{"id":2493,"date":"2021-12-03T10:29:20","date_gmt":"2021-12-03T16:29:20","guid":{"rendered":"https:\/\/staging2.idsinc.com\/case-studies\/leveraging-structured-data-as-a-competitive-advantage-leads-to-class-decertification-copy\/"},"modified":"2025-03-10T09:50:09","modified_gmt":"2025-03-10T15:50:09","slug":"empleados-que-se-han-vuelto-malos","status":"publish","type":"page","link":"https:\/\/idsinc.com\/es\/case-studies\/employees-gone-bad\/","title":{"rendered":"Empleados en mal estado: iDS ayuda a determinar qui\u00e9n tom\u00f3 qu\u00e9 datos de la empresa para un competidor"},"content":{"rendered":"<!--themify_builder_content-->\n<div id=\"themify_builder_content-2493\" data-postid=\"2493\" class=\"themify_builder_content themify_builder_content-2493 themify_builder tf_clear\">\n                    <div  data-lazy=\"1\" class=\"module_row themify_builder_row tb_0inr517 tb_first tf_w\">\n                        <div class=\"row_inner col_align_top tb_col_count_1 tf_box tf_rel\">\n                        <div  data-lazy=\"1\" class=\"module_column tb-column col-full tb_lvao519 first\">\n                    <!-- module image -->\n<div  class=\"module module-image tb_e7rr519 image-full-overlay   auto_fullwidth tf_mw\" data-lazy=\"1\">\n        <div class=\"image-wrap tf_rel tf_mw\">\n            <img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"512\" src=\"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/12\/iDS-CaseStudyImages-20213-employeegonebad-1024x512.jpg\" class=\"wp-post-image wp-image-2479\" title=\"Empleados en mal estado: iDS ayuda a determinar qui\u00e9n tom\u00f3 qu\u00e9 datos de la empresa para un competidor\" alt=\"Empleados en mal estado: iDS ayuda a determinar qui\u00e9n tom\u00f3 qu\u00e9 datos de la empresa para un competidor\" srcset=\"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/12\/iDS-CaseStudyImages-20213-employeegonebad-1024x512.jpg 1024w, https:\/\/idsinc.com\/wp-content\/uploads\/2021\/12\/iDS-CaseStudyImages-20213-employeegonebad-300x150.jpg 300w, https:\/\/idsinc.com\/wp-content\/uploads\/2021\/12\/iDS-CaseStudyImages-20213-employeegonebad-768x384.jpg 768w, https:\/\/idsinc.com\/wp-content\/uploads\/2021\/12\/iDS-CaseStudyImages-20213-employeegonebad-1536x768.jpg 1536w, https:\/\/idsinc.com\/wp-content\/uploads\/2021\/12\/iDS-CaseStudyImages-20213-employeegonebad-2048x1024.jpg 2048w, https:\/\/idsinc.com\/wp-content\/uploads\/2021\/12\/iDS-CaseStudyImages-20213-employeegonebad-1320x660.jpg 1320w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/>    \n        <\/div>\n    <!-- \/image-wrap -->\n    \n        <\/div>\n<!-- \/module image -->        <\/div>\n                        <\/div>\n        <\/div>\n                        <div  data-lazy=\"1\" class=\"module_row themify_builder_row tb_nbz3517 tf_w\">\n                        <div class=\"row_inner col_align_top tb_col_count_1 tf_box tf_rel\">\n                        <div  data-lazy=\"1\" class=\"module_column tb-column col-full tb_trj3521 first\">\n                    <!-- module fancy heading -->\n<div  class=\"module module-fancy-heading tb_5cbv695\" data-lazy=\"1\">\n        <h2 class=\"fancy-heading\">\n    <span class=\"main-head tf_block\">\n                    DESAF\u00cdO            <\/span>\n\n    \n    <span class=\"sub-head tf_block tf_rel\">\n                                <\/span>\n    <\/h2>\n<\/div>\n<!-- \/module fancy heading -->\n<!-- module text -->\n<div  class=\"module module-text tb_22xu522\" data-lazy=\"1\">\n        <div  class=\"tb_text_wrap\">\n        <div class=\"page\" title=\"P\u00e1gina 1\">\n<div class=\"layoutArea\">\n<div class=\"column\">\n<h5>Nuestro cliente recibi\u00f3 un aviso de un cliente de que un exempleado los hab\u00eda contactado con precios confidenciales que cre\u00edan que se hab\u00edan apropiado indebidamente del empleador anterior del exempleado.<\/h5>\n<p>Nuestro cliente necesitaba realizar una investigaci\u00f3n interna para determinar si se hab\u00eda malversado informaci\u00f3n confidencial de propiedad exclusiva o secreto comercial, si se hab\u00edan violado convenios restrictivos y si se hab\u00eda violado un acuerdo de no competencia. Espec\u00edficamente, el cliente ten\u00eda varias preguntas que necesitaban ser respondidas:<\/p>\n<ul>\n<li>\u00bfQu\u00e9 dispositivos externos (si los hubo) se usaron en la computadora port\u00e1til del exempleado y cu\u00e1ndo?<\/li>\n<li>\u00bfQu\u00e9 archivos (si los hubo) estaban presentes en estos dispositivos externos?<\/li>\n<li>\u00bfHab\u00eda alguna evidencia de que los datos de la empresa se hubieran exfiltrado a trav\u00e9s de alg\u00fan otro medio que no sea USB (es decir, la nube, correo electr\u00f3nico, impresoras, etc.)<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div>    <\/div>\n<\/div>\n<!-- \/module text --><!-- module fancy heading -->\n<div  class=\"module module-fancy-heading tb_p71z207\" data-lazy=\"1\">\n        <h2 class=\"fancy-heading\">\n    <span class=\"main-head tf_block\">\n                    Soluci\u00f3n            <\/span>\n\n    \n    <span class=\"sub-head tf_block tf_rel\">\n                                <\/span>\n    <\/h2>\n<\/div>\n<!-- \/module fancy heading -->\n<!-- module text -->\n<div  class=\"module module-text tb_jros522\" data-lazy=\"1\">\n        <div  class=\"tb_text_wrap\">\n        <div class=\"page\" title=\"P\u00e1gina 1\">\n<div class=\"layoutArea\">\n<div class=\"column\">\n<h5>El equipo forense de iDS se puso en contacto con el grupo de TI del cliente para implementar de forma remota un kit de im\u00e1genes forenses para la computadora en cuesti\u00f3n.\u00a0<\/h5>\n<p>El equipo de an\u00e1lisis forense de iDS tambi\u00e9n captur\u00f3 los registros de auditor\u00eda de Office365 y una copia de seguridad forense de la cuenta de correo electr\u00f3nico. Nuestro equipo realiz\u00f3 un an\u00e1lisis e inform\u00f3 sobre lo siguiente:<\/p>\n<ul>\n<li>Identificaci\u00f3n de dispositivos conectados, archivos que se est\u00e1n abriendo desde esos dispositivos y que otros dispositivos tambi\u00e9n se han utilizado<\/li>\n<li>Identificaci\u00f3n de que el sistema de correo electr\u00f3nico corporativo se ha utilizado para enviar documentos confidenciales de la empresa fuera de la red<\/li>\n<li>Identificaci\u00f3n de sistemas en la nube de terceros que ten\u00edan datos de la empresa sincronizados con ellos<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div>    <\/div>\n<\/div>\n<!-- \/module text --><!-- module fancy heading -->\n<div  class=\"module module-fancy-heading tb_h5mz33\" data-lazy=\"1\">\n        <h2 class=\"fancy-heading\">\n    <span class=\"main-head tf_block\">\n                    Resultado            <\/span>\n\n    \n    <span class=\"sub-head tf_block tf_rel\">\n                                <\/span>\n    <\/h2>\n<\/div>\n<!-- \/module fancy heading -->\n<!-- module text -->\n<div  class=\"module module-text tb_2r04523\" data-lazy=\"1\">\n        <div  class=\"tb_text_wrap\">\n        <div class=\"page\" title=\"P\u00e1gina 1\">\n<div class=\"layoutArea\">\n<div class=\"column\">\n<h5>iDS pudo identificar qu\u00e9 datos de la empresa hab\u00edan sido exfiltrados, c\u00f3mo hab\u00edan sido exfiltrados y cu\u00e1ndo hab\u00edan sido exfiltrados. Tambi\u00e9n identificamos a personas adicionales que hab\u00edan estado involucradas en el mismo tipo de actividad.\u00a0<\/h5>\n<p>Nuestro cliente, aprovechando los hallazgos y los informes creados en el transcurso de solo una semana laboral, pudo obtener una orden de restricci\u00f3n temporal, seguida de una orden judicial preliminar y, en \u00faltima instancia, un acuerdo favorable para recuperar los ingresos perdidos en funci\u00f3n de las actividades de los empleados que se fueron. .<\/p>\n<\/div>\n<\/div>\n<\/div>    <\/div>\n<\/div>\n<!-- \/module text -->        <\/div>\n                        <\/div>\n        <\/div>\n        <\/div>\n<!--\/themify_builder_content-->","protected":false},"excerpt":{"rendered":"<p>Our client received a tip from a customer that an ex-employee had contacted them with confidential pricing they believed had been misappropriated from the ex-employee\u2019s previous employer. Our client needed to conduct an internal investigation to determine if confidential proprietary or trade secret information had been misappropriated, if restrictive covenants had been violated, and if [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":2479,"parent":33,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"team":[],"class_list":["post-2493","page","type-page","status-publish","has-post-thumbnail","hentry","has-post-title","has-post-date","has-post-category","has-post-tag","has-post-comment","has-post-author",""],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.6 (Yoast SEO v27.6) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Employees Gone Bad - iDiscovery Solutions<\/title>\n<meta name=\"description\" content=\"Employees Gone Bad - iDiscovery Solutions Helps Determine What Employee Took Valuable Company Data to a Competitor.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/idsinc.com\/es\/estudios-de-caso\/empleados-que-se-han-vuelto-malos\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Employees Gone Bad - iDS Helps Determine Who Took What Company Data to a Competitor\" \/>\n<meta property=\"og:description\" content=\"Employees Gone Bad - iDiscovery Solutions Helps Determine What Employee Took Valuable Company Data to a Competitor.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/idsinc.com\/es\/estudios-de-caso\/empleados-que-se-han-vuelto-malos\/\" \/>\n<meta property=\"og:site_name\" content=\"iDiscovery Solutions\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/iDiscovery-Solutions-110210573904472\" \/>\n<meta property=\"article:modified_time\" content=\"2025-03-10T15:50:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/12\/iDS-CaseStudyImages-20213-employeegonebad.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2500\" \/>\n\t<meta property=\"og:image:height\" content=\"1250\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data1\" content=\"4 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/case-studies\\\/employees-gone-bad\\\/\",\"url\":\"https:\\\/\\\/idsinc.com\\\/case-studies\\\/employees-gone-bad\\\/\",\"name\":\"Employees Gone Bad - iDiscovery Solutions\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/case-studies\\\/employees-gone-bad\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/case-studies\\\/employees-gone-bad\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/12\\\/iDS-CaseStudyImages-20213-employeegonebad.jpg\",\"datePublished\":\"2021-12-03T16:29:20+00:00\",\"dateModified\":\"2025-03-10T15:50:09+00:00\",\"description\":\"Employees Gone Bad - iDiscovery Solutions Helps Determine What Employee Took Valuable Company Data to a Competitor.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/case-studies\\\/employees-gone-bad\\\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/idsinc.com\\\/case-studies\\\/employees-gone-bad\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/case-studies\\\/employees-gone-bad\\\/#primaryimage\",\"url\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/12\\\/iDS-CaseStudyImages-20213-employeegonebad.jpg\",\"contentUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/12\\\/iDS-CaseStudyImages-20213-employeegonebad.jpg\",\"width\":2500,\"height\":1250},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/case-studies\\\/employees-gone-bad\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/idsinc.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Case Studies\",\"item\":\"https:\\\/\\\/idsinc.com\\\/case-studies\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Employees Gone Bad &#8211; iDS Helps Determine Who Took What Company Data to a Competitor\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#website\",\"url\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/\",\"name\":\"iDiscovery Solutions\",\"description\":\"Use data to your advantage in the courtroom\",\"publisher\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#organization\"},\"alternateName\":\"iDS\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#organization\",\"name\":\"iDiscovery Solutions\",\"alternateName\":\"iDS\",\"url\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/iDS-Logo-3c-e1611176096212.png\",\"contentUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/iDS-Logo-3c-e1611176096212.png\",\"width\":100,\"height\":73,\"caption\":\"iDiscovery Solutions\"},\"image\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/iDiscovery-Solutions-110210573904472\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/idsinc\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCarv7o1MeYfCp0eZ1IrufIw\"],\"description\":\"iDS provides consultative data solutions to corporations and law firms around the world, giving them a decisive advantage \u2013 both in and out of the courtroom. iDS\u2019s subject matter experts and data strategists specialize in finding solutions to complex data problems, ensuring data can be leveraged as an asset, not a liability.\",\"email\":\"info@idsinc.com\",\"telephone\":\"+1.800.813.4832\",\"legalName\":\"iDiscovery Solutions\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Empleados que salieron mal - iDiscovery Solutions","description":"Empleados que salieron mal: iDiscovery Solutions ayuda a determinar qu\u00e9 empleado llev\u00f3 datos valiosos de la empresa a un competidor.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/idsinc.com\/es\/estudios-de-caso\/empleados-que-se-han-vuelto-malos\/","og_locale":"es_ES","og_type":"article","og_title":"Employees Gone Bad - iDS Helps Determine Who Took What Company Data to a Competitor","og_description":"Employees Gone Bad - iDiscovery Solutions Helps Determine What Employee Took Valuable Company Data to a Competitor.","og_url":"https:\/\/idsinc.com\/es\/estudios-de-caso\/empleados-que-se-han-vuelto-malos\/","og_site_name":"iDiscovery Solutions","article_publisher":"https:\/\/www.facebook.com\/iDiscovery-Solutions-110210573904472","article_modified_time":"2025-03-10T15:50:09+00:00","og_image":[{"width":2500,"height":1250,"url":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/12\/iDS-CaseStudyImages-20213-employeegonebad.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Tiempo de lectura":"4 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/idsinc.com\/case-studies\/employees-gone-bad\/","url":"https:\/\/idsinc.com\/case-studies\/employees-gone-bad\/","name":"Empleados que salieron mal - iDiscovery Solutions","isPartOf":{"@id":"https:\/\/idsinc.com\/en_gb\/#website"},"primaryImageOfPage":{"@id":"https:\/\/idsinc.com\/case-studies\/employees-gone-bad\/#primaryimage"},"image":{"@id":"https:\/\/idsinc.com\/case-studies\/employees-gone-bad\/#primaryimage"},"thumbnailUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/12\/iDS-CaseStudyImages-20213-employeegonebad.jpg","datePublished":"2021-12-03T16:29:20+00:00","dateModified":"2025-03-10T15:50:09+00:00","description":"Empleados que salieron mal: iDiscovery Solutions ayuda a determinar qu\u00e9 empleado llev\u00f3 datos valiosos de la empresa a un competidor.","breadcrumb":{"@id":"https:\/\/idsinc.com\/case-studies\/employees-gone-bad\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/idsinc.com\/case-studies\/employees-gone-bad\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/idsinc.com\/case-studies\/employees-gone-bad\/#primaryimage","url":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/12\/iDS-CaseStudyImages-20213-employeegonebad.jpg","contentUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/12\/iDS-CaseStudyImages-20213-employeegonebad.jpg","width":2500,"height":1250},{"@type":"BreadcrumbList","@id":"https:\/\/idsinc.com\/case-studies\/employees-gone-bad\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/idsinc.com\/"},{"@type":"ListItem","position":2,"name":"Case Studies","item":"https:\/\/idsinc.com\/case-studies\/"},{"@type":"ListItem","position":3,"name":"Employees Gone Bad &#8211; iDS Helps Determine Who Took What Company Data to a Competitor"}]},{"@type":"WebSite","@id":"https:\/\/idsinc.com\/en_gb\/#website","url":"https:\/\/idsinc.com\/en_gb\/","name":"Soluciones iDiscovery","description":"Utilice los datos a su favor en la sala del tribunal","publisher":{"@id":"https:\/\/idsinc.com\/en_gb\/#organization"},"alternateName":"iDS","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/idsinc.com\/en_gb\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/idsinc.com\/en_gb\/#organization","name":"Soluciones iDiscovery","alternateName":"iDS","url":"https:\/\/idsinc.com\/en_gb\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/logo\/image\/","url":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/iDS-Logo-3c-e1611176096212.png","contentUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/iDS-Logo-3c-e1611176096212.png","width":100,"height":73,"caption":"iDiscovery Solutions"},"image":{"@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/iDiscovery-Solutions-110210573904472","https:\/\/www.linkedin.com\/company\/idsinc","https:\/\/www.youtube.com\/channel\/UCarv7o1MeYfCp0eZ1IrufIw"],"description":"iDS ofrece soluciones de datos consultivas a corporaciones y bufetes de abogados de todo el mundo, lo que les otorga una ventaja decisiva, tanto dentro como fuera de los tribunales. Los expertos en la materia y los estrategas de datos de iDS se especializan en encontrar soluciones a problemas de datos complejos, garantizando que los datos puedan aprovecharse como un activo, no como un pasivo.","email":"info@idsinc.com","telephone":"+1.800.813.4832","legalName":"iDiscovery Solutions"}]}},"builder_content":"<img src=\"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/12\/iDS-CaseStudyImages-20213-employeegonebad-1024x512.jpg\" title=\"Employees Gone Bad &#8211; iDS Helps Determine Who Took What Company Data to a Competitor\" alt=\"Employees Gone Bad &#8211; iDS Helps Determine Who Took What Company Data to a Competitor\" srcset=\"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/12\/iDS-CaseStudyImages-20213-employeegonebad-1024x512.jpg 1024w, https:\/\/idsinc.com\/wp-content\/uploads\/2021\/12\/iDS-CaseStudyImages-20213-employeegonebad-300x150.jpg 300w, https:\/\/idsinc.com\/wp-content\/uploads\/2021\/12\/iDS-CaseStudyImages-20213-employeegonebad-768x384.jpg 768w, https:\/\/idsinc.com\/wp-content\/uploads\/2021\/12\/iDS-CaseStudyImages-20213-employeegonebad-1536x768.jpg 1536w, https:\/\/idsinc.com\/wp-content\/uploads\/2021\/12\/iDS-CaseStudyImages-20213-employeegonebad-2048x1024.jpg 2048w, https:\/\/idsinc.com\/wp-content\/uploads\/2021\/12\/iDS-CaseStudyImages-20213-employeegonebad-1320x660.jpg 1320w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/> <h1> Employees Gone Bad &#8211; iDS Helps Determine Who Took What Company Data to a Competitor <\/h1>\n<h2>CHALLENGE<br\/><\/h2>\n<h5>Our client received a tip from a customer that an ex-employee had contacted them with confidential pricing they believed had been misappropriated from the ex-employee\u2019s previous employer.<\/h5> <p>Our client needed to conduct an internal investigation to determine if confidential proprietary or trade secret information had been misappropriated, if restrictive covenants had been violated, and if a non-compete had been violated. Specifically, the client had several questions that needed to be answered:<\/p> <ul> <li>What (if any) external devices had been used on the ex-employee\u2019s laptop, and when<\/li> <li>What (if any) files were present on these external devices<\/li> <li>Was there any evidence that company data had been exfiltrated through any means other than USB (i.e., the cloud, email, printers, etc.)<\/li> <\/ul>\n<h2>Solution<br\/><\/h2>\n<h5>iDS Forensics Team liaised with the client\u2019s IT group to remotely deploy a forensic imaging kit for the computer in question.\u00a0<\/h5> <p>The iDS Forensics Team also captured Office365 audit logs and a foresnically sound copy of the email account. Our team performed analysis and reported on the following:<\/p> <ul> <li>Identification of connected devices, files being opened from those devices, and that other devices had also been used<\/li> <li>Identification that the corporate email system had been used to send sensitive company documents outside the network<\/li> <li>Identification of third-party cloud systems that had company data synchronized to them<\/li> <\/ul>\n<h2>Result<br\/><\/h2>\n<h5>iDS was able to identify that company data had been exhiltrated, how it had been exfiltrated, and when it had become exfiltrated. We also identified additional individuals that had been involved in the same type of activity.\u00a0<\/h5> <p>Our client, leveraging findings and the reports created over the course of just one business week, was able to obtain a temporary restraining order, followed by a preliminary injunction, and ultimately a favorable settlement to recover lost revenue based on the activities of the departed employees.<\/p>","_links":{"self":[{"href":"https:\/\/idsinc.com\/es\/wp-json\/wp\/v2\/pages\/2493","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/idsinc.com\/es\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/idsinc.com\/es\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/idsinc.com\/es\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/idsinc.com\/es\/wp-json\/wp\/v2\/comments?post=2493"}],"version-history":[{"count":1,"href":"https:\/\/idsinc.com\/es\/wp-json\/wp\/v2\/pages\/2493\/revisions"}],"predecessor-version":[{"id":7709,"href":"https:\/\/idsinc.com\/es\/wp-json\/wp\/v2\/pages\/2493\/revisions\/7709"}],"up":[{"embeddable":true,"href":"https:\/\/idsinc.com\/es\/wp-json\/wp\/v2\/pages\/33"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/idsinc.com\/es\/wp-json\/wp\/v2\/media\/2479"}],"wp:attachment":[{"href":"https:\/\/idsinc.com\/es\/wp-json\/wp\/v2\/media?parent=2493"}],"wp:term":[{"taxonomy":"team","embeddable":true,"href":"https:\/\/idsinc.com\/es\/wp-json\/wp\/v2\/team?post=2493"}],"curies":[{"name":"gracias","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}