{"id":9572,"date":"2026-03-26T08:43:24","date_gmt":"2026-03-26T14:43:24","guid":{"rendered":"https:\/\/idsinc.com\/?p=9572"},"modified":"2026-03-26T08:43:28","modified_gmt":"2026-03-26T14:43:28","slug":"daten-zum-geistigen-eigentum","status":"publish","type":"post","link":"https:\/\/idsinc.com\/de\/intellectual-property-data\/","title":{"rendered":"Wenn geistiges Eigentum das Haus verl\u00e4sst, bleiben die Daten zur\u00fcck."},"content":{"rendered":"<!-- wp:themify-builder\/canvas \/-->\n\n\n<h6 class=\"wp-block-heading\" id=\"h-the-most-damaging-corporate-heists-today-don-t-involve-broken-locks-or-midnight-alarms-they-involve-a-departing-employee-a-personal-cloud-account-and-a-few-seconds-of-silence-intellectual-property-ai-proprietary-code-pricing-strategies-client-lists-strategic-roadmaps-ai-can-walk-out-the-door-without-a-sound\"><strong>Die verheerendsten Unternehmensdiebst\u00e4hle heutzutage haben nichts mit aufgebrochenen Schl\u00f6ssern oder n\u00e4chtlichen Alarmen zu tun. Es geht um einen ausscheidenden Mitarbeiter, ein privates Cloud-Konto und wenige Sekunden Stille. Geistiges Eigentum \u2013 propriet\u00e4rer KI-Code, Preisstrategien, Kundenlisten, strategische Roadmaps \u2013 KI kann unbemerkt verschwinden.<\/strong><\/h6>\n\n\n\n<p>Doch was viele Insider-Bedrohungen nicht begreifen, ist Folgendes: Die digitale Welt vergisst nicht. In einem k\u00fcrzlich ver\u00f6ffentlichten Artikel \u00fcber <a href=\"https:\/\/www.lexology.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">Lexologie<\/a>, iDS-Teammitglied <a href=\"https:\/\/idsinc.com\/de\/timothy-latulippe\/\" target=\"_blank\" rel=\"noreferrer noopener\">Timothy LaTulippe<\/a> Er untersucht, was er als eine \u201cunsichtbare Epidemie\u201d des Diebstahls geistigen Eigentums bezeichnet \u2013 und vor allem, warum diejenigen, die es versuchen, fast immer eine Spur hinterlassen.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-every-digital-action-triggers-a-forensic-reaction\"><strong>Jede digitale Aktion l\u00f6st eine forensische Reaktion aus<\/strong><strong><\/strong><\/h3>\n\n\n\n<p>LaTulippe f\u00fchrt den Begriff des \u201cdigitalen Abfalls\u201d ein \u2013 die forensischen Spuren, die jede Interaktion mit einem Ger\u00e4t oder einer Datei hinterl\u00e4sst. Herk\u00f6mmliche IT-\u00dcberwachung \u00fcbersieht m\u00f6glicherweise einen einzelnen Upload in eine pers\u00f6nliche Dropbox. Forensische Analysen gehen jedoch wesentlich tiefer.<strong><\/strong><\/p>\n\n\n\n<p>Anhand von Artefakten wie LNK-Dateien, Sprunglisten, Shellbags und Registrierungsschl\u00fcsseln k\u00f6nnen Ermittler eine genaue Zeitleiste rekonstruieren, die aufzeigt, worauf wann und von wo aus zugegriffen wurde, selbst wenn das Ger\u00e4t, mit dem die Daten \u00fcbertragen wurden, l\u00e4ngst nicht mehr existiert.<strong><\/strong><\/p>\n\n\n\n<p>Die strategischen Auswirkungen auf die Rechtsberatung sind erheblich. Die Frage lautet nicht mehr nur <em>Was<\/em> wurde genommen, aber <em>Wie<\/em> \u2013 die eindeutige Dokumentation von Wissen und Absicht. Wie LaTulippe veranschaulicht, wird die Verteidigung mit dem Argument des \u201cunabsichtlichen Fehlers\u201d sehr schwer aufrechtzuerhalten, wenn ein Mitarbeiter kurz nach einem Massen-Download von Kundendaten nach \u201cBrowserverlauf l\u00f6schen\u201d sucht.<\/p>\n\n\n\n<p>Diese Windows-Systemartefakte sind, wie er sagt, nur ein Tropfen auf den hei\u00dfen Stein. Doch in Verbindung mit den Informationen der Personal- und Rechtsabteilung k\u00f6nnen sie ein aussagekr\u00e4ftiges Bild zeichnen und den Schadensregulierungsprozess erheblich st\u00e4rken.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-what-s-coming-in-the-series\"><strong>Was erwartet Sie in der Serie?<\/strong><strong><\/strong><\/h3>\n\n\n\n<p>Dieser Artikel ist der erste einer mehrteiligen Serie. In den folgenden Teilen wird untersucht, wie zus\u00e4tzliche forensische Artefakte Ermittlern helfen, Verst\u00f6\u00dfe gegen nachvertragliche Wettbewerbsverbote (PTR) aufzudecken, den Aufbau von Schattenkonkurrenzunternehmen aufzudecken und wie diese Erkenntnisse von der Ermittlung zu gerichtsverwertbaren Beweismitteln werden.<strong><\/strong><\/p>\n\n\n\n<p>Bei iDS ist dies unsere t\u00e4gliche Arbeit \u2013 wir helfen Rechtsteams, Unternehmensjuristen und Ermittlern dabei, Daten als strategischen Vorteil zu nutzen, sowohl innerhalb als auch au\u00dferhalb des Gerichtssaals.<br><\/p>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\" style=\"margin-top:var(--wp--preset--spacing--20);margin-bottom:var(--wp--preset--spacing--60)\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link has-white-color has-text-color has-background has-link-color wp-element-button\" href=\"https:\/\/www.lexology.com\/library\/detail.aspx?g=f5558a87-bf55-4840-afc7-169b12a74f52\" style=\"background-color:#ee5d20\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Lesen Sie den vollst\u00e4ndigen Artikel auf Lexology.<\/strong><\/a><\/div>\n<\/div>\n\n\n\n<p>Wenn Ihre Organisation Fragen zu Insiderbedrohungen oder dem Missbrauch geistigen Eigentums hat, besuchen Sie <a href=\"https:\/\/idsinc.com\/de\/\" target=\"_blank\" rel=\"noreferrer noopener\">idsinc.com<\/a> Um ein Gespr\u00e4ch mit einem unserer Experten zu vereinbaren.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<p><em><strong>iDS bietet beratende Datenl\u00f6sungen f\u00fcr Unternehmen und Anwaltskanzleien auf der ganzen Welt und verschafft ihnen damit einen entscheidenden Vorteil \u2013 sowohl vor Gericht als auch au\u00dferhalb. Die Fachexperten und Datenstrategen von iDS sind darauf spezialisiert, L\u00f6sungen f\u00fcr komplexe Datenprobleme zu finden und sicherzustellen, dass Daten als Verm\u00f6genswert und nicht als Belastung genutzt werden k\u00f6nnen. Weitere Informationen finden Sie unter <a href=\"https:\/\/idsinc.com\/de\/\" type=\"link\" id=\"https:\/\/idsinc.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">idsinc.com<\/a>.<\/strong><\/em><\/p>\n\n\n\n<p><em>Haben Sie Schwierigkeiten mit einem in diesem Beitrag verwendeten Fachbegriff? Schauen Sie in unserem&nbsp;<\/em><a href=\"https:\/\/idsinc.com\/de\/glossar\/\" target=\"_blank\" rel=\"noreferrer noopener\"><em>Glossar f\u00fcr Datenanalysten<\/em><\/a><em>&nbsp;den Code zu knacken.&nbsp;<\/em><\/p>","protected":false},"excerpt":{"rendered":"<p>The most damaging corporate heists today don&#8217;t involve broken locks or midnight alarms. They involve a departing employee, a personal cloud account, and a few seconds of silence. Intellectual property \u201a AI proprietary code, pricing strategies, client lists, strategic roadmaps \u201a AI can walk out the door without a sound. But what many insider threats [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":9573,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[10,35],"tags":[],"class_list":["post-9572","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","category-ip","has-post-title","has-post-date","has-post-category","has-post-tag","has-post-comment","has-post-author",""],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.5 (Yoast SEO v27.5) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>When Intellectual Property Walks Out the Door, Data Stays Behind<\/title>\n<meta name=\"description\" content=\"The most damaging corporate heists today involves departing employees. Intellectual property data can walk out the door without a sound.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/idsinc.com\/de\/daten-zum-geistigen-eigentum\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"When Intellectual Property Walks Out the Door, the Data Stays Behind\" \/>\n<meta property=\"og:description\" content=\"The most damaging corporate heists today involves departing employees. Intellectual property data can walk out the door without a sound.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/idsinc.com\/de\/daten-zum-geistigen-eigentum\/\" \/>\n<meta property=\"og:site_name\" content=\"iDiscovery Solutions\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/iDiscovery-Solutions-110210573904472\" \/>\n<meta property=\"article:published_time\" content=\"2026-03-26T14:43:24+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-26T14:43:28+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/idsinc.com\/wp-content\/uploads\/2026\/03\/LEX-Part-1-Invisible-Heist-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"960\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"iDiscovery Solutions\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Verfasst von\" \/>\n\t<meta name=\"twitter:data1\" content=\"iDiscovery Solutions\" \/>\n\t<meta name=\"twitter:label2\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data2\" content=\"3\u00a0Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/intellectual-property-data\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/intellectual-property-data\\\/\"},\"author\":{\"name\":\"iDiscovery Solutions\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/person\\\/bf7f03a502e8a54e558c44d0ff5d6736\"},\"headline\":\"When Intellectual Property Walks Out the Door, the Data Stays Behind\",\"datePublished\":\"2026-03-26T14:43:24+00:00\",\"dateModified\":\"2026-03-26T14:43:28+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/intellectual-property-data\\\/\"},\"wordCount\":471,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/intellectual-property-data\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/LEX-Part-1-Invisible-Heist-scaled.jpg\",\"articleSection\":[\"Blog\",\"IP + Trade Secrets + Employee Risk\"],\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/idsinc.com\\\/intellectual-property-data\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/intellectual-property-data\\\/\",\"url\":\"https:\\\/\\\/idsinc.com\\\/intellectual-property-data\\\/\",\"name\":\"When Intellectual Property Walks Out the Door, Data Stays Behind\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/intellectual-property-data\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/intellectual-property-data\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/LEX-Part-1-Invisible-Heist-scaled.jpg\",\"datePublished\":\"2026-03-26T14:43:24+00:00\",\"dateModified\":\"2026-03-26T14:43:28+00:00\",\"description\":\"The most damaging corporate heists today involves departing employees. Intellectual property data can walk out the door without a sound.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/intellectual-property-data\\\/#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/idsinc.com\\\/intellectual-property-data\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/intellectual-property-data\\\/#primaryimage\",\"url\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/LEX-Part-1-Invisible-Heist-scaled.jpg\",\"contentUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/LEX-Part-1-Invisible-Heist-scaled.jpg\",\"width\":1920,\"height\":960,\"caption\":\"The most damaging corporate heists today involves departing employees. Intellectual property data can walk out the door without a sound.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/intellectual-property-data\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/idsinc.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blog\",\"item\":\"https:\\\/\\\/idsinc.com\\\/de\\\/category\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"When Intellectual Property Walks Out the Door, the Data Stays Behind\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#website\",\"url\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/\",\"name\":\"iDiscovery Solutions\",\"description\":\"Use data to your advantage in the courtroom\",\"publisher\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#organization\"},\"alternateName\":\"iDS\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#organization\",\"name\":\"iDiscovery Solutions\",\"alternateName\":\"iDS\",\"url\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/iDS-Logo-3c-e1611176096212.png\",\"contentUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/iDS-Logo-3c-e1611176096212.png\",\"width\":100,\"height\":73,\"caption\":\"iDiscovery Solutions\"},\"image\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/iDiscovery-Solutions-110210573904472\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/idsinc\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCarv7o1MeYfCp0eZ1IrufIw\"],\"description\":\"iDS provides consultative data solutions to corporations and law firms around the world, giving them a decisive advantage \u2013 both in and out of the courtroom. iDS\u2019s subject matter experts and data strategists specialize in finding solutions to complex data problems, ensuring data can be leveraged as an asset, not a liability.\",\"email\":\"info@idsinc.com\",\"telephone\":\"+1.800.813.4832\",\"legalName\":\"iDiscovery Solutions\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/person\\\/bf7f03a502e8a54e558c44d0ff5d6736\",\"name\":\"iDiscovery Solutions\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6009d8a07526a79850b1d0045087bcee60e562f90891f19a42de7ee7f4452529?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6009d8a07526a79850b1d0045087bcee60e562f90891f19a42de7ee7f4452529?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6009d8a07526a79850b1d0045087bcee60e562f90891f19a42de7ee7f4452529?s=96&d=mm&r=g\",\"caption\":\"iDiscovery Solutions\"},\"url\":\"https:\\\/\\\/idsinc.com\\\/de\\\/author\\\/idiscovery\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Wenn geistiges Eigentum verloren geht, bleiben die Daten zur\u00fcck.","description":"Die sch\u00e4dlichsten Unternehmensdiebst\u00e4hle heutzutage betreffen ausscheidende Mitarbeiter. Geistige Eigentumsdaten k\u00f6nnen unbemerkt verschwinden.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/idsinc.com\/de\/daten-zum-geistigen-eigentum\/","og_locale":"de_DE","og_type":"article","og_title":"When Intellectual Property Walks Out the Door, the Data Stays Behind","og_description":"The most damaging corporate heists today involves departing employees. Intellectual property data can walk out the door without a sound.","og_url":"https:\/\/idsinc.com\/de\/daten-zum-geistigen-eigentum\/","og_site_name":"iDiscovery Solutions","article_publisher":"https:\/\/www.facebook.com\/iDiscovery-Solutions-110210573904472","article_published_time":"2026-03-26T14:43:24+00:00","article_modified_time":"2026-03-26T14:43:28+00:00","og_image":[{"width":1920,"height":960,"url":"https:\/\/idsinc.com\/wp-content\/uploads\/2026\/03\/LEX-Part-1-Invisible-Heist-scaled.jpg","type":"image\/jpeg"}],"author":"iDiscovery Solutions","twitter_card":"summary_large_image","twitter_misc":{"Verfasst von":"iDiscovery Solutions","Gesch\u00e4tzte Lesezeit":"3\u00a0Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/idsinc.com\/intellectual-property-data\/#article","isPartOf":{"@id":"https:\/\/idsinc.com\/intellectual-property-data\/"},"author":{"name":"iDiscovery Solutions","@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/person\/bf7f03a502e8a54e558c44d0ff5d6736"},"headline":"When Intellectual Property Walks Out the Door, the Data Stays Behind","datePublished":"2026-03-26T14:43:24+00:00","dateModified":"2026-03-26T14:43:28+00:00","mainEntityOfPage":{"@id":"https:\/\/idsinc.com\/intellectual-property-data\/"},"wordCount":471,"commentCount":0,"publisher":{"@id":"https:\/\/idsinc.com\/en_gb\/#organization"},"image":{"@id":"https:\/\/idsinc.com\/intellectual-property-data\/#primaryimage"},"thumbnailUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2026\/03\/LEX-Part-1-Invisible-Heist-scaled.jpg","articleSection":["Blog","IP + Trade Secrets + Employee Risk"],"inLanguage":"de","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/idsinc.com\/intellectual-property-data\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/idsinc.com\/intellectual-property-data\/","url":"https:\/\/idsinc.com\/intellectual-property-data\/","name":"Wenn geistiges Eigentum verloren geht, bleiben die Daten zur\u00fcck.","isPartOf":{"@id":"https:\/\/idsinc.com\/en_gb\/#website"},"primaryImageOfPage":{"@id":"https:\/\/idsinc.com\/intellectual-property-data\/#primaryimage"},"image":{"@id":"https:\/\/idsinc.com\/intellectual-property-data\/#primaryimage"},"thumbnailUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2026\/03\/LEX-Part-1-Invisible-Heist-scaled.jpg","datePublished":"2026-03-26T14:43:24+00:00","dateModified":"2026-03-26T14:43:28+00:00","description":"Die sch\u00e4dlichsten Unternehmensdiebst\u00e4hle heutzutage betreffen ausscheidende Mitarbeiter. Geistige Eigentumsdaten k\u00f6nnen unbemerkt verschwinden.","breadcrumb":{"@id":"https:\/\/idsinc.com\/intellectual-property-data\/#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/idsinc.com\/intellectual-property-data\/"]}]},{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/idsinc.com\/intellectual-property-data\/#primaryimage","url":"https:\/\/idsinc.com\/wp-content\/uploads\/2026\/03\/LEX-Part-1-Invisible-Heist-scaled.jpg","contentUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2026\/03\/LEX-Part-1-Invisible-Heist-scaled.jpg","width":1920,"height":960,"caption":"The most damaging corporate heists today involves departing employees. Intellectual property data can walk out the door without a sound."},{"@type":"BreadcrumbList","@id":"https:\/\/idsinc.com\/intellectual-property-data\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/idsinc.com\/"},{"@type":"ListItem","position":2,"name":"Blog","item":"https:\/\/idsinc.com\/de\/category\/blog\/"},{"@type":"ListItem","position":3,"name":"When Intellectual Property Walks Out the Door, the Data Stays Behind"}]},{"@type":"WebSite","@id":"https:\/\/idsinc.com\/en_gb\/#website","url":"https:\/\/idsinc.com\/en_gb\/","name":"iDiscovery-L\u00f6sungen","description":"Nutzen Sie Daten im Gerichtssaal zu Ihrem Vorteil","publisher":{"@id":"https:\/\/idsinc.com\/en_gb\/#organization"},"alternateName":"iDS","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/idsinc.com\/en_gb\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"},{"@type":"Organization","@id":"https:\/\/idsinc.com\/en_gb\/#organization","name":"iDiscovery-L\u00f6sungen","alternateName":"iDS","url":"https:\/\/idsinc.com\/en_gb\/","logo":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/logo\/image\/","url":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/iDS-Logo-3c-e1611176096212.png","contentUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/iDS-Logo-3c-e1611176096212.png","width":100,"height":73,"caption":"iDiscovery Solutions"},"image":{"@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/iDiscovery-Solutions-110210573904472","https:\/\/www.linkedin.com\/company\/idsinc","https:\/\/www.youtube.com\/channel\/UCarv7o1MeYfCp0eZ1IrufIw"],"description":"iDS bietet Unternehmen und Anwaltskanzleien weltweit beratende Datenl\u00f6sungen und verschafft ihnen damit einen entscheidenden Vorteil \u2013 sowohl vor als auch au\u00dferhalb des Gerichtssaals. Die Fachexperten und Datenstrategen von iDS sind auf die L\u00f6sung komplexer Datenprobleme spezialisiert und stellen sicher, dass Daten als Vorteil und nicht als Belastung genutzt werden.","email":"info@idsinc.com","telephone":"+1.800.813.4832","legalName":"iDiscovery Solutions"},{"@type":"Person","@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/person\/bf7f03a502e8a54e558c44d0ff5d6736","name":"iDiscovery-L\u00f6sungen","image":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/secure.gravatar.com\/avatar\/6009d8a07526a79850b1d0045087bcee60e562f90891f19a42de7ee7f4452529?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/6009d8a07526a79850b1d0045087bcee60e562f90891f19a42de7ee7f4452529?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/6009d8a07526a79850b1d0045087bcee60e562f90891f19a42de7ee7f4452529?s=96&d=mm&r=g","caption":"iDiscovery Solutions"},"url":"https:\/\/idsinc.com\/de\/author\/idiscovery\/"}]}},"builder_content":"","_links":{"self":[{"href":"https:\/\/idsinc.com\/de\/wp-json\/wp\/v2\/posts\/9572","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/idsinc.com\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/idsinc.com\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/idsinc.com\/de\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/idsinc.com\/de\/wp-json\/wp\/v2\/comments?post=9572"}],"version-history":[{"count":2,"href":"https:\/\/idsinc.com\/de\/wp-json\/wp\/v2\/posts\/9572\/revisions"}],"predecessor-version":[{"id":9578,"href":"https:\/\/idsinc.com\/de\/wp-json\/wp\/v2\/posts\/9572\/revisions\/9578"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/idsinc.com\/de\/wp-json\/wp\/v2\/media\/9573"}],"wp:attachment":[{"href":"https:\/\/idsinc.com\/de\/wp-json\/wp\/v2\/media?parent=9572"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/idsinc.com\/de\/wp-json\/wp\/v2\/categories?post=9572"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/idsinc.com\/de\/wp-json\/wp\/v2\/tags?post=9572"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}