Employers often conduct forensic analysis of the departing employees' access to their computer systems, and have a wealth of data to use to identify a policy violation that can form the basis of a ...