• Password-protecting computers and networks where important data are kept
Smith also cautioned against immediately confronting or speaking with suspects, thus avoiding an opportunity for them to hide or destroy evidence, yet stressed the need for quick, covert action. “It has been my experience that in most technology theft cases, more technology has been taken than was originally thought stolen,” he noted. “Immediately consult corporate security managers and/or local law enforcement agencies to learn your options before evidence can be lost. When appropriate, file a civil law suit and seek an injunction. Also, secure evidence—including locking away any computers that may have been used—and establish a chain-of-possession to ensure that it is admissible.”