Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.
Losing a key employee is never easy — they often take with them institutional knowledge, great internal and external relationships, and critical skill sets. Some even may leave behind a leadership vacuum or rupture a team's cohesion. All this is difficult enough, but if they take confidential information with them, it becomes a more pressing challenge. Organizations today rely heavily upon technology and electronically stored information (ESI) — and when employees leave, there's always a risk that they'll take some information or data with them when they go, either inadvertently or on purpose.
This poses organizational risks in terms of data privacy and security, intellectual property and competitive positioning, so it's important for legal and compliance teams to identify risks associated with departing employees, and to adopt policies to safeguard valuable information.
|As companies embrace new technologies and adopt modern business practices, such as Slack, OneDrive, SharePoint, Microsoft Teams and so forth, information is duplicated, replicated and more and more accessible to a broader range of employees via many devices from desktop to mobile to cloud.
With the rise of bring your own device (BYOD) policies, it's not unusual for staff to use a mix of company laptops, personal smartphones and any number of handheld devices to access email, voicemail, documents and data — and employees often have remote access to company servers.
These technologies have increased productivity and reduced friction in employees' lives. However, this new way of working can considerably increase the risk of employees walking away with sensitive data, even inadvertently. Without proper procedures, it is remarkably simple for staff to remove critical company data without immediate detection. Multiple devices, both personal and business, make this more difficult: It can be harder to prove access, thus making it harder to take remedial, disciplinary or legal action.
It may seem paranoid, but securing data when employees leave, even amicably, is one of the best things an organization can do to protect its data. The stakes are high: Many organizations' greatest assets are their employees, and their knowledge is incredibly valuable. And, most employees have access to a veritable mountain of competitive information — company assets that exiting staff could be tempted to remove prior to moving on to, say, start their own businesses or work for competitors.
This information could include client lists and contact information, proprietary pricing information, strategic plans or proprietary product roadmaps: All assets no company wants to share with its competitors. Yet because of the ease of storing, transferring and finding this information, it is now potentially more accessible than ever to a wider circle of employees and future ex-employees. To reduce the risk of misuse, savvy organizations must adopt a strategic approach to safeguarding confidential information.
|1. Assess the risk: No company can evaluate risk if it doesn't understand the location and use cases for the tools and technology its staff uses. Ensure that you understand:
2. Collaborate with the internal IT team and external providers: IT and compliance teams will have much of the information required to make this assessment. They may even have a data map listing company asset assignments, information storage structures, role-based access controls, and more. An external specialist may be helpful to evaluate the information landscape and implement a security strategy.
3. Devise a policy: After completing a thorough risk assessment, formulate and distribute to all staff a clearly-worded company policy on the use of technology, information and tools. This policy should include, at a minimum:
4. Policy Administration: A policy is nothing if not well-enforced. Appoint a team whose task it will be to:
5. Defend Against IP and Data Theft with a Departing Employee Program: Implement a consistent, thorough departing employee program designed to investigate departing employees and defend against data theft:
The best-laid plans may still not guarantee 100% compliance, and ne'er-do-well ex-employees may still succeed in removing confidential information. If a breach is discovered, companies with may resort to legal action.
However, it can be difficult to take action against former employees if the company failed to retain the exiting employee's data. Without careful, professional preservation and management of the data, it will not remain useful for long. Data is volatile, especially metadata (the invisible record of who has created, amended, and read a document), and can be damaged by being copied or backed up in the wrong way, permanently eroding its evidentiary value.
Without a comprehensive set of policies and procedures for handling exiting employees, it may not become apparent that confidential data has been stolen or misused until days, weeks or months after an employee has left. If the data the employee stole is wiped, reassigned or otherwise lost due to incorrect or incomplete data and equipment policies, the evidence may be lost, making it much harder to even assess the extent of the damage, let alone seek compensation, remedial action, or pursue litigation.
Technology has both made our lives easier and far more complex — no one would wish for data to be harder to transfer or share. However, sensitive data should be protected from potential bad actors.
With careful planning and vigilantly enforced policies and procedures, organizations can manage the risks, ensure that their confidential information is protected, and competitive advantages are not lost when key employees depart.
*****
Michael Ciaramitaro has 16 years of experience in digital forensic collections and computer investigations helping law firms and corporations navigate through tough, complex data infrastructure, including in matters involving trade secret, intellectual property theft, exiting employee investigations and other employee-related legal matters. Ciaramitaro is the director of US digital forensics for Inventus. He can be reached at [email protected].
Sarah Brown is a legal technology thought leader with more than a decade of experience in the e-discovery and information management fields. She is an expert on the intersection of technology and the law, with a specific focus on electronic discovery, document review, forensics and investigations, technology-assisted review, and e-discovery managed services. She has a deep journalism background and holds a bachelor's degree in journalism and a master's degree from Columbia University. Brown is the director of marketing for Inventus. She can be reached at [email protected] or follow her on Twitter @eDiscoverySarah.
|ENJOY UNLIMITED ACCESS TO THE SINGLE SOURCE OF OBJECTIVE LEGAL ANALYSIS, PRACTICAL INSIGHTS, AND NEWS IN ENTERTAINMENT LAW.
Already a have an account? Sign In Now Log In Now
For enterprise-wide or corporate acess, please contact Customer Service at [email protected] or 877-256-2473
In a profession where confidentiality is paramount, failing to address AI security concerns could have disastrous consequences. It is vital that law firms and those in related industries ask the right questions about AI security to protect their clients and their reputation.
During the COVID-19 pandemic, some tenants were able to negotiate termination agreements with their landlords. But even though a landlord may agree to terminate a lease to regain control of a defaulting tenant's space without costly and lengthy litigation, typically a defaulting tenant that otherwise has no contractual right to terminate its lease will be in a much weaker bargaining position with respect to the conditions for termination.
The International Trade Commission is empowered to block the importation into the United States of products that infringe U.S. intellectual property rights, In the past, the ITC generally instituted investigations without questioning the importation allegations in the complaint, however in several recent cases, the ITC declined to institute an investigation as to certain proposed respondents due to inadequate pleading of importation.
Practical strategies to explore doing business with friends and social contacts in a way that respects relationships and maximizes opportunities.
As the relationship between in-house and outside counsel continues to evolve, lawyers must continue to foster a client-first mindset, offer business-focused solutions, and embrace technology that helps deliver work faster and more efficiently.