Print this page (attorney exhibit format)
Scope of Services
We are a preservation-first digital evidence firm that can perform forensic-grade imaging where appropriate.
Forensic-grade acquisition methods may include imaging where appropriate, selected based on preservation objectives, scope, and media condition.
Clear scope boundaries protect evidentiary integrity and reduce misunderstanding. This page explains what can be offered, what cannot, and what must be agreed in writing before work begins.
Professional Limitations
The following limitations apply to all engagements:
- Not designed to support of specific outcomes.
- Not designed to support of admissibility in any court or jurisdiction.
- All conclusions are limited to the information and materials provided, and the agreed scope.
Service scope overview
| Service area | Included | Not included |
|---|---|---|
| Evidence preservation planning | ✓ | Legal advice |
| Authorized data exports & collection | ✓ | Cybersecurity incident response |
| Chain-of-custody documentation | ✓ | Expert testimony (unless separately retained) |
| Integrity verification records | ✓ | Outcomes designed to support |
Services begin only under written authorization and defined scope.
Within Scope
- Forensic-grade data acquisition (including limited, preservation-focused imaging when required)
- Evidence preservation
- Chain-of-custody documentation
- Secure evidence storage
- Media assessment and risk screening
- Evidence-aware documentation and verification (e.g., hashing for provided images/exports)
- Cloud-based data capture (authorized provider exports and account data preservation)
- Preservation of system authentication and access-control logs for legal, documentation and governance, and incident-response / internal review purposes..
- Forensic data analysis and reporting aligned to case questions
- Consultation to assist counsel and client teams in understanding technical findings.
- Mobile device preservation and review within provided legal authority and access credentials, including review of messages, call records, application data, media files, and device backups. All acquisitions are documented with chain-of-custody and verification records. No invasive access or unauthorized bypass methods are performed.
Out of Scope
- Expert testimony unless explicitly agreed in writing.
- Password bypass, device unlocking, or covert acquisition methods.
- Destructive testing or “repair” operations on original evidence without explicit written authorization
- Consumer photo-recovery or non-evidentiary sentimental data services.
- legal advice or representation
Engagement Requirements
- Written scope: objectives, deliverables, and boundaries.
- Written handling terms: transfer method, custody expectations, and retention/deletion.
- Fee structure: assessment vs analysis vs reporting, and any expedited terms.
Where appropriate, a short engagement letter or statement of work (SOW) is issued to ensure clarity and auditability.
Scope Notes
Related technical assessments may be performed on a limited, case-specific basis when directly relevant to evidentiary acquisition, preservation, or analysis.
Where required by the engagement scope, evidence disposition documentation may be prepared to record client-directed handling decisions following completion of evidentiary services. Data365 Evidence does not perform data sanitization or media destruction.
Next Steps
- Use the intake form (no uploads).
- Or email: Boris@data365evidence.com.
- Include deadlines, objectives, and a description of the media or data sources.