There are high-risk industries, such as pharmaceutical, biotechnology, consumer packaged goods, and software development, where their significant research and development investment can easily walk out the front door on a thumb drive attached to a key chain and end up directly in a competitor’s hands. Even with non-compete and confidentiality clauses in employment agreements, these situations are occurring at an alarming rate.
Forensicon can help by providing a forensic copy of critical hard drives on a regular basis, or after an employee leaves to verify what information was there, where it went, and to whom it was sent. If you suspect someone in your organization is stealing trade secrets, Forensicon can forensically copy the suspect’s machine at work, which may provide enough evidence for prosecution, civil action or a compel order for the suspect’s home computer.
After a mass exodus of dozens of employees from a Fortune 500 company to a direct competitor, an investigation of over 40 computers and servers was mounted. Forensicon was engaged in the capacity of a neutral third party expert to document and preserve all computer evidence, including dozens of computers, laptops and servers. Once the preservation efforts were completed, various searches were conducted to expedite the discovery, review and production of relevant files. An investigation of both corporate and Internet email profiles, file copying, printing, deletion, CD creation and “evidence scrubbing” was conducted upon numerous terabytes of data. The results proved the extent to which the defection was coordinated and whether or not any proprietary information was destroyed or stolen. Ultimately, Forensicon was able to help locate misappropriated data, and judgment was given in favor of the plaintiff.
- 7th Circuit Proposes New Standing Orders for ESI
- Compelling Production of Hard Drives
- Data Security – What To Do When An Employee Leaves
- Deliverables to Request from your Computer Forensic Examiner
- An Ounce of Prevention is Worth a Pound of Cure (and Court Sanctions)
- Know What to Ask – Ensuring a Successful E-Discovery Request
- The Liability of Email as Evidence
- Monitoring Employees
- Time is of the Essence
- Track Former Employee’s Computer Activities
- What Can Computer Forensics Do For You?
- What is Metadata?
- Sloan Valve Co. v. Zurn Industries, Inc.
- Loest & McNamme v. Camera / Broadbent Selections
- Trade Secrets & Non-Solicitation
- US Gypsum v. LaFarge North Am. Inc.
- Advantacare Health Partners, LP v. Access IV
- Rambus, Inc. v. Infineon Techs. AG
- Krumwiede v. Brighton Associates
- ValuePart v. ITR
- LeJeune v. Coin Acceptors, Inc.
- SKF USA Inc. v. Bjerkness
- Data Removal & Certification
- Forensic Vault Service
- Computer Usage Analysis
- Discovery Protocols and Motions
- Computer Forensic Analysis
- Database Forensics
- Connected Storage Device Analysis
- Expert Witness Testimony & Reports
- Litigation Hold Audit
- Analysis of Electronically Stored Information
- Online Content Preservation
- Cell Phone Forensics
- Internet Investigations
- Computer Forensics Expert Witness Testimony
- Computer Forensics Services