The cost of defending a wrongful dismissal lawsuit can be astronomical, whether you are in the right or in the wrong. Computer forensics can often present the plaintiff with enough damaging evidence against them to illustrate the futility of their case.

The use of computer forensic investigations during the course of an employee dispute or other labor and employment law issue is one of the foundations of Computer Evidence Recovery, and several of our senior investigators specialize solely in this area. During a matter such as this, many employers first approach their IT staff for data collection. This is not only detrimental to the potential evidentiary integrity of the data, but can also actually destroy the very data we would have otherwise recovered.

Increasing numbers of employees now leave their positions of their own accord, but end up trying to fight non-compete agreements or are able to take vital company data with them when they leave. Computer Evidence Recovery is available to conduct our forensic computer investigations on computers associated with these departed individuals. We are also heavily involved in computer forensics aimed at rooting out criminal activity within an organization.

We have helped to successfully defend both private and public employers in class action law suits and complex litigation across North America. Our forensic computer investigations are likewise heavily involved in the defense of wrongful discharge cases, contract and commission claims, implied employment contract claims, slander and libel claims, negligence and negligent retention claims, and whistleblower claims. We also have an extensive practice prosecuting and defending trade secret, breach of fiduciary duty cases, and more. Our investigators regularly provide expert testimony regarding their forensic data investigations in courts from coast to coast.

If you are an employer faced with a troubling employee termination, violation of a non-compete agreement or you suspect that an employee may be involved with some type internal fraud or theft of proprietary data, contact us.