Keyword and string searches may not always be effective in eDiscovery investigations. Our investigation had uncovered a case of corporate espionage, deceit and betrayal. They were even receiving money from clients as part of the services provided by their parallel business, which was initially started by means of a proprietor firm later on, the business was converted into private company.Īrmed with this evidence, the company initiated a lawsuit against the two custodians for the recovery of costs and profits from their parallel entity, as well as for the harassment of junior employees on their team. Not only that, but they took company data so that they could use it for their own company. When their revenue from the parallel business exceeded their current pay from our client, they planned to resign. We interviewed employees who received those documents and found out that they were pressured to work on the documents, even though they thought they were complete.ĭuring our interview with the custodians, they admitted to operating a parallel business while working for our client. Both custodians held 50% of the shares in the company, according to the company registry records. One of the reviewers initially marked the document as not relevant, but we took a closer look and found that the company was registered in a city within the same region as the custodians.ĭigging deeper, we found that one of the directors of the company was the daughter of one of the custodians, and the other director was the spouse of the other custodian. Upon further investigation, we discovered that the company was actually in the public domain. We identified some documents moving between the custodians and their direct reports that had the logo of another company. However, our third lead was the most surprising of all. Our second lead came from analysing the bank statements of the custodians, which had hits of customer names of our client. This change in strategy yielded our first lead when we discovered that certain proprietary documents were being moved to the personal email IDs of the custodians and their family members. We shifted our traditional approach and focused on two new approaches: targeting all files created, modified and shared on personal IDs during the six months prior to the resignation date, and performing one-to-one email communications between the custodians and their direct reports. Frustrated and exhausted, we decided to change our approach. However, after a week of sleepless nights, we were still no closer to uncovering any leads. Our initial approach involved preparing keywords and keyword strings based on their job profiles, the competitor's name and other relevant information. The management suspected that the employees were leaving to join a competitor in the same region and requested an eDiscovery review to determine the truth. But when a global research firm approached us to investigate the simultaneous resignation of two key employees in the latter half of 2020, we knew we had our work cut out for us. In the world of corporate espionage, uncovering the truth can be a daunting task.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |