It's possible, you would just have to check network and file access logs if you have them. The main problem is how specific your logging was. At best, you would have file access logs showing that he accessed certain files of a certain size and network activity logs showing he had recently uploaded files of the same size.
However, if you are asking such basic questions you obviously don't understand the underlying system well enough to carry out such a search. As such logs are usually fairly ephemeral, you need to hire a real IT person to come and do it for you ASAP. If you haven't set up such logging, you probably won't have much to go on besides "last accessed" file-stamps on the files themselves. Which means that the next time someone messes with that file your evidence will evaporate as well.