies and procedures meaning your data is safe with MD5
  • All practises adhere to ACPO guidelines
  • Continuity of evidence preserved meaning if evidence is called into question, accepted forensic practise has been observed and the evidence cannot be disregarded.

Early Case Assessment

  • Advanced analytic software helps you gain early insight into the dataset and costs.
  • Experienced Project managers help you to get the most out of your case.
  • The process can assist you to meet the demands of the Jackson Reforms.

Processing

  • Powerful processing software utilised throughout.
  • In-house processes allow us to narrow down your dataset; removing non-relevant files.
  • Refined filtering ensures that you are reaching the data that is relevant to your case faster.
  • Translation of a variety of document types is available.
  • Virtualisation of the system allows our investigators to interrogate programs such as Microsoft Access and QuickBooks.

Online Review Platform

  • Review your data from anywhere, at any time.
  • Two step authentication available to ensure that your data is secure.
  • Flexible and highly customisable review platform that can be tailored to your needs.
  • Graphics available that help to summarise your data.
  • 24/7 support with any issues.

Post Review

  • Further investigation and provenance of findings by our experienced investigators available
  • Productions allow us to exhibit files ready to be used as evidence in court
  • Investigators used to delivering technical evidence in layman’s terms at Tribunals, Civil & Criminal Courts