Follow Us

Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Cybersecurity Employment Law

Using Computer Forensics to Investigate Employee Data Theft

Departing employees have a sense of ownership over the data that they copy. Intellectual property commonly stolen includes customer lists, secret formulas, source code, strategy documents and other trade secrets. The information is often used against the organization when the former employee goes to work for a competitor or decides to start a new company.

X

Thank you for sharing!

Your article was successfully shared with the contacts you provided.

Over 25% of employees steal proprietary data when departing a company or organization. SeeEmployee Departure Creates Gaping Security Hole, Says New Data,” Biscom. To that end, our experience shows that departing employees have a sense of ownership over the data that they copy. Intellectual property commonly stolen includes customer lists, secret formulas, source code, strategy documents and other trade secrets. The information is often used against the organization when the former employee goes to work for a competitor or decides to start a new company.

To continue reading,
become a free ALM digital reader

Benefits include:

*May exclude premium content

Read These Next