13
Sep
Imagine that your company has just commenced an internal compliance investigation in response to an allegation that the company is violating various federal laws. The next day, a longtime employee with access to the company’s crucial trade secrets is seen removing duffle bags of documents. Moreover, the IT department examines his network activity and reports that he has downloaded thousands of documents onto a thumb drive.
Shortly thereafter, an attorney for the employee contacts your litigation department and states that...