Pandora Provides Quick Proof Of Intellectual Property Theft.
During the two years since it was developed, Pandora has enjoyed enviable success by empirically proving what events have occurred on computer systems.
A Case Study.
The following scenario illustrates the process of Pandora. It involves an employee who leaves Company A to work for its competitor, Company B. Shortly thereafter, the owner of Company A notices a suspicious increase in Company B’s success rate with bid proposals, as its own business begins to fail. It feels sure that its ex-employee took a copy of its proprietary information to the rival who is now using it to obtain a competitive edge.
Indicators of the event might be that Company A is told that the theft has occurred; there could be a sudden loss of sales, clients or employees; or Company B may suddenly develop competing products and services that never existed before. In such situations, the party who has been a victim of theft usually notices the event between seven days to two years after the theft.
Upon discovery of the theft, the lawsuit is filed.
Typical in such scenarios, Company B’s repeated course of action against the lawsuit is to deny the accusation and present excuses to delay the proceedings.
Pandora does its job efficiently and unobtrusively, search the computer systems without ever looking at the content of any file.
Provides Fast Positive Proof.
Pandora utilizes proprietary tools, sound scientific methods and the industry standard for unduplicated identification, the MD5 hash.
If any of Company A’s information is on Company B’s computers, Pandora will locate it.
For more information about Pandora, contact FDS Global.