IT Forensics

In the judicial processes, as a reflection of the current society, arguments and tests related to IT appear more and more frequently, such as: emails, messages between smartphones, social networks, audio or video files, content in web pages, etc.

In the judicial processes, as a reflection of the current society, arguments and tests related to IT appear more and more frequently, such as: emails, messages between smartphones, social networks, audio or video files, content in web pages, etc.

In these new technologies, as in other disciplines, the expert must perform the test, prepare an adequate expert report and ratify it before in court if necessary.

A forensic expert is a professional with specialized and recognized knowledge, through his higher education, that provides information or founded opinion to the courts of the litigious points that are the subject of his opinion.

These are most common technological forensic tests:

Electronic Messaging Certification

Conversations, whether in e-mail or mobile applications such as WhatsApp, can be challenged by the opposite party if they are not attached to a valid expert report that determines whether or not they have been previously manipulated.

Certification of authenticity of files

It consists of verifying whether a file has been manipulated or not, so that it can be accepted or rejected as evidence in court. It can be a photo, an audio recording, a video or a document (doc, pdf, etc.).

Software Audit

It is to evaluate a range of technical aspects of a computer program: examining if it performs what is expected, reviewing the use of libraries, checking security, entry and exit procedures, reviewing documentation and specifications. Usual in cases of Commercial Law or in custom software.

Internet testimonial report

Certifies the content that a web page shows at any given time, so even if this content was deleted or modified, it would be legally maintained as a valid proof. It is very common to need this type of expert in cases of misleading advertising, intellectual property protection, plagiarism, identity theft, cyberbullying, insults, threats, etc.

Adversary Expert's Report

It is the evaluation of the expert reports of the other party to ensure that they have been done correctly, maintaining the chain of custody, without errors, etc. And otherwise see how to challenge them.