We offer digital forensic services to preserve and collect electronically stored information and gain insight from electronic data and evidence.


Whether it be a computer, tablet, smartphone or cloud and social media data, Percipient can assist with forensic data collection and preservation of electronically stored information required for investigations, litigation, compliance and other E-discovery forensics matters.

Computer Forensic Collections:

Every piece of data we create and use is processed by a computer. If the computer is not a mobile device, it is likely a desktop or laptop computer. Often the source of electronically stored information relevant to an investigation, lawsuit or subpoena is found on a personal computer. We can assist with both physical collection of computer hard drives (a byte by byte clone of a computer hard drive) or a logical collection of a hard drive (a more streamlined collection of just active files and folders on a device).

Mobile Forensic Collection:

The electronic device we keep in our pockets is becoming ever more powerful and important in our day-to-day and work lives. We have the tools and forensic software expertise to preserve and collect information from smartphones and handheld devices. We can collect text messages and other information stored on the devices important to digital forensic investigations.

Cloud and Social Media Forensic Collection:

We can also collect data from cloud services such as Google Drive, Microsoft 365, and iCloud. We also assist with collection of data from social media apps such as Facebook, Twitter and Instagram. We can also preserve and collect electronically stored information from productivity and collaboration tools like Slack.

Remote Collection:

Most collections may be done remotely minimizing time, disruption and inconvenience. Here is a helpful article about remote data collection.

Case Study:
An employee left one of our customers to join one of their competitors. After a few major clients jumped ship for the competitor, suspicions arose about the employee stealing from the company. Our customer asked our digital forensics team to take a look at the departed employee’s computer. The customer wanted to know whether the employee misused sensitive information or engaged in data theft before he resigned.

After forensically imaging the former employee’s laptop we concluded the employee was stealing company information. We also determined he transferred several highly sensitive documents from his company laptop to a USB drive after giving notice of his resignation.


Need Help With Digital Forensics?

Talk to Us