2. Protect your company’s confidential information
On the minds of business professionals:
Confidentiality
Privacy
Security
3. What is confidentiality?
Involves numerous concepts/ different circumstances
Different types of information must be protected
Most is stolen because of poorly trained employees
Insiders caused 60% of data breaches
75% done with malicious intent
25% were accidental
4. Protect Customers and Clients
Obtaining consent to collect personal informational must be
reinforced
Confidential information must be presented with confidence
Create policies
5. Protect Employees
Employees are required to give their employers with
information
Employment history
Criminal background
Credit scores
Immigration status
Etc.
6. Workplace Privacy
Privacy battleground
State laws tend to govern privacy rules in the
workplace
Constitutional right to privacy
Employers tend to monitor employees
7. Protect Management Information
Company executives are often
involved with:
Strategic objectives
Business deals
Mergers and acquisitions
Sales and financial reports
Failing to protect
confidential management
information can result in:
Broken deals
Unwanted press
Judgement of criticism
Failed investigations
Outright sabotage
8. Legal Confidentiality
Three types of confidentiality rules
Attorney-client communication privilege
General ethical duty of confidentiality
Work-product doctrine
9. Nondisclosure Agreements
An agreement between two parties that
wish to share confidential information and
make sure it's not disclosed to third
parties.
10. Noncompetition Agreements
Companies like to protect their confidential
information and strategic advantages using these
agreements.
Governed by state regulations and court rulings
11. Trade Secret Protections
The law protects information such as a formula, a
pattern, compilation, program, device, method,
technique, process, drawing, data, or customer list that
derives independent economic value because it's not
generally known or readily available, and reasonable
efforts are made by the company to maintain secrecy
12. Social Media Policies
Companies are concerned with employees leaking
confidential company information
Restrict employees from using social media on employer
equipment
Employers have the right to limit what they post on social
media
13. Cybersecurity
Companies use applications to make sure they are
secure
Designed to protect confidential information
Security of a company’s entire computer network
and information system
Maintain a virus free system
14. Document Management
Can be either electronic stored or paper
Three aspects of document management are:
Storage
Retention limits
Destruction