This service is for individuals and companies that need urgent, structured support when the police or prosecutor initiates procedural acts: hearings, home/business searches, seizures of documents/devices, computer searches, or technical surveillance (interceptions). We focus on protecting rights in real time, documenting irregularities, and building the shortest path to a defensible strategy. Next step: send the summons/warrant/minutes you have and call before the act if possible.
Informațiile sunt generale și nu înlocuiesc consultanța juridică. Contează faptele, actele și cronologia.
When you may need this
- You received a summons to be heard by police/prosecutor (as witness, suspect or defendant).
- Investigators show up for a home search or a search at business premises (including early-morning “dawn raids”).
- Your phone, laptop, servers or documents are being seized, copied or inventoried.
- You are notified (or suspect) that technical surveillance/interceptions are used in the case.
- You face a 24-hour detention or urgent procedural measures that move fast.
- A computer search/forensic imaging is ordered and confidential data is at risk.
- You need to challenge a procedural act, a warrant, or the way evidence was obtained.
- The case involves multiple parties and inconsistent statements create exposure.
- You need a plan for internal communication and business continuity during an investigation.
What we do, in practical terms
- Urgent triage: identify the authority, the act, your status, and the immediate legal deadlines.
- Pre-act preparation (when possible): what to request, what to bring, what to avoid saying, and what to document.
- Presence during procedural acts (hearing/search/seizure) and structured protection of your rights on-site.
- Minute-by-minute documentation: ensure objections, requests and irregularities are recorded in the official minutes.
- Data & privilege safeguards: define what is confidential/privileged and reduce unnecessary exposure of third-party data.
- Post-act strategy: obtain copies, check legal basis, and plan challenges (complaints, nullity claims, exclusion requests).
- Evidence mapping: what was taken, what remains, what can be reconstructed, and how to keep the file consistent.
- Risk control for the business: internal steps that preserve evidence without disrupting operations more than necessary.
Documents / information useful for the first assessment
| Document | Why it matters | Notes |
|---|---|---|
| Summons / subpoena / notice of hearing | Shows date, authority and procedural status | Check what quality you are summoned in; note deadlines |
| Search warrant / authorisation (if applicable) | Defines scope, location, objects and legal basis | Ask for a copy; verify if it matches what is actually done |
| Minutes of hearing/search/seizure | Primary record of what happened and what was requested/denied | Request corrections and that objections are written down |
| Inventory / seizure list (devices, documents, data) | Shows what was taken or copied and later chain-of-custody issues | Check serial numbers, accounts, storage media, and timestamps |
| Any correspondence with authorities | Helps track legal positions and deadlines | Keep everything in one thread/folder; avoid informal channels |
| Data map (devices, accounts, cloud, company systems) | Helps assess exposure, confidentiality and continuity risks | Useful for computer searches and broad seizure scenarios |
| Internal policies (IT, access, retention) | Can matter for explaining system access and responsibilities | Provide the version in force at the relevant time |
Risks and frequent mistakes
- Talking “off the record” or improvising statements without understanding your status and rights.
- Signing minutes without reading them carefully or without requesting that objections are recorded.
- Consenting to broader searches than required, including voluntary access to unrelated data.
- Deleting, altering or “cleaning” data in ways that later look like concealment.
- Sharing passwords or access paths without documenting the legal basis and scope of the request.
- Failing to obtain copies of warrants, minutes and seizure lists before the team leaves.
- Letting internal staff speculate or communicate publicly while facts are still unclear.
FAQ
Can I refuse to answer questions at a hearing?
The answer depends on your procedural status and the questions asked; the key is to clarify your quality, understand your rights and obligations, and avoid statements that create unnecessary exposure.
What should a search warrant contain and what can be searched?
A warrant should define the legal basis, scope and objects of the search; the practical defence approach focuses on matching what is done on-site with what is authorised and documenting deviations.
Can investigators seize phones, laptops or company servers?
Seizure and computer searches have specific procedural rules; what matters in practice is the legal basis, proportionality, the inventory, and how data is copied/imaged and safeguarded.
How do I protect lawyer–client privilege and confidential data?
Privilege and confidentiality require practical steps: clear identification, careful documentation in minutes, and follow-up requests to prevent unnecessary access or use of protected materials.
How can interceptions or technical surveillance be challenged?
Challenges usually focus on authorisation, duration, scope and the way data was obtained and used in evidence; the first step is to identify what measures exist in the file and when they were authorised.
Do I have to provide passwords or unlock my device?
Requests for passwords/unlocking are legally and factually sensitive; the practical priority is to document the request and basis, avoid informal access, and get advice immediately.
Relevant internal links
Surse
- Romanian Criminal Procedure Code (Law no. 135/2010) – Portal Legislativ
- Romanian Criminal Code (Law no. 286/2009) – Portal Legislativ
- Constitution of Romania (republished) – Portal Legislativ
- European Convention on Human Rights – official text (ECHR)
- Directive 2013/48/EU (access to a lawyer) – EUR-Lex
- Directive 2012/13/EU (right to information in criminal proceedings) – EUR-Lex
- Directive 2010/64/EU (interpretation & translation) – EUR-Lex
- Directive (EU) 2016/343 (presumption of innocence) – EUR-Lex
