{"id":279,"date":"2021-01-27T15:27:36","date_gmt":"2021-01-27T21:27:36","guid":{"rendered":"https:\/\/idsinc.com\/?page_id=279"},"modified":"2021-07-07T10:45:10","modified_gmt":"2021-07-07T16:45:10","slug":"protecting-trade-secrets","status":"publish","type":"page","link":"https:\/\/idsinc.com\/en_gb\/case-studies\/protecting-trade-secrets\/","title":{"rendered":"Reasonable Security Measures in Protecting Trade Secrets"},"content":{"rendered":"<!--themify_builder_content-->\n<div id=\"themify_builder_content-279\" data-postid=\"279\" class=\"themify_builder_content themify_builder_content-279 themify_builder tf_clear\">\n                    <div  data-lazy=\"1\" class=\"module_row themify_builder_row tb_sxix889 tb_first tf_w\">\n                        <div class=\"row_inner col_align_top tb_col_count_1 tf_box tf_rel\">\n                        <div  data-lazy=\"1\" class=\"module_column tb-column col-full tb_dvve891 first\">\n                    <!-- module image -->\n<div  class=\"module module-image tb_1zqw507 image-full-overlay   auto_fullwidth tf_mw\" data-lazy=\"1\">\n        <div class=\"image-wrap tf_rel tf_mw\">\n            <img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"512\" src=\"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/iDS-Case-Study-Protecting-Trade-Secrets-1024x512.jpg\" class=\"wp-post-image wp-image-280\" title=\"iDiscovery Solutions Case Study - Protecting Trade Secrets\" alt=\"iDiscovery Solutions Case Study, Protecting Trade Secrets, Trade Secrets, cybersecurity policies, cybersecurity, cybersecurity experts\" srcset=\"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/iDS-Case-Study-Protecting-Trade-Secrets-1024x512.jpg 1024w, https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/iDS-Case-Study-Protecting-Trade-Secrets-300x150.jpg 300w, https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/iDS-Case-Study-Protecting-Trade-Secrets-768x384.jpg 768w, https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/iDS-Case-Study-Protecting-Trade-Secrets.jpg 1200w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/>    \n        <\/div>\n    <!-- \/image-wrap -->\n    \n        <\/div>\n<!-- \/module image -->        <\/div>\n                        <\/div>\n        <\/div>\n                        <div  data-lazy=\"1\" class=\"module_row themify_builder_row tb_z67o610 tf_w\">\n                        <div class=\"row_inner col_align_top tb_col_count_1 tf_box tf_rel\">\n                        <div  data-lazy=\"1\" class=\"module_column tb-column col-full tb_cajx611 first\">\n                    <!-- module fancy heading -->\n<div  class=\"module module-fancy-heading tb_aw59458\" data-lazy=\"1\">\n        <h1 class=\"fancy-heading\">\n    <span class=\"main-head tf_block\">\n                    CHALLENGE            <\/span>\n\n    \n    <span class=\"sub-head tf_block tf_rel\">\n                                <\/span>\n    <\/h1>\n<\/div>\n<!-- \/module fancy heading -->\n<!-- module text -->\n<div  class=\"module module-text tb_vvfw5\" data-lazy=\"1\">\n        <div  class=\"tb_text_wrap\">\n        <div class=\"page\" title=\"Page 1\">\n<div class=\"layoutArea\">\n<div class=\"column\">\n<h5>Assist a client with evaluating and information security program and whether a firm was entitled to trade secret protection based on reasonable security measures.<\/h5>\n<p>Our client was the defendant in an ITC Theft of Trade Secrets matter. The plaintiff alleged that they had taken critical documents from a secure and protected environment. Among other things, our client did not believe that the information qualified as a trade secret.<\/p>\n<p><strong>iDS was tasked with:<\/strong><\/p>\n<ul>\n<li>\n<p><em>Evaluating plaintiff\u2019s cybersecurity policies and practices at the time of the alleged theft<\/em><\/p>\n<\/li>\n<li>\n<p><em>Evaluating the overall state of the Information Security Program (\u201cISP\u201d) and employee training practices<\/em><\/p>\n<\/li>\n<li>\n<p><em>Comparing and contrasting the ISP with industry standards such as ISO 27001 and NIST<\/em><\/p>\n<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div>    <\/div>\n<\/div>\n<!-- \/module text --><!-- module fancy heading -->\n<div  class=\"module module-fancy-heading tb_fjro869\" data-lazy=\"1\">\n        <h1 class=\"fancy-heading\">\n    <span class=\"main-head tf_block\">\n                    Solution            <\/span>\n\n    \n    <span class=\"sub-head tf_block tf_rel\">\n                                <\/span>\n    <\/h1>\n<\/div>\n<!-- \/module fancy heading -->\n<!-- module text -->\n<div  class=\"module module-text tb_olr8818\" data-lazy=\"1\">\n        <div  class=\"tb_text_wrap\">\n        <div class=\"page\" title=\"Page 1\">\n<div class=\"layoutArea\">\n<div class=\"column\">\n<h5>Using a team of experts evaluate the security measures in place versus industry standards. Compose an expert report describing our conclusions.<\/h5>\n<p>iDS was selected for this engagement because we have deep experience in both critical dimensions \u2013 ISP program design and implementation as well as expert witness testimony specifically related to cybersecurity.<\/p>\n<p><strong>A project plan was drawn up which included:<\/strong><\/p>\n<ul>\n<li>\n<p><em>Assisting counsel with their deposition preparation for plaintiff\u2019s cybersecurity experts<\/em><\/p>\n<\/li>\n<li>\n<p><em>Developing an expert report that compared and contrasted plaintiff\u2019s practices with industry standards<\/em><\/p>\n<\/li>\n<li>\n<p><em>Determining whether the ISP meant that the plaintiff had taken reasonable measures to protect their intellectual property<\/em><\/p>\n<\/li>\n<\/ul>\n<p><strong>Plaintiff systems, policies and practices were inspected. An expert report was provided. Ultimately a deposition was given.<\/strong><\/p>\n<\/div>\n<\/div>\n<\/div>    <\/div>\n<\/div>\n<!-- \/module text --><!-- module fancy heading -->\n<div  class=\"module module-fancy-heading tb_h5vm641\" data-lazy=\"1\">\n        <h1 class=\"fancy-heading\">\n    <span class=\"main-head tf_block\">\n                    Result            <\/span>\n\n    \n    <span class=\"sub-head tf_block tf_rel\">\n                                <\/span>\n    <\/h1>\n<\/div>\n<!-- \/module fancy heading -->\n<!-- module text -->\n<div  class=\"module module-text tb_17by0\" data-lazy=\"1\">\n        <div  class=\"tb_text_wrap\">\n        <div class=\"page\" title=\"Page 1\">\n<div class=\"layoutArea\">\n<div class=\"column\">\n<h5>iDS\u2019 conclusions in both the report and deposition resulted in plaintiffs dropping one expert for trial and the other conceded real issues with the security measures<br \/>in place.<\/h5>\n<p>One of the plaintiff\u2019s cybersecurity experts was withdrawn prior to trial. Although the matter was adjudicated against our client based on spoliation, even the remaining opposing expert conceded that plaintiff had failed to reasonably protect much of what had been claimed as a trade secret.<\/p>\n<\/div>\n<\/div>\n<\/div>    <\/div>\n<\/div>\n<!-- \/module text -->        <\/div>\n                        <\/div>\n        <\/div>\n        <\/div>\n<!--\/themify_builder_content-->","protected":false},"excerpt":{"rendered":"<p>Assist a client with evaluating and information security program and whether a firm was entitled to trade secret protection based on reasonable security measures. Our client was the defendant in an ITC Theft of Trade Secrets matter. The plaintiff alleged that they had taken critical documents from a secure and protected environment. Among other things, [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":280,"parent":33,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"team":[],"class_list":["post-279","page","type-page","status-publish","has-post-thumbnail","hentry","has-post-title","has-post-date","has-post-category","has-post-tag","has-post-comment","has-post-author",""],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.6 (Yoast SEO v27.6) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Security Measures in Protecting Trade Secrets - iDiscovery Solutions<\/title>\n<meta name=\"description\" content=\"iDS was tasked with evaluating client\u2019s security program, cybersecurity policies and practices at the time of an alleged trade secrets theft.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/idsinc.com\/en_gb\/case-studies\/protecting-trade-secrets\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Reasonable Security Measures in Protecting Trade Secrets\" \/>\n<meta property=\"og:description\" content=\"iDS was tasked with evaluating client\u2019s security program, cybersecurity policies and practices at the time of an alleged trade secrets theft.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/idsinc.com\/en_gb\/case-studies\/protecting-trade-secrets\/\" \/>\n<meta property=\"og:site_name\" content=\"iDiscovery Solutions\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/iDiscovery-Solutions-110210573904472\" \/>\n<meta property=\"article:modified_time\" content=\"2021-07-07T16:45:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/iDS-Case-Study-Protecting-Trade-Secrets.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/case-studies\\\/protecting-trade-secrets\\\/\",\"url\":\"https:\\\/\\\/idsinc.com\\\/case-studies\\\/protecting-trade-secrets\\\/\",\"name\":\"Security Measures in Protecting Trade Secrets - iDiscovery Solutions\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/case-studies\\\/protecting-trade-secrets\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/case-studies\\\/protecting-trade-secrets\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/iDS-Case-Study-Protecting-Trade-Secrets.jpg\",\"datePublished\":\"2021-01-27T21:27:36+00:00\",\"dateModified\":\"2021-07-07T16:45:10+00:00\",\"description\":\"iDS was tasked with evaluating client\u2019s security program, cybersecurity policies and practices at the time of an alleged trade secrets theft.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/case-studies\\\/protecting-trade-secrets\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/idsinc.com\\\/case-studies\\\/protecting-trade-secrets\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/case-studies\\\/protecting-trade-secrets\\\/#primaryimage\",\"url\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/iDS-Case-Study-Protecting-Trade-Secrets.jpg\",\"contentUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/iDS-Case-Study-Protecting-Trade-Secrets.jpg\",\"width\":1200,\"height\":600,\"caption\":\"iDS was tasked with evaluating client\u2019s security program, cybersecurity policies and practices at the time of an alleged trade secrets theft.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/case-studies\\\/protecting-trade-secrets\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/idsinc.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Case Studies\",\"item\":\"https:\\\/\\\/idsinc.com\\\/case-studies\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Security Measures in Protecting Trade Secrets\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#website\",\"url\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/\",\"name\":\"iDiscovery Solutions\",\"description\":\"Use data to your advantage in the courtroom\",\"publisher\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#organization\"},\"alternateName\":\"iDS\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#organization\",\"name\":\"iDiscovery Solutions\",\"alternateName\":\"iDS\",\"url\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/iDS-Logo-3c-e1611176096212.png\",\"contentUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/iDS-Logo-3c-e1611176096212.png\",\"width\":100,\"height\":73,\"caption\":\"iDiscovery Solutions\"},\"image\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/iDiscovery-Solutions-110210573904472\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/idsinc\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCarv7o1MeYfCp0eZ1IrufIw\"],\"description\":\"iDS provides consultative data solutions to corporations and law firms around the world, giving them a decisive advantage \u2013 both in and out of the courtroom. iDS\u2019s subject matter experts and data strategists specialize in finding solutions to complex data problems, ensuring data can be leveraged as an asset, not a liability.\",\"email\":\"info@idsinc.com\",\"telephone\":\"+1.800.813.4832\",\"legalName\":\"iDiscovery Solutions\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Security Measures in Protecting Trade Secrets - iDiscovery Solutions","description":"iDS was tasked with evaluating client\u2019s security program, cybersecurity policies and practices at the time of an alleged trade secrets theft.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/idsinc.com\/en_gb\/case-studies\/protecting-trade-secrets\/","og_locale":"en_GB","og_type":"article","og_title":"Reasonable Security Measures in Protecting Trade Secrets","og_description":"iDS was tasked with evaluating client\u2019s security program, cybersecurity policies and practices at the time of an alleged trade secrets theft.","og_url":"https:\/\/idsinc.com\/en_gb\/case-studies\/protecting-trade-secrets\/","og_site_name":"iDiscovery Solutions","article_publisher":"https:\/\/www.facebook.com\/iDiscovery-Solutions-110210573904472","article_modified_time":"2021-07-07T16:45:10+00:00","og_image":[{"width":1200,"height":600,"url":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/iDS-Case-Study-Protecting-Trade-Secrets.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/idsinc.com\/case-studies\/protecting-trade-secrets\/","url":"https:\/\/idsinc.com\/case-studies\/protecting-trade-secrets\/","name":"Security Measures in Protecting Trade Secrets - iDiscovery Solutions","isPartOf":{"@id":"https:\/\/idsinc.com\/en_gb\/#website"},"primaryImageOfPage":{"@id":"https:\/\/idsinc.com\/case-studies\/protecting-trade-secrets\/#primaryimage"},"image":{"@id":"https:\/\/idsinc.com\/case-studies\/protecting-trade-secrets\/#primaryimage"},"thumbnailUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/iDS-Case-Study-Protecting-Trade-Secrets.jpg","datePublished":"2021-01-27T21:27:36+00:00","dateModified":"2021-07-07T16:45:10+00:00","description":"iDS was tasked with evaluating client\u2019s security program, cybersecurity policies and practices at the time of an alleged trade secrets theft.","breadcrumb":{"@id":"https:\/\/idsinc.com\/case-studies\/protecting-trade-secrets\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/idsinc.com\/case-studies\/protecting-trade-secrets\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/idsinc.com\/case-studies\/protecting-trade-secrets\/#primaryimage","url":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/iDS-Case-Study-Protecting-Trade-Secrets.jpg","contentUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/iDS-Case-Study-Protecting-Trade-Secrets.jpg","width":1200,"height":600,"caption":"iDS was tasked with evaluating client\u2019s security program, cybersecurity policies and practices at the time of an alleged trade secrets theft."},{"@type":"BreadcrumbList","@id":"https:\/\/idsinc.com\/case-studies\/protecting-trade-secrets\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/idsinc.com\/"},{"@type":"ListItem","position":2,"name":"Case Studies","item":"https:\/\/idsinc.com\/case-studies\/"},{"@type":"ListItem","position":3,"name":"Security Measures in Protecting Trade Secrets"}]},{"@type":"WebSite","@id":"https:\/\/idsinc.com\/en_gb\/#website","url":"https:\/\/idsinc.com\/en_gb\/","name":"iDiscovery Solutions","description":"Use data to your advantage in the courtroom","publisher":{"@id":"https:\/\/idsinc.com\/en_gb\/#organization"},"alternateName":"iDS","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/idsinc.com\/en_gb\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/idsinc.com\/en_gb\/#organization","name":"iDiscovery Solutions","alternateName":"iDS","url":"https:\/\/idsinc.com\/en_gb\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/logo\/image\/","url":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/iDS-Logo-3c-e1611176096212.png","contentUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/iDS-Logo-3c-e1611176096212.png","width":100,"height":73,"caption":"iDiscovery Solutions"},"image":{"@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/iDiscovery-Solutions-110210573904472","https:\/\/www.linkedin.com\/company\/idsinc","https:\/\/www.youtube.com\/channel\/UCarv7o1MeYfCp0eZ1IrufIw"],"description":"iDS provides consultative data solutions to corporations and law firms around the world, giving them a decisive advantage \u2013 both in and out of the courtroom. iDS\u2019s subject matter experts and data strategists specialize in finding solutions to complex data problems, ensuring data can be leveraged as an asset, not a liability.","email":"info@idsinc.com","telephone":"+1.800.813.4832","legalName":"iDiscovery Solutions"}]}},"builder_content":"\n<h1>CHALLENGE<br\/><\/h1>\n<h5>Assist a client with evaluating and information security program and whether a firm was entitled to trade secret protection based on reasonable security measures.<\/h5> <p>Our client was the defendant in an ITC Theft of Trade Secrets matter. The plaintiff alleged that they had taken critical documents from a secure and protected environment. Among other things, our client did not believe that the information qualified as a trade secret.<\/p> <p><strong>iDS was tasked with:<\/strong><\/p> <ul> <li> <p><em>Evaluating plaintiff\u2019s cybersecurity policies and practices at the time of the alleged theft<\/em><\/p> <\/li> <li> <p><em>Evaluating the overall state of the Information Security Program (\u201cISP\u201d) and employee training practices<\/em><\/p> <\/li> <li> <p><em>Comparing and contrasting the ISP with industry standards such as ISO 27001 and NIST<\/em><\/p> <\/li> <\/ul>\n<h1>Solution<br\/><\/h1>\n<h5>Using a team of experts evaluate the security measures in place versus industry standards. Compose an expert report describing our conclusions.<\/h5> <p>iDS was selected for this engagement because we have deep experience in both critical dimensions \u2013 ISP program design and implementation as well as expert witness testimony specifically related to cybersecurity.<\/p> <p><strong>A project plan was drawn up which included:<\/strong><\/p> <ul> <li> <p><em>Assisting counsel with their deposition preparation for plaintiff\u2019s cybersecurity experts<\/em><\/p> <\/li> <li> <p><em>Developing an expert report that compared and contrasted plaintiff\u2019s practices with industry standards<\/em><\/p> <\/li> <li> <p><em>Determining whether the ISP meant that the plaintiff had taken reasonable measures to protect their intellectual property<\/em><\/p> <\/li> <\/ul> <p><strong>Plaintiff systems, policies and practices were inspected. An expert report was provided. Ultimately a deposition was given.<\/strong><\/p>\n<h1>Result<br\/><\/h1>\n<h5>iDS\u2019 conclusions in both the report and deposition resulted in plaintiffs dropping one expert for trial and the other conceded real issues with the security measures<br \/>in place.<\/h5> <p>One of the plaintiff\u2019s cybersecurity experts was withdrawn prior to trial. Although the matter was adjudicated against our client based on spoliation, even the remaining opposing expert conceded that plaintiff had failed to reasonably protect much of what had been claimed as a trade secret.<\/p>","_links":{"self":[{"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/pages\/279","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/comments?post=279"}],"version-history":[{"count":0,"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/pages\/279\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/pages\/33"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/media\/280"}],"wp:attachment":[{"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/media?parent=279"}],"wp:term":[{"taxonomy":"team","embeddable":true,"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/team?post=279"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}