Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.
Although difficult to imagine, your best worker may hold the key to your company's worst security nightmare. Technologically armed employees who routinely use BlackBerry devices, personal digital assistants, laptops, and tiny flash drives to transport critical information to and from the office can wreak havoc on a corporation ' with no intention to do so.
A frequently overlooked and, therefore, extremely dangerous employee is the one who has access to critical information and then innocently misplaces, misuses, or disposes of a gadget with that data on it. In this era of increased use of technological devices by employees, savvy employers should take immediate steps to safeguard their organizations by preparing employees to use these tools, protecting their information, and implementing thoughtful policies around the use of portable information devices. Employees entrusted with access to confidential information are often insufficiently prepared to manage the technologies they use properly.
Case in Point
As one example, a former Morgan Stanley executive sold his BlackBerry on eBay, but neglected to erase the information on it. More than 200 internal company e-mails and a database of more than 1000 names, job titles, and contact information for the company's most senior-level executives were sold for $15 to a random stranger. The resulting nightmare ensued merely because the executive innocently believed that once he left his position, the information would somehow be erased from the device.
Beware!
The information age moves at warp speed. Gadgets that may be commonplace for a company's IT workers and younger employees may be confusing to more senior level management. It is critical that companies prepare employees to use personal devices, clearly outlining how these tools are to be used and the dangers inherent in their use. Technologies abound to help businesses protect themselves against the mishandling of information stored on personal devices ' whether that misuse is intentional or not. Portable devices can be password-protected. Critical company information can be made available on a need-to-know basis. Gadgets can be equipped with encryption software that renders them unreadable to anyone except their rightful owners. There are even methods by which a personal digital assistant can be remotely disabled if it goes missing. Every company owes itself and its clients a thoughtful risk analysis, taking these technologies and procedures into careful account.
Conclusion
Before handing an employee a personal device, or agreeing with an employee that he or she may use a personal device for work, a company should seek counsel to design and put into place a comprehensive, easy-to-understand, and frequently updated policy outlining how the device is to be used. These policies should include, at the very least, a definition of the information and software that may be loaded on the device, the required security configuration for the device, procedures if the device is lost or stolen, and procedures to follow on an employee's termination, such as requiring that an employee submit a device for inspection, allowing the employer to erase any proprietary information stored on it. The critical lesson learned from the example above is that the onus is on the company to protect its own assets. Don't let your company be brought to its knees by a misplaced BlackBerry.
David C. Henderson is a partner in the Litigation Department of Boston's Nutter McClennen & Fish, LLP. Matthew E. Feiner is an associate in the Labor, Employment and Benefits group.
Although difficult to imagine, your best worker may hold the key to your company's worst security nightmare. Technologically armed employees who routinely use BlackBerry devices, personal digital assistants, laptops, and tiny flash drives to transport critical information to and from the office can wreak havoc on a corporation ' with no intention to do so.
A frequently overlooked and, therefore, extremely dangerous employee is the one who has access to critical information and then innocently misplaces, misuses, or disposes of a gadget with that data on it. In this era of increased use of technological devices by employees, savvy employers should take immediate steps to safeguard their organizations by preparing employees to use these tools, protecting their information, and implementing thoughtful policies around the use of portable information devices. Employees entrusted with access to confidential information are often insufficiently prepared to manage the technologies they use properly.
Case in Point
As one example, a former
Beware!
The information age moves at warp speed. Gadgets that may be commonplace for a company's IT workers and younger employees may be confusing to more senior level management. It is critical that companies prepare employees to use personal devices, clearly outlining how these tools are to be used and the dangers inherent in their use. Technologies abound to help businesses protect themselves against the mishandling of information stored on personal devices ' whether that misuse is intentional or not. Portable devices can be password-protected. Critical company information can be made available on a need-to-know basis. Gadgets can be equipped with encryption software that renders them unreadable to anyone except their rightful owners. There are even methods by which a personal digital assistant can be remotely disabled if it goes missing. Every company owes itself and its clients a thoughtful risk analysis, taking these technologies and procedures into careful account.
Conclusion
Before handing an employee a personal device, or agreeing with an employee that he or she may use a personal device for work, a company should seek counsel to design and put into place a comprehensive, easy-to-understand, and frequently updated policy outlining how the device is to be used. These policies should include, at the very least, a definition of the information and software that may be loaded on the device, the required security configuration for the device, procedures if the device is lost or stolen, and procedures to follow on an employee's termination, such as requiring that an employee submit a device for inspection, allowing the employer to erase any proprietary information stored on it. The critical lesson learned from the example above is that the onus is on the company to protect its own assets. Don't let your company be brought to its knees by a misplaced BlackBerry.
David C. Henderson is a partner in the Litigation Department of Boston's
ENJOY UNLIMITED ACCESS TO THE SINGLE SOURCE OF OBJECTIVE LEGAL ANALYSIS, PRACTICAL INSIGHTS, AND NEWS IN ENTERTAINMENT LAW.
Already a have an account? Sign In Now Log In Now
For enterprise-wide or corporate acess, please contact Customer Service at [email protected] or 877-256-2473
During the COVID-19 pandemic, some tenants were able to negotiate termination agreements with their landlords. But even though a landlord may agree to terminate a lease to regain control of a defaulting tenant's space without costly and lengthy litigation, typically a defaulting tenant that otherwise has no contractual right to terminate its lease will be in a much weaker bargaining position with respect to the conditions for termination.
What Law Firms Need to Know Before Trusting AI Systems with Confidential Information In a profession where confidentiality is paramount, failing to address AI security concerns could have disastrous consequences. It is vital that law firms and those in related industries ask the right questions about AI security to protect their clients and their reputation.
GenAI's ability to produce highly sophisticated and convincing content at a fraction of the previous cost has raised fears that it could amplify misinformation. The dissemination of fake audio, images and text could reshape how voters perceive candidates and parties. Businesses, too, face challenges in managing their reputations and navigating this new terrain of manipulated content.
As the relationship between in-house and outside counsel continues to evolve, lawyers must continue to foster a client-first mindset, offer business-focused solutions, and embrace technology that helps deliver work faster and more efficiently.
The International Trade Commission is empowered to block the importation into the United States of products that infringe U.S. intellectual property rights, In the past, the ITC generally instituted investigations without questioning the importation allegations in the complaint, however in several recent cases, the ITC declined to institute an investigation as to certain proposed respondents due to inadequate pleading of importation.