Bytes of expertise in cybercrimeblockchain cryptocriminal law
Associate professor & Lawyer George M.R. Zlati «over a decade of criminal law practice, enriched by tens of thousands of hours of academic research»
#About
#Services
Cybercrime
Premium services for the most complex casesCybercrime
- Legal representation in cybercrime cases, for both victims and defendants
- Consultancy for both individuals and companies
- Drafting expert opinions and formulating defense strategies in complex cybercrime cases
Criminal acts:: hacking, fraud, computer fraud, identity theft, unauthorized data transfer, phishing, carding, DoS (Denial of Service), SQL injection, child pornography
Digital evidence
Identification. Evaluation. LegalityDigital evidence
- Consultancy on the identification, collection, and assessment of digital evidence
- Providing legal and technical guidance in computer search procedures
- Expert assessments on the interpretation or legality of digital evidence
Outsourcing services
Project-based collaborationsOutsourcing services
- Legal services in criminal cases as an external collaborator
- Project-based collaborations in complex criminal cases
Blockchain & crypto
Consultancy. Regulation. OffensesBlockchain & crypto
- Consultancy on blockchain or crypto-assets projects
- Analysis of compliance with MiCA regulation and other legislation
- Legal representation in criminal cases related to cryptocurrencies
- Legal representation of victims in cryptocurrency fraud cases
White-collar crime
For individuals and companiesWhite-collar crime
- Representation of clients in criminal proceedings concerning economic offenses, corruption, etc.
- Participation as an expert on national legislation in extradition procedures from the UK
- Developing defense strategies, including legal analysis and case preparation, for complex white-collar criminal cases
- Challenging evidence during preliminary chamber proceedings
Cybersecurity
Servicies from A to ZCybersecurity
- Conducting risk analysis and implementing internal policies for cybersecurity
- Performing penetration testing to assess and ensure compliance with cybersecurity standards
- Providing training sessions for employees on the identification and prevention of cybercrime