Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Security Enterprise Services

The Top 5 Considerations of IP and Trade Secret Theft Investigations

By Jim Scarazzo, Veeral Gosalia
December 13, 2011

 

The biggest threat to a company's intellectual property doesn't come from the outside; it comes from within. According to a recent study, the U.S. Chamber of Commerce estimates that 75% of employees steal from the workplace.[i] Sometimes intellectual property is not properly accounted for, such as when a salesperson exits the company and corporate does not perform a proper exit interview and associated procedures, or when the salesperson neglects to erase sensitive client data from his or her personal computer after leaving the company. Other situations are conducted with malice, such as when an employee downloads proprietary materials from internal databases and transmits them to a competitor. Perhaps the most serious and potentially threatening scenario is when a team of employees collude to steal trade secrets as they depart the organization to form a competing business.

Regardless of whether the theft is a mistake or deliberate, when a theft occurs, a company needs to protect itself and its valuable information before significant damage is done. To do this requires a thorough investigation of the company's data systems and, if possible, the hardware devices used by the likely suspects. These are sophisticated forensic investigations, often well beyond the capability of a company’s information technology or security staff.  Companies should consider an independent forensic investigation team that is versed in proper evidence collection procedures such that the investigation and following litigation, if needed, will not be compromised by tainted evidence due to faulty collection practices.

The following are five of the top considerations companies should take into account prior to initiating an IP theft investigation.

1. Modern Technology Benefits the Thieves: As technology has changed, so too have the methods of IP theft. A while ago, a perpetrator would have to steal an entire notebook or even a file cabinet from an office or building unnoticed. Today, USB drives and smartphones are becoming physically smaller while storage capacity is increasing at an extraordinarily fast rate. Additionally, with so much information stored electronically and in cloud environments, transmitting sensitive data from one location to another has become incredibly easy. This means there is a myriad of devices and transfer protocols that investigators may need to search to compose a picture of how the incident of theft occurred.

2. Modern Technology Can Also Benefit the Investigators: Some of the same advances in technology that aid criminals can also aid investigators in their attempt to piece together the crime. For example, files stored locally, such as Word and Excel documents, contain important metadata fields that investigators can rely on to help identify what material may have been taken.   Also, while the Windows operating system doesn’t by default maintain a log of what files have been copied externally, computer forensic examiners can analyze certain operating system artifacts to understand the events that transpired leading up to the potential copying of data.  For example, by examining the Microsoft Windows Registry, investigators may be able to learn when a USB drive was connected to the PC and the USB drive’s serial number.

3. Preservation Is Key to a Defensible Investigation: If a company suspects that it is the victim of IP theft, preserving the integrity of the potentially compromised files should be a priority since it could impact the company’s options for future action. This requires the technical skills of a computer forensics expert. Improperly accessing the files can inadvertently alter the metadata or hamper the ability to recover deleted files and result in spoliation of evidence. It is critical that companies only employ a trained professional to access the data using trusted forensics technology. For example, the forensics expert will properly preserve the original device and create a “working” copy of the device for investigation purposes. Bottom line, the original device is preserved and is not altered.

4. Conducting an Investigation Should Be a Business Decision: Conducting a forensics investigation on every outgoing employee's computer devices may not be practical. Instead, companies should assess the context of an employee's departure to determine whether launching a forensics investigation is a sound decision. For example, if an employee has only been at a company for two weeks and has had low-level access to internal information, he is probably not a significant threat. Then again, with poor information security and the proliferation of devices to download data, think WikiLeaks, a lot of damage can be done in days or even hours.  Certainly, whenever a senior member leaves or if several employees all exit at the same time, the cost of a forensics expert may far outweigh the cost of uncertainty.

5. Rely on an Expert Data Forensics Specialist: Because of the complexities that surround handling electronic data, it is critical that companies invest in skilled data forensics specialists for IP theft investigations. As mentioned earlier, the data forensics expert can forensically image relevant computer devices and preserve the integrity of associated metadata. Additionally, a specialist will have a general understanding of business computer systems, how they might be used and where data lives, which results in an expedited investigation process. If questions arise about the company's IT network, data forensics experts are trained to effectively  communicate with counsel, preparing affidavits, experts reports, and testifying to help the company pursue injunctions and court orders to stop the thief from using and exploiting the company’s stolen intellectual property.

KEYWORDS: data employee security investigations theft prevention

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

FTI Consulting
FTI Consulting

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Cyber tech background

    Security’s Top Cybersecurity Leaders 2026

    Security magazine’s Top Cybersecurity Leaders 2026 award...
    Top Cybersecurity Leaders
  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Cables plugged in

Chinese Supercomputer Allegedly Hacked, 10 Petabytes of Data Stolen

Man on laptop

Healthcare Executives Face a New Era of Personal Risk

Abstract shape

What Are Security Experts Saying About Claude Mythos and Project Glasswing?

Padlock with computer keys

Breach of FBI Surveillance System Considered a “Major Incident,” Security Experts Weigh In

AI

AI Startup Mercor, Which Works With Open AI and Anthropic, Confirms Data Breach

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

April 30, 2026

Building a Campus-Wide Culture of Security and Shared Responsibility

In today’s higher education environment, where institutions face evolving and multifaceted incidents, safety must be embedded into the fabric of campus culture. Learn strategies for generating collective buy-in from faculty, staff, students and senior leadership. 

May 7, 2026

Beyond Cameras: Revolutionizing Perimeter Security with LiDAR, AI and Digital Twins

In this webinar, we will explore how LiDAR‑based detection, AI‑powered analytics and digital twins are transforming the future of perimeter protection with 3D detection, real-time situational awareness and unified operational views.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Related Articles

  • retail-enews

    5 Ways to Leverage the Benefits of IP Video at Retail

    See More
  • Just Released, Administration Strategy on Mitigating Theft of U.S. Trade Secrets

    See More
  • Name tags

    5 IAM considerations and lessons learned in the insurance industry

    See More

Related Products

See More Products
  • security book.jpg

    Security Investigations: A Professional’s Guide

  • Risk Analysis and the Security Survey, 4th Edition

  • 150 things.jpg

    The Handbook for School Safety and Security

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing