In this case, our client discovered that its customers had begun receiving mailings from a recently departed employee. The list of customers from this wealth management company was highly specialized, with many customers unknown to the general public. The customer database was built over twenty years and contained social security numbers, bank accounts and other data that could be used in identity theft. The client not only faced a clear theft of data and violation of non compete issues, they faced having to disclode the data breach to their customers. McCann digital investigators were able to determine that the client data was removed via USB drive and uploaded into the new company's CRM program. The client successfully obtained a TRO, barring the former employee from contacting further customers. McCann also helped to notify clients of the data loss and worked with te client to help repair their damaged reputation.
In this "classic" case of a non compete agreement violation, our client contacts us whena former salesperson leaves for greener pastures and takes millions of dollars worth of pending proposals with them. Within weeks of new employment with the new company, our client's customers were being contacted and offered discounts off of their existing proposal to come on board with the new company. In this case, McCann Investigations was able to document the download and removal of these proposals and were able to record conversations between the salesperson and a customer of our client who participated in the investigation. A civil suit was filed against the salesperson and the new employer who was found to be a conspirator benefiting from the ill-gotten information.
Our client believed that a former executive took a complete copy of the client CRM database. McCann digital forensic investigators were able to determine the exact date, time and method in which the executive made the copy. After the new company was forced to allow McCann to examine its servers, it was determined that they had uploaded an exact copy of the database.
A home builder who had spent years building a custom pricing program discovered that its former CFO was using the same model with a new employer. The system, designed over 24 months and costing over half a million dollars to develop was now being used by a competitor. After being forced by the courts to turn over access to the servers, McCann network forensics examiners were able to show when the program was uploaded and that it was in fact a copy of the program in question.
The above represent a small sample of the hundreds of cases investigated by McCann over the past 28 years. Material facts have been changed to protect the privacy of our clients. Some of the cases discussed combine various issues and materials found in relevant case studies that have been reviewed by McCann Investigators. No attempt should be made to draw any factual conclusions based on the cases discussed. Please contact McCann nvestigations for real world cases in which references can be furnished.