McCann Investigations Houston Announces Investigations Focused on Intellectual Property Theft

Share Article

Intellectual property theft whether perpetrated by an external hacker or by an internal employee can cause irreparable harm to a company. Locating the source of the theft requires digital investigations.

Computer Forensics and Private Investigations

Smaller companies are more at risk given that they often do not have the resources to secure their networks against attacks

McCann Investigations Houston division, a Texas-based private investigations firm announces integration of its investigation tools, combining digital forensics and traditional private investigations which is essential to facilitating complex investigations involving intellectual property theft at Houston companies. McCann Investigations has worked on hundreds of cases which help its Houston clients to substantiate claims of intellectual property theft.

In many cases, intellectual property theft occurs during a data breach which can often come from external sources such as hackers. But many times, intellectual property theft occurs when present for former employees (sometimes in collusion with one another) download or export proprietary company information such as engineering drawings, client lists or trade secrets. This is often done when those employees are seeking to create a competing company. In many intellectual property theft cases facilitated by employees, there is a component of non compete violations. Many companies have solid non compete agreements in place to prevent intellectual property theft and infringement issues. Intellectual property theft and non compete violation investigations require a comprehensive investigation using multiple investigative practices to gather evidence in the case. These tools include digital investigations (computer forensics and mobile device forensics), surveillance, backgrounds and undercover work.

In the case of an external hack where intellectual property theft has taken place, the investigation involves IT security scanning of the network to determine the source of the security breach which is allowing for the data to be taken. These types of breaches can be very complex and are often carried out by hackers located in other countries.

“Intellectual property theft has become a big business for foreign countries looking to gain an edge in the global market.” Says Daniel Weiss, Managing Partner of McCann Investigations. “Smaller companies are more at risk given that they often do not have the resources to secure their networks against attacks.” Continued Weiss.

McCann Investigations Houston also provides data breach incident response to help clients document a data loss, as well as put protocols in place to prevent future network intrusions.

McCann Investigations Houston Division specializes in several case types including fraud, embezzlement, theft, non compete enforcement, digital debugging, data breach incident response and complex family, civil and criminal.

About McCann Investigations

McCann Investigations is a Texas-based private investigations practice focused on comprehensive investigations incorporating digital forensics, surveillance, undercover work and backgrounds for clients in various case types. Case types include intellectual property theft, non compete enforcement, fraud, embezzlement and family law. McCann Investigators are experts in the latest computer forensics tools and are licensed with the state of Texas. McCann computer forensics examiners have provided expert testimony and reporting in hundreds of cases across the state.

Through digital investigations, McCann also delivers digital debugging and data breach and incident response services.    In cases where there is suspected external or internal hacking with the installation of malware of spyware or when data and privacy loss has occurred due to network breach, McCann investigations computer forensics and IT security experts use cutting-edge tools to document, evaluate and respond to the incident. McCann works with clients to analyze their IT networks and put protocols in place to secure the network.

McCann Investigations utilizes multiple tools in their comprehensive investigations including digital investigations (computer forensics and mobile device forensics) digital debugging, corporate investigations, litigation support, IT security audit and oversight.
Twitter: @mccanngi

Share article on social media or email:

View article via:

Pdf Print

Contact Author

Malisa Vincenti
Follow us on
Visit website