{"id":4827,"date":"2023-04-06T14:07:31","date_gmt":"2023-04-06T20:07:31","guid":{"rendered":"https:\/\/idsinc.com\/case-studies\/analysis-of-data-establishes-employee-spent-half-his-day-on-non-work-activity-copy\/"},"modified":"2024-07-08T14:16:57","modified_gmt":"2024-07-08T20:16:57","slug":"empreintes-numeriques","status":"publish","type":"page","link":"https:\/\/idsinc.com\/fr\/case-studies\/digital-footprints\/","title":{"rendered":"Des codeurs hautement qualifi\u00e9s tentent de d\u00e9jouer leurs empreintes num\u00e9riques"},"content":{"rendered":"<!--themify_builder_content-->\n<div id=\"themify_builder_content-4827\" data-postid=\"4827\" class=\"themify_builder_content themify_builder_content-4827 themify_builder tf_clear\">\n                    <div  data-lazy=\"1\" class=\"module_row themify_builder_row tb_1g79733 tb_first tf_w\">\n                        <div class=\"row_inner col_align_top tb_col_count_1 tf_box tf_rel\">\n                        <div  data-lazy=\"1\" class=\"module_column tb-column col-full tb_xtyh704 first\">\n                    <!-- module image -->\n<div  class=\"module module-image tb_dxz3487 image-full-overlay   auto_fullwidth tf_mw\" data-lazy=\"1\">\n        <div class=\"image-wrap tf_rel tf_mw\">\n            <img decoding=\"async\" src=\"https:\/\/idsinc.com\/wp-content\/uploads\/2023\/04\/Highly-Skilled-Coders-Try-to-Outsmart-Thier-Digital-Footprints-iDS-Case-Study-1024x512.jpg\" title=\"Des codeurs hautement qualifi\u00e9s tentent de d\u00e9jouer leurs empreintes num\u00e9riques\" alt=\"Des codeurs hautement qualifi\u00e9s tentent de d\u00e9jouer leurs empreintes num\u00e9riques\">    \n        <\/div>\n    <!-- \/image-wrap -->\n    \n        <\/div>\n<!-- \/module image -->        <\/div>\n                        <\/div>\n        <\/div>\n                        <div  data-lazy=\"1\" class=\"module_row themify_builder_row tb_o11x444 tf_w\">\n                        <div class=\"row_inner col_align_top tb_col_count_1 tf_box tf_rel\">\n                        <div  data-lazy=\"1\" class=\"module_column tb-column col-full tb_s4vs048 first\">\n                    <!-- module fancy heading -->\n<div  class=\"module module-fancy-heading tb_eunx788\" data-lazy=\"1\">\n        <h2 class=\"fancy-heading\">\n    <span class=\"main-head tf_block\">\n                    D\u00c9FI            <\/span>\n\n    \n    <span class=\"sub-head tf_block tf_rel\">\n                                <\/span>\n    <\/h2>\n<\/div>\n<!-- \/module fancy heading -->\n<!-- module text -->\n<div  class=\"module module-text tb_zbw7777\" data-lazy=\"1\">\n        <div  class=\"tb_text_wrap\">\n        <div class=\"page\" title=\"Page 1\">\n<div class=\"layoutArea\">\n<h5>iDS s&#039;est vu pr\u00e9senter un cas de plagiat logiciel. Les plaignants, deux d\u00e9veloppeurs de logiciels hotshot, ont affirm\u00e9 que les d\u00e9fendeurs, nos clients, n&#039;avaient pas le droit d&#039;utiliser leur logiciel. En fin de compte, les plaignants ont all\u00e9gu\u00e9 que les d\u00e9fendeurs avaient vol\u00e9 leur code source. <\/h5>\n<p>L&#039;affaire reposait sur la question de savoir si le code source avait \u00e9t\u00e9 con\u00e7u ou non avant que les plaignants ne le r\u00e9clament. En cons\u00e9quence, nous avons d\u00fb d\u00e9terminer la date de d\u00e9veloppement.<br><strong><br>Notre client avait besoin d&#039;autorit\u00e9 dans les domaines suivants :<\/strong><\/p>\n<ul>\n<li>R\u00e9cup\u00e9ration de donn\u00e9es<\/li>\n<li>Analyse m\u00e9dico-l\u00e9gale<\/li>\n<li>Acquisitions m\u00e9dico-l\u00e9gales<\/li>\n<\/ul>\n<\/div>\n<\/div>    <\/div>\n<\/div>\n<!-- \/module text --><!-- module fancy heading -->\n<div  class=\"module module-fancy-heading tb_feb6505\" data-lazy=\"1\">\n        <h2 class=\"fancy-heading\">\n    <span class=\"main-head tf_block\">\n                    Solution            <\/span>\n\n    \n    <span class=\"sub-head tf_block tf_rel\">\n                                <\/span>\n    <\/h2>\n<\/div>\n<!-- \/module fancy heading -->\n<!-- module text -->\n<div  class=\"module module-text tb_ju5u180\" data-lazy=\"1\">\n        <div  class=\"tb_text_wrap\">\n        <div class=\"page\" title=\"Page 1\">\n<div class=\"layoutArea\">\n<div class=\"column\">Notre \u00e9quipe d&#039;experts iDS a prouv\u00e9 par une acquisition m\u00e9dico-l\u00e9gale que non seulement le logiciel en question n&#039;avait pas \u00e9t\u00e9 cr\u00e9\u00e9 sur l&#039;ordinateur pr\u00e9sent\u00e9 au tribunal, mais que les plaignants ont \u00e9galement pr\u00e9sent\u00e9 de fausses informations au tribunal. <\/div>\n<div>\u00a0<\/div>\n<div class=\"column\"><strong>L&#039;\u00e9quipe d&#039;experts iDS a test\u00e9, valid\u00e9 et d\u00e9termin\u00e9 les \u00e9l\u00e9ments suivants\u00a0:<\/strong> <\/div>\n<div>\u00a0<\/div>\n<ul>\n<li class=\"column\">Les plaignants ont consid\u00e9rablement gonfl\u00e9 leurs factures et grossi\u00e8rement exag\u00e9r\u00e9 le temps qu&#039;ils ont consacr\u00e9 au projet<\/li>\n<li class=\"column\">Les plaignants ont tromp\u00e9 le tribunal avec un ordinateur factice pour donner l&#039;impression qu&#039;ils avaient construit des logiciels dessus pendant des ann\u00e9es<\/li>\n<li class=\"column\">L&#039;ordinateur factice \u00e9tait rempli de donn\u00e9es falsifi\u00e9es et falsifi\u00e9es cr\u00e9\u00e9es par les plaignants<\/li>\n<\/ul>\n<\/div>\n<\/div>    <\/div>\n<\/div>\n<!-- \/module text --><!-- module fancy heading -->\n<div  class=\"module module-fancy-heading tb_1qta919\" data-lazy=\"1\">\n        <h2 class=\"fancy-heading\">\n    <span class=\"main-head tf_block\">\n                    R\u00e9sultat            <\/span>\n\n    \n    <span class=\"sub-head tf_block tf_rel\">\n                                <\/span>\n    <\/h2>\n<\/div>\n<!-- \/module fancy heading -->\n<!-- module text -->\n<div  class=\"module module-text tb_v588411\" data-lazy=\"1\">\n        <div  class=\"tb_text_wrap\">\n        <div class=\"page\" title=\"Page 1\">\n<div class=\"layoutArea\">\n<div class=\"column\"><strong>Le tribunal a rejet\u00e9 toute l&#039;affaire et a accord\u00e9 des honoraires d&#039;avocat aux accus\u00e9s.<\/strong><\/div>\n<div class=\"column\"><br>Gr\u00e2ce \u00e0 l&#039;analyse de d\u00e9couverte d&#039;iDS, les r\u00e9sultats ont r\u00e9v\u00e9l\u00e9 des preuves pr\u00e9judiciables contre le plaignant. C&#039;\u00e9tait suffisant pour assurer une d\u00e9fense r\u00e9ussie. Cela a finalement abouti \u00e0 une contre-poursuite et \u00e0 des dommages-int\u00e9r\u00eats accord\u00e9s aux d\u00e9fendeurs. La d\u00e9fense r\u00e9ussie t\u00e9moigne de la comp\u00e9tence et de l&#039;expertise d&#039;iDS.<\/div>\n<\/div>\n<\/div>    <\/div>\n<\/div>\n<!-- \/module text -->        <\/div>\n                        <\/div>\n        <\/div>\n        <\/div>\n<!--\/themify_builder_content-->","protected":false},"excerpt":{"rendered":"<p>iDS was presented with a software plagiarism case. The plaintiffs, two hotshot software developers, claimed the defendants, our clients, didn\u2019t have the right to use their software. Ultimately, the plaintiffs alleged that the defendants stole their source code. The case hinged on whether or not the source code had been conceived prior to the plaintiffs [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":4829,"parent":33,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"team":[],"class_list":["post-4827","page","type-page","status-publish","has-post-thumbnail","hentry","has-post-title","has-post-date","has-post-category","has-post-tag","has-post-comment","has-post-author",""],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.6 (Yoast SEO v27.6) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Coders Try to Outsmart Their Digital Footprints - Case Study<\/title>\n<meta name=\"description\" content=\"iDiscovery Solutions was presented with a software plagiarism case in which Highly Skilled Coders Tried to Outsmart Their Digital Footprints.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/idsinc.com\/fr\/etudes-de-cas\/empreintes-numeriques\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Highly Skilled Coders Try to Outsmart Their Digital Footprints\" \/>\n<meta property=\"og:description\" content=\"iDiscovery Solutions was presented with a software plagiarism case in which Highly Skilled Coders Tried to Outsmart Their Digital Footprints.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/idsinc.com\/fr\/etudes-de-cas\/empreintes-numeriques\/\" \/>\n<meta property=\"og:site_name\" content=\"iDiscovery Solutions\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/iDiscovery-Solutions-110210573904472\" \/>\n<meta property=\"article:modified_time\" content=\"2024-07-08T20:16:57+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/idsinc.com\/wp-content\/uploads\/2023\/04\/Highly-Skilled-Coders-Try-to-Outsmart-Thier-Digital-Footprints-iDS-Case-Study-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/case-studies\\\/digital-footprints\\\/\",\"url\":\"https:\\\/\\\/idsinc.com\\\/case-studies\\\/digital-footprints\\\/\",\"name\":\"Coders Try to Outsmart Their Digital Footprints - Case Study\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/case-studies\\\/digital-footprints\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/case-studies\\\/digital-footprints\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/Highly-Skilled-Coders-Try-to-Outsmart-Thier-Digital-Footprints-iDS-Case-Study-scaled.jpg\",\"datePublished\":\"2023-04-06T20:07:31+00:00\",\"dateModified\":\"2024-07-08T20:16:57+00:00\",\"description\":\"iDiscovery Solutions was presented with a software plagiarism case in which Highly Skilled Coders Tried to Outsmart Their Digital Footprints.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/case-studies\\\/digital-footprints\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/idsinc.com\\\/case-studies\\\/digital-footprints\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/case-studies\\\/digital-footprints\\\/#primaryimage\",\"url\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/Highly-Skilled-Coders-Try-to-Outsmart-Thier-Digital-Footprints-iDS-Case-Study-scaled.jpg\",\"contentUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/Highly-Skilled-Coders-Try-to-Outsmart-Thier-Digital-Footprints-iDS-Case-Study-scaled.jpg\",\"width\":1200,\"height\":600,\"caption\":\"iDiscovery Solutions was presented with a software plagiarism case in which Highly Skilled Coders Tried to Outsmart Their Digital Footprints.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/case-studies\\\/digital-footprints\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/idsinc.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Case Studies\",\"item\":\"https:\\\/\\\/idsinc.com\\\/case-studies\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Highly Skilled Coders Try to Outsmart Their Digital Footprints\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#website\",\"url\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/\",\"name\":\"iDiscovery Solutions\",\"description\":\"Use data to your advantage in the courtroom\",\"publisher\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#organization\"},\"alternateName\":\"iDS\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#organization\",\"name\":\"iDiscovery Solutions\",\"alternateName\":\"iDS\",\"url\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/iDS-Logo-3c-e1611176096212.png\",\"contentUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/iDS-Logo-3c-e1611176096212.png\",\"width\":100,\"height\":73,\"caption\":\"iDiscovery Solutions\"},\"image\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/iDiscovery-Solutions-110210573904472\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/idsinc\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCarv7o1MeYfCp0eZ1IrufIw\"],\"description\":\"iDS provides consultative data solutions to corporations and law firms around the world, giving them a decisive advantage \u2013 both in and out of the courtroom. iDS\u2019s subject matter experts and data strategists specialize in finding solutions to complex data problems, ensuring data can be leveraged as an asset, not a liability.\",\"email\":\"info@idsinc.com\",\"telephone\":\"+1.800.813.4832\",\"legalName\":\"iDiscovery Solutions\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Les codeurs tentent de d\u00e9jouer leurs empreintes num\u00e9riques - \u00c9tude de cas","description":"iDiscovery Solutions a \u00e9t\u00e9 confront\u00e9e \u00e0 un cas de plagiat logiciel dans lequel des codeurs hautement qualifi\u00e9s ont tent\u00e9 de d\u00e9jouer leurs empreintes num\u00e9riques.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/idsinc.com\/fr\/etudes-de-cas\/empreintes-numeriques\/","og_locale":"fr_FR","og_type":"article","og_title":"Highly Skilled Coders Try to Outsmart Their Digital Footprints","og_description":"iDiscovery Solutions was presented with a software plagiarism case in which Highly Skilled Coders Tried to Outsmart Their Digital Footprints.","og_url":"https:\/\/idsinc.com\/fr\/etudes-de-cas\/empreintes-numeriques\/","og_site_name":"iDiscovery Solutions","article_publisher":"https:\/\/www.facebook.com\/iDiscovery-Solutions-110210573904472","article_modified_time":"2024-07-08T20:16:57+00:00","og_image":[{"width":1200,"height":600,"url":"https:\/\/idsinc.com\/wp-content\/uploads\/2023\/04\/Highly-Skilled-Coders-Try-to-Outsmart-Thier-Digital-Footprints-iDS-Case-Study-scaled.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/idsinc.com\/case-studies\/digital-footprints\/","url":"https:\/\/idsinc.com\/case-studies\/digital-footprints\/","name":"Les codeurs tentent de d\u00e9jouer leurs empreintes num\u00e9riques - \u00c9tude de cas","isPartOf":{"@id":"https:\/\/idsinc.com\/en_gb\/#website"},"primaryImageOfPage":{"@id":"https:\/\/idsinc.com\/case-studies\/digital-footprints\/#primaryimage"},"image":{"@id":"https:\/\/idsinc.com\/case-studies\/digital-footprints\/#primaryimage"},"thumbnailUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2023\/04\/Highly-Skilled-Coders-Try-to-Outsmart-Thier-Digital-Footprints-iDS-Case-Study-scaled.jpg","datePublished":"2023-04-06T20:07:31+00:00","dateModified":"2024-07-08T20:16:57+00:00","description":"iDiscovery Solutions a \u00e9t\u00e9 confront\u00e9e \u00e0 un cas de plagiat logiciel dans lequel des codeurs hautement qualifi\u00e9s ont tent\u00e9 de d\u00e9jouer leurs empreintes num\u00e9riques.","breadcrumb":{"@id":"https:\/\/idsinc.com\/case-studies\/digital-footprints\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/idsinc.com\/case-studies\/digital-footprints\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/idsinc.com\/case-studies\/digital-footprints\/#primaryimage","url":"https:\/\/idsinc.com\/wp-content\/uploads\/2023\/04\/Highly-Skilled-Coders-Try-to-Outsmart-Thier-Digital-Footprints-iDS-Case-Study-scaled.jpg","contentUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2023\/04\/Highly-Skilled-Coders-Try-to-Outsmart-Thier-Digital-Footprints-iDS-Case-Study-scaled.jpg","width":1200,"height":600,"caption":"iDiscovery Solutions was presented with a software plagiarism case in which Highly Skilled Coders Tried to Outsmart Their Digital Footprints."},{"@type":"BreadcrumbList","@id":"https:\/\/idsinc.com\/case-studies\/digital-footprints\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/idsinc.com\/"},{"@type":"ListItem","position":2,"name":"Case Studies","item":"https:\/\/idsinc.com\/case-studies\/"},{"@type":"ListItem","position":3,"name":"Highly Skilled Coders Try to Outsmart Their Digital Footprints"}]},{"@type":"WebSite","@id":"https:\/\/idsinc.com\/en_gb\/#website","url":"https:\/\/idsinc.com\/en_gb\/","name":"Solutions d&#039;iD\u00e9couverte","description":"Utilisez les donn\u00e9es \u00e0 votre avantage dans la salle d\u2019audience","publisher":{"@id":"https:\/\/idsinc.com\/en_gb\/#organization"},"alternateName":"iDS","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/idsinc.com\/en_gb\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/idsinc.com\/en_gb\/#organization","name":"Solutions d&#039;iD\u00e9couverte","alternateName":"iDS","url":"https:\/\/idsinc.com\/en_gb\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/logo\/image\/","url":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/iDS-Logo-3c-e1611176096212.png","contentUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/iDS-Logo-3c-e1611176096212.png","width":100,"height":73,"caption":"iDiscovery Solutions"},"image":{"@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/iDiscovery-Solutions-110210573904472","https:\/\/www.linkedin.com\/company\/idsinc","https:\/\/www.youtube.com\/channel\/UCarv7o1MeYfCp0eZ1IrufIw"],"description":"iDS fournit des solutions de donn\u00e9es consultatives aux entreprises et aux cabinets d&#039;avocats du monde entier, leur donnant un avantage d\u00e9cisif, tant \u00e0 l&#039;int\u00e9rieur qu&#039;\u00e0 l&#039;ext\u00e9rieur de la salle d&#039;audience. Les experts en la mati\u00e8re et les strat\u00e8ges en donn\u00e9es d&#039;iDS se sp\u00e9cialisent dans la recherche de solutions \u00e0 des probl\u00e8mes de donn\u00e9es complexes, garantissant que les donn\u00e9es peuvent \u00eatre exploit\u00e9es comme un atout et non comme un passif.","email":"info@idsinc.com","telephone":"+1.800.813.4832","legalName":"iDiscovery Solutions"}]}},"builder_content":"<img src=\"https:\/\/idsinc.com\/wp-content\/uploads\/2023\/04\/Highly-Skilled-Coders-Try-to-Outsmart-Thier-Digital-Footprints-iDS-Case-Study-1024x512.jpg\" title=\"Highly Skilled Coders Try to Outsmart Their Digital Footprints\" alt=\"Highly Skilled Coders Try to Outsmart Their Digital Footprints\"> <h1> Highly Skilled Coders Try to Outsmart Their Digital Footprints <\/h1>\n<h2>CHALLENGE<br\/><\/h2>\n<h5>iDS was presented with a software plagiarism case. The plaintiffs, two hotshot software developers, claimed the defendants, our clients, didn\u2019t have the right to use their software. Ultimately, the plaintiffs alleged that the defendants stole their source code. <\/h5> <p>The case hinged on whether or not the source code had been conceived prior to the plaintiffs claiming it. As a result, we had to determine the development date.<br><strong><br>Our client needed authority in the following areas:<\/strong><\/p> <ul> <li>Data recovery<\/li> <li>Forensic analysis<\/li> <li>Forensic acquisitions<\/li> <\/ul>\n<h2>Solution<br\/><\/h2>\nOur team of iDS experts proved through forensic acquisition that not only had the software in question not been created on the computer presented to the court, but that the plaintiffs also presented false information to the court. \u00a0 <strong>The iDS Team of Experts tested, validated, and determined the following:<\/strong> \u00a0 <ul> <li>The plaintiffs drastically inflated their billings and grossly exaggerated their time spent on the project<\/li> <li>The plaintiffs deceived the court with a dummy computer to make it look like they had been building software on it for years<\/li> <li>The dummy computer was filled with falsified &amp; tampered data that was created by the plaintiffs<\/li> <\/ul>\n<h2>Result<br\/><\/h2>\n<strong>The court threw out the entire case and awarded attorney fees to the defendants.<\/strong> <br>Through iDS discovery analysis, the results revealed damaging evidence against the plaintiff. It was enough to secure a successful defense. This ultimately resulted in a counter-suit and damages awarded to the defendants. The successful defense was a testament to iDS\u2019 skill and expertise.","_links":{"self":[{"href":"https:\/\/idsinc.com\/fr\/wp-json\/wp\/v2\/pages\/4827","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/idsinc.com\/fr\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/idsinc.com\/fr\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/idsinc.com\/fr\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/idsinc.com\/fr\/wp-json\/wp\/v2\/comments?post=4827"}],"version-history":[{"count":0,"href":"https:\/\/idsinc.com\/fr\/wp-json\/wp\/v2\/pages\/4827\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/idsinc.com\/fr\/wp-json\/wp\/v2\/pages\/33"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/idsinc.com\/fr\/wp-json\/wp\/v2\/media\/4829"}],"wp:attachment":[{"href":"https:\/\/idsinc.com\/fr\/wp-json\/wp\/v2\/media?parent=4827"}],"wp:term":[{"taxonomy":"team","embeddable":true,"href":"https:\/\/idsinc.com\/fr\/wp-json\/wp\/v2\/team?post=4827"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}