Digital Acuity E-Discovery and Digital Forensics

As a society,  90% of the world’s data has been created in the last two years.  This information is being generated on our smartphones, our computers, in our cars and homes and by third parties with and without our knowledge (such as medical, business and financial records).  At Digital Acuity, every piece of digital data has a story to tell.

Digital Acuity accomplishes this by speaking for your data, deploying digital forensic, and data management strategies. After collecting and preserving your data, we make sure that an authentic, accurate and credible story is told to make correct risk management decisions or present evidence in a legal proceeding.

Digital Acuity is the clear and strong voice of data which provides:

  • Predictable and controllable costs in delivering our services
  • Independent, repeatable & defensible processes that tell the story of every piece of data
  • Customized and transparent client-centric methodologies that tell the data’s story
  • Professional and responsive team of experts and trusted advisers
  • Time to focus on your core business

There are many situations in which understanding what the information is trying to tell us is important.  In fact, each day new circumstances present themselves which involve data needing a voice to tell its story.  The scenarios are based on actual cases, although only general details have been provided showing how Digital Acuity helps bring data into focus or sharpens your insight.


  1. GPS data on a mobile device was used to prove their presence at a specific geographic location or to establish speed or direction.
  2. Data Retrieval – Do you need to find specific information and data from a third party, a website or a device (IoT Internet of Things)? Not sure where to find it or how to collect it?
  3. Authenticate – Electronic data and information is a RECORD. Because it is so effective and powerful, the temptation to delete or modify these records may be too much for certain individuals/entities.  If you need to rely on the electronic record and you want to insure its truthfulness, Digital Acuity can provide a voice for the record.
  4. What happened? – Often times electronic data tell a story of events that happen and when it is unclear what the specifics are, digital forensic professionals will collect and analyze data to provide specific information of the events
  5. Medical (Personal or Business) Records – The records and the data about the data, sometimes known as Metadata, tell a story about who created or modified a record, what was modified? When the modifications or changes were made? How the modifications or changes were made? Need to know the truth?
  6. Risk Management Decisions on Large Data-sets – Today, Data-sets are becoming larger and more complex. Hearing and understanding the collective voices of what the data says becomes difficult without creating a systemic process bring into focus the voices.   Digital Acuity can help you hear these voices.  These types of data-sets are often found in legal, healthcare and risk management circumstances.
  7. Intellectual Property/Espionage – When an individual or entity has reason to believe that its electronic information has been accessed or taken, who do you turn to in understanding what your data is telling you?   The activity is often recorded, and evidence is available to define who, what, where, how, and maybe even why the user did what they did. “Is it important to have your data talk?  Or Is it important to have your data tell its story?”
  8. Data Redaction – Do you have video or data that needs redaction for a legal proceeding?  Digital Acuity can make your data talk with only the appropriate data in focus.
  9. Academic Dishonesty – The recent trend in higher education is to monitor a student’s testing and academic activities on mobile devices and computers to detect potential academic dishonesty. The issue is that the monitoring software and methodologies that are used are not completely reliable and, in some cases, have not been tested to validate their results. If you have been accused of academic dishonesty and know that you have been falsely accused, protect your rights and the evidence. Consider having a forensic examination of the device that was used during your academic activities to document your actions and establish the facts.
  10. Semi-Truck ECM – The Engine Control Module (ECM) is a computer which is installed on the vehicle to capture and monitor many activities relevant to the conditions and performance of a truck. During certain situations such as an accident, the information it captures may provide a great deal of information about the events surrounding the accident. Each model of truck has a different ECM configuration and requirements to recover this data. If you need to preserve and review this information, consider having a forensic professional preserve, collect and produce this information in a timely fashion.
  11. Data Recovery, Spoliation & the Legal Process – Information is found on virtually every electronic device that is in operation today. This information can be purposely deleted and is becoming increasingly relevant in legal proceeding. Beside the most common devices like computers, phones and storage drives, some devices like security cameras, network-based copiers, and cloud-based storage may also hold extremely relevant information for the legal case. If the data you are looking at does not appear to be authentic or is non-existent, consider consulting with a forensic professional to assess the situation to determine the truth.
  12. Business Email Compromise or BEC – It is estimated that the cost of Business Email Compromise is in the billions of dollars per year range. You only need to look at a single event from August of 2019 when Japan’s Toyota Boshoku Corp. sent a $37 million payment to a fraudulent third party. It was not able to recover its money as a result and is now considered to be a prime example of the pervasive nature of this trend. It impacts small, medium and large companies and typically is a result of a compromise of the business’s email system. The attacker researches its victim to identify the people in positions at the company who they will target email malware with a technique called “phishing”. Once the targeted email account is infected, the victim’s employee will be persuaded through seemingly legitimate email communication to alter payment arrangements and send the funds to a third party. Often times the investigation or accounting functions will reveal the paper trail, however the vulnerability that was used to start the compromise and the current status of the organization’s security posture is unknown. A computer forensic & security professional should be used to determine what the compromise mechanism was and if a vulnerability still exists. If you find yourself in this situation, make sure you retain the services of a professional that can help you determine the facts of the compromise.
  13. White Collar Investigations, FCPA and Other Sensitive Matters – Often times, the facts important to understand in investigations rely on electronic data and the timing of communications between the parties via email, cell phone conversations, messaging applications such as text messages, social media apps, and encrypted apps, etc. This information is delicate and can be deleted, overridden or overlooked if proper preservation and collection tools, techniques and protocols are not utilized. If you believe that your matter is heading this direction, it is highly recommended that you consult with an experienced forensic organization to ensure that you manage your risk and that you understand the exact nature of the allegations and facts.

Many unique situations are occurring each day in which electronic information has a story to tell!  Collecting and analyzing this information can be challenging, and when you need to hear its story, Digital Acuity is your partner!