From Revenue to Reputation: Are You Protected From Departing Employees?From Revenue to Reputation: Are You Protected From Departing Employees? https://haystackid.com/wp-content/uploads/2018/12/Exit.jpg 850 400 Marketing Team Marketing Team https://secure.gravatar.com/avatar/7bc5ddf5babc93d26e80dd6831c719b9?s=96&d=wp_user_avatar&r=g
Recently one of your company’s most important employees resigned to pursue other interests. The resignation was a surprise, but the reasons shared for the resignation were sound and stated as non-competitive in nature. The exit interviews and out processing of the employee proceded without issue. However, several months later your company experienced a surprise drop in business from those clients who previously worked with the departing employee. And after investigation and discussions with those lost accounts, you learned that upon departure the former employee had not only downloaded all key customer lists and contracts, but also the sales and product plans for the coming year. Additionally, the employee actually went to work for a direct competitor, contrary to the reason for resignation shared. This scenario is a risk nightmare experienced by many companies that do not take the proper protective measures during employee transitions. A risk nightmare that can be reduced significantly with HaystackID’s Employer Protection Program
An Overview of HaystackID’s Employer Protection Program
HaystackID’s Forensics First Employer Protection Program helps employers proactively reduce the risk of computer-related theft, destruction, or misuse of digital access and assets resulting from intentional or inadvertent activities associated with the voluntary or involuntary separation of employees.
Departure Risks Warranting Employer Protection
As harsh as it sounds, every departing employee poses a risk to your business if the transition is not correctly managed and documented. This risk ranges from inadvertent access to sensitive company information as basic as company internal organizational charts to deliberate efforts to acquire and use economically essential customer lists and contracts for competitive advantage. Examples of risks may include:
+ Access to Regulated Data (PII)
+ Competitive Analysis Compromise
+ Intellectual Property Loss
+ Loss of Data Subject to Legal Hold
+ Proprietary Information Access
+ Trade Secret Misappropriation
With HaystackID’s Forensics First Employer Protection program, our expert certified forensics examiners can help you proactively protect your organization against access, theft, and destruction of digital assets by departing employees.
Forensics First Employer Protection Program
Designed to be implemented at the time an employer becomes aware of an impending employee-employer relationship change, the Forensics First Employer Protection Program consists of passive and active protocols that deliver computer forensics expertise, audit and investigation experience, and best-of-breed technology supported by forensically sound and defensible eDiscovery best practices.
The Employer Protection Program Departing Employee Evaluation (Passive Protocol)
Consisting of a six-point evaluation that provides context for the development of a customized protection plan for departing employees, the evaluation elements include:
+ Why is the employee departing?
+ Where is the employee going?
+ What company property must be surrendered upon departure?
+ What access to company systems must be terminated upon departure?
+ What potential degree of risk does management associate with the departure?
+ Has the employee been advised of confidentiality, non-solicitation, and non-compete obligations?
The Employer Protection Program Departing Employee Investigation (Active Protocol)
A six-step comprehensive and customized investigation that includes but is not limited to the following forensics and collection services:
+ Communication Device (Cell Phone) Imaging
+ Computing Device (Laptop/Desktop) Imaging
+ Device and Data Access Log Analysis
+ Device and Data Usage Analysis
+ Forensically-Sound Retention of Images
+ Comprehensive Reporting on Departing Employee Investigation
A package of six reports supporting the departing employee interview and investigation includes:
+ Complete File Listing: All active and deleted files from targeted devices.
+ Internet Activity: Listing of website visits, cookies, and downloads to targeted devices.
+ Recent Document Activity: Documents recently created, saved or downloaded to include full path and file type information.
+ System Analysis: Key systems information including external device access.
+ Keyword Seach: File listing and all active and recoverable deleted files that contain search hits for an employer-specified number of keywords.
+ File Extraction: An extraction of all active and recoverable deleted files of a single designated file type. Available file types include Word, Excel, PowerPoint, PDF, Standard Graphics, Video Files, Audio Files, Database Files, and Email Stores.
Delivered for a nominal flat fee based on your specific departing employee requirements, HaystackID’s Employer Protection Program provides employers with timely access to key information to help employers proactively understand the state of digital data on departing employee computing and communication devices.
To learn more about HaystackID’s Forensics First Employer Protection Plan and how it can be used to reduce and remove computer-related access, theft, and destruction, request a discussion today.
Beyond the Employer Protection Program
Webcast: Defending IP and Trade Secrets: Shaping Positive Outcomes in eDiscovery (January 23, 2019, at 12:00 PM ET)
Join HaystackID computer forensics and eDiscovery experts John Wilson and Michael Sarlo as the share actionable approaches and best practices for counsel to consider as part of forensic collection, early case insight, and legal document review efforts during IP and trade secret matters.
Shared through the lens of an example matter based on an aggregate of actual experiences, this webcast will help legal teams as they seek to proactively shape positive eDiscovery outcomes.
Marketing TeamAll stories by: Marketing Team
You might also like
HaystackID Acquires eDiscovery Managed Services Provider eTERAHaystackID Acquires eDiscovery Managed Services Provider eTERA https://haystackid.com/wp-content/uploads/2019/01/HaystackID-Needle.jpg 850 400 Marketing Team Marketing Team https://secure.gravatar.com/avatar/7bc5ddf5babc93d26e80dd6831c719b9?s=96&d=wp_user_avatar&r=g
A Quick Look in the Rear View Mirror: HaystackID Recognition in ALM “Best Of” SurveysA Quick Look in the Rear View Mirror: HaystackID Recognition in ALM “Best Of” Surveys https://haystackid.com/wp-content/uploads/2018/12/Rearview-Haystack.jpg 850 400 Marketing Team Marketing Team https://secure.gravatar.com/avatar/7bc5ddf5babc93d26e80dd6831c719b9?s=96&d=wp_user_avatar&r=g
Shaping Outcomes with eDiscovery: A Complex Defense of Intellectual PropertyShaping Outcomes with eDiscovery: A Complex Defense of Intellectual Property https://haystackid.com/wp-content/uploads/2018/12/Manufacturing-1.jpg 850 400 Marketing Team Marketing Team https://secure.gravatar.com/avatar/7bc5ddf5babc93d26e80dd6831c719b9?s=96&d=wp_user_avatar&r=g