{"id":541,"date":"2023-11-04T14:44:48","date_gmt":"2023-11-04T14:44:48","guid":{"rendered":"https:\/\/www.cowanconsulting.com\/WP\/?page_id=541"},"modified":"2026-03-19T17:06:12","modified_gmt":"2026-03-19T17:06:12","slug":"e-discovery","status":"publish","type":"page","link":"https:\/\/www.cowanconsulting.com\/WP\/e-discovery\/","title":{"rendered":"E-Discovery"},"content":{"rendered":"\n<p><\/p>\n\n\n\n<p>Our forensic computer specialists, skilled technicians, and seasoned financial and corporate investigators &#8212; are experienced in the broad range of investigative, analytical and forensic techniques necessary for collecting, accessing and reconstructing data from computers,\u00a0internal networks, log files\u00a0(data and firewall), internet sites, virtual private networks (VPN), email servers and\u00a0personal digital assistants (PDA).\u00a0By using advanced searching techniques and analytical procedures, our forensic\u00a0investigative team can\u00a0recover files\u00a0and\u00a0emails that have been deleted, erased, hidden, reformatted or partially\u00a0over-written. Specialized software is used\u00a0to access\u00a0files\u00a0that are password protected and to identify file names and extensions that have been disguised. Hard disks are installed at our labs on specially designed workstations that allow the forensic team to view the copied disk\u00a0and to run applications exactly as they would appear in a native operating environment. Our forensic team reconstructs not only files, but browser histories, cookie files, calendars, email history, zip files, downloads and other pertinent information, providing a snapshot of how the computer was used.<\/p>\n\n\n\n<div class=\"wp-block-group alignfull has-vivid-red-color has-text-color has-background\" style=\"background-color:#00000008;padding-top:var(--wp--preset--spacing--50);padding-right:var(--wp--preset--spacing--40);padding-bottom:var(--wp--preset--spacing--50);padding-left:var(--wp--preset--spacing--40)\"><div class=\"wp-block-group__inner-container is-layout-constrained wp-container-core-group-is-layout-141b4844 wp-block-group-is-layout-constrained\">\n<div class=\"wp-block-group alignwide is-content-justification-space-between is-layout-flex wp-container-core-group-is-layout-0d19cf55 wp-block-group-is-layout-flex\">\n<div class=\"wp-block-group has-vivid-red-color has-text-color wp-container-content-9cfa9a5a is-content-justification-left\"><div class=\"wp-block-group__inner-container is-layout-constrained wp-container-core-group-is-layout-8c890d92 wp-block-group-is-layout-constrained\">\n<p class=\"has-text-align-left\" style=\"font-size:0.9rem;font-style:normal;font-weight:600;letter-spacing:1px;text-transform:uppercase\"><a href=\"https:\/\/www.cowanconsulting.com\/WP\/\">Home<\/a><\/p>\n\n\n<form role=\"search\" method=\"get\" action=\"https:\/\/www.cowanconsulting.com\/WP\/\" class=\"wp-block-search__button-outside wp-block-search__icon-button wp-block-search\"    ><label class=\"wp-block-search__label screen-reader-text\" for=\"wp-block-search__input-1\" >Search<\/label><div class=\"wp-block-search__inside-wrapper\"  style=\"width: 100%\"><input class=\"wp-block-search__input\" id=\"wp-block-search__input-1\" placeholder=\"Search site\" value=\"\" type=\"search\" name=\"s\" required  style=\"border-width: 1px\"\/><button aria-label=\"Search\" class=\"wp-block-search__button has-icon wp-element-button\" type=\"submit\"  style=\"border-width: 1px\"><svg class=\"search-icon\" viewBox=\"0 0 24 24\" width=\"24\" height=\"24\">\n\t\t\t\t\t<path d=\"M13 5c-3.3 0-6 2.7-6 6 0 1.4.5 2.7 1.3 3.7l-3.8 3.8 1.1 1.1 3.8-3.8c1 .8 2.3 1.3 3.7 1.3 3.3 0 6-2.7 6-6S16.3 5 13 5zm0 10.5c-2.5 0-4.5-2-4.5-4.5s2-4.5 4.5-4.5 4.5 2 4.5 4.5-2 4.5-4.5 4.5z\"><\/path>\n\t\t\t\t<\/svg><\/button><\/div><\/form><\/div><\/div>\n\n\n\n<div class=\"wp-block-group has-vivid-red-color has-text-color wp-container-content-9cfa9a5a is-content-justification-right is-nowrap is-layout-flex wp-container-core-group-is-layout-5054138e wp-block-group-is-layout-flex\">\n<div class=\"wp-block-group is-vertical is-layout-flex wp-container-core-group-is-layout-8cf370e7 wp-block-group-is-layout-flex\">\n<div class=\"wp-block-group has-small-font-size is-vertical is-content-justification-left is-layout-flex wp-container-core-group-is-layout-d2172249 wp-block-group-is-layout-flex\">\n<p class=\"has-vivid-red-color has-text-color\"><a href=\"https:\/\/www.cowanconsulting.com\/WP\/e-business\/\" target=\"_blank\" rel=\"noreferrer noopener\">E-Business<\/a><\/p>\n\n\n\n<p class=\"has-vivid-red-color has-text-color\"><a href=\"https:\/\/www.cowanconsulting.com\/WP\/litigation-support\/\" target=\"_blank\" rel=\"noreferrer noopener\">Litigation Support<\/a><\/p>\n\n\n\n<p class=\"has-vivid-red-color has-text-color\"><a href=\"https:\/\/www.cowanconsulting.com\/WP\/information-technology\/\" target=\"_blank\" rel=\"noreferrer noopener\">Information Technology<\/a><\/p>\n\n\n\n<p class=\"has-black-color has-text-color\"><a href=\"https:\/\/www.cowanconsulting.com\/WP\/business-development\/\" target=\"_blank\" rel=\"noreferrer noopener\">Business Development<\/a><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<div class=\"wp-block-group alignwide is-content-justification-space-between is-layout-flex wp-container-core-group-is-layout-256aec57 wp-block-group-is-layout-flex\">\n<div class=\"wp-block-group is-layout-flex wp-block-group-is-layout-flex\">\n<p><\/p>\n<\/div>\n\n\n\n<p class=\"has-black-color has-text-color has-small-font-size\"> \u00a9 1996-now. <strong><a href=\"https:\/\/www.cowanconsulting.com\/WP\/legal\/\">Legal<\/a><\/strong><\/p>\n<\/div>\n<\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Our forensic computer specialists, skilled technicians, and seasoned financial and corporate investigators &#8212; are experienced in the broad range of investigative, analytical and forensic techniques necessary for collecting, accessing and reconstructing data from computers,\u00a0internal networks, log files\u00a0(data and firewall), internet sites, virtual private networks (VPN), email servers and\u00a0personal digital assistants (PDA).\u00a0By using advanced searching techniques &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/www.cowanconsulting.com\/WP\/e-discovery\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;E-Discovery&#8221;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"class_list":["post-541","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>E-Discovery -<\/title>\n<meta name=\"description\" content=\"Our forensic computer specialists, skilled technicians, and seasoned financial and corporate investigators -- are experienced in the broad range of investigative, analytical and forensic techniques necessary for collecting, accessing and reconstructing data from computers,\u00a0internal networks, log files\u00a0(data and firewall), internet sites, virtual private networks (VPN), email servers and\u00a0personal digital assistants (PDA).\u00a0\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cowanconsulting.com\/WP\/e-discovery\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"E-Discovery -\" \/>\n<meta property=\"og:description\" content=\"Our forensic computer specialists, skilled technicians, and seasoned financial and corporate investigators -- are experienced in the broad range of investigative, analytical and forensic techniques necessary for collecting, accessing and reconstructing data from computers,\u00a0internal networks, log files\u00a0(data and firewall), internet sites, virtual private networks (VPN), email servers and\u00a0personal digital assistants (PDA).\u00a0\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cowanconsulting.com\/WP\/e-discovery\/\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-19T17:06:12+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@ConsultingCowan\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cowanconsulting.com\/WP\/e-discovery\/\",\"url\":\"https:\/\/www.cowanconsulting.com\/WP\/e-discovery\/\",\"name\":\"E-Discovery -\",\"isPartOf\":{\"@id\":\"https:\/\/www.cowanconsulting.com\/WP\/#website\"},\"datePublished\":\"2023-11-04T14:44:48+00:00\",\"dateModified\":\"2026-03-19T17:06:12+00:00\",\"description\":\"Our forensic computer specialists, skilled technicians, and seasoned financial and corporate investigators -- are experienced in the broad range of investigative, analytical and forensic techniques necessary for collecting, accessing and reconstructing data from computers,\u00a0internal networks, log files\u00a0(data and firewall), internet sites, virtual private networks (VPN), email servers and\u00a0personal digital assistants (PDA).\u00a0\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cowanconsulting.com\/WP\/e-discovery\/#breadcrumb\"},\"inLanguage\":\"en\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cowanconsulting.com\/WP\/e-discovery\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cowanconsulting.com\/WP\/e-discovery\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cowanconsulting.com\/WP\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"E-Discovery\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cowanconsulting.com\/WP\/#website\",\"url\":\"https:\/\/www.cowanconsulting.com\/WP\/\",\"name\":\"Cowan Consulting, LC\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.cowanconsulting.com\/WP\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cowanconsulting.com\/WP\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cowanconsulting.com\/WP\/#organization\",\"name\":\"Cowan Consulting, LC\",\"url\":\"https:\/\/www.cowanconsulting.com\/WP\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en\",\"@id\":\"https:\/\/www.cowanconsulting.com\/WP\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cowanconsulting.com\/WP\/wp-content\/uploads\/2023\/11\/cropped-cropped-imageedit_6_7959840852.png\",\"contentUrl\":\"https:\/\/www.cowanconsulting.com\/WP\/wp-content\/uploads\/2023\/11\/cropped-cropped-imageedit_6_7959840852.png\",\"width\":250,\"height\":250,\"caption\":\"Cowan Consulting, LC\"},\"image\":{\"@id\":\"https:\/\/www.cowanconsulting.com\/WP\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/ConsultingCowan\",\"https:\/\/medium.com\/@info_7611\",\"https:\/\/www.facebook.com\/Cowan-Consulting-101658774516627\",\"https:\/\/www.instagram.com\/cowanconsultinglc\",\"https:\/\/www.linkedin.com\/company\/cowan-consulting-lc\/?viewAsMember=true\",\"https:\/\/www.youtube.com\/channel\/UCrmPKZoWYVbjTO5GYrI4STQ?view_as=subscriber\",\"https:\/\/www.tiktok.com\/@cowanconsulting?lang=en\",\"https:\/\/cowanconsulting.blogspot.com\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"E-Discovery -","description":"Our forensic computer specialists, skilled technicians, and seasoned financial and corporate investigators -- are experienced in the broad range of investigative, analytical and forensic techniques necessary for collecting, accessing and reconstructing data from computers,\u00a0internal networks, log files\u00a0(data and firewall), internet sites, virtual private networks (VPN), email servers and\u00a0personal digital assistants (PDA).\u00a0","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cowanconsulting.com\/WP\/e-discovery\/","og_locale":"en_US","og_type":"article","og_title":"E-Discovery -","og_description":"Our forensic computer specialists, skilled technicians, and seasoned financial and corporate investigators -- are experienced in the broad range of investigative, analytical and forensic techniques necessary for collecting, accessing and reconstructing data from computers,\u00a0internal networks, log files\u00a0(data and firewall), internet sites, virtual private networks (VPN), email servers and\u00a0personal digital assistants (PDA).\u00a0","og_url":"https:\/\/www.cowanconsulting.com\/WP\/e-discovery\/","article_modified_time":"2026-03-19T17:06:12+00:00","twitter_card":"summary_large_image","twitter_site":"@ConsultingCowan","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.cowanconsulting.com\/WP\/e-discovery\/","url":"https:\/\/www.cowanconsulting.com\/WP\/e-discovery\/","name":"E-Discovery -","isPartOf":{"@id":"https:\/\/www.cowanconsulting.com\/WP\/#website"},"datePublished":"2023-11-04T14:44:48+00:00","dateModified":"2026-03-19T17:06:12+00:00","description":"Our forensic computer specialists, skilled technicians, and seasoned financial and corporate investigators -- are experienced in the broad range of investigative, analytical and forensic techniques necessary for collecting, accessing and reconstructing data from computers,\u00a0internal networks, log files\u00a0(data and firewall), internet sites, virtual private networks (VPN), email servers and\u00a0personal digital assistants (PDA).\u00a0","breadcrumb":{"@id":"https:\/\/www.cowanconsulting.com\/WP\/e-discovery\/#breadcrumb"},"inLanguage":"en","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cowanconsulting.com\/WP\/e-discovery\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.cowanconsulting.com\/WP\/e-discovery\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cowanconsulting.com\/WP\/"},{"@type":"ListItem","position":2,"name":"E-Discovery"}]},{"@type":"WebSite","@id":"https:\/\/www.cowanconsulting.com\/WP\/#website","url":"https:\/\/www.cowanconsulting.com\/WP\/","name":"Cowan Consulting, LC","description":"","publisher":{"@id":"https:\/\/www.cowanconsulting.com\/WP\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cowanconsulting.com\/WP\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en"},{"@type":"Organization","@id":"https:\/\/www.cowanconsulting.com\/WP\/#organization","name":"Cowan Consulting, LC","url":"https:\/\/www.cowanconsulting.com\/WP\/","logo":{"@type":"ImageObject","inLanguage":"en","@id":"https:\/\/www.cowanconsulting.com\/WP\/#\/schema\/logo\/image\/","url":"https:\/\/www.cowanconsulting.com\/WP\/wp-content\/uploads\/2023\/11\/cropped-cropped-imageedit_6_7959840852.png","contentUrl":"https:\/\/www.cowanconsulting.com\/WP\/wp-content\/uploads\/2023\/11\/cropped-cropped-imageedit_6_7959840852.png","width":250,"height":250,"caption":"Cowan Consulting, LC"},"image":{"@id":"https:\/\/www.cowanconsulting.com\/WP\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/ConsultingCowan","https:\/\/medium.com\/@info_7611","https:\/\/www.facebook.com\/Cowan-Consulting-101658774516627","https:\/\/www.instagram.com\/cowanconsultinglc","https:\/\/www.linkedin.com\/company\/cowan-consulting-lc\/?viewAsMember=true","https:\/\/www.youtube.com\/channel\/UCrmPKZoWYVbjTO5GYrI4STQ?view_as=subscriber","https:\/\/www.tiktok.com\/@cowanconsulting?lang=en","https:\/\/cowanconsulting.blogspot.com\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.cowanconsulting.com\/WP\/wp-json\/wp\/v2\/pages\/541","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cowanconsulting.com\/WP\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cowanconsulting.com\/WP\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cowanconsulting.com\/WP\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cowanconsulting.com\/WP\/wp-json\/wp\/v2\/comments?post=541"}],"version-history":[{"count":0,"href":"https:\/\/www.cowanconsulting.com\/WP\/wp-json\/wp\/v2\/pages\/541\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.cowanconsulting.com\/WP\/wp-json\/wp\/v2\/media?parent=541"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}