Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Security Enterprise Services

The Top 5 Considerations of IP and Trade Secret Theft Investigations

By Jim Scarazzo, Veeral Gosalia
Generic Image for Enterprise Services
December 13, 2011

 

The biggest threat to a company's intellectual property doesn't come from the outside; it comes from within. According to a recent study, the U.S. Chamber of Commerce estimates that 75% of employees steal from the workplace.[i] Sometimes intellectual property is not properly accounted for, such as when a salesperson exits the company and corporate does not perform a proper exit interview and associated procedures, or when the salesperson neglects to erase sensitive client data from his or her personal computer after leaving the company. Other situations are conducted with malice, such as when an employee downloads proprietary materials from internal databases and transmits them to a competitor. Perhaps the most serious and potentially threatening scenario is when a team of employees collude to steal trade secrets as they depart the organization to form a competing business.

Regardless of whether the theft is a mistake or deliberate, when a theft occurs, a company needs to protect itself and its valuable information before significant damage is done. To do this requires a thorough investigation of the company's data systems and, if possible, the hardware devices used by the likely suspects. These are sophisticated forensic investigations, often well beyond the capability of a company’s information technology or security staff.  Companies should consider an independent forensic investigation team that is versed in proper evidence collection procedures such that the investigation and following litigation, if needed, will not be compromised by tainted evidence due to faulty collection practices.

The following are five of the top considerations companies should take into account prior to initiating an IP theft investigation.

1. Modern Technology Benefits the Thieves: As technology has changed, so too have the methods of IP theft. A while ago, a perpetrator would have to steal an entire notebook or even a file cabinet from an office or building unnoticed. Today, USB drives and smartphones are becoming physically smaller while storage capacity is increasing at an extraordinarily fast rate. Additionally, with so much information stored electronically and in cloud environments, transmitting sensitive data from one location to another has become incredibly easy. This means there is a myriad of devices and transfer protocols that investigators may need to search to compose a picture of how the incident of theft occurred.

2. Modern Technology Can Also Benefit the Investigators: Some of the same advances in technology that aid criminals can also aid investigators in their attempt to piece together the crime. For example, files stored locally, such as Word and Excel documents, contain important metadata fields that investigators can rely on to help identify what material may have been taken.   Also, while the Windows operating system doesn’t by default maintain a log of what files have been copied externally, computer forensic examiners can analyze certain operating system artifacts to understand the events that transpired leading up to the potential copying of data.  For example, by examining the Microsoft Windows Registry, investigators may be able to learn when a USB drive was connected to the PC and the USB drive’s serial number.

3. Preservation Is Key to a Defensible Investigation: If a company suspects that it is the victim of IP theft, preserving the integrity of the potentially compromised files should be a priority since it could impact the company’s options for future action. This requires the technical skills of a computer forensics expert. Improperly accessing the files can inadvertently alter the metadata or hamper the ability to recover deleted files and result in spoliation of evidence. It is critical that companies only employ a trained professional to access the data using trusted forensics technology. For example, the forensics expert will properly preserve the original device and create a “working” copy of the device for investigation purposes. Bottom line, the original device is preserved and is not altered.

4. Conducting an Investigation Should Be a Business Decision: Conducting a forensics investigation on every outgoing employee's computer devices may not be practical. Instead, companies should assess the context of an employee's departure to determine whether launching a forensics investigation is a sound decision. For example, if an employee has only been at a company for two weeks and has had low-level access to internal information, he is probably not a significant threat. Then again, with poor information security and the proliferation of devices to download data, think WikiLeaks, a lot of damage can be done in days or even hours.  Certainly, whenever a senior member leaves or if several employees all exit at the same time, the cost of a forensics expert may far outweigh the cost of uncertainty.

5. Rely on an Expert Data Forensics Specialist: Because of the complexities that surround handling electronic data, it is critical that companies invest in skilled data forensics specialists for IP theft investigations. As mentioned earlier, the data forensics expert can forensically image relevant computer devices and preserve the integrity of associated metadata. Additionally, a specialist will have a general understanding of business computer systems, how they might be used and where data lives, which results in an expedited investigation process. If questions arise about the company's IT network, data forensics experts are trained to effectively  communicate with counsel, preparing affidavits, experts reports, and testifying to help the company pursue injunctions and court orders to stop the thief from using and exploiting the company’s stolen intellectual property.

KEYWORDS: data employee security investigations theft prevention

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

FTI Consulting
FTI Consulting

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Top Cybersecurity Leaders
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Columns
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Coding

AI Emerges as the Top Concern for Security Leaders

Half open laptop

“Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

Shopping mall

Victoria’s Secret Security Incident Shuts Down Website

Laptop with coding on ground

Stepping Into the Light: Why CISOs Are Replacing Black-Box Security With Open-Source XDR

Gift cards and credit cards

Why Are Cyberattacks Targeting Retail? Experts Share Their Thoughts

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

July 17, 2025

Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

From animal habitats to bustling crowds of visitors, a zoo is a one-of-a-kind environment for deploying modern security technologies.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • retail-enews

    5 Ways to Leverage the Benefits of IP Video at Retail

    See More
  • 5mw Heywood

    5 minutes with Nick Heywood - Security considerations for the hybrid workplace

    See More
  • first responder firefighter

    Top 3 considerations of public sector crisis management communication tools

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing