Unauthorized Access to Information - Firme-H2E
Skip to content
Firme-H2E
  • Our Services
    • Cyber Investigation and Computer Forensics
    • IT Expertise & Legal Support
    • IT Data Visualization
    • IT Disputes and Projects
    • E-Reputation
    • Prevention & Training
    • ──────────────────
    • ──────────────────
    • ──────────────────
    • Legal Aid
    • Anton Piller Orders
  • About Us
    • Our Story
    • FAQ
  • Case Studies
    • Case: Deleted iPhone Messages
    • Case: Software Contract Dispute
    • Case: Screenshot Falsification
    • Case: Server Damage Insurance
    • Case: Cryptocurrency Fraud
    • Case: Police Report Counter-Expertise
  • Our Audience
    • Lawyers
    • Investigators
    • Insurance Adjusters
  • Blog
  • Estimate
  • Contact
  • FR
Get IT Forensic Support Now
Firme-H2E
  • Our Services
    • Cyber Investigation and Computer Forensics
    • IT Expertise & Legal Support
    • IT Data Visualization
    • IT Disputes and Projects
    • E-Reputation
    • Prevention & Training
    • ──────────────────
    • ──────────────────
    • ──────────────────
    • Legal Aid
    • Anton Piller Orders
  • About Us
    • Our Story
    • FAQ
  • Case Studies
    • Case: Deleted iPhone Messages
    • Case: Software Contract Dispute
    • Case: Screenshot Falsification
    • Case: Server Damage Insurance
    • Case: Cryptocurrency Fraud
    • Case: Police Report Counter-Expertise
  • Our Audience
    • Lawyers
    • Investigators
    • Insurance Adjusters
  • Blog
  • Estimate
  • Contact
  • FR

Unauthorized Access to Information

Scroll to explore

Case type: Criminal and civil law

Client: Financial services company


Parties involved: Company v. Former IT analyst


Mandate given to Firme H2E:

Document unauthorized access to systems and confidential databases


Duration: 20 business days

Context

A Quebec City financial services firm discovered that a former IT analyst had continued accessing its internal systems for several weeks after his termination. The company had neglected to revoke certain VPN access, and client database credentials had not been deactivated.

The former employee was suspected of viewing wealthy client files and downloading personal and financial information. The company feared a breach of privacy legislation and needed to document the extent of the intrusion for regulatory obligations and potential criminal prosecution.

The legal department retained Firme H2E to analyze system logs, reconstruct the former employee’s actions, and produce a court-admissible report.

Firme H2E Intervention

Step 1

Log Collection and Preservation

  • Acquired VPN, Active Directory, firewall, and database server logs
  • Created forensic images of involved servers
  • Documented chain of custody for each data source
Step 2

Access Analysis and Chronological Reconstruction

  • Correlated VPN connections with the former employee’s residential IP address
  • Analyzed SQL queries executed on client databases
  • Identified 312 client files accessed without authorization over a 23-day period
  • Detected mass downloads (CSV exports) of personal data
Step 3

Expert Report and Visualization

  • Produced a detailed technical report with visual intrusion timeline
  • Mapped accessed data: names, social insurance numbers, account balances
  • Calculated impact: over 4,500 potentially affected clients
  • Provided recommendations for mandatory notifications under privacy legislation
Result

Firme H2E’s report was used to file a criminal complaint for unauthorized access to a computer system (s. 342.1 of the Criminal Code).

The forensic evidence also served as the basis for a civil damages lawsuit.

The company was able to demonstrate to regulatory authorities that it had acted diligently by quickly documenting the incident. The former employee was charged and pleaded guilty to reduced charges, receiving probation and a ban from working in the financial sector.

Key Takeaways
  • Immediate access revocation upon departure is critical for security
  • System logs are valuable forensic evidence when properly preserved
  • Rigorous incident documentation facilitates regulatory compliance and legal recourse
Tools Used
  • Splunk (log analysis and correlation)
  • Magnet AXIOM (server forensic acquisition)
  • Microsoft Log Parser (Active Directory analysis)
  • Custom visual timeline (Firme H2E)
  • SHA-256 for log integrity validation

Have a case?

Submit it securely through our platform.

No emails. No delays. Use our dedicated submission system to get expert help fast.

Submit Your Case

Your information stays confidential and is reviewed by certified experts.

Firme H2E

Legal IT Expertise Firm | Greater Montreal Area


  • Facebook
  • LinkedIn
Quick Links
  • Home
  • Our Services
  • Our Audience
  • About Us
  • Case Studies
  • Our Story
  • Blogs
  • Legal Aid
  • Anton Piller
  • FAQ’s
  • Contact
Contact Us
  • Location
    970 Demers Street, Carignan, J3L 1E9
  • Business email
    expertise@firmeh2e.com
  • Toll-free
    1-888-796-8706
  • Local
    1-450-700-4233
Stay Informed. Stay Secure.

Subscribe to stay informed about industry updates and connect with our experts.

Note: We serve all over Quebec and Canada

© 2025 Firme H2E. All rights reserved.

  • Privacy Policy
  • Terms & Conditions
Manage consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
View preferences
  • {title}
  • {title}
  • {title}