
To control access by an unauthorized computer user.

The following steps should be taken by investigator retrieving computer data as evidence. Recovery may be required due to physical damage to the storage devices or logical damage to the file system that prevents it from being mounted by the host operating system (OS). The data is most often salvaged from storage media such as internal or external hard disk drives (HDDs), solid-state drives (SSDs), USB flash drives, magnetic tapes, CDs, DVDs, RAID subsystems, and other electronic devices. This data is used in divorce cases and child protection.Īccording to Wikipedia, data recovery is:ĭata recovery is a process of salvaging (retrieving) inaccessible, lost, corrupted, damaged or formatted data from secondary storage, removable media or files, when the data stored in them cannot be accessed in a normal way.

Other areas of business investigations are fraud, intellectual property theft and inappropriate computer and email use.įamily Forensic Investigations is the practice of collecting and analyzing digital data from child or spouse’s computer, tablet or smartphone. The most common business situation an employee is fired or quit his job and has deleted or stolen company data. I would like to separate Forensic Data Recovery Investigation into two categories: Business Forensic Investigations & Family Forensic Investigations.īusiness Forensic Investigations is the practice of recovering data from large and small business hard drives.
