{"id":9572,"date":"2026-03-26T08:43:24","date_gmt":"2026-03-26T14:43:24","guid":{"rendered":"https:\/\/idsinc.com\/?p=9572"},"modified":"2026-03-26T08:43:28","modified_gmt":"2026-03-26T14:43:28","slug":"intellectual-property-data","status":"publish","type":"post","link":"https:\/\/idsinc.com\/en_gb\/intellectual-property-data\/","title":{"rendered":"When Intellectual Property Walks Out the Door, the Data Stays Behind"},"content":{"rendered":"<!-- wp:themify-builder\/canvas \/-->\n\n\n<h6 class=\"wp-block-heading\" id=\"h-the-most-damaging-corporate-heists-today-don-t-involve-broken-locks-or-midnight-alarms-they-involve-a-departing-employee-a-personal-cloud-account-and-a-few-seconds-of-silence-intellectual-property-ai-proprietary-code-pricing-strategies-client-lists-strategic-roadmaps-ai-can-walk-out-the-door-without-a-sound\"><strong>The most damaging corporate heists today don&#8217;t involve broken locks or midnight alarms. They involve a departing employee, a personal cloud account, and a few seconds of silence. Intellectual property \u201a AI proprietary code, pricing strategies, client lists, strategic roadmaps \u201a AI can walk out the door without a sound.<\/strong><\/h6>\n\n\n\n<p>But what many insider threats fail to realize is this: the digital world doesn&#8217;t forget. In a newly published article on <a href=\"https:\/\/www.lexology.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">Lexology<\/a>, iDS team member <a href=\"https:\/\/idsinc.com\/en_gb\/timothy-latulippe\/\" target=\"_blank\" rel=\"noreferrer noopener\">Timothy LaTulippe<\/a> examines what he describes as an &#8220;invisible epidemic&#8221; of IP theft \u2014 and, crucially, why those who attempt it almost always leave a trail behind.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-every-digital-action-triggers-a-forensic-reaction\"><strong>Every Digital Action Triggers a Forensic Reaction<\/strong><strong><\/strong><\/h3>\n\n\n\n<p>LaTulippe introduces the concept of &#8220;digital exhaust&#8221; \u2014 the forensic residue left behind by every interaction with a device or file. Traditional IT monitoring might miss a single upload to a personal Dropbox. Forensic analysis, however, goes much deeper.<strong><\/strong><\/p>\n\n\n\n<p>Through artifacts like LNK files, Jump Lists, Shellbags, and Registry keys, investigators can reconstruct a precise timeline of what was accessed, when, and from where\u201a even if the device used to move the data is long gone.<strong><\/strong><\/p>\n\n\n\n<p>The strategic implication for legal counsel is significant. The question is no longer just <em>what<\/em> was taken, but <em>how<\/em> \u2014 establishing a clear record of knowledge and intent. As LaTulippe illustrates, if an employee searches &#8220;how to wipe a browser history&#8221; shortly after a mass download of client data, the &#8220;innocent mistake&#8221; defense becomes very hard to sustain.<\/p>\n\n\n\n<p>These Windows system artifacts are, in his words, just a drop in the bucket. But when paired with context from HR and legal teams, they can paint a powerful picture and fortify the claims process considerably.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-what-s-coming-in-the-series\"><strong>What&#8217;s Coming in the Series<\/strong><strong><\/strong><\/h3>\n\n\n\n<p>This article is the first in a multi-part series. Upcoming installments will explore how additional forensic artifacts help investigators uncover post-termination restriction (PTR) violations, the building of &#8220;shadow&#8221; competing businesses, and how these findings move from investigation to court-admissible evidence.<strong><\/strong><\/p>\n\n\n\n<p>At iDS, this is the work we do every day \u2014 helping legal teams, corporate counsel, and investigators leverage data as a strategic advantage, both in and out of the courtroom.<br><\/p>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\" style=\"margin-top:var(--wp--preset--spacing--20);margin-bottom:var(--wp--preset--spacing--60)\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link has-white-color has-text-color has-background has-link-color wp-element-button\" href=\"https:\/\/www.lexology.com\/library\/detail.aspx?g=f5558a87-bf55-4840-afc7-169b12a74f52\" style=\"background-color:#ee5d20\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Read the full article on Lexology<\/strong><\/a><\/div>\n<\/div>\n\n\n\n<p>If your organization is facing questions about insider threats or IP misappropriation, visit <a href=\"https:\/\/idsinc.com\/en_gb\/\" target=\"_blank\" rel=\"noreferrer noopener\">idsinc.com<\/a> to schedule a conversation with one of our experts.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<p><em><strong>iDS provides consultative data solutions to corporations and law firms around the world, giving them a decisive advantage \u2013 both in and out of the courtroom. iDS\u2019s subject matter experts and data strategists specialize in finding solutions to complex data problems, ensuring data can be leveraged as an asset, not a liability. To learn more, visit <a href=\"https:\/\/idsinc.com\/en_gb\/\" type=\"link\" id=\"https:\/\/idsinc.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">idsinc.com<\/a>.<\/strong><\/em><\/p>\n\n\n\n<p><em>Having trouble with a technical term used in this post? Check out our&nbsp;<\/em><a href=\"https:\/\/idsinc.com\/en_gb\/glossary\/\" target=\"_blank\" rel=\"noreferrer noopener\"><em>Data Investigators Glossary<\/em><\/a><em>&nbsp;to crack the code.&nbsp;<\/em><\/p>","protected":false},"excerpt":{"rendered":"<p>The most damaging corporate heists today don&#8217;t involve broken locks or midnight alarms. They involve a departing employee, a personal cloud account, and a few seconds of silence. Intellectual property \u201a AI proprietary code, pricing strategies, client lists, strategic roadmaps \u201a AI can walk out the door without a sound. But what many insider threats [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":9573,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[10,35],"tags":[],"class_list":["post-9572","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","category-ip","has-post-title","has-post-date","has-post-category","has-post-tag","has-post-comment","has-post-author",""],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.5 (Yoast SEO v27.5) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>When Intellectual Property Walks Out the Door, Data Stays Behind<\/title>\n<meta name=\"description\" content=\"The most damaging corporate heists today involves departing employees. Intellectual property data can walk out the door without a sound.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/idsinc.com\/en_gb\/intellectual-property-data\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"When Intellectual Property Walks Out the Door, the Data Stays Behind\" \/>\n<meta property=\"og:description\" content=\"The most damaging corporate heists today involves departing employees. Intellectual property data can walk out the door without a sound.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/idsinc.com\/en_gb\/intellectual-property-data\/\" \/>\n<meta property=\"og:site_name\" content=\"iDiscovery Solutions\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/iDiscovery-Solutions-110210573904472\" \/>\n<meta property=\"article:published_time\" content=\"2026-03-26T14:43:24+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-26T14:43:28+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/idsinc.com\/wp-content\/uploads\/2026\/03\/LEX-Part-1-Invisible-Heist-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"960\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"iDiscovery Solutions\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"iDiscovery Solutions\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/intellectual-property-data\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/intellectual-property-data\\\/\"},\"author\":{\"name\":\"iDiscovery Solutions\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/person\\\/bf7f03a502e8a54e558c44d0ff5d6736\"},\"headline\":\"When Intellectual Property Walks Out the Door, the Data Stays Behind\",\"datePublished\":\"2026-03-26T14:43:24+00:00\",\"dateModified\":\"2026-03-26T14:43:28+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/intellectual-property-data\\\/\"},\"wordCount\":471,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/intellectual-property-data\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/LEX-Part-1-Invisible-Heist-scaled.jpg\",\"articleSection\":[\"Blog\",\"IP + Trade Secrets + Employee Risk\"],\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/idsinc.com\\\/intellectual-property-data\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/intellectual-property-data\\\/\",\"url\":\"https:\\\/\\\/idsinc.com\\\/intellectual-property-data\\\/\",\"name\":\"When Intellectual Property Walks Out the Door, Data Stays Behind\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/intellectual-property-data\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/intellectual-property-data\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/LEX-Part-1-Invisible-Heist-scaled.jpg\",\"datePublished\":\"2026-03-26T14:43:24+00:00\",\"dateModified\":\"2026-03-26T14:43:28+00:00\",\"description\":\"The most damaging corporate heists today involves departing employees. Intellectual property data can walk out the door without a sound.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/intellectual-property-data\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/idsinc.com\\\/intellectual-property-data\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/intellectual-property-data\\\/#primaryimage\",\"url\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/LEX-Part-1-Invisible-Heist-scaled.jpg\",\"contentUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/LEX-Part-1-Invisible-Heist-scaled.jpg\",\"width\":1920,\"height\":960,\"caption\":\"The most damaging corporate heists today involves departing employees. Intellectual property data can walk out the door without a sound.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/intellectual-property-data\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/idsinc.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blog\",\"item\":\"https:\\\/\\\/idsinc.com\\\/de\\\/category\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"When Intellectual Property Walks Out the Door, the Data Stays Behind\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#website\",\"url\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/\",\"name\":\"iDiscovery Solutions\",\"description\":\"Use data to your advantage in the courtroom\",\"publisher\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#organization\"},\"alternateName\":\"iDS\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#organization\",\"name\":\"iDiscovery Solutions\",\"alternateName\":\"iDS\",\"url\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/iDS-Logo-3c-e1611176096212.png\",\"contentUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/iDS-Logo-3c-e1611176096212.png\",\"width\":100,\"height\":73,\"caption\":\"iDiscovery Solutions\"},\"image\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/iDiscovery-Solutions-110210573904472\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/idsinc\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCarv7o1MeYfCp0eZ1IrufIw\"],\"description\":\"iDS provides consultative data solutions to corporations and law firms around the world, giving them a decisive advantage \u2013 both in and out of the courtroom. iDS\u2019s subject matter experts and data strategists specialize in finding solutions to complex data problems, ensuring data can be leveraged as an asset, not a liability.\",\"email\":\"info@idsinc.com\",\"telephone\":\"+1.800.813.4832\",\"legalName\":\"iDiscovery Solutions\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/person\\\/bf7f03a502e8a54e558c44d0ff5d6736\",\"name\":\"iDiscovery Solutions\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6009d8a07526a79850b1d0045087bcee60e562f90891f19a42de7ee7f4452529?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6009d8a07526a79850b1d0045087bcee60e562f90891f19a42de7ee7f4452529?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6009d8a07526a79850b1d0045087bcee60e562f90891f19a42de7ee7f4452529?s=96&d=mm&r=g\",\"caption\":\"iDiscovery Solutions\"},\"url\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/author\\\/idiscovery\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"When Intellectual Property Walks Out the Door, Data Stays Behind","description":"The most damaging corporate heists today involves departing employees. Intellectual property data can walk out the door without a sound.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/idsinc.com\/en_gb\/intellectual-property-data\/","og_locale":"en_GB","og_type":"article","og_title":"When Intellectual Property Walks Out the Door, the Data Stays Behind","og_description":"The most damaging corporate heists today involves departing employees. Intellectual property data can walk out the door without a sound.","og_url":"https:\/\/idsinc.com\/en_gb\/intellectual-property-data\/","og_site_name":"iDiscovery Solutions","article_publisher":"https:\/\/www.facebook.com\/iDiscovery-Solutions-110210573904472","article_published_time":"2026-03-26T14:43:24+00:00","article_modified_time":"2026-03-26T14:43:28+00:00","og_image":[{"width":1920,"height":960,"url":"https:\/\/idsinc.com\/wp-content\/uploads\/2026\/03\/LEX-Part-1-Invisible-Heist-scaled.jpg","type":"image\/jpeg"}],"author":"iDiscovery Solutions","twitter_card":"summary_large_image","twitter_misc":{"Written by":"iDiscovery Solutions","Estimated reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/idsinc.com\/intellectual-property-data\/#article","isPartOf":{"@id":"https:\/\/idsinc.com\/intellectual-property-data\/"},"author":{"name":"iDiscovery Solutions","@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/person\/bf7f03a502e8a54e558c44d0ff5d6736"},"headline":"When Intellectual Property Walks Out the Door, the Data Stays Behind","datePublished":"2026-03-26T14:43:24+00:00","dateModified":"2026-03-26T14:43:28+00:00","mainEntityOfPage":{"@id":"https:\/\/idsinc.com\/intellectual-property-data\/"},"wordCount":471,"commentCount":0,"publisher":{"@id":"https:\/\/idsinc.com\/en_gb\/#organization"},"image":{"@id":"https:\/\/idsinc.com\/intellectual-property-data\/#primaryimage"},"thumbnailUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2026\/03\/LEX-Part-1-Invisible-Heist-scaled.jpg","articleSection":["Blog","IP + Trade Secrets + Employee Risk"],"inLanguage":"en-GB","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/idsinc.com\/intellectual-property-data\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/idsinc.com\/intellectual-property-data\/","url":"https:\/\/idsinc.com\/intellectual-property-data\/","name":"When Intellectual Property Walks Out the Door, Data Stays Behind","isPartOf":{"@id":"https:\/\/idsinc.com\/en_gb\/#website"},"primaryImageOfPage":{"@id":"https:\/\/idsinc.com\/intellectual-property-data\/#primaryimage"},"image":{"@id":"https:\/\/idsinc.com\/intellectual-property-data\/#primaryimage"},"thumbnailUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2026\/03\/LEX-Part-1-Invisible-Heist-scaled.jpg","datePublished":"2026-03-26T14:43:24+00:00","dateModified":"2026-03-26T14:43:28+00:00","description":"The most damaging corporate heists today involves departing employees. Intellectual property data can walk out the door without a sound.","breadcrumb":{"@id":"https:\/\/idsinc.com\/intellectual-property-data\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/idsinc.com\/intellectual-property-data\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/idsinc.com\/intellectual-property-data\/#primaryimage","url":"https:\/\/idsinc.com\/wp-content\/uploads\/2026\/03\/LEX-Part-1-Invisible-Heist-scaled.jpg","contentUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2026\/03\/LEX-Part-1-Invisible-Heist-scaled.jpg","width":1920,"height":960,"caption":"The most damaging corporate heists today involves departing employees. Intellectual property data can walk out the door without a sound."},{"@type":"BreadcrumbList","@id":"https:\/\/idsinc.com\/intellectual-property-data\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/idsinc.com\/"},{"@type":"ListItem","position":2,"name":"Blog","item":"https:\/\/idsinc.com\/de\/category\/blog\/"},{"@type":"ListItem","position":3,"name":"When Intellectual Property Walks Out the Door, the Data Stays Behind"}]},{"@type":"WebSite","@id":"https:\/\/idsinc.com\/en_gb\/#website","url":"https:\/\/idsinc.com\/en_gb\/","name":"iDiscovery Solutions","description":"Use data to your advantage in the courtroom","publisher":{"@id":"https:\/\/idsinc.com\/en_gb\/#organization"},"alternateName":"iDS","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/idsinc.com\/en_gb\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/idsinc.com\/en_gb\/#organization","name":"iDiscovery Solutions","alternateName":"iDS","url":"https:\/\/idsinc.com\/en_gb\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/logo\/image\/","url":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/iDS-Logo-3c-e1611176096212.png","contentUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/iDS-Logo-3c-e1611176096212.png","width":100,"height":73,"caption":"iDiscovery Solutions"},"image":{"@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/iDiscovery-Solutions-110210573904472","https:\/\/www.linkedin.com\/company\/idsinc","https:\/\/www.youtube.com\/channel\/UCarv7o1MeYfCp0eZ1IrufIw"],"description":"iDS provides consultative data solutions to corporations and law firms around the world, giving them a decisive advantage \u2013 both in and out of the courtroom. iDS\u2019s subject matter experts and data strategists specialize in finding solutions to complex data problems, ensuring data can be leveraged as an asset, not a liability.","email":"info@idsinc.com","telephone":"+1.800.813.4832","legalName":"iDiscovery Solutions"},{"@type":"Person","@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/person\/bf7f03a502e8a54e558c44d0ff5d6736","name":"iDiscovery Solutions","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/secure.gravatar.com\/avatar\/6009d8a07526a79850b1d0045087bcee60e562f90891f19a42de7ee7f4452529?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/6009d8a07526a79850b1d0045087bcee60e562f90891f19a42de7ee7f4452529?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/6009d8a07526a79850b1d0045087bcee60e562f90891f19a42de7ee7f4452529?s=96&d=mm&r=g","caption":"iDiscovery Solutions"},"url":"https:\/\/idsinc.com\/en_gb\/author\/idiscovery\/"}]}},"builder_content":"","_links":{"self":[{"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/posts\/9572","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/comments?post=9572"}],"version-history":[{"count":2,"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/posts\/9572\/revisions"}],"predecessor-version":[{"id":9578,"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/posts\/9572\/revisions\/9578"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/media\/9573"}],"wp:attachment":[{"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/media?parent=9572"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/categories?post=9572"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/tags?post=9572"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}