{"id":272,"date":"2021-01-27T15:20:27","date_gmt":"2021-01-27T21:20:27","guid":{"rendered":"https:\/\/idsinc.com\/?page_id=272"},"modified":"2024-01-10T10:43:29","modified_gmt":"2024-01-10T16:43:29","slug":"secrets-commerciaux-de-lindustrie","status":"publish","type":"page","link":"https:\/\/idsinc.com\/fr\/case-studies\/industry-trade-secrets\/","title":{"rendered":"D\u00e9tournement de secrets commerciaux \u2013 Une enqu\u00eate approfondie"},"content":{"rendered":"<!--themify_builder_content-->\n<div id=\"themify_builder_content-272\" data-postid=\"272\" class=\"themify_builder_content themify_builder_content-272 themify_builder tf_clear\">\n                    <div  data-lazy=\"1\" class=\"module_row themify_builder_row tb_sxix889 tb_first tf_w\">\n                        <div class=\"row_inner col_align_top tb_col_count_1 tf_box tf_rel\">\n                        <div  data-lazy=\"1\" class=\"module_column tb-column col-full tb_dvve891 first\">\n                    <!-- module image -->\n<div  class=\"module module-image tb_1zqw507 image-full-overlay   auto_fullwidth tf_mw\" data-lazy=\"1\">\n        <div class=\"image-wrap tf_rel tf_mw\">\n            <img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"512\" src=\"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/iDS-Case-Study-Industry-Trade-Secrets-1024x512.jpg\" class=\"wp-post-image wp-image-274\" title=\"iDiscovery Solutions Case Study - Misappropriation of Trade Secrets\" alt=\"Misappropriation of Trade Secrets, Case Study, iDiscovery Solutions, Digital Forensics, Trade Secrets\" srcset=\"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/iDS-Case-Study-Industry-Trade-Secrets-1024x512.jpg 1024w, https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/iDS-Case-Study-Industry-Trade-Secrets-300x150.jpg 300w, https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/iDS-Case-Study-Industry-Trade-Secrets-768x384.jpg 768w, https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/iDS-Case-Study-Industry-Trade-Secrets.jpg 1200w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/>    \n        <\/div>\n    <!-- \/image-wrap -->\n    \n        <\/div>\n<!-- \/module image -->        <\/div>\n                        <\/div>\n        <\/div>\n                        <div  data-lazy=\"1\" class=\"module_row themify_builder_row tb_z67o610 tf_w\">\n                        <div class=\"row_inner col_align_top tb_col_count_1 tf_box tf_rel\">\n                        <div  data-lazy=\"1\" class=\"module_column tb-column col-full tb_cajx611 first\">\n                    <!-- module fancy heading -->\n<div  class=\"module module-fancy-heading tb_k9lo497\" data-lazy=\"1\">\n        <h2 class=\"fancy-heading\">\n    <span class=\"main-head tf_block\">\n                    D\u00c9FI            <\/span>\n\n    \n    <span class=\"sub-head tf_block tf_rel\">\n                                <\/span>\n    <\/h2>\n<\/div>\n<!-- \/module fancy heading -->\n<!-- module text -->\n<div  class=\"module module-text tb_vvfw5\" data-lazy=\"1\">\n        <div  class=\"tb_text_wrap\">\n        <div class=\"page\" title=\"Page 1\">\n<div class=\"layoutArea\">\n<div class=\"column\">\n<h5><em><strong>Un client du secteur de l&#039;assurance a embauch\u00e9 70 employ\u00e9s d&#039;un concurrent. Ils ont \u00e9t\u00e9 accus\u00e9s d&#039;avoir re\u00e7u et utilis\u00e9 des secrets commerciaux de l&#039;entreprise de l&#039;employ\u00e9 d\u00e9c\u00e9d\u00e9.<\/strong><\/em><\/h5>\n<p>Le demandeur avait d\u00e9pens\u00e9 des centaines de milliers de dollars pour effectuer une criminalistique num\u00e9rique, \u00e0 la fois en interne et par l&#039;interm\u00e9diaire d&#039;un fournisseur de services ind\u00e9pendant.<\/p>\n<p><strong>Le client avait besoin d&#039;expertise pour :<\/strong><\/p>\n<ul>\n<li>\n<p>Comprendre comment lire et interpr\u00e9ter des dizaines de centaines de pages de &quot;preuves m\u00e9dico-l\u00e9gales num\u00e9riques&quot;.<\/p>\n<\/li>\n<li>\n<p>Pour comprendre comment les donn\u00e9es sont stock\u00e9es, comment les donn\u00e9es peuvent \u00eatre d\u00e9plac\u00e9es d&#039;un emplacement \u00e0 un autre et pour expliquer les raisons pour lesquelles les donn\u00e9es<\/p>\n<p>peut ne pas \u00eatre pr\u00e9sent sur certains syst\u00e8mes.<\/p>\n<\/li>\n<li>\n<p>Comprendre, expliquer et analyser les diff\u00e9rentes mani\u00e8res d&#039;examiner les syst\u00e8mes d&#039;exfiltration et d&#039;utilisation des donn\u00e9es.<\/p>\n<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div>    <\/div>\n<\/div>\n<!-- \/module text --><!-- module fancy heading -->\n<div  class=\"module module-fancy-heading tb_mxqe422\" data-lazy=\"1\">\n        <h2 class=\"fancy-heading\">\n    <span class=\"main-head tf_block\">\n                    Solution            <\/span>\n\n    \n    <span class=\"sub-head tf_block tf_rel\">\n                                <\/span>\n    <\/h2>\n<\/div>\n<!-- \/module fancy heading -->\n<!-- module text -->\n<div  class=\"module module-text tb_olr8818\" data-lazy=\"1\">\n        <div  class=\"tb_text_wrap\">\n        <div class=\"page\" title=\"Page 1\">\n<div class=\"layoutArea\">\n<div class=\"column\">\n<h5><em>\u00c0 l&#039;aide d&#039;une \u00e9quipe d&#039;experts, nous avons \u00e9valu\u00e9 les mesures de s\u00e9curit\u00e9 en place par rapport aux normes de l&#039;industrie. De plus, un rapport d&#039;expert a \u00e9t\u00e9 r\u00e9dig\u00e9 d\u00e9crivant nos conclusions.<\/em><\/h5>\n<p>Nos experts-conseils iDS Digital Forensics ont examin\u00e9 de nombreux rapports, artefacts et autres documents pour d\u00e9terminer ce que les preuves m\u00e9dico-l\u00e9gales \u00abont vraiment montr\u00e9\u00bb.<\/p>\n<p><strong>L&#039;\u00e9quipe d&#039;iDS Consulting a analys\u00e9 et rapport\u00e9 les \u00e9l\u00e9ments suivants\u00a0:<\/strong><\/p>\n<ul>\n<li>\n<p>Que des centaines d&#039;appareils avaient \u00e9t\u00e9 photographi\u00e9s et analys\u00e9s de mani\u00e8re m\u00e9dico-l\u00e9gale.<\/p>\n<\/li>\n<li>\n<p>Que les artefacts r\u00e9pertori\u00e9s dans les rapports montraient simplement l&#039;acc\u00e8s aux documents \u00e0 partir des appareils de l&#039;entreprise eux-m\u00eames, par opposition \u00e0<\/p>\n<p>documents exfiltr\u00e9s.<\/p>\n<\/li>\n<li>\n<p>Qu&#039;aucune donn\u00e9e r\u00e9elle n&#039;avait \u00e9t\u00e9 exfiltr\u00e9e.<\/p>\n<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div>    <\/div>\n<\/div>\n<!-- \/module text --><!-- module fancy heading -->\n<div  class=\"module module-fancy-heading tb_7tyc312\" data-lazy=\"1\">\n        <h2 class=\"fancy-heading\">\n    <span class=\"main-head tf_block\">\n                    R\u00e9sultat            <\/span>\n\n    \n    <span class=\"sub-head tf_block tf_rel\">\n                                <\/span>\n    <\/h2>\n<\/div>\n<!-- \/module fancy heading -->\n<!-- module text -->\n<div  class=\"module module-text tb_17by0\" data-lazy=\"1\">\n        <div  class=\"tb_text_wrap\">\n        <div class=\"page\" title=\"Page 1\">\n<div class=\"layoutArea\">\n<div class=\"column\">\n<h5><em>Gr\u00e2ce \u00e0 un t\u00e9moignage en direct, l&#039;expert de l&#039;iDS a pu d\u00e9montrer le manque de preuves m\u00e9dico-l\u00e9gales pour \u00e9tayer toute all\u00e9gation de d\u00e9tournement de donn\u00e9es \u00e9lectroniques.<\/em><\/h5>\n<p>Notre client a remport\u00e9 un verdict de proc\u00e8s, d\u00e9clarant que cela \u00e9tait d\u00fb en grande partie au travail d&#039;iDS pour diss\u00e9quer les preuves et \u00e0 notre capacit\u00e9 \u00e0 t\u00e9moigner sur le manque de preuves m\u00e9dico-l\u00e9gales en langage clair.<\/p>\n<\/div>\n<\/div>\n<\/div>    <\/div>\n<\/div>\n<!-- \/module text -->        <\/div>\n                        <\/div>\n        <\/div>\n        <\/div>\n<!--\/themify_builder_content-->","protected":false},"excerpt":{"rendered":"<p>An insurance industry client hired 70 employees from a competitor. They were accused of receiving and using trade secrets from the departed employee&#8217;s company. The Plaintiff had spent hundreds of thousands of dollars to perform digital forensics, both internally and through an independent service provider. The client needed expertise for the following: To understand how [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":274,"parent":33,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"team":[],"class_list":["post-272","page","type-page","status-publish","has-post-thumbnail","hentry","has-post-title","has-post-date","has-post-category","has-post-tag","has-post-comment","has-post-author",""],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.6 (Yoast SEO v27.6) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Misappropriation of Trade Secrets - iDiscovery Solutions<\/title>\n<meta name=\"description\" content=\"iDS Digital Forensics Consulting Experts successfully represented a client accused of using trade secrets from a departed employee\u2019s company.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/idsinc.com\/fr\/etudes-de-cas\/secrets-commerciaux-de-lindustrie\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Misappropriation of Trade Secrets \u2013 A Comprehensive Investigation\" \/>\n<meta property=\"og:description\" content=\"iDS Digital Forensics Consulting Experts successfully represented a client accused of using trade secrets from a departed employee\u2019s company.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/idsinc.com\/fr\/etudes-de-cas\/secrets-commerciaux-de-lindustrie\/\" \/>\n<meta property=\"og:site_name\" content=\"iDiscovery Solutions\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/iDiscovery-Solutions-110210573904472\" \/>\n<meta property=\"article:modified_time\" content=\"2024-01-10T16:43:29+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/iDS-Case-Study-Industry-Trade-Secrets.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/case-studies\\\/industry-trade-secrets\\\/\",\"url\":\"https:\\\/\\\/idsinc.com\\\/case-studies\\\/industry-trade-secrets\\\/\",\"name\":\"Misappropriation of Trade Secrets - iDiscovery Solutions\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/case-studies\\\/industry-trade-secrets\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/case-studies\\\/industry-trade-secrets\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/iDS-Case-Study-Industry-Trade-Secrets.jpg\",\"datePublished\":\"2021-01-27T21:20:27+00:00\",\"dateModified\":\"2024-01-10T16:43:29+00:00\",\"description\":\"iDS Digital Forensics Consulting Experts successfully represented a client accused of using trade secrets from a departed employee\u2019s company.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/case-studies\\\/industry-trade-secrets\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/idsinc.com\\\/case-studies\\\/industry-trade-secrets\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/case-studies\\\/industry-trade-secrets\\\/#primaryimage\",\"url\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/iDS-Case-Study-Industry-Trade-Secrets.jpg\",\"contentUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/iDS-Case-Study-Industry-Trade-Secrets.jpg\",\"width\":1200,\"height\":600,\"caption\":\"iDS Digital Forensics Consulting Experts successfully represented a client accused of using trade secrets from a departed employee\u2019s company.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/case-studies\\\/industry-trade-secrets\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/idsinc.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Case Studies\",\"item\":\"https:\\\/\\\/idsinc.com\\\/case-studies\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Misappropriation of Trade Secrets\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#website\",\"url\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/\",\"name\":\"iDiscovery Solutions\",\"description\":\"Use data to your advantage in the courtroom\",\"publisher\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#organization\"},\"alternateName\":\"iDS\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#organization\",\"name\":\"iDiscovery Solutions\",\"alternateName\":\"iDS\",\"url\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/iDS-Logo-3c-e1611176096212.png\",\"contentUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/iDS-Logo-3c-e1611176096212.png\",\"width\":100,\"height\":73,\"caption\":\"iDiscovery Solutions\"},\"image\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/iDiscovery-Solutions-110210573904472\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/idsinc\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCarv7o1MeYfCp0eZ1IrufIw\"],\"description\":\"iDS provides consultative data solutions to corporations and law firms around the world, giving them a decisive advantage \u2013 both in and out of the courtroom. iDS\u2019s subject matter experts and data strategists specialize in finding solutions to complex data problems, ensuring data can be leveraged as an asset, not a liability.\",\"email\":\"info@idsinc.com\",\"telephone\":\"+1.800.813.4832\",\"legalName\":\"iDiscovery Solutions\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"D\u00e9tournement de secrets commerciaux - iDiscovery Solutions","description":"Les experts-conseils iDS Digital Forensics ont repr\u00e9sent\u00e9 avec succ\u00e8s un client accus\u00e9 d&#039;avoir utilis\u00e9 des secrets commerciaux de l&#039;entreprise d&#039;un employ\u00e9 d\u00e9c\u00e9d\u00e9.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/idsinc.com\/fr\/etudes-de-cas\/secrets-commerciaux-de-lindustrie\/","og_locale":"fr_FR","og_type":"article","og_title":"Misappropriation of Trade Secrets \u2013 A Comprehensive Investigation","og_description":"iDS Digital Forensics Consulting Experts successfully represented a client accused of using trade secrets from a departed employee\u2019s company.","og_url":"https:\/\/idsinc.com\/fr\/etudes-de-cas\/secrets-commerciaux-de-lindustrie\/","og_site_name":"iDiscovery Solutions","article_publisher":"https:\/\/www.facebook.com\/iDiscovery-Solutions-110210573904472","article_modified_time":"2024-01-10T16:43:29+00:00","og_image":[{"width":1200,"height":600,"url":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/iDS-Case-Study-Industry-Trade-Secrets.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Dur\u00e9e de lecture estim\u00e9e":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/idsinc.com\/case-studies\/industry-trade-secrets\/","url":"https:\/\/idsinc.com\/case-studies\/industry-trade-secrets\/","name":"D\u00e9tournement de secrets commerciaux - iDiscovery Solutions","isPartOf":{"@id":"https:\/\/idsinc.com\/en_gb\/#website"},"primaryImageOfPage":{"@id":"https:\/\/idsinc.com\/case-studies\/industry-trade-secrets\/#primaryimage"},"image":{"@id":"https:\/\/idsinc.com\/case-studies\/industry-trade-secrets\/#primaryimage"},"thumbnailUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/iDS-Case-Study-Industry-Trade-Secrets.jpg","datePublished":"2021-01-27T21:20:27+00:00","dateModified":"2024-01-10T16:43:29+00:00","description":"Les experts-conseils iDS Digital Forensics ont repr\u00e9sent\u00e9 avec succ\u00e8s un client accus\u00e9 d&#039;avoir utilis\u00e9 des secrets commerciaux de l&#039;entreprise d&#039;un employ\u00e9 d\u00e9c\u00e9d\u00e9.","breadcrumb":{"@id":"https:\/\/idsinc.com\/case-studies\/industry-trade-secrets\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/idsinc.com\/case-studies\/industry-trade-secrets\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/idsinc.com\/case-studies\/industry-trade-secrets\/#primaryimage","url":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/iDS-Case-Study-Industry-Trade-Secrets.jpg","contentUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/iDS-Case-Study-Industry-Trade-Secrets.jpg","width":1200,"height":600,"caption":"iDS Digital Forensics Consulting Experts successfully represented a client accused of using trade secrets from a departed employee\u2019s company."},{"@type":"BreadcrumbList","@id":"https:\/\/idsinc.com\/case-studies\/industry-trade-secrets\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/idsinc.com\/"},{"@type":"ListItem","position":2,"name":"Case Studies","item":"https:\/\/idsinc.com\/case-studies\/"},{"@type":"ListItem","position":3,"name":"Misappropriation of Trade Secrets"}]},{"@type":"WebSite","@id":"https:\/\/idsinc.com\/en_gb\/#website","url":"https:\/\/idsinc.com\/en_gb\/","name":"Solutions d&#039;iD\u00e9couverte","description":"Utilisez les donn\u00e9es \u00e0 votre avantage dans la salle d\u2019audience","publisher":{"@id":"https:\/\/idsinc.com\/en_gb\/#organization"},"alternateName":"iDS","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/idsinc.com\/en_gb\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/idsinc.com\/en_gb\/#organization","name":"Solutions d&#039;iD\u00e9couverte","alternateName":"iDS","url":"https:\/\/idsinc.com\/en_gb\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/logo\/image\/","url":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/iDS-Logo-3c-e1611176096212.png","contentUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/iDS-Logo-3c-e1611176096212.png","width":100,"height":73,"caption":"iDiscovery Solutions"},"image":{"@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/iDiscovery-Solutions-110210573904472","https:\/\/www.linkedin.com\/company\/idsinc","https:\/\/www.youtube.com\/channel\/UCarv7o1MeYfCp0eZ1IrufIw"],"description":"iDS fournit des solutions de donn\u00e9es consultatives aux entreprises et aux cabinets d&#039;avocats du monde entier, leur donnant un avantage d\u00e9cisif, tant \u00e0 l&#039;int\u00e9rieur qu&#039;\u00e0 l&#039;ext\u00e9rieur de la salle d&#039;audience. Les experts en la mati\u00e8re et les strat\u00e8ges en donn\u00e9es d&#039;iDS se sp\u00e9cialisent dans la recherche de solutions \u00e0 des probl\u00e8mes de donn\u00e9es complexes, garantissant que les donn\u00e9es peuvent \u00eatre exploit\u00e9es comme un atout et non comme un passif.","email":"info@idsinc.com","telephone":"+1.800.813.4832","legalName":"iDiscovery Solutions"}]}},"builder_content":"\n<h2>CHALLENGE<br\/><\/h2>\n<h5><em><strong>An insurance industry client hired 70 employees from a competitor. They were accused of receiving and using trade secrets from the departed employee's company.<\/strong><\/em><\/h5> <p>The Plaintiff had spent hundreds of thousands of dollars to perform digital forensics, both internally and through an independent service provider.<\/p> <p><strong>The client needed expertise for the following:<\/strong><\/p> <ul> <li> <p>To understand how to read and interpret tens of hundreds of pages of \u201cdigital forensic evidence\u201d.<\/p> <\/li> <li> <p>To understand how data gets stored, how data can be moved from one location to another, and to explain the reasons data<\/p> <p>may not be present on certain systems.<\/p> <\/li> <li> <p>To understand, explain and analyze the various ways to examine systems for the exfiltration and usage of data.<\/p> <\/li> <\/ul>\n<h2>Solution<br\/><\/h2>\n<h5><em>Using a team of experts, we evaluated the security measures in place as compared to industry standards. In addition, an expert report was composed describing our conclusions.<\/em><\/h5> <p>Our iDS Digital Forensics Consulting Experts examined numerous reports, artifacts and other materials to determine what the forensic evidence \u201creally showed\u201d.<\/p> <p><strong>The iDS Consulting team analyzed and reported on the following:<\/strong><\/p> <ul> <li> <p>That hundreds of devices had been forensically imaged and analyzed.<\/p> <\/li> <li> <p>That the artifacts listed in the reports simply showed access of documents from the corporate devices themselves as opposed to<\/p> <p>documents being exfiltrated.<\/p> <\/li> <li> <p>That no actual data had been exfiltrated.<\/p> <\/li> <\/ul>\n<h2>Result<br\/><\/h2>\n<h5><em>Through live testimony, the iDS expert was able to demonstrate the lack of forensic evidence to support any allegation of electronic data misappropriation.<\/em><\/h5> <p>Our client won a trial verdict, stating that in large part it was due to the iDS work dissecting the evidence and our ability to testify about the lack of forensic evidence in plain English.<\/p>","_links":{"self":[{"href":"https:\/\/idsinc.com\/fr\/wp-json\/wp\/v2\/pages\/272","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/idsinc.com\/fr\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/idsinc.com\/fr\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/idsinc.com\/fr\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/idsinc.com\/fr\/wp-json\/wp\/v2\/comments?post=272"}],"version-history":[{"count":0,"href":"https:\/\/idsinc.com\/fr\/wp-json\/wp\/v2\/pages\/272\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/idsinc.com\/fr\/wp-json\/wp\/v2\/pages\/33"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/idsinc.com\/fr\/wp-json\/wp\/v2\/media\/274"}],"wp:attachment":[{"href":"https:\/\/idsinc.com\/fr\/wp-json\/wp\/v2\/media?parent=272"}],"wp:term":[{"taxonomy":"team","embeddable":true,"href":"https:\/\/idsinc.com\/fr\/wp-json\/wp\/v2\/team?post=272"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}