Protect Intellectual Property

Preserve your reputation

Retain talent

Prevent harm

Prepare for litigation

 

Sensitive Workplace Investigations

Reactive

When you have an allegation of serious misconduct, we can bring your internal or outside counsel power-packed resources to uncover the truth:

  • Review complete data sets, including incident artifacts, logs, witness and subject interview transcripts, and initial case findings

  • Compare findings to various threat frameworks and criminological profiles, surface evidence gaps

  • Perform evidence gap analysis based on possible policy violation/crime type

  • Recommend additional measures in line with investigative objectives

  • Identify alternative explanations, including additional investigative subjects

  • Identify exculpatory evidence

  • Provide expert opinions and testimony

  • Collect and analyze digital evidence globally while maintaining evidence chain of custody

  • Access data and information at locations requiring in-person visits globally or pre-established agreements

Proactive

We use industry best practices to continuously monitor the activities of your Crown Jewel personnel.

When your key personnel work daily with the trifecta of trade secrets, competitors, and enterprise technologies, you have every reason to trust, but verify. We work with industry leaders to incorporate monitoring tools into your security stack with a focus on transparency and decreasing mean time to respond when incidents occur. You have options:

  • Monitor user behavior on enterprise technologies covered under existing consent to monitor, but with added capabilities than what you apply to the general workforce

  • Monitor feeds from publicly and commercially available electronic information

  • Monitor employee behavior during engagements and travel using best-in-class Executive Protection technologies, available with opt-in

  • Monitor global data streams and databases for indications of Conflicts of Interest with the potential for critical impacts

Our Approach

  1. Establish a secure way to communicate and share initial objectives and capabilities

  2. Determine your goals from the perspectives of Legal, HR, Compliance, Security, Strategy

  3. Advise you on industry-standard approaches, select an investigative and/or monitoring process

  4. Onboard Veritas with a Master Service Agreement, create a scope of work

  5. Establish a timeline, milestones, and deliverables

  6. Gain secure access to relevant systems and data

  7. Deliver findings, support additional requests for assistance

  8. Testify to the evidence in court when applicable

Pop Quiz: When’s the best time to plug a leak?