Pursuant to the request of officers of an international technology company suspecting the misappropriation of their Intellectual Property (“IP”) by employees, led the investigation to forensically evaluate the corporate servers, firewall logs and e-mail

What's Trending

Follow us on social media

Jump to Page

By using this site, you agree to our updated Privacy Policy and our Terms of Use.