Make sure only the person leaves...
Our Electronic Exit Interview program consists of a comprehensive digital evaluation of all exiting employees. This unique program has been designed to protect client company interests against the misappropriation, or theft of:
- Intellectual Property (plans, patients, recopies, formulas, trade secrets, trade information)
- Vendor Information (key contacts, contract terms, rates, expiration dates)
- Employee Lists (names, addresses, social security numbers)
- Embezzlement of Money or Plans
- Credit Card Cloning or Theft
- Identity Theft
- Software Piracy
This groundbreaking program was designed for use with all exiting staff members, whether their departure is a result of a dismissal or is voluntary. It is an efficient and cost-effective way to help clients protect their business assets against loss and infringement. Global Digital Forensics can identify any violations early in the process so that you will be able to take appropriate action.
As a part of the Electronic Exit Interview, Global Digital Forensics will conduct an investigation using only forensically-sound methods. We will create an image of the employee’s hard drive and extract the e-mails, documents, chats etc. from the image and generate a report for you based on your concerns. Our forensic report will contain a Drive Content Table, Search Results, and a Process and Conclusions Analogy. Our process is guaranteed to preserve the chain of custody required for a sound computer forensic examination.
High-Quality Results, Shortest Time Frame Possible
Quality assurance is of utmost concern in all of our investigations. Our experts understand the essence of time and we are able to turn around each investigation within 5 days or less from the receipt of the hard drive. Each investigation is conducted by a Certified Computer Forensic Investigator and requires between 6 to 8 man hours including bench time, investigation time, reporting and analysis.
GDF’s analysis and investigation work is performed using only the highest level of forensic scrutiny. We follow known forensic procedures and use only open and verifiable programming techniques. Our methodologies are transparent; in fact, we encourage the court and opposing sides to dissect our work, because we stand behind its admissibility 100%. We use no proprietary or “secret” methods or programs when doing our analysis. Instead, we use our programming skills to build tools and software specifically for the task at hand.
Timing is everything when it comes to performing an electronic exit interview for a departing employee, so don’t wait until your sensitive company data is already out the door, contact Global Digital Forensics today.