SlideShare a Scribd company logo
Effectively 
Protecting 
Confidential 
Information 
BONITA LEWIS BELL – OCTOBER 2014
Confidential Information Is . . . 
Any information or data that is not generally known or accessible, 
and which gives the owner a competitive advantage. 
Technical information 
◦ Know-how 
◦ Technology 
◦ Equipment Specs 
◦ Trade Secrets 
◦ Customer list 
◦ Equipment 
◦ Product plans 
◦ Financials 
◦ Pricing/Proposals 
◦ Agreements
Not Confidential Info if . . . 
•Generally known at time of disclosure 
•Information rightfully received from a 
third party authorized to make 
disclosure 
•Becomes publicly known through no 
fault of the recipient 
Confidential information that goes outside of the organization without 
an obligation of confidentiality – even if disclosed to only one person – 
is no longer confidential
Disclosure – Purposeful or Accidental 
“Many organizations spend a great deal of time seeking to protect 
against third parties taking confidential information, often the greater 
risk lies in the accidental disclosure of confidential information by its 
own personnel.” 
Intellectual Property Culture, Dobrusin & Krasnow, 2008
Unwitting Disclosure of Confidential Information 
•Presentations at conferences/trade shows 
•Phone conversations in public places 
•Sales activities, product demos, bid proposals w/o 
confidentiality agreements 
•Social gathering, entertaining customers 
•Website posting – blogs, message boards 
•Investor/analyst presentations 
•Poor document control 
◦Documents visible in public places 
◦Info left behind in conference rooms, etc.
Protecting Confidential Information 
• Reasonable under the circumstances 
• Will vary from industry to industry or even business to 
business within the same industry 
◦ How is the information designated as confidential? 
◦ What physical measures are taken to limit access to the confidential 
information?
Protecting Confidential Information 
Limit Access 
 Password protection 
 Locked storage 
 Limited access areas
Protecting Confidential Information 
Know Your Visitors 
 Require sign-in/sign-out 
 Require Escorts 
 No Tailgating
Protecting Confidential Information 
Keep 
Employees 
Aware 
 Access on Need to Know Basis 
 Non-disclosure agreements 
 Reminders to Departing Team Members
Protecting Confidential Information 
Keep 
It 
Clean 
 Clear Conference Rooms 
 Log off of Computers 
 Put away confidential materials
Protecting Confidential Information 
Disclose with Care 
 Secure Signed Confidentiality Agreements 
 Disclose only what is needed 
 Mark with Legends 
 CONFIDENTIAL 
 © Owner, Date. All rights reserved.

More Related Content

What's hot

Confidentiality Training
Confidentiality TrainingConfidentiality Training
Confidentiality Training
Amy Fiesler-Garner
 
General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR)General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR)
Extentia Information Technology
 
Data Protection and Privacy
Data Protection and PrivacyData Protection and Privacy
Data Protection and Privacy
Vertex Holdings
 
Confidentiality New Employee Training (First-Week)
Confidentiality New Employee Training (First-Week)Confidentiality New Employee Training (First-Week)
Confidentiality New Employee Training (First-Week)
ChildrensHomeIllinois
 
#HR and #GDPR: Preparing for 2018 Compliance
#HR and #GDPR: Preparing for 2018 Compliance #HR and #GDPR: Preparing for 2018 Compliance
#HR and #GDPR: Preparing for 2018 Compliance
Dovetail Software
 
Data protection and privacy
Data protection and privacyData protection and privacy
Data protection and privacy
himanshu jain
 
GDPR Presentation slides
GDPR Presentation slidesGDPR Presentation slides
GDPR Presentation slides
Naomi Holmes
 
Confidentiality in the Workplace
Confidentiality in the WorkplaceConfidentiality in the Workplace
Confidentiality in the Workplace
salvarez63
 
Data protection ppt
Data protection pptData protection ppt
Data protection ppt
grahamwell
 
Confidentiality training
Confidentiality trainingConfidentiality training
Confidentiality training
Sherin_26
 
Introduction to Data Protection and Information Security
Introduction to Data Protection and Information SecurityIntroduction to Data Protection and Information Security
Introduction to Data Protection and Information Security
Jisc Scotland
 
GDPR infographic
GDPR infographicGDPR infographic
Presentation on GDPR
Presentation on GDPRPresentation on GDPR
Presentation on GDPR
DipanjanDey12
 
“Privacy Today” Slide Presentation
“Privacy Today” Slide Presentation “Privacy Today” Slide Presentation
“Privacy Today” Slide Presentation
tomasztopa
 
Security issues in e commerce
Security issues in e commerceSecurity issues in e commerce
Security issues in e commerce
sadaf tst
 
Personal Data Protection in Malaysia
Personal Data Protection in MalaysiaPersonal Data Protection in Malaysia
Personal Data Protection in Malaysia
MSC Malaysia Cybercentre @ Bangsar South City
 
Privacy issues and internet privacy
Privacy issues and internet privacyPrivacy issues and internet privacy
Privacy issues and internet privacy
vinyas87
 
Confidentiality in the workplace (1)
Confidentiality in the workplace (1)Confidentiality in the workplace (1)
Confidentiality in the workplace (1)
lei luna
 
GDPR Basics - General Data Protection Regulation
GDPR Basics - General Data Protection RegulationGDPR Basics - General Data Protection Regulation
GDPR Basics - General Data Protection Regulation
Vicky Dallas
 
Ethics in Accounting
Ethics in AccountingEthics in Accounting
Ethics in Accounting
Muhammad Arif
 

What's hot (20)

Confidentiality Training
Confidentiality TrainingConfidentiality Training
Confidentiality Training
 
General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR)General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR)
 
Data Protection and Privacy
Data Protection and PrivacyData Protection and Privacy
Data Protection and Privacy
 
Confidentiality New Employee Training (First-Week)
Confidentiality New Employee Training (First-Week)Confidentiality New Employee Training (First-Week)
Confidentiality New Employee Training (First-Week)
 
#HR and #GDPR: Preparing for 2018 Compliance
#HR and #GDPR: Preparing for 2018 Compliance #HR and #GDPR: Preparing for 2018 Compliance
#HR and #GDPR: Preparing for 2018 Compliance
 
Data protection and privacy
Data protection and privacyData protection and privacy
Data protection and privacy
 
GDPR Presentation slides
GDPR Presentation slidesGDPR Presentation slides
GDPR Presentation slides
 
Confidentiality in the Workplace
Confidentiality in the WorkplaceConfidentiality in the Workplace
Confidentiality in the Workplace
 
Data protection ppt
Data protection pptData protection ppt
Data protection ppt
 
Confidentiality training
Confidentiality trainingConfidentiality training
Confidentiality training
 
Introduction to Data Protection and Information Security
Introduction to Data Protection and Information SecurityIntroduction to Data Protection and Information Security
Introduction to Data Protection and Information Security
 
GDPR infographic
GDPR infographicGDPR infographic
GDPR infographic
 
Presentation on GDPR
Presentation on GDPRPresentation on GDPR
Presentation on GDPR
 
“Privacy Today” Slide Presentation
“Privacy Today” Slide Presentation “Privacy Today” Slide Presentation
“Privacy Today” Slide Presentation
 
Security issues in e commerce
Security issues in e commerceSecurity issues in e commerce
Security issues in e commerce
 
Personal Data Protection in Malaysia
Personal Data Protection in MalaysiaPersonal Data Protection in Malaysia
Personal Data Protection in Malaysia
 
Privacy issues and internet privacy
Privacy issues and internet privacyPrivacy issues and internet privacy
Privacy issues and internet privacy
 
Confidentiality in the workplace (1)
Confidentiality in the workplace (1)Confidentiality in the workplace (1)
Confidentiality in the workplace (1)
 
GDPR Basics - General Data Protection Regulation
GDPR Basics - General Data Protection RegulationGDPR Basics - General Data Protection Regulation
GDPR Basics - General Data Protection Regulation
 
Ethics in Accounting
Ethics in AccountingEthics in Accounting
Ethics in Accounting
 

Similar to Effectively Protecting Confidential Infomation

ORIENTATION PROGRAM ON INTELLECTUAL PROPERTY FOR MANAGEMENT STUDENTS .ppt
ORIENTATION PROGRAM ON INTELLECTUAL PROPERTY FOR MANAGEMENT STUDENTS .pptORIENTATION PROGRAM ON INTELLECTUAL PROPERTY FOR MANAGEMENT STUDENTS .ppt
ORIENTATION PROGRAM ON INTELLECTUAL PROPERTY FOR MANAGEMENT STUDENTS .ppt
mohamed abd elrazek
 
Reverse Engineer wipo_iipm_ge_07_www_809561.ppt
Reverse Engineer wipo_iipm_ge_07_www_809561.pptReverse Engineer wipo_iipm_ge_07_www_809561.ppt
Reverse Engineer wipo_iipm_ge_07_www_809561.ppt
DenriizkiiArif
 
wipo_smes_ge_07_www_81574.ppt
wipo_smes_ge_07_www_81574.pptwipo_smes_ge_07_www_81574.ppt
wipo_smes_ge_07_www_81574.ppt
SarthakKalia1
 
Proprietary Information
Proprietary InformationProprietary Information
Proprietary Information
hypknight
 
Understanding GDPR: Myths & Reality of Compliance
Understanding GDPR: Myths & Reality of ComplianceUnderstanding GDPR: Myths & Reality of Compliance
Understanding GDPR: Myths & Reality of Compliance
Veridium
 
Traditional non traditional ways to protect your intellectual property
Traditional  non traditional ways to protect your intellectual propertyTraditional  non traditional ways to protect your intellectual property
Traditional non traditional ways to protect your intellectual property
Boyle_Fredrickson
 
Innovation Arizona Summit June 11 2013 HOW to SUCCEED
Innovation Arizona Summit June 11 2013 HOW to SUCCEEDInnovation Arizona Summit June 11 2013 HOW to SUCCEED
Innovation Arizona Summit June 11 2013 HOW to SUCCEED
Traklight.com
 
Next Dimension and Siskinds PIPEDA Legislation Updates as of November 1 2018
Next Dimension and Siskinds PIPEDA Legislation Updates as of November 1 2018Next Dimension and Siskinds PIPEDA Legislation Updates as of November 1 2018
Next Dimension and Siskinds PIPEDA Legislation Updates as of November 1 2018
Next Dimension Inc.
 
ipr Paper.ppt
ipr Paper.pptipr Paper.ppt
ipr Paper.ppt
praneethnatarajan
 
AZBIA & Traklight present "New Year, New Business" Open House
AZBIA & Traklight present "New Year, New Business" Open HouseAZBIA & Traklight present "New Year, New Business" Open House
AZBIA & Traklight present "New Year, New Business" Open House
Traklight.com
 
Privacy for tech startups
Privacy for tech startups Privacy for tech startups
Privacy for tech startups
Marc Gallardo
 
Exploiting Intellectual Assets -Ken Marr, Targeting Innovation
Exploiting Intellectual Assets -Ken Marr, Targeting InnovationExploiting Intellectual Assets -Ken Marr, Targeting Innovation
Exploiting Intellectual Assets -Ken Marr, Targeting Innovation
Hillington Park Innovation Centre
 
Tradesecrets
TradesecretsTradesecrets
Tradesecrets
Kamma K Babu
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
izzati masturah
 
Using Intellectual Property as Collateral for Security Interests - May 2015
Using Intellectual Property as Collateral for Security Interests - May 2015Using Intellectual Property as Collateral for Security Interests - May 2015
Using Intellectual Property as Collateral for Security Interests - May 2015
Woodard, Emhardt, Henry, Reeves & Wagner, LLP
 
2013-03-13 Trade secrets in Europe
2013-03-13 Trade secrets in Europe2013-03-13 Trade secrets in Europe
2013-03-13 Trade secrets in Europe
Wouter Pors
 
Alba innovation centre exploiting intellectual assets presentation
Alba innovation centre  exploiting intellectual assets presentationAlba innovation centre  exploiting intellectual assets presentation
Alba innovation centre exploiting intellectual assets presentation
AlbaInnovationCentre
 
Buying & Selling IP
Buying & Selling IP Buying & Selling IP
Buying & Selling IP
Financial Poise
 
Ipo ip for business conference presentation slides 2 july 2015
Ipo ip for business conference presentation slides 2 july 2015Ipo ip for business conference presentation slides 2 july 2015
Ipo ip for business conference presentation slides 2 july 2015
Jane Lambert
 
Protecting Your Intellectual Property: How to Patent Your Copyright with a Tr...
Protecting Your Intellectual Property: How to Patent Your Copyright with a Tr...Protecting Your Intellectual Property: How to Patent Your Copyright with a Tr...
Protecting Your Intellectual Property: How to Patent Your Copyright with a Tr...
Quarles & Brady
 

Similar to Effectively Protecting Confidential Infomation (20)

ORIENTATION PROGRAM ON INTELLECTUAL PROPERTY FOR MANAGEMENT STUDENTS .ppt
ORIENTATION PROGRAM ON INTELLECTUAL PROPERTY FOR MANAGEMENT STUDENTS .pptORIENTATION PROGRAM ON INTELLECTUAL PROPERTY FOR MANAGEMENT STUDENTS .ppt
ORIENTATION PROGRAM ON INTELLECTUAL PROPERTY FOR MANAGEMENT STUDENTS .ppt
 
Reverse Engineer wipo_iipm_ge_07_www_809561.ppt
Reverse Engineer wipo_iipm_ge_07_www_809561.pptReverse Engineer wipo_iipm_ge_07_www_809561.ppt
Reverse Engineer wipo_iipm_ge_07_www_809561.ppt
 
wipo_smes_ge_07_www_81574.ppt
wipo_smes_ge_07_www_81574.pptwipo_smes_ge_07_www_81574.ppt
wipo_smes_ge_07_www_81574.ppt
 
Proprietary Information
Proprietary InformationProprietary Information
Proprietary Information
 
Understanding GDPR: Myths & Reality of Compliance
Understanding GDPR: Myths & Reality of ComplianceUnderstanding GDPR: Myths & Reality of Compliance
Understanding GDPR: Myths & Reality of Compliance
 
Traditional non traditional ways to protect your intellectual property
Traditional  non traditional ways to protect your intellectual propertyTraditional  non traditional ways to protect your intellectual property
Traditional non traditional ways to protect your intellectual property
 
Innovation Arizona Summit June 11 2013 HOW to SUCCEED
Innovation Arizona Summit June 11 2013 HOW to SUCCEEDInnovation Arizona Summit June 11 2013 HOW to SUCCEED
Innovation Arizona Summit June 11 2013 HOW to SUCCEED
 
Next Dimension and Siskinds PIPEDA Legislation Updates as of November 1 2018
Next Dimension and Siskinds PIPEDA Legislation Updates as of November 1 2018Next Dimension and Siskinds PIPEDA Legislation Updates as of November 1 2018
Next Dimension and Siskinds PIPEDA Legislation Updates as of November 1 2018
 
ipr Paper.ppt
ipr Paper.pptipr Paper.ppt
ipr Paper.ppt
 
AZBIA & Traklight present "New Year, New Business" Open House
AZBIA & Traklight present "New Year, New Business" Open HouseAZBIA & Traklight present "New Year, New Business" Open House
AZBIA & Traklight present "New Year, New Business" Open House
 
Privacy for tech startups
Privacy for tech startups Privacy for tech startups
Privacy for tech startups
 
Exploiting Intellectual Assets -Ken Marr, Targeting Innovation
Exploiting Intellectual Assets -Ken Marr, Targeting InnovationExploiting Intellectual Assets -Ken Marr, Targeting Innovation
Exploiting Intellectual Assets -Ken Marr, Targeting Innovation
 
Tradesecrets
TradesecretsTradesecrets
Tradesecrets
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 
Using Intellectual Property as Collateral for Security Interests - May 2015
Using Intellectual Property as Collateral for Security Interests - May 2015Using Intellectual Property as Collateral for Security Interests - May 2015
Using Intellectual Property as Collateral for Security Interests - May 2015
 
2013-03-13 Trade secrets in Europe
2013-03-13 Trade secrets in Europe2013-03-13 Trade secrets in Europe
2013-03-13 Trade secrets in Europe
 
Alba innovation centre exploiting intellectual assets presentation
Alba innovation centre  exploiting intellectual assets presentationAlba innovation centre  exploiting intellectual assets presentation
Alba innovation centre exploiting intellectual assets presentation
 
Buying & Selling IP
Buying & Selling IP Buying & Selling IP
Buying & Selling IP
 
Ipo ip for business conference presentation slides 2 july 2015
Ipo ip for business conference presentation slides 2 july 2015Ipo ip for business conference presentation slides 2 july 2015
Ipo ip for business conference presentation slides 2 july 2015
 
Protecting Your Intellectual Property: How to Patent Your Copyright with a Tr...
Protecting Your Intellectual Property: How to Patent Your Copyright with a Tr...Protecting Your Intellectual Property: How to Patent Your Copyright with a Tr...
Protecting Your Intellectual Property: How to Patent Your Copyright with a Tr...
 

Recently uploaded

Genocide in International Criminal Law.pptx
Genocide in International Criminal Law.pptxGenocide in International Criminal Law.pptx
Genocide in International Criminal Law.pptx
MasoudZamani13
 
一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理
一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理
一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理
gjsma0ep
 
17-03 2022 -full agreement full version .pdf
17-03 2022 -full agreement full version .pdf17-03 2022 -full agreement full version .pdf
17-03 2022 -full agreement full version .pdf
ssuser0dfed9
 
Pedal to the Court Understanding Your Rights after a Cycling Collision.pdf
Pedal to the Court Understanding Your Rights after a Cycling Collision.pdfPedal to the Court Understanding Your Rights after a Cycling Collision.pdf
Pedal to the Court Understanding Your Rights after a Cycling Collision.pdf
SunsetWestLegalGroup
 
It's the Law: Recent Court and Administrative Decisions of Interest
It's the Law: Recent Court and Administrative Decisions of InterestIt's the Law: Recent Court and Administrative Decisions of Interest
It's the Law: Recent Court and Administrative Decisions of Interest
Parsons Behle & Latimer
 
From Promise to Practice. Implementing AI in Legal Environments
From Promise to Practice. Implementing AI in Legal EnvironmentsFrom Promise to Practice. Implementing AI in Legal Environments
From Promise to Practice. Implementing AI in Legal Environments
ssusera97a2f
 
Receivership and liquidation Accounts Prof. Oyedokun.pptx
Receivership and liquidation Accounts Prof. Oyedokun.pptxReceivership and liquidation Accounts Prof. Oyedokun.pptx
Receivership and liquidation Accounts Prof. Oyedokun.pptx
Godwin Emmanuel Oyedokun MBA MSc PhD FCA FCTI FCNA CFE FFAR
 
Integrating Advocacy and Legal Tactics to Tackle Online Consumer Complaints
Integrating Advocacy and Legal Tactics to Tackle Online Consumer ComplaintsIntegrating Advocacy and Legal Tactics to Tackle Online Consumer Complaints
Integrating Advocacy and Legal Tactics to Tackle Online Consumer Complaints
seoglobal20
 
原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样
原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样
原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样
osenwakm
 
PPT-Money Laundering - lecture 5.pptx ll
PPT-Money Laundering - lecture 5.pptx llPPT-Money Laundering - lecture 5.pptx ll
PPT-Money Laundering - lecture 5.pptx ll
MohammadZubair874462
 
在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样
在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样
在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样
osenwakm
 
AN INTRODUCTION TO PUBLIC ADMINISTRATION.pptx
AN INTRODUCTION TO PUBLIC ADMINISTRATION.pptxAN INTRODUCTION TO PUBLIC ADMINISTRATION.pptx
AN INTRODUCTION TO PUBLIC ADMINISTRATION.pptx
schubergbestrong
 
San Remo Manual on International Law Applicable to Armed Conflict at Sea
San Remo Manual on International Law Applicable to Armed Conflict at SeaSan Remo Manual on International Law Applicable to Armed Conflict at Sea
San Remo Manual on International Law Applicable to Armed Conflict at Sea
Justin Ordoyo
 
原版定做(sheffield学位证书)英国谢菲尔德大学毕业证文凭证书原版一模一样
原版定做(sheffield学位证书)英国谢菲尔德大学毕业证文凭证书原版一模一样原版定做(sheffield学位证书)英国谢菲尔德大学毕业证文凭证书原版一模一样
原版定做(sheffield学位证书)英国谢菲尔德大学毕业证文凭证书原版一模一样
abondo3
 
The Future of Criminal Defense Lawyer in India.pdf
The Future of Criminal Defense Lawyer in India.pdfThe Future of Criminal Defense Lawyer in India.pdf
The Future of Criminal Defense Lawyer in India.pdf
veteranlegal
 
Should AI hold Intellectual Property Rights?
Should AI hold Intellectual Property Rights?Should AI hold Intellectual Property Rights?
Should AI hold Intellectual Property Rights?
RoseZubler1
 
Business Laws Sunita saha
Business Laws Sunita sahaBusiness Laws Sunita saha
Business Laws Sunita saha
sunitasaha5
 
Safeguarding Against Financial Crime: AML Compliance Regulations Demystified
Safeguarding Against Financial Crime: AML Compliance Regulations DemystifiedSafeguarding Against Financial Crime: AML Compliance Regulations Demystified
Safeguarding Against Financial Crime: AML Compliance Regulations Demystified
PROF. PAUL ALLIEU KAMARA
 
V.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdf
V.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdfV.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdf
V.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdf
bhavenpr
 
在线办理(UNE毕业证书)新英格兰大学毕业证成绩单一模一样
在线办理(UNE毕业证书)新英格兰大学毕业证成绩单一模一样在线办理(UNE毕业证书)新英格兰大学毕业证成绩单一模一样
在线办理(UNE毕业证书)新英格兰大学毕业证成绩单一模一样
15e6o6u
 

Recently uploaded (20)

Genocide in International Criminal Law.pptx
Genocide in International Criminal Law.pptxGenocide in International Criminal Law.pptx
Genocide in International Criminal Law.pptx
 
一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理
一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理
一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理
 
17-03 2022 -full agreement full version .pdf
17-03 2022 -full agreement full version .pdf17-03 2022 -full agreement full version .pdf
17-03 2022 -full agreement full version .pdf
 
Pedal to the Court Understanding Your Rights after a Cycling Collision.pdf
Pedal to the Court Understanding Your Rights after a Cycling Collision.pdfPedal to the Court Understanding Your Rights after a Cycling Collision.pdf
Pedal to the Court Understanding Your Rights after a Cycling Collision.pdf
 
It's the Law: Recent Court and Administrative Decisions of Interest
It's the Law: Recent Court and Administrative Decisions of InterestIt's the Law: Recent Court and Administrative Decisions of Interest
It's the Law: Recent Court and Administrative Decisions of Interest
 
From Promise to Practice. Implementing AI in Legal Environments
From Promise to Practice. Implementing AI in Legal EnvironmentsFrom Promise to Practice. Implementing AI in Legal Environments
From Promise to Practice. Implementing AI in Legal Environments
 
Receivership and liquidation Accounts Prof. Oyedokun.pptx
Receivership and liquidation Accounts Prof. Oyedokun.pptxReceivership and liquidation Accounts Prof. Oyedokun.pptx
Receivership and liquidation Accounts Prof. Oyedokun.pptx
 
Integrating Advocacy and Legal Tactics to Tackle Online Consumer Complaints
Integrating Advocacy and Legal Tactics to Tackle Online Consumer ComplaintsIntegrating Advocacy and Legal Tactics to Tackle Online Consumer Complaints
Integrating Advocacy and Legal Tactics to Tackle Online Consumer Complaints
 
原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样
原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样
原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样
 
PPT-Money Laundering - lecture 5.pptx ll
PPT-Money Laundering - lecture 5.pptx llPPT-Money Laundering - lecture 5.pptx ll
PPT-Money Laundering - lecture 5.pptx ll
 
在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样
在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样
在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样
 
AN INTRODUCTION TO PUBLIC ADMINISTRATION.pptx
AN INTRODUCTION TO PUBLIC ADMINISTRATION.pptxAN INTRODUCTION TO PUBLIC ADMINISTRATION.pptx
AN INTRODUCTION TO PUBLIC ADMINISTRATION.pptx
 
San Remo Manual on International Law Applicable to Armed Conflict at Sea
San Remo Manual on International Law Applicable to Armed Conflict at SeaSan Remo Manual on International Law Applicable to Armed Conflict at Sea
San Remo Manual on International Law Applicable to Armed Conflict at Sea
 
原版定做(sheffield学位证书)英国谢菲尔德大学毕业证文凭证书原版一模一样
原版定做(sheffield学位证书)英国谢菲尔德大学毕业证文凭证书原版一模一样原版定做(sheffield学位证书)英国谢菲尔德大学毕业证文凭证书原版一模一样
原版定做(sheffield学位证书)英国谢菲尔德大学毕业证文凭证书原版一模一样
 
The Future of Criminal Defense Lawyer in India.pdf
The Future of Criminal Defense Lawyer in India.pdfThe Future of Criminal Defense Lawyer in India.pdf
The Future of Criminal Defense Lawyer in India.pdf
 
Should AI hold Intellectual Property Rights?
Should AI hold Intellectual Property Rights?Should AI hold Intellectual Property Rights?
Should AI hold Intellectual Property Rights?
 
Business Laws Sunita saha
Business Laws Sunita sahaBusiness Laws Sunita saha
Business Laws Sunita saha
 
Safeguarding Against Financial Crime: AML Compliance Regulations Demystified
Safeguarding Against Financial Crime: AML Compliance Regulations DemystifiedSafeguarding Against Financial Crime: AML Compliance Regulations Demystified
Safeguarding Against Financial Crime: AML Compliance Regulations Demystified
 
V.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdf
V.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdfV.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdf
V.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdf
 
在线办理(UNE毕业证书)新英格兰大学毕业证成绩单一模一样
在线办理(UNE毕业证书)新英格兰大学毕业证成绩单一模一样在线办理(UNE毕业证书)新英格兰大学毕业证成绩单一模一样
在线办理(UNE毕业证书)新英格兰大学毕业证成绩单一模一样
 

Effectively Protecting Confidential Infomation

  • 1. Effectively Protecting Confidential Information BONITA LEWIS BELL – OCTOBER 2014
  • 2. Confidential Information Is . . . Any information or data that is not generally known or accessible, and which gives the owner a competitive advantage. Technical information ◦ Know-how ◦ Technology ◦ Equipment Specs ◦ Trade Secrets ◦ Customer list ◦ Equipment ◦ Product plans ◦ Financials ◦ Pricing/Proposals ◦ Agreements
  • 3. Not Confidential Info if . . . •Generally known at time of disclosure •Information rightfully received from a third party authorized to make disclosure •Becomes publicly known through no fault of the recipient Confidential information that goes outside of the organization without an obligation of confidentiality – even if disclosed to only one person – is no longer confidential
  • 4. Disclosure – Purposeful or Accidental “Many organizations spend a great deal of time seeking to protect against third parties taking confidential information, often the greater risk lies in the accidental disclosure of confidential information by its own personnel.” Intellectual Property Culture, Dobrusin & Krasnow, 2008
  • 5. Unwitting Disclosure of Confidential Information •Presentations at conferences/trade shows •Phone conversations in public places •Sales activities, product demos, bid proposals w/o confidentiality agreements •Social gathering, entertaining customers •Website posting – blogs, message boards •Investor/analyst presentations •Poor document control ◦Documents visible in public places ◦Info left behind in conference rooms, etc.
  • 6. Protecting Confidential Information • Reasonable under the circumstances • Will vary from industry to industry or even business to business within the same industry ◦ How is the information designated as confidential? ◦ What physical measures are taken to limit access to the confidential information?
  • 7. Protecting Confidential Information Limit Access  Password protection  Locked storage  Limited access areas
  • 8. Protecting Confidential Information Know Your Visitors  Require sign-in/sign-out  Require Escorts  No Tailgating
  • 9. Protecting Confidential Information Keep Employees Aware  Access on Need to Know Basis  Non-disclosure agreements  Reminders to Departing Team Members
  • 10. Protecting Confidential Information Keep It Clean  Clear Conference Rooms  Log off of Computers  Put away confidential materials
  • 11. Protecting Confidential Information Disclose with Care  Secure Signed Confidentiality Agreements  Disclose only what is needed  Mark with Legends  CONFIDENTIAL  © Owner, Date. All rights reserved.