FAQ
Frequently asked questions.
A consolidated list of the questions we hear most often from Canadian counsel, corporate clients, and individuals.

General
What does a digital forensics engagement with Teradrive look like?+
Every engagement begins with a confidential scoping call. We agree on the matter, the custodians, the devices, the timeline, and the deliverable. From there, we move to forensic acquisition, analysis, and a written examiner report. Engagements taken through counsel are structured to support litigation privilege. We sign NDAs as standard.
How quickly can you start on an urgent matter?+
Same business day for scoping, with forensic preservation often beginning within hours of engagement. Cloud audit-log retention is short, so cloud preservation begins immediately when applicable. We have moved on Anton Piller executions, breach response, and litigation-hold matters within 48 hours of initial counsel contact.
How are your reports structured for Canadian courts?+
For BC Supreme Court matters, reports follow Rule 11 form by default unless counsel requests otherwise. Reports name the methodology, the tools used, the standards applied (Canada Evidence Act sections 31.1 to 31.8), and the limitations of what is and is not knowable from the evidence.
Are your engagements covered by privilege when retained through counsel?+
Engagements taken through counsel are structured to support a litigation-privilege claim. Retention agreement, communications, and work product are designed for that purpose from the start. We sign NDAs as standard. Privilege framing is set up at scoping, not added later when the question arises.
How do you protect the confidentiality of sensitive matters?+
Every engagement is confidential by default. NDAs are signed at intake. Communications are channelled through a defined contact list. Evidence is held in our secured storage at the Langley main office with documented access logs. Visitors are escorted. We do not discuss matters publicly without explicit client consent.
Do you handle matters outside British Columbia?+
Yes. We serve law firms and businesses across Canada from our Langley main office. Cloud forensics and a portion of computer and mobile forensics work entirely remotely. For Anton Piller executions, large on-site preservation, and trial testimony, we travel from Langley to the relevant jurisdiction.
How do you charge for forensic engagements?+
Cost depends on scope. Single-device matters are typically defined-scope engagements with a written estimate at scoping. Multi-custodian, cloud-heavy, or trial-testimony matters are typically billed hourly with a written estimate against which we bill. We do not begin work without authorization and do not exceed the estimate without flagging the cost implication first.
What information do you need to scope a matter?+
At intake we need: a brief description of the matter, the custodians and devices likely in scope, the timeline you are working to, the deliverable format you need, and whether the engagement is direct or through counsel. The consultation call typically takes 20 to 30 minutes and is confidential.
Computer Forensics
See the full Computer Forensics service page for context.
Can deleted files be recovered from a Windows laptop?+
Often, yes. Deleted file recovery depends on whether the underlying clusters have been overwritten. Even when file content is lost, residual artifacts (file system metadata, MFT entries, link files, Prefetch, Amcache, USN journal records) can establish that a file existed, when, and how it was accessed.
Can BitLocker encrypted drives be examined?+
Yes, when we have the recovery key, the user credentials, the BitLocker recovery file, or live access during the imaging window. Without one of those, the encrypted image can be preserved for future analysis. Microsoft account recovery options often surface the key.
How long does a computer forensic examination take?+
A single-laptop matter typically moves from intake to draft report in two to four weeks. Multi-device matters and matters requiring decryption, deduplication, or extensive timeline reconstruction take longer. We give a written timeline at the consultation.
Is metadata admissible in Canadian civil court?+
Generally yes, under section 31.1 of the Canada Evidence Act, when the metadata is collected through a defensible process and the integrity of the underlying record is documented. Metadata is often the strongest evidence available in cases where document content alone is contested.
What is the difference between forensic imaging and a regular backup?+
A regular backup copies user-visible files. A forensic image captures every bit of the source media, including unallocated space, slack space, and file system metadata. A backup is for restoring data. A forensic image is for proving what happened on the device.
Can a forensic examiner detect data theft after a factory reset?+
Sometimes, depending on the device, the reset method, and the timing. On Windows and macOS systems, residual artifacts (cloud sync logs, registry hives, browser sync state, recovery partitions) often survive a "reset this PC" or "erase all content" operation. On purpose-wiped drives written over with random data, recovery is unlikely.
Mobile Forensics
See the full Mobile Forensics service page for context.
Are screenshots of text messages admissible as evidence in Canadian court?+
Often, yes. iMessage and SMS messages remain in the SQLite database in WAL (write-ahead log) and journal files even after deletion, and unallocated database pages can preserve content for an extended period. Recovery depends on iOS version, device model, and how recently the deletion occurred. A full file system extraction recovers the most.
Can encrypted messages from Signal or Telegram be recovered?+
Yes, in many cases. WhatsApp stores messages in a SQLite database that exhibits the same WAL and journal behaviour as iMessage. WhatsApp's local backups and iCloud or Google Drive backup history often preserve content well past local deletion.
What evidence can be extracted from a damaged phone?+
Less often than iMessage or WhatsApp, but sometimes. Snapchat is engineered to delete content quickly, but cached media, database fragments, and notification artifacts can survive on the device. Server-side preservation requires legal process directed at Snap Inc.
Is text message evidence admissible in BC court?+
Screenshots can be tendered, but their weight is often challenged. A forensic acquisition of the source device is the more defensible path because it preserves message metadata, attachment hashes, and the raw database, which together establish authenticity under section 31.1 of the Canada Evidence Act.
What is chip-off forensics, and when is it the right choice?+
Sometimes. iOS "Erase All Content and Settings" deletes the encryption key and renders most content unrecoverable, but residual artifacts in cloud-sync state, recovery partitions, or paired-device backups may survive. Android factory resets vary widely by manufacturer and patch level. Forensic feasibility is matter-specific.
What is the difference between JTAG and ISP extraction?+
Often yes, when the device itself can be acquired. Both apps store decrypted message databases on the device for the user's own access. The challenge is acquiring the device with a high-fidelity method (full file system or physical), which our advanced extraction capabilities support.
Cloud Forensics
See the full Cloud Forensics service page for context.
How long are Microsoft 365 audit logs retained for forensic investigation?+
By default, 90 days for E3 licences and 180 days for E5 with Purview Audit Premium, depending on the event type. Some events (such as Exchange mailbox audit) have separate retention. The window is short, so preservation should begin as soon as a matter is anticipated.
Can deleted Slack messages be recovered for a legal hold?+
Sometimes. Slack's native retention depends on the workspace plan. Pro and Business+ plans support legal hold with retention overrides. Free and Standard plans do not, and content can be hard-deleted after retention windows expire. We assess plan-level capability at intake.
Are cloud backups admissible in Canadian court?+
Yes, when the backup is preserved through a defensible process and authenticated under section 31.1 of the Canada Evidence Act. Source-tenant audit logs supporting the backup's integrity strengthen admissibility.
What is the chain of custody for cloud evidence?+
We document tenant access, query parameters, export tool versions, output file hashes, transport storage, and post-export handling. Every step is timestamped and signed. The chain begins when we are authorized and ends when evidence is archived.
Can a cloud forensic investigation be done remotely?+
Yes. Cloud collections are by definition remote. We need administrator-level access to the relevant tenants (or the assistance of someone who has it), and a clear scoping document. Onsite presence is not required.
How quickly should a cloud preservation start after a triggering event?+
Immediately. The default M365 audit retention window starts counting down from the moment the event occurs. Each day of delay risks losing relevant log entries. We can begin preservation within hours of engagement when a matter is urgent.
Expert Witness
See the full Expert Witness service page for context.
What qualifications should a digital forensics expert have in BC?+
There is no statutory licensing scheme. Courts assess qualification on the *Mohan* criteria (specialised knowledge, relevant credentials, prior testimony). Industry-recognized certifications (EnCE, CCE, CFCE, Cellebrite CCO/CCPA, Magnet MCFE, Vound Intella, AceLab PC-3000, AccessData FTK, BTL1) and a documented record of prior court testimony are the strongest credibility signals.
How does the White Burgess duty apply to a forensic expert?+
*White Burgess* clarifies that an expert's duty to the court overrides any duty to the retaining party. An expert who cannot or will not give independent testimony is not admissible. Our reports are written to that standard, and the methodology is documented so a triggering inquiry can be answered without ambiguity.
What are the Mohan criteria for admissibility?+
Established in *R. v. Mohan*, [1994] 2 SCR 9. Expert evidence is admissible if it is (1) necessary, in the sense of being likely to assist the trier of fact beyond ordinary experience; (2) relevant; (3) given by a properly qualified expert; and (4) not subject to an exclusionary rule.
Can a single expert serve in joint expert format?+
Yes. Joint expert reports are common in BC family law and civil matters where parties want to avoid duelling-expert cost and complexity. We are willing to serve as a single expert when both parties consent and counsel agree to the protocol.
How is an expert affidavit different from an examiner report?+
An affidavit is sworn evidence, typically used for interlocutory applications (injunctions, preservation orders, interim relief). An examiner report is a non-sworn document that explains methodology and findings. Many matters use both, with the affidavit attaching the examiner report as an exhibit.
What is the cost range for expert witness engagement?+
Cost depends on scope. A single-device examination with a Rule 11 report is typically a defined-scope engagement. Multi-custodian, cloud-heavy, or trial-testimony matters are typically billed hourly with an estimate at scoping. We give a written estimate before any work begins.
Data Breach Investigation
See the full Data Breach Investigation service page for context.
When is breach notification mandatory under PIPEDA?+
When the breach involves personal information and creates a "real risk of significant harm" to one or more affected individuals. The notification must go to the Office of the Privacy Commissioner of Canada, to affected individuals, and to other organizations that can help mitigate harm.
What is real risk of significant harm under PIPEDA?+
A risk that, if realized, would cause significant harm to an affected individual. Significant harm includes humiliation, damage to reputation or relationships, loss of employment, financial loss, identity theft, negative effects on credit record, or damage to or loss of property. The standard is fact-specific and depends on the sensitivity of the information and the probability that it will be misused.
How do you determine if data was actually exfiltrated?+
Through endpoint forensics (file access logs, browser uploads, USB writes, cloud sync), network log analysis, cloud audit log analysis (M365 unified audit log, Google Workspace audit data), and where available, threat-actor leak-site monitoring. Access without exfiltration is a different determination from exfiltration, and the report must distinguish them clearly.
What goes into a regulator-ready breach report?+
A description of the breach, the date and circumstances, the personal information involved, the number of individuals affected, the steps taken to reduce or mitigate the risk of harm, the steps taken to notify affected individuals, and any other information required by the regulator. We structure the forensic findings to map to the OPC reporting form by default.
Can the same forensic team support privilege and counsel?+
Yes. Engagements taken through counsel are structured to support a litigation-privilege claim, with retention agreements, communication channels, and work-product handling designed for that purpose. The same forensic record can support the regulator notification and any subsequent litigation defence, as long as the privilege framing is set up correctly at the start.
Need digital evidence handled defensibly?
Book a confidential consultation. Our team will reach out as soon as possible.
