Home
|
About Us
|
Cyber Knowledge Centre
|
Cyber Legal Consultancy
|
Cyber Forensics
|
Contact Us
Computers, Internet and New Technology Laws by Karnika Seth
Trail of the Trolls: Bullying and abuse on the Internet is on the rise, Smitha Verma,The Telegraph
Online censorship is sycophantic, stupid, & unconstitutional, The Sunday Guardian, Dec 11, 2011
Capital cry against Web gag, The Telegraph , Dec 8,2011
Google Sued for Showing Defamatory Results, Rob D Young , Hindustan Times June 23, 2011
The forensics division at CCC provides professional computer forensics, conducts cybercrime investigations and is involved in e-discovery and evidence procedures and processes. CCC provides computer forensics services to corporate entities, banks, individuals and government agencies. Information disclosed by clients at CCC is treated with utmost confidentiality and is duly protected by Attorney-Client privilege. We endorse and practice internationally accepted data protection principles and norms. We only use licensed and trained computer forensics examiners at CCC. Our clients have relied on our forensic services for conducting investigation and litigation support in varied areas such as cybercrimes, intellectual property theft, contract disputes, employment law matters, destruction of data, internet abuse, data theft, impersonation, defamation and cyberstalking cases on the internet, credit card frauds, software piracy, online auction fraud, phising scams, money laundering, cyber pornography. We have assisted several entities ranging from corporate establishments, banks and financial institutions to government agencies and public sector undertakings. Our forensics experts team uses advanced forensics software resources and gadgets to investigate and study cyber forensic cases such as tableau (T8) which assists in collection of evidence from USB mass storage class devices like USB thumb devices, USB cameras, apple ipod™, with USB interfaces, the tableau (T3u) Firewire 800 plus USB 2.0 SATA bridge, the tableau (T4) Firewire 800 plus USB 2.0 SCSI Bridge, Voom Drive Wiper, Shadow 2; which gives investigators fast access to information on a suspect’s computer while forensically preserving every bit of data on the hard drive, Universal Mobile Extractor, Stego Suite’s tools besides other forensics tools to conduct investigations.   • Computer and data forensic analytics • Mobile forensics • Cybercrime -prevention, identification, and investigation • E-mail investigations-tracking of defamatory/malicious e-mails • Intellectual property theft investigations/Data theft cases • Digital evidence- identification, collection, storage, imaging and recovery • Digital evidence- identification, collection, storage, imaging and recovery • Incident response services • Analysis of user activity • Filtrations and consolidation of data • Search and seizure operations • Preservation of digital evidence • Computer forensic analysis and reporting • Computer network Security audits • Cyberforensic consulting • Expert Witness and testimony services • Litigation support/Expert opinion • Law enforcement support
Disclaimer
|
Sitemap
|
Contact Us
Copyright @2008 CCC