It’s never easy when an employee leaves. One of the most difficult challenges is determining whether or not company information has walked out the door with that employee.Companies face this challenge every day.
RVM experience has shown that there is a cost-effective way to address these common problems without the burden of a full forensic analysis.
The RVM Tracer™ can be used as part of your exit interview strategy or as a tool to determine whether or not company documents have left with an employee. The RVM Tracer will enable you to quickly assess any situation in a cost-effective manner.
An employee leaves your company and you suspect that he/she may have walked out with a client contact list to bring to a competitor. Before launching a potentially costly forensic investigation, you can use the RVM Tracer™ to review key data from that employee’s computer.
A review of the RVM Tracer reports finds that the employee accessed the client contact list in question on more than one occasion and used a cloud-based storage application. This provides enough information to warrant further investigation.
The Good News
It’s not always bad news. Reports often reveal that there is no need for further investigation, saving you thousands of dollars. The even better news is that the RVM Tracer™ is an easy-to-use, cost-effective way to find out.
Created Documents Report
Review a complete list of documents created and saved in locations like:
• A computer desktop
• Cloud-based folders
• External drives
Link and Access File Reports
Review key data that is created when an employee accesses any file from:
• A computer
• Network file servers
• External drives
USB History and Drive Access Information Reports
Review network drive access and whether USB drives were used, seeing details such as:
• Drives accessed
• USB serial numbers
• Date and time of use
Browser History Reports
Review an employee’s Internet browser activity, such as:
• File sharing sites
• Online email accounts
• Social media activity
Installed Applications Report
Review a list of applications installed by an employee like:
• Cloud-based storage
• Unauthorized applications