{"id":2493,"date":"2021-12-03T10:29:20","date_gmt":"2021-12-03T16:29:20","guid":{"rendered":"https:\/\/staging2.idsinc.com\/case-studies\/leveraging-structured-data-as-a-competitive-advantage-leads-to-class-decertification-copy\/"},"modified":"2025-03-10T09:50:09","modified_gmt":"2025-03-10T15:50:09","slug":"employees-gone-bad","status":"publish","type":"page","link":"https:\/\/idsinc.com\/en_gb\/case-studies\/employees-gone-bad\/","title":{"rendered":"Employees Gone Bad &#8211; iDS Helps Determine Who Took What Company Data to a Competitor"},"content":{"rendered":"<!--themify_builder_content-->\n<div id=\"themify_builder_content-2493\" data-postid=\"2493\" class=\"themify_builder_content themify_builder_content-2493 themify_builder tf_clear\">\n                    <div  data-lazy=\"1\" class=\"module_row themify_builder_row tb_0inr517 tb_first tf_w\">\n                        <div class=\"row_inner col_align_top tb_col_count_1 tf_box tf_rel\">\n                        <div  data-lazy=\"1\" class=\"module_column tb-column col-full tb_lvao519 first\">\n                    <!-- module image -->\n<div  class=\"module module-image tb_e7rr519 image-full-overlay   auto_fullwidth tf_mw\" data-lazy=\"1\">\n        <div class=\"image-wrap tf_rel tf_mw\">\n            <img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"512\" src=\"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/12\/iDS-CaseStudyImages-20213-employeegonebad-1024x512.jpg\" class=\"wp-post-image wp-image-2479\" title=\"Employees Gone Bad - iDS Helps Determine Who Took What Company Data to a Competitor\" alt=\"Employees Gone Bad - iDS Helps Determine Who Took What Company Data to a Competitor\" srcset=\"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/12\/iDS-CaseStudyImages-20213-employeegonebad-1024x512.jpg 1024w, https:\/\/idsinc.com\/wp-content\/uploads\/2021\/12\/iDS-CaseStudyImages-20213-employeegonebad-300x150.jpg 300w, https:\/\/idsinc.com\/wp-content\/uploads\/2021\/12\/iDS-CaseStudyImages-20213-employeegonebad-768x384.jpg 768w, https:\/\/idsinc.com\/wp-content\/uploads\/2021\/12\/iDS-CaseStudyImages-20213-employeegonebad-1536x768.jpg 1536w, https:\/\/idsinc.com\/wp-content\/uploads\/2021\/12\/iDS-CaseStudyImages-20213-employeegonebad-2048x1024.jpg 2048w, https:\/\/idsinc.com\/wp-content\/uploads\/2021\/12\/iDS-CaseStudyImages-20213-employeegonebad-1320x660.jpg 1320w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/>    \n        <\/div>\n    <!-- \/image-wrap -->\n    \n        <\/div>\n<!-- \/module image -->        <\/div>\n                        <\/div>\n        <\/div>\n                        <div  data-lazy=\"1\" class=\"module_row themify_builder_row tb_nbz3517 tf_w\">\n                        <div class=\"row_inner col_align_top tb_col_count_1 tf_box tf_rel\">\n                        <div  data-lazy=\"1\" class=\"module_column tb-column col-full tb_trj3521 first\">\n                    <!-- module fancy heading -->\n<div  class=\"module module-fancy-heading tb_5cbv695\" data-lazy=\"1\">\n        <h2 class=\"fancy-heading\">\n    <span class=\"main-head tf_block\">\n                    CHALLENGE            <\/span>\n\n    \n    <span class=\"sub-head tf_block tf_rel\">\n                                <\/span>\n    <\/h2>\n<\/div>\n<!-- \/module fancy heading -->\n<!-- module text -->\n<div  class=\"module module-text tb_22xu522\" data-lazy=\"1\">\n        <div  class=\"tb_text_wrap\">\n        <div class=\"page\" title=\"Page 1\">\n<div class=\"layoutArea\">\n<div class=\"column\">\n<h5>Our client received a tip from a customer that an ex-employee had contacted them with confidential pricing they believed had been misappropriated from the ex-employee\u2019s previous employer.<\/h5>\n<p>Our client needed to conduct an internal investigation to determine if confidential proprietary or trade secret information had been misappropriated, if restrictive covenants had been violated, and if a non-compete had been violated. Specifically, the client had several questions that needed to be answered:<\/p>\n<ul>\n<li>What (if any) external devices had been used on the ex-employee\u2019s laptop, and when<\/li>\n<li>What (if any) files were present on these external devices<\/li>\n<li>Was there any evidence that company data had been exfiltrated through any means other than USB (i.e., the cloud, email, printers, etc.)<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div>    <\/div>\n<\/div>\n<!-- \/module text --><!-- module fancy heading -->\n<div  class=\"module module-fancy-heading tb_p71z207\" data-lazy=\"1\">\n        <h2 class=\"fancy-heading\">\n    <span class=\"main-head tf_block\">\n                    Solution            <\/span>\n\n    \n    <span class=\"sub-head tf_block tf_rel\">\n                                <\/span>\n    <\/h2>\n<\/div>\n<!-- \/module fancy heading -->\n<!-- module text -->\n<div  class=\"module module-text tb_jros522\" data-lazy=\"1\">\n        <div  class=\"tb_text_wrap\">\n        <div class=\"page\" title=\"Page 1\">\n<div class=\"layoutArea\">\n<div class=\"column\">\n<h5>iDS Forensics Team liaised with the client\u2019s IT group to remotely deploy a forensic imaging kit for the computer in question.\u00a0<\/h5>\n<p>The iDS Forensics Team also captured Office365 audit logs and a foresnically sound copy of the email account. Our team performed analysis and reported on the following:<\/p>\n<ul>\n<li>Identification of connected devices, files being opened from those devices, and that other devices had also been used<\/li>\n<li>Identification that the corporate email system had been used to send sensitive company documents outside the network<\/li>\n<li>Identification of third-party cloud systems that had company data synchronized to them<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div>    <\/div>\n<\/div>\n<!-- \/module text --><!-- module fancy heading -->\n<div  class=\"module module-fancy-heading tb_h5mz33\" data-lazy=\"1\">\n        <h2 class=\"fancy-heading\">\n    <span class=\"main-head tf_block\">\n                    Result            <\/span>\n\n    \n    <span class=\"sub-head tf_block tf_rel\">\n                                <\/span>\n    <\/h2>\n<\/div>\n<!-- \/module fancy heading -->\n<!-- module text -->\n<div  class=\"module module-text tb_2r04523\" data-lazy=\"1\">\n        <div  class=\"tb_text_wrap\">\n        <div class=\"page\" title=\"Page 1\">\n<div class=\"layoutArea\">\n<div class=\"column\">\n<h5>iDS was able to identify that company data had been exhiltrated, how it had been exfiltrated, and when it had become exfiltrated. We also identified additional individuals that had been involved in the same type of activity.\u00a0<\/h5>\n<p>Our client, leveraging findings and the reports created over the course of just one business week, was able to obtain a temporary restraining order, followed by a preliminary injunction, and ultimately a favorable settlement to recover lost revenue based on the activities of the departed employees.<\/p>\n<\/div>\n<\/div>\n<\/div>    <\/div>\n<\/div>\n<!-- \/module text -->        <\/div>\n                        <\/div>\n        <\/div>\n        <\/div>\n<!--\/themify_builder_content-->","protected":false},"excerpt":{"rendered":"<p>Our client received a tip from a customer that an ex-employee had contacted them with confidential pricing they believed had been misappropriated from the ex-employee\u2019s previous employer. Our client needed to conduct an internal investigation to determine if confidential proprietary or trade secret information had been misappropriated, if restrictive covenants had been violated, and if [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":2479,"parent":33,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"team":[],"class_list":["post-2493","page","type-page","status-publish","has-post-thumbnail","hentry","has-post-title","has-post-date","has-post-category","has-post-tag","has-post-comment","has-post-author",""],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.6 (Yoast SEO v27.6) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Employees Gone Bad - iDiscovery Solutions<\/title>\n<meta name=\"description\" content=\"Employees Gone Bad - iDiscovery Solutions Helps Determine What Employee Took Valuable Company Data to a Competitor.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/idsinc.com\/en_gb\/case-studies\/employees-gone-bad\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Employees Gone Bad - iDS Helps Determine Who Took What Company Data to a Competitor\" \/>\n<meta property=\"og:description\" content=\"Employees Gone Bad - iDiscovery Solutions Helps Determine What Employee Took Valuable Company Data to a Competitor.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/idsinc.com\/en_gb\/case-studies\/employees-gone-bad\/\" \/>\n<meta property=\"og:site_name\" content=\"iDiscovery Solutions\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/iDiscovery-Solutions-110210573904472\" \/>\n<meta property=\"article:modified_time\" content=\"2025-03-10T15:50:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/12\/iDS-CaseStudyImages-20213-employeegonebad.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2500\" \/>\n\t<meta property=\"og:image:height\" content=\"1250\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/case-studies\\\/employees-gone-bad\\\/\",\"url\":\"https:\\\/\\\/idsinc.com\\\/case-studies\\\/employees-gone-bad\\\/\",\"name\":\"Employees Gone Bad - iDiscovery Solutions\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/case-studies\\\/employees-gone-bad\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/case-studies\\\/employees-gone-bad\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/12\\\/iDS-CaseStudyImages-20213-employeegonebad.jpg\",\"datePublished\":\"2021-12-03T16:29:20+00:00\",\"dateModified\":\"2025-03-10T15:50:09+00:00\",\"description\":\"Employees Gone Bad - iDiscovery Solutions Helps Determine What Employee Took Valuable Company Data to a Competitor.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/case-studies\\\/employees-gone-bad\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/idsinc.com\\\/case-studies\\\/employees-gone-bad\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/case-studies\\\/employees-gone-bad\\\/#primaryimage\",\"url\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/12\\\/iDS-CaseStudyImages-20213-employeegonebad.jpg\",\"contentUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/12\\\/iDS-CaseStudyImages-20213-employeegonebad.jpg\",\"width\":2500,\"height\":1250},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/case-studies\\\/employees-gone-bad\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/idsinc.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Case Studies\",\"item\":\"https:\\\/\\\/idsinc.com\\\/case-studies\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Employees Gone Bad &#8211; iDS Helps Determine Who Took What Company Data to a Competitor\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#website\",\"url\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/\",\"name\":\"iDiscovery Solutions\",\"description\":\"Use data to your advantage in the courtroom\",\"publisher\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#organization\"},\"alternateName\":\"iDS\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#organization\",\"name\":\"iDiscovery Solutions\",\"alternateName\":\"iDS\",\"url\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/iDS-Logo-3c-e1611176096212.png\",\"contentUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/iDS-Logo-3c-e1611176096212.png\",\"width\":100,\"height\":73,\"caption\":\"iDiscovery Solutions\"},\"image\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/iDiscovery-Solutions-110210573904472\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/idsinc\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCarv7o1MeYfCp0eZ1IrufIw\"],\"description\":\"iDS provides consultative data solutions to corporations and law firms around the world, giving them a decisive advantage \u2013 both in and out of the courtroom. iDS\u2019s subject matter experts and data strategists specialize in finding solutions to complex data problems, ensuring data can be leveraged as an asset, not a liability.\",\"email\":\"info@idsinc.com\",\"telephone\":\"+1.800.813.4832\",\"legalName\":\"iDiscovery Solutions\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Employees Gone Bad - iDiscovery Solutions","description":"Employees Gone Bad - iDiscovery Solutions Helps Determine What Employee Took Valuable Company Data to a Competitor.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/idsinc.com\/en_gb\/case-studies\/employees-gone-bad\/","og_locale":"en_GB","og_type":"article","og_title":"Employees Gone Bad - iDS Helps Determine Who Took What Company Data to a Competitor","og_description":"Employees Gone Bad - iDiscovery Solutions Helps Determine What Employee Took Valuable Company Data to a Competitor.","og_url":"https:\/\/idsinc.com\/en_gb\/case-studies\/employees-gone-bad\/","og_site_name":"iDiscovery Solutions","article_publisher":"https:\/\/www.facebook.com\/iDiscovery-Solutions-110210573904472","article_modified_time":"2025-03-10T15:50:09+00:00","og_image":[{"width":2500,"height":1250,"url":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/12\/iDS-CaseStudyImages-20213-employeegonebad.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Estimated reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/idsinc.com\/case-studies\/employees-gone-bad\/","url":"https:\/\/idsinc.com\/case-studies\/employees-gone-bad\/","name":"Employees Gone Bad - iDiscovery Solutions","isPartOf":{"@id":"https:\/\/idsinc.com\/en_gb\/#website"},"primaryImageOfPage":{"@id":"https:\/\/idsinc.com\/case-studies\/employees-gone-bad\/#primaryimage"},"image":{"@id":"https:\/\/idsinc.com\/case-studies\/employees-gone-bad\/#primaryimage"},"thumbnailUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/12\/iDS-CaseStudyImages-20213-employeegonebad.jpg","datePublished":"2021-12-03T16:29:20+00:00","dateModified":"2025-03-10T15:50:09+00:00","description":"Employees Gone Bad - iDiscovery Solutions Helps Determine What Employee Took Valuable Company Data to a Competitor.","breadcrumb":{"@id":"https:\/\/idsinc.com\/case-studies\/employees-gone-bad\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/idsinc.com\/case-studies\/employees-gone-bad\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/idsinc.com\/case-studies\/employees-gone-bad\/#primaryimage","url":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/12\/iDS-CaseStudyImages-20213-employeegonebad.jpg","contentUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/12\/iDS-CaseStudyImages-20213-employeegonebad.jpg","width":2500,"height":1250},{"@type":"BreadcrumbList","@id":"https:\/\/idsinc.com\/case-studies\/employees-gone-bad\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/idsinc.com\/"},{"@type":"ListItem","position":2,"name":"Case Studies","item":"https:\/\/idsinc.com\/case-studies\/"},{"@type":"ListItem","position":3,"name":"Employees Gone Bad &#8211; iDS Helps Determine Who Took What Company Data to a Competitor"}]},{"@type":"WebSite","@id":"https:\/\/idsinc.com\/en_gb\/#website","url":"https:\/\/idsinc.com\/en_gb\/","name":"iDiscovery Solutions","description":"Use data to your advantage in the courtroom","publisher":{"@id":"https:\/\/idsinc.com\/en_gb\/#organization"},"alternateName":"iDS","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/idsinc.com\/en_gb\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/idsinc.com\/en_gb\/#organization","name":"iDiscovery Solutions","alternateName":"iDS","url":"https:\/\/idsinc.com\/en_gb\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/logo\/image\/","url":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/iDS-Logo-3c-e1611176096212.png","contentUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/iDS-Logo-3c-e1611176096212.png","width":100,"height":73,"caption":"iDiscovery Solutions"},"image":{"@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/iDiscovery-Solutions-110210573904472","https:\/\/www.linkedin.com\/company\/idsinc","https:\/\/www.youtube.com\/channel\/UCarv7o1MeYfCp0eZ1IrufIw"],"description":"iDS provides consultative data solutions to corporations and law firms around the world, giving them a decisive advantage \u2013 both in and out of the courtroom. iDS\u2019s subject matter experts and data strategists specialize in finding solutions to complex data problems, ensuring data can be leveraged as an asset, not a liability.","email":"info@idsinc.com","telephone":"+1.800.813.4832","legalName":"iDiscovery Solutions"}]}},"builder_content":"<img src=\"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/12\/iDS-CaseStudyImages-20213-employeegonebad-1024x512.jpg\" title=\"Employees Gone Bad &#8211; iDS Helps Determine Who Took What Company Data to a Competitor\" alt=\"Employees Gone Bad &#8211; iDS Helps Determine Who Took What Company Data to a Competitor\" srcset=\"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/12\/iDS-CaseStudyImages-20213-employeegonebad-1024x512.jpg 1024w, https:\/\/idsinc.com\/wp-content\/uploads\/2021\/12\/iDS-CaseStudyImages-20213-employeegonebad-300x150.jpg 300w, https:\/\/idsinc.com\/wp-content\/uploads\/2021\/12\/iDS-CaseStudyImages-20213-employeegonebad-768x384.jpg 768w, https:\/\/idsinc.com\/wp-content\/uploads\/2021\/12\/iDS-CaseStudyImages-20213-employeegonebad-1536x768.jpg 1536w, https:\/\/idsinc.com\/wp-content\/uploads\/2021\/12\/iDS-CaseStudyImages-20213-employeegonebad-2048x1024.jpg 2048w, https:\/\/idsinc.com\/wp-content\/uploads\/2021\/12\/iDS-CaseStudyImages-20213-employeegonebad-1320x660.jpg 1320w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/> <h1> Employees Gone Bad &#8211; iDS Helps Determine Who Took What Company Data to a Competitor <\/h1>\n<h2>CHALLENGE<br\/><\/h2>\n<h5>Our client received a tip from a customer that an ex-employee had contacted them with confidential pricing they believed had been misappropriated from the ex-employee\u2019s previous employer.<\/h5> <p>Our client needed to conduct an internal investigation to determine if confidential proprietary or trade secret information had been misappropriated, if restrictive covenants had been violated, and if a non-compete had been violated. Specifically, the client had several questions that needed to be answered:<\/p> <ul> <li>What (if any) external devices had been used on the ex-employee\u2019s laptop, and when<\/li> <li>What (if any) files were present on these external devices<\/li> <li>Was there any evidence that company data had been exfiltrated through any means other than USB (i.e., the cloud, email, printers, etc.)<\/li> <\/ul>\n<h2>Solution<br\/><\/h2>\n<h5>iDS Forensics Team liaised with the client\u2019s IT group to remotely deploy a forensic imaging kit for the computer in question.\u00a0<\/h5> <p>The iDS Forensics Team also captured Office365 audit logs and a foresnically sound copy of the email account. Our team performed analysis and reported on the following:<\/p> <ul> <li>Identification of connected devices, files being opened from those devices, and that other devices had also been used<\/li> <li>Identification that the corporate email system had been used to send sensitive company documents outside the network<\/li> <li>Identification of third-party cloud systems that had company data synchronized to them<\/li> <\/ul>\n<h2>Result<br\/><\/h2>\n<h5>iDS was able to identify that company data had been exhiltrated, how it had been exfiltrated, and when it had become exfiltrated. We also identified additional individuals that had been involved in the same type of activity.\u00a0<\/h5> <p>Our client, leveraging findings and the reports created over the course of just one business week, was able to obtain a temporary restraining order, followed by a preliminary injunction, and ultimately a favorable settlement to recover lost revenue based on the activities of the departed employees.<\/p>","_links":{"self":[{"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/pages\/2493","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/comments?post=2493"}],"version-history":[{"count":1,"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/pages\/2493\/revisions"}],"predecessor-version":[{"id":7709,"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/pages\/2493\/revisions\/7709"}],"up":[{"embeddable":true,"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/pages\/33"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/media\/2479"}],"wp:attachment":[{"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/media?parent=2493"}],"wp:term":[{"taxonomy":"team","embeddable":true,"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/team?post=2493"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}