ERE Information Security Auditors
Home | Site Map | Contact Us |  Resource Center
list of IT security and compliance audit steps
ERE Differentiators from other vendors

Forensic Audit

Documents and Other Sources of Evidence

  • Employee expense reimbursements.
  • Images.
  • Instant messages and transcript logs.
  • Price lists.
  • Product inventory.
  • Suspicious payments and accounting entries.
  • Web server logs
  • Accounting and financial data.
  • Email.
  • Laptops.
  • Video and other binary files.
  • Word documents.

Anton Piller Order
An Anton Piller order is granted by a judge which is equivalent to a civil law form of search warrant, and is sometimes used to collect digital data.  ERE is familiar with this process and may be of assistance to the client who is suspicious.

Additional Information


Contact Us

905 764 3246

  Budgetary Price Quote
  10 minute scope definition call
  ROI Calculation for your next Audit
  Sanitized Statement of Work
  Sanitized Audit Report
  Product Literature††
  White Papers and Published Articles
  Please see Ron Lepofskyís book,
The Managerís Guide to Web Application Security,
published by Apress Media

The Manager's Guide to Web Application Security is a concise, information-packed guide to application security risks every organization faces, written in plain language, with guidance on how to deal with those issues quickly and effectively.

Home | Technology Audits | Compliance Audits | Process Audits | Doc Audit/Authorship| | 7x24 Monitoring | Knowledge Transfer
ERE Differentiators | About Us | Site map | Contact Us | |   | Resource Center
Copyrights © 2007-2008. All rights reserved.  

   AddThis Social Bookmark Button