{"id":292,"date":"2021-01-27T15:38:19","date_gmt":"2021-01-27T21:38:19","guid":{"rendered":"https:\/\/idsinc.com\/?page_id=292"},"modified":"2023-11-08T16:55:05","modified_gmt":"2023-11-08T22:55:05","slug":"surveillance-medico-legale","status":"publish","type":"page","link":"https:\/\/idsinc.com\/fr\/case-studies\/surveillance-forensics\/","title":{"rendered":"Vid\u00e9osurveillance m\u00e9dico-l\u00e9gale"},"content":{"rendered":"<!--themify_builder_content-->\n<div id=\"themify_builder_content-292\" data-postid=\"292\" class=\"themify_builder_content themify_builder_content-292 themify_builder tf_clear\">\n                    <div  data-lazy=\"1\" class=\"module_row themify_builder_row tb_sxix889 tb_first tf_w\">\n                        <div class=\"row_inner col_align_top tb_col_count_1 tf_box tf_rel\">\n                        <div  data-lazy=\"1\" class=\"module_column tb-column col-full tb_dvve891 first\">\n                    <!-- module image -->\n<div  class=\"module module-image tb_1zqw507 image-full-overlay   auto_fullwidth tf_mw\" data-lazy=\"1\">\n        <div class=\"image-wrap tf_rel tf_mw\">\n            <img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"512\" src=\"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/iDS-Case-Study-Surveillance-Forensics-1024x512.jpg\" class=\"wp-post-image wp-image-293\" title=\"Video Surveillance Forensics | iDS Case Study\" alt=\"Video Surveillance Forensics, iDS Case Study\" srcset=\"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/iDS-Case-Study-Surveillance-Forensics-1024x512.jpg 1024w, https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/iDS-Case-Study-Surveillance-Forensics-300x150.jpg 300w, https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/iDS-Case-Study-Surveillance-Forensics-768x384.jpg 768w, https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/iDS-Case-Study-Surveillance-Forensics.jpg 1200w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/>    \n        <\/div>\n    <!-- \/image-wrap -->\n    \n        <\/div>\n<!-- \/module image -->        <\/div>\n                        <\/div>\n        <\/div>\n                        <div  data-lazy=\"1\" class=\"module_row themify_builder_row tb_z67o610 tf_w\">\n                        <div class=\"row_inner col_align_top tb_col_count_1 tf_box tf_rel\">\n                        <div  data-lazy=\"1\" class=\"module_column tb-column col-full tb_cajx611 first\">\n                    <!-- module fancy heading -->\n<div  class=\"module module-fancy-heading tb_aw59458\" data-lazy=\"1\">\n        <h1 class=\"fancy-heading\">\n    <span class=\"main-head tf_block\">\n                    D\u00c9FI            <\/span>\n\n    \n    <span class=\"sub-head tf_block tf_rel\">\n                                <\/span>\n    <\/h1>\n<\/div>\n<!-- \/module fancy heading -->\n<!-- module text -->\n<div  class=\"module module-text tb_vvfw5\" data-lazy=\"1\">\n        <div  class=\"tb_text_wrap\">\n        <div class=\"page\" title=\"Page 1\">\n<div class=\"layoutArea\">\n<div class=\"column\">\n<h5>Un client qui avait mis en place un syst\u00e8me de vid\u00e9osurveillance avait \u00e9t\u00e9 poursuivi, all\u00e9guant que la cat\u00e9gorie d&#039;employ\u00e9s devrait \u00eatre pay\u00e9e en heures suppl\u00e9mentaires pour le temps n\u00e9cessaire pour passer le point de contr\u00f4le de s\u00e9curit\u00e9 requis avant le d\u00e9but effectif de leur quart de travail.<\/h5>\n<p>Le client avait besoin d&#039;expertise pour :<\/p>\n<ul>\n<li>\n<p>Concevoir, planifier, coordonner et ex\u00e9cuter une m\u00e9thodologie de collecte m\u00e9dico-l\u00e9gale d&#039;un syst\u00e8me de vid\u00e9osurveillance.<\/p>\n<\/li>\n<li>\n<p>Localiser et analyser les flux vid\u00e9o \u00e0 diff\u00e9rents moments et \u00e0 diff\u00e9rents jours.<\/p>\n<\/li>\n<li>\n<p>Pour recr\u00e9er l&#039;environnement mat\u00e9riel et logiciel afin de permettre \u00e0 l&#039;avocat adverse de voir les s\u00e9quences vid\u00e9o n\u00e9cessaires pour<\/p>\n<p>eux-m\u00eames.<\/p>\n<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div>    <\/div>\n<\/div>\n<!-- \/module text --><!-- module fancy heading -->\n<div  class=\"module module-fancy-heading tb_fjro869\" data-lazy=\"1\">\n        <h1 class=\"fancy-heading\">\n    <span class=\"main-head tf_block\">\n                    Solution            <\/span>\n\n    \n    <span class=\"sub-head tf_block tf_rel\">\n                                <\/span>\n    <\/h1>\n<\/div>\n<!-- \/module fancy heading -->\n<!-- module text -->\n<div  class=\"module module-text tb_olr8818\" data-lazy=\"1\">\n        <div  class=\"tb_text_wrap\">\n        <div class=\"page\" title=\"Page 1\">\n<div class=\"layoutArea\">\n<div class=\"column\">\n<h5>Nos experts iDS Digital Forensics ont con\u00e7u un flux de travail qui permettrait la collecte, l&#039;analyse et la production de donn\u00e9es \u00e0 partir du serveur et du syst\u00e8me de vid\u00e9osurveillance bas\u00e9 sur le logiciel utilis\u00e9 par le client.<\/h5>\n<p>L&#039;\u00e9quipe iDS a collect\u00e9, analys\u00e9 et rendu compte des \u00e9l\u00e9ments suivants\u00a0:<\/p>\n<ul>\n<li>\n<p>L&#039;imagerie d\u00e9fendable du syst\u00e8me vid\u00e9o et du syst\u00e8me de stockage de fichiers vid\u00e9o associ\u00e9.<\/p>\n<\/li>\n<li>\n<p>L&#039;analyse et l&#039;extraction des s\u00e9quences vid\u00e9o souhait\u00e9es.<\/p>\n<\/li>\n<li>\n<p>La reproduction du mat\u00e9riel et des logiciels n\u00e9cessaires qui permettraient \u00e0 toutes les parties de visionner les s\u00e9quences vid\u00e9o dans un<\/p>\n<p>environnement r\u00e9el simul\u00e9.<\/p>\n<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div>    <\/div>\n<\/div>\n<!-- \/module text --><!-- module fancy heading -->\n<div  class=\"module module-fancy-heading tb_h5vm641\" data-lazy=\"1\">\n        <h1 class=\"fancy-heading\">\n    <span class=\"main-head tf_block\">\n                    R\u00e9sultat            <\/span>\n\n    \n    <span class=\"sub-head tf_block tf_rel\">\n                                <\/span>\n    <\/h1>\n<\/div>\n<!-- \/module fancy heading -->\n<!-- module text -->\n<div  class=\"module module-text tb_17by0\" data-lazy=\"1\">\n        <div  class=\"tb_text_wrap\">\n        <div class=\"page\" title=\"Page 1\">\n<div class=\"layoutArea\">\n<div class=\"column\">\n<h5>En tirant parti de l&#039;expertise d&#039;iDS, le client a pu laisser son syst\u00e8me vid\u00e9o op\u00e9rationnel, tout en permettant une collecte m\u00e9dico-l\u00e9gale d\u00e9fendable, et a pu cr\u00e9er un environnement virtuel r\u00e9pliqu\u00e9 qui \u00e9tait un miroir du syst\u00e8me du client pour une utilisation par d&#039;autres parties.<\/h5>\n<p>Le client a \u00e9conomis\u00e9 des milliers, voire des centaines de milliers de dollars en engageant iDS pour cr\u00e9er un flux de travail innovant pour accomplir cette mission.<\/p>\n<\/div>\n<\/div>\n<\/div>    <\/div>\n<\/div>\n<!-- \/module text -->        <\/div>\n                        <\/div>\n        <\/div>\n        <\/div>\n<!--\/themify_builder_content-->","protected":false},"excerpt":{"rendered":"<p>A client who had a video surveillance system in place had been sued, alleging the class of employees should be paid overtime for the amount of time it takes to get through the required security checkpoint before their shift actually started. The client needed expertise for the following: To design, plan, coordinate, and execute a [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":293,"parent":33,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"team":[],"class_list":["post-292","page","type-page","status-publish","has-post-thumbnail","hentry","has-post-title","has-post-date","has-post-category","has-post-tag","has-post-comment","has-post-author",""],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.6 (Yoast SEO v27.6) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Video Surveillance Forensics - iDiscovery Solutions<\/title>\n<meta name=\"description\" content=\"Video Surveillance Forensics allowed iDS to create a replicated virtual environment, mirroring the client\u2019s system for use by other parties.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/idsinc.com\/fr\/etudes-de-cas\/surveillance-medico-legale\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Video Surveillance Forensics\" \/>\n<meta property=\"og:description\" content=\"Video Surveillance Forensics allowed iDS to create a replicated virtual environment, mirroring the client\u2019s system for use by other parties.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/idsinc.com\/fr\/etudes-de-cas\/surveillance-medico-legale\/\" \/>\n<meta property=\"og:site_name\" content=\"iDiscovery Solutions\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/iDiscovery-Solutions-110210573904472\" \/>\n<meta property=\"article:modified_time\" content=\"2023-11-08T22:55:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/iDS-Case-Study-Surveillance-Forensics.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/case-studies\\\/surveillance-forensics\\\/\",\"url\":\"https:\\\/\\\/idsinc.com\\\/case-studies\\\/surveillance-forensics\\\/\",\"name\":\"Video Surveillance Forensics - iDiscovery Solutions\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/case-studies\\\/surveillance-forensics\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/case-studies\\\/surveillance-forensics\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/iDS-Case-Study-Surveillance-Forensics.jpg\",\"datePublished\":\"2021-01-27T21:38:19+00:00\",\"dateModified\":\"2023-11-08T22:55:05+00:00\",\"description\":\"Video Surveillance Forensics allowed iDS to create a replicated virtual environment, mirroring the client\u2019s system for use by other parties.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/case-studies\\\/surveillance-forensics\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/idsinc.com\\\/case-studies\\\/surveillance-forensics\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/case-studies\\\/surveillance-forensics\\\/#primaryimage\",\"url\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/iDS-Case-Study-Surveillance-Forensics.jpg\",\"contentUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/iDS-Case-Study-Surveillance-Forensics.jpg\",\"width\":1200,\"height\":600,\"caption\":\"Video Surveillance Forensics allowed iDS to create a replicated virtual environment, mirroring the client\u2019s system for use by other parties.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/case-studies\\\/surveillance-forensics\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/idsinc.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Case Studies\",\"item\":\"https:\\\/\\\/idsinc.com\\\/case-studies\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Video Surveillance Forensics\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#website\",\"url\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/\",\"name\":\"iDiscovery Solutions\",\"description\":\"Use data to your advantage in the courtroom\",\"publisher\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#organization\"},\"alternateName\":\"iDS\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#organization\",\"name\":\"iDiscovery Solutions\",\"alternateName\":\"iDS\",\"url\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/iDS-Logo-3c-e1611176096212.png\",\"contentUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/iDS-Logo-3c-e1611176096212.png\",\"width\":100,\"height\":73,\"caption\":\"iDiscovery Solutions\"},\"image\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/iDiscovery-Solutions-110210573904472\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/idsinc\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCarv7o1MeYfCp0eZ1IrufIw\"],\"description\":\"iDS provides consultative data solutions to corporations and law firms around the world, giving them a decisive advantage \u2013 both in and out of the courtroom. iDS\u2019s subject matter experts and data strategists specialize in finding solutions to complex data problems, ensuring data can be leveraged as an asset, not a liability.\",\"email\":\"info@idsinc.com\",\"telephone\":\"+1.800.813.4832\",\"legalName\":\"iDiscovery Solutions\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Analyses de vid\u00e9osurveillance - iDiscovery Solutions","description":"Video Surveillance Forensics a permis \u00e0 iDS de cr\u00e9er un environnement virtuel r\u00e9pliqu\u00e9, refl\u00e9tant le syst\u00e8me du client pour une utilisation par d&#039;autres parties.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/idsinc.com\/fr\/etudes-de-cas\/surveillance-medico-legale\/","og_locale":"fr_FR","og_type":"article","og_title":"Video Surveillance Forensics","og_description":"Video Surveillance Forensics allowed iDS to create a replicated virtual environment, mirroring the client\u2019s system for use by other parties.","og_url":"https:\/\/idsinc.com\/fr\/etudes-de-cas\/surveillance-medico-legale\/","og_site_name":"iDiscovery Solutions","article_publisher":"https:\/\/www.facebook.com\/iDiscovery-Solutions-110210573904472","article_modified_time":"2023-11-08T22:55:05+00:00","og_image":[{"width":1200,"height":600,"url":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/iDS-Case-Study-Surveillance-Forensics.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/idsinc.com\/case-studies\/surveillance-forensics\/","url":"https:\/\/idsinc.com\/case-studies\/surveillance-forensics\/","name":"Analyses de vid\u00e9osurveillance - iDiscovery Solutions","isPartOf":{"@id":"https:\/\/idsinc.com\/en_gb\/#website"},"primaryImageOfPage":{"@id":"https:\/\/idsinc.com\/case-studies\/surveillance-forensics\/#primaryimage"},"image":{"@id":"https:\/\/idsinc.com\/case-studies\/surveillance-forensics\/#primaryimage"},"thumbnailUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/iDS-Case-Study-Surveillance-Forensics.jpg","datePublished":"2021-01-27T21:38:19+00:00","dateModified":"2023-11-08T22:55:05+00:00","description":"Video Surveillance Forensics a permis \u00e0 iDS de cr\u00e9er un environnement virtuel r\u00e9pliqu\u00e9, refl\u00e9tant le syst\u00e8me du client pour une utilisation par d&#039;autres parties.","breadcrumb":{"@id":"https:\/\/idsinc.com\/case-studies\/surveillance-forensics\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/idsinc.com\/case-studies\/surveillance-forensics\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/idsinc.com\/case-studies\/surveillance-forensics\/#primaryimage","url":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/iDS-Case-Study-Surveillance-Forensics.jpg","contentUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/iDS-Case-Study-Surveillance-Forensics.jpg","width":1200,"height":600,"caption":"Video Surveillance Forensics allowed iDS to create a replicated virtual environment, mirroring the client\u2019s system for use by other parties."},{"@type":"BreadcrumbList","@id":"https:\/\/idsinc.com\/case-studies\/surveillance-forensics\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/idsinc.com\/"},{"@type":"ListItem","position":2,"name":"Case Studies","item":"https:\/\/idsinc.com\/case-studies\/"},{"@type":"ListItem","position":3,"name":"Video Surveillance Forensics"}]},{"@type":"WebSite","@id":"https:\/\/idsinc.com\/en_gb\/#website","url":"https:\/\/idsinc.com\/en_gb\/","name":"Solutions d&#039;iD\u00e9couverte","description":"Utilisez les donn\u00e9es \u00e0 votre avantage dans la salle d\u2019audience","publisher":{"@id":"https:\/\/idsinc.com\/en_gb\/#organization"},"alternateName":"iDS","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/idsinc.com\/en_gb\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/idsinc.com\/en_gb\/#organization","name":"Solutions d&#039;iD\u00e9couverte","alternateName":"iDS","url":"https:\/\/idsinc.com\/en_gb\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/logo\/image\/","url":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/iDS-Logo-3c-e1611176096212.png","contentUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/iDS-Logo-3c-e1611176096212.png","width":100,"height":73,"caption":"iDiscovery Solutions"},"image":{"@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/iDiscovery-Solutions-110210573904472","https:\/\/www.linkedin.com\/company\/idsinc","https:\/\/www.youtube.com\/channel\/UCarv7o1MeYfCp0eZ1IrufIw"],"description":"iDS fournit des solutions de donn\u00e9es consultatives aux entreprises et aux cabinets d&#039;avocats du monde entier, leur donnant un avantage d\u00e9cisif, tant \u00e0 l&#039;int\u00e9rieur qu&#039;\u00e0 l&#039;ext\u00e9rieur de la salle d&#039;audience. Les experts en la mati\u00e8re et les strat\u00e8ges en donn\u00e9es d&#039;iDS se sp\u00e9cialisent dans la recherche de solutions \u00e0 des probl\u00e8mes de donn\u00e9es complexes, garantissant que les donn\u00e9es peuvent \u00eatre exploit\u00e9es comme un atout et non comme un passif.","email":"info@idsinc.com","telephone":"+1.800.813.4832","legalName":"iDiscovery Solutions"}]}},"builder_content":"\n<h1>CHALLENGE<br\/><\/h1>\n<h5>A client who had a video surveillance system in place had been sued, alleging the class of employees should be paid overtime for the amount of time it takes to get through the required security checkpoint before their shift actually started.<\/h5> <p>The client needed expertise for the following:<\/p> <ul> <li> <p>To design, plan, coordinate, and execute a methodology for forensic collection of a video surveillance system.<\/p> <\/li> <li> <p>To locate and analyze video feeds for various points in time, and on various days.<\/p> <\/li> <li> <p>To recreate the hardware and software environment to allow opposing counsel to see the necessary video footage for<\/p> <p>themselves.<\/p> <\/li> <\/ul>\n<h1>Solution<br\/><\/h1>\n<h5>Our iDS Digital Forensics Experts designed a workflow that would accommodate the collection, analysis, and production of data from the server and software-based video surveillance system used by the client.<\/h5> <p>The iDS team collected, analyzed, and reported on the following:<\/p> <ul> <li> <p>The defensible imaging of the video system and associated video file storage system.<\/p> <\/li> <li> <p>The analysis and extraction of desired video footage.<\/p> <\/li> <li> <p>The replication of the necessary hardware and software that would allow all parties to review the video footage in a<\/p> <p>simulated live environment.<\/p> <\/li> <\/ul>\n<h1>Result<br\/><\/h1>\n<h5>By leveraging the expertise of iDS, the client was able to leave their video system up and running, while allowing a defensible forensic collection, and was able to create a replicated virtual environment that was a mirror of the client\u2019s system for use by other parties.<\/h5> <p>The client saved thousands, to hundreds of thousands, of dollars by engaging iDS to create an innovative workflow to accomplish this assignment.<\/p>","_links":{"self":[{"href":"https:\/\/idsinc.com\/fr\/wp-json\/wp\/v2\/pages\/292","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/idsinc.com\/fr\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/idsinc.com\/fr\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/idsinc.com\/fr\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/idsinc.com\/fr\/wp-json\/wp\/v2\/comments?post=292"}],"version-history":[{"count":0,"href":"https:\/\/idsinc.com\/fr\/wp-json\/wp\/v2\/pages\/292\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/idsinc.com\/fr\/wp-json\/wp\/v2\/pages\/33"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/idsinc.com\/fr\/wp-json\/wp\/v2\/media\/293"}],"wp:attachment":[{"href":"https:\/\/idsinc.com\/fr\/wp-json\/wp\/v2\/media?parent=292"}],"wp:term":[{"taxonomy":"team","embeddable":true,"href":"https:\/\/idsinc.com\/fr\/wp-json\/wp\/v2\/team?post=292"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}