Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

The Impact of Technological Developments on the Workplace

By ALM Staff | Law Journal Newsletters |
January 28, 2009

The first part of this article discussed several different contexts in which changing technology is affecting the workplace and presenting new, and sometimes unique, challenges to Human Resources professionals. The conclusion herein discusses ways to protect a company's assets.

Protecting a Company's Assets

In a 2003 piece on the CBS News program, “60 Minutes,” Jim Goodnight, CEO of software giant SAS Corporation, remarked, “Ninety-five percent of my assets drive out the front gate every evening. It's my job to bring them back.” Changes in technology have perhaps altered that equation slightly in the last five years. Not only do the company's most important human resources leave the building every evening, so too may highly valuable confidential, proprietary and trade secret information. Here, too, it is critically important that the data comes back the next day.

The information may be contained on laptop computers employees routinely take out of the office. Or the information may be downloaded in a matter of seconds onto a 50-Gig jump (or thumb) drive, which derives its nickname because it is approximately the size of a person's thumb. Moreover, as referenced above, even without leaving the office, employees can transfer vast quantities of data from one computer to another outside the office or outside the country. It is crucial for a company to ensure that it has developed sensible policies regarding who has access to company data and how that data is maintained.

Just as employers need to monitor carefully what information employees take from the company, employers need to regulate the information brought into the company. An employee who joins a firm after working at the competition and brings with him confidential or proprietary information belonging to his former employer is not helping his new company ' he is merely increasing the likelihood of litigation and liability. Newly hired employees need to understand clearly that they are not to bring competitive data with them, and they are not to introduce any such information into their new employer's computer systems.

Even the issue of access to and use of a company's computerized data can be critical. This point was vividly illustrated by the recent experience of the French financial firm, Societe Generale, where a single employee manipulated his way through the firm's security system to engage in trades resulting in $7.5 billion in losses and then covered up his actions for months.

Although most firms need not be unduly anxious about the corrupt employee who single-handedly undermines the financial stability of the institution, there are various contexts where accessing confidential, proprietary and trade secret data is too common. Most often, this involves employees who are lured away by the competition or who leave to start their own competitive organization. Changes in technology have made it easier for such employees to take vast quantities of information and to do so without easy detection. Technological change has increased employer risk in this context.

Summary

In sum, although corporations and individuals alike are reaping benefits attributable to technological change, our society's new tools and methods of communication (computers, e-mails, PDAs, text messages, text messages with pictures, social networking sites, blogs, etc.) raise intriguing new issues for the HR professional and the employment law counsel. Internet connectivity, increasingly wireless, also raises difficult issues. Similarly, technological developments revolving around ever-increasing miniaturization, data compression, and both new hardware and software tools have created new challenges for corporate America. As suggested above, many of these “new” problems can be assessed and resolved based on well-established practices, procedures and principles. Others, however, will require some creative thought and the establishment of new policies to address these novel situations. Companies that thoughtfully evaluate these contexts before being confronted with a particular problem will position themselves far better than those that attempt to fashion an appropriate response to a difficult situation on an ad hoc basis.


Roy A. Ginsburg is a Partner at Dorsey & Whitney LLP in Minneapolis, MN, where he divides his time between commercial and employment litigation. Mr. Ginsburg also writes a weekly blog, which can be accessed at http://www.quirkyemploymentquestions.com/.

The first part of this article discussed several different contexts in which changing technology is affecting the workplace and presenting new, and sometimes unique, challenges to Human Resources professionals. The conclusion herein discusses ways to protect a company's assets.

Protecting a Company's Assets

In a 2003 piece on the CBS News program, “60 Minutes,” Jim Goodnight, CEO of software giant SAS Corporation, remarked, “Ninety-five percent of my assets drive out the front gate every evening. It's my job to bring them back.” Changes in technology have perhaps altered that equation slightly in the last five years. Not only do the company's most important human resources leave the building every evening, so too may highly valuable confidential, proprietary and trade secret information. Here, too, it is critically important that the data comes back the next day.

The information may be contained on laptop computers employees routinely take out of the office. Or the information may be downloaded in a matter of seconds onto a 50-Gig jump (or thumb) drive, which derives its nickname because it is approximately the size of a person's thumb. Moreover, as referenced above, even without leaving the office, employees can transfer vast quantities of data from one computer to another outside the office or outside the country. It is crucial for a company to ensure that it has developed sensible policies regarding who has access to company data and how that data is maintained.

Just as employers need to monitor carefully what information employees take from the company, employers need to regulate the information brought into the company. An employee who joins a firm after working at the competition and brings with him confidential or proprietary information belonging to his former employer is not helping his new company ' he is merely increasing the likelihood of litigation and liability. Newly hired employees need to understand clearly that they are not to bring competitive data with them, and they are not to introduce any such information into their new employer's computer systems.

Even the issue of access to and use of a company's computerized data can be critical. This point was vividly illustrated by the recent experience of the French financial firm, Societe Generale, where a single employee manipulated his way through the firm's security system to engage in trades resulting in $7.5 billion in losses and then covered up his actions for months.

Although most firms need not be unduly anxious about the corrupt employee who single-handedly undermines the financial stability of the institution, there are various contexts where accessing confidential, proprietary and trade secret data is too common. Most often, this involves employees who are lured away by the competition or who leave to start their own competitive organization. Changes in technology have made it easier for such employees to take vast quantities of information and to do so without easy detection. Technological change has increased employer risk in this context.

Summary

In sum, although corporations and individuals alike are reaping benefits attributable to technological change, our society's new tools and methods of communication (computers, e-mails, PDAs, text messages, text messages with pictures, social networking sites, blogs, etc.) raise intriguing new issues for the HR professional and the employment law counsel. Internet connectivity, increasingly wireless, also raises difficult issues. Similarly, technological developments revolving around ever-increasing miniaturization, data compression, and both new hardware and software tools have created new challenges for corporate America. As suggested above, many of these “new” problems can be assessed and resolved based on well-established practices, procedures and principles. Others, however, will require some creative thought and the establishment of new policies to address these novel situations. Companies that thoughtfully evaluate these contexts before being confronted with a particular problem will position themselves far better than those that attempt to fashion an appropriate response to a difficult situation on an ad hoc basis.


Roy A. Ginsburg is a Partner at Dorsey & Whitney LLP in Minneapolis, MN, where he divides his time between commercial and employment litigation. Mr. Ginsburg also writes a weekly blog, which can be accessed at http://www.quirkyemploymentquestions.com/.

This premium content is locked for Entertainment Law & Finance subscribers only

  • Stay current on the latest information, rulings, regulations, and trends
  • Includes practical, must-have information on copyrights, royalties, AI, and more
  • Tap into expert guidance from top entertainment lawyers and experts

For enterprise-wide or corporate acess, please contact Customer Service at [email protected] or 877-256-2473

Read These Next
Overview of Regulatory Guidance Governing the Use of AI Systems In the Workplace Image

Businesses have long embraced the use of computer technology in the workplace as a means of improving efficiency and productivity of their operations. In recent years, businesses have incorporated artificial intelligence and other automated and algorithmic technologies into their computer systems. This article provides an overview of the federal regulatory guidance and the state and local rules in place so far and suggests ways in which employers may wish to address these developments with policies and practices to reduce legal risk.

Is Google Search Dead? How AI Is Reshaping Search and SEO Image

This two-part article dives into the massive shifts AI is bringing to Google Search and SEO and why traditional searches are no longer part of the solution for marketers. It’s not theoretical, it’s happening, and firms that adapt will come out ahead.

While Federal Legislation Flounders, State Privacy Laws for Children and Teens Gain Momentum Image

For decades, the Children’s Online Privacy Protection Act has been the only law to expressly address privacy for minors’ information other than student data. In the absence of more robust federal requirements, states are stepping in to regulate not only the processing of all minors’ data, but also online platforms used by teens and children.

Revolutionizing Workplace Design: A Perspective from Gray Reed Image

In an era where the workplace is constantly evolving, law firms face unique challenges and opportunities in facilities management, real estate, and design. Across the industry, firms are reevaluating their office spaces to adapt to hybrid work models, prioritize collaboration, and enhance employee experience. Trends such as flexible seating, technology-driven planning, and the creation of multifunctional spaces are shaping the future of law firm offices.

From DeepSeek to Distillation: Protecting IP In An AI World Image

Protection against unauthorized model distillation is an emerging issue within the longstanding theme of safeguarding intellectual property. This article examines the legal protections available under the current legal framework and explore why patents may serve as a crucial safeguard against unauthorized distillation.