DataCAT by Ruby Datum
Secure the data, realise the assets.
Our rapid-response Data Control, Analysis and Transfer service helps insolvency practitioners (IPs) secure the assets of businesses and individuals that are entering an insolvency precess.
HOW IT WORKS
Our rapid-response Data Control, Analysis and Transfer service helps insolvency practitioners (IPs) secure the assets of businesses and individuals that are entering an insolvency process.
We also mitigate the risk of commercially valuable data being lost, stolen, corrupted or deleted.
Due to our unique partnership with industry leaders, we are able to provide guidance and ensure compliance under the Data Protection Act and regulatory bodies, such as the Solicitors Regulation Authority.
We are able to be on-site quickly during what is a time-sensitive period. Our experienced team of Solicitors and technical consultants give us the legal, regulatory and technical knowledge to work with IPs at each stage of the insolvency process. Where recovery prospects are uncertain, we reflect this in our fee structure.
1
Control
The DataCAT team can take control of existing IT systems, with or without the cooperation of existing personnel and lock it down to prevent any tampering or rogue data transfers.
2
Analysis
The DataCAT team has the ability to assess the extent, format(s) and location(s) of data and detail the hardware it is stored on.

We can analyse if and where data is missing from storage devices, who deleted it and when. Then, we can recover it.
3
Transfer
The DataCAT team can sort data, exporting it in a meaningful structure using our knowledgeable staff or eDiscovery partner to our dedicated Virtual Data Room platform in our highly secure cloud network, inside an ISO 270001 certified data centre within an Ex-MoD bunker, underground.

Documents will be organised into a structure and using our unrivalled character recognition and search engine system, are easy to find.

Once the data is secured and off-site, we can provide full data destruction on any on-site devices, using ISO 27001 and ISO 27040 accredited software.
Ready to take the next step in data security?
CONTACT US