Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

The Impact of Technological Developments on the Workplace

By ALM Staff | Law Journal Newsletters |
January 28, 2009

The first part of this article discussed several different contexts in which changing technology is affecting the workplace and presenting new, and sometimes unique, challenges to Human Resources professionals. The conclusion herein discusses ways to protect a company's assets.

Protecting a Company's Assets

In a 2003 piece on the CBS News program, “60 Minutes,” Jim Goodnight, CEO of software giant SAS Corporation, remarked, “Ninety-five percent of my assets drive out the front gate every evening. It's my job to bring them back.” Changes in technology have perhaps altered that equation slightly in the last five years. Not only do the company's most important human resources leave the building every evening, so too may highly valuable confidential, proprietary and trade secret information. Here, too, it is critically important that the data comes back the next day.

The information may be contained on laptop computers employees routinely take out of the office. Or the information may be downloaded in a matter of seconds onto a 50-Gig jump (or thumb) drive, which derives its nickname because it is approximately the size of a person's thumb. Moreover, as referenced above, even without leaving the office, employees can transfer vast quantities of data from one computer to another outside the office or outside the country. It is crucial for a company to ensure that it has developed sensible policies regarding who has access to company data and how that data is maintained.

Just as employers need to monitor carefully what information employees take from the company, employers need to regulate the information brought into the company. An employee who joins a firm after working at the competition and brings with him confidential or proprietary information belonging to his former employer is not helping his new company ' he is merely increasing the likelihood of litigation and liability. Newly hired employees need to understand clearly that they are not to bring competitive data with them, and they are not to introduce any such information into their new employer's computer systems.

Even the issue of access to and use of a company's computerized data can be critical. This point was vividly illustrated by the recent experience of the French financial firm, Societe Generale, where a single employee manipulated his way through the firm's security system to engage in trades resulting in $7.5 billion in losses and then covered up his actions for months.

Although most firms need not be unduly anxious about the corrupt employee who single-handedly undermines the financial stability of the institution, there are various contexts where accessing confidential, proprietary and trade secret data is too common. Most often, this involves employees who are lured away by the competition or who leave to start their own competitive organization. Changes in technology have made it easier for such employees to take vast quantities of information and to do so without easy detection. Technological change has increased employer risk in this context.

Summary

In sum, although corporations and individuals alike are reaping benefits attributable to technological change, our society's new tools and methods of communication (computers, e-mails, PDAs, text messages, text messages with pictures, social networking sites, blogs, etc.) raise intriguing new issues for the HR professional and the employment law counsel. Internet connectivity, increasingly wireless, also raises difficult issues. Similarly, technological developments revolving around ever-increasing miniaturization, data compression, and both new hardware and software tools have created new challenges for corporate America. As suggested above, many of these “new” problems can be assessed and resolved based on well-established practices, procedures and principles. Others, however, will require some creative thought and the establishment of new policies to address these novel situations. Companies that thoughtfully evaluate these contexts before being confronted with a particular problem will position themselves far better than those that attempt to fashion an appropriate response to a difficult situation on an ad hoc basis.


Roy A. Ginsburg is a Partner at Dorsey & Whitney LLP in Minneapolis, MN, where he divides his time between commercial and employment litigation. Mr. Ginsburg also writes a weekly blog, which can be accessed at http://www.quirkyemploymentquestions.com/.

The first part of this article discussed several different contexts in which changing technology is affecting the workplace and presenting new, and sometimes unique, challenges to Human Resources professionals. The conclusion herein discusses ways to protect a company's assets.

Protecting a Company's Assets

In a 2003 piece on the CBS News program, “60 Minutes,” Jim Goodnight, CEO of software giant SAS Corporation, remarked, “Ninety-five percent of my assets drive out the front gate every evening. It's my job to bring them back.” Changes in technology have perhaps altered that equation slightly in the last five years. Not only do the company's most important human resources leave the building every evening, so too may highly valuable confidential, proprietary and trade secret information. Here, too, it is critically important that the data comes back the next day.

The information may be contained on laptop computers employees routinely take out of the office. Or the information may be downloaded in a matter of seconds onto a 50-Gig jump (or thumb) drive, which derives its nickname because it is approximately the size of a person's thumb. Moreover, as referenced above, even without leaving the office, employees can transfer vast quantities of data from one computer to another outside the office or outside the country. It is crucial for a company to ensure that it has developed sensible policies regarding who has access to company data and how that data is maintained.

Just as employers need to monitor carefully what information employees take from the company, employers need to regulate the information brought into the company. An employee who joins a firm after working at the competition and brings with him confidential or proprietary information belonging to his former employer is not helping his new company ' he is merely increasing the likelihood of litigation and liability. Newly hired employees need to understand clearly that they are not to bring competitive data with them, and they are not to introduce any such information into their new employer's computer systems.

Even the issue of access to and use of a company's computerized data can be critical. This point was vividly illustrated by the recent experience of the French financial firm, Societe Generale, where a single employee manipulated his way through the firm's security system to engage in trades resulting in $7.5 billion in losses and then covered up his actions for months.

Although most firms need not be unduly anxious about the corrupt employee who single-handedly undermines the financial stability of the institution, there are various contexts where accessing confidential, proprietary and trade secret data is too common. Most often, this involves employees who are lured away by the competition or who leave to start their own competitive organization. Changes in technology have made it easier for such employees to take vast quantities of information and to do so without easy detection. Technological change has increased employer risk in this context.

Summary

In sum, although corporations and individuals alike are reaping benefits attributable to technological change, our society's new tools and methods of communication (computers, e-mails, PDAs, text messages, text messages with pictures, social networking sites, blogs, etc.) raise intriguing new issues for the HR professional and the employment law counsel. Internet connectivity, increasingly wireless, also raises difficult issues. Similarly, technological developments revolving around ever-increasing miniaturization, data compression, and both new hardware and software tools have created new challenges for corporate America. As suggested above, many of these “new” problems can be assessed and resolved based on well-established practices, procedures and principles. Others, however, will require some creative thought and the establishment of new policies to address these novel situations. Companies that thoughtfully evaluate these contexts before being confronted with a particular problem will position themselves far better than those that attempt to fashion an appropriate response to a difficult situation on an ad hoc basis.


Roy A. Ginsburg is a Partner at Dorsey & Whitney LLP in Minneapolis, MN, where he divides his time between commercial and employment litigation. Mr. Ginsburg also writes a weekly blog, which can be accessed at http://www.quirkyemploymentquestions.com/.

This premium content is locked for Entertainment Law & Finance subscribers only

  • Stay current on the latest information, rulings, regulations, and trends
  • Includes practical, must-have information on copyrights, royalties, AI, and more
  • Tap into expert guidance from top entertainment lawyers and experts

For enterprise-wide or corporate acess, please contact Customer Service at [email protected] or 877-256-2473

Read These Next
How Secure Is the AI System Your Law Firm Is Using? Image

What Law Firms Need to Know Before Trusting AI Systems with Confidential Information In a profession where confidentiality is paramount, failing to address AI security concerns could have disastrous consequences. It is vital that law firms and those in related industries ask the right questions about AI security to protect their clients and their reputation.

COVID-19 and Lease Negotiations: Early Termination Provisions Image

During the COVID-19 pandemic, some tenants were able to negotiate termination agreements with their landlords. But even though a landlord may agree to terminate a lease to regain control of a defaulting tenant's space without costly and lengthy litigation, typically a defaulting tenant that otherwise has no contractual right to terminate its lease will be in a much weaker bargaining position with respect to the conditions for termination.

Pleading Importation: ITC Decisions Highlight Need for Adequate Evidentiary Support Image

The International Trade Commission is empowered to block the importation into the United States of products that infringe U.S. intellectual property rights, In the past, the ITC generally instituted investigations without questioning the importation allegations in the complaint, however in several recent cases, the ITC declined to institute an investigation as to certain proposed respondents due to inadequate pleading of importation.

Authentic Communications Today Increase Success for Value-Driven Clients Image

As the relationship between in-house and outside counsel continues to evolve, lawyers must continue to foster a client-first mindset, offer business-focused solutions, and embrace technology that helps deliver work faster and more efficiently.

The Power of Your Inner Circle: Turning Friends and Social Contacts Into Business Allies Image

Practical strategies to explore doing business with friends and social contacts in a way that respects relationships and maximizes opportunities.