Skip to content
Forensicon
CALL US NOW 888-427-5667
  • Home
  • AboutExpand
    • Computer Forensics Team
    • Chicago Computer Forensics
    • Forensicon Noted Cases
    • Careers at QDiscovery
    • Testimonials
  • Practice AreasExpand
    • Trade SecretsExpand
      • Trade Secrets Misappropriation
    • Employment LitigationExpand
      • Employment Litigation Defense
      • Wage & Hour Litigation
    • Internal InvestigationsExpand
      • Corporate Identity Theft
      • Corporate Security Breach
      • Illicit Employee Activity
    • Family Law
  • ServicesExpand
    • Computer Forensics ServicesExpand
      • Computer Forensics Expert Witness Testimony
      • Computer Forensic Analysis
      • Database Forensics
      • Enterprise Storage Failure & Data Recovery
    • Cell Phone Forensics
    • ConsultingExpand
      • Cyber Security Data Breach Response
      • Expert Witness Testimony & Reports
      • ESI Preservation & Collection
      • Online Content Preservation
    • e-DiscoveryExpand
      • Data Removal & Certification
      • Online Content Preservation
    • Internet Investigations
    • DVR Recovery Forensics
  • ResourcesExpand
    • Articles
    • Case Summaries
    • Computer Forensics Resources
    • Resource Documents
    • Forensicon Newsletters
    • Resource Links
  • News & EventsExpand
    • Forensicon News
    • Forensics Blotter
  • Contact Us
Forensicon
Home / Resources / Case Summaries / Zynga v. Scopely et al – Recovering Stolen Trade Secrets

Zynga v. Scopely et al – Recovering Stolen Trade Secrets

Businesses are filing law suits against departed employees who remove trade secrets and computer forensics is playing a pivotal role in those suits. These days loyalty to a company is not as common as it used to be. It is becoming more and more uncommon to find someone who has worked for the same company 30+ years as seen in our parents’ generation. The Bureau of Labor Statistics (BLS) stated in a September 2016 report “the median number of years that wage and salary workers had been with their current employer was 4.2 years in January 2016, down from 4.6 years in January 2014.” With an ever increasing employee change-over rate there is a greater risk that an employee will leave on bad terms.

Given this information, it is becoming evident how important properly formulated exit procedures are so that if an employee does leave, issues can be investigated and addressed in a timely manner. A set of exit procedures may include some combination of the following actions:

  • Exit interview with departed employees
  • Preservation of digital media (Computers, USBs, phone, email)
  • Examination of work space (papers, loose devices, etc.)
  • Review of social media accounts

In recent news, Ars Technica reported that two employees resigned from mobile game developer Zynga to work for a competing mobile game developing company, Scopely. Upon their departure, a formal forensic investigation was conducted upon their Zynga work computers. It was discovered that critical data was downloaded from a Zynga maintained Google Drive, saved to a USB drive and taken with the individuals to their new employer. Armed with forensic evidence, Zynga filed suit against each departed employee and Scopely to enjoin Scopely from using Zynga’s trade secrets, recruiting Zynga personnel and profiting from information obtained from Zynga’s former employees. The basis for Zynga’s suit is not only that Scopely stole trade secrets from them via the two former Zynga employees, but that Scopely unlawfully interfered with contracts between Zynga and its employees.

A forensic investigation of a departed employee’s computer can provide an enormous amount of useful information, typically answering these questions, and more:

  • What files were they accessing?
  • Did they delete any files?
  • Were any files printed, uploaded to a cloud storage account or emailed to a personal email address?
  • What websites were they browsing in the weeks leading up to their departure?
  • Were any USB devices plugged into the computer that are not accounted for?

Forensicon has hundreds of cases related to departed employee disputes. We have been instrumental in the collection, analysis and reporting which often leads to Temporary Restraining Orders or other injunctions entered against the former employee.

Gary Hunt is a Senior Digital Forensic Examiner for Forensicon, a QDiscovery Company. Gary holds the Certified Computer Examiner (CCE) certification, is an active member of the International Society of Forensic Computer Examiners (ISFCE) and High Technology Crime Investigation Association (HTCIA) organizations and is one of QDiscovery’s testifying experts. Prior to joining Forensicon, Gary managed the Midwest presence for TransPerfect Legal Solutions’ Forensic Technology and Consulting division. His diverse background in technology, forensics and eDiscovery provides a unique perspective to many challenges faced in the eDiscovery industry.

Search

Related Service Offerings

Computer Forensic Analysis
Forensic Vault Service
Expert Witness Testimony & Reports
...more services

Articles

What is Forensic Hard Drive Imaging?
What is Metadata?
The Liability of Email as Evidence
Track Former Employee’s Computer Activities
Exploring fseventsd Forensics Techniques
...more articles

Forensicon © 2025. All Rights Reserved.

  • Website Privacy Policy
  • SiteMap
  • Website Disclaimer
Corporate Headquarters:
309 W Washington St., Ste 1300
Chicago, IL 60606
v. (888) 427-5667 f. (312) 427-5668
Contact us
Computer Forensics Experts
ESI Discovery Consultants
Digital Cyber Forensic Analysis
Computer Forensics Company
Michigan PI Agency# 3701205872
  • Home
  • About
    • Computer Forensics Team
    • Chicago Computer Forensics
    • Forensicon Noted Cases
    • Careers at QDiscovery
    • Testimonials
  • Practice Areas
    • Trade Secrets
      • Trade Secrets Misappropriation
    • Employment Litigation
      • Employment Litigation Defense
      • Wage & Hour Litigation
    • Internal Investigations
      • Corporate Identity Theft
      • Corporate Security Breach
      • Illicit Employee Activity
    • Family Law
  • Services
    • Computer Forensics Services
      • Computer Forensics Expert Witness Testimony
      • Computer Forensic Analysis
      • Database Forensics
      • Enterprise Storage Failure & Data Recovery
    • Cell Phone Forensics
    • Consulting
      • Cyber Security Data Breach Response
      • Expert Witness Testimony & Reports
      • ESI Preservation & Collection
      • Online Content Preservation
    • e-Discovery
      • Data Removal & Certification
      • Online Content Preservation
    • Internet Investigations
    • DVR Recovery Forensics
  • Resources
    • Articles
    • Case Summaries
    • Computer Forensics Resources
    • Resource Documents
    • Forensicon Newsletters
    • Resource Links
  • News & Events
    • Forensicon News
    • Forensics Blotter
  • Contact Us