{"id":2519,"date":"2021-12-03T10:59:07","date_gmt":"2021-12-03T16:59:07","guid":{"rendered":"https:\/\/staging2.idsinc.com\/case-studies\/insight-into-copyright-infringement-copy\/"},"modified":"2022-12-07T14:12:15","modified_gmt":"2022-12-07T20:12:15","slug":"activite-de-lutilisateur","status":"publish","type":"page","link":"https:\/\/idsinc.com\/fr\/case-studies\/user-activity\/","title":{"rendered":"Un aper\u00e7u de l&#039;activit\u00e9 des utilisateurs fournit \u00e0 l&#039;\u00e9quipe de cas une assurance concernant le comportement des employ\u00e9s partis"},"content":{"rendered":"<!--themify_builder_content-->\n<div id=\"themify_builder_content-2519\" data-postid=\"2519\" class=\"themify_builder_content themify_builder_content-2519 themify_builder tf_clear\">\n                    <div  data-lazy=\"1\" class=\"module_row themify_builder_row tb_8642551 tb_first tf_w\">\n                        <div class=\"row_inner col_align_top tb_col_count_1 tf_box tf_rel\">\n                        <div  data-lazy=\"1\" class=\"module_column tb-column col-full tb_f2sh552 first\">\n                    <!-- module image -->\n<div  class=\"module module-image tb_dm2e552 image-full-overlay   auto_fullwidth tf_mw\" data-lazy=\"1\">\n        <div class=\"image-wrap tf_rel tf_mw\">\n            <img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"512\" src=\"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/12\/iDS-CaseStudyImages-20215-employeebehavior-1024x512.jpg\" class=\"wp-post-image wp-image-2481\" title=\"Un aper\u00e7u de l&#039;activit\u00e9 des utilisateurs fournit \u00e0 l&#039;\u00e9quipe de cas une assurance concernant le comportement des employ\u00e9s partis\" alt=\"Un aper\u00e7u de l&#039;activit\u00e9 des utilisateurs fournit \u00e0 l&#039;\u00e9quipe de cas une assurance concernant le comportement des employ\u00e9s partis\" srcset=\"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/12\/iDS-CaseStudyImages-20215-employeebehavior-1024x512.jpg 1024w, https:\/\/idsinc.com\/wp-content\/uploads\/2021\/12\/iDS-CaseStudyImages-20215-employeebehavior-300x150.jpg 300w, https:\/\/idsinc.com\/wp-content\/uploads\/2021\/12\/iDS-CaseStudyImages-20215-employeebehavior-768x384.jpg 768w, https:\/\/idsinc.com\/wp-content\/uploads\/2021\/12\/iDS-CaseStudyImages-20215-employeebehavior-1536x768.jpg 1536w, https:\/\/idsinc.com\/wp-content\/uploads\/2021\/12\/iDS-CaseStudyImages-20215-employeebehavior-2048x1024.jpg 2048w, https:\/\/idsinc.com\/wp-content\/uploads\/2021\/12\/iDS-CaseStudyImages-20215-employeebehavior-1320x660.jpg 1320w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/>    \n        <\/div>\n    <!-- \/image-wrap -->\n    \n        <\/div>\n<!-- \/module image -->        <\/div>\n                        <\/div>\n        <\/div>\n                        <div  data-lazy=\"1\" class=\"module_row themify_builder_row tb_chlv551 tf_w\">\n                        <div class=\"row_inner col_align_top tb_col_count_1 tf_box tf_rel\">\n                        <div  data-lazy=\"1\" class=\"module_column tb-column col-full tb_u72k553 first\">\n                    <!-- module fancy heading -->\n<div  class=\"module module-fancy-heading tb_tpbo553\" data-lazy=\"1\">\n        <h1 class=\"fancy-heading\">\n    <span class=\"main-head tf_block\">\n                    LES FAITS EN UN COUP D&#039;\u0152IL            <\/span>\n\n    \n    <span class=\"sub-head tf_block tf_rel\">\n                                <\/span>\n    <\/h1>\n<\/div>\n<!-- \/module fancy heading -->\n        <div  data-lazy=\"1\" class=\"module_subrow themify_builder_sub_row tf_w col_align_top tb_col_count_2 tb_gttj27\">\n                <div  data-lazy=\"1\" class=\"module_column sub_column col2-1 tb_hjpe28 first\">\n                    <!-- module text -->\n<div  class=\"module module-text tb_psxo554\" data-lazy=\"1\">\n        <div  class=\"tb_text_wrap\">\n        <div class=\"page\" title=\"Page 1\">\n<div class=\"layoutArea\">\n<div class=\"column\">\n<ul>\n<li>Le fournisseur de services de sant\u00e9 avait des inqui\u00e9tudes concernant un employ\u00e9 parti qui aurait pu conserver des informations exclusives sur l&#039;entreprise apr\u00e8s son d\u00e9part<\/li>\n<li>L&#039;employ\u00e9 d\u00e9c\u00e9d\u00e9 est all\u00e9 travailler pour un concurrent direct<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div>    <\/div>\n<\/div>\n<!-- \/module text -->        <\/div>\n                    <div  data-lazy=\"1\" class=\"module_column sub_column col2-1 tb_ddsm28 last\">\n                    <!-- module text -->\n<div  class=\"module module-text tb_mxvl265\" data-lazy=\"1\">\n        <div  class=\"tb_text_wrap\">\n        <div class=\"page\" title=\"Page 1\">\n<div class=\"layoutArea\">\n<div class=\"column\">\n<ul>\n<li>iDS engag\u00e9 pour collecter et analyser l&#039;ordinateur portable des employ\u00e9s d\u00e9c\u00e9d\u00e9s<\/li>\n<li>L&#039;avocat a rapidement compris le niveau de risque des informations confidentielles et a conseill\u00e9 de mani\u00e8re appropri\u00e9e le fournisseur de services de sant\u00e9 sur les prochaines \u00e9tapes.<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div>    <\/div>\n<\/div>\n<!-- \/module text -->        <\/div>\n                    <\/div>\n        <!-- module fancy heading -->\n<div  class=\"module module-fancy-heading tb_c0hm795\" data-lazy=\"1\">\n        <h1 class=\"fancy-heading\">\n    <span class=\"main-head tf_block\">\n                    D\u00c9FI            <\/span>\n\n    \n    <span class=\"sub-head tf_block tf_rel\">\n                                <\/span>\n    <\/h1>\n<\/div>\n<!-- \/module fancy heading -->\n<!-- module text -->\n<div  class=\"module module-text tb_en6r196\" data-lazy=\"1\">\n        <div  class=\"tb_text_wrap\">\n        <div class=\"page\" title=\"Page 1\">\n<div class=\"layoutArea\">\n<div class=\"column\">\n<h5>Aider un client \u00e0 analyser les donn\u00e9es recueillies \u00e0 partir de l&#039;ordinateur portable d&#039;un employ\u00e9 d\u00e9c\u00e9d\u00e9. <\/h5>\n<p>Notre client, un fournisseur de services de sant\u00e9 bas\u00e9 aux \u00c9tats-Unis, a appris qu&#039;un employ\u00e9 d\u00e9c\u00e9d\u00e9 travaillait pour un concurrent direct, rejoignant un groupe de plusieurs anciens employ\u00e9s travaillant tous maintenant pour le m\u00eame concurrent direct. \u00c9tant donn\u00e9 que l&#039;employ\u00e9 r\u00e9cemment parti avait acc\u00e8s \u00e0 des informations exclusives de l&#039;entreprise li\u00e9es aux activit\u00e9s confidentielles de l&#039;entreprise, iDS a \u00e9t\u00e9 engag\u00e9 pour collecter et analyser l&#039;ordinateur portable de l&#039;employ\u00e9 d\u00e9c\u00e9d\u00e9 pour les \u00e9l\u00e9ments suivants\u00a0: <\/p>\n<p><strong>iDS a \u00e9t\u00e9 charg\u00e9 de collecter et d&#039;analyser\u00a0:<br><\/strong><\/p>\n<ul>\n<li>Acc\u00e8s aux informations propri\u00e9taires stock\u00e9es \u00e9lectroniquement (&quot;ESI&quot;)<\/li>\n<li>Utilisation de technologies de stockage de donn\u00e9es bas\u00e9es sur le cloud et de p\u00e9riph\u00e9riques USB<\/li>\n<li>Analyse des pi\u00e8ces jointes envoy\u00e9es aux adresses e-mail personnelles<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div>    <\/div>\n<\/div>\n<!-- \/module text --><!-- module fancy heading -->\n<div  class=\"module module-fancy-heading tb_vee8555\" data-lazy=\"1\">\n        <h1 class=\"fancy-heading\">\n    <span class=\"main-head tf_block\">\n                    Solution            <\/span>\n\n    \n    <span class=\"sub-head tf_block tf_rel\">\n                                <\/span>\n    <\/h1>\n<\/div>\n<!-- \/module fancy heading -->\n<!-- module text -->\n<div  class=\"module module-text tb_8id7555\" data-lazy=\"1\">\n        <div  class=\"tb_text_wrap\">\n        <div class=\"page\" title=\"Page 1\">\n<div class=\"layoutArea\">\n<div class=\"column\">\n<h5>iDS a mis en \u0153uvre l&#039;\u00e9valuation des risques des employ\u00e9s, une solution experte iDS. <\/h5>\n<p>Cette offre de service \u00e0 prix fixe a fourni \u00e0 notre client un profil de risque li\u00e9 au comportement des employ\u00e9s partis. Plus pr\u00e9cis\u00e9ment, ce service comprenait\u00a0:<\/p>\n<ul>\n<li>Analyse de l&#039;utilisation des p\u00e9riph\u00e9riques USB, y compris les p\u00e9riph\u00e9riques nouvellement install\u00e9s et, le cas \u00e9ch\u00e9ant, une liste des fichiers et dossiers stock\u00e9s sur les p\u00e9riph\u00e9riques USB<\/li>\n<li>Acc\u00e8s aux syst\u00e8mes de stockage en nuage et aux syst\u00e8mes de messagerie personnels connus qui peuvent avoir \u00e9t\u00e9 utilis\u00e9s pour transf\u00e9rer des informations exclusives et confidentielles<\/li>\n<li>Acc\u00e8s inappropri\u00e9 aux ESI propri\u00e9taires et confidentiels, y compris les changements de comportement li\u00e9s \u00e0 l&#039;acc\u00e8s aux ESI<\/li>\n<li>\u00c9valuation du niveau de risque avec un expert iDS et recommandations pour les prochaines \u00e9tapes (le cas \u00e9ch\u00e9ant)<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div>    <\/div>\n<\/div>\n<!-- \/module text --><!-- module fancy heading -->\n<div  class=\"module module-fancy-heading tb_8qgb555\" data-lazy=\"1\">\n        <h1 class=\"fancy-heading\">\n    <span class=\"main-head tf_block\">\n                    R\u00e9sultat            <\/span>\n\n    \n    <span class=\"sub-head tf_block tf_rel\">\n                                <\/span>\n    <\/h1>\n<\/div>\n<!-- \/module fancy heading -->\n<!-- module text -->\n<div  class=\"module module-text tb_nj9l556\" data-lazy=\"1\">\n        <div  class=\"tb_text_wrap\">\n        <div class=\"page\" title=\"Page 1\">\n<div class=\"layoutArea\">\n<div class=\"column\">\n<h5>Dans les 48 heures suivant la r\u00e9ception de l&#039;ordinateur portable, un expert iDS \u00e9tait au t\u00e9l\u00e9phone avec l&#039;avocat du fournisseur de services de sant\u00e9 pour discuter des r\u00e9sultats de l&#039;ERA<sup>\u2122<\/sup> Analyse.<\/h5>\n<p>Dans ce cas, l&#039;ERA<sup>\u2122<\/sup> ont indiqu\u00e9 un faible risque d&#039;acc\u00e8s et d&#039;exfiltration d&#039;informations exclusives et ont permis aux avocats de conseiller leur client de mani\u00e8re appropri\u00e9e sur les prochaines \u00e9tapes.<\/p>\n<\/div>\n<\/div>\n<\/div>\n    <\/div>\n<\/div>\n<!-- \/module text -->        <\/div>\n                        <\/div>\n        <\/div>\n        <\/div>\n<!--\/themify_builder_content-->","protected":false},"excerpt":{"rendered":"<p>Le fournisseur de services de sant\u00e9 \u00e9tait pr\u00e9occup\u00e9 par le d\u00e9part d&#039;un employ\u00e9 qui aurait pu conserver des informations exclusives sur l&#039;entreprise apr\u00e8s son d\u00e9part. L&#039;employ\u00e9 d\u00e9c\u00e9d\u00e9 est all\u00e9 travailler pour un concurrent direct.<\/p>","protected":false},"author":7,"featured_media":2481,"parent":33,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"team":[],"class_list":["post-2519","page","type-page","status-publish","has-post-thumbnail","hentry","has-post-title","has-post-date","has-post-category","has-post-tag","has-post-comment","has-post-author",""],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.6 (Yoast SEO v27.6) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Insight Into User Activity - iDiscovery Solutions<\/title>\n<meta name=\"description\" content=\"Insight Into User Activity Provides iDiscovery Solutions Case Team Assurance Regarding Departed Employee Behavior.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/idsinc.com\/fr\/etudes-de-cas\/activite-de-lutilisateur\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Insight Into User Activity Provides Case Team Assurance Regarding Departed Employee Behavior\" \/>\n<meta property=\"og:description\" content=\"Insight Into User Activity Provides iDiscovery Solutions Case Team Assurance Regarding Departed Employee Behavior.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/idsinc.com\/fr\/etudes-de-cas\/activite-de-lutilisateur\/\" \/>\n<meta property=\"og:site_name\" content=\"iDiscovery Solutions\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/iDiscovery-Solutions-110210573904472\" \/>\n<meta property=\"article:modified_time\" content=\"2022-12-07T20:12:15+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/12\/iDS-CaseStudyImages-20215-employeebehavior.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2500\" \/>\n\t<meta property=\"og:image:height\" content=\"1250\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/case-studies\\\/user-activity\\\/\",\"url\":\"https:\\\/\\\/idsinc.com\\\/case-studies\\\/user-activity\\\/\",\"name\":\"Insight Into User Activity - iDiscovery Solutions\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/case-studies\\\/user-activity\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/case-studies\\\/user-activity\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/12\\\/iDS-CaseStudyImages-20215-employeebehavior.jpg\",\"datePublished\":\"2021-12-03T16:59:07+00:00\",\"dateModified\":\"2022-12-07T20:12:15+00:00\",\"description\":\"Insight Into User Activity Provides iDiscovery Solutions Case Team Assurance Regarding Departed Employee Behavior.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/case-studies\\\/user-activity\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/idsinc.com\\\/case-studies\\\/user-activity\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/case-studies\\\/user-activity\\\/#primaryimage\",\"url\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/12\\\/iDS-CaseStudyImages-20215-employeebehavior.jpg\",\"contentUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/12\\\/iDS-CaseStudyImages-20215-employeebehavior.jpg\",\"width\":2500,\"height\":1250},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/case-studies\\\/user-activity\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/idsinc.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Case Studies\",\"item\":\"https:\\\/\\\/idsinc.com\\\/case-studies\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Insight Into User Activity Provides Case Team Assurance Regarding Departed Employee Behavior\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#website\",\"url\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/\",\"name\":\"iDiscovery Solutions\",\"description\":\"Use data to your advantage in the courtroom\",\"publisher\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#organization\"},\"alternateName\":\"iDS\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#organization\",\"name\":\"iDiscovery Solutions\",\"alternateName\":\"iDS\",\"url\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/iDS-Logo-3c-e1611176096212.png\",\"contentUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/iDS-Logo-3c-e1611176096212.png\",\"width\":100,\"height\":73,\"caption\":\"iDiscovery Solutions\"},\"image\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/iDiscovery-Solutions-110210573904472\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/idsinc\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCarv7o1MeYfCp0eZ1IrufIw\"],\"description\":\"iDS provides consultative data solutions to corporations and law firms around the world, giving them a decisive advantage \u2013 both in and out of the courtroom. iDS\u2019s subject matter experts and data strategists specialize in finding solutions to complex data problems, ensuring data can be leveraged as an asset, not a liability.\",\"email\":\"info@idsinc.com\",\"telephone\":\"+1.800.813.4832\",\"legalName\":\"iDiscovery Solutions\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Aper\u00e7u de l&#039;activit\u00e9 des utilisateurs - iDiscovery Solutions","description":"Un aper\u00e7u de l&#039;activit\u00e9 des utilisateurs fournit une assurance \u00e0 l&#039;\u00e9quipe de cas d&#039;iDiscovery Solutions concernant le comportement des employ\u00e9s d\u00e9c\u00e9d\u00e9s.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/idsinc.com\/fr\/etudes-de-cas\/activite-de-lutilisateur\/","og_locale":"fr_FR","og_type":"article","og_title":"Insight Into User Activity Provides Case Team Assurance Regarding Departed Employee Behavior","og_description":"Insight Into User Activity Provides iDiscovery Solutions Case Team Assurance Regarding Departed Employee Behavior.","og_url":"https:\/\/idsinc.com\/fr\/etudes-de-cas\/activite-de-lutilisateur\/","og_site_name":"iDiscovery Solutions","article_publisher":"https:\/\/www.facebook.com\/iDiscovery-Solutions-110210573904472","article_modified_time":"2022-12-07T20:12:15+00:00","og_image":[{"width":2500,"height":1250,"url":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/12\/iDS-CaseStudyImages-20215-employeebehavior.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/idsinc.com\/case-studies\/user-activity\/","url":"https:\/\/idsinc.com\/case-studies\/user-activity\/","name":"Aper\u00e7u de l&#039;activit\u00e9 des utilisateurs - iDiscovery Solutions","isPartOf":{"@id":"https:\/\/idsinc.com\/en_gb\/#website"},"primaryImageOfPage":{"@id":"https:\/\/idsinc.com\/case-studies\/user-activity\/#primaryimage"},"image":{"@id":"https:\/\/idsinc.com\/case-studies\/user-activity\/#primaryimage"},"thumbnailUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/12\/iDS-CaseStudyImages-20215-employeebehavior.jpg","datePublished":"2021-12-03T16:59:07+00:00","dateModified":"2022-12-07T20:12:15+00:00","description":"Un aper\u00e7u de l&#039;activit\u00e9 des utilisateurs fournit une assurance \u00e0 l&#039;\u00e9quipe de cas d&#039;iDiscovery Solutions concernant le comportement des employ\u00e9s d\u00e9c\u00e9d\u00e9s.","breadcrumb":{"@id":"https:\/\/idsinc.com\/case-studies\/user-activity\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/idsinc.com\/case-studies\/user-activity\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/idsinc.com\/case-studies\/user-activity\/#primaryimage","url":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/12\/iDS-CaseStudyImages-20215-employeebehavior.jpg","contentUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/12\/iDS-CaseStudyImages-20215-employeebehavior.jpg","width":2500,"height":1250},{"@type":"BreadcrumbList","@id":"https:\/\/idsinc.com\/case-studies\/user-activity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/idsinc.com\/"},{"@type":"ListItem","position":2,"name":"Case Studies","item":"https:\/\/idsinc.com\/case-studies\/"},{"@type":"ListItem","position":3,"name":"Insight Into User Activity Provides Case Team Assurance Regarding Departed Employee Behavior"}]},{"@type":"WebSite","@id":"https:\/\/idsinc.com\/en_gb\/#website","url":"https:\/\/idsinc.com\/en_gb\/","name":"Solutions d&#039;iD\u00e9couverte","description":"Utilisez les donn\u00e9es \u00e0 votre avantage dans la salle d\u2019audience","publisher":{"@id":"https:\/\/idsinc.com\/en_gb\/#organization"},"alternateName":"iDS","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/idsinc.com\/en_gb\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/idsinc.com\/en_gb\/#organization","name":"Solutions d&#039;iD\u00e9couverte","alternateName":"iDS","url":"https:\/\/idsinc.com\/en_gb\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/logo\/image\/","url":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/iDS-Logo-3c-e1611176096212.png","contentUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/iDS-Logo-3c-e1611176096212.png","width":100,"height":73,"caption":"iDiscovery Solutions"},"image":{"@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/iDiscovery-Solutions-110210573904472","https:\/\/www.linkedin.com\/company\/idsinc","https:\/\/www.youtube.com\/channel\/UCarv7o1MeYfCp0eZ1IrufIw"],"description":"iDS fournit des solutions de donn\u00e9es consultatives aux entreprises et aux cabinets d&#039;avocats du monde entier, leur donnant un avantage d\u00e9cisif, tant \u00e0 l&#039;int\u00e9rieur qu&#039;\u00e0 l&#039;ext\u00e9rieur de la salle d&#039;audience. Les experts en la mati\u00e8re et les strat\u00e8ges en donn\u00e9es d&#039;iDS se sp\u00e9cialisent dans la recherche de solutions \u00e0 des probl\u00e8mes de donn\u00e9es complexes, garantissant que les donn\u00e9es peuvent \u00eatre exploit\u00e9es comme un atout et non comme un passif.","email":"info@idsinc.com","telephone":"+1.800.813.4832","legalName":"iDiscovery Solutions"}]}},"builder_content":"\n<h1>FACTS AT A GLANCE<br\/><\/h1>\n<ul> <li>Healthcare services provider had concerns regarding a departed employee that may have maintained proprietary company information post departure<\/li> <li>Departed employee went to work for a direct competitor<\/li> <\/ul>\n<ul> <li>iDS engaged to collect and analyze departed employee laptop<\/li> <li>Counsel quickly gained insight to proprietary information\u2019s level of risk and appropriately advised the health services provider on next steps<\/li> <\/ul>\n<h1>CHALLENGE<br\/><\/h1>\n<h5>Assist a client in analyzing data gathered from a departed employee\u2019s laptop. <\/h5> <p>Our client, a US based healthcare services provider, learned that a departed employee was working for a direct competitor, joining a group of several former employees all now working for the same direct competitor. Because the recently departed employee had access to proprietary company information related to confidential company business, iDS was engaged to collect and analyze the departed employee\u2019s laptop computer for the following: <\/p> <p><strong>iDS was tasked to collect and analyze:<br><\/strong><\/p> <ul> <li>Access of proprietary electronically stored information (\u201cESI\u201d)<\/li> <li>Use of cloud-based data storage technologies and USB devices<\/li> <li>Analysis of attachments sent to personal email addresses<\/li> <\/ul>\n<h1>Solution<br\/><\/h1>\n<h5>iDS implemented Employee Risk Assessment, an iDS Expert Solution. <\/h5> <p>This fixed priced service offering provided our client with a risk profile related to the departed employee behavior. Specifically this service included:<\/p> <ul> <li>Analysis of USB device usage, including newly installed devises and when available, a listing of files and folders stored on the USB devices<\/li> <li>Access to known cloud storage systems and personal email systems that may have been used to transfer proprietary and confidential information<\/li> <li>Inappropriate access of proprietary and confidential ESI, including changes in behavior related to ESI access<\/li> <li>Risk level evaluation with an iDS Expert, and recommendations for next steps (if any)<\/li> <\/ul>\n<h1>Result<br\/><\/h1>\n<h5>Within 48 hours of laptop receipt, an iDS Expert was on the phone with counsel for the healthcare services provider discussing the results of the ERA<sup>\u2122<\/sup> analysis.<\/h5> <p>In this instance, the ERA<sup>\u2122<\/sup> indicated a low risk of access and exfiltration of proprietary information and allowed counsel to advise their client appropriately on next steps.<\/p>","_links":{"self":[{"href":"https:\/\/idsinc.com\/fr\/wp-json\/wp\/v2\/pages\/2519","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/idsinc.com\/fr\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/idsinc.com\/fr\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/idsinc.com\/fr\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/idsinc.com\/fr\/wp-json\/wp\/v2\/comments?post=2519"}],"version-history":[{"count":0,"href":"https:\/\/idsinc.com\/fr\/wp-json\/wp\/v2\/pages\/2519\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/idsinc.com\/fr\/wp-json\/wp\/v2\/pages\/33"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/idsinc.com\/fr\/wp-json\/wp\/v2\/media\/2481"}],"wp:attachment":[{"href":"https:\/\/idsinc.com\/fr\/wp-json\/wp\/v2\/media?parent=2519"}],"wp:term":[{"taxonomy":"team","embeddable":true,"href":"https:\/\/idsinc.com\/fr\/wp-json\/wp\/v2\/team?post=2519"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}