Virtually any organization—large or small, technically sophisticated or not—can fall victim to illegal activities of rogue employees. These cases are not urban legend and often play out as a loss of intellectual property or proprietary data, followed by lengthy investigations and court proceedings. The result is millions of dollars spent on legal and investigation costs and major disruption to the organization.
As a computer forensics investigator, I examine evidence of employees stealing data, embezzling company funds, committing fraud and performing a wide range of other nefarious activities. In many of these cases, the employee attempts to cover their tracks using various methods such as deleting their Internet history. Recently, there has been an upward trend in users altering their computer prior to performing their intended actions. These alterations can be simple, such as the use of a web browser’s “private browsing” functionality. Alterations can also be quite complex, such as using a proxy server to mask Internet activity. In such cases, it may be even more costly to investigate these than instances when users attempt to cover up their actions only after they’re done.
This content has been archived. It is available through our partners, LexisNexis® and Bloomberg Law.
To view this content, please continue to their sites.
Not a Lexis Subscriber?
Subscribe Now
Not a Bloomberg Law Subscriber?
Subscribe Now
LexisNexis® and Bloomberg Law are third party online distributors of the broad collection of current and archived versions of ALM's legal news publications. LexisNexis® and Bloomberg Law customers are able to access and use ALM's content, including content from the National Law Journal, The American Lawyer, Legaltech News, The New York Law Journal, and Corporate Counsel, as well as other sources of legal information.
For questions call 1-877-256-2472 or contact us at [email protected]