About InfoTech Europe

infotech-europe-logo

 

E-DISCOVERY/LITIGATION SUPPORT

We are a technology independent international litigation support company. We specialize in multi-jurisdictional and multi-lingual litigation, investigatory and regulatory matters.

Through our technology partners we can assist with:

  • data collection
  • data processing
  • hosting
  • early information assessment

Our focus is managed review and production. Our experts have the cultural expertise and mobile flexibility that allows us to provide customized in-country litigation support solutions. Our strength is our extensive database of subject matter experts including attorneys, foreign language specialists, data protection experts, technology professionals and paralegals.

  • Our home office is Paris, with subsidiary offices in Brussels, London and Zurich
  • We also have an office in Hong Kong, with a subsidiary office in Shanghai, with our China partner
  • We have document review centers in Brussels, London, Paris, Hong Kong and Shanghai

The following are examples of past assignments:

  • Corporate internal audits and investigations
  • Regulatory investigations by DG COMP (EU), MOFCOM (CHINA), the S.E.C. (U.S.)
  • Cross-border Foreign Corrupt Practices Act (FCPA) investigations
  • Cross-border civil litigation

We have handled review (and on several occasions data collection/processing/hosting with one of our partners) in Austria, Belgium, France, Geneva, Germany, Greece, Hong Kong, Hungary, Italy, Luxembourg, Oman, Zurich, and the United Kingdom.

Contact us:  http://www.infotecheurope.com/contact/

 

> CYBERSECURITY

 

In a world where the pace of innovation often outflanks the law, e-discovery offers a bright spot. The policies and procedures that define e-discovery have, for the most part, kept pace with the changing demands placed on practitioners through new review technology and increasing data complexity. In addition to the 2015 amendments to the U.S. Federal Rules of Civil Procedure (FRCP), for example, the Sedona Conference also recently released its third edition of e-discovery principles.

While it may seem that cybersecurity guidance has been missing from e-discovery, the industry has lately become more aware of its cybersecurity needs , spurred in no small part by legal and the corporate sector’s awareness of its own vulnerabilities. In the recent plethora of cybersecurity in eDiscovery webinars, we have all learned  how this new e-discovery landscape is forming and what is driving its evolution.

Through our partnerships with major cybersecurity vendors like FireEye, F-Secure, and Palo Alto Networks  we can assist you with cybersecurity issues.

Contact us:  http://www.infotecheurope.com/contact/

 

DUE DILIGENCE

Whether organizations are considering new markets or new business partners, or information on key player in a transaction, companies must often conduct detailed due diligence. Our experts can shine a light on the facts a company needs to know. Our multi-lingual team of analysts have lived, worked and studied across the regions we research. Through our affiliation with Stroz Friedberg, we can quickly gather a broad set of data and analyze it to get the insight to make a sound decision.

Our capabilities include:

  • Due Diligence for Major Mergers, Acquisitions, and Joint Ventures
  • Due Diligence Investigations of Corporate and Other Entities
  • Background Investigations Of Individuals, Vendors, and Competitors
  • Strategic Research Reports

Contact us:  http://www.infotecheurope.com/contact/

 

PENTEST SERVICES

 

A penetration test, colloquially known as a pen test, pentest or ethical hacking, is an authorized simulated cyberattack on a computer system, performed to evaluate the security of the system. Working with several cyber security partners, we identify both weaknesses (also referred to as vulnerabilities), including the potential for unauthorized parties to gain access to the system’s features and data, as well as strengths, enabling a full risk assessment to be completed.

The process typically identifies the target systems and a particular goal, then reviews available information and undertakes various means to attain that goal. A penetration test target may be a white box (which provides background and system information) or black box (which provides only basic or no information except the company name). A gray box penetration test is a combination of the two (where limited knowledge of the target is shared with the auditor). A penetration test can help determine whether a system is vulnerable to attack if the defenses were sufficient, and which defenses (if any) the test defeated.

Contact us:  http://www.infotecheurope.com/contact/