- Helping corporations design and implement Acceptable Use Policies.
- Network Security
- Routine security scans
- Penetration testing
- Internal security audit
- Detailed recommendation checklist
- Staff computer security training.
Here are some of the types of cases we have assisted our clients with:
Misrepresentation | Asset Location | Breach of Contract | Breach of Fiduciary Duty |
Class Action Suits | Conspiracy | Contract and Commission | Copyright Infringement |
Domestic Impropriety | Trade Secret Misappropriation | Whistleblower claims | Data Recovery |
Data Theft | Embezzlement | Expert Consultation | Expert Testimony |
Forensic Data Analysis | Fraud | Implied Employment Contract | Negligent Retention Claims |
Non Compete Clauses | Possession of Child Pornography | Sexual Harassment | Slander and Libel Claims |
Software Infringement | Wrongful Termination | Stalking | Trademark Infringement |