HTI Exit Interview

For the Business Owner:

When an individual leaves your business there are always questions:

  • Are they going to sue?
  • Did they remove any Intellectual Property from the company?
  • Did they remove any company owned software?
  • Did they acquire any sensitive employee information?
  • Did they unlawfully remove any lists of current vendors?
  • Did they embezzle any money?

These issues are examples of employment-related investigations HTI has performed. Electronic evidence is easily lost and corrupted so without the evidence properly preserved you might never know the answers to any of these questions. Once the computer has been assigned to another user or re-imaged and then assigned to a different user it could be to late. HTI offers several services to help preserve the evidence for the future in addition to active monitoring and collection prior to termination. All work is done after business hours to minimize any impact to the business and to reduce any visibility of investigation or termination.

Basic Exit Package
HTI will make an evidence grade image of the user's computer and store it for two years. This not only preserves the electronic evidence, but provides the company with options if there is a wrongful termination charge brought. You now have the option to search for additional policy violations, such as unauthorized use, downloaded pornography, etc.

Investigation Exit Package
This includes all of the services of the basic exit package, in addition to 10 hours of forensic investigation and a written report.

High Risk Exit Package
This includes actively monitoring all user activity and email on their primary computer for two weeks prior to termination, in addition to all of the services of the Investigation Exit package. This is our most comprehensive package at a flat rate price. You do need to talk with one of our consultants to ensure your company policies authorize this and to negate any “presumed” right to privacy issues. This package is the best for helping to establish intent and catch the user “in the act”.