It seems like only yesterday when we opened for business, but 19 years later and we’re still going strong. Many of you have been repeat customers and we really appreciate your loyalty. So as we sing “Happy Birthday to Us” we also say “Thank YOU”, because without you, there wouldn’t be a reason to celebrate.
Our former employee left and we think they took our confidential information. What should we do?
We think our employee is spending most of their work day on social media. What should we do?
Our lawyer told us to produce relevant emails and documents for our case. What should we do?
We have a BYOD (Bring Your Own Device) policy and we just let a high-level employee go. What should we do?
We get the question “What should we do?” on a regular basis. Our answer? Give us a call!
It’s natural to try to find that smoking gun on your own, but you may be doing yourself a disservice in the long run. We’d love the opportunity to discuss your situation with you and see how we can help.
In the US for the most part we take clean water for granted. I am reminded of the Pastor from South Africa who was visiting The Woodlands, Texas one Christmas several years ago. He noted two things that have stuck with me.
First, he commented that we are so wealthy that even our plants have blankets when it’s freezing outside. And secondly, he did not understand how we can flush toilets with clean drinking water. Such a waste he said, since a lot of his people don’t have clean water to drink.
CyberEvidence working with Houston Young Lawyers Association is proud to support the fine work done by The HAY Center.
The HAY Center, a program of Harris County Protective Services for Children and Adults, a public/private partnership, provides much needed services to foster youth transitioning to adulthood in our community. Our employment, education, housing, mental health and life skills programs empower current and former foster youth to be successful productive adults.
CyberEvidence was selected to participate with Blank Rome’s Trade Secret and Competition group for a cross-office briefing looking back on the impact that the Defend Trade Secrets Act has had during its first year in existence. Paul Brown discussed how exponential advances in technology have made the theft of trade secrets much easier, and have complicated the defense of these actions.
Working With Computer Forensics in Trade Secrets Cases
This presentation will cover the ins-and-outs of working up a trade secret case using computer forensic data. David Brown and Paul Brown of CyberEvidence will walk us through the important considerations they encounter in their work; Kasi Chadwick from BoyarMiller will explain several e-Discovery tips and tricks using computer forensics; and Alex Hamilton of BoyarMiller will shed light on key drafting considerations for transactional lawyers in drafting employment agreements so as to best facilitate retrieval of stolen data.
I am frequently asked how long I have been conducting digital forensic examinations. I conducted the very first computer crime investigations in the Houston Police Department in the early 1990’s and I have been seen phenomenal growth in our field. In the early days we would forensically copy floppy disks, now we’re dealing with servers with terabytes of storage. Regardless of the storage size, the fundamentals still remain the same.
Although I don’t need the “DOS Seizure Certification” any more, it’s fun to think back to those early days of emerging technology.
Happy New Year! With the New Year comes a new look for our site, but rest assured, you’ll still get the same great service. We have some exciting things planned for this year, stay tuned for more updates.