{"id":9572,"date":"2026-03-26T08:43:24","date_gmt":"2026-03-26T14:43:24","guid":{"rendered":"https:\/\/idsinc.com\/?p=9572"},"modified":"2026-03-26T08:43:28","modified_gmt":"2026-03-26T14:43:28","slug":"donnees-sur-la-propriete-intellectuelle","status":"publish","type":"post","link":"https:\/\/idsinc.com\/fr\/intellectual-property-data\/","title":{"rendered":"Lorsque la propri\u00e9t\u00e9 intellectuelle dispara\u00eet, les donn\u00e9es restent."},"content":{"rendered":"<!-- wp:themify-builder\/canvas \/-->\n\n\n<h6 class=\"wp-block-heading\" id=\"h-the-most-damaging-corporate-heists-today-don-t-involve-broken-locks-or-midnight-alarms-they-involve-a-departing-employee-a-personal-cloud-account-and-a-few-seconds-of-silence-intellectual-property-ai-proprietary-code-pricing-strategies-client-lists-strategic-roadmaps-ai-can-walk-out-the-door-without-a-sound\"><strong>Les vols d&#039;entreprise les plus d\u00e9vastateurs d&#039;aujourd&#039;hui ne se limitent pas aux serrures forc\u00e9es ni aux alarmes qui sonnent \u00e0 minuit. Ils impliquent un employ\u00e9 qui quitte l&#039;entreprise, un compte cloud personnel et quelques secondes de silence. Propri\u00e9t\u00e9 intellectuelle \u2013 code source d&#039;IA, strat\u00e9gies de tarification, listes de clients, feuilles de route strat\u00e9giques \u2013 l&#039;IA peut dispara\u00eetre sans laisser de traces.<\/strong><\/h6>\n\n\n\n<p>Mais ce que beaucoup de menaces internes ne comprennent pas, c&#039;est que le monde num\u00e9rique n&#039;oublie pas. Dans un article r\u00e9cemment publi\u00e9 sur <a href=\"https:\/\/www.lexology.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">Lexologie<\/a>, membre de l&#039;\u00e9quipe iDS <a href=\"https:\/\/idsinc.com\/fr\/timothy-latulippe\/\" target=\"_blank\" rel=\"noreferrer noopener\">Timoth\u00e9e La Tulippe<\/a> Il examine ce qu\u2019il d\u00e9crit comme une \u201c \u00e9pid\u00e9mie invisible \u201d de vol de propri\u00e9t\u00e9 intellectuelle \u2014 et, surtout, pourquoi ceux qui s\u2019y essaient laissent presque toujours des traces.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-every-digital-action-triggers-a-forensic-reaction\"><strong>Chaque action num\u00e9rique d\u00e9clenche une r\u00e9action m\u00e9dico-l\u00e9gale<\/strong><strong><\/strong><\/h3>\n\n\n\n<p>LaTulippe introduit le concept de \u201c\u00a0traces num\u00e9riques\u00a0\u201d \u2014 les r\u00e9sidus num\u00e9riques laiss\u00e9s par chaque interaction avec un appareil ou un fichier. La surveillance informatique traditionnelle peut passer \u00e0 c\u00f4t\u00e9 d&#039;un simple t\u00e9l\u00e9chargement sur un compte Dropbox personnel. L&#039;analyse forensique, en revanche, va beaucoup plus loin.<strong><\/strong><\/p>\n\n\n\n<p>Gr\u00e2ce \u00e0 des artefacts tels que les fichiers LNK, les listes de saut, les Shellbags et les cl\u00e9s de registre, les enqu\u00eateurs peuvent reconstituer une chronologie pr\u00e9cise de ce qui a \u00e9t\u00e9 consult\u00e9, quand et d&#039;o\u00f9, m\u00eame si l&#039;appareil utilis\u00e9 pour d\u00e9placer les donn\u00e9es a disparu depuis longtemps.<strong><\/strong><\/p>\n\n\n\n<p>Les implications strat\u00e9giques pour les conseillers juridiques sont consid\u00e9rables. La question n&#039;est plus seulement\u2026 <em>quoi<\/em> a \u00e9t\u00e9 pris, mais <em>comment<\/em> \u2014 en \u00e9tablissant clairement les connaissances et les intentions de l\u2019employ\u00e9. Comme l\u2019illustre l\u2019affaire LaTulippe, si un employ\u00e9 recherche \u201c\u00a0comment effacer l\u2019historique de navigation\u00a0\u201d peu apr\u00e8s un t\u00e9l\u00e9chargement massif de donn\u00e9es clients, l\u2019argument de \u201c\u00a0l\u2019erreur innocente\u00a0\u201d devient tr\u00e8s difficile \u00e0 soutenir.<\/p>\n\n\n\n<p>Ces \u00e9l\u00e9ments syst\u00e8me Windows ne repr\u00e9sentent, selon lui, qu&#039;une goutte d&#039;eau dans l&#039;oc\u00e9an. Mais, associ\u00e9s aux informations fournies par les \u00e9quipes RH et juridiques, ils peuvent \u00e9clairer consid\u00e9rablement la situation et renforcer significativement le processus de r\u00e9clamation.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-what-s-coming-in-the-series\"><strong>Que nous r\u00e9serve la s\u00e9rie ?<\/strong><strong><\/strong><\/h3>\n\n\n\n<p>Cet article est le premier d&#039;une s\u00e9rie en plusieurs parties. Les prochains articles exploreront comment des \u00e9l\u00e9ments de preuve suppl\u00e9mentaires peuvent aider les enqu\u00eateurs \u00e0 d\u00e9celer les violations des clauses de non-concurrence post-licence (CNP), la cr\u00e9ation d&#039;entreprises concurrentes \u201c\u00a0occultes\u00a0\u201d et comment ces d\u00e9couvertes passent de l&#039;enqu\u00eate \u00e0 des preuves admissibles devant les tribunaux.<strong><\/strong><\/p>\n\n\n\n<p>Chez iDS, c&#039;est le travail que nous faisons au quotidien : aider les \u00e9quipes juridiques, les conseillers juridiques d&#039;entreprise et les enqu\u00eateurs \u00e0 exploiter les donn\u00e9es comme un avantage strat\u00e9gique, aussi bien au tribunal qu&#039;en dehors.<br><\/p>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\" style=\"margin-top:var(--wp--preset--spacing--20);margin-bottom:var(--wp--preset--spacing--60)\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link has-white-color has-text-color has-background has-link-color wp-element-button\" href=\"https:\/\/www.lexology.com\/library\/detail.aspx?g=f5558a87-bf55-4840-afc7-169b12a74f52\" style=\"background-color:#ee5d20\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Lisez l&#039;article complet sur Lexology<\/strong><\/a><\/div>\n<\/div>\n\n\n\n<p>Si votre organisation est confront\u00e9e \u00e0 des questions concernant les menaces internes ou le d\u00e9tournement de propri\u00e9t\u00e9 intellectuelle, consultez <a href=\"https:\/\/idsinc.com\/fr\/\" target=\"_blank\" rel=\"noreferrer noopener\">idsinc.com<\/a> pour programmer une conversation avec l&#039;un de nos experts.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<p><em><strong>iDS fournit des solutions de donn\u00e9es consultatives aux entreprises et aux cabinets d&#039;avocats du monde entier, leur donnant un avantage d\u00e9cisif, tant dans la salle d&#039;audience qu&#039;en dehors. Les experts en la mati\u00e8re et les strat\u00e8ges de donn\u00e9es d&#039;iDS se sp\u00e9cialisent dans la recherche de solutions \u00e0 des probl\u00e8mes de donn\u00e9es complexes, garantissant que les donn\u00e9es peuvent \u00eatre exploit\u00e9es comme un atout et non comme un handicap. Pour en savoir plus, visitez <a href=\"https:\/\/idsinc.com\/fr\/\" type=\"link\" id=\"https:\/\/idsinc.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">idsinc.com<\/a>.<\/strong><\/em><\/p>\n\n\n\n<p><em>Vous avez des difficult\u00e9s avec un terme technique utilis\u00e9 dans cet article\u00a0? Consultez notre\u2026&nbsp;<\/em><a href=\"https:\/\/idsinc.com\/fr\/glossaire\/\" target=\"_blank\" rel=\"noreferrer noopener\"><em>Glossaire des analystes de donn\u00e9es<\/em><\/a><em>&nbsp;d\u00e9crypter le code.&nbsp;<\/em><\/p>","protected":false},"excerpt":{"rendered":"<p>The most damaging corporate heists today don&#8217;t involve broken locks or midnight alarms. They involve a departing employee, a personal cloud account, and a few seconds of silence. Intellectual property \u201a AI proprietary code, pricing strategies, client lists, strategic roadmaps \u201a AI can walk out the door without a sound. But what many insider threats [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":9573,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[10,35],"tags":[],"class_list":["post-9572","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","category-ip","has-post-title","has-post-date","has-post-category","has-post-tag","has-post-comment","has-post-author",""],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.5 (Yoast SEO v27.5) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>When Intellectual Property Walks Out the Door, Data Stays Behind<\/title>\n<meta name=\"description\" content=\"The most damaging corporate heists today involves departing employees. Intellectual property data can walk out the door without a sound.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/idsinc.com\/fr\/donnees-sur-la-propriete-intellectuelle\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"When Intellectual Property Walks Out the Door, the Data Stays Behind\" \/>\n<meta property=\"og:description\" content=\"The most damaging corporate heists today involves departing employees. Intellectual property data can walk out the door without a sound.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/idsinc.com\/fr\/donnees-sur-la-propriete-intellectuelle\/\" \/>\n<meta property=\"og:site_name\" content=\"iDiscovery Solutions\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/iDiscovery-Solutions-110210573904472\" \/>\n<meta property=\"article:published_time\" content=\"2026-03-26T14:43:24+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-26T14:43:28+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/idsinc.com\/wp-content\/uploads\/2026\/03\/LEX-Part-1-Invisible-Heist-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"960\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"iDiscovery Solutions\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"iDiscovery Solutions\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/intellectual-property-data\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/intellectual-property-data\\\/\"},\"author\":{\"name\":\"iDiscovery Solutions\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/person\\\/bf7f03a502e8a54e558c44d0ff5d6736\"},\"headline\":\"When Intellectual Property Walks Out the Door, the Data Stays Behind\",\"datePublished\":\"2026-03-26T14:43:24+00:00\",\"dateModified\":\"2026-03-26T14:43:28+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/intellectual-property-data\\\/\"},\"wordCount\":471,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/intellectual-property-data\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/LEX-Part-1-Invisible-Heist-scaled.jpg\",\"articleSection\":[\"Blog\",\"IP + Trade Secrets + Employee Risk\"],\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/idsinc.com\\\/intellectual-property-data\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/intellectual-property-data\\\/\",\"url\":\"https:\\\/\\\/idsinc.com\\\/intellectual-property-data\\\/\",\"name\":\"When Intellectual Property Walks Out the Door, Data Stays Behind\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/intellectual-property-data\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/intellectual-property-data\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/LEX-Part-1-Invisible-Heist-scaled.jpg\",\"datePublished\":\"2026-03-26T14:43:24+00:00\",\"dateModified\":\"2026-03-26T14:43:28+00:00\",\"description\":\"The most damaging corporate heists today involves departing employees. Intellectual property data can walk out the door without a sound.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/intellectual-property-data\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/idsinc.com\\\/intellectual-property-data\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/intellectual-property-data\\\/#primaryimage\",\"url\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/LEX-Part-1-Invisible-Heist-scaled.jpg\",\"contentUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/LEX-Part-1-Invisible-Heist-scaled.jpg\",\"width\":1920,\"height\":960,\"caption\":\"The most damaging corporate heists today involves departing employees. Intellectual property data can walk out the door without a sound.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/intellectual-property-data\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/idsinc.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blog\",\"item\":\"https:\\\/\\\/idsinc.com\\\/de\\\/category\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"When Intellectual Property Walks Out the Door, the Data Stays Behind\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#website\",\"url\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/\",\"name\":\"iDiscovery Solutions\",\"description\":\"Use data to your advantage in the courtroom\",\"publisher\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#organization\"},\"alternateName\":\"iDS\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#organization\",\"name\":\"iDiscovery Solutions\",\"alternateName\":\"iDS\",\"url\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/iDS-Logo-3c-e1611176096212.png\",\"contentUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/iDS-Logo-3c-e1611176096212.png\",\"width\":100,\"height\":73,\"caption\":\"iDiscovery Solutions\"},\"image\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/iDiscovery-Solutions-110210573904472\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/idsinc\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCarv7o1MeYfCp0eZ1IrufIw\"],\"description\":\"iDS provides consultative data solutions to corporations and law firms around the world, giving them a decisive advantage \u2013 both in and out of the courtroom. iDS\u2019s subject matter experts and data strategists specialize in finding solutions to complex data problems, ensuring data can be leveraged as an asset, not a liability.\",\"email\":\"info@idsinc.com\",\"telephone\":\"+1.800.813.4832\",\"legalName\":\"iDiscovery Solutions\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/person\\\/bf7f03a502e8a54e558c44d0ff5d6736\",\"name\":\"iDiscovery Solutions\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6009d8a07526a79850b1d0045087bcee60e562f90891f19a42de7ee7f4452529?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6009d8a07526a79850b1d0045087bcee60e562f90891f19a42de7ee7f4452529?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6009d8a07526a79850b1d0045087bcee60e562f90891f19a42de7ee7f4452529?s=96&d=mm&r=g\",\"caption\":\"iDiscovery Solutions\"},\"url\":\"https:\\\/\\\/idsinc.com\\\/fr\\\/author\\\/idiscovery\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Quand la propri\u00e9t\u00e9 intellectuelle dispara\u00eet, les donn\u00e9es restent.","description":"Les vols d&#039;entreprise les plus dommageables aujourd&#039;hui concernent les employ\u00e9s qui quittent l&#039;entreprise. Les donn\u00e9es relatives \u00e0 la propri\u00e9t\u00e9 intellectuelle peuvent ainsi dispara\u00eetre sans laisser de traces.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/idsinc.com\/fr\/donnees-sur-la-propriete-intellectuelle\/","og_locale":"fr_FR","og_type":"article","og_title":"When Intellectual Property Walks Out the Door, the Data Stays Behind","og_description":"The most damaging corporate heists today involves departing employees. Intellectual property data can walk out the door without a sound.","og_url":"https:\/\/idsinc.com\/fr\/donnees-sur-la-propriete-intellectuelle\/","og_site_name":"iDiscovery Solutions","article_publisher":"https:\/\/www.facebook.com\/iDiscovery-Solutions-110210573904472","article_published_time":"2026-03-26T14:43:24+00:00","article_modified_time":"2026-03-26T14:43:28+00:00","og_image":[{"width":1920,"height":960,"url":"https:\/\/idsinc.com\/wp-content\/uploads\/2026\/03\/LEX-Part-1-Invisible-Heist-scaled.jpg","type":"image\/jpeg"}],"author":"iDiscovery Solutions","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"iDiscovery Solutions","Dur\u00e9e de lecture estim\u00e9e":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/idsinc.com\/intellectual-property-data\/#article","isPartOf":{"@id":"https:\/\/idsinc.com\/intellectual-property-data\/"},"author":{"name":"iDiscovery Solutions","@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/person\/bf7f03a502e8a54e558c44d0ff5d6736"},"headline":"When Intellectual Property Walks Out the Door, the Data Stays Behind","datePublished":"2026-03-26T14:43:24+00:00","dateModified":"2026-03-26T14:43:28+00:00","mainEntityOfPage":{"@id":"https:\/\/idsinc.com\/intellectual-property-data\/"},"wordCount":471,"commentCount":0,"publisher":{"@id":"https:\/\/idsinc.com\/en_gb\/#organization"},"image":{"@id":"https:\/\/idsinc.com\/intellectual-property-data\/#primaryimage"},"thumbnailUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2026\/03\/LEX-Part-1-Invisible-Heist-scaled.jpg","articleSection":["Blog","IP + Trade Secrets + Employee Risk"],"inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/idsinc.com\/intellectual-property-data\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/idsinc.com\/intellectual-property-data\/","url":"https:\/\/idsinc.com\/intellectual-property-data\/","name":"Quand la propri\u00e9t\u00e9 intellectuelle dispara\u00eet, les donn\u00e9es restent.","isPartOf":{"@id":"https:\/\/idsinc.com\/en_gb\/#website"},"primaryImageOfPage":{"@id":"https:\/\/idsinc.com\/intellectual-property-data\/#primaryimage"},"image":{"@id":"https:\/\/idsinc.com\/intellectual-property-data\/#primaryimage"},"thumbnailUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2026\/03\/LEX-Part-1-Invisible-Heist-scaled.jpg","datePublished":"2026-03-26T14:43:24+00:00","dateModified":"2026-03-26T14:43:28+00:00","description":"Les vols d&#039;entreprise les plus dommageables aujourd&#039;hui concernent les employ\u00e9s qui quittent l&#039;entreprise. Les donn\u00e9es relatives \u00e0 la propri\u00e9t\u00e9 intellectuelle peuvent ainsi dispara\u00eetre sans laisser de traces.","breadcrumb":{"@id":"https:\/\/idsinc.com\/intellectual-property-data\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/idsinc.com\/intellectual-property-data\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/idsinc.com\/intellectual-property-data\/#primaryimage","url":"https:\/\/idsinc.com\/wp-content\/uploads\/2026\/03\/LEX-Part-1-Invisible-Heist-scaled.jpg","contentUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2026\/03\/LEX-Part-1-Invisible-Heist-scaled.jpg","width":1920,"height":960,"caption":"The most damaging corporate heists today involves departing employees. Intellectual property data can walk out the door without a sound."},{"@type":"BreadcrumbList","@id":"https:\/\/idsinc.com\/intellectual-property-data\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/idsinc.com\/"},{"@type":"ListItem","position":2,"name":"Blog","item":"https:\/\/idsinc.com\/de\/category\/blog\/"},{"@type":"ListItem","position":3,"name":"When Intellectual Property Walks Out the Door, the Data Stays Behind"}]},{"@type":"WebSite","@id":"https:\/\/idsinc.com\/en_gb\/#website","url":"https:\/\/idsinc.com\/en_gb\/","name":"Solutions d&#039;iD\u00e9couverte","description":"Utilisez les donn\u00e9es \u00e0 votre avantage dans la salle d\u2019audience","publisher":{"@id":"https:\/\/idsinc.com\/en_gb\/#organization"},"alternateName":"iDS","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/idsinc.com\/en_gb\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/idsinc.com\/en_gb\/#organization","name":"Solutions d&#039;iD\u00e9couverte","alternateName":"iDS","url":"https:\/\/idsinc.com\/en_gb\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/logo\/image\/","url":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/iDS-Logo-3c-e1611176096212.png","contentUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/iDS-Logo-3c-e1611176096212.png","width":100,"height":73,"caption":"iDiscovery Solutions"},"image":{"@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/iDiscovery-Solutions-110210573904472","https:\/\/www.linkedin.com\/company\/idsinc","https:\/\/www.youtube.com\/channel\/UCarv7o1MeYfCp0eZ1IrufIw"],"description":"iDS fournit des solutions de donn\u00e9es consultatives aux entreprises et aux cabinets d&#039;avocats du monde entier, leur donnant un avantage d\u00e9cisif, tant \u00e0 l&#039;int\u00e9rieur qu&#039;\u00e0 l&#039;ext\u00e9rieur de la salle d&#039;audience. Les experts en la mati\u00e8re et les strat\u00e8ges en donn\u00e9es d&#039;iDS se sp\u00e9cialisent dans la recherche de solutions \u00e0 des probl\u00e8mes de donn\u00e9es complexes, garantissant que les donn\u00e9es peuvent \u00eatre exploit\u00e9es comme un atout et non comme un passif.","email":"info@idsinc.com","telephone":"+1.800.813.4832","legalName":"iDiscovery Solutions"},{"@type":"Person","@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/person\/bf7f03a502e8a54e558c44d0ff5d6736","name":"Solutions d&#039;iD\u00e9couverte","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/6009d8a07526a79850b1d0045087bcee60e562f90891f19a42de7ee7f4452529?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/6009d8a07526a79850b1d0045087bcee60e562f90891f19a42de7ee7f4452529?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/6009d8a07526a79850b1d0045087bcee60e562f90891f19a42de7ee7f4452529?s=96&d=mm&r=g","caption":"iDiscovery Solutions"},"url":"https:\/\/idsinc.com\/fr\/author\/idiscovery\/"}]}},"builder_content":"","_links":{"self":[{"href":"https:\/\/idsinc.com\/fr\/wp-json\/wp\/v2\/posts\/9572","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/idsinc.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/idsinc.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/idsinc.com\/fr\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/idsinc.com\/fr\/wp-json\/wp\/v2\/comments?post=9572"}],"version-history":[{"count":2,"href":"https:\/\/idsinc.com\/fr\/wp-json\/wp\/v2\/posts\/9572\/revisions"}],"predecessor-version":[{"id":9578,"href":"https:\/\/idsinc.com\/fr\/wp-json\/wp\/v2\/posts\/9572\/revisions\/9578"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/idsinc.com\/fr\/wp-json\/wp\/v2\/media\/9573"}],"wp:attachment":[{"href":"https:\/\/idsinc.com\/fr\/wp-json\/wp\/v2\/media?parent=9572"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/idsinc.com\/fr\/wp-json\/wp\/v2\/categories?post=9572"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/idsinc.com\/fr\/wp-json\/wp\/v2\/tags?post=9572"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}