{"id":9622,"date":"2026-04-13T10:03:17","date_gmt":"2026-04-13T16:03:17","guid":{"rendered":"https:\/\/idsinc.com\/?p=9622"},"modified":"2026-04-13T10:03:20","modified_gmt":"2026-04-13T16:03:20","slug":"caught-on-company-time","status":"publish","type":"post","link":"https:\/\/idsinc.com\/en_gb\/caught-on-company-time\/","title":{"rendered":"Caught on Company Time"},"content":{"rendered":"<!-- wp:themify-builder\/canvas \/-->\n\n\n<p>Of all the insider threats an organization can face, one of the most damaging is also one of the hardest to detect: the employee who is actively building a competing business while still sitting at your desk, drawing your salary, and using your resources.<\/p>\n\n\n\n<p>It is a direct violation of fiduciary duty and a profound breach of trust. And yet, as iDS team member <a href=\"https:\/\/idsinc.com\/en_gb\/timothy-latulippe\/\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Timothy LaTulippe<\/strong><\/a> explains in the third installment of the <a href=\"https:\/\/idsinc.com\/en_gb\/intellectual-property-data\/\" target=\"_blank\" rel=\"noreferrer noopener\"><em>Broken Covenants<\/em><\/a> series on <a href=\"https:\/\/www.lexology.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">Lexology<\/a>, traditional HR interviews and performance reviews rarely surface the proof needed to act.<\/p>\n\n\n\n<p>The digital record, however, is far harder to obscure.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-the-concurrent-login\"><strong>The Concurrent Login<\/strong><\/h3>\n\n\n\n<p>The starting point for many of these investigations is what LaTulippe calls the <strong>concurrent login<\/strong> \u2014 the forensic evidence of an employee toggling between legitimate company systems and a hidden shadow infrastructure, often within the same working day.<\/p>\n\n\n\n<p>By analysing browser artifacts, cookie data, and active network connections, investigators can identify the precise moments when an employee was registering a competing domain, researching office space, or drafting a rival business plan \u2014 all during core working hours, on company time and company equipment. The digital record draws a clear line between where the employee&#8217;s professional persona ended and their competitive one began.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-artefacts-of-execution\"><strong>Artefacts of Execution<\/strong><\/h3>\n\n\n\n<p>Beyond time theft, the investigation turns to what LaTulippe describes as <strong>artefacts of execution<\/strong> \u2014 technical evidence that company resources were directly used to subsidize a start-up. This includes proprietary templates stripped of company branding, internal CRM systems queried to export high-value client leads into a personal spreadsheet, and a pattern of data access that tells a story of someone who had mentally checked out long before their resignation letter arrived.<\/p>\n\n\n\n<p>The goal is a day-in-the-life forensic reconstruction: a chronological narrative that shows the evolution of a betrayal \u2014 from early preparation through to a functioning, competing entity \u2014 presented in a form that holds up before a judge.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-the-role-of-osint\"><strong>The Role of OSINT<\/strong><\/h3>\n\n\n\n<p>No two shadow competitors operate the same way, but open-source intelligence (OSINT) adds a powerful layer to any investigation. LaTulippe describes how social media footprints, domain registration history, and cached versions of competitor websites can reveal that a new business was being staged months before an employee officially departed \u2014 often while their salary was still being paid by the very organization they were undermining.<\/p>\n\n\n\n<p>When public filings and digital signals are layered over internal forensic findings, investigators can demonstrate that the groundwork for a competing venture was built using the employer&#8217;s own tools, time, and client data.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-what-s-coming-next\"><strong>What&#8217;s Coming Next<\/strong><\/h3>\n\n\n\n<p>The fourth and final article in the series tackles what LaTulippe calls the battle of the experts \u2014 the stage where admissibility and narrative clarity determine the outcome. It explores how thousands of lines of complex metadata are transformed into colour-coded visual timelines that a judge can intuitively understand, why a well-constructed forensic report often drives settlement long before a case reaches trial, and how a proactive forensic hold functions as a strategic insurance policy against misconduct in an increasingly mobile workforce.<\/p>\n\n\n\n<p>At iDS, this work spans our <a href=\"https:\/\/idsinc.com\/en_gb\/what-we-do\/digital-forensics\/\" target=\"_blank\" rel=\"noreferrer noopener\">Digital Forensics<\/a>, <a href=\"https:\/\/idsinc.com\/en_gb\/what-we-do\/#SpecialInvestigationsUnit\" target=\"_blank\" rel=\"noreferrer noopener\">Investigations<\/a>, and <a href=\"https:\/\/idsinc.com\/en_gb\/what-we-do\/#ediscovery\" target=\"_blank\" rel=\"noreferrer noopener\">eDiscovery &amp; Disclosure<\/a> practices \u2014 turning complex digital evidence into clear, defensible narratives that support legal teams from investigation through to trial.<a href=\"https:\/\/www.lexology.com\/library\/detail.aspx?g=7f883dc4-7bcc-4001-84f4-e2323b687d41\" type=\"link\" id=\"https:\/\/www.lexology.com\/library\/detail.aspx?g=7f883dc4-7bcc-4001-84f4-e2323b687d41\" target=\"_blank\" rel=\"noreferrer noopener\"><strong><br><\/strong><\/a><\/p>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\" style=\"margin-top:var(--wp--preset--spacing--20);margin-bottom:var(--wp--preset--spacing--60)\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link has-white-color has-text-color has-background has-link-color wp-element-button\" href=\"https:\/\/www.lexology.com\/library\/detail.aspx?g=7f883dc4-7bcc-4001-84f4-e2323b687d41\" style=\"background-color:#ee5d20\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Read the full article on Lexology<\/strong><\/a><\/div>\n<\/div>\n\n\n\n<p>To connect with an iDS expert about your next investigation, visit <a href=\"https:\/\/idsinc.com\/en_gb\/\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>idsinc.com<\/strong><\/a><strong>.<\/strong><\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<p><strong><em>iDS provides consultative data solutions to corporations and law firms around the world, giving them a decisive advantage \u2013 both in and out of the courtroom. iDS\u2019s subject matter experts and data strategists specialize in finding solutions to complex data problems, ensuring data can be leveraged as an asset, not a liability. To learn more, visit <\/em><\/strong><a href=\"https:\/\/idsinc.com\/en_gb\/\" target=\"_blank\" rel=\"noreferrer noopener\"><strong><em>idsinc.com<\/em><\/strong><\/a><strong><em>.<\/em><\/strong><\/p>\n\n\n\n<p><em><br>Having trouble with a technical term used in this post? Check out our <\/em><a href=\"https:\/\/idsinc.com\/en_gb\/glossary\/\" target=\"_blank\" rel=\"noreferrer noopener\"><em>Data Investigators Glossary<\/em><\/a><em> to crack the code.\u00a0<\/em><\/p>","protected":false},"excerpt":{"rendered":"<p>Of all the insider threats an organization can face, one of the most damaging is also one of the hardest to detect: the employee who is actively building a competing business while still sitting at your desk, drawing your salary, and using your resources. It is a direct violation of fiduciary duty and a profound [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":9625,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[10,35],"tags":[],"class_list":["post-9622","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","category-ip","has-post-title","has-post-date","has-post-category","has-post-tag","has-post-comment","has-post-author",""],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.5 (Yoast SEO v27.5) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Caught on Company Time - iDiscovery Solutions<\/title>\n<meta name=\"description\" content=\"One of the most damaging insider threats an organization can face is the employee building competing business while using your resources.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/idsinc.com\/en_gb\/caught-on-company-time\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Caught on Company Time\" \/>\n<meta property=\"og:description\" content=\"One of the most damaging insider threats an organization can face is the employee building competing business while using your resources.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/idsinc.com\/en_gb\/caught-on-company-time\/\" \/>\n<meta property=\"og:site_name\" content=\"iDiscovery Solutions\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/iDiscovery-Solutions-110210573904472\" \/>\n<meta property=\"article:published_time\" content=\"2026-04-13T16:03:17+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-13T16:03:20+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/idsinc.com\/wp-content\/uploads\/2026\/04\/Caught-on-Company-Time-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"960\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"iDiscovery Solutions\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"iDiscovery Solutions\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/caught-on-company-time\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/caught-on-company-time\\\/\"},\"author\":{\"name\":\"iDiscovery Solutions\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/person\\\/bf7f03a502e8a54e558c44d0ff5d6736\"},\"headline\":\"Caught on Company Time\",\"datePublished\":\"2026-04-13T16:03:17+00:00\",\"dateModified\":\"2026-04-13T16:03:20+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/caught-on-company-time\\\/\"},\"wordCount\":629,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/caught-on-company-time\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2026\\\/04\\\/Caught-on-Company-Time-scaled.jpg\",\"articleSection\":[\"Blog\",\"IP + Trade Secrets + Employee Risk\"],\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/idsinc.com\\\/caught-on-company-time\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/caught-on-company-time\\\/\",\"url\":\"https:\\\/\\\/idsinc.com\\\/caught-on-company-time\\\/\",\"name\":\"Caught on Company Time - iDiscovery Solutions\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/caught-on-company-time\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/caught-on-company-time\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2026\\\/04\\\/Caught-on-Company-Time-scaled.jpg\",\"datePublished\":\"2026-04-13T16:03:17+00:00\",\"dateModified\":\"2026-04-13T16:03:20+00:00\",\"description\":\"One of the most damaging insider threats an organization can face is the employee building competing business while using your resources.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/caught-on-company-time\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/idsinc.com\\\/caught-on-company-time\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/caught-on-company-time\\\/#primaryimage\",\"url\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2026\\\/04\\\/Caught-on-Company-Time-scaled.jpg\",\"contentUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2026\\\/04\\\/Caught-on-Company-Time-scaled.jpg\",\"width\":1920,\"height\":960,\"caption\":\"One of the most damaging insider threats an organization can face is the employee building competing business while using your resources.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/caught-on-company-time\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/idsinc.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blog\",\"item\":\"https:\\\/\\\/idsinc.com\\\/de\\\/category\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Caught on Company Time\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#website\",\"url\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/\",\"name\":\"iDiscovery Solutions\",\"description\":\"Use data to your advantage in the courtroom\",\"publisher\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#organization\"},\"alternateName\":\"iDS\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#organization\",\"name\":\"iDiscovery Solutions\",\"alternateName\":\"iDS\",\"url\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/iDS-Logo-3c-e1611176096212.png\",\"contentUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/iDS-Logo-3c-e1611176096212.png\",\"width\":100,\"height\":73,\"caption\":\"iDiscovery Solutions\"},\"image\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/iDiscovery-Solutions-110210573904472\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/idsinc\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCarv7o1MeYfCp0eZ1IrufIw\"],\"description\":\"iDS provides consultative data solutions to corporations and law firms around the world, giving them a decisive advantage \u2013 both in and out of the courtroom. iDS\u2019s subject matter experts and data strategists specialize in finding solutions to complex data problems, ensuring data can be leveraged as an asset, not a liability.\",\"email\":\"info@idsinc.com\",\"telephone\":\"+1.800.813.4832\",\"legalName\":\"iDiscovery Solutions\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/person\\\/bf7f03a502e8a54e558c44d0ff5d6736\",\"name\":\"iDiscovery Solutions\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6009d8a07526a79850b1d0045087bcee60e562f90891f19a42de7ee7f4452529?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6009d8a07526a79850b1d0045087bcee60e562f90891f19a42de7ee7f4452529?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6009d8a07526a79850b1d0045087bcee60e562f90891f19a42de7ee7f4452529?s=96&d=mm&r=g\",\"caption\":\"iDiscovery Solutions\"},\"url\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/author\\\/idiscovery\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Caught on Company Time - iDiscovery Solutions","description":"One of the most damaging insider threats an organization can face is the employee building competing business while using your resources.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/idsinc.com\/en_gb\/caught-on-company-time\/","og_locale":"en_GB","og_type":"article","og_title":"Caught on Company Time","og_description":"One of the most damaging insider threats an organization can face is the employee building competing business while using your resources.","og_url":"https:\/\/idsinc.com\/en_gb\/caught-on-company-time\/","og_site_name":"iDiscovery Solutions","article_publisher":"https:\/\/www.facebook.com\/iDiscovery-Solutions-110210573904472","article_published_time":"2026-04-13T16:03:17+00:00","article_modified_time":"2026-04-13T16:03:20+00:00","og_image":[{"width":1920,"height":960,"url":"https:\/\/idsinc.com\/wp-content\/uploads\/2026\/04\/Caught-on-Company-Time-scaled.jpg","type":"image\/jpeg"}],"author":"iDiscovery Solutions","twitter_card":"summary_large_image","twitter_misc":{"Written by":"iDiscovery Solutions","Estimated reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/idsinc.com\/caught-on-company-time\/#article","isPartOf":{"@id":"https:\/\/idsinc.com\/caught-on-company-time\/"},"author":{"name":"iDiscovery Solutions","@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/person\/bf7f03a502e8a54e558c44d0ff5d6736"},"headline":"Caught on Company Time","datePublished":"2026-04-13T16:03:17+00:00","dateModified":"2026-04-13T16:03:20+00:00","mainEntityOfPage":{"@id":"https:\/\/idsinc.com\/caught-on-company-time\/"},"wordCount":629,"commentCount":0,"publisher":{"@id":"https:\/\/idsinc.com\/en_gb\/#organization"},"image":{"@id":"https:\/\/idsinc.com\/caught-on-company-time\/#primaryimage"},"thumbnailUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2026\/04\/Caught-on-Company-Time-scaled.jpg","articleSection":["Blog","IP + Trade Secrets + Employee Risk"],"inLanguage":"en-GB","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/idsinc.com\/caught-on-company-time\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/idsinc.com\/caught-on-company-time\/","url":"https:\/\/idsinc.com\/caught-on-company-time\/","name":"Caught on Company Time - iDiscovery Solutions","isPartOf":{"@id":"https:\/\/idsinc.com\/en_gb\/#website"},"primaryImageOfPage":{"@id":"https:\/\/idsinc.com\/caught-on-company-time\/#primaryimage"},"image":{"@id":"https:\/\/idsinc.com\/caught-on-company-time\/#primaryimage"},"thumbnailUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2026\/04\/Caught-on-Company-Time-scaled.jpg","datePublished":"2026-04-13T16:03:17+00:00","dateModified":"2026-04-13T16:03:20+00:00","description":"One of the most damaging insider threats an organization can face is the employee building competing business while using your resources.","breadcrumb":{"@id":"https:\/\/idsinc.com\/caught-on-company-time\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/idsinc.com\/caught-on-company-time\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/idsinc.com\/caught-on-company-time\/#primaryimage","url":"https:\/\/idsinc.com\/wp-content\/uploads\/2026\/04\/Caught-on-Company-Time-scaled.jpg","contentUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2026\/04\/Caught-on-Company-Time-scaled.jpg","width":1920,"height":960,"caption":"One of the most damaging insider threats an organization can face is the employee building competing business while using your resources."},{"@type":"BreadcrumbList","@id":"https:\/\/idsinc.com\/caught-on-company-time\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/idsinc.com\/"},{"@type":"ListItem","position":2,"name":"Blog","item":"https:\/\/idsinc.com\/de\/category\/blog\/"},{"@type":"ListItem","position":3,"name":"Caught on Company Time"}]},{"@type":"WebSite","@id":"https:\/\/idsinc.com\/en_gb\/#website","url":"https:\/\/idsinc.com\/en_gb\/","name":"iDiscovery Solutions","description":"Use data to your advantage in the courtroom","publisher":{"@id":"https:\/\/idsinc.com\/en_gb\/#organization"},"alternateName":"iDS","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/idsinc.com\/en_gb\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/idsinc.com\/en_gb\/#organization","name":"iDiscovery Solutions","alternateName":"iDS","url":"https:\/\/idsinc.com\/en_gb\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/logo\/image\/","url":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/iDS-Logo-3c-e1611176096212.png","contentUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/iDS-Logo-3c-e1611176096212.png","width":100,"height":73,"caption":"iDiscovery Solutions"},"image":{"@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/iDiscovery-Solutions-110210573904472","https:\/\/www.linkedin.com\/company\/idsinc","https:\/\/www.youtube.com\/channel\/UCarv7o1MeYfCp0eZ1IrufIw"],"description":"iDS provides consultative data solutions to corporations and law firms around the world, giving them a decisive advantage \u2013 both in and out of the courtroom. iDS\u2019s subject matter experts and data strategists specialize in finding solutions to complex data problems, ensuring data can be leveraged as an asset, not a liability.","email":"info@idsinc.com","telephone":"+1.800.813.4832","legalName":"iDiscovery Solutions"},{"@type":"Person","@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/person\/bf7f03a502e8a54e558c44d0ff5d6736","name":"iDiscovery Solutions","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/secure.gravatar.com\/avatar\/6009d8a07526a79850b1d0045087bcee60e562f90891f19a42de7ee7f4452529?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/6009d8a07526a79850b1d0045087bcee60e562f90891f19a42de7ee7f4452529?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/6009d8a07526a79850b1d0045087bcee60e562f90891f19a42de7ee7f4452529?s=96&d=mm&r=g","caption":"iDiscovery Solutions"},"url":"https:\/\/idsinc.com\/en_gb\/author\/idiscovery\/"}]}},"builder_content":"","_links":{"self":[{"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/posts\/9622","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/comments?post=9622"}],"version-history":[{"count":2,"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/posts\/9622\/revisions"}],"predecessor-version":[{"id":9629,"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/posts\/9622\/revisions\/9629"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/media\/9625"}],"wp:attachment":[{"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/media?parent=9622"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/categories?post=9622"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/tags?post=9622"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}