Team | Firme H2E
Skip to content
Firme-H2E
  • Our Services
    • Cyber Investigation and Computer Forensics
    • IT Expertise & Legal Support
    • IT Data Visualization
    • IT Disputes and Projects
    • E-Reputation
    • Prevention & Training
    • ──────────────────
    • ──────────────────
    • ──────────────────
    • Legal Aid
    • Anton Piller Orders
  • About Us
    • Our Story
    • FAQ
  • Case Studies
    • Case: Deleted iPhone Messages
    • Case: Software Contract Dispute
    • Case: Screenshot Falsification
    • Case: Server Damage Insurance
    • Case: Cryptocurrency Fraud
    • Case: Police Report Counter-Expertise
  • Our Audience
    • Lawyers
    • Investigators
    • Insurance Adjusters
  • Blog
  • Estimate
  • Contact
  • FR
Get IT Forensic Support Now
Firme-H2E
  • Our Services
    • Cyber Investigation and Computer Forensics
    • IT Expertise & Legal Support
    • IT Data Visualization
    • IT Disputes and Projects
    • E-Reputation
    • Prevention & Training
    • ──────────────────
    • ──────────────────
    • ──────────────────
    • Legal Aid
    • Anton Piller Orders
  • About Us
    • Our Story
    • FAQ
  • Case Studies
    • Case: Deleted iPhone Messages
    • Case: Software Contract Dispute
    • Case: Screenshot Falsification
    • Case: Server Damage Insurance
    • Case: Cryptocurrency Fraud
    • Case: Police Report Counter-Expertise
  • Our Audience
    • Lawyers
    • Investigators
    • Insurance Adjusters
  • Blog
  • Estimate
  • Contact
  • FR

Our Digital Forensics Experts

At Firme H2E, our team of engineers and analysts supports lawyers, private investigators, and individuals in cases where digital evidence is critical. As recognized judicial experts, we are involved in every stage: from technical analysis and report writing to expert testimony in court.

Our work is rigorous, independent, and always focused on legal clarity.

Scroll to Explore

Case Type: Commercial dispute / Information technologies

Client: Quebec SME in the distribution sector


Parties Involved: Client vs. IT provider (custom software development)


Mandate Assigned to H2E Firm:

Assess whether the delivered software met the contractual commitments


Duration of Mandate: 2 weeks

Context

An SME hired an IT firm to develop internal management software (orders, inventory, invoicing).

After more than a year of development, the client company considered the project incomplete, unstable, and unusable—despite having made several payments.

A commercial dispute arose, with over $200,000 at stake. The SME’s lawyer hired H2E Firm to audit the source code quality, evaluate the deliverables, and verify compliance with the signed contract.

H2E Firm’s Intervention

Step 1

Contract and Specifications Review

  • Full review of the agreement signed between both parties
  • Identification of promised features, timelines, and required standards
  • Creation of a correspondence table between expected and actual deliverables
Step 2

Source Code Audit

  • Static analysis of the provided code
(over 30,000 lines)
  • Assessment of project structure, dependencies, and documentation
  • Review of development practices (testing, security, performance)
  • Measurement of technical debt: duplications, anomalies, cyclomatic complexity
Step 3

Structured Report Including

  • Executive summary for legal professionals
  • Detailed technical analysis
  • Evaluation grid of fulfilled vs. unfulfilled requirements
  • Screenshots, code excerpts, and quality indicators
  • Formulation of a technical opinion: the delivered product was incomplete and did not meet contractual obligations
Outcome

H2E Firm’s report was submitted as evidence
in the mediation between both parties.

Due to the strength of the findings, the IT firm agreed to refund 45% of the paid amounts and waived its claims for scope overages.

The client later assigned a new project to
another team—this time with technical clauses recommended by H2E.

Key Takeaways
  • Technical clauses must be written clearly to be enforceable
  • A source code audit can reveal unusable or risky software due to poor structure
  • A neutral, independent, and competent expert can support a swift and fair resolution
Key Tools Used
  • SonarQube (software quality analysis)
  • Pylint, ESLint, PHPStan (depending on programming languages)
  • Visual Studio Code + forensic plugins
  • PDF report structured according to evidentiary standards

Do you have a case?

Submit it through our secure platform.

Our experts are the only ones who have access to your information, which is handled confidentially.

Submit Your Case

Your information is kept confidential and reviewed by certified experts.

Have any Questions?

Contact Us
Email

expertise@firmeh2e.com

Toll Free

1-888-796-8706

Phone/SMS

450-700-4233

Fill out the form
Firme H2E

Legal IT Expertise Firm | Greater Montreal Area


  • Facebook
  • LinkedIn
Quick Links
  • Home
  • Our Services
  • Our Audience
  • About Us
  • Case Studies
  • Our Story
  • Blogs
  • Legal Aid
  • Anton Piller
  • FAQ’s
  • Contact
Contact Us
  • Location
    970 Demers Street, Carignan, J3L 1E9
  • Business email
    expertise@firmeh2e.com
  • Toll-free
    1-888-796-8706
  • Local
    1-450-700-4233
Stay Informed. Stay Secure.

Subscribe to stay informed about industry updates and connect with our experts.

Note: We serve all over Quebec and Canada

© 2025 Firme H2E. All rights reserved.

  • Privacy Policy
  • Terms & Conditions
Gérer consentement
Pour offrir la meilleure expérience possible, nous utilisons des technologies telles que les témoins (cookies) pour stocker et/ou accéder aux informations de votre appareil. Consentir à ces technologies nous permet de traiter des données telles que le comportement de navigation ou les identifiants uniques sur ce site. Ne pas consentir ou retirer votre consentement pourrait affecter négativement certaines fonctionnalités.
Fonctionnel Always active
Le stockage ou l accès technique est strictement nécessaire à la finalité légitime de permettre l utilisation d un service spécifique explicitement demandé par l abonné ou l utilisateur, ou dans le seul but d effectuer la transmission d une communication sur un réseau de communications électroniques.
Préférences
Le stockage ou l accès technique est nécessaire dans la finalité d intérêt légitime de stocker des préférences qui ne sont pas demandées par l abonné ou l utilisateur.
Statistiques
Le stockage ou l accès technique utilisé exclusivement à des fins statistiques. Le stockage ou l accès technique utilisé exclusivement à des fins statistiques anonymes. Sans assignation à comparaître, conformité volontaire de la part de votre fournisseur d accès à Internet ou enregistrements supplémentaires provenant d un tiers, les informations stockées ou extraites à cette seule fin ne peuvent généralement pas être utilisées pour vous identifier.
Marketing
Le stockage ou l accès technique est nécessaire pour créer des profils d utilisateurs afin d envoyer de la publicité, ou pour suivre l utilisateur sur un site web ou sur plusieurs sites web à des fins de marketing similaires.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
Voir
  • {title}
  • {title}
  • {title}