This site uses cookies to provide you with a more responsive and personalised service. By using this site you agree to our use of cookies. Please read our cookie notice for more information on the cookies we use and how to delete or block them.

Bookmark Email Print page

Theft of confidential information

Theft of confidential informationAn employee is leaving and you’ve heard he is going to work for the competition or is setting up his own business to become the competition.

You’ve worked for years to build up your business and can’t risk your competitors obtaining your valuable confidential information from this employee. A survey run by the Ponemon Institute showed that almost 60% of exiting staff admitted to taking confidential company information with them when they left.

Confidential information stolen often includes customer lists, designs, strategy documents and financial information. This information is often stolen electronically using email, portable hard-drives, USB thumb drives and other devices. These include innocent looking devices such as digital cameras, cell phones or iPods, all of which can hold large amounts of data.

Experience counts

You have a hunch your competitor may have unfairly obtained your confidential information. In order to take action to protect your business, you need robust evidence. You benefit from using our experience – we know where to look to find evidence of the offending and we have given evidence in Court on many occasions. We will provide the robust evidence you require.

We can help you:
  • Determine if your confidential information has been stolen. A Deloitte ‘Green Light’ check provides information about user activity on the computer system, and can be very useful in identifying what an employee has been doing with your confidential information. The ‘Green Light’ check is particularly useful if senior staff or others with access to confidential information are leaving to join a competitor or setup a competing business;
  • Reduce the risk of confidential information being stolen;
  • Quantify the financial loss suffered as a result.

Dig deeper

  • Metadata - What is it and how is it important?
    Forensic Focus – December 2009
  • USB device security - How secure is your data
    Forensic Focus – September 2009
  • Password recovery
    Forensic Focus – September 2008
  • Data in the wrong hands
    Forensic Focus – December 2008

Talk to the team

  • Barry Jordan
    National Leader - Recovery and Forensics Partner
  • ExternalURL
    Jason Weir
    Associate Director - Auckland
  • ExternalURL
    Lorinda Kelly
    Associate Director - Wellington
Stay connected:
Get connected
Share your comments


More on Deloitte
Learn about our site