The forensic investigation of data held on computers, laptops, cellular telephones, PDAs and other data processing and storage devices is a valuable resource in litigation and for dispute resolution. The recovery of deleted e-mails, and data cached to disk about which the user of the computer is una-ware, has proved a ‘quick kill’ in many instances.

Where fraud, dishonesty or deception is suspected, it is always advisable to seek the disclosure of the computers or other devices upon which any suspect documentation or correspondence may have originated or resides. These should be subjected to a thorough forensic investigation.