When Key Employees Quit: 5 Things You Must Do to Keep Control of Critical Data
Organizations today rely heavily upon technology and electronically stored information—and when employees leave, there's always a risk that they'll take some information or data with them when they go, either inadvertently or on purpose.
June 25, 2019 at 07:00 AM
8 minute read
|
Losing a key employee is never easy—they often take with them institutional knowledge, great internal and external relationships, and critical skill sets. Some even may leave behind a leadership vacuum or rupture a team's cohesion. All this is difficult enough, but if they take confidential information with them, it becomes a more pressing challenge. Organizations today rely heavily upon technology and electronically stored information (ESI)—and when employees leave, there's always a risk that they'll take some information or data with them when they go, either inadvertently or on purpose.
This poses organizational risks in terms of data privacy and security, intellectual property and competitive positioning, so it's important for legal and compliance teams to identify risks associated with departing employees, and to adopt policies to safeguard valuable information.
|Modern Work Practices
As companies embrace new technologies and adopt modern business practices, such as Slack, OneDrive, SharePoint, Microsoft Teams, and so forth, information is duplicated, replicated, and more and more accessible to a broader range of employees via many devices from desktop to mobile to cloud.
With the rise of bring your own device (BYOD) policies, it's not unusual for staff to use a mix of company laptops, personal smartphones and any number of handheld devices to access email, voicemail, documents and data—and employees often have remote access to company servers.
These technologies have increased productivity and reduced friction in employees' lives. However, this new way of working can considerably increase the risk of employees walking away with sensitive data, even inadvertently. Without proper procedures, it is remarkably simple for staff to remove critical company data without immediate detection. Multiple devices, both personal and business, make this more difficult: It can be harder to prove access, thus making it harder to take remedial, disciplinary or legal action.
It may seem paranoid, but securing data when employees leave, even amicably, is one of the best things an organization can do to protect its data. The stakes are high: Many organizations' greatest assets are their employees, and their knowledge is incredibly valuable. And, most employees have access to a veritable mountain of competitive information—company assets that exiting staff could be tempted to remove prior to moving on to, say, start their own businesses or work for competitors.
This information could include client lists and contact information, proprietary pricing information, strategic plans, or proprietary product roadmaps: All assets no company wants to share with its competitors. Yet because of the ease of storing, transferring and finding this information, it is now potentially more accessible than ever to a wider circle of employees and future ex-employees. To reduce the risk of misuse, savvy organizations must adopt a strategic approach to safeguarding confidential information.
|Reducing Exiting Employee Data Theft: Top Five Tips
1. Assess the risk: No company can evaluate risk if it doesn't understand the location and use cases for the tools and technology its staff uses. Ensure that you understand:
- What the tools and technology can do;
- How much information they can retain;
- How and where this information is stored;
- Who has access to what categories of information, and why;
- How the information can be transferred to other devices; and
- What safeguards are currently in place, and available but not being fully or properly utilized.
2. Collaborate with the internal IT team and external providers: Your IT and compliance teams will have much of the information required to make this assessment. They may even have a data map listing company asset assignments, information storage structures, role-based access controls, and more. An external specialist may be helpful to evaluate the information landscape and implement a security strategy.
3. Devise a policy: After completing a thorough risk assessment, formulate and distribute to all staff a clearly-worded company policy on the use of technology, information and tools. This policy should include, at a minimum:
- A list of the technology available to staff, setting out which employee categories are authorized to use which tools, and detailing those employees empowered to authorize upgrades/modifications to company-owned devices.
- A list of the types of instances in which transferring company or confidential information from organizational servers and portable devices to personal/third-party devices is permitted and listing chain-of-command for approving such transactions.
- Details about the company's policy on appropriate use of confidential information and outlines of what actions employees may be subject to should they violate that policy, up to and including disciplinary action, termination, and civil or criminal prosecution.
- Explanation of the company's monitoring strategy as a deterrent against wrongdoing.
- Access restrictions around certain activities. Common prohibitions include blocking Web-based email like Gmail, Hotmail, Yahoo, etc.
4. Policy Administration: A policy is nothing if not well-enforced. Appoint a team whose task it will be to:
- Administer the policy;
- Monitor abuse;
- Keep abreast of technological developments and their implications for the policy; and
- Implement change as technology evolves.
5. Defend Against IP and Data Theft with a Departing Employee Program: Implement a consistent, thorough departing employee program designed to investigate departing employees and defend against data theft:
- Preservation: Preserve and collect the departing employee's data assets (phone, computer, flash drives, etc.) using forensically sound methodologies to protect the state of the data.
- Investigation: There are common means for an employee to exfiltrate data prior to their departure. An effective departing employee program will unmask these exit points:
- Email Analysis: The most common method for data exfiltration is through email. An employee may email files to their new employer or to their personal email account then cover their tracks by deleting those email communications. An effective email analysis should thoroughly review both deleted and non-deleted emails.
- USB Analysis: When an employee steals large amounts of data, they will often use an external flash or hard drive. A USB Analysis will reveal USB mass storage devices and often uncover mass exfiltration.
- Deletion Analysis: Employees may destroy data upon their departure by deleting files and folders. Through the use of specialized digital forensic software, these may be recovered.
- File Activity Reports: The best way to learn what the departing employee was doing is to evaluate file activity through LNK File, JumpList and other hidden system databases located on their recovered computer or mobile device. This analysis can reveal access to sensitive IP.
- Internet History Analysis: Analysis of internet usage may reveal proof of evidence spoliation, data tampering, or even nefarious behavior. Internet history can show Google searches such as, “How to copy contacts from Outlook,” or “How to permanently delete an email from Outlook.”
- Anti-Forensic Analysis: When someone has stolen IP they may try to cover their tracks by using anti-forensic software like BleachBit or CCleaner. These tools always leave traces behind which can be uncovered and used to show intent.
Post-Mortem: Getting Smart After the Event
The best-laid plans may still not guarantee 100% compliance, and ne'er-do-well ex-employees may still succeed in removing confidential information. If a breach is discovered, companies with may resort to legal action.
However, it can be difficult to take action against former employees if the company failed to retain the exiting employee's data. Without careful, professional preservation and management of the data, it will not remain useful for long. Data is volatile, especially metadata (the invisible record of who has created, amended, and read a document), and can be damaged by being copied or backed up in the wrong way, permanently eroding its evidentiary value.
Without a comprehensive set of policies and procedures for handling exiting employees, it may not become apparent that confidential data has been stolen or misused until days, weeks, or months after an employee has left. If the data the employee stole is wiped, reassigned, or otherwise lost due to incorrect or incomplete data and equipment policies, the evidence may be lost, making it much harder to even assess the extent of the damage, let alone seek compensation, remedial action, or pursue litigation.
Technology has both made our lives easier and far more complex—no one would wish for data to be harder to transfer or share. However, sensitive data should be protected from potential bad actors.
With careful planning and vigilantly enforced policies and procedures, organizations can manage the risks, ensure that their confidential information is protected, and competitive advantages are not lost when key employees depart.
Michael Ciaramitaro has 16 years of experience in digital forensic collections and computer investigations helping law firms and corporations navigate through tough, complex data infrastructure, including in matters involving trade secret, intellectual property theft, exiting employee investigations and other employee-related legal matters. Ciaramitaro is the director of US digital forensics for Inventus. Reach him at [email protected].
Sarah Brown is a legal technology thought leader with more than a decade of experience in the eDiscovery and information management fields. She is an expert on the intersection of technology and the law, with a specific focus on electronic discovery, document review, forensics and investigations, technology-assisted review, and eDiscovery managed services. She has a deep journalism background and holds a bachelor's degree in journalism and a master's degree from Columbia University. Brown is the director of marketing for Inventus. Reach her at [email protected] or follow her on Twitter @eDiscoverySarah.
This content has been archived. It is available through our partners, LexisNexis® and Bloomberg Law.
To view this content, please continue to their sites.
Not a Lexis Subscriber?
Subscribe Now
Not a Bloomberg Law Subscriber?
Subscribe Now
NOT FOR REPRINT
© 2024 ALM Global, LLC, All Rights Reserved. Request academic re-use from www.copyright.com. All other uses, submit a request to [email protected]. For more information visit Asset & Logo Licensing.
You Might Like
View AllTrending Stories
- 1Gibson Dunn Sued By Crypto Client After Lateral Hire Causes Conflict of Interest
- 2Trump's Solicitor General Expected to 'Flip' Prelogar's Positions at Supreme Court
- 3Pharmacy Lawyers See Promise in NY Regulator's Curbs on PBM Industry
- 4Outgoing USPTO Director Kathi Vidal: ‘We All Want the Country to Be in a Better Place’
- 5Supreme Court Will Review Constitutionality Of FCC's Universal Service Fund
Who Got The Work
Michael G. Bongiorno, Andrew Scott Dulberg and Elizabeth E. Driscoll from Wilmer Cutler Pickering Hale and Dorr have stepped in to represent Symbotic Inc., an A.I.-enabled technology platform that focuses on increasing supply chain efficiency, and other defendants in a pending shareholder derivative lawsuit. The case, filed Oct. 2 in Massachusetts District Court by the Brown Law Firm on behalf of Stephen Austen, accuses certain officers and directors of misleading investors in regard to Symbotic's potential for margin growth by failing to disclose that the company was not equipped to timely deploy its systems or manage expenses through project delays. The case, assigned to U.S. District Judge Nathaniel M. Gorton, is 1:24-cv-12522, Austen v. Cohen et al.
Who Got The Work
Edmund Polubinski and Marie Killmond of Davis Polk & Wardwell have entered appearances for data platform software development company MongoDB and other defendants in a pending shareholder derivative lawsuit. The action, filed Oct. 7 in New York Southern District Court by the Brown Law Firm, accuses the company's directors and/or officers of falsely expressing confidence in the company’s restructuring of its sales incentive plan and downplaying the severity of decreases in its upfront commitments. The case is 1:24-cv-07594, Roy v. Ittycheria et al.
Who Got The Work
Amy O. Bruchs and Kurt F. Ellison of Michael Best & Friedrich have entered appearances for Epic Systems Corp. in a pending employment discrimination lawsuit. The suit was filed Sept. 7 in Wisconsin Western District Court by Levine Eisberner LLC and Siri & Glimstad on behalf of a project manager who claims that he was wrongfully terminated after applying for a religious exemption to the defendant's COVID-19 vaccine mandate. The case, assigned to U.S. Magistrate Judge Anita Marie Boor, is 3:24-cv-00630, Secker, Nathan v. Epic Systems Corporation.
Who Got The Work
David X. Sullivan, Thomas J. Finn and Gregory A. Hall from McCarter & English have entered appearances for Sunrun Installation Services in a pending civil rights lawsuit. The complaint was filed Sept. 4 in Connecticut District Court by attorney Robert M. Berke on behalf of former employee George Edward Steins, who was arrested and charged with employing an unregistered home improvement salesperson. The complaint alleges that had Sunrun informed the Connecticut Department of Consumer Protection that the plaintiff's employment had ended in 2017 and that he no longer held Sunrun's home improvement contractor license, he would not have been hit with charges, which were dismissed in May 2024. The case, assigned to U.S. District Judge Jeffrey A. Meyer, is 3:24-cv-01423, Steins v. Sunrun, Inc. et al.
Who Got The Work
Greenberg Traurig shareholder Joshua L. Raskin has entered an appearance for boohoo.com UK Ltd. in a pending patent infringement lawsuit. The suit, filed Sept. 3 in Texas Eastern District Court by Rozier Hardt McDonough on behalf of Alto Dynamics, asserts five patents related to an online shopping platform. The case, assigned to U.S. District Judge Rodney Gilstrap, is 2:24-cv-00719, Alto Dynamics, LLC v. boohoo.com UK Limited.
Featured Firms
Law Offices of Gary Martin Hays & Associates, P.C.
(470) 294-1674
Law Offices of Mark E. Salomone
(857) 444-6468
Smith & Hassler
(713) 739-1250