Skip to content
Forensicon
CALL US NOW 888-427-5667
  • Home
  • AboutExpand
    • Computer Forensics Team
    • Chicago Computer Forensics
    • Forensicon Noted Cases
    • Careers at QDiscovery
    • Testimonials
  • Practice AreasExpand
    • Trade SecretsExpand
      • Trade Secrets Misappropriation
    • Employment LitigationExpand
      • Employment Litigation Defense
      • Wage & Hour Litigation
    • Internal InvestigationsExpand
      • Corporate Identity Theft
      • Corporate Security Breach
      • Illicit Employee Activity
    • Family Law
  • ServicesExpand
    • Computer Forensics ServicesExpand
      • Computer Forensics Expert Witness Testimony
      • Computer Forensic Analysis
      • Database Forensics
      • Enterprise Storage Failure & Data Recovery
    • Cell Phone Forensics
    • ConsultingExpand
      • Cyber Security Data Breach Response
      • Expert Witness Testimony & Reports
      • ESI Preservation & Collection
      • Online Content Preservation
    • e-DiscoveryExpand
      • Data Removal & Certification
      • Online Content Preservation
    • Internet Investigations
    • DVR Recovery Forensics
  • ResourcesExpand
    • Articles
    • Case Summaries
    • Computer Forensics Resources
    • Resource Documents
    • Forensicon Newsletters
    • Resource Links
  • News & EventsExpand
    • Forensicon News
    • Forensics Blotter
  • Contact Us
Forensicon
Home / Practice Areas / Trade Secrets / Trade Secrets : Trade Secrets Misappropriation

Trade Secrets : Trade Secrets Misappropriation

Forensicon specializes in investigations focusing on trade secrets misappropriation.
Forensicon specializes in investigations focusing on trade secrets misappropriation.

There are high-risk industries, such as pharmaceutical, biotechnology, consumer packaged goods, and software development, where their significant research and development investment can easily walk out the front door on a thumb drive attached to a key chain and end up directly in a competitor’s hands. Even with non-compete and confidentiality clauses in employment agreements, these situations are occurring at an alarming rate.

Forensicon can help by providing a forensic copy of critical hard drives on a regular basis, or after an employee leaves to verify what information was there, where it went, and to whom it was sent. If you suspect someone in your organization is stealing trade secrets, Forensicon can forensically copy the suspect’s machine at work, which may provide enough evidence for prosecution, civil action or a compel order for the suspect’s home computer.

  • Illinois Trade Secrets Act
  • Confidentiality and Non-Disclosure Agreements

After a mass exodus of dozens of employees from a Fortune 500 company to a direct competitor, an investigation of over 40 computers and servers was mounted. Forensicon was engaged in the capacity of a neutral third party expert to document and preserve all computer evidence, including dozens of computers, laptops and servers. Once the preservation efforts were completed, various searches were conducted to expedite the discovery, review and production of relevant files. An investigation of both corporate and Internet email profiles, file copying, printing, deletion, CD creation and “evidence scrubbing” was conducted upon numerous terabytes of data. The results proved the extent to which the defection was coordinated and whether or not any proprietary information was destroyed or stolen. Ultimately, Forensicon was able to help locate misappropriated data, and judgment was given in favor of the plaintiff.

Articles

  • 7th Circuit Proposes New Standing Orders for ESI
  • Compelling Production of Hard Drives
  • Data Security – What To Do When An Employee Leaves
  • Deliverables to Request from your Computer Forensic Examiner
  • An Ounce of Prevention is Worth a Pound of Cure (and Court Sanctions)
  • Know What to Ask – Ensuring a Successful E-Discovery Request
  • The Liability of Email as Evidence
  • Monitoring Employees
  • Time is of the Essence
  • Track Former Employee’s Computer Activities
  • What Can Computer Forensics Do For You?
  • What is Metadata?

Case Studies

  • Sloan Valve Co. v. Zurn Industries, Inc.
  • Loest & McNamme v. Camera / Broadbent Selections
  • Trade Secrets & Non-Solicitation
  • US Gypsum v. LaFarge North Am. Inc.
  • Advantacare Health Partners, LP v. Access IV
  • Rambus, Inc. v. Infineon Techs. AG
  • Krumwiede v. Brighton Associates
  • ValuePart v. ITR
  • LeJeune v. Coin Acceptors, Inc.
  • SKF USA Inc. v. Bjerkness

Related Services

  • Data Removal & Certification
  • Forensic Vault Service
  • Computer Usage Analysis
  • Discovery Protocols and Motions
  • Computer Forensic Analysis
  • Database Forensics
  • Connected Storage Device Analysis
  • Expert Witness Testimony & Reports
  • Litigation Hold Audit
  • Analysis of Electronically Stored Information
  • Online Content Preservation
  • Cell Phone Forensics
  • Internet Investigations
  • Consulting
  • Computer Forensics Expert Witness Testimony
  • Computer Forensics Services
Search

Related Service Offerings

Computer Forensic Analysis
Forensic Vault Service
Expert Witness Testimony & Reports
...more services

Articles

What is Forensic Hard Drive Imaging?
What is Metadata?
The Liability of Email as Evidence
Track Former Employee’s Computer Activities
...more articles

Forensicon © 2022. All Rights Reserved.

  • Website Privacy Policy
  • SiteMap
  • Website Disclaimer
Corporate Headquarters:
309 W Washington St., Ste 1300
Chicago, IL 60606
v. (888) 427-5667 f. (312) 427-5668
Contact us
Computer Forensics Experts
ESI Discovery Consultants
Digital Cyber Forensic Analysis
Computer Forensics Company
Michigan PI Agency# 3701205872
  • Home
  • About
    • Computer Forensics Team
    • Chicago Computer Forensics
    • Forensicon Noted Cases
    • Careers at QDiscovery
    • Testimonials
  • Practice Areas
    • Trade Secrets
      • Trade Secrets Misappropriation
    • Employment Litigation
      • Employment Litigation Defense
      • Wage & Hour Litigation
    • Internal Investigations
      • Corporate Identity Theft
      • Corporate Security Breach
      • Illicit Employee Activity
    • Family Law
  • Services
    • Computer Forensics Services
      • Computer Forensics Expert Witness Testimony
      • Computer Forensic Analysis
      • Database Forensics
      • Enterprise Storage Failure & Data Recovery
    • Cell Phone Forensics
    • Consulting
      • Cyber Security Data Breach Response
      • Expert Witness Testimony & Reports
      • ESI Preservation & Collection
      • Online Content Preservation
    • e-Discovery
      • Data Removal & Certification
      • Online Content Preservation
    • Internet Investigations
    • DVR Recovery Forensics
  • Resources
    • Articles
    • Case Summaries
    • Computer Forensics Resources
    • Resource Documents
    • Forensicon Newsletters
    • Resource Links
  • News & Events
    • Forensicon News
    • Forensics Blotter
  • Contact Us