How to Ensure Confidential Information Stays Confidential

The lifespan of electronically stored information (ESI) lifespan will exceed any employee’s tenure in a company. When an individual decides to transition—for whatever reason—recent statistics show that 50 percent of employees take information when leaving. More alarming news is that 40 percent of these former employees will use that information at their new jobs, and 37 percent use cloud-based storage without permission from their employer, based on a 2012 survey from the Ponemon Institute.Confidential pic

The potential of an employee walking out the door with a client contact list or other piece of intellectual property is a problem that could warrant a costly investigation, but what if you’re not sure? Not only do forensic investigations prove to be expensive, but they might not lead to any concrete evidence that the departing employee has actually stolen confidential information. Even taking the time to debate whether or not to investigate can be costly.

So how do you ensure confidential information stays confidential? No need to grow gray hair. RVM has developed a new reliable and cost-efficient product to address this very concern. The RVM TracerTM, can be used as part of the exit interview process to quickly determine whether or not an employee has taken company documents. In minutes, the RVM Tracer creates reports that include items such as a listing of documents created and saved on a computer desktop, cloud based folders or external drives, as well as the browser history and a history of installed applications, saving time, money and potential future legal costs.

In an era where sensitive data grows exponentially, and has become rampant on every electronic device, ESI tracking, preservation and retrieval has had a huge impact on eDiscovery. Adopting effective procedures to address ESI issues can dramatically improve security awareness and risk assessment and treatment.