Organisations have the right to investigate employees work activities and in some positions their activity outside of work if it impacts on their employment.

We have designed a range of services to assist an organisation by providing advice and information to enable them to make informed decisions based on a legal standard of data acquisition and reporting. This level of investigation standard will assist an organisation in any possible legal or tribunal action in the future.

Employers may need to undertake internal investigations for a number of reasons, ranging from simple bad practice, health and safety, theft or driving offences. In the worst-case scenario, a rogue employee is an internal threat, actively working to undermine the organisation, possibly exporting sensitive corporate data for either personal gain or engaging in industrial espionage to benefit a competitor.

Our services include:

  • Advice on company policy to ensure organisations have the rules in place to ensure investigations can be undertaken as and when required.

  • Advice of monitoring software to assist in possible internal breaches.

  • Acquisition of digital information from company networks, attached devices, including mobile devices and CCTV, in addition we are able to obtain information from company vehicles such as satellite navigation systems and tracking devices.

  • Investigation services delivered with key information and conclusions in the highest standards of forensic reporting, guaranteeing that client's decisions can be ensured in any legal or employment proceedings.

  • Monitoring and investigation of employee social media profiles.

Please contact us on (023) 9421 7000 / (028) 9124 5315 or for further details regarding this service.

Case Study

Case Background

Fusion Forensics was instructed by a commercial organisation to examine the data stored on a computer used by an employee. It was alleged that the staff member may have copied company sensitive information via either a removable device (USB drive) or via email communications.

What Fusion did

Fusion secured the data on the computer by creating a forensically sound copy of its contents. Using methods and expertise acquired from law enforcement investigations Fusion set about conducting the thorough examination. Fusion’s expert was able to identify that a number of third party USB devices had been previously connected and utilised during the period of interest.

The initial findings were that a number of files, with file names indicative of containing company sensitive data, were also identified as having been accessed via the connected devices. The files were also found to feature accessed dates and times made during a significant period of suspicious activity.

Analysis of the live and deleted data was also applied to the examination of the Internet history and email communications. Fusion was able to identify that notable internet searches were made including one relating to the removal of data from servers.

A significant amount of emails were examined which resulted in the identification of an email sent to a personal email address.  Business sensitive data was found embedded within the email’s attachment.

Client Ready Evidence

Fusion then compiled an expert report detailing the findings in a concise manner.

The Outcome

The commercial organisation was able to use Fusion’s findings during proceedings against the employee.