Court-ordered discovery
Federal Court and Supreme Court discovery — preservation, collection, processing and production.
- FCA
- Supreme
- Bates

Electronic discovery, internal investigations and regulatory response for Australian businesses. Forensically sound collection across Microsoft 365, Google Workspace and on-premises systems — processed and produced to the EDRM.
We work to the proportionality the matter requires — preserving everything in scope, processing only what's necessary, and producing only what's relevant.
Microsoft 365, Exchange, Google Workspace, Slack and Teams — targeted custodian collection or full-tenant preservation.
OneDrive, SharePoint, Google Drive, Box and Dropbox with metadata preserved and audit trail intact.
File servers, mailboxes, laptops and mobile devices imaged forensically with chain-of-custody.
Deduplication, deNISTing, keyword and date culling — typically reducing review volume by 60–90%.
Reviewer-ready datasets in standard load formats. Bates numbering, redaction support and privilege logs.
Defensibility reports, custodian interviews and chain-of-custody documentation suitable for the bench.
Discovery work arrives from four typical directions. We size the engagement to the matter — never the other way around.
Federal Court and Supreme Court discovery — preservation, collection, processing and production.
Misconduct, IP theft, fraud and policy breaches — handled with full custody and discretion.
ASIC, ACCC, OAIC, APRA and ATO requests with defensible production and audit trail.
Scope, exposure and remediation evidence for OAIC notifications under the NDB scheme.
We work the EDRM in reverse: start with what the matter actually needs at production, then preserve and collect only what supports it. The result is fewer documents, lower cost and a defensible record.
Every step is logged, every custodian acknowledged, every search documented. If discovery is challenged, the audit trail tells the story before we have to.
EDRM aligned
Privacy Act + APP
60–90% via culling
Standard load files
Custodian identification, data-source mapping and legal hold notices issued and tracked.
Forensically sound capture from cloud, server and endpoint sources with hash-verified custody.
Deduplication, culling and metadata extraction — review-ready dataset delivered in standard formats.
Bates-numbered production, privilege log and defensibility report describing every step taken.
Every enquiry is read by a licensed investigator and treated in strict confidence.
A short note about your matter — no detail required upfront.
From a licensed investigator, not a chatbot or call centre.
Confidential. No obligation. Fixed-fee quote where possible.