An internal audit/security accident investigation
solution, Qator Enterprise.
No.1 Case of Internal Malpractice Detection
The audit team of Company A has applied online forensic tool to internal intelligence, regular audit on main departments and prospective retiree and has detected several cases of internal malpractice detection every year through this.
01
Regular AuditAudit on intelligence of
malpractice of internal employee
regular audit of audit team
prospective retirees
and employees showing
signs of malpractice according
to standard of audit team
02
Online ForensicCollect and investigate
data for certain period of
time with application of online
forensic on the prospective
retirees and employees
showing signs of malpractice
03
Delivery of SuspectIntensive analysis of
employees with malpractice
face-to-face investigation
between suspected employees
and personnel actions
No.2 Case of Internal Malpractice Detection
Company B is a domestic semiconductor producer and its audit team performs an audit twice a year on all business sites using online forensic
01
Periodic /RunningIntelligence on malpractice of
internal employee and
results of its own offline analysis
Periodic Audit
02
Online ForensicIdentify signs ofmalpractice
between internal user and
partner companies
Collect data for certain
period of time with application
of online forensic on
the suspect and
perform investigation
03
Delivery of Suspect toFace-to-face
investigation of suspects
and measures for
internal personnel
Deprivation of qualification
as a partner company
Prosecute to investigation
agency if necessary
No.03 Case of Technology Leakage Prevention
Company A is a domestic display panel company and has lots of advanced technologies.
This case is the example of preventing technology leakage by using online forensic tools as the security team received intelligence on technology leakage attempts by internal employees
01
Reception of Intelligence byReceive intelligence of
technologyleakage attempt
from internal employees
02
Online ForensicApply online forensic
on PC of target personnel
and collect data
Simultaneous investigation
on PC of the conspirator
with identification of
additional conspirator
Obtain evidence data
through data collection and
disk imaging
03
Delivery ofSuspects toFace-to-face
investigation of suspects
Transfer of evidence data to
investigation agency and request of
formal investigation