Digital Forensics
Collect evidence from phones and computers. Find and recover relevant data. Deliver it in court.
E-Discovery
Process large amounts of data, then easily filter what you need for production or review.
Data Breach
Incident response for suspected network breaches. Security assessments to prevent breaches.

ArcherHall is a leading provider of computer forensics and e-discovery services for businesses and law firms nationwide.

Want to host a free MCLE presentation for your firm or legal association?

News & Resources by Archerhall

Digital Evidence For Litigation

  • cellphones
  • computers
  • location data

Digital Forensics Services

Forensic Imaging

Create exact bit-for-bit copies of the data on a computer or other storage medium. Admissible in court and provably identical to the original.

Cell Phone Forensics

Imaging, recovery, and analysis of data from cell phones, tablets, and other mobile devices.

Data Recovery

Extract data from corrupted or damaged devices. Find and restore deleted files and messages.

Expert Evidence Analysis

Identify files, emails, or activity logs that are relevant to the case. Piece together subtle clues to provide a clear story.

Expert Testimony

Testify in court or deposition regarding the conclusions of evidence analysis, validity of data, and soundness of methodologies.

Theft of Trade Secrets

Investigate unauthorized copying, printing, or transfer of sensitive or valuable data.

E-Discovery Services

Data Collection

Collect local, network, or cloud data from multiple custodians at multiple locations.

Processing & Production

Exclude irrelevant data, capture text and metadata, and Bates label. Produce native files or TIFFs and load files for all popular systems.

Hosted Review

Access discovery documents from anywhere through our online review platform. Spend time on review, not document management.

Advanced Culling Techniques

Reduce discovery costs by excluding more non-relevant documents, especially for clients operating in big data environments.

Early Case Assessment

Find out what your data contains before you get too deep. Quickly view data by file type, timeline, or relationships between people.

Electronic Medical Records

Collection, processing, and analysis of Electronic Medical Records (EMR) and associated metadata.

Data Breach Services

Data Breach Surveys

Evaluate your security measures, including penetration testing and wireless security assessments.

Incident Response

Rapid deployment to investigate a network breach. Quickly secure your network, shore up weaknesses, and collect evidence.

Remediation & Recovery

Restore computers and networks after disruptions such as malware, viruses, or ransomware.

Non-Network Data

Secure data that leaves your network, on mobile devices or on cloud services like Office 365, Exchange, Dropbox, and iCloud.

Payment Security

Investigate compromises of point of sale (POS) and credit card systems.

Security Awareness Training

Train employees and contractors to avoid human security exploits.

Contact

Give us a call at (855) 839-9084

Or send us a message and we’ll get back to you right away.