English (US) English (US)
English (UK) English (UK)
French (France) Français (France)
Chinese (Simplified) 简体中文
Chinese (Traditional) 繁体中文

Quotation


Header Image

Request Quotation

TEKID is looking forward to support you in the best way and invite you to complete this online questionnaire to receive an assistance proposal as to our computer forensics services.

During your questionnaire, you may click the help button TekID Logo to have more details on how to complete the form.

You may also reach out to our chat or directly call our office for support in completing the questionnaire.


GENERAL INFORMATION

PLEASE DESCRIBED THE NUMBER OF DEVICES
YOU ARE LOOKING TO   TekID Logo

TEKID will temporarily count devices with unknown operating systems as Windows.

For devices with Linux, OS X/macOS, iOS/iPadOS, Android systems, some restrictions may apply. Please contact TEKID for more information.

Devices of unknown size will be counted as LESS THAN 1 TB.

TEKID will consider that there is NO encryption by default.

Of any device with encryption applied, TEKID assumes a Windows laptop or desktop of LESS THAN 1 TB.

TEKID can NOT perform the acquisition of iOS/iPadOS devices without password.

TEKID will NOT perform forensic on personal devices without user's consent. Such devices will not be counted.

TEKID will count devices of unknown status as APPROVAL and will collect such devices. However, please clarify the information ASAP.

Device usage differ from person to person. Thru our experience we have separated device usage into two profiles with different investigation axes.

For divice of executive manager, complex investigation is expected due to professional position and device usage: communication, documentation, design, usage of common office tools.

For divice of IT or tech savvy, complex investigation is expected due to professional position and device usage: communication, documentation, coding, usage of IT tools, potential usage of anti-forensics tools.

Depending on geographical location, Computer Forensics have different regulations as to its legal process and may need the presence of professionals mandated by law enforcement.

Should you consider going to court depending on the investigation result, it may NOT be possible. Please contact TEKID for more information.

Should you wish a quote from TEKID legal advisory firm, TEKID shall contact LEAF.

TEKID Computer Forensics Lab is dedicated to all processes and investigation. Depending on the nature and the requirement of the project, Computer forensics process can be done on-site in a different location. Tools and Forensics Experts would be dispatched in that case.

TEKID requires a full precise description as to the nature and scope of investigation. Thus, allows TEKID Forensics Expert to build and plan its investigation case.

Starting date will depend on availability of Forensics Experts. TEKID Computers Forensics Experts work around the clock to bring answers to you.

GENERAL INFORMATION

PLEASE DESCRIBED THE NUMBER OF DEVICES
YOU ARE LOOKING TO   TekID Logo

TEKID will temporarily count devices with unknown operating systems as Windows.

For devices with Linux, OS X/macOS, iOS/iPadOS, Android systems, some restrictions may apply. Please contact TEKID for more information.

Devices of unknown size will be counted as LESS THAN 1 TB.

TEKID will consider that there is NO encryption by default.

Of any device with encryption applied, TEKID assumes a Windows laptop or desktop of LESS THAN 1 TB.

TEKID can NOT perform the acquisition of iOS/iPadOS devices without password.

TEKID will NOT perform forensic on personal devices without user's consent. Such devices will not be counted.

TEKID will count devices of unknown status as APPROVAL and will collect such devices. However, please clarify the information ASAP.

Device usage differ from person to person. Thru our experience we have separated device usage into two profiles with different investigation axes.

For divice of executive manager, complex investigation is expected due to professional position and device usage: communication, documentation, design, usage of common office tools.

For divice of IT or tech savvy, complex investigation is expected due to professional position and device usage: communication, documentation, coding, usage of IT tools, potential usage of anti-forensics tools.

Depending on geographical location, Computer Forensics have different regulations as to its legal process and may need the presence of professionals mandated by law enforcement.

Should you consider going to court depending on the investigation result, it may NOT be possible. Please contact TEKID for more information.

Should you wish a quote from TEKID legal advisory firm, TEKID shall contact LEAF.

Depending on geographical location, Computer Forensics have different regulations as to its legal process and may need the presence of professionals mandated by law enforcement.

Should you consider going to court depending on the investigation result, it may NOT be possible. Please contact TEKID for more information.

TEKID requires a full precise description as to the nature and scope of investigation. Thus, allows TEKID Forensics Expert to build and plan its investigation case.

Starting date will depend on availability of Forensics Experts. TEKID Computers Forensics Experts work around the clock to bring answers to you.

A typical help message will pop up like this.

Click close, click the overlay, or press ESC.

Wait a minute... are you robot?


备案号:沪ICP备19003830号-4
PSB Logo 沪公网安备 31010502005140号