The employee's role permitted him access to the firm's servers, tools, and source code, but he was still restricted in the same way. NSO Group, in the same manner as many cybersecurity firms, had protections in place to prevent the external transfer of its intellectual property and software.
T-Mobile hack: Everything you need to know.