In accordance with accepted Privacy frameworks and regulations, this website stores cookies on your computer. These cookies are used to collect information about how you interact with Lighthouse’s website and allow us to better inform and communicate about the topics you actually care about. Lighthouse uses this information in order to improve your experience and for analytics and metrics. View Privacy Policy

Coronavirus Preparedness At Lighthouse

Employee Onboarding and Departing Services

Protect your most valuable information assets by taking preemptive measures to keep corporate data where it belongs.

Proactive Data Management

Our proactive services reduce IT costs and future litigation fees surrounding a company’s ediscovery portfolio by helping organizations build programs that mitigate risk at two key points in time – when employees onboard and depart.

Through our programs, we review your current policies and procedures and recommend improvements. Our recommendations are framed in cost-versus-benefit terms and are based on a phased approach, where we consider the risk as well as the ease of implementation. We design and implement defensible and repeatable programs to guard against the risk of onboarding or departing employees who misappropriate confidential information.

Onboarding Employee Program

It’s vital to have a plan to detect and prevent competitors’ proprietary and confidential data from possibly infiltrating your IT network by a new hire.

Lighthouse helps you proactively scan new hires’ BYOD mobile devices, external USB hard drives, and personal cloud accounts for data that might be considered another company’s intellectual property. This approach helps safeguard against temporary restraining orders (TROs), preliminary injunctions (PIs), or accountability for material reuse due to a new employee’s past behavior.

Departing Employee Program

If your company has intellectual property that could be of interest to competitors and detrimental to your company’s future success if stolen, then it’s critical to build a bulletproof exfiltration program to retain your proprietary and confidential information. Partner with us to prevent the misappropriation of your company’s data during employee departures or a large-scale, reduction-in-force (RIF) event.

We address data exfiltration risk by designing and implementing a defensible and repeatable program to protect your company’s data from being copied to external USB hard drives, forwarded as email attachments, or uploaded to personal cloud storage accounts.

Red Flag Reporting

We’ll alert you to risks associated with departing employees who may be removing or copying data from your network, or with new employees who may be introducing proprietary data from their previous employers.

Questions?

Contact our proactive services team.