<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>jskramer, Author at Computer Evidence Recovery</title>
	<atom:link href="https://www.computerpi.com/author/jskramer/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.computerpi.com/author/jskramer/</link>
	<description></description>
	<lastBuildDate>Thu, 10 Apr 2014 02:50:25 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.7.2</generator>
	<item>
		<title>Computer Forensics</title>
		<link>https://www.computerpi.com/lorem-ipsum-dipsum/</link>
		
		<dc:creator><![CDATA[jskramer]]></dc:creator>
		<pubDate>Sun, 07 Aug 2011 23:53:59 +0000</pubDate>
				<category><![CDATA[topbanner]]></category>
		<guid isPermaLink="false">http://www.fimediadev.ca/computerpiblog/?p=541</guid>

					<description><![CDATA[<p>The security of your data can make all the difference between winning and losing your case.  If you suspect any of the following issues: Workplace improprieties Theft of intellectual property Matters involving alleged criminal activity Infidelity Pending wrongful dismissal lawsuits [&#8230;]</p>
<p>The post <a href="https://www.computerpi.com/lorem-ipsum-dipsum/">Computer Forensics</a> appeared first on <a href="https://www.computerpi.com">Computer Evidence Recovery</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><span style="color: #000000;">The security of your data can make all the difference between winning and losing your case.  If you suspect any of the following issues:</span></p>
<ul>
<li>Workplace improprieties</li>
<li>Theft of intellectual property</li>
<li>Matters involving alleged criminal activity</li>
<li>Infidelity</li>
<li>Pending wrongful dismissal lawsuits</li>
</ul>
<p><span style="color: #000000;">Then you need to protect yourself and your organization by performing these four critical steps to ensure that you have an untainted chain of evidence:</span></p>
<ol>
<li><span class="bold">DON&#8217;T</span> &#8211; Turn off the computer if it is on.</li>
<li><span class="bold">DO</span> – Isolate the computer, disconnect it from the network and secure the physical area.</li>
<li><span class="bold">DON&#8217;T</span> – Allow your IT staff to search. Self &#8211; investigation WILL compromise or destroy evidence.</li>
<li><span class="bold">DO</span> – Call an experienced data forensics team immediately to determine the best course of action.</li>
</ol>
<p>The post <a href="https://www.computerpi.com/lorem-ipsum-dipsum/">Computer Forensics</a> appeared first on <a href="https://www.computerpi.com">Computer Evidence Recovery</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Workplace Due Diligence</title>
		<link>https://www.computerpi.com/labor-disputes/</link>
		
		<dc:creator><![CDATA[jskramer]]></dc:creator>
		<pubDate>Sat, 07 May 2011 04:30:55 +0000</pubDate>
				<category><![CDATA[Header]]></category>
		<guid isPermaLink="false">http://www.fimediadev.ca/computerpiblog/?p=257</guid>

					<description><![CDATA[<p>Preserve data for cases that may result in frivolous lawsuits, employee disputes and wrongful termination cases.</p>
<p>The post <a href="https://www.computerpi.com/labor-disputes/">Workplace Due Diligence</a> appeared first on <a href="https://www.computerpi.com">Computer Evidence Recovery</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Preserve data for cases that may result in frivolous lawsuits, employee disputes and wrongful termination cases.</p>
<p>The post <a href="https://www.computerpi.com/labor-disputes/">Workplace Due Diligence</a> appeared first on <a href="https://www.computerpi.com">Computer Evidence Recovery</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Computer &#038; Cellular Forensics</title>
		<link>https://www.computerpi.com/email-tracing/</link>
		
		<dc:creator><![CDATA[jskramer]]></dc:creator>
		<pubDate>Sat, 07 May 2011 04:21:57 +0000</pubDate>
				<category><![CDATA[Header]]></category>
		<guid isPermaLink="false">http://www.fimediadev.ca/computerpiblog/?p=248</guid>

					<description><![CDATA[<p>Obtain data from electronic devices including Cell Phones, Blackberrys, GPS Systems, Digital Cameras, iPads, iPods, iPhones, etc&#8230;</p>
<p>The post <a href="https://www.computerpi.com/email-tracing/">Computer &#038; Cellular Forensics</a> appeared first on <a href="https://www.computerpi.com">Computer Evidence Recovery</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Obtain data from electronic devices including Cell Phones, Blackberrys, GPS Systems, Digital Cameras, iPads, iPods, iPhones, etc&#8230;</p>
<p>The post <a href="https://www.computerpi.com/email-tracing/">Computer &#038; Cellular Forensics</a> appeared first on <a href="https://www.computerpi.com">Computer Evidence Recovery</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Network Security Testing &#038; Training</title>
		<link>https://www.computerpi.com/data-security-2/</link>
		
		<dc:creator><![CDATA[jskramer]]></dc:creator>
		<pubDate>Sat, 07 May 2011 04:19:11 +0000</pubDate>
				<category><![CDATA[Header]]></category>
		<guid isPermaLink="false">http://www.fimediadev.ca/computerpiblog/?p=243</guid>

					<description><![CDATA[<p>Our Network Security Audit will determine security holes and develop a plan to protect your network and valuable data.</p>
<p>The post <a href="https://www.computerpi.com/data-security-2/">Network Security Testing &#038; Training</a> appeared first on <a href="https://www.computerpi.com">Computer Evidence Recovery</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Our Network Security Audit will determine security holes and develop a plan to protect your network and valuable data.</p>
<p>The post <a href="https://www.computerpi.com/data-security-2/">Network Security Testing &#038; Training</a> appeared first on <a href="https://www.computerpi.com">Computer Evidence Recovery</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Computer Forensics in Criminal Litigation</title>
		<link>https://www.computerpi.com/forensic-data-recovery/</link>
		
		<dc:creator><![CDATA[jskramer]]></dc:creator>
		<pubDate>Sat, 07 May 2011 04:13:24 +0000</pubDate>
				<category><![CDATA[Header]]></category>
		<guid isPermaLink="false">http://www.fimediadev.ca/computerpiblog/?p=236</guid>

					<description><![CDATA[<p>Detect, and/or recover data from electronic devices to be stored for further use in Criminal litigation and Civil legal applications.</p>
<p>The post <a href="https://www.computerpi.com/forensic-data-recovery/">Computer Forensics in Criminal Litigation</a> appeared first on <a href="https://www.computerpi.com">Computer Evidence Recovery</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Detect, and/or recover data from electronic devices to be stored for further use in Criminal litigation and Civil legal applications.</p>
<p>The post <a href="https://www.computerpi.com/forensic-data-recovery/">Computer Forensics in Criminal Litigation</a> appeared first on <a href="https://www.computerpi.com">Computer Evidence Recovery</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Home page</title>
		<link>https://www.computerpi.com/home-page/</link>
		
		<dc:creator><![CDATA[jskramer]]></dc:creator>
		<pubDate>Sat, 07 May 2011 03:12:03 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">http://www.fimediadev.ca/computerpiblog/?p=226</guid>

					<description><![CDATA[<p>Computer Evidence Recovery is a firm specializing in Information Technology Investigations, and Data Recovery. Our agents perform all manner of computer investigations including computer forensics. Our agency is comprised of experienced investigators, and lab technicians with preference to law enforcement, [&#8230;]</p>
<p>The post <a href="https://www.computerpi.com/home-page/">Home page</a> appeared first on <a href="https://www.computerpi.com">Computer Evidence Recovery</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><strong>Computer Evidence Recovery</strong> is a firm specializing in Information Technology Investigations, and Data Recovery. Our agents perform all manner of computer investigations including computer forensics.</p>
<p><strong>Our agency</strong> is comprised of experienced investigators, and lab technicians with preference to law enforcement, intelligence, and superior computer backgrounds. After the successful completion of a background investigation, finger printing and security clearance by the RCMP, our investigators are licensed by the Alberta Department of Justice, Law Enforcement Division.</p>
<p>Computer Evidence Recovery uses superior computer equipment and techniques, allowing us to unobtrusively monitor, detect, and/or recover data from suspect computers.</p>
<p>We provide accurate documentation of the true nature and extent of user activities while maintaining the data’s integrity for further use in Criminal and Civil legal applications.</p>
<p>We operate with a wide range of investigative resources throughout North America to draw from the most expert pool of information and technology available.</p>
<p>The post <a href="https://www.computerpi.com/home-page/">Home page</a> appeared first on <a href="https://www.computerpi.com">Computer Evidence Recovery</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
