{"id":3855,"date":"2022-07-25T09:00:00","date_gmt":"2022-07-25T15:00:00","guid":{"rendered":"https:\/\/idsinc.com\/?p=3855"},"modified":"2026-03-09T14:55:25","modified_gmt":"2026-03-09T20:55:25","slug":"trade-secret-loss","status":"publish","type":"post","link":"https:\/\/idsinc.com\/en_gb\/trade-secret-loss\/","title":{"rendered":"Mitigating Trade Secret Loss \u2013 The Easy Way"},"content":{"rendered":"<!--themify_builder_content-->\n<div id=\"themify_builder_content-3855\" data-postid=\"3855\" class=\"themify_builder_content themify_builder_content-3855 themify_builder tf_clear\">\n    <\/div>\n<!--\/themify_builder_content-->\n\n\n<p>With the Great Resignation in full swing, employees are leaving in droves. What does the Great Resignation mean for employers? Employers are now struggling to protect themselves against the consequences of employees\u2019 departures. When employees leave, they often take a lot more than their experience. A key employee or a group of employees may, intentionally or unintentionally, take and transfer valuable trade secrets that a competitor may use to their advantage. Fortunately, two simple steps can help employers prevent trade secret loss before it becomes a problem.<\/p>\n\n\n\n<p>For nearly 15 years, I\u2019ve conducted countless investigations often involving trade secret loss, theft, and\/or misappropriation. I forensically examined hundreds of devices and, when applicable, conducted dozens of face-to-face interviews. My experiences show that there are clear patterns for how data often leaves a company.<\/p>\n\n\n\n<p>My investigations show that the points of exfiltration and the methods the employees use to take company data have not changed much over time. Often, these methods include copying data to USB drives, personal email accounts, and personal cloud storage platforms. This poses a question: why does data loss keep happening in much the same way, time and time again? The employees often respond with two statements: \u201cI didn\u2019t know how it would affect me!\u201d and \u201cNo one (or nothing) stopped me!\u201d Luckily, the following two approaches\u2014one behavioral and one technical\u2013will help employers reduce data loss.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Step 1: The Behavioral Approach<\/strong><\/h3>\n\n\n\n<p><em>\u201cI didn\u2019t know it would affect me!\u201d<\/em><\/p>\n\n\n\n<p>Employees usually undergo corporate compliance training on how to handle company data. Some of the training is monthly, while some are less frequent. During onboarding, employers may give employee handbooks to read and acknowledgments to sign. Almost every employee, in my experience, has acknowledged reading words or watching videos that can be summarized as follows:<\/p>\n\n\n\n<ol class=\"wp-block-list\" type=\"1\"><li>Corporate data is owned by the corporation.<\/li><li>Employees are not allowed to take corporate data for their own use.<\/li><\/ol>\n\n\n\n<p>However, this training is often mundane or repetitive. Some employees even make jokes that other people (e.g., their kids or a patient pet) take training for them. While this training ticks some compliance checkboxes, the training rarely, if ever, discusses the aftermath of what happens when employees take corporate data. After countless hours of training, education, quizzes, tests, acknowledgments, and attestations, employees still do not know or understand the consequences of their actions.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong><em>Changes to Training<\/em><\/strong><\/h4>\n\n\n\n<p>Employee training should include discussions about the personal and financial consequences that can occur when employees become entangled in a trade secret investigation, including:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Investigations cost a lot of money.&nbsp;<br><\/strong>Frequently, the employees will be asked to pay some, if not most, of the cost of investigations. Between forensic fees and legal fees, it\u2019s not unreasonable to suggest that a \u201csimple\u201d matter may cost close to $50,000.<\/li><\/ul>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Investigations are invasive.&nbsp;<br><\/strong>Once taken, data can be copied, or transferred to other devices, or cloud storage. Forensic examiners may be asked to look through the former employees\u2019 personal computers, electronic storage devices, smartphones, email accounts, and cloud-based storage platforms to determine that the data was not further saved, used, or transmitted.&nbsp; A person\u2019s entire life may be inconveniently interrupted to prove their assertion that \u201cI didn\u2019t do anything with this data.\u201d On more than one occasion, I\u2019ve heard the equivalent of, \u201cI just want to make this go away. If I knew how difficult this process would be for me and my family, I would have never taken this data.\u201d<\/li><\/ul>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Investigations can even extend to a new employer and may cause a damaged reputation for the employees.<br><\/strong>Even worse, these investigations can lead to the termination of the employees from their new jobs. Employees do not understand the concepts of injunctions and temporary restraining orders (TROs). Those words are scary and can have a chilling effect on behavior if they\u2019re known in advance.<\/li><\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Step 2: The Technical Approach<\/strong><\/h3>\n\n\n\n<p><em>\u201cNo one (or nothing) stopped me!\u201d<\/em><\/p>\n\n\n\n<p>In my experience, most trade secret loss occurs in one or more of the following ways:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Employees copy data to a USB device, such as a hard drive or thumb drive.<\/li><li>Employees email data to a personal email account through their corporate email.<\/li><li>Employees attach data to personal email that they access through a web browser (Gmail, Yahoo, Hotmail, etc.).<\/li><li>Employees upload data directly to a personal cloud-based storage service (Google Drive, Dropbox, Box, OneDrive, etc.).<\/li><li>Employees synchronize data between corporate computers and personal devices using the same personal Apple ID across all devices.<\/li><\/ul>\n\n\n\n<p>Luckily, except for the second point, the methods above can be eliminated without a large investment in software or IT staff.&nbsp; In fact, much can be done using existing resources for maximum benefit.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong><em>Technical Changes<\/em><\/strong><\/h4>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Disable all USB write functionality by default.&nbsp;<\/strong><br>Modern operating systems make it easy to disable write access with a few mouse clicks, without the need to purchase third-party software. Any exception for USB write functionality must be reviewed and granted for a limited period of time and then taken away. Users can still be given read-only access to USBs if that is the desired business model.<\/li><\/ul>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Remove access to personal email services and non-corporate cloud storage platforms.&nbsp;<\/strong><br>Unless there is a valid business reason to use personal accounts, by default, users with access to corporate data should not have access to their personal email and cloud-based storage platforms from the same devices.&nbsp; Most modern firewalls, even those at home, allow for blacklists of unauthorized websites\/domains\/specific email addresses and whitelists of those that are allowed.<\/li><\/ul>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Enforce the use of a corporate-managed account for any corporate device.<\/strong><br>Any corporate device, e.g., mandates that an account created and managed by the company \u2013 not a personal account \u2013 is used for services like Apple ID, which allows for the synchronization of data.<\/li><\/ul>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-mitigating-risks-the-ids-way\"><strong>Mitigating Risks \u2013 The iDS Way<\/strong><\/h3>\n\n\n\n<p>In summary, employers can greatly reduce the risk of corporate data loss by:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Changing employee behavior through education that focuses on the consequences of data loss (high cost, loss of reputation, invasive) as well as prevention.<\/li><li>Eliminating common avenues of data loss (writing to USB, access to personal email services, and cloud storage platforms).<\/li><\/ul>\n\n\n\n<p>While these steps are not exhaustive and will not stop all employees from taking corporate data, these two methods, combined with basic and inexpensive security policies, will greatly reduce the amount of data that leaves companies.<\/p>\n\n\n\n<p>At iDS, we help businesses develop strategic plans to secure, store, and protect data from both internal and external threats. Our dedicated team of consultative experts comes prepared to maximize the value of your data while decreasing risk and reducing costs. iDS can provide a tailored, comprehensive strategy for managing your business\u2019 information systems over time, helping you develop everything from data maps and retention policies to specific plans designed to reduce your overall Data Footprint.<\/p>\n\n\n\n<p>Over the last 15 years, my clients have told me that I\u2019ve become quite good at these investigations. In fact, many of my clients call me for this very expertise because I am efficient and cost-conscious. Yet I yearn for a day when I stop asking the question: \u201cWhy am I seeing the same thing after all these years?\u201d In fact, in the words of my colleague, \u201cI\u2019d like to work myself out of a job.\u201d I hear there are some excellent TV shows to check out.<\/p>\n\n\n\n<p>To learn more about how the consultative experts at iDS can provide custom solutions to assist in preventing employee data loss, <a href=\"https:\/\/idsinc.com\/en_gb\/contact\/\" target=\"_blank\" rel=\"noreferrer noopener\">contact us today<\/a>.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-text-color has-alpha-channel-opacity has-background is-style-wide\" style=\"background-color:#e1e1e1;color:#e1e1e1\"\/>\n\n\n\n<p><strong><em>iDS provides consultative data solutions to corporations and law firms around the world, giving them a decisive advantage&nbsp; \u2013 both in and out of the courtroom. Our subject matter experts and data&nbsp; strategists specialize in finding solutions to complex data problems \u2013 ensuring data can be leveraged as an asset and not a liability.<\/em><\/strong><\/p>","protected":false},"excerpt":{"rendered":"<p>With the Great Resignation in full swing, employees are leaving in droves. What does the Great Resignation mean for employers? Employers are now struggling to protect themselves against the consequences of employees\u2019 departures. When employees leave, they often take a lot more than their experience. A key employee or a group of employees may, intentionally [&hellip;]<\/p>\n","protected":false},"author":20,"featured_media":3857,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[10,35],"tags":[],"class_list":["post-3855","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","category-ip","has-post-title","has-post-date","has-post-category","has-post-tag","has-post-comment","has-post-author",""],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.5 (Yoast SEO v27.5) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Mitigating Trade Secret Loss \u2013 The Easy Way | iDiscovery<\/title>\n<meta name=\"description\" content=\"Employees are leaving in droves, and often intentionally or unintentionally, take valuable trade secrets and corporate data to competitors.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/idsinc.com\/en_gb\/trade-secret-loss\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Mitigating Trade Secret Loss \u2013 The Easy Way\" \/>\n<meta property=\"og:description\" content=\"Employees are leaving in droves, and often intentionally or unintentionally, take valuable trade secrets and corporate data to competitors.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/idsinc.com\/en_gb\/trade-secret-loss\/\" \/>\n<meta property=\"og:site_name\" content=\"iDiscovery Solutions\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/iDiscovery-Solutions-110210573904472\" \/>\n<meta property=\"article:published_time\" content=\"2022-07-25T15:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-09T20:55:25+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/idsinc.com\/wp-content\/uploads\/2022\/07\/Trade-Secret-Loss-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Mike Perelman\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Mike Perelman\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/trade-secret-loss\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/trade-secret-loss\\\/\"},\"author\":{\"name\":\"Mike Perelman\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/person\\\/5b7e592a3a8683cba329f3c081bb2898\"},\"headline\":\"Mitigating Trade Secret Loss \u2013 The Easy Way\",\"datePublished\":\"2022-07-25T15:00:00+00:00\",\"dateModified\":\"2026-03-09T20:55:25+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/trade-secret-loss\\\/\"},\"wordCount\":1311,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/trade-secret-loss\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2022\\\/07\\\/Trade-Secret-Loss-scaled.jpg\",\"articleSection\":[\"Blog\",\"IP + Trade Secrets + Employee Risk\"],\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/idsinc.com\\\/trade-secret-loss\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/trade-secret-loss\\\/\",\"url\":\"https:\\\/\\\/idsinc.com\\\/trade-secret-loss\\\/\",\"name\":\"Mitigating Trade Secret Loss \u2013 The Easy Way | iDiscovery\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/trade-secret-loss\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/trade-secret-loss\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2022\\\/07\\\/Trade-Secret-Loss-scaled.jpg\",\"datePublished\":\"2022-07-25T15:00:00+00:00\",\"dateModified\":\"2026-03-09T20:55:25+00:00\",\"description\":\"Employees are leaving in droves, and often intentionally or unintentionally, take valuable trade secrets and corporate data to competitors.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/trade-secret-loss\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/idsinc.com\\\/trade-secret-loss\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/trade-secret-loss\\\/#primaryimage\",\"url\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2022\\\/07\\\/Trade-Secret-Loss-scaled.jpg\",\"contentUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2022\\\/07\\\/Trade-Secret-Loss-scaled.jpg\",\"width\":1200,\"height\":600,\"caption\":\"Employees are leaving in droves, and often intentionally or unintentionally, take valuable trade secrets and corporate data to competitors.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/trade-secret-loss\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/idsinc.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blog\",\"item\":\"https:\\\/\\\/idsinc.com\\\/de\\\/category\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Mitigating Trade Secret Loss \u2013 The Easy Way\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#website\",\"url\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/\",\"name\":\"iDiscovery Solutions\",\"description\":\"Use data to your advantage in the courtroom\",\"publisher\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#organization\"},\"alternateName\":\"iDS\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#organization\",\"name\":\"iDiscovery Solutions\",\"alternateName\":\"iDS\",\"url\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/iDS-Logo-3c-e1611176096212.png\",\"contentUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/iDS-Logo-3c-e1611176096212.png\",\"width\":100,\"height\":73,\"caption\":\"iDiscovery Solutions\"},\"image\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/iDiscovery-Solutions-110210573904472\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/idsinc\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCarv7o1MeYfCp0eZ1IrufIw\"],\"description\":\"iDS provides consultative data solutions to corporations and law firms around the world, giving them a decisive advantage \u2013 both in and out of the courtroom. iDS\u2019s subject matter experts and data strategists specialize in finding solutions to complex data problems, ensuring data can be leveraged as an asset, not a liability.\",\"email\":\"info@idsinc.com\",\"telephone\":\"+1.800.813.4832\",\"legalName\":\"iDiscovery Solutions\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/person\\\/5b7e592a3a8683cba329f3c081bb2898\",\"name\":\"Mike Perelman\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/7a4220262c86656613d34d417960a5a09e23358dbab20d95fe5c6ff52f4b4592?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/7a4220262c86656613d34d417960a5a09e23358dbab20d95fe5c6ff52f4b4592?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/7a4220262c86656613d34d417960a5a09e23358dbab20d95fe5c6ff52f4b4592?s=96&d=mm&r=g\",\"caption\":\"Mike Perelman\"},\"url\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/author\\\/mike-perelman\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Mitigating Trade Secret Loss \u2013 The Easy Way | iDiscovery","description":"Employees are leaving in droves, and often intentionally or unintentionally, take valuable trade secrets and corporate data to competitors.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/idsinc.com\/en_gb\/trade-secret-loss\/","og_locale":"en_GB","og_type":"article","og_title":"Mitigating Trade Secret Loss \u2013 The Easy Way","og_description":"Employees are leaving in droves, and often intentionally or unintentionally, take valuable trade secrets and corporate data to competitors.","og_url":"https:\/\/idsinc.com\/en_gb\/trade-secret-loss\/","og_site_name":"iDiscovery Solutions","article_publisher":"https:\/\/www.facebook.com\/iDiscovery-Solutions-110210573904472","article_published_time":"2022-07-25T15:00:00+00:00","article_modified_time":"2026-03-09T20:55:25+00:00","og_image":[{"width":1200,"height":600,"url":"https:\/\/idsinc.com\/wp-content\/uploads\/2022\/07\/Trade-Secret-Loss-scaled.jpg","type":"image\/jpeg"}],"author":"Mike Perelman","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Mike Perelman","Estimated reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/idsinc.com\/trade-secret-loss\/#article","isPartOf":{"@id":"https:\/\/idsinc.com\/trade-secret-loss\/"},"author":{"name":"Mike Perelman","@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/person\/5b7e592a3a8683cba329f3c081bb2898"},"headline":"Mitigating Trade Secret Loss \u2013 The Easy Way","datePublished":"2022-07-25T15:00:00+00:00","dateModified":"2026-03-09T20:55:25+00:00","mainEntityOfPage":{"@id":"https:\/\/idsinc.com\/trade-secret-loss\/"},"wordCount":1311,"commentCount":0,"publisher":{"@id":"https:\/\/idsinc.com\/en_gb\/#organization"},"image":{"@id":"https:\/\/idsinc.com\/trade-secret-loss\/#primaryimage"},"thumbnailUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2022\/07\/Trade-Secret-Loss-scaled.jpg","articleSection":["Blog","IP + Trade Secrets + Employee Risk"],"inLanguage":"en-GB","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/idsinc.com\/trade-secret-loss\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/idsinc.com\/trade-secret-loss\/","url":"https:\/\/idsinc.com\/trade-secret-loss\/","name":"Mitigating Trade Secret Loss \u2013 The Easy Way | iDiscovery","isPartOf":{"@id":"https:\/\/idsinc.com\/en_gb\/#website"},"primaryImageOfPage":{"@id":"https:\/\/idsinc.com\/trade-secret-loss\/#primaryimage"},"image":{"@id":"https:\/\/idsinc.com\/trade-secret-loss\/#primaryimage"},"thumbnailUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2022\/07\/Trade-Secret-Loss-scaled.jpg","datePublished":"2022-07-25T15:00:00+00:00","dateModified":"2026-03-09T20:55:25+00:00","description":"Employees are leaving in droves, and often intentionally or unintentionally, take valuable trade secrets and corporate data to competitors.","breadcrumb":{"@id":"https:\/\/idsinc.com\/trade-secret-loss\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/idsinc.com\/trade-secret-loss\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/idsinc.com\/trade-secret-loss\/#primaryimage","url":"https:\/\/idsinc.com\/wp-content\/uploads\/2022\/07\/Trade-Secret-Loss-scaled.jpg","contentUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2022\/07\/Trade-Secret-Loss-scaled.jpg","width":1200,"height":600,"caption":"Employees are leaving in droves, and often intentionally or unintentionally, take valuable trade secrets and corporate data to competitors."},{"@type":"BreadcrumbList","@id":"https:\/\/idsinc.com\/trade-secret-loss\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/idsinc.com\/"},{"@type":"ListItem","position":2,"name":"Blog","item":"https:\/\/idsinc.com\/de\/category\/blog\/"},{"@type":"ListItem","position":3,"name":"Mitigating Trade Secret Loss \u2013 The Easy Way"}]},{"@type":"WebSite","@id":"https:\/\/idsinc.com\/en_gb\/#website","url":"https:\/\/idsinc.com\/en_gb\/","name":"iDiscovery Solutions","description":"Use data to your advantage in the courtroom","publisher":{"@id":"https:\/\/idsinc.com\/en_gb\/#organization"},"alternateName":"iDS","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/idsinc.com\/en_gb\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/idsinc.com\/en_gb\/#organization","name":"iDiscovery Solutions","alternateName":"iDS","url":"https:\/\/idsinc.com\/en_gb\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/logo\/image\/","url":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/iDS-Logo-3c-e1611176096212.png","contentUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/iDS-Logo-3c-e1611176096212.png","width":100,"height":73,"caption":"iDiscovery Solutions"},"image":{"@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/iDiscovery-Solutions-110210573904472","https:\/\/www.linkedin.com\/company\/idsinc","https:\/\/www.youtube.com\/channel\/UCarv7o1MeYfCp0eZ1IrufIw"],"description":"iDS provides consultative data solutions to corporations and law firms around the world, giving them a decisive advantage \u2013 both in and out of the courtroom. iDS\u2019s subject matter experts and data strategists specialize in finding solutions to complex data problems, ensuring data can be leveraged as an asset, not a liability.","email":"info@idsinc.com","telephone":"+1.800.813.4832","legalName":"iDiscovery Solutions"},{"@type":"Person","@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/person\/5b7e592a3a8683cba329f3c081bb2898","name":"Mike Perelman","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/secure.gravatar.com\/avatar\/7a4220262c86656613d34d417960a5a09e23358dbab20d95fe5c6ff52f4b4592?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/7a4220262c86656613d34d417960a5a09e23358dbab20d95fe5c6ff52f4b4592?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/7a4220262c86656613d34d417960a5a09e23358dbab20d95fe5c6ff52f4b4592?s=96&d=mm&r=g","caption":"Mike Perelman"},"url":"https:\/\/idsinc.com\/en_gb\/author\/mike-perelman\/"}]}},"builder_content":"","_links":{"self":[{"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/posts\/3855","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/users\/20"}],"replies":[{"embeddable":true,"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/comments?post=3855"}],"version-history":[{"count":1,"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/posts\/3855\/revisions"}],"predecessor-version":[{"id":9477,"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/posts\/3855\/revisions\/9477"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/media\/3857"}],"wp:attachment":[{"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/media?parent=3855"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/categories?post=3855"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/tags?post=3855"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}