- Helping corporations design and implement Acceptable Use Policies.
- Network Security
- Routine security scans
- Penetration testing
- Internal security audit
- Detailed recommendation checklist
 
- Staff computer security training.
Here are some of the types of cases we have assisted our clients with:
| Misrepresentation | Asset Location | Breach of Contract | Breach of Fiduciary Duty | 
| Class Action Suits | Conspiracy | Contract and Commission | Copyright Infringement | 
| Domestic Impropriety | Trade Secret Misappropriation | Whistleblower claims | Data Recovery | 
| Data Theft | Embezzlement | Expert Consultation | Expert Testimony | 
| Forensic Data Analysis | Fraud | Implied Employment Contract | Negligent Retention Claims | 
| Non Compete Clauses | Possession of Child Pornography | Sexual Harassment | Slander and Libel Claims | 
| Software Infringement | Wrongful Termination | Stalking | Trademark Infringement | 

