The application of computer technology for the purpose of examining potential evidence, including, but not limited to: theft of trade secrets; theft of, or destruction of property; and fraud. Specialists can recover data that has been deleted, encrypted, or damaged.