{"id":3396,"date":"2015-07-01T20:26:13","date_gmt":"2015-07-02T01:26:13","guid":{"rendered":"http:\/\/einvestigations.com\/?p=3396"},"modified":"2017-02-17T10:22:05","modified_gmt":"2017-02-17T16:22:05","slug":"data-recovery","status":"publish","type":"post","link":"https:\/\/einvestigations.com\/?p=3396","title":{"rendered":"Data Recovery"},"content":{"rendered":"<p>At EInvestigations, we can help your data recovery, electronic discovery, and forensic computer needs with our team of digital investigators who are experienced in all aspects of a computer forensic investigation, including data recovery. In some electronic discovery cases, there is missing data that has often been destroyed by someone who does not want you to follow the digital footprint. Someone might try to physically delete the data and damage the drives by dropping them, or exposing them to fire, water or magnets. When someone has intentionally damaged the drives, it&#8217;s time to call a certified computer examiner who is also certified in data recovery to begin the forensic computer recovery process. At EInvestigations, our digital investigators have successfully handled a variety of data recovery cases, including:<\/p>\n<ul>\n<li>Data recovery of financial information on a smashed drive<\/li>\n<li>Data recovery of client files that were thrown into a pool<\/li>\n<li>Data recovery of Auto CAD files that were exposed to heat, smoke and water<\/li>\n<\/ul>\n<h4>Our Data Recovery Methods<\/h4>\n<p>When your data recovery involves information that is relevant to a criminal or civil matter, it&#8217;s important to hire a certified computer examiner for your digital forensic investigation. Our digital investigators work to recover your data using a variety of data recovery methods that can recover deleted data from any type of drive, including damaged drives. Whether the data recovery is needed on a computer hard drive, USB key, cell phone or even a copy machine, our digital investigators are experts at data recovery to ensure that the recovered information is usable in court, if necessary.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>At EInvestigations, we can help your data recovery, electronic discovery, and forensic computer needs with our team of digital investigators who are experienced in all aspects of a computer forensic investigation, including data recovery. In some electronic discovery cases, there is missing data that has often been destroyed by someone who does not want you&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_kad_post_transparent":"","_kad_post_title":"","_kad_post_layout":"","_kad_post_sidebar_id":"","_kad_post_content_style":"","_kad_post_vertical_padding":"","_kad_post_feature":"","_kad_post_feature_position":"","_kad_post_header":false,"_kad_post_footer":false,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-3396","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Data Recovery - E-Investigations<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/einvestigations.com\/?p=3396\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Data Recovery - E-Investigations\" \/>\n<meta property=\"og:description\" content=\"At EInvestigations, we can help your data recovery, electronic discovery, and forensic computer needs with our team of digital investigators who are experienced in all aspects of a computer forensic investigation, including data recovery. In some electronic discovery cases, there is missing data that has often been destroyed by someone who does not want you...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/einvestigations.com\/?p=3396\" \/>\n<meta property=\"og:site_name\" content=\"E-Investigations\" \/>\n<meta property=\"article:published_time\" content=\"2015-07-02T01:26:13+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2017-02-17T16:22:05+00:00\" \/>\n<meta name=\"author\" content=\"blu27\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"blu27\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/einvestigations.com\\\/?p=3396#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/einvestigations.com\\\/?p=3396\"},\"author\":{\"name\":\"blu27\",\"@id\":\"https:\\\/\\\/einvestigations.com\\\/#\\\/schema\\\/person\\\/133ca639d481aeee9371e8bf17f20530\"},\"headline\":\"Data Recovery\",\"datePublished\":\"2015-07-02T01:26:13+00:00\",\"dateModified\":\"2017-02-17T16:22:05+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/einvestigations.com\\\/?p=3396\"},\"wordCount\":265,\"publisher\":{\"@id\":\"https:\\\/\\\/einvestigations.com\\\/#organization\"},\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/einvestigations.com\\\/?p=3396\",\"url\":\"https:\\\/\\\/einvestigations.com\\\/?p=3396\",\"name\":\"Data Recovery - E-Investigations\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/einvestigations.com\\\/#website\"},\"datePublished\":\"2015-07-02T01:26:13+00:00\",\"dateModified\":\"2017-02-17T16:22:05+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/einvestigations.com\\\/?p=3396#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/einvestigations.com\\\/?p=3396\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/einvestigations.com\\\/?p=3396#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/einvestigations.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Data Recovery\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/einvestigations.com\\\/#website\",\"url\":\"https:\\\/\\\/einvestigations.com\\\/\",\"name\":\"E-Investigations\",\"description\":\"Digital Forensics Experts\",\"publisher\":{\"@id\":\"https:\\\/\\\/einvestigations.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/einvestigations.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/einvestigations.com\\\/#organization\",\"name\":\"eInvestigations\",\"url\":\"https:\\\/\\\/einvestigations.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/einvestigations.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/einvestigations.com\\\/wp\\\/wp-content\\\/uploads\\\/2017\\\/02\\\/eInvestigations_Logo-72.png\",\"contentUrl\":\"https:\\\/\\\/einvestigations.com\\\/wp\\\/wp-content\\\/uploads\\\/2017\\\/02\\\/eInvestigations_Logo-72.png\",\"width\":346,\"height\":117,\"caption\":\"eInvestigations\"},\"image\":{\"@id\":\"https:\\\/\\\/einvestigations.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/einvestigations.com\\\/#\\\/schema\\\/person\\\/133ca639d481aeee9371e8bf17f20530\",\"name\":\"blu27\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/19444dfc86689d07e05c96a0c1eb33515bb2eecfdb8b442e9d370580266c2269?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/19444dfc86689d07e05c96a0c1eb33515bb2eecfdb8b442e9d370580266c2269?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/19444dfc86689d07e05c96a0c1eb33515bb2eecfdb8b442e9d370580266c2269?s=96&d=mm&r=g\",\"caption\":\"blu27\"},\"url\":\"https:\\\/\\\/einvestigations.com\\\/?author=1\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Data Recovery - E-Investigations","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/einvestigations.com\/?p=3396","og_locale":"en_US","og_type":"article","og_title":"Data Recovery - E-Investigations","og_description":"At EInvestigations, we can help your data recovery, electronic discovery, and forensic computer needs with our team of digital investigators who are experienced in all aspects of a computer forensic investigation, including data recovery. In some electronic discovery cases, there is missing data that has often been destroyed by someone who does not want you...","og_url":"https:\/\/einvestigations.com\/?p=3396","og_site_name":"E-Investigations","article_published_time":"2015-07-02T01:26:13+00:00","article_modified_time":"2017-02-17T16:22:05+00:00","author":"blu27","twitter_card":"summary_large_image","twitter_misc":{"Written by":"blu27","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/einvestigations.com\/?p=3396#article","isPartOf":{"@id":"https:\/\/einvestigations.com\/?p=3396"},"author":{"name":"blu27","@id":"https:\/\/einvestigations.com\/#\/schema\/person\/133ca639d481aeee9371e8bf17f20530"},"headline":"Data Recovery","datePublished":"2015-07-02T01:26:13+00:00","dateModified":"2017-02-17T16:22:05+00:00","mainEntityOfPage":{"@id":"https:\/\/einvestigations.com\/?p=3396"},"wordCount":265,"publisher":{"@id":"https:\/\/einvestigations.com\/#organization"},"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/einvestigations.com\/?p=3396","url":"https:\/\/einvestigations.com\/?p=3396","name":"Data Recovery - E-Investigations","isPartOf":{"@id":"https:\/\/einvestigations.com\/#website"},"datePublished":"2015-07-02T01:26:13+00:00","dateModified":"2017-02-17T16:22:05+00:00","breadcrumb":{"@id":"https:\/\/einvestigations.com\/?p=3396#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/einvestigations.com\/?p=3396"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/einvestigations.com\/?p=3396#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/einvestigations.com\/"},{"@type":"ListItem","position":2,"name":"Data Recovery"}]},{"@type":"WebSite","@id":"https:\/\/einvestigations.com\/#website","url":"https:\/\/einvestigations.com\/","name":"E-Investigations","description":"Digital Forensics Experts","publisher":{"@id":"https:\/\/einvestigations.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/einvestigations.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/einvestigations.com\/#organization","name":"eInvestigations","url":"https:\/\/einvestigations.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/einvestigations.com\/#\/schema\/logo\/image\/","url":"https:\/\/einvestigations.com\/wp\/wp-content\/uploads\/2017\/02\/eInvestigations_Logo-72.png","contentUrl":"https:\/\/einvestigations.com\/wp\/wp-content\/uploads\/2017\/02\/eInvestigations_Logo-72.png","width":346,"height":117,"caption":"eInvestigations"},"image":{"@id":"https:\/\/einvestigations.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/einvestigations.com\/#\/schema\/person\/133ca639d481aeee9371e8bf17f20530","name":"blu27","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/19444dfc86689d07e05c96a0c1eb33515bb2eecfdb8b442e9d370580266c2269?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/19444dfc86689d07e05c96a0c1eb33515bb2eecfdb8b442e9d370580266c2269?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/19444dfc86689d07e05c96a0c1eb33515bb2eecfdb8b442e9d370580266c2269?s=96&d=mm&r=g","caption":"blu27"},"url":"https:\/\/einvestigations.com\/?author=1"}]}},"_links":{"self":[{"href":"https:\/\/einvestigations.com\/index.php?rest_route=\/wp\/v2\/posts\/3396","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/einvestigations.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/einvestigations.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/einvestigations.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/einvestigations.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=3396"}],"version-history":[{"count":2,"href":"https:\/\/einvestigations.com\/index.php?rest_route=\/wp\/v2\/posts\/3396\/revisions"}],"predecessor-version":[{"id":3949,"href":"https:\/\/einvestigations.com\/index.php?rest_route=\/wp\/v2\/posts\/3396\/revisions\/3949"}],"wp:attachment":[{"href":"https:\/\/einvestigations.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=3396"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/einvestigations.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=3396"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/einvestigations.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=3396"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}