America leads the world in information, and wealth in America is increasingly possessed by an emerging “information class.” This means that information workers who leave one company to join or start another can potentially present a threat to their former company by violating contractual covenants, civil statutes and even criminal laws by copying, deleting and/or destroying Company A’s valuable confidential information (CI). Since CI is usually sent from, received by and stored in computers, forensic examination of the digital devices used by the departing employee plays a central role in determining whether misconduct has occurred and proving it in court. In this month’s column, we will discuss the typical “triage” a departing employee’s work computer and other devices will undergo as part of the effort to assess whether that employee has improperly copied, deleted or destroyed CI.
Some Background and Assumptions
In the typical departing employee scenario, the former employer learns of the employee’s intent to depart when the employee announces his or her departure. The employer will then try to discern when the employee knew that he or she was going to leave and what the employee did thereafter regarding CI.
This content has been archived. It is available through our partners, LexisNexis® and Bloomberg Law.
To view this content, please continue to their sites.
Not a Lexis Subscriber?
Subscribe Now
Not a Bloomberg Law Subscriber?
Subscribe Now
LexisNexis® and Bloomberg Law are third party online distributors of the broad collection of current and archived versions of ALM's legal news publications. LexisNexis® and Bloomberg Law customers are able to access and use ALM's content, including content from the National Law Journal, The American Lawyer, Legaltech News, The New York Law Journal, and Corporate Counsel, as well as other sources of legal information.
For questions call 1-877-256-2472 or contact us at [email protected]