Evidence Solutions, Inc., (ESI) is a premier forensics company founded in 1982.

ESI Provides Elite experts in:

Digital and Electronic Evidence, Computer Forensics, Cell Phone Forensics
Trucking, Truck Accident Investigation and Trucking Regulations, Truck Safety Consulting, Heavy Vehicles & Hazardous Materials
Sports and Fitness, Fitness Facility Standard of Care
Real Estate & Land, Real Estate Syndication
Bankruptcy and Corporate Governance
Accident Reconstruction

Call for a free consultation: 866-795-7166

 

 

Computer Forensics Expert Witness:
Theft of Intellectual Property... is on the rise!

Electronic Evidence / Intellectual Property Forensics Articles

By Scott Greene

------------------------------------------------------------

According to a recent survey, about 56% of employees admit to stealing Intellectual Property (IP) from their company when they are fired. Their reasons might range anywhere from wanting to besmirch their former employer to wanting to branch out on their own and start a business. Whatever the reason, this is a high trend and shows no sign of slowing down, especially with technology becoming more prevalent in our lives. We at Evidence Solutions are finding more and more of these cases coming across our desks, and we have found some measures that can help to limit loss when there is a disgruntled employee.

The first thing to do when the employee leaves the building is to contact your IT administrator and have them suspend or otherwise terminate the employee’s credentials to access their computer systems including remote access. This prevents the employee from coming into your office later that night with a flash drive or accessing computers from their home, and making off with any manner of documents. Second would be to contact a digital forensics firm to have the machine imaged for future examination. There may have been emails sent, documents written, or other confidential material that may have been taken by the employee that the employer could be unaware of for days, weeks or months after the employee has left.

In larger companies, there can be software systems put in place known as Data Loss Prevention (DLP). What a DLP system does is send an alert to IT saying that a particular file on someone’s computer is being in appropriately access or copied. While some of these alerts will be false alarms, some will be real IP theft that can be used against the employee should there ever be a court case filed. The question “What were you doing with this file?” has a remarkable effect on the defendant during a deposition.

Another important thing that companies forget is the physical aspect of intellectual property. Companies should collect and change keys (or changing the locks entirely), change alarm codes and ask about personal devices that might contain company data. Employers should include statement signed by the ex-employee that they will return all company data intact, and that keeping any of these files could constitute a criminal act.
Remember, never assume that your data is safe when an employee leaves. Always check and double check.

This newsletter article is offered only for general informational and educational purposes. It is not offered as and does not constitute legal advice or legal opinions. These materials are intended, but not promised or guaranteed to be current, complete, or up-to-date and should in no way be taken as an indication of future results. You should always consult an attorney before using and/or executing any legal document, as Evidence Solutions, Inc. is not a law firm, and therefore not allowed to give legal advice.

By Scott Greene

Evidence Solutions, Inc.

Complex Electronic Evidence in PLAIN English.

Call us today with your Intellectual Property Evidence Questions: 866-795-7166 or This email address is being protected from spambots. You need JavaScript enabled to view it.

Related Articles & Pages:

Employee Termination Checklist

Clean Desk Policy

Internet Usage Policy - Computer Forensics Expert Witness

Managing the Risky Business of Company E-mail Part 2

Managing the Risky Business of Company E-mail Part 1

 

Like Evidence Solutions - Electronic Evidence on Facebook

Follow Evidence Solutions - Digital Evidence on LinkedIn

Circle Evidence Solutions - Digital Evidence on Google+

Google+ Author

Google+ Publisher