ForensicsS | Private Detective & Digital Forensics Investigation Experts
  • info@forensicss.com

    Send Email

  • 11400 West Olympic Blvd, Los Angeles, CA 90064

  • Home
  • About Us
  • Services
    • Domestic Investigation
      • Los Angeles Private Eye
      • Catch Cheater
      • Infidelity Investigations
      • Asset Investigations
      • Private Detective Orange County
      • Child Custody Investigations
      • Missing Person Locates
      • Wire Fraud
      • Corporate Security Investigations
      • Surveillance Operations
      • Financial Fraud Investigations
      • Bug Sweep TSCM Investigation
      • Workers Compensation Fraud Investigation
      • Asset and Hidden Finances Investigations
    • Cyber Security
      • DIGITAL EVIDENCE AUTHENTICATION
      • Cyber Bullying Online Investigation
      • Penetration Testing Service
      • Social Media Monitoring
      • Romance Scam Investigator
      • Cyber Stalking Investigation
      • Crypto Scam Investigation
      • Cyber Security Assessment
      • Cyber Harassment Online Investigator
      • Ransomware Attack Investigation
      • Social Media Investigator
      • Extortion Investigation services
      • Background Screening
      • Insurance Fraud Detective
      • Forensic Accounting
      • Online Identity Theft
      • Online Blackmail
      • Cell Phone Forensics
      • Automotive Forensics
      • Audio Video Forensics
      • E-Discovery
      • Assets Search 
      • Computer and Cell Phone Forensics
  • Closed Cases
    • Closed Cases
    • Case Details
  • News
  • Contact
310-270-0598

Confidentiality Guaranteed

310-270-0598

Confidentiality Guaranteed

Logo

Contact Info

  • 11400 West Olympic Blvd, Los Angeles, CA 90064
  • 310-270-0598
  • info@forensicss.com

    Comprehensive Background Report

      ForensicsS | Private Detective & Digital Forensics Investigation Experts > Comprehensive Background Report

    ORDER BACKGROUND REPORT

    Serious insights. Verified data. Trusted by professionals and private clients.


    Why Order a Background Report?

    Whether you're reconnecting with someone from your past, verifying a phone number, or uncovering potential fraud, our Comprehensive Background Report gives you answers. Clients rely on it to:

    • Identify phone number ownership
    • Locate missing persons or old connections
    • Find contact details — email, phone, social
    • Check for criminal records or arrest history
    • Trace asset ownership or business involvement
    • Investigate suspicious online dating profiles
    Safe Online Dating Investigation

    What’s Inside the Report?

    Each report is a professionally structured PDF, created by investigators — not bots. It may include:

    • Full name and aliases
    • Current and past addresses
    • Phone numbers and ownership verification
    • Email addresses and associated accounts
    • Criminal records (where legally accessible)
    • Social media traces and digital footprint
    • Known relatives, partners, or associates
    • Property and asset clues
    Missing Person Search

    Professional Intelligence. Confidential Delivery.

    At ForensicsS, our background reports are built by real analysts using licensed databases, OSINT methodology, and digital forensics tools — not scraped public data. You get a complete intelligence file, fast and secure, ready for personal or legal use.

    Reports are typically delivered within 24–72 hours. For urgent cases or deeper investigations, additional options are available at checkout.

    Disclaimer: All reports are intended for lawful use only. ForensicsS operates under full compliance with U.S. privacy and investigative law. This service is not FCRA-compliant and should not be used for employment, housing, or credit decisions.

    Forensicss Logo

    FORENICSS SERVICES AND RETAINER AGREEMENT

    Cybersecurity & Digital Forensics
    Master Services Agreement

    ForensicsS.com
    Effective upon electronic acceptance or payment submission
    This Master Services Agreement ("Agreement") is a legally binding contract entered into by and between ForensicsS.com, a California-based cybersecurity and digital forensics firm ("ForensicsS," "Company," "we," "us," or "our"), and the individual or entity requesting, purchasing, or receiving any Services ("Client," "you," or "your"). By clicking "I Agree," affixing an electronic signature, submitting payment in any form, or verbally authorizing engagement, you represent and warrant that you have read, fully understood, and unconditionally agree to be legally bound by every provision herein. This Agreement supersedes and extinguishes all prior negotiations, representations, warranties, commitments, and communications between the parties, whether oral or written, relating to its subject matter.
    RECITALS. ForensicsS is a specialized provider of cybersecurity consulting, digital forensic examinations, incident response, threat intelligence, vulnerability assessment, penetration testing, and open-source intelligence (OSINT) services. Client desires to retain ForensicsS to perform such professional services, and ForensicsS agrees to accept such engagement, strictly on the terms and conditions set forth in this Agreement.
    1 DEFINITIONS
    Key terms used throughout this Agreement

    For purposes of this Agreement, the following terms shall have the meanings ascribed below:

    (a) "Services" means all tasks, projects, assessments, analyses, examinations, reports, deliverables, consultations, and any related professional activities performed by ForensicsS pursuant to this Agreement or any Statement of Work.

    (b) "Deliverables" means all written, oral, electronic, or physical materials produced during the engagement, including without limitation forensic images, disk acquisitions, data extracts, malware analysis reports, vulnerability assessment reports, penetration testing reports, threat-intelligence briefings, incident response reports, court-ready affidavits, and expert-witness statements.

    (c) "Confidential Information" means any and all non-public data, records, trade secrets, personally identifiable information (PII), protected health information (PHI), financial records, proprietary techniques, methodologies, software, or business information disclosed by either party in any form or medium.

    (d) "Authorized Representative" means an individual duly empowered to act on behalf of a party and to bind such party to obligations under this Agreement.

    (e) "Retainer" means non-refundable advance funds paid by Client to secure the availability, allocation, and prioritization of ForensicsS personnel, laboratory resources, and proprietary tools.

    (f) "Business Day" means Monday through Friday, excluding U.S. federal holidays and any day on which commercial banks in Los Angeles, California are authorized or required to close.

    (g) "SOW" or "Statement of Work" means any written engagement letter, proposal, scope document, email confirmation, or purchase order that is accepted in writing by ForensicsS and incorporated by reference into this Agreement.

    (h) "Project Commencement" occurs upon the later of: (i) ForensicsS' written confirmation of receipt of a fully executed copy of this Agreement or verifiable electronic assent; and (ii) receipt of the required Retainer or other agreed payment in cleared funds.

    (i) "Digital Evidence" means any electronically stored information (ESI) including data from hard drives, solid-state drives, mobile devices, cloud environments, servers, network appliances, IoT devices, removable media, volatile memory, and any other digital storage medium.

    2 SCOPE OF SERVICES
    What ForensicsS is authorized to perform under this Agreement

    ForensicsS shall perform only those Services expressly described in a duly executed SOW. Unless otherwise agreed in writing, Services may include without limitation:

    (a) Digital Forensic Examination — acquisition, preservation, authentication, and forensic examination of Digital Evidence from computers, mobile devices, servers, removable media, cloud storage, SaaS platforms, email systems, social media accounts, and IoT devices using industry-accepted forensic tools and methodologies;

    (b) Incident Response — emergency triage, containment, eradication, recovery, and post-incident analysis of cybersecurity breaches, ransomware attacks, business email compromise (BEC), unauthorized access, and data exfiltration events;

    (c) Malware Analysis — static and dynamic reverse-engineering of malicious code, rootkits, exploits, command-and-control infrastructure, and persistence mechanisms;

    (d) Vulnerability Assessment & Penetration Testing — authorized security testing of network infrastructure, web applications, APIs, wireless environments, physical facilities, and human-layer attack vectors including social-engineering simulations;

    (e) Threat Intelligence & OSINT — open-source intelligence collection, dark-web monitoring, threat-actor profiling, attack-surface enumeration, and strategic threat landscape briefings;

    (f) Attribution & Cyber Investigation — technical attribution of cyberstalking, online harassment, fraud schemes, intellectual property theft, insider threats, and unauthorized surveillance;

    (g) Expert Witness & Litigation Support — expert-witness testimony, forensic affidavit preparation, deposition support, trial consultation, and assistance with electronic discovery (eDiscovery) processes;

    (h) Security Advisory — strategic consulting in risk management, regulatory compliance, security architecture review, digital-evidence readiness, and cybersecurity policy development.

    Any task, deliverable, or activity not specifically itemized in the SOW is deemed outside scope. Out-of-scope requests shall require a mutually executed written change order before ForensicsS is obligated to perform.

    3 PROJECT INITIATION & PERSONNEL
    How engagements begin and who performs the work

    Upon Project Commencement, ForensicsS will assign appropriately qualified personnel, allocate dedicated laboratory resources, and establish a project timeline with defined milestones. Client shall designate a single primary point of contact ("Client Contact") authorized to provide instructions, approvals, access credentials, and supplemental information on behalf of Client. All communications from Client Contact shall be deemed authorized and binding upon Client.

    ForensicsS may, in its sole professional discretion, subcontract specialized ancillary tasks (including but not limited to chip-off extraction, JTAG acquisition, language translation, or specialized decryption services) to pre-vetted third-party contractors, provided such subcontractors execute confidentiality and data-protection agreements no less restrictive than those contained herein.

    4 CLIENT OBLIGATIONS & REPRESENTATIONS
    What the Client must provide and comply with

    Client shall:

    (a) furnish complete, accurate, and timely information, including without limitation device passcodes, encryption keys, recovery phrases, access credentials, network diagrams, system logs, and all relevant documentation;

    (b) ensure that any physical items shipped to ForensicsS are properly labeled with case reference numbers, securely packaged to prevent damage or tampering, and fully insured for replacement value during transit;

    (c) maintain independent backups of all critical data prior to submitting devices or granting system access, as forensic processes may alter or consume original media;

    (d) promptly review interim findings, respond to ForensicsS inquiries within two (2) Business Days, and provide all requested approvals without unreasonable delay;

    (e) refrain from directing, requesting, or encouraging ForensicsS to perform any activity that is unlawful, unethical, violates any applicable regulation, or exceeds the scope of any applicable professional license or authorization;

    (f) not independently alter, modify, access, or attempt to recover data from any device or system that is the subject of a forensic engagement, as such actions may compromise evidentiary integrity and render findings inadmissible.

    CLIENT ACKNOWLEDGES AND AGREES THAT FAILURE TO FULFILL ANY OBLIGATION UNDER THIS SECTION MAY RESULT IN DELAYS, INCREASED COSTS, COMPROMISED FORENSIC RESULTS, OR DESTRUCTION OF EVIDENCE. FORENSICSS SHALL BEAR NO LIABILITY FOR ANY ADVERSE CONSEQUENCE ARISING FROM CLIENT'S NON-COMPLIANCE.
    5 ACCESS, AUTHORIZATION & LEGAL COMPLIANCE
    Client's warranty of lawful access to data and systems

    Client unconditionally represents and warrants that it possesses the legal right, authority, ownership interest, and where applicable, third-party consent, court order, or judicial warrant to provide ForensicsS with access to all data, systems, devices, accounts, premises, and digital artifacts necessary for the performance of Services. Client shall obtain, maintain, document, and upon request produce evidence of any required authorizations.

    ForensicsS shall be entitled to rely upon the validity, authenticity, and legal sufficiency of all authorizations provided by Client without independent verification. Client shall indemnify and hold ForensicsS harmless from any claim, liability, penalty, or expense arising from Client's failure to secure proper authorization. If any requested access is denied, revoked, or legally challenged, ForensicsS' obligations shall be immediately suspended without liability or obligation to refund any fees or Retainer.

    6 REGULATORY COMPLIANCE
    Applicable laws and Client's compliance responsibilities

    Both parties shall comply with all applicable federal, state, local, and international laws, regulations, and professional-licensing standards, including without limitation the Computer Fraud and Abuse Act (CFAA), Electronic Communications Privacy Act (ECPA), Stored Communications Act (SCA), General Data Protection Regulation (GDPR) where applicable, California Consumer Privacy Act (CCPA), Health Insurance Portability and Accountability Act (HIPAA) where applicable, export-control laws (EAR/ITAR), and all applicable data-protection and consumer-privacy statutes.

    Client is solely and exclusively responsible for determining whether the Services requested, methodologies employed, or Deliverables provided satisfy Client's own regulatory, legal, and compliance obligations. ForensicsS does not provide legal advice and nothing in this Agreement or any Deliverable shall be construed as such.

    7 FEES, RETAINERS & EXPENSES
    Pricing structure, retainer requirements, and reimbursable costs

    Unless otherwise specified in an executed SOW, Services shall be billed at the following standard hourly rates:

    Personnel ClassificationHourly Rate (USD)
    Senior Forensic Expert / Principal Consultant$225.00
    Lead Digital Forensics Examiner$185.00
    Digital Forensics Examiner$155.00
    Cybersecurity Analyst / Incident Responder$135.00
    OSINT Analyst / Research Specialist$110.00
    Expert Witness Testimony (courtroom / deposition)$350.00
    Retainer Policy: A non-refundable Retainer of no less than USD $2,000.00 is required before Project Commencement for all new engagements, unless otherwise agreed in writing. The Retainer is earned upon receipt and applied against future billings. ForensicsS may require additional progress retainers or milestone prepayments for large-scale, multi-phase, or expedited engagements.

    Out-of-pocket expenses, including without limitation secure shipping, specialized laboratory consumables, proprietary database and tool-license fees, travel, lodging, and per diem (at prevailing U.S. GSA rates), shall be billed at actual cost plus a ten percent (10%) administrative handling fee. All fees are exclusive of applicable sales taxes, use taxes, duties, or governmental charges, which shall be borne solely by Client.

    8 BILLING, PAYMENT & COLLECTIONS
    Invoice terms, late fees, and ForensicsS' collection rights

    ForensicsS will issue detailed, itemized invoices reflecting personnel hours, task descriptions, expense itemization, and applicable taxes. Invoices are due and payable in full within ten (10) calendar days from the invoice date unless otherwise agreed in writing.

    Unpaid balances past due shall accrue interest at the rate of one and one-half percent (1.5%) per month (18% per annum) or the maximum rate permitted by applicable law, whichever is lower, compounded monthly from the date due until paid in full.

    ForensicsS reserves the unconditional right to: (i) immediately suspend all work in progress; (ii) withhold, retain, or delay delivery of any and all Deliverables, reports, forensic images, and work product; and (iii) exercise a lien on all Client-provided materials and devices in ForensicsS' possession until all outstanding balances, interest, and collection costs are paid in full. Client shall be responsible for all costs of collection, including reasonable attorneys' fees, court costs, collection agency fees, and all related expenses.

    9 CHANGE MANAGEMENT
    How scope changes are requested, documented, and approved

    Any modification, addition, or reduction to the agreed scope, schedule, deliverables, or personnel must be documented in a written change order executed by Authorized Representatives of both parties. Change orders shall specify the nature of the change, additional or reduced fees, revised resource allocations, and adjusted timelines. Absent a duly executed change order, ForensicsS is under no obligation to perform out-of-scope tasks and may decline informal requests without constituting breach of this Agreement.

    10 TIMELINES & NO COMPLETION GUARANTEE
    Forensic work is unpredictable — no deadline is guaranteed

    While ForensicsS will exercise commercially reasonable efforts to meet agreed milestones, Client acknowledges that digital forensic examinations and cybersecurity engagements are inherently complex and unpredictable. Factors including but not limited to physical device damage, proprietary or military-grade encryption, anti-forensic techniques, data volume, multi-jurisdictional legal processes, third-party non-cooperation, law enforcement holds, or force majeure events may extend timelines significantly beyond initial estimates.

    FORENSICSS MAKES NO WARRANTY, EXPRESS OR IMPLIED, THAT SERVICES WILL BE COMPLETED BY ANY SPECIFIC DATE OR WITHIN ANY ESTIMATED TIMEFRAME. TIMELINE EXTENSIONS SHALL NOT CONSTITUTE BREACH, DEFAULT, OR GROUNDS FOR REFUND PROVIDED THAT FORENSICSS CONTINUES TO EXERCISE REASONABLE PROFESSIONAL DILIGENCE.
    11 DELIVERABLES & WORK PRODUCT
    Formats, transmission methods, and archival retention

    Deliverables shall be provided in industry-standard formats including without limitation PDF, EnCase (E01/Ex01), AFF4, raw (dd), CSV, XLSX, and such other formats as specified in the SOW. Unless explicitly requested otherwise, Deliverables will be transmitted via ForensicsS' encrypted file-transfer platform requiring two-factor authentication. Forensic images may be returned on hardware-encrypted drives (FIPS 140-2 validated) at Client's expense.

    ForensicsS shall retain a secure archival copy of critical case materials, forensic images, and final reports for a minimum of one (1) year from project completion. Thereafter, such materials may be securely purged and destroyed in accordance with NIST SP 800-88 guidelines unless Client requests extended preservation in writing and pays applicable storage fees. Client is solely responsible for maintaining its own copies of all Deliverables after transmission.

    12 NON-DISCLOSURE AGREEMENT (NDA)
    Binding mutual obligation to protect all confidential and privileged information

    This Section constitutes a binding Non-Disclosure Agreement between the parties. Each party (the "Receiving Party") irrevocably agrees to:

    (a) hold in the strictest confidence all Confidential Information received from the other party (the "Disclosing Party"), including but not limited to case details, investigation findings, forensic methodologies, client identities, business strategies, financial information, technical data, security vulnerabilities, and any information marked or reasonably understood to be confidential;

    (b) use Confidential Information solely and exclusively for the purpose of fulfilling obligations under this Agreement and for no other purpose whatsoever;

    (c) restrict access to Confidential Information exclusively to employees, agents, attorneys, or subcontractors who have a bona fide need to know, who have been informed of the confidential nature of such information, and who are bound by written confidentiality obligations at least as restrictive as those contained herein;

    (d) implement and maintain reasonable physical, technical, and administrative safeguards to protect Confidential Information from unauthorized access, disclosure, copying, use, or modification;

    (e) not disclose, publish, disseminate, or communicate any Confidential Information to any third party, media outlet, online platform, social media account, public forum, or any person not expressly authorized under this Agreement;

    (f) promptly notify the Disclosing Party in writing upon discovery of any unauthorized access, disclosure, or breach of Confidential Information;

    (g) upon termination of this Agreement or upon written request, return or certify the destruction of all Confidential Information in the Receiving Party's possession, custody, or control, including all copies, summaries, and derivatives thereof, except as required for legal compliance or archival retention.

    THE OBLIGATIONS UNDER THIS NON-DISCLOSURE AGREEMENT SHALL SURVIVE FOR SEVEN (7) YEARS FOLLOWING TERMINATION OR EXPIRATION OF THIS AGREEMENT, OR INDEFINITELY FOR TRADE SECRETS TO THE EXTENT PROTECTED UNDER APPLICABLE LAW. BREACH OF THIS SECTION SHALL CONSTITUTE A MATERIAL BREACH ENTITLING THE DISCLOSING PARTY TO SEEK INJUNCTIVE RELIEF, SPECIFIC PERFORMANCE, AND ALL AVAILABLE DAMAGES WITHOUT THE REQUIREMENT OF POSTING BOND.

    Exclusions. Confidentiality obligations shall not apply to information that: (i) is or becomes publicly available through no fault or breach by the Receiving Party; (ii) was known to the Receiving Party prior to disclosure, as evidenced by written records; (iii) is independently developed by the Receiving Party without reference to or use of the Disclosing Party's Confidential Information; (iv) is rightfully received from a third party without restriction on disclosure; or (v) is required to be disclosed by applicable law, regulation, subpoena, court order, or governmental directive, provided the Receiving Party gives the Disclosing Party prompt written notice (to the extent legally permissible) and reasonable opportunity to seek a protective order or other appropriate remedy prior to disclosure.

    13 DATA SECURITY & LABORATORY INFRASTRUCTURE
    How ForensicsS protects Client data and forensic environments

    ForensicsS maintains enterprise-grade, ISO 27001-aligned security controls including without limitation:

    (a) air-gapped and segmented forensic examination networks physically isolated from production and internet-connected systems;

    (b) hardware full-disk encryption on all workstations and storage media at FIPS 140-2 Level 2 or higher;

    (c) multi-factor authentication (MFA) enforced on all systems, applications, and remote access points;

    (d) continuous vulnerability scanning, intrusion detection, and security event monitoring;

    (e) physical media stored in UL-rated, access-controlled safes with 24/7 CCTV surveillance and access logging;

    (f) prohibition of unauthorized remote access to forensic laboratory resources;

    (g) all employees, contractors, and subcontractors undergo thorough vetting and execute binding confidentiality, acceptable use, and professional conduct agreements prior to engagement;

    (h) Client-provided credentials stored exclusively in FIPS 140-2 validated encrypted password vaults and securely destroyed upon project closure using cryptographic erasure methods.

    14 EVIDENCE HANDLING & CHAIN OF CUSTODY
    Forensic integrity standards from intake through courtroom presentation

    ForensicsS adheres to forensic best practices consistent with NIST SP 800-86, SWGDE guidelines, and ISO/IEC 27037 standards. For every evidentiary item received, ForensicsS shall:

    (a) assign a unique alphanumeric case and evidence identification number;

    (b) photograph and document the physical condition of the item upon intake;

    (c) record and verify cryptographic hash values (SHA-256 minimum) before and after imaging to confirm bitstream integrity;

    (d) perform all forensic imaging using hardware or software write-blockers and forensically validated acquisition tools;

    (e) maintain a continuous, unbroken chain-of-custody log documenting every transfer, access event, and storage location;

    (f) provide chain-of-custody documentation with final Deliverables to support admissibility in judicial, regulatory, arbitral, or administrative proceedings.

    15 DATA LOSS & DEVICE RISK DISCLOSURE
    Inherent risks to Client devices and data during forensic examination

    Client acknowledges and accepts that the forensic examination process carries inherent risks to Client-provided devices, media, and data. While ForensicsS employs industry best practices to preserve the integrity of all submitted items, the following risks exist and are expressly disclosed:

    (a) physical devices may experience hardware failure, component degradation, or mechanical breakdown during or after forensic acquisition, particularly devices that are aged, damaged, water-exposed, or in compromised physical condition;

    (b) data stored on failing or degraded storage media may become permanently unrecoverable during the imaging or extraction process;

    (c) encrypted volumes, locked devices, or software-protected systems may require advanced techniques that carry a risk of data alteration, device lockout, or permanent inaccessibility;

    (d) volatile memory (RAM) data is inherently transient and may be lost when devices are powered down, rebooted, or transported;

    (e) cloud-based data may be altered, deleted, or become inaccessible by the account provider, third parties, or automated systems during the course of an investigation;

    (f) shipping, handling, and transit of physical devices carries risk of loss, theft, or damage despite reasonable protective measures.

    CLIENT EXPRESSLY ACKNOWLEDGES THESE RISKS AND AGREES THAT FORENSICSS SHALL NOT BE LIABLE FOR ANY DATA LOSS, DEVICE DAMAGE, HARDWARE FAILURE, OR DATA INACCESSIBILITY THAT OCCURS DURING OR AS A RESULT OF THE FORENSIC EXAMINATION PROCESS, PROVIDED FORENSICSS HAS EXERCISED COMMERCIALLY REASONABLE CARE. CLIENT IS SOLELY RESPONSIBLE FOR MAINTAINING INDEPENDENT BACKUPS OF ALL DATA AND ASSUMES ALL RISK OF LOSS FOR DEVICES AND MEDIA SUBMITTED TO FORENSICSS.
    16 DATA LIMITATIONS & VERIFICATION
    No guarantee of accuracy, completeness, or recoverability

    Digital Evidence may be incomplete, corrupted, encrypted, overwritten, or subject to anti-forensic techniques. Automated analysis tools may produce false positives or fail to detect certain artifacts. Metadata may be unreliable, timestamps may be manipulated, and data may have been intentionally destroyed prior to acquisition. ForensicsS exercises commercially reasonable professional efforts to validate all findings using multiple verification methods, but does not and cannot guarantee absolute accuracy, completeness, or recoverability of any data.

    Client must independently verify any critical findings (including through certified copies, corroborating evidence, or independent expert review) before relying upon any Deliverable for legal, business, employment, or personal decisions.

    17 INTELLECTUAL PROPERTY
    Ownership of tools, methods, and licensing of Deliverables

    All methodologies, analytical frameworks, proprietary software, scripts, tools, custom dashboards, detection signatures, report templates, and processes developed, owned, or utilized by ForensicsS are and shall remain the sole and exclusive intellectual property of ForensicsS. No license, right, title, or interest in ForensicsS' intellectual property is granted to Client except as expressly stated herein.

    ForensicsS grants Client a non-exclusive, non-transferable, non-sublicensable, perpetual license to use the Deliverables solely for Client's internal purposes including risk assessment, litigation, regulatory compliance, and internal investigations. Client shall not sell, resell, license, redistribute, publish, or publicly disclose any Deliverable, in whole or in part, redacted or unredacted, without the prior written consent of ForensicsS.

    18 NO OUTCOME GUARANTEE & ACCEPTANCE OF FINDINGS
    ForensicsS reports objective findings — results cannot be altered to meet Client expectations
    CLIENT EXPRESSLY UNDERSTANDS, ACKNOWLEDGES, AND IRREVOCABLY ACCEPTS THE FOLLOWING:

    (a) Digital forensic examinations and cybersecurity assessments may yield zero findings, negative findings, inconclusive findings, or findings that are contrary to Client's expectations, assumptions, or desired outcome. A determination that a device, system, or network shows no evidence of compromise, intrusion, unauthorized access, or malicious activity is itself a legitimate and complete forensic result.

    (b) ForensicsS is professionally and ethically obligated to report findings objectively, truthfully, and impartially, based solely on the evidence recovered and the analysis performed. Under no circumstances shall ForensicsS fabricate, exaggerate, minimize, omit, alter, or misrepresent forensic findings to accommodate Client's expectations, preferences, theories, or desired conclusions.

    (c) Client shall not request, pressure, direct, or incentivize ForensicsS to reach a predetermined conclusion, produce a specific finding, or tailor results to support a particular narrative. Any such request shall constitute a material breach of this Agreement by Client and grounds for immediate termination without refund.

    (d) The absence of evidence of compromise does not necessarily mean that no compromise occurred — it means that no forensic artifacts supporting such a conclusion were recoverable at the time of examination given the tools, techniques, and data available. ForensicsS shall clearly explain the scope and limitations of findings in all Deliverables.

    (e) Client's dissatisfaction with legitimate forensic findings shall not constitute grounds for refund, chargeback, dispute, complaint, or claim of deficient service. Payment is rendered for professional time, expertise, laboratory resources, and analytical effort — not for any promised result, outcome, verdict, confirmation, or recovery.

    BY EXECUTING THIS AGREEMENT, CLIENT UNCONDITIONALLY ACCEPTS THAT FORENSICSS' OBLIGATION IS TO CONDUCT A THOROUGH, PROFESSIONAL, AND OBJECTIVE EXAMINATION — NOT TO DELIVER A SPECIFIC FINDING. ALL FEES ARE EARNED UPON PERFORMANCE OF SERVICES REGARDLESS OF WHETHER THE RESULTS ALIGN WITH CLIENT'S EXPECTATIONS.
    19 NO CHARGEBACK & PAYMENT DISPUTE COVENANT
    Irrevocable waiver of payment reversal rights after engagement begins

    Client irrevocably and unconditionally waives all rights to reverse, dispute, initiate chargeback proceedings, or seek payment reversal through any bank, credit card issuer, payment processor, digital wallet provider, or financial intermediary after Project Commencement. Client acknowledges that ForensicsS incurs significant non-recoverable costs upon mobilization including personnel allocation, laboratory reservation, license activation, and opportunity cost.

    Should Client initiate any unauthorized chargeback or payment dispute, ForensicsS shall be entitled to: (i) submit comprehensive evidence of services rendered to the payment processor; (ii) immediately suspend all work and withhold all Deliverables; (iii) recover the full disputed amount plus all reversal fees, bank charges, collection agency fees, reasonable attorneys' fees, and administrative costs; and (iv) report the debt to applicable credit reporting agencies to the extent permitted by law.

    20 ABSOLUTE NON-REFUND POLICY
    All fees are final and non-refundable once Services commence
    ALL FEES, RETAINERS, AND PAYMENTS MADE TO FORENSICSS ARE STRICTLY NON-REFUNDABLE. THIS POLICY IS ABSOLUTE AND WITHOUT EXCEPTION.

    Client acknowledges and agrees to the following:

    (a) The Retainer is non-refundable and deemed fully earned upon receipt, representing ForensicsS' commitment to allocate personnel, reserve laboratory resources, activate proprietary tool licenses, and prioritize Client's engagement over other prospective work.

    (b) All fees for Services rendered are final upon performance. No refund, credit, offset, or reduction shall be issued for any reason, including without limitation: Client dissatisfaction with findings; results that do not support Client's theory or expectations; project cancellation or abandonment by Client; Client's decision not to use or rely upon Deliverables; or any change in Client's circumstances, legal strategy, or priorities.

    (c) For post-commencement cancellations or early termination by Client, Client shall pay in full for: (i) all Services rendered through the date of cancellation at applicable hourly rates; (ii) all expenses incurred or committed; (iii) any non-cancelable third-party costs; and (iv) a cancellation fee equal to fifteen percent (15%) of the estimated remaining project value as liquidated damages representing ForensicsS' loss of scheduling opportunity and resource allocation.

    (d) No refund shall be issued for any completed or partially completed phase of work, regardless of whether Deliverables for that phase have been formally transmitted to Client.

    CLIENT EXPRESSLY WAIVES ANY RIGHT TO SEEK A REFUND, CREDIT, OR REDUCTION OF FEES UNDER ANY THEORY INCLUDING BUT NOT LIMITED TO BREACH OF CONTRACT, UNJUST ENRICHMENT, FAILURE OF CONSIDERATION, OR CONSUMER PROTECTION STATUTES, TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW.
    21 TERMINATION & SUSPENSION
    How and when either party may end or pause the engagement

    Either party may terminate this Agreement for convenience upon ten (10) Business Days' prior written notice. Either party may terminate immediately upon written notice if the other party commits a material breach that remains uncured for ten (10) Business Days after receipt of written notice specifying the breach.

    Upon termination for any reason: (a) Client shall immediately pay for all Services rendered, expenses incurred, and non-cancelable commitments through the effective date of termination; (b) ForensicsS shall deliver completed Deliverables upon receipt of all outstanding payments; (c) each party shall return or certify destruction of the other party's Confidential Information within thirty (30) days, subject to legal hold obligations and archival retention requirements.

    ForensicsS may immediately suspend Services without liability if: (i) Client's account is past due by more than five (5) calendar days; (ii) Client requests or directs actions that violate applicable law, regulation, or professional ethics; (iii) continuing the engagement creates or reveals a conflict of interest; or (iv) ForensicsS reasonably determines that Client-provided authorizations are invalid, revoked, or legally insufficient.

    22 INDEMNIFICATION
    Protection against third-party claims arising from the engagement

    Client Indemnification. Client shall indemnify, defend, and hold harmless ForensicsS, its officers, directors, employees, agents, contractors, and affiliates (collectively, "ForensicsS Indemnified Parties") from and against any and all third-party claims, demands, actions, damages, losses, liabilities, judgments, settlements, penalties, fines, costs, and expenses (including reasonable attorneys' fees and expert-witness fees) arising out of or relating to: (a) Client's breach of any representation, warranty, or obligation under this Agreement; (b) Client's failure to obtain proper authorization or consent; (c) Client's misuse of Deliverables; (d) Client's violation of any applicable law or regulation; or (e) any claim by a third party arising from Client's instructions to ForensicsS.

    Mutual Indemnification. Each party shall indemnify the other against third-party claims arising from the Indemnifying Party's gross negligence, willful misconduct, or material breach of the confidentiality provisions of this Agreement. Indemnification is conditioned upon: (i) prompt written notice of the claim; (ii) sole control of the defense and settlement by the Indemnifying Party; and (iii) reasonable cooperation by the Indemnified Party at the Indemnifying Party's expense.

    23 LIMITATION OF LIABILITY
    Cap on ForensicsS' maximum financial exposure
    EXCEPT FOR CLAIMS ARISING FROM BREACH OF CONFIDENTIALITY, INDEMNIFICATION OBLIGATIONS, GROSS NEGLIGENCE, OR WILLFUL MISCONDUCT, FORENSICSS' TOTAL AGGREGATE LIABILITY UNDER THIS AGREEMENT SHALL NOT EXCEED THE LESSER OF: (A) THE TOTAL FEES ACTUALLY PAID BY CLIENT TO FORENSICSS IN THE TWELVE (12) MONTHS IMMEDIATELY PRECEDING THE EVENT GIVING RISE TO THE CLAIM; OR (B) THE FEES PAID UNDER THE SPECIFIC SOW FROM WHICH THE CLAIM ARISES.

    IN NO EVENT SHALL EITHER PARTY BE LIABLE FOR ANY INDIRECT, SPECIAL, PUNITIVE, EXEMPLARY, INCIDENTAL, OR CONSEQUENTIAL DAMAGES, INCLUDING WITHOUT LIMITATION LOSS OF PROFITS, LOSS OF REVENUE, LOSS OF DATA, LOSS OF BUSINESS OPPORTUNITY, BUSINESS INTERRUPTION, REPUTATIONAL HARM, OR COST OF SUBSTITUTE SERVICES, REGARDLESS OF THE THEORY OF LIABILITY (CONTRACT, TORT, STRICT LIABILITY, OR OTHERWISE) AND EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
    24 DISCLAIMER OF WARRANTIES
    Services are provided "as is" with no implied guarantees

    EXCEPT AS EXPRESSLY SET FORTH IN THIS AGREEMENT, FORENSICSS PROVIDES ALL SERVICES AND DELIVERABLES "AS IS" AND "AS AVAILABLE." FORENSICSS EXPRESSLY DISCLAIMS ALL WARRANTIES, WHETHER EXPRESS, IMPLIED, STATUTORY, OR OTHERWISE, INCLUDING WITHOUT LIMITATION ANY IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, TITLE, NON-INFRINGEMENT, ACCURACY, RELIABILITY, OR COMPLETENESS. NO ADVICE OR INFORMATION, WHETHER ORAL OR WRITTEN, OBTAINED FROM FORENSICSS SHALL CREATE ANY WARRANTY NOT EXPRESSLY STATED IN THIS AGREEMENT.

    25 FORCE MAJEURE
    Events beyond either party's control that excuse performance

    Neither party shall be liable for failure or delay in performance caused by events beyond its reasonable control, including without limitation natural disasters, acts of God, acts of terrorism or war, cyberattacks against ForensicsS' infrastructure, epidemic, pandemic, governmental orders or sanctions, supply-chain disruptions, utility or telecommunications failures, labor disputes, or embargoes. The affected party shall provide prompt written notice and use commercially reasonable efforts to mitigate the impact and resume performance as soon as practicable. If a force majeure event continues for more than sixty (60) consecutive days, either party may terminate this Agreement without further liability upon written notice.

    26 GOVERNING LAW & EXCLUSIVE JURISDICTION
    California law governs — disputes resolved in Los Angeles County

    This Agreement shall be governed by, construed, and enforced in accordance with the laws of the State of California, United States of America, without regard to its conflict-of-laws principles. The parties irrevocably and unconditionally submit to the exclusive personal jurisdiction and venue of the state and federal courts located in Los Angeles County, California for any action, suit, or proceeding arising out of or relating to this Agreement. Each party hereby waives any objection to jurisdiction, venue, or forum non conveniens with respect to any such court.

    27 DISPUTE RESOLUTION
    Mandatory mediation before litigation may be initiated

    Mandatory Mediation. Prior to initiating any litigation or arbitration, the parties shall first attempt in good faith to resolve any dispute through confidential mediation administered by a mutually agreed mediator in Los Angeles County, California. Either party may initiate mediation by written demand. Mediation fees and expenses shall be shared equally. Mediation shall be completed within forty-five (45) days of the demand unless extended by mutual agreement.

    Litigation. If mediation fails to resolve the dispute, either party may proceed to litigation in the courts specified in Section 26. Nothing in this Section shall prevent either party from seeking emergency injunctive or equitable relief to protect Confidential Information, intellectual property, or to prevent irreparable harm, without first engaging in mediation.

    28 ATTORNEY'S FEES & COSTS
    Prevailing party recovers all legal costs from the other

    In any action, proceeding, mediation, arbitration, or dispute to enforce, interpret, or seek remedies under this Agreement, the substantially prevailing party shall be entitled to recover its reasonable attorney's fees, expert-witness fees, court costs, mediator fees, and all other litigation-related expenses from the non-prevailing party, in addition to any other relief to which it may be entitled.

    29 ASSIGNMENT & TRANSFER
    Restrictions on transferring rights under this Agreement

    Client may not assign, delegate, transfer, or encumber any rights, obligations, or interests under this Agreement, whether voluntarily, involuntarily, by operation of law, merger, acquisition, or otherwise, without ForensicsS' prior written consent, which may be withheld in ForensicsS' sole discretion. ForensicsS may freely assign this Agreement to any affiliate, successor, or acquirer of all or substantially all of its business or assets. Any purported assignment in violation of this Section shall be null, void, and of no legal effect.

    30 NOTICES
    How formal communications between the parties must be delivered

    All notices, demands, requests, or communications required or permitted under this Agreement shall be in writing and deemed effective: (i) upon personal delivery; (ii) three (3) Business Days after deposit in the United States mail, certified, return receipt requested, postage prepaid; (iii) one (1) Business Day after dispatch by a nationally recognized overnight courier service with tracking confirmation; or (iv) upon confirmed electronic transmission (email with read receipt or delivery confirmation) to the addresses designated by the parties in the SOW or as subsequently updated in writing.

    31 NON-SOLICITATION
    Neither party may recruit the other's personnel for 12 months

    During the term of this Agreement and for a period of twelve (12) months following its termination or expiration, neither party shall directly or indirectly solicit, recruit, hire, or attempt to hire any employee, contractor, or consultant of the other party who was involved in the performance of Services, without the prior written consent of the other party. This restriction shall not apply to general, non-targeted recruitment advertising.

    32 SEVERABILITY
    Invalid provisions are modified or removed without affecting the rest

    If any provision of this Agreement is adjudged invalid, illegal, or unenforceable by a court of competent jurisdiction, such provision shall be modified to the minimum extent necessary to make it valid and enforceable while preserving the parties' original intent, or if modification is not possible, severed from this Agreement. The remaining provisions shall continue in full force and effect, unimpaired by such determination.

    33 WAIVER
    Not enforcing a right once does not mean giving it up

    No failure or delay by either party in exercising any right, power, or remedy under this Agreement shall operate as a waiver thereof. No single or partial exercise of any right shall preclude any other or further exercise of that right or of any other right. No waiver of any breach shall be deemed a waiver of any prior, concurrent, or subsequent breach. Any waiver must be in writing and signed by the waiving party's Authorized Representative to be effective.

    34 SURVIVAL
    Clauses that remain enforceable after the Agreement ends

    The following provisions shall survive the termination or expiration of this Agreement and remain in full force and effect: payment obligations, non-disclosure, confidentiality, intellectual property, limitation of liability, disclaimer of warranties, indemnification, no outcome guarantee, non-refund policy, non-solicitation, dispute resolution, attorney's fees, and any other provisions that by their nature or express terms are intended to survive.

    35 ENTIRE AGREEMENT & AMENDMENT
    This document is the complete agreement — changes require written signatures

    This Agreement, together with all executed SOWs, exhibits, schedules, and attachments incorporated by reference, constitutes the entire and exclusive agreement between the parties with respect to its subject matter, and supersedes all prior and contemporaneous proposals, negotiations, representations, understandings, and agreements, whether oral or written. No amendment, modification, supplement, or waiver of this Agreement shall be binding unless executed in a writing signed by Authorized Representatives of both parties.

    36 ELECTRONIC SIGNATURE & COUNTERPARTS
    Electronic acceptance is legally binding under federal and state law

    The parties expressly agree that electronic signatures, digital certificates, click-wrap acceptance, and authenticated electronic assent are valid, binding, and enforceable to the fullest extent permitted by the Electronic Signatures in Global and National Commerce Act (E-SIGN), the Uniform Electronic Transactions Act (UETA), and all applicable state and federal laws. This Agreement may be executed in counterparts, each of which shall be deemed an original, and all of which together shall constitute one and the same instrument.

    37 CLIENT ACKNOWLEDGMENT
    Client confirms understanding and voluntary execution of this Agreement
    Client acknowledges and represents that: (a) Client has had a full and fair opportunity to read this Agreement in its entirety; (b) Client has been advised to consult with independent legal counsel prior to execution and has either done so or voluntarily elected not to do so; (c) Client fully understands the rights, obligations, risks, and consequences set forth herein; (d) Client is executing this Agreement voluntarily, without duress or undue influence; and (e) the person executing this Agreement on Client's behalf has full legal authority to bind Client.
    38 PRIVACY POLICY
    Incorporation of ForensicsS' data collection and privacy practices

    By reviewing our Privacy Policy, you acknowledge and agree to its terms and conditions. Our Privacy Policy describes how we collect, use, store, and protect your personal information and is incorporated into this Agreement by reference.

    IN WITNESS WHEREOF, the parties hereto have caused this Agreement to be executed by their duly authorized representatives as of the Effective Date indicated in the electronic signature block below.

    Forensics – Trusted Experts in Surveillance, Cyber Security, Background Checks, and Digital Forensics across California.

    • 310-270-0598
    • info@forensicss.com
    • 11400 West Olympic Blvd, Los Angeles, CA 90064

    Explore

    • News
    • About
    • Our Services
    • Find A Person
    • Child Custody
    • Contact Us
    • Los Angeles
    • Orange County
    • San Diego

    Services

    • Cyber Security
    • Online Blackmail
    • Cell Phone Forensics
    • Domestic Investigation
    • Social Media Investigator
    • Crypto Scam Investigation

    Newsletter

    Sign up email to get our daily latest news & updates from us

    © Copyright 2021 by KRIGO