{"id":2519,"date":"2021-12-03T10:59:07","date_gmt":"2021-12-03T16:59:07","guid":{"rendered":"https:\/\/staging2.idsinc.com\/case-studies\/insight-into-copyright-infringement-copy\/"},"modified":"2022-12-07T14:12:15","modified_gmt":"2022-12-07T20:12:15","slug":"user-activity","status":"publish","type":"page","link":"https:\/\/idsinc.com\/en_gb\/case-studies\/user-activity\/","title":{"rendered":"Insight Into User Activity Provides Case Team Assurance Regarding Departed Employee Behavior"},"content":{"rendered":"<!--themify_builder_content-->\n<div id=\"themify_builder_content-2519\" data-postid=\"2519\" class=\"themify_builder_content themify_builder_content-2519 themify_builder tf_clear\">\n                    <div  data-lazy=\"1\" class=\"module_row themify_builder_row tb_8642551 tb_first tf_w\">\n                        <div class=\"row_inner col_align_top tb_col_count_1 tf_box tf_rel\">\n                        <div  data-lazy=\"1\" class=\"module_column tb-column col-full tb_f2sh552 first\">\n                    <!-- module image -->\n<div  class=\"module module-image tb_dm2e552 image-full-overlay   auto_fullwidth tf_mw\" data-lazy=\"1\">\n        <div class=\"image-wrap tf_rel tf_mw\">\n            <img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"512\" src=\"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/12\/iDS-CaseStudyImages-20215-employeebehavior-1024x512.jpg\" class=\"wp-post-image wp-image-2481\" title=\"Insight Into User Activity Provides Case Team Assurance Regarding Departed Employee Behavior\" alt=\"Insight Into User Activity Provides Case Team Assurance Regarding Departed Employee Behavior\" srcset=\"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/12\/iDS-CaseStudyImages-20215-employeebehavior-1024x512.jpg 1024w, https:\/\/idsinc.com\/wp-content\/uploads\/2021\/12\/iDS-CaseStudyImages-20215-employeebehavior-300x150.jpg 300w, https:\/\/idsinc.com\/wp-content\/uploads\/2021\/12\/iDS-CaseStudyImages-20215-employeebehavior-768x384.jpg 768w, https:\/\/idsinc.com\/wp-content\/uploads\/2021\/12\/iDS-CaseStudyImages-20215-employeebehavior-1536x768.jpg 1536w, https:\/\/idsinc.com\/wp-content\/uploads\/2021\/12\/iDS-CaseStudyImages-20215-employeebehavior-2048x1024.jpg 2048w, https:\/\/idsinc.com\/wp-content\/uploads\/2021\/12\/iDS-CaseStudyImages-20215-employeebehavior-1320x660.jpg 1320w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/>    \n        <\/div>\n    <!-- \/image-wrap -->\n    \n        <\/div>\n<!-- \/module image -->        <\/div>\n                        <\/div>\n        <\/div>\n                        <div  data-lazy=\"1\" class=\"module_row themify_builder_row tb_chlv551 tf_w\">\n                        <div class=\"row_inner col_align_top tb_col_count_1 tf_box tf_rel\">\n                        <div  data-lazy=\"1\" class=\"module_column tb-column col-full tb_u72k553 first\">\n                    <!-- module fancy heading -->\n<div  class=\"module module-fancy-heading tb_tpbo553\" data-lazy=\"1\">\n        <h1 class=\"fancy-heading\">\n    <span class=\"main-head tf_block\">\n                    FACTS AT A GLANCE            <\/span>\n\n    \n    <span class=\"sub-head tf_block tf_rel\">\n                                <\/span>\n    <\/h1>\n<\/div>\n<!-- \/module fancy heading -->\n        <div  data-lazy=\"1\" class=\"module_subrow themify_builder_sub_row tf_w col_align_top tb_col_count_2 tb_gttj27\">\n                <div  data-lazy=\"1\" class=\"module_column sub_column col2-1 tb_hjpe28 first\">\n                    <!-- module text -->\n<div  class=\"module module-text tb_psxo554\" data-lazy=\"1\">\n        <div  class=\"tb_text_wrap\">\n        <div class=\"page\" title=\"Page 1\">\n<div class=\"layoutArea\">\n<div class=\"column\">\n<ul>\n<li>Healthcare services provider had concerns regarding a departed employee that may have maintained proprietary company information post departure<\/li>\n<li>Departed employee went to work for a direct competitor<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div>    <\/div>\n<\/div>\n<!-- \/module text -->        <\/div>\n                    <div  data-lazy=\"1\" class=\"module_column sub_column col2-1 tb_ddsm28 last\">\n                    <!-- module text -->\n<div  class=\"module module-text tb_mxvl265\" data-lazy=\"1\">\n        <div  class=\"tb_text_wrap\">\n        <div class=\"page\" title=\"Page 1\">\n<div class=\"layoutArea\">\n<div class=\"column\">\n<ul>\n<li>iDS engaged to collect and analyze departed employee laptop<\/li>\n<li>Counsel quickly gained insight to proprietary information\u2019s level of risk and appropriately advised the health services provider on next steps<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div>    <\/div>\n<\/div>\n<!-- \/module text -->        <\/div>\n                    <\/div>\n        <!-- module fancy heading -->\n<div  class=\"module module-fancy-heading tb_c0hm795\" data-lazy=\"1\">\n        <h1 class=\"fancy-heading\">\n    <span class=\"main-head tf_block\">\n                    CHALLENGE            <\/span>\n\n    \n    <span class=\"sub-head tf_block tf_rel\">\n                                <\/span>\n    <\/h1>\n<\/div>\n<!-- \/module fancy heading -->\n<!-- module text -->\n<div  class=\"module module-text tb_en6r196\" data-lazy=\"1\">\n        <div  class=\"tb_text_wrap\">\n        <div class=\"page\" title=\"Page 1\">\n<div class=\"layoutArea\">\n<div class=\"column\">\n<h5>Assist a client in analyzing data gathered from a departed employee\u2019s laptop. <\/h5>\n<p>Our client, a US based healthcare services provider, learned that a departed employee was working for a direct competitor, joining a group of several former employees all now working for the same direct competitor. Because the recently departed employee had access to proprietary company information related to confidential company business, iDS was engaged to collect and analyze the departed employee\u2019s laptop computer for the following: <\/p>\n<p><strong>iDS was tasked to collect and analyze:<br><\/strong><\/p>\n<ul>\n<li>Access of proprietary electronically stored information (\u201cESI\u201d)<\/li>\n<li>Use of cloud-based data storage technologies and USB devices<\/li>\n<li>Analysis of attachments sent to personal email addresses<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div>    <\/div>\n<\/div>\n<!-- \/module text --><!-- module fancy heading -->\n<div  class=\"module module-fancy-heading tb_vee8555\" data-lazy=\"1\">\n        <h1 class=\"fancy-heading\">\n    <span class=\"main-head tf_block\">\n                    Solution            <\/span>\n\n    \n    <span class=\"sub-head tf_block tf_rel\">\n                                <\/span>\n    <\/h1>\n<\/div>\n<!-- \/module fancy heading -->\n<!-- module text -->\n<div  class=\"module module-text tb_8id7555\" data-lazy=\"1\">\n        <div  class=\"tb_text_wrap\">\n        <div class=\"page\" title=\"Page 1\">\n<div class=\"layoutArea\">\n<div class=\"column\">\n<h5>iDS implemented Employee Risk Assessment, an iDS Expert Solution. <\/h5>\n<p>This fixed priced service offering provided our client with a risk profile related to the departed employee behavior. Specifically this service included:<\/p>\n<ul>\n<li>Analysis of USB device usage, including newly installed devises and when available, a listing of files and folders stored on the USB devices<\/li>\n<li>Access to known cloud storage systems and personal email systems that may have been used to transfer proprietary and confidential information<\/li>\n<li>Inappropriate access of proprietary and confidential ESI, including changes in behavior related to ESI access<\/li>\n<li>Risk level evaluation with an iDS Expert, and recommendations for next steps (if any)<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div>    <\/div>\n<\/div>\n<!-- \/module text --><!-- module fancy heading -->\n<div  class=\"module module-fancy-heading tb_8qgb555\" data-lazy=\"1\">\n        <h1 class=\"fancy-heading\">\n    <span class=\"main-head tf_block\">\n                    Result            <\/span>\n\n    \n    <span class=\"sub-head tf_block tf_rel\">\n                                <\/span>\n    <\/h1>\n<\/div>\n<!-- \/module fancy heading -->\n<!-- module text -->\n<div  class=\"module module-text tb_nj9l556\" data-lazy=\"1\">\n        <div  class=\"tb_text_wrap\">\n        <div class=\"page\" title=\"Page 1\">\n<div class=\"layoutArea\">\n<div class=\"column\">\n<h5>Within 48 hours of laptop receipt, an iDS Expert was on the phone with counsel for the healthcare services provider discussing the results of the ERA<sup>\u2122<\/sup> analysis.<\/h5>\n<p>In this instance, the ERA<sup>\u2122<\/sup> indicated a low risk of access and exfiltration of proprietary information and allowed counsel to advise their client appropriately on next steps.<\/p>\n<\/div>\n<\/div>\n<\/div>\n    <\/div>\n<\/div>\n<!-- \/module text -->        <\/div>\n                        <\/div>\n        <\/div>\n        <\/div>\n<!--\/themify_builder_content-->","protected":false},"excerpt":{"rendered":"<p>Healthcare services provider had concerns regarding a departed employee that may have maintained proprietary company information post departure Departed employee went to work for a direct competitor<\/p>","protected":false},"author":7,"featured_media":2481,"parent":33,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"team":[],"class_list":["post-2519","page","type-page","status-publish","has-post-thumbnail","hentry","has-post-title","has-post-date","has-post-category","has-post-tag","has-post-comment","has-post-author",""],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.6 (Yoast SEO v27.6) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Insight Into User Activity - iDiscovery Solutions<\/title>\n<meta name=\"description\" content=\"Insight Into User Activity Provides iDiscovery Solutions Case Team Assurance Regarding Departed Employee Behavior.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/idsinc.com\/en_gb\/case-studies\/user-activity\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Insight Into User Activity Provides Case Team Assurance Regarding Departed Employee Behavior\" \/>\n<meta property=\"og:description\" content=\"Insight Into User Activity Provides iDiscovery Solutions Case Team Assurance Regarding Departed Employee Behavior.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/idsinc.com\/en_gb\/case-studies\/user-activity\/\" \/>\n<meta property=\"og:site_name\" content=\"iDiscovery Solutions\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/iDiscovery-Solutions-110210573904472\" \/>\n<meta property=\"article:modified_time\" content=\"2022-12-07T20:12:15+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/12\/iDS-CaseStudyImages-20215-employeebehavior.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2500\" \/>\n\t<meta property=\"og:image:height\" content=\"1250\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/case-studies\\\/user-activity\\\/\",\"url\":\"https:\\\/\\\/idsinc.com\\\/case-studies\\\/user-activity\\\/\",\"name\":\"Insight Into User Activity - iDiscovery Solutions\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/case-studies\\\/user-activity\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/case-studies\\\/user-activity\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/12\\\/iDS-CaseStudyImages-20215-employeebehavior.jpg\",\"datePublished\":\"2021-12-03T16:59:07+00:00\",\"dateModified\":\"2022-12-07T20:12:15+00:00\",\"description\":\"Insight Into User Activity Provides iDiscovery Solutions Case Team Assurance Regarding Departed Employee Behavior.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/case-studies\\\/user-activity\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/idsinc.com\\\/case-studies\\\/user-activity\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/case-studies\\\/user-activity\\\/#primaryimage\",\"url\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/12\\\/iDS-CaseStudyImages-20215-employeebehavior.jpg\",\"contentUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/12\\\/iDS-CaseStudyImages-20215-employeebehavior.jpg\",\"width\":2500,\"height\":1250},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/case-studies\\\/user-activity\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/idsinc.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Case Studies\",\"item\":\"https:\\\/\\\/idsinc.com\\\/case-studies\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Insight Into User Activity Provides Case Team Assurance Regarding Departed Employee Behavior\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#website\",\"url\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/\",\"name\":\"iDiscovery Solutions\",\"description\":\"Use data to your advantage in the courtroom\",\"publisher\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#organization\"},\"alternateName\":\"iDS\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#organization\",\"name\":\"iDiscovery Solutions\",\"alternateName\":\"iDS\",\"url\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/iDS-Logo-3c-e1611176096212.png\",\"contentUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/iDS-Logo-3c-e1611176096212.png\",\"width\":100,\"height\":73,\"caption\":\"iDiscovery Solutions\"},\"image\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/iDiscovery-Solutions-110210573904472\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/idsinc\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCarv7o1MeYfCp0eZ1IrufIw\"],\"description\":\"iDS provides consultative data solutions to corporations and law firms around the world, giving them a decisive advantage \u2013 both in and out of the courtroom. iDS\u2019s subject matter experts and data strategists specialize in finding solutions to complex data problems, ensuring data can be leveraged as an asset, not a liability.\",\"email\":\"info@idsinc.com\",\"telephone\":\"+1.800.813.4832\",\"legalName\":\"iDiscovery Solutions\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Insight Into User Activity - iDiscovery Solutions","description":"Insight Into User Activity Provides iDiscovery Solutions Case Team Assurance Regarding Departed Employee Behavior.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/idsinc.com\/en_gb\/case-studies\/user-activity\/","og_locale":"en_GB","og_type":"article","og_title":"Insight Into User Activity Provides Case Team Assurance Regarding Departed Employee Behavior","og_description":"Insight Into User Activity Provides iDiscovery Solutions Case Team Assurance Regarding Departed Employee Behavior.","og_url":"https:\/\/idsinc.com\/en_gb\/case-studies\/user-activity\/","og_site_name":"iDiscovery Solutions","article_publisher":"https:\/\/www.facebook.com\/iDiscovery-Solutions-110210573904472","article_modified_time":"2022-12-07T20:12:15+00:00","og_image":[{"width":2500,"height":1250,"url":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/12\/iDS-CaseStudyImages-20215-employeebehavior.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/idsinc.com\/case-studies\/user-activity\/","url":"https:\/\/idsinc.com\/case-studies\/user-activity\/","name":"Insight Into User Activity - iDiscovery Solutions","isPartOf":{"@id":"https:\/\/idsinc.com\/en_gb\/#website"},"primaryImageOfPage":{"@id":"https:\/\/idsinc.com\/case-studies\/user-activity\/#primaryimage"},"image":{"@id":"https:\/\/idsinc.com\/case-studies\/user-activity\/#primaryimage"},"thumbnailUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/12\/iDS-CaseStudyImages-20215-employeebehavior.jpg","datePublished":"2021-12-03T16:59:07+00:00","dateModified":"2022-12-07T20:12:15+00:00","description":"Insight Into User Activity Provides iDiscovery Solutions Case Team Assurance Regarding Departed Employee Behavior.","breadcrumb":{"@id":"https:\/\/idsinc.com\/case-studies\/user-activity\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/idsinc.com\/case-studies\/user-activity\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/idsinc.com\/case-studies\/user-activity\/#primaryimage","url":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/12\/iDS-CaseStudyImages-20215-employeebehavior.jpg","contentUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/12\/iDS-CaseStudyImages-20215-employeebehavior.jpg","width":2500,"height":1250},{"@type":"BreadcrumbList","@id":"https:\/\/idsinc.com\/case-studies\/user-activity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/idsinc.com\/"},{"@type":"ListItem","position":2,"name":"Case Studies","item":"https:\/\/idsinc.com\/case-studies\/"},{"@type":"ListItem","position":3,"name":"Insight Into User Activity Provides Case Team Assurance Regarding Departed Employee Behavior"}]},{"@type":"WebSite","@id":"https:\/\/idsinc.com\/en_gb\/#website","url":"https:\/\/idsinc.com\/en_gb\/","name":"iDiscovery Solutions","description":"Use data to your advantage in the courtroom","publisher":{"@id":"https:\/\/idsinc.com\/en_gb\/#organization"},"alternateName":"iDS","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/idsinc.com\/en_gb\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/idsinc.com\/en_gb\/#organization","name":"iDiscovery Solutions","alternateName":"iDS","url":"https:\/\/idsinc.com\/en_gb\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/logo\/image\/","url":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/iDS-Logo-3c-e1611176096212.png","contentUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/iDS-Logo-3c-e1611176096212.png","width":100,"height":73,"caption":"iDiscovery Solutions"},"image":{"@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/iDiscovery-Solutions-110210573904472","https:\/\/www.linkedin.com\/company\/idsinc","https:\/\/www.youtube.com\/channel\/UCarv7o1MeYfCp0eZ1IrufIw"],"description":"iDS provides consultative data solutions to corporations and law firms around the world, giving them a decisive advantage \u2013 both in and out of the courtroom. iDS\u2019s subject matter experts and data strategists specialize in finding solutions to complex data problems, ensuring data can be leveraged as an asset, not a liability.","email":"info@idsinc.com","telephone":"+1.800.813.4832","legalName":"iDiscovery Solutions"}]}},"builder_content":"\n<h1>FACTS AT A GLANCE<br\/><\/h1>\n<ul> <li>Healthcare services provider had concerns regarding a departed employee that may have maintained proprietary company information post departure<\/li> <li>Departed employee went to work for a direct competitor<\/li> <\/ul>\n<ul> <li>iDS engaged to collect and analyze departed employee laptop<\/li> <li>Counsel quickly gained insight to proprietary information\u2019s level of risk and appropriately advised the health services provider on next steps<\/li> <\/ul>\n<h1>CHALLENGE<br\/><\/h1>\n<h5>Assist a client in analyzing data gathered from a departed employee\u2019s laptop. <\/h5> <p>Our client, a US based healthcare services provider, learned that a departed employee was working for a direct competitor, joining a group of several former employees all now working for the same direct competitor. Because the recently departed employee had access to proprietary company information related to confidential company business, iDS was engaged to collect and analyze the departed employee\u2019s laptop computer for the following: <\/p> <p><strong>iDS was tasked to collect and analyze:<br><\/strong><\/p> <ul> <li>Access of proprietary electronically stored information (\u201cESI\u201d)<\/li> <li>Use of cloud-based data storage technologies and USB devices<\/li> <li>Analysis of attachments sent to personal email addresses<\/li> <\/ul>\n<h1>Solution<br\/><\/h1>\n<h5>iDS implemented Employee Risk Assessment, an iDS Expert Solution. <\/h5> <p>This fixed priced service offering provided our client with a risk profile related to the departed employee behavior. Specifically this service included:<\/p> <ul> <li>Analysis of USB device usage, including newly installed devises and when available, a listing of files and folders stored on the USB devices<\/li> <li>Access to known cloud storage systems and personal email systems that may have been used to transfer proprietary and confidential information<\/li> <li>Inappropriate access of proprietary and confidential ESI, including changes in behavior related to ESI access<\/li> <li>Risk level evaluation with an iDS Expert, and recommendations for next steps (if any)<\/li> <\/ul>\n<h1>Result<br\/><\/h1>\n<h5>Within 48 hours of laptop receipt, an iDS Expert was on the phone with counsel for the healthcare services provider discussing the results of the ERA<sup>\u2122<\/sup> analysis.<\/h5> <p>In this instance, the ERA<sup>\u2122<\/sup> indicated a low risk of access and exfiltration of proprietary information and allowed counsel to advise their client appropriately on next steps.<\/p>","_links":{"self":[{"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/pages\/2519","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/comments?post=2519"}],"version-history":[{"count":0,"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/pages\/2519\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/pages\/33"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/media\/2481"}],"wp:attachment":[{"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/media?parent=2519"}],"wp:term":[{"taxonomy":"team","embeddable":true,"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/team?post=2519"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}