CAMERAS AND VIOLATION OF PRIVACY
Invasive Cameras
Continue reading >>Software expert's report A software expert report is commissioned. To determine whether a former employee had used source code to produce a similar product for another company. The report is ...
Continue reading >>Advice by computer expert: Illegitimate use of the computer at work This expert opinion/advice was prompted by the suspicion that employees were overusing the computer for ...
Continue reading >>Expert telecommunications engineers: damage to telephone installations This is a very common example of intervention as telecommunication engineers appraisers, they have as cause the damages in networks ...
Continue reading >>