It is critical to get out ahead of Intellectual Property (IP) theft problems. With Precision Discovery ERA, we will help you protect your most valuable assets.

Get the e-book
Uncovering Internal Intellectual Property Theft
×

era form
   
877-987-4545

Sign up now
to receive a free copy of the e-book
Uncovering Internal Intellectual Property Theft

era form
   



Uncovering Internal Intellectual Property Theft

and get a free copy of Uncovering Internal Intellectual Property Theft, Pete James’ new e-book that offers insights into the mind and behavior of employees who steal your IP — and then hand it to your competitors.

James offers a unique perspective on internal IP theft: that of the digital forensic examiner tasked with analyzing digital evidence (computers, mobile phones, network traffic) to find proof of malicious intent. It strives to answer the questions that surround every incident: the who, what, when, why and how.

If you’re an HR or IT professional, you’ll find helpful advice and specific recommendations for protecting your data and identifying high-risk employees.


Are you exposed?

Can your company afford this loss?

60% of departing employees admit to taking company data

66% of those employees say they did it to help them get a new job

In 70% of IP theft cases, the damage is more than $100,000

In 50% of cases, the damage is over $1 million


Know before they go

70% of Intellectual Property (IP) theft happens in the 30 days before an employee announces their resignation. And so it’s critical to get out ahead of this serious problem. Your vigilance will also send a clear message to employees that you take the theft of IP seriously. When employees know that you’re monitoring for this illegal activity, they’re less likely to try.


We can help

Precision Discovery Employee Risk Assessment (ERA) is a forensic analysis of an employee’s computer. It’s designed to detect when company files or other sensitive or proprietary information are accessed, deleted, copied or sent inappropriately.

Starting at just $750 per device, Precision ERA is an inexpensive way to protect your most valuable assets.

What do you get with Precision Discovery ERA?

File Access History

We analyze which documents the departing employee accessed and when they accessed them. We also identify which documents were deleted.

Cloud & USB Access

We identify recently connected USB devices and whether an individual uploaded data to cloud-based services such as iCloud, Dropbox or Google Drive.

Search History

We identify Google searches performed by the employee. This search history often provides indications of a larger data theft issue.

Pricing

Silver $750/DEVICE

Capture and preserve a forensic image of a single device.

Report information on file access and deletion history, cloud and USB access, and Google search history.

30-minute post-report consultation with a Forensic Examiner.


Gold $995/DEVICE

Silver Package plus storage for 1 year of preserved device.

Preserved data is saved for further investigation and legal hold.


Platinum $1,025/DEVICE

Gold Package plus forensic deletion of data from device for device recirculation.



Uncovering Internal Intellectual Property Theft

to learn more about Precision, and get a free copy of Uncovering Internal Intellectual Property Theft, Pete James’ new e-book that offers insights into the mind and behavior of employees who steal your IP — and then hand it to your competitors.

James offers a unique perspective on internal IP theft: that of the digital forensic examiner tasked with analyzing digital evidence (computers, mobile phones, network traffic) to find proof of malicious intent. It strives to answer the questions that surround every incident: the who, what, when, why and how.

If you’re an HR or IT professional, you’ll find helpful advice and specific recommendations for protecting your data and identifying high-risk employees.


Some examples of how a forensic analysis can help detect IP theft


Theft via a mobile phone

An employee in the healthcare industry left abruptly to work for a competitor. He turned in his company-issued smart phone, but had completed a reinstallation of the original software, which wiped all user data.

An initial forensic examination of the employee’s laptop computer didn’t expose any unusual activity. However, the employee had connected the phone to the laptop, which created a full backup of the phone. This backup contained communications clearly detailing the employee’s journey through multiple job interviews, requests by the new company for spreadsheets and documents, and a text between employees that the new company was very happy with the secrets from the current company.


Theft using a USB thumb drive

A startup technology company submitted a laptop of a former employee for a forensic examination. The analysis demonstrated that the user had accessed network locations containing data about projects the employee was not directly working on and copied the data to a USB “thumb” drive. The activity also occurred on the employee’s last day of employment, heightening suspicion.

Though the USB drive was no longer accessible, a timeline was developed showing when the thumb drive was inserted, when the network was accessed and which folders were viewed. Furthermore, folders with the same names as those on the network were accessed on the inserted thumb drive.