主页
所有资源
案例研究

Case Study: Professional Services Firm Suspects Theft of IP

Written by admin

Updated: May 05, 2021

Authors
More from the author

A national professional services firm engaged us to find evidence of a former employee’s theft of intellectual property prior to separating from the organization.

Client Challenge

The client suspected that a former employee had stolen information and accessed confidential data, including private contact lists and financials, when leaving the client’s company. We were instructed to find evidence supporting that claim, which involved identifying relevant activity that supported the client’s claim in the face of systematic and secure deletion of hard evidence, as well as obtaining a court order to expand the investigation.

Consilio Response

The team took the former employee’s company cell phone and laptop and imaged and interrogated them. Nothing was found on the phone as it had been reset, and the laptop had been wiped of relevant files, therefore there was no hard evidence to support the client’s claims.

However, a thorough investigation of all aspects of the devices did uncover relevant, supporting evidence. Intellectual property in the form of data files, that included the client’s private contact list and financials, had been accessed on the morning of the former employee’s last day. The team was also able to identify intellectual property in the form of data files that were accessed by the former employee within three days of their last day and then kept in a folder on the suspect’s computer entitled “Take.” There was also evidence of secure wiping, that utilities had been installed to destroy data and that mass storage and copying devices had been connected and registered with the former employee’s computer within their notice period.

Based on the evidence that we provided, the client was able to obtain a court order to seize the former employee’s home computers and computers from the new business venture the former employee had since started. These were then analyzed to determine where the client’s information had been used, where it had been distributed and for what purpose.

Results Achieved

Our team identified and analyzed significant evidence to demonstrate the actions of the individual in question. We presented our findings to the client in a report that was easily understandable, which the client then used to negotiate a very favorable compromise agreement with the suspect.

A national professional services firm engaged us to find evidence of a former employee’s theft of intellectual property prior to separating from the organization.

Client Challenge

The client suspected that a former employee had stolen information and accessed confidential data, including private contact lists and financials, when leaving the client’s company. We were instructed to find evidence supporting that claim, which involved identifying relevant activity that supported the client’s claim in the face of systematic and secure deletion of hard evidence, as well as obtaining a court order to expand the investigation.

Consilio Response

The team took the former employee’s company cell phone and laptop and imaged and interrogated them. Nothing was found on the phone as it had been reset, and the laptop had been wiped of relevant files, therefore there was no hard evidence to support the client’s claims.

However, a thorough investigation of all aspects of the devices did uncover relevant, supporting evidence. Intellectual property in the form of data files, that included the client’s private contact list and financials, had been accessed on the morning of the former employee’s last day. The team was also able to identify intellectual property in the form of data files that were accessed by the former employee within three days of their last day and then kept in a folder on the suspect’s computer entitled “Take.” There was also evidence of secure wiping, that utilities had been installed to destroy data and that mass storage and copying devices had been connected and registered with the former employee’s computer within their notice period.

Based on the evidence that we provided, the client was able to obtain a court order to seize the former employee’s home computers and computers from the new business venture the former employee had since started. These were then analyzed to determine where the client’s information had been used, where it had been distributed and for what purpose.

Results Achieved

Our team identified and analyzed significant evidence to demonstrate the actions of the individual in question. We presented our findings to the client in a report that was easily understandable, which the client then used to negotiate a very favorable compromise agreement with the suspect.

Fill out the form below to download the complete insight.

Bermuda
Bhutan
Bolivia, Plurinational State of
Bonaire, Sint Eustatius and Saba
Bosnia and Herzegovina
Botswana
Bouvet Island
Brazil
British Indian Ocean Territory
Brunei Darussalam
Bulgaria
Burkina Faso
Burundi
Cambodia
Cameroon
Canada
Cape Verde
Cayman Islands
Central African Republic
Chad
Chile
China
Christmas Island
Cocos (Keeling) Islands
Colombia
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Sign up for Consilio updates

不管怎么样,我们都很友善,祝你好运。在悲惨的情绪中,人们对各种各样的恐惧感情有独钟的感觉。
谢谢!您提交的内容已收到!
单击 “注册” 即表示您确认您同意我们的 隐私政策
哎哟!提交表单时出了点问题。