{"id":2583,"date":"2021-12-03T11:56:21","date_gmt":"2021-12-03T17:56:21","guid":{"rendered":"https:\/\/staging2.idsinc.com\/case-studies\/client-received-production-text-messages-as-pdfs-client-wanted-to-know-about-actual-texts-copy\/"},"modified":"2024-07-08T14:14:28","modified_gmt":"2024-07-08T20:14:28","slug":"access-company-system","status":"publish","type":"page","link":"https:\/\/idsinc.com\/en_gb\/case-studies\/access-company-system\/","title":{"rendered":"Internal Investigation of Inappropriate Employee Access to Company System"},"content":{"rendered":"<!--themify_builder_content-->\n<div id=\"themify_builder_content-2583\" data-postid=\"2583\" class=\"themify_builder_content themify_builder_content-2583 themify_builder tf_clear\">\n                    <div  data-lazy=\"1\" class=\"module_row themify_builder_row tb_7qz3623 tb_first tf_w\">\n                        <div class=\"row_inner col_align_top tb_col_count_1 tf_box tf_rel\">\n                        <div  data-lazy=\"1\" class=\"module_column tb-column col-full tb_u8e4624 first\">\n                    <!-- module image -->\n<div  class=\"module module-image tb_r9o6624 image-full-overlay   auto_fullwidth tf_mw\" data-lazy=\"1\">\n        <div class=\"image-wrap tf_rel tf_mw\">\n            <img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"512\" src=\"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/12\/iDS-CaseStudyImages-20219-accesscompanysystem-1024x512.jpg\" class=\"wp-post-image wp-image-2485\" title=\"Internal Investigation of Inappropriate Employee Access to Company System\" alt=\"Internal Investigation of Inappropriate Employee Access to Company System\" srcset=\"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/12\/iDS-CaseStudyImages-20219-accesscompanysystem-1024x512.jpg 1024w, https:\/\/idsinc.com\/wp-content\/uploads\/2021\/12\/iDS-CaseStudyImages-20219-accesscompanysystem-300x150.jpg 300w, https:\/\/idsinc.com\/wp-content\/uploads\/2021\/12\/iDS-CaseStudyImages-20219-accesscompanysystem-768x384.jpg 768w, https:\/\/idsinc.com\/wp-content\/uploads\/2021\/12\/iDS-CaseStudyImages-20219-accesscompanysystem-1536x768.jpg 1536w, https:\/\/idsinc.com\/wp-content\/uploads\/2021\/12\/iDS-CaseStudyImages-20219-accesscompanysystem-2048x1024.jpg 2048w, https:\/\/idsinc.com\/wp-content\/uploads\/2021\/12\/iDS-CaseStudyImages-20219-accesscompanysystem-1320x660.jpg 1320w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/>    \n        <\/div>\n    <!-- \/image-wrap -->\n    \n        <\/div>\n<!-- \/module image -->        <\/div>\n                        <\/div>\n        <\/div>\n                        <div  data-lazy=\"1\" class=\"module_row themify_builder_row tb_o55y623 tf_w\">\n                        <div class=\"row_inner col_align_top tb_col_count_1 tf_box tf_rel\">\n                        <div  data-lazy=\"1\" class=\"module_column tb-column col-full tb_m9r6625 first\">\n                    <!-- module fancy heading -->\n<div  class=\"module module-fancy-heading tb_umll625\" data-lazy=\"1\">\n        <h2 class=\"fancy-heading\">\n    <span class=\"main-head tf_block\">\n                    CHALLENGE            <\/span>\n\n    \n    <span class=\"sub-head tf_block tf_rel\">\n                                <\/span>\n    <\/h2>\n<\/div>\n<!-- \/module fancy heading -->\n<!-- module text -->\n<div  class=\"module module-text tb_g4v0626\" data-lazy=\"1\">\n        <div  class=\"tb_text_wrap\">\n        <div class=\"page\" title=\"Page 1\">\n<div class=\"layoutArea\">\n<div class=\"column\">\n<h5>Our client received an insider tip that an employee was inappropriately accessing historical payroll report stored within the client\u2019s secure infrastructure. <\/h5>\n<p>Our client needed to conduct an internal investigation, across international borders, to assess the potential of having to provide a data breach notification to employees as it related to inappropriate access to payroll data. Specifically, the client had three questions that needed to be answered:<\/p>\n<ul>\n<li>Which employee(s) (if any) accessed files within a certain directory on the network<\/li>\n<li>What files (if any) were accessed within that certain directory<\/li>\n<li>Was there any evidence that any of those files within that certain directory (accessed by the employee(s) under investigation) left the network<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div>    <\/div>\n<\/div>\n<!-- \/module text --><!-- module fancy heading -->\n<div  class=\"module module-fancy-heading tb_o4p6704\" data-lazy=\"1\">\n        <h2 class=\"fancy-heading\">\n    <span class=\"main-head tf_block\">\n                    Solution            <\/span>\n\n    \n    <span class=\"sub-head tf_block tf_rel\">\n                                <\/span>\n    <\/h2>\n<\/div>\n<!-- \/module fancy heading -->\n<!-- module text -->\n<div  class=\"module module-text tb_catb626\" data-lazy=\"1\">\n        <div  class=\"tb_text_wrap\">\n        <div class=\"page\" title=\"Page 1\">\n<div class=\"layoutArea\">\n<div class=\"column\">\n<h5>iDS Forensics Team liaised with the client\u2019s IT group to remotely deploy and acquire forensic artifacts that allowed iDS to leverage the xIOT\u00ae platform to analyze the activity of 150 individuals, all performed remotely and covertly.<\/h5>\n<p>The iDS Forensics Team immediately engaged with local IT resources to deploy our proprietary scripts to acquire specific forensic artifacts about user activity on 150 different local devices. This was all done remotely and covertly so as to not alert any potential bad actors.<\/p>\n<ul>\n<li>Resulting data files were uploaded to iDS nightly, completing data capture on all computers within 72 hours<\/li>\n<li>iDS\u2019 Structured Data &amp; Analytics Team loaded the data into the xIOT\u00ae platform nightly upon receipt<\/li>\n<li>Our client received online access to xIOT\u00ae and an emailed report every morning with progress updates and results<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div>    <\/div>\n<\/div>\n<!-- \/module text --><!-- module fancy heading -->\n<div  class=\"module module-fancy-heading tb_03an225\" data-lazy=\"1\">\n        <h2 class=\"fancy-heading\">\n    <span class=\"main-head tf_block\">\n                    Result            <\/span>\n\n    \n    <span class=\"sub-head tf_block tf_rel\">\n                                <\/span>\n    <\/h2>\n<\/div>\n<!-- \/module fancy heading -->\n<!-- module text -->\n<div  class=\"module module-text tb_rt0o627\" data-lazy=\"1\">\n        <div  class=\"tb_text_wrap\">\n        <div class=\"page\" title=\"Page 1\">\n<div class=\"layoutArea\">\n<div class=\"column\">\n<h5>iDS was able to identify the individual that inappropriately accessed the payroll system, the specific payroll files accessed, and whether or not the files were compromised (externally), ultimately allowing the client to avoid having to provide notice to thousands of employees.<\/h5>\n<p>Our client was able to leverage the reports and our findings, which were able to be completed within one week, to determine that they did not have any reporting obligations. This avoided costly notification expenses, as well as a negative impact on the internal moral. Additionally, as a result of the preliminary internal investigation, the client launched a full investigation into the employee who was later terminated for cause.<\/p>\n<\/div>\n<\/div>\n<\/div>    <\/div>\n<\/div>\n<!-- \/module text -->        <\/div>\n                        <\/div>\n        <\/div>\n        <\/div>\n<!--\/themify_builder_content-->","protected":false},"excerpt":{"rendered":"<p>Our client received an insider tip that an employee was inappropriately accessing historical payroll report stored within the client\u2019s secure infrastructure. Our client needed to conduct an internal investigation, across international borders, to assess the potential of having to provide a data breach notification to employees as it related to inappropriate access to payroll data. [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":2485,"parent":33,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"team":[],"class_list":["post-2583","page","type-page","status-publish","has-post-thumbnail","hentry","has-post-title","has-post-date","has-post-category","has-post-tag","has-post-comment","has-post-author",""],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.6 (Yoast SEO v27.6) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Inappropriate Employee Access to Company System - Case Study<\/title>\n<meta name=\"description\" content=\"In this Case Study, iDS discusses an Internal Investigation of Inappropriate Employee Access to Company System\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/idsinc.com\/en_gb\/case-studies\/access-company-system\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Internal Investigation of Inappropriate Employee Access to Company System\" \/>\n<meta property=\"og:description\" content=\"In this Case Study, iDS discusses an Internal Investigation of Inappropriate Employee Access to Company System\" \/>\n<meta property=\"og:url\" content=\"https:\/\/idsinc.com\/en_gb\/case-studies\/access-company-system\/\" \/>\n<meta property=\"og:site_name\" content=\"iDiscovery Solutions\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/iDiscovery-Solutions-110210573904472\" \/>\n<meta property=\"article:modified_time\" content=\"2024-07-08T20:14:28+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/12\/iDS-CaseStudyImages-20219-accesscompanysystem.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2500\" \/>\n\t<meta property=\"og:image:height\" content=\"1250\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/case-studies\\\/access-company-system\\\/\",\"url\":\"https:\\\/\\\/idsinc.com\\\/case-studies\\\/access-company-system\\\/\",\"name\":\"Inappropriate Employee Access to Company System - Case Study\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/case-studies\\\/access-company-system\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/case-studies\\\/access-company-system\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/12\\\/iDS-CaseStudyImages-20219-accesscompanysystem.jpg\",\"datePublished\":\"2021-12-03T17:56:21+00:00\",\"dateModified\":\"2024-07-08T20:14:28+00:00\",\"description\":\"In this Case Study, iDS discusses an Internal Investigation of Inappropriate Employee Access to Company System\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/case-studies\\\/access-company-system\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/idsinc.com\\\/case-studies\\\/access-company-system\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/case-studies\\\/access-company-system\\\/#primaryimage\",\"url\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/12\\\/iDS-CaseStudyImages-20219-accesscompanysystem.jpg\",\"contentUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/12\\\/iDS-CaseStudyImages-20219-accesscompanysystem.jpg\",\"width\":2500,\"height\":1250},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/case-studies\\\/access-company-system\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/idsinc.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Case Studies\",\"item\":\"https:\\\/\\\/idsinc.com\\\/case-studies\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Internal Investigation of Inappropriate Employee Access to Company System\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#website\",\"url\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/\",\"name\":\"iDiscovery Solutions\",\"description\":\"Use data to your advantage in the courtroom\",\"publisher\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#organization\"},\"alternateName\":\"iDS\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#organization\",\"name\":\"iDiscovery Solutions\",\"alternateName\":\"iDS\",\"url\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/iDS-Logo-3c-e1611176096212.png\",\"contentUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/iDS-Logo-3c-e1611176096212.png\",\"width\":100,\"height\":73,\"caption\":\"iDiscovery Solutions\"},\"image\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/iDiscovery-Solutions-110210573904472\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/idsinc\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCarv7o1MeYfCp0eZ1IrufIw\"],\"description\":\"iDS provides consultative data solutions to corporations and law firms around the world, giving them a decisive advantage \u2013 both in and out of the courtroom. iDS\u2019s subject matter experts and data strategists specialize in finding solutions to complex data problems, ensuring data can be leveraged as an asset, not a liability.\",\"email\":\"info@idsinc.com\",\"telephone\":\"+1.800.813.4832\",\"legalName\":\"iDiscovery Solutions\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Inappropriate Employee Access to Company System - Case Study","description":"In this Case Study, iDS discusses an Internal Investigation of Inappropriate Employee Access to Company System","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/idsinc.com\/en_gb\/case-studies\/access-company-system\/","og_locale":"en_GB","og_type":"article","og_title":"Internal Investigation of Inappropriate Employee Access to Company System","og_description":"In this Case Study, iDS discusses an Internal Investigation of Inappropriate Employee Access to Company System","og_url":"https:\/\/idsinc.com\/en_gb\/case-studies\/access-company-system\/","og_site_name":"iDiscovery Solutions","article_publisher":"https:\/\/www.facebook.com\/iDiscovery-Solutions-110210573904472","article_modified_time":"2024-07-08T20:14:28+00:00","og_image":[{"width":2500,"height":1250,"url":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/12\/iDS-CaseStudyImages-20219-accesscompanysystem.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/idsinc.com\/case-studies\/access-company-system\/","url":"https:\/\/idsinc.com\/case-studies\/access-company-system\/","name":"Inappropriate Employee Access to Company System - Case Study","isPartOf":{"@id":"https:\/\/idsinc.com\/en_gb\/#website"},"primaryImageOfPage":{"@id":"https:\/\/idsinc.com\/case-studies\/access-company-system\/#primaryimage"},"image":{"@id":"https:\/\/idsinc.com\/case-studies\/access-company-system\/#primaryimage"},"thumbnailUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/12\/iDS-CaseStudyImages-20219-accesscompanysystem.jpg","datePublished":"2021-12-03T17:56:21+00:00","dateModified":"2024-07-08T20:14:28+00:00","description":"In this Case Study, iDS discusses an Internal Investigation of Inappropriate Employee Access to Company System","breadcrumb":{"@id":"https:\/\/idsinc.com\/case-studies\/access-company-system\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/idsinc.com\/case-studies\/access-company-system\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/idsinc.com\/case-studies\/access-company-system\/#primaryimage","url":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/12\/iDS-CaseStudyImages-20219-accesscompanysystem.jpg","contentUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/12\/iDS-CaseStudyImages-20219-accesscompanysystem.jpg","width":2500,"height":1250},{"@type":"BreadcrumbList","@id":"https:\/\/idsinc.com\/case-studies\/access-company-system\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/idsinc.com\/"},{"@type":"ListItem","position":2,"name":"Case Studies","item":"https:\/\/idsinc.com\/case-studies\/"},{"@type":"ListItem","position":3,"name":"Internal Investigation of Inappropriate Employee Access to Company System"}]},{"@type":"WebSite","@id":"https:\/\/idsinc.com\/en_gb\/#website","url":"https:\/\/idsinc.com\/en_gb\/","name":"iDiscovery Solutions","description":"Use data to your advantage in the courtroom","publisher":{"@id":"https:\/\/idsinc.com\/en_gb\/#organization"},"alternateName":"iDS","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/idsinc.com\/en_gb\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/idsinc.com\/en_gb\/#organization","name":"iDiscovery Solutions","alternateName":"iDS","url":"https:\/\/idsinc.com\/en_gb\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/logo\/image\/","url":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/iDS-Logo-3c-e1611176096212.png","contentUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/iDS-Logo-3c-e1611176096212.png","width":100,"height":73,"caption":"iDiscovery Solutions"},"image":{"@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/iDiscovery-Solutions-110210573904472","https:\/\/www.linkedin.com\/company\/idsinc","https:\/\/www.youtube.com\/channel\/UCarv7o1MeYfCp0eZ1IrufIw"],"description":"iDS provides consultative data solutions to corporations and law firms around the world, giving them a decisive advantage \u2013 both in and out of the courtroom. iDS\u2019s subject matter experts and data strategists specialize in finding solutions to complex data problems, ensuring data can be leveraged as an asset, not a liability.","email":"info@idsinc.com","telephone":"+1.800.813.4832","legalName":"iDiscovery Solutions"}]}},"builder_content":"<img src=\"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/12\/iDS-CaseStudyImages-20219-accesscompanysystem-1024x512.jpg\" title=\"Internal Investigation of Inappropriate Employee Access to Company System\" alt=\"Internal Investigation of Inappropriate Employee Access to Company System\" srcset=\"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/12\/iDS-CaseStudyImages-20219-accesscompanysystem-1024x512.jpg 1024w, https:\/\/idsinc.com\/wp-content\/uploads\/2021\/12\/iDS-CaseStudyImages-20219-accesscompanysystem-300x150.jpg 300w, https:\/\/idsinc.com\/wp-content\/uploads\/2021\/12\/iDS-CaseStudyImages-20219-accesscompanysystem-768x384.jpg 768w, https:\/\/idsinc.com\/wp-content\/uploads\/2021\/12\/iDS-CaseStudyImages-20219-accesscompanysystem-1536x768.jpg 1536w, https:\/\/idsinc.com\/wp-content\/uploads\/2021\/12\/iDS-CaseStudyImages-20219-accesscompanysystem-2048x1024.jpg 2048w, https:\/\/idsinc.com\/wp-content\/uploads\/2021\/12\/iDS-CaseStudyImages-20219-accesscompanysystem-1320x660.jpg 1320w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/> <h1> Internal Investigation of Inappropriate Employee Access to Company System <\/h1>\n<h2>CHALLENGE<br\/><\/h2>\n<h5>Our client received an insider tip that an employee was inappropriately accessing historical payroll report stored within the client\u2019s secure infrastructure. <\/h5> <p>Our client needed to conduct an internal investigation, across international borders, to assess the potential of having to provide a data breach notification to employees as it related to inappropriate access to payroll data. Specifically, the client had three questions that needed to be answered:<\/p> <ul> <li>Which employee(s) (if any) accessed files within a certain directory on the network<\/li> <li>What files (if any) were accessed within that certain directory<\/li> <li>Was there any evidence that any of those files within that certain directory (accessed by the employee(s) under investigation) left the network<\/li> <\/ul>\n<h2>Solution<br\/><\/h2>\n<h5>iDS Forensics Team liaised with the client\u2019s IT group to remotely deploy and acquire forensic artifacts that allowed iDS to leverage the xIOT\u00ae platform to analyze the activity of 150 individuals, all performed remotely and covertly.<\/h5> <p>The iDS Forensics Team immediately engaged with local IT resources to deploy our proprietary scripts to acquire specific forensic artifacts about user activity on 150 different local devices. This was all done remotely and covertly so as to not alert any potential bad actors.<\/p> <ul> <li>Resulting data files were uploaded to iDS nightly, completing data capture on all computers within 72 hours<\/li> <li>iDS\u2019 Structured Data &amp; Analytics Team loaded the data into the xIOT\u00ae platform nightly upon receipt<\/li> <li>Our client received online access to xIOT\u00ae and an emailed report every morning with progress updates and results<\/li> <\/ul>\n<h2>Result<br\/><\/h2>\n<h5>iDS was able to identify the individual that inappropriately accessed the payroll system, the specific payroll files accessed, and whether or not the files were compromised (externally), ultimately allowing the client to avoid having to provide notice to thousands of employees.<\/h5> <p>Our client was able to leverage the reports and our findings, which were able to be completed within one week, to determine that they did not have any reporting obligations. This avoided costly notification expenses, as well as a negative impact on the internal moral. Additionally, as a result of the preliminary internal investigation, the client launched a full investigation into the employee who was later terminated for cause.<\/p>","_links":{"self":[{"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/pages\/2583","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/comments?post=2583"}],"version-history":[{"count":0,"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/pages\/2583\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/pages\/33"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/media\/2485"}],"wp:attachment":[{"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/media?parent=2583"}],"wp:term":[{"taxonomy":"team","embeddable":true,"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/team?post=2583"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}