ERE Information Security Auditors
Home | Site Map | Contact Us |  Resource Center
list of IT security and compliance audit steps
ERE Differentiators from other vendors

Forensic Audit

Documents and Other Sources of Evidence

  • Employee expense reimbursements.
  • Images.
  • Instant messages and transcript logs.
  • Price lists.
  • Product inventory.
  • Suspicious payments and accounting entries.
  • Web server logs
  • Accounting and financial data.
  • Email.
  • Laptops.
  • Video and other binary files.
  • Word documents.

Anton Piller Order
An Anton Piller order is granted by a judge which is equivalent to a civil law form of search warrant, and is sometimes used to collect digital data.  ERE is familiar with this process and may be of assistance to the client who is suspicious.

Additional Information
http://en.wikipedia.org/wiki/Anton_Piller_order

 

Contact Us

905 764 3246

 
 
  Budgetary Price Quote
  10 minute scope definition call
  ROI Calculation for your next Audit
  Sanitized Statement of Work
  Sanitized Audit Report
  Product Literature††
  White Papers and Published Articles
   
  Please see Ron Lepofskyís book,
The Managerís Guide to Web Application Security,
published by Apress Media

http://www.apress.com/9781484201497

The Manager's Guide to Web Application Security is a concise, information-packed guide to application security risks every organization faces, written in plain language, with guidance on how to deal with those issues quickly and effectively.

 
Home | Technology Audits | Compliance Audits | Process Audits | Doc Audit/Authorship| | 7x24 Monitoring | Knowledge Transfer
ERE Differentiators | About Us | Site map | Contact Us | |   | Resource Center
Copyrights © 2007-2008. All rights reserved.  

   AddThis Social Bookmark Button