{"id":2675,"date":"2019-02-25T09:00:00","date_gmt":"2019-02-25T15:00:00","guid":{"rendered":"https:\/\/staging2.idsinc.com\/?p=2675"},"modified":"2021-12-08T11:24:44","modified_gmt":"2021-12-08T17:24:44","slug":"protecting-the-corporate-jewels","status":"publish","type":"post","link":"https:\/\/idsinc.com\/en_gb\/protecting-the-corporate-jewels\/","title":{"rendered":"Protecting the Corporate Jewels &#8211; The Use of Digital Forensics in Trade Secret and Other Employment Matters"},"content":{"rendered":"<!--themify_builder_content-->\n<div id=\"themify_builder_content-2675\" data-postid=\"2675\" class=\"themify_builder_content themify_builder_content-2675 themify_builder tf_clear\">\n    <\/div>\n<!--\/themify_builder_content-->\n\n\n<p class=\"wp-block-paragraph\">In today\u2019s world, the amount of communication is astronomical. BYOD (Bring Your Own Device) adds complexity when already faced with corporately used traditional data sources such as a desktop, laptop, server, and corporate email.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">This article is intended to be a helpful reminder (or for some, new information) on things to consider when using digital forensics for investigating potential theft or improper usage of proprietary data. Given the changing landscape of technology, I\u2019d be remiss if I didn\u2019t say to consult a forensic and legal professional before making any decisions.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Consideration of Electronic Storage Areas\/ Devices<\/strong><\/h3>\n\n\n\n<p class=\"wp-block-paragraph\">There are certain electronic data sources that defendants, plaintiffs, and forensic neutrals alike should consider for any investigation. These include laptops\/desktops (aka, workstations), email servers, file servers, external media, online repositories, personal email accounts, home computers, smartphones, and other mobile computing devices.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Collection from some of these sources is self-explanatory, but others may not be as straightforward. A couple of examples of the nuances that you may encounter include email and file servers.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Email servers can be configured multiple ways. Some keep a copy of all emails on only the server, while others allow for a synchronization with other devices (e.g., use of Outlook), or a server may allow a user to download and keep the only copy of the email on their local device(s).<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">This is an important distinction to understand so as not to assume the email will all be located on a desktop or laptop. One technique may be to synchronize the email to the desktop or laptop before creating a forensic image of that device, which may save you the need to collect the email from the email server.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">For servers, it is important to understand the types of servers in use and the general terms custodians (users) may use when describing them. Take a file server for example: a server where individuals or members of certain groups can store a myriad of document types, even email archives. It is often referred to as a \u201cprivate network folder\u201d or \u201chome directory\u201d for individuals, and as a \u201cgroup share\u201d (e.g., accounting group share, engineering group share) for members of certain groups that have a common area for sharing documents.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Analysis Considerations<\/strong><\/h3>\n\n\n\n<p class=\"wp-block-paragraph\">Data can leave a company in a variety of ways. One way to exfiltrate \u201clarge\u201d amounts of data is through the connection of an external device. It is very easy to connect an external device, mass copy files to the device, disconnect the device, and leave with<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">it. So what artifacts should one consider if you want to see from that type of activity on your commonly used Microsoft Windows type workstation?<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">One way to view a user\u2019s activity is through the review of link files (aka, LNK Files). A link file is a shortcut on a local drive that may indicate the history of a file being opened from an attached device.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Clients often ask me why I cannot give them a list of files that were copied to an external device \u2013 it\u2019s not that simple. Windows does not create a \u201clog,\u201d \u201caudit trail,\u201d or \u201crecord\u201d of files that are simply copied to an external device via the drag-and-drop method. Absent having the actual device that the files were copied to, you must rely on other artifacts, such as link files, to show or infer that this activity occurred.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">For example, I have a document saved to a USB removable device named tradesecret.doc (the target file). If I save and close that document, then go back to my Windows Start Menu and select the Microsoft Word program, I get a list of recent documents (including \u201ctradesecret.doc\u201d) that I can choose to open.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">This method of opening one of those documents creates what is known as a shortcut. A shortcut exists on the computer because a document was \u201copened.\u201d Shortcuts contain metadata, including the path of the target file. The path may be an external device that left the company with the departed employee. The shortcut may also contain dates and times that the shortcut itself was created, as well as the creation, modified, and access dates of the actual target file.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">This shortcut metadata can tell you when a file was copied to a removable device and whether it was modified on that device. Please keep in mind that locating a copy of the same named file on the computer hard drive does not mean it has the same content as the copy that was identified on the external device. The only true way to identify a complete list of files, and their content, is to analyze the external device.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>The Cloud<\/strong><\/h3>\n\n\n\n<p class=\"wp-block-paragraph\">Online repositories are areas that are \u201cin the cloud.\u201d Programs like OneDrive, Carbonite, Dropbox, SugarSync, Hightail, Mozy, and ShareFile are but just a few of the hundreds (if not thousands) of online repositories. Although each may vary slightly in how they are used, in the end they all allow a user to store and access files.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Looking for the installation and usage of these programs on a workstation may prove to be valuable. Visiting these sites may also create a record within Internet History files. Some of these sites even record detailed audit logs of file activity (uploads, downloads, deletions, etc.). Keep in mind that you may have to act fast because these audit logs can be as short as 30 days.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-mobile-devices\"><strong>Mobile Devices<\/strong><\/h3>\n\n\n\n<p class=\"wp-block-paragraph\">In addition to making calls and sending text messages, mobile devices and smartphones can store files. With today\u2019s advancement of \u201capps\u201d it is possible to retrieve, open, edit, and resave a document back to a mobile device, or to the cloud-based repository the document was retrieved from.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Another example of how sensitive data can be stored on mobile devices are the SIM cards, which can maintain contact lists and can be moved from one phone to another compatible phone with ease. In some matters, the mere taking of a contact list can be very significant, as it could be a client list.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Let\u2019s not overlook backup files made from BlackBerrys, iPhones\/ iPads, and other mobile devices. These may prove to be valuable to show ownership or usage of a device that has not been produced for inspection, especially in today\u2019s BYOD world, where the device may be privately owned but allowed usage at the company has resulted in corporate data on the device.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Staying on the subject of BYOD, be familiar with the company policies and rules for these hybrid devices. Does your company have well-written policies, such as whether the employer can remotely \u201cwipe\u201d the device of business data if the device is lost, or if the employee and the company part ways? Have you considered how to deal with that issue before it happens? I\u2019ve seen it all too often wherein a client\u2019s default was to remotely wipe an employee\u2019s mobile device upon departure and then want evidence from that device (which no longer exists).<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">In addition to implementing and reinforcing a culture of security and reserving the ability to \u201cwipe\u201d devices if they are lost or stolen, companies should also consider ongoing training, annual acknowledgements, and otherwise set and manage employee expectations about the privacy they will have to surrender in exchange for the convenience of using their personal devices for work. This can help avoid some awkward conversations when you need to examine somebody\u2019s personal device.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Should that need arise, what are some of the artifacts one could look for to ensure confidential company data has not been taken, or no longer resides on a departed employee\u2019s device? As an example, you may want to know about geo-positional information (GPS data), which can indicate where the device was at a particular date\/time.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Examples of some user activity to investigate include: attachments that have been broken apart from an email and saved to the device; installed software that allows a direct connection to a company computer that may bypass a particular security protocol; names of file attachments that may exist within personal email accounts on the device; pictures that may have been taken of a trade secret document in lieu of the actual file being taken; and Internet history and\/or text messages, just to name a few. The data on the actual device may differ from the last backup, especially if the device is used more frequently and more recently than the last backup.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">In summary, it is important to be educated or surrounded by people who will keep you informed. Getting a jump on the investigation, knowing that evidence will be perishable, and preserving what is needed even if put on ice will put you ahead of the game.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><strong><em>iDiscovery Solutions is a strategic consulting, technology, and expert services firm \u2013 providing customized eDiscovery solutions from digital forensics to expert testimony for law firms and corporations across the United States and Europe.<\/em><\/strong><\/p>","protected":false},"excerpt":{"rendered":"<p>In today\u2019s world, the amount of communication is astronomical. BYOD (Bring Your Own Device) adds complexity when already faced with corporately used traditional data sources such as a desktop, laptop, server, and corporate email. This article is intended to be a helpful reminder (or for some, new information) on things to consider when using digital [&hellip;]<\/p>\n","protected":false},"author":13,"featured_media":2676,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[10],"tags":[],"class_list":["post-2675","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","has-post-title","has-post-date","has-post-category","has-post-tag","has-post-comment","has-post-author",""],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.6 (Yoast SEO v27.6) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Protecting the Corporate Jewels -Trade Secret | iDiscovery Solutions<\/title>\n<meta name=\"description\" content=\"Corporations need to consider Digital Forensic data sources in Trade Secret matters such as Mobile Devices, Personal Devices, &amp; File servers.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/idsinc.com\/en_gb\/protecting-the-corporate-jewels\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Protecting the Corporate Jewels - The Use of Digital Forensics in Trade Secret and Other Employment Matters\" \/>\n<meta property=\"og:description\" content=\"Corporations need to consider Digital Forensic data sources in Trade Secret matters such as Mobile Devices, Personal Devices, &amp; File servers.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/idsinc.com\/en_gb\/protecting-the-corporate-jewels\/\" \/>\n<meta property=\"og:site_name\" content=\"iDiscovery Solutions\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/iDiscovery-Solutions-110210573904472\" \/>\n<meta property=\"article:published_time\" content=\"2019-02-25T15:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-12-08T17:24:44+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/12\/Protecting-the-Corporate-Jewels.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2500\" \/>\n\t<meta property=\"og:image:height\" content=\"1250\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Jim Vaughn\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jim Vaughn\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/protecting-the-corporate-jewels\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/protecting-the-corporate-jewels\\\/\"},\"author\":{\"name\":\"Jim Vaughn\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/person\\\/d5856b1e9c82af5e2fe3df3d7c5234fc\"},\"headline\":\"Protecting the Corporate Jewels &#8211; The Use of Digital Forensics in Trade Secret and Other Employment Matters\",\"datePublished\":\"2019-02-25T15:00:00+00:00\",\"dateModified\":\"2021-12-08T17:24:44+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/protecting-the-corporate-jewels\\\/\"},\"wordCount\":1509,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/protecting-the-corporate-jewels\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/12\\\/Protecting-the-Corporate-Jewels.jpg\",\"articleSection\":[\"Blog\"],\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/idsinc.com\\\/protecting-the-corporate-jewels\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/protecting-the-corporate-jewels\\\/\",\"url\":\"https:\\\/\\\/idsinc.com\\\/protecting-the-corporate-jewels\\\/\",\"name\":\"Protecting the Corporate Jewels -Trade Secret | iDiscovery Solutions\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/protecting-the-corporate-jewels\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/protecting-the-corporate-jewels\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/12\\\/Protecting-the-Corporate-Jewels.jpg\",\"datePublished\":\"2019-02-25T15:00:00+00:00\",\"dateModified\":\"2021-12-08T17:24:44+00:00\",\"description\":\"Corporations need to consider Digital Forensic data sources in Trade Secret matters such as Mobile Devices, Personal Devices, & File servers.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/protecting-the-corporate-jewels\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/idsinc.com\\\/protecting-the-corporate-jewels\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/protecting-the-corporate-jewels\\\/#primaryimage\",\"url\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/12\\\/Protecting-the-Corporate-Jewels.jpg\",\"contentUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/12\\\/Protecting-the-Corporate-Jewels.jpg\",\"width\":2500,\"height\":1250,\"caption\":\"Corporations need to consider Digital Forensic data sources in Trade Secret matters such as Mobile Devices, Personal Devices, & File servers.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/protecting-the-corporate-jewels\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/idsinc.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blog\",\"item\":\"https:\\\/\\\/idsinc.com\\\/de\\\/category\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Protecting the Corporate Jewels\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#website\",\"url\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/\",\"name\":\"iDiscovery Solutions\",\"description\":\"Use data to your advantage in the courtroom\",\"publisher\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#organization\"},\"alternateName\":\"iDS\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#organization\",\"name\":\"iDiscovery Solutions\",\"alternateName\":\"iDS\",\"url\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/iDS-Logo-3c-e1611176096212.png\",\"contentUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/iDS-Logo-3c-e1611176096212.png\",\"width\":100,\"height\":73,\"caption\":\"iDiscovery Solutions\"},\"image\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/iDiscovery-Solutions-110210573904472\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/idsinc\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCarv7o1MeYfCp0eZ1IrufIw\"],\"description\":\"iDS provides consultative data solutions to corporations and law firms around the world, giving them a decisive advantage \u2013 both in and out of the courtroom. iDS\u2019s subject matter experts and data strategists specialize in finding solutions to complex data problems, ensuring data can be leveraged as an asset, not a liability.\",\"email\":\"info@idsinc.com\",\"telephone\":\"+1.800.813.4832\",\"legalName\":\"iDiscovery Solutions\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/person\\\/d5856b1e9c82af5e2fe3df3d7c5234fc\",\"name\":\"Jim Vaughn\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/40e31cb43d0388a015864b3f4a0bfbfaf6d723fbfca5067d802bddd24f682e90?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/40e31cb43d0388a015864b3f4a0bfbfaf6d723fbfca5067d802bddd24f682e90?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/40e31cb43d0388a015864b3f4a0bfbfaf6d723fbfca5067d802bddd24f682e90?s=96&d=mm&r=g\",\"caption\":\"Jim Vaughn\"},\"sameAs\":[\"https:\\\/\\\/idsinc.com\\\/team\\\/james-vaughn\\\/\"],\"url\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/author\\\/jim-vaughn\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Protecting the Corporate Jewels -Trade Secret | iDiscovery Solutions","description":"Corporations need to consider Digital Forensic data sources in Trade Secret matters such as Mobile Devices, Personal Devices, & File servers.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/idsinc.com\/en_gb\/protecting-the-corporate-jewels\/","og_locale":"en_GB","og_type":"article","og_title":"Protecting the Corporate Jewels - The Use of Digital Forensics in Trade Secret and Other Employment Matters","og_description":"Corporations need to consider Digital Forensic data sources in Trade Secret matters such as Mobile Devices, Personal Devices, & File servers.","og_url":"https:\/\/idsinc.com\/en_gb\/protecting-the-corporate-jewels\/","og_site_name":"iDiscovery Solutions","article_publisher":"https:\/\/www.facebook.com\/iDiscovery-Solutions-110210573904472","article_published_time":"2019-02-25T15:00:00+00:00","article_modified_time":"2021-12-08T17:24:44+00:00","og_image":[{"width":2500,"height":1250,"url":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/12\/Protecting-the-Corporate-Jewels.jpg","type":"image\/jpeg"}],"author":"Jim Vaughn","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Jim Vaughn","Estimated reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/idsinc.com\/protecting-the-corporate-jewels\/#article","isPartOf":{"@id":"https:\/\/idsinc.com\/protecting-the-corporate-jewels\/"},"author":{"name":"Jim Vaughn","@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/person\/d5856b1e9c82af5e2fe3df3d7c5234fc"},"headline":"Protecting the Corporate Jewels &#8211; The Use of Digital Forensics in Trade Secret and Other Employment Matters","datePublished":"2019-02-25T15:00:00+00:00","dateModified":"2021-12-08T17:24:44+00:00","mainEntityOfPage":{"@id":"https:\/\/idsinc.com\/protecting-the-corporate-jewels\/"},"wordCount":1509,"commentCount":0,"publisher":{"@id":"https:\/\/idsinc.com\/en_gb\/#organization"},"image":{"@id":"https:\/\/idsinc.com\/protecting-the-corporate-jewels\/#primaryimage"},"thumbnailUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/12\/Protecting-the-Corporate-Jewels.jpg","articleSection":["Blog"],"inLanguage":"en-GB","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/idsinc.com\/protecting-the-corporate-jewels\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/idsinc.com\/protecting-the-corporate-jewels\/","url":"https:\/\/idsinc.com\/protecting-the-corporate-jewels\/","name":"Protecting the Corporate Jewels -Trade Secret | iDiscovery Solutions","isPartOf":{"@id":"https:\/\/idsinc.com\/en_gb\/#website"},"primaryImageOfPage":{"@id":"https:\/\/idsinc.com\/protecting-the-corporate-jewels\/#primaryimage"},"image":{"@id":"https:\/\/idsinc.com\/protecting-the-corporate-jewels\/#primaryimage"},"thumbnailUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/12\/Protecting-the-Corporate-Jewels.jpg","datePublished":"2019-02-25T15:00:00+00:00","dateModified":"2021-12-08T17:24:44+00:00","description":"Corporations need to consider Digital Forensic data sources in Trade Secret matters such as Mobile Devices, Personal Devices, & File servers.","breadcrumb":{"@id":"https:\/\/idsinc.com\/protecting-the-corporate-jewels\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/idsinc.com\/protecting-the-corporate-jewels\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/idsinc.com\/protecting-the-corporate-jewels\/#primaryimage","url":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/12\/Protecting-the-Corporate-Jewels.jpg","contentUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/12\/Protecting-the-Corporate-Jewels.jpg","width":2500,"height":1250,"caption":"Corporations need to consider Digital Forensic data sources in Trade Secret matters such as Mobile Devices, Personal Devices, & File servers."},{"@type":"BreadcrumbList","@id":"https:\/\/idsinc.com\/protecting-the-corporate-jewels\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/idsinc.com\/"},{"@type":"ListItem","position":2,"name":"Blog","item":"https:\/\/idsinc.com\/de\/category\/blog\/"},{"@type":"ListItem","position":3,"name":"Protecting the Corporate Jewels"}]},{"@type":"WebSite","@id":"https:\/\/idsinc.com\/en_gb\/#website","url":"https:\/\/idsinc.com\/en_gb\/","name":"iDiscovery Solutions","description":"Use data to your advantage in the courtroom","publisher":{"@id":"https:\/\/idsinc.com\/en_gb\/#organization"},"alternateName":"iDS","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/idsinc.com\/en_gb\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/idsinc.com\/en_gb\/#organization","name":"iDiscovery Solutions","alternateName":"iDS","url":"https:\/\/idsinc.com\/en_gb\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/logo\/image\/","url":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/iDS-Logo-3c-e1611176096212.png","contentUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/iDS-Logo-3c-e1611176096212.png","width":100,"height":73,"caption":"iDiscovery Solutions"},"image":{"@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/iDiscovery-Solutions-110210573904472","https:\/\/www.linkedin.com\/company\/idsinc","https:\/\/www.youtube.com\/channel\/UCarv7o1MeYfCp0eZ1IrufIw"],"description":"iDS provides consultative data solutions to corporations and law firms around the world, giving them a decisive advantage \u2013 both in and out of the courtroom. iDS\u2019s subject matter experts and data strategists specialize in finding solutions to complex data problems, ensuring data can be leveraged as an asset, not a liability.","email":"info@idsinc.com","telephone":"+1.800.813.4832","legalName":"iDiscovery Solutions"},{"@type":"Person","@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/person\/d5856b1e9c82af5e2fe3df3d7c5234fc","name":"Jim Vaughn","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/secure.gravatar.com\/avatar\/40e31cb43d0388a015864b3f4a0bfbfaf6d723fbfca5067d802bddd24f682e90?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/40e31cb43d0388a015864b3f4a0bfbfaf6d723fbfca5067d802bddd24f682e90?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/40e31cb43d0388a015864b3f4a0bfbfaf6d723fbfca5067d802bddd24f682e90?s=96&d=mm&r=g","caption":"Jim Vaughn"},"sameAs":["https:\/\/idsinc.com\/team\/james-vaughn\/"],"url":"https:\/\/idsinc.com\/en_gb\/author\/jim-vaughn\/"}]}},"builder_content":"","_links":{"self":[{"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/posts\/2675","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/users\/13"}],"replies":[{"embeddable":true,"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/comments?post=2675"}],"version-history":[{"count":0,"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/posts\/2675\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/media\/2676"}],"wp:attachment":[{"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/media?parent=2675"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/categories?post=2675"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/tags?post=2675"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}