As employees who work for domestic companies changes jobs in the same industry, the damage cases have been increased caused by fraudulently acquisition, use or disclosure of the technical data managed as a high-technology. In the case where the techni...
As employees who work for domestic companies changes jobs in the same industry, the damage cases have been increased caused by fraudulently acquisition, use or disclosure of the technical data managed as a high-technology. In the case where the technical data which had been studied for several years had been infringed from other party, the company damaged about the high-technology tends to rely on a criminal attempt, which is less likely to leak trade secrets, when the investigation is in progress, rather than a civil attempt such as a request for prohibition in order to resolve the leakage accident of confidential information. In the leakage accident of high-technology, getting investigation target medium such as leak target medium is on priority and the medium is used as important evidence. Getting such medium includes surveying the leaker and leak path of trade secret. We tend to present the leak accident response about the high-technologies and investigation procedures by analyzing digital medium (computer, USB, removable hard disk , e-mail, etc.) used in technology leakage accident in terms of digital forensic and checking the leakage with respect to who (Who), what (What), when (When), and how (How).