Asset Protection

2019-06-11

The Problem
Recently, an engineering client was unable to gain contracts, all their bids being rejected. Management suspected that in some manner, information regarding the details of their bids was being disclosed to competitors prior to the bid submission.

The Investigative Solution
Management had no suspects. All persons who had access to the bid information were long term and trusted employees. A number of investigative avenues were pursued including the surveillance of a number of engineers involved in the project nothing of interest came to light. A pretext bid from a fictional company was developed, when the proposal was complete, individual copies were sent to each of the persons involved in the project. Each copy contained different bid and pricing information. Eventually bids were received by the fictional company from our client's competitor who had beaten them on a number of recent bids. By identifying the pricing and other strategic information in the bid, we were able to identify the source of the leak, a senior engineer responsible for proofing all bids. We placed this person under surveillance over a number of weeks, in order to document who he was meeting with etc. As it turned out, when the engineer attended pick up hockey games, persons were entering his vehicle where they would go through his briefcase and photograph documents.

The Result
The engineer was instructed in proper security procedures, and disciplined for not following established procedure regarding confidential and proprietary information. The competitor, caught red handed, was willing to negotiate a settlement with the client.

 

The Investigators Group Inc. (IGI) was established in 1995 as a full service private investigation and security firm serving individuals across North America. We serve the legal, insurance and corporate communities as well as individuals through our civil and executive services. IGI provides professional surveillance services, fraud investigators, workplace investigations, undercover operations, loss prevention and security services. 

Contact us today so we can provide the appropriate investigative solution for all your needs.

More Blog Posts

Investigative

Admissibility of Surveillance Evidence

A licensed private investigator is trained in investigative techniques and must understand the procedural steps required to be followed in order for video surveillance to be admissible.

Investigative

Surveillance by Employers

Employers can conduct surveillance using tools such as a swipe-card system, which data can be used for time-management and disciplinary purposes, or cameras.

Investigative

Protecting your Business against Fraud

I have seen first-hand how fraud can be harmful to a company’s reputation and brand.  Engaging in a fraud investigation is difficult and can erode the trust and morale of employees and raise questions and concerns to your outside relationships, customers, suppliers and even prospective employees.  That is why before engaging in any investigation, I will ensure that I explain to the client the investigation process, the potential scope and risks, and care is taken in planning the execution and timing of any investigation.