- Helping corporations design and implement Acceptable Use Policies.
- Network Security
- Routine security scans
- Penetration testing
- Internal security audit
- Detailed recommendation checklist
- Staff computer security training.
Here are some of the types of cases we have assisted our clients with:
| Misrepresentation | Asset Location | Breach of Contract | Breach of Fiduciary Duty |
| Class Action Suits | Conspiracy | Contract and Commission | Copyright Infringement |
| Domestic Impropriety | Trade Secret Misappropriation | Whistleblower claims | Data Recovery |
| Data Theft | Embezzlement | Expert Consultation | Expert Testimony |
| Forensic Data Analysis | Fraud | Implied Employment Contract | Negligent Retention Claims |
| Non Compete Clauses | Possession of Child Pornography | Sexual Harassment | Slander and Libel Claims |
| Software Infringement | Wrongful Termination | Stalking | Trademark Infringement |

