Employee Deceptions:  Too Little Too Late

Employee Deceptions: Too Little Too Late

Protus3 conducts a wide variety of corporate investigations related to employee deception. Some of the more common issues involve harassment complaints or theft of data. Sometimes these issues appear while the employee is still with the company. In other cases, the employee deception does not come to light for weeks or months after they have left the company.

Even when an investigation becomes necessary, computer forensics and collecting data is often an afterthought. This can lead to serious legal problems as well as impede the investigation of employee deception.

Did an employee leave and start working with a competitor? Did they take any of your confidential information with them? It could be weeks or months before you become suspicious. Similarly, complaints of sexual harassment may not appear for quite some time after the employee has left. As a result, any data that could show whether or not these events occurred could be compromised or erased permanently by this time.

COMMON MISTAKES:

  • An employee used their personal device (phone, laptop, etc.) for business purposes, but no one removed company data from these devices before the end of employment.
  • A company allowed the used of web-based file sharing through Dropbox or Sharefile without oversight and controls.
  • The company reassigned or reset an employee’s computer after their departure.
  • An employee’s emails were deleted.

It is important for employers to be prepared if a situation with a departing employee becomes or is expected to become contentious. These situations can arise in various ways across every industry. One example would be an employee or group of employees who leave to work for a competitor or form their own company. Unhappy employees or those leaving involuntarily can also indicate a potential lawsuit for a company.

A key step when preparing for such situations is preserving the existing data. Not taking the proper steps can lead to the loss or deletion of critical data. First, a company’s IT department can assist with this process by preserving existing emails or securing the computer. If this is not possible, it is probably important to consult with an expert and have a forensic image of the computer collected and stored. Finally, remember to collect all company-issued devices prior to the employee’s departure.

Going back after the fact will surely result in lost data, especially if the employee is hoping to hide something.



Deb King

HR Practitioner and Risk Manager

5 年

Great article!!!!!! Employers really need to be more concerned with personal devices such as laptops, phones, and tablets. While I love and use Drop Box misuse can be killer.

回复

要查看或添加评论,请登录

Christine Peterson, CPP, ISP的更多文章

  • RISK ASSESSMENT TEAMS

    RISK ASSESSMENT TEAMS

    We’ve all heard the saying “necessity is the mother of invention” (or innovation). That is absolutely true today.

  • EFFECTIVE SECURITY REQUIRES THOUGHTFUL DECISIONS

    EFFECTIVE SECURITY REQUIRES THOUGHTFUL DECISIONS

    In her Editor’s Note published in the January/February 2020 Campus Safety magazine, Robin Hattersley reminds us all of…

  • WORKPLACE VIOLENCE AND CORONAVIRUS DISEASE

    WORKPLACE VIOLENCE AND CORONAVIRUS DISEASE

    We’re beginning to realize that coronavirus disease, COVID-19, will be an event burned into our minds and hearts for…

  • 5 WAYS COVID-19 AFFECTS WORKPLACE SECURITY

    5 WAYS COVID-19 AFFECTS WORKPLACE SECURITY

    As we make adjustments to flatten the curve and slow the spread of COVID-19, we’re changing our behaviors in the…

  • WORKPLACE VIOLENCE – WHAT YOU PERMIT, YOU PROMOTE

    WORKPLACE VIOLENCE – WHAT YOU PERMIT, YOU PROMOTE

    Why are we so surprised by workplace violence when we are willing to accept these unacceptable behaviors from our…

  • Six Costly Mistakes to Avoid When Fraud Is Suspected

    Six Costly Mistakes to Avoid When Fraud Is Suspected

    This article on costly fraud mistakes from Hughes Pittman & Gupton echoes a lot of what we’ve learned from clients over…

  • You've conducted a background check... now what?

    You've conducted a background check... now what?

    Hiring new employees is a vital component of any successful business. Every company collects some type of background…

  • PREVENTING WORKPLACE VIOLENCE WHEN TERMINATING AN EMPLOYEE

    PREVENTING WORKPLACE VIOLENCE WHEN TERMINATING AN EMPLOYEE

    Firing or laying someone off is one of the most stressful situations for a company. Typically, no one in management or…

    3 条评论
  • TRAINING TO RESPOND TO WORKPLACE VIOLENCE

    TRAINING TO RESPOND TO WORKPLACE VIOLENCE

    Today I want to discuss two things: Our bodies are created for preservation and survival – knowing how it might affect…

  • Wake Tech AEC Symposium

    Wake Tech AEC Symposium

    Protus3 attended the Wake Tech AEC Symposium. Jerry Blanchard, Dana Frentz, and Kevin McQuade represented Protus3.

社区洞察

其他会员也浏览了