Using Computer Forensics to Investigate Employee Data Theft

When suspicions of employee data theft arise, it is important to engage a computer forensics expert to perform a theft-of-IP analysis in order to preserve electronic data and uncover important evidence.

   | 2 Comments

When suspicions of employee data theft arise, it is important to engage a computer forensics expert to perform a theft-of-IP analysis in order to preserve electronic data and uncover important evidence.

This content has been archived. It is available exclusively through our partner LexisNexis®.

To view this content, please continue to Lexis Advance®.

Continue to Lexis Advance®

Not a Lexis Advance® Subscriber? Subscribe Now

Why am I seeing this?

LexisNexis® is now the exclusive third party online distributor of the broad collection of current and archived versions of ALM's legal news publications. LexisNexis® customers will be able to access and use ALM's content by subscribing to the LexisNexis® services via Lexis Advance®. This includes content from the National Law Journal®, The American Lawyer®, Law Technology News®, The New York Law Journal® and Corporate Counsel®, as well as ALM's other newspapers, directories, legal treatises, published and unpublished court opinions, and other sources of legal information.

ALM's content plays a significant role in your work and research, and now through this alliance LexisNexis® will bring you access to an even more comprehensive collection of legal content.

For questions call 1-877-256-2472 or contact us at customercare@alm.com

What's being said

  • Ed Goings

    Exactly what KPMG‘s new tool KDR does. The details are in the Artifacts. kpmg.us/kpmg-cyber/cyber-response.html

  • Vertigrate

    Good primer, but I would have expected at least a mention of the journal file and registry. We often prove the case with those artifacts regardless whether the stolen material is still on the disk (actual or deleted) or if it has been wiped. For those firms wanting to be proactive, there‘s a great deal of value in properly tuning file object access auditing.

Comments are not moderated. To report offensive comments, click here.

Preparing comment abuse report for Article #1202783304624

Thank you!

This article's comments will be reviewed.