Case Studies

Proprietary Data Theft

Hacker at Computer

Forensic Investigations & Analysis

A regional law firm client represented a large medical staffing company recently selling its assets to a third-party entity. Amid the sale, several of the staffing company’s employees left and started a competing company. This resulted in a significant drop in the value of the assets to be sold while also violating agreed-upon covenants “not-to-compete.”
The law firm called Data Discovery on a Friday afternoon and asked us to collect and preserve various systems and devices at the medical staffing company over the weekend. We deployed our forensic analysts in a matter of hours to do the collection. The suspicion was that the employees who had left the medical staffing company had used proprietary information and had secret meetings on company time to develop their new company. The medical staffing company also believed that they planned to depart with many of the staffing company’s customers in direct violation of their employee agreements.
After preserving numerous laptops, desktops, BlackBerries, iPhones, other PDAs, and fax machines, Data Discovery proceeded with the investigation. We were able to identify relevant data that our client needed. Using effective forensic techniques and timelines, we could turn back the clock and paint a vivid picture of how the systems were used to compromise confidential information. We could document that proprietary information was used and that the employees had started a competing company using stolen information, time, and resources. The results of our investigation led to a settlement between the parties without any harm to our client.

Have a question about this project? Reach out!

Please enable JavaScript in your browser to complete this form.

It’s a self-appointed nickname, but it rings true. Our elite team approaches each project with precision, offering bespoke solutions that align with your objectives.

This will close in 0 seconds

Expect over-communication and real-time feedback, keeping you informed every step of the way.

This will close in 0 seconds

Leveraging AI and analytics for efficient review and quality control.

This will close in 0 seconds

With services in multiple languages and a dedicated review team in India, we handle international and multilingual projects effortlessly.

This will close in 0 seconds

Your data’s security is our top priority, with protocols that exceed industry standards.

This will close in 0 seconds

Purpose Legal has the capability to process thousands of documents across nearly every data type each hour. Our technology accelerates the production of ready-to-review files, enabling faster response times in critical review scenarios.

This will close in 0 seconds

Save significant manual administrative time with our automated redaction capabilities. Effortlessly redact personally identifiable information (PII) across multiple documents and spreadsheets with our bulk-redaction tools.

This will close in 0 seconds

Build accurate searches with confidence. Purpose Legal uses intuitive technology that supports highly detailed queries, offering accessible and clickable terms for efficient review.

This will close in 0 seconds

There is no project too large or too small. Purpose Legal creates customized workflows to perfectly suit our clients’ needs, ensuring they achieve their objectives with our comprehensive support.

This will close in 0 seconds

We believe in overcommunication to ensure you never face the unknown. Our reports provide data and insights, mapping out clear options and their implications for your business. With Purpose Legal, you’ll always know the status of your project and the impact of your decisions.

This will close in 0 seconds

Our dedicated team in India specializes in insurance defense matters. Our expertise also extends to supporting plaintiff firms in class action lawsuits. Our team boasts long-term loyalty and a broad language capability—including Mandarin, Japanese, and more—ensuring we meet global needs.

This will close in 0 seconds

Purpose Legal reviewers undergo extensive training on the specific issues and technologies of each project. Our real-time feedback and performance evaluations ensure a continuously improving team, ready to handle any challenge.

This will close in 0 seconds

Our review methodology is meticulous from start to finish, ensuring quality control through advanced analytics and AI processes. From project initiation to final quality checks, we implement a rigorous process to guarantee the highest standards of review quality.

This will close in 0 seconds

  • Monitoring and Enforcement: Vigilant monitoring and enforcement of applicable data protection laws and regulations.
  • Updates and Awareness: Regular updates to our Privacy Compliance Program and the promotion of workforce awareness of data protection risks and rights.

This will close in 0 seconds

  • Unauthorized Access Prevention: Implementation of controls to protect against unauthorized access to data, including internal controls for cyber threat detection.
  • Access Controls and Authentication: Strong access controls and multi-level user authentication are needed to ensure authorized access to data only.
  • Encryption and Secure Storage: Data encryption and secure, access-controlled data storage environments.

This will close in 0 seconds