From Revenue to Reputation: Are You Protected From Departing Employees?

From Revenue to Reputation: Are You Protected From Departing Employees? 850 400 Marketing Team
en flag
fr flag
de flag
pt flag
es flag

Recently one of your company’s most important employees resigned to pursue other interests. The resignation was a surprise, but the reasons shared for the resignation were sound and stated as non-competitive in nature. The exit interviews and out processing of the employee proceded without issue. However, several months later your company experienced a surprise drop in business from those clients who previously worked with the departing employee. And after investigation and discussions with those lost accounts, you learned that upon departure the former employee had not only downloaded all key customer lists and contracts, but also the sales and product plans for the coming year. Additionally, the employee actually went to work for a direct competitor, contrary to the reason for resignation shared. This scenario is a risk nightmare experienced by many companies that do not take the proper protective measures during employee transitions. A risk nightmare that can be reduced significantly with HaystackID’s Employer Protection Program

An Overview of HaystackID’s Employer Protection Program

HaystackID’s Forensics First Employer Protection Program helps employers proactively reduce the risk of computer-related theft, destruction, or misuse of digital access and assets resulting from intentional or inadvertent activities associated with the voluntary or involuntary separation of employees.

Departure Risks Warranting Employer Protection

As harsh as it sounds, every departing employee poses a risk to your business if the transition is not correctly managed and documented. This risk ranges from inadvertent access to sensitive company information as basic as company internal organizational charts to deliberate efforts to acquire and use economically essential customer lists and contracts for competitive advantage. Examples of risks may include:

+ Access to Regulated Data (PII)
+ Competitive Analysis Compromise
+ Intellectual Property Loss
+ Loss of Data Subject to Legal Hold
+ Proprietary Information Access
+ Trade Secret Misappropriation

With HaystackID’s Forensics First Employer Protection program, our expert certified forensics examiners can help you proactively protect your organization against access, theft, and destruction of digital assets by departing employees.

Forensics First Employer Protection Program

Designed to be implemented at the time an employer becomes aware of an impending employee-employer relationship change, the Forensics First Employer Protection Program consists of passive and active protocols that deliver computer forensics expertise, audit and investigation experience, and best-of-breed technology supported by forensically sound and defensible eDiscovery best practices.

The Employer Protection Program Departing Employee Evaluation (Passive Protocol)

Consisting of a six-point evaluation that provides context for the development of a customized protection plan for departing employees, the evaluation elements include:

+ Why is the employee departing?
+ Where is the employee going?
+ What company property must be surrendered upon departure?
+ What access to company systems must be terminated upon departure?
+ What potential degree of risk does management associate with the departure?
+ Has the employee been advised of confidentiality, non-solicitation, and non-compete obligations?

The Employer Protection Program Departing Employee Investigation (Active Protocol)

A six-step comprehensive and customized investigation that includes but is not limited to the following forensics and collection services:

+ Communication Device (Cell Phone) Imaging
+ Computing Device (Laptop/Desktop) Imaging
+ Device and Data Access Log Analysis
+ Device and Data Usage Analysis
+ Forensically-Sound Retention of Images
+ Comprehensive Reporting on Departing Employee Investigation

A package of six reports supporting the departing employee interview and investigation includes:

+ Complete File Listing: All active and deleted files from targeted devices.
+ Internet Activity: Listing of website visits, cookies, and downloads to targeted devices.
+ Recent Document Activity: Documents recently created, saved or downloaded to include full path and file type information.
+ System Analysis: Key systems information including external device access.
+ Keyword Seach: File listing and all active and recoverable deleted files that contain search hits for an employer-specified number of keywords.
+ File Extraction: An extraction of all active and recoverable deleted files of a single designated file type. Available file types include Word, Excel, PowerPoint, PDF, Standard Graphics, Video Files, Audio Files, Database Files, and Email Stores.

Delivered for a nominal flat fee based on your specific departing employee requirements, HaystackID’s Employer Protection Program provides employers with timely access to key information to help employers proactively understand the state of digital data on departing employee computing and communication devices.

Learn More

To learn more about HaystackID’s Forensics First Employer Protection Plan and how it can be used to reduce and remove computer-related access, theft, and destruction, request a discussion today.

 


Beyond the Employer Protection Program

Webcast: Defending IP and Trade Secrets: Shaping Positive Outcomes in eDiscovery (January 23, 2019, at 12:00 PM ET)

Join HaystackID computer forensics and eDiscovery experts John Wilson and Michael Sarlo as the share actionable approaches and best practices for counsel to consider as part of forensic collection, early case insight, and legal document review efforts during IP and trade secret matters.

Shared through the lens of an example matter based on an aggregate of actual experiences, this webcast will help legal teams as they seek to proactively shape positive eDiscovery outcomes.

Click here to register now for this educational webcast.

SOURCE: HaystackID

 

Request a Discussion or Demonstration