Forensic Tech  ·  POPIA Compliance  ·  Investigative Software

Safe by Design.
Built by Someone Who
Knows What Happens When It Isn't.

Audit-ready software, POPIA compliance, and incident response guidance — built by a 19-year SAPS detective who understands both the crime and the technology. Your data, on your terms, fully auditable.

POPIA-Compliant Systems
Akamai Enterprise Infrastructure
Private Mail Servers
Client Data Sovereignty

Your Excel Spreadsheets Are a Liability — In Court and Under POPIA

Most South African businesses run their operations on Excel. Most don't realise they've built an evidentiary disaster.

Excel was built for calculations — not for evidence. When fraud is discovered and your data ends up in a disciplinary hearing, labour court, or criminal prosecution, the opposing legal team will systematically dismantle your spreadsheet records.

They will ask: Who changed that cell? When? Were formulas manually overridden? Could anyone have edited this without a trace? The honest answer, with Excel, is almost always the same — you cannot prove it wasn't tampered with.

Beyond the courtroom, POPIA requires that personal information be protected, access-controlled, and auditable. An Excel file on a shared network drive is none of those things.

The Evidentiary Verdict

"Your data is only as strong as the system that produced it. Excel gives the defence everything it needs to cast doubt — no user logs, no change history, no chain of custody, no tamper detection. That's not evidence. That's a liability."

🔓

No Access Control or Audit Trail

Anyone with file access can open, edit, and save without leaving a trace. There is no log of who viewed or changed what — a fundamental requirement under POPIA and for any legal proceeding.

✏️

Data Integrity Cannot Be Proven

Any cell can be changed, any formula can be overridden. Without cryptographic verification or immutable logging, you cannot prove the data is in its original state — and the defence knows this.

⚖️

No Chain of Custody

Legal proceedings require an unbroken chain of custody for evidence. A file copied, emailed, or opened on multiple machines breaks that chain immediately.

📋

POPIA Non-Compliance by Default

Personal information stored in unprotected Excel files on shared drives or personal computers violates POPIA's requirements for access control, data minimisation, and security safeguards.

📉

Formula Errors Go Undetected

Silent formula errors and incorrect calculations in operational data can lead to faulty decisions — and faulty evidence. Courts have rejected Excel-based evidence on exactly these grounds.

Four Pillars. One Ecosystem.

Each service is designed to feed the others — so one client can generate value across the entire ecosystem simultaneously.

🖥️

Investigative Software

Audit-ready SaaS platforms for fleet management, asset tracking, and business operations — with fraud detection, anomaly flagging, and immutable audit trails built in by design.

  • Full user action logging and audit trails
  • Tamper-evident, court-admissible records
  • Anomaly detection and fraud flagging
  • POPIA-compliant data architecture
  • Client data sovereignty guaranteed
R5,000 – R20,000 / month  ·  SaaS licensing
🚨

Incident Response Guidance

When fraud is discovered, the first hours are critical. Most companies unknowingly destroy evidence by calling HR or lawyers first. We guide you through correct procedure before the scene is contaminated.

  • On-call advisory when a crime is discovered
  • Evidence preservation protocol
  • Crime-specific response guidance
  • Protect your legal position from hour one
  • Applicable to any corporate crime type
R5,000 – R15,000 / month  ·  Retainer
🔒

POPIA Compliance as a Service

Assess, advise, implement, and maintain POPIA compliance — including private mail server management, data governance frameworks, and secure hosting on enterprise infrastructure.

  • POPIA gap assessment and remediation
  • Private mail server management
  • Data governance framework design
  • Akamai enterprise infrastructure
  • Ongoing compliance monitoring
R5,000 – R15,000 / month  ·  Retainer or once-off
🌐

Network Security Audit

A full scan and assessment of your network infrastructure — identifying open ports, undocumented devices, misconfigurations, and vulnerabilities before someone else does. Delivered with actionable recommendations and professional reports.

  • Full network discovery and device mapping
  • Open port and service vulnerability scan
  • WiFi security assessment
  • Dangerous exposure detection and risk scoring
  • Executive summary + technical report + security policy
  • Asset register and findings tracker included
Once-off audit  ·  Retainer available for ongoing monitoring

ExcelGuard — Forensic-Grade Audit & POPIA Compliance for Excel

Your business runs on Excel. But Excel has no audit trail, no tamper detection, and no chain of custody. ExcelGuard wraps your existing workflow in a forensic-grade compliance layer — without changing how your team works.

Every save is SHA-256 hashed. Every cell change is recorded. Every access is logged. Every anomaly is flagged in real time. The result is a tamper-evident audit trail that stands up in a disciplinary hearing, labour court, or POPIA audit.

⚖️
Real Investigation — Commission Fraud Detected An employee copied a commission spreadsheet, altered payout figures in her favour, and overwrote the original at month-end. ExcelGuard would have flagged the file open (READ event), the save from an unauthorised machine (New Machine alert), and the exact cells she changed — on the day it happened, not when a colleague complained.
🔗
SHA-256 Hash Chain Integrity Every save links cryptographically to the previous state. A broken chain is instantly flagged as tamper detected — automatically, with no manual checks required.
🔬
Cell-Level Forensic Diff Exact cell changes recorded on every save — sheet, cell reference, old value, new value. See precisely what was changed, by whom, at what time. Court-ready granularity.
🚨
Behavioural Anomaly Detection Six automatic rules flag suspicious activity in real time: after-hours access, weekend access, new machine, new user, mass cell changes, and access after long inactivity.
👁️
File Open Logging (READ Events) Logs every time an Excel file is opened — not just saved. Username, machine, and timestamp captured the moment the file is accessed. No admin privileges required.
📂
Versioned Snapshots & One-Click Restore Every save creates a recoverable version. Browse the full version history, see who saved what and when, and restore any previous version instantly.
📄
POPIA Compliance PDF Reports Generate a branded, court-ready integrity report for any file and date range — covering hash chain status, anomaly log, full event table, and an integrity declaration.
⏱️
Server-Side SAST Timestamps All timestamps generated server-side in South Africa Standard Time. Cannot be manipulated by the client machine. Designed for South African legal proceedings.
📶
Offline Resilient Events buffer locally during load-shedding or outages. Sync resumes automatically when connectivity is restored. No audit gaps, ever.
EXCELGUARD
v2.0 · Phases 1–4
SHA-256
Hash Standard
SAST
Timestamps
6
Anomaly Rules
FORENSIC PIPELINE
File Event
Hash + Cell Diff
Chain Validated
Anomaly Check
PDF Report
C Confidentiality — READ + identity logging
I Integrity — hash chain + cell diff
A Availability — snapshots + restore
ANOMALY DETECTION
After Hours Weekend Access New Machine New User Mass Change Inactivity
🔒 Original IP · KopaSA · © 2026

If Your Business Handles Data, Manages Assets, or Has Ever Faced Fraud — We Built This for You

🚛

Fleet & Logistics

Replace spreadsheet-based fleet tracking with audit-ready systems that detect fraud, route manipulation, and asset abuse.

🏢

Corporates & Large Business

Protect your operational data, establish investigation readiness, and ensure your records can withstand legal scrutiny.

🏛️

Municipalities & Government

Audit-ready asset and operational management. Built for the accountability standards required in the public sector.

⛏️

Mining & Extraction

Asset tracking, contractor management, and anomaly detection across complex operational environments.

🏦

Financial Services

POPIA-compliant client data management, incident response capability, and fraud detection infrastructure.

⚖️

Legal & HR Firms

Investigation support, correct evidence preservation guidance, and digital forensics methodology for client matters.

🛡️

Security & Risk Companies

White-label investigative software and technology partnerships for private investigators and security firms.

📦

SMEs Going Paperless

Move off Excel into compliant, auditable systems before POPIA exposure becomes a business risk.

One Engagement. Multiple Revenue Touchpoints.

Every client relationship naturally flows through the full ecosystem — consult, train, sell, host, retain.

Step 1

Consult

Identify gaps, correct procedure, establish where the exposure lies

Step 2

Train

Upskill their people on investigation flow and evidence handling

Step 3

Sell

Implement software to prevent, detect, and log going forward

Step 4

Host

Securely host their data on sovereign enterprise infrastructure

Step 5

Retain

On-call incident response retainer — always there when it matters

A single client can generate value across all five stages simultaneously — recurring SaaS revenue, training income, retainer fees, and hosting in one relationship.

The Founder

KopaSA

Forensic Tech · POPIA Compliance · Investigative Software
19
Years SAPS Detective
ZA
South African Built
Akamai Infrastructure
🔒
Private Mail Servers

Built by Someone Who Sat Across the Table from Fraudsters for 19 Years

KopaSA sits at a unique intersection — 19 years of active SAPS detective work combined with deep technical capability in software development, cyber investigations, and enterprise infrastructure.

This isn't theoretical compliance advice or off-the-shelf software dressed up with forensic language. This is understanding built from thousands of real investigations — knowing where evidence breaks down, where companies make fatal mistakes, and where commercial software fails when it matters most.

When we say your system is audit-ready and court-admissible, we know what that actually means in practice — because we've seen what happens when it isn't.

Real detective experience — fraud patterns, evidence chains, investigative methodology
Understands where commercial software fails during actual investigations
Builds software around real investigative requirements, not theory
Enterprise-grade Akamai infrastructure — not weak local hosting
Client data sovereignty as a core design principle
Qualified in IT and Cyber Investigations

Enterprise Infrastructure. Not Local Hosting.

South African hosting platforms are generally weak on security. KopaSA runs on Akamai enterprise CDN and security infrastructure — the same infrastructure used by global financial institutions and governments.

Akamai Enterprise CDN & Security
Private Mail Server Management
Client Data Sovereignty
Full Auditability by Design
POPIA-Compliant Data Architecture
No Weak Local Hosting Exposure

Book a Free 30-Minute Consultation

Not a sales call — a genuine conversation about your current exposure, whether that's POPIA risk, Excel-based evidence vulnerability, or incident response readiness. No obligation.