Taking out confidential corporate information Investigation of operation logs related to the Unfair Competition Prevention Law

Project background/overview

Background of discovery:
Two years after former employee A changed jobs to a competitor, he became an in-house product.Manufacture of similar products without permissionIt was discovered that it was sold overseas.It was decided to conduct an in-house investigation.

Contents of in-house survey: 
When I checked the log of the PC used by A,Massive copies a few days before retirementHowever, due to the large amount of data, it was not possible to identify whether the operation was related to taking out information.

Results of in-house survey: 
In the court's view, it is necessary to identify the behavior of the person and the trade secret in order to identify the crime of taking out information, and the client's IT staff exceeds 100 million.A large number of recordsIt is difficult to accurately extract illegal copies / deletions from the information, andLack of third partyWas raised as a concern.

FRONTEO investigation

Guarantee of third party: 
In order to ensure third partyity, the work log itself is preserved on-site (client company) with evidence.

Supports large amounts of data: 
Build your own databaseAnd investigate a large amount of log data. (Investigating external HDD and USB)

Achievement

Copy about 30 data to a USB memory, delete the external HDD after disconnecting the network cable a few days later, and write and delete unrelated program files several times repeatedly for about 120 hours. That there isCheck the facts.

Introduction of similar cases

Digital forensic investigation of internal fraud in companies / Post-incident response
* Membership registration (free) is required to watch the video.