Partnerships

Belkasoft
Elcomsoft
Legal & Other

Disclaimer
Cookies
Use of this website (T&Cs)    
Environmental Responsibility
Compliance
Data Privacy
Documentation

Articles
White Papers
Brochures
Press Releases
Subscribe to our Newsletter

Our Websites

Visit our sister websites
Copyright Strathclyde Forensics © 2009-2015. All Rights Reserved.
About us

Our People
Our Clients
What our Clients say
High Profile Cases
Contact us
Strathclyde Forensics website is found to be Safe by NORTON SAFE WEB Strathclyde Forensics website is found to be Safe by NORTON SAFE WEB
Strathclyde Forensics website is found to be SAFE by McAfee SECURE (Siteadvisor) Strathclyde Forensics website is found to be SAFE by McAfee SECURE (Siteadvisor)
"Absence of evidence is not
evidence of absence"
Our Blogs

Check out our Blogs
Terrorist Alerts

MI5 (UK)
Department of Homeland Security (USA)

Cyberattacks (real time)
Kaspersky
FBI Cyber Most Wanted

Home
ICTTF logo ICTTF logo
ACPO Guidelines ACPO Guidelines
Scottish Legal Aid logo Scottish Legal Aid logo
The American Society of Digital Forensics & eDiscovery The American Society of Digital Forensics & eDiscovery
Limbus Studio Limbus Studio
DFS Logo DFS Logo
Electronic Exit Interview
How it works:

The plan is nothing less than a full forensic examination of the former employee's assets that belong to the business. A forensic image of the employee's laptop/desktop drive is created, and copies are kept for later admissibility in a court or employment tribunal. We shall extract documents, emails and browsing records and search for all the keywords you would like us to search for. Then we shall prepare a forensic report that will be of the highest standards and with evidence that is admissible in any court. The chain of evidence shall be preserved at all time.

The time frame for delivering a full report depends on the number of devices and the size of the storage media. Please let us know what your requirements are when you initially contact us.
Our Electronic Exit Interview Plan (EEIP) is designed to protect the client business from misappropriation of its digital assets and intellectual property by employees living the business.

Some of the areas our plan covers are the following:

1. Intellectual Property, including trade secrets, formulae, processes etc.
2. Vendor and Client Information, including contact details, contracts, special offers, price lists etc.
3. Employee Lists (names, addresses, NINO, specializations, other personal information)
4. ID theft (i.e. Copying of ID Cards and passes)
5. Financial misappropriation (cash, transfers, money laundering
6. Software theft
7. Communication with competitors (i.e. Via email or professional websites like LinkedIn)
8. Dissemination of confidential information (through social media, like Facebook & Twitter), FTP servers and emails.
9. Reputation management (possible negative comments or leaks on social media, blogs etc.)
10. Inappropriate internet activity (ie. Gambling, pornography, hacking, downloading of pirate software, movies and music)