SlideShare a Scribd company logo
1 of 15
Confidentiality in the
Workplace
Melenia K. Cabatan
HT III
Confidentiality in the workplace
• Confidentiality means the state of keeping secret or not
disclosing information. It comes from confide, meaning to trust
someone or tell secrets to them.
• Confidential information, therefore, is information that should be
kept private or secret.
• Confidentiality is simply the act of keeping that information
private.
Why is Confidentiality Important?
• Many states have laws protecting the confidentiality of certain
information in the workplace.
• The disclosure of sensitive employee and management information
can lead to a loss of employee trust, confidence and loyalty.
Importance
• Failure to properly secure and protect confidential business
information can lead to the loss of business/clients. In the
wrong hands, confidential information can be misused to commit
illegal activity (e.g., fraud or discrimination), which can in turn result
in costly lawsuits for the employer.
• It prevents misuse of confidential information (illegal or
immoral use). It protects reputation. Employment may depend on it
(e.g. non-disclosure agreement). It ensures compliance with the
law.
What Type Of Information Must
Or Should Be Protected?
• Confidential workplace information can
generally be broken down into three
categories:
1.Employee information,
2.Management information, and
3.Business information.
Employee Information:
• Many states have laws which govern the
confidentiality and disposal of “personal
identifying information” (e.g., an employee’s
Social Security number, home address or telephone
number, e-mail address, Internet identification
name or password, parent’s surname prior to
marriage or driver’s license number).
Management Information:
• Confidential management information includes
discussions about employee relations issues,
disciplinary actions, impending
layoffs/reductions-in-force, terminations,
workplace investigations of employee misconduct,
etc.
• While disclosure of this information isn’t
necessarily “illegal,” it is almost always
counterproductive and can seriously damage the
collective “psyche” of a workplace.
Business Information:
• We oftentimes refer to confidential
business information as “proprietary
information” or “trade secrets.”
• This refers to information that’s not
generally known to the public and would
not ordinarily be available to competitors
except via illegal or improper means.
Business Information:
• Common examples of “trade secrets” include
manufacturing processes and methods, business plans,
financial data, budgets and forecasts, computer
programs and data compilation, client/customer lists,
ingredient formulas and recipes, membership or
employee lists, supplier lists, etc. “Trade secrets”
does not include information that a company
voluntarily gives to potential customers, posts on its
website, or otherwise freely provides to others
outside of the company.
What Steps Can Be Taken To
Better Protect Confidential
Information?
1. Separate folders should be kept for both form I-9s and
employee medical information.
2. All confidential documents should be stored in locked file
cabinets or rooms accessible only to those who have a
business “need-to-know.”
3. All electronic confidential information should be
protected via firewalls, encryption and passwords.
4. Employees should clear their desks of any confidential
information before going home at the end of the day.
5. Employees should refrain from leaving confidential
information visible on their computer monitors when they
leave their work stations.
What Steps Can Be Taken To
Better Protect Confidential
Information?
6. All confidential information, whether contained on
written documents or electronically, should be marked
as “confidential.”
7. All confidential information should be disposed of
properly (e.g., employees should not print out a
confidential document and then throw it away without
shredding it first.)
8. Employees should refrain from discussing confidential
information in public places.
9. Employees should avoid using e-mail to transmit
certain sensitive or controversial information.
What Steps Can Be Taken To
Better Protect Confidential
Information?
10.Limit the acquisition of confidential client
data (e.g., social security numbers, bank
accounts, or driver’s license numbers) unless it
is integral to the business transaction and
restrict access on a “need-to-know’ basis.
11.Before disposing of an old computer, use
software programs to wipe out the data contained
on the computer or have the hard drive destroyed.
What Steps Can Be Taken To
Better Protect Confidential
Information?
• A confidentiality policy should also describe the level of
privacy employees can expect relating to their own personal
property (e.g., “for your own protection, do not leave valuable
personal property at work and do not leave personal items —
especially your purse, briefcase or wallet — unattended while
you are at work”) and personal information (e.g., “your medical
records are kept in a separate file and are kept confidential
as required by law”).
• Finally, all businesses/organizations should have their
confidentiality policies reviewed to ensure compliance with
state law. For example, the New York Employee Personal
Identifying Information Law, which became effective January 3,
2009, requires the creation of policies and procedures to
prevent the prohibited use of “personal identifying
information” and requires employers notify employees of such
policies and procedures.
What Steps Can Be Taken To
Better Protect Confidential
Information?
• Train management and employees on confidentiality policy:
Oftentimes, simply having a written confidentiality policy
is not enough. In order for the confidentiality policy to
be effective, managers, supervisors and employees must be
educated on confidentiality issues and the company’s
policies and procedures. Management and employees should be
allowed an opportunity to ask questions about the policies,
and everyone should be trained to avoid putting sensitive
information in e-mails. Many companies and organizations
include this training as part of the new-hire/orientation
process.
• Before disposing of an old computer, use software programs
to wipe out the data contained on the computer or have the
hard drive destroyed.
The Confidentiality in the Workplace.pptx

More Related Content

Similar to The Confidentiality in the Workplace.pptx

Corporate Ways to Protect Confidential Information.pdf
Corporate Ways to Protect Confidential Information.pdfCorporate Ways to Protect Confidential Information.pdf
Corporate Ways to Protect Confidential Information.pdfJOHN BABATUNDE LEE
 
Human resources: protecting confidentiality
Human resources: protecting confidentiality Human resources: protecting confidentiality
Human resources: protecting confidentiality KelbySchwender
 
Confidentiality in the Workplace.pptx
Confidentiality in the Workplace.pptxConfidentiality in the Workplace.pptx
Confidentiality in the Workplace.pptxFelger Tilos
 
ORIENTATION PROGRAM ON INTELLECTUAL PROPERTY FOR MANAGEMENT STUDENTS .ppt
ORIENTATION PROGRAM ON INTELLECTUAL PROPERTY FOR MANAGEMENT STUDENTS .pptORIENTATION PROGRAM ON INTELLECTUAL PROPERTY FOR MANAGEMENT STUDENTS .ppt
ORIENTATION PROGRAM ON INTELLECTUAL PROPERTY FOR MANAGEMENT STUDENTS .pptmohamed abd elrazek
 
Reverse Engineer wipo_iipm_ge_07_www_809561.ppt
Reverse Engineer wipo_iipm_ge_07_www_809561.pptReverse Engineer wipo_iipm_ge_07_www_809561.ppt
Reverse Engineer wipo_iipm_ge_07_www_809561.pptDenriizkiiArif
 
NameIn this assignment, you must answer the Answer Implying .docx
NameIn this assignment, you must answer the Answer Implying .docxNameIn this assignment, you must answer the Answer Implying .docx
NameIn this assignment, you must answer the Answer Implying .docxgemaherd
 
Free_business_IT_security_policy_template_v5.pdf
Free_business_IT_security_policy_template_v5.pdfFree_business_IT_security_policy_template_v5.pdf
Free_business_IT_security_policy_template_v5.pdfklodianelezi1
 
Next Dimension and Siskinds PIPEDA Legislation Updates as of November 1 2018
Next Dimension and Siskinds PIPEDA Legislation Updates as of November 1 2018Next Dimension and Siskinds PIPEDA Legislation Updates as of November 1 2018
Next Dimension and Siskinds PIPEDA Legislation Updates as of November 1 2018Next Dimension Inc.
 
Topic 2 Cutbirth and Love
Topic 2 Cutbirth and LoveTopic 2 Cutbirth and Love
Topic 2 Cutbirth and LoveRobert Cutbirth
 
IT6701 Information Management Unit - V
IT6701 Information Management Unit - VIT6701 Information Management Unit - V
IT6701 Information Management Unit - Vpkaviya
 
FTC Protecting Info A Guide For Business Powerpoint
FTC  Protecting  Info A  Guide  For  Business  PowerpointFTC  Protecting  Info A  Guide  For  Business  Powerpoint
FTC Protecting Info A Guide For Business PowerpointBucacci Business Solutions
 
DLP: Monitoring Legal Obligations, Managing The Challenges
DLP: Monitoring Legal Obligations, Managing The ChallengesDLP: Monitoring Legal Obligations, Managing The Challenges
DLP: Monitoring Legal Obligations, Managing The ChallengesNapier University
 
Return to office post covid 19
Return to office post covid 19Return to office post covid 19
Return to office post covid 19Denise Bailey
 
Sample Data Security PoliciesThis document provides three ex.docx
Sample Data Security PoliciesThis document provides three ex.docxSample Data Security PoliciesThis document provides three ex.docx
Sample Data Security PoliciesThis document provides three ex.docxrtodd599
 
Protecting Your Trade Secrets
Protecting Your Trade SecretsProtecting Your Trade Secrets
Protecting Your Trade Secretsashishjoshi
 
wipo_smes_ge_07_www_81574.ppt
wipo_smes_ge_07_www_81574.pptwipo_smes_ge_07_www_81574.ppt
wipo_smes_ge_07_www_81574.pptSarthakKalia1
 

Similar to The Confidentiality in the Workplace.pptx (20)

Corporate Ways to Protect Confidential Information.pdf
Corporate Ways to Protect Confidential Information.pdfCorporate Ways to Protect Confidential Information.pdf
Corporate Ways to Protect Confidential Information.pdf
 
1307 Privacy Act
1307 Privacy Act1307 Privacy Act
1307 Privacy Act
 
Human resources: protecting confidentiality
Human resources: protecting confidentiality Human resources: protecting confidentiality
Human resources: protecting confidentiality
 
Confidentiality in the Workplace.pptx
Confidentiality in the Workplace.pptxConfidentiality in the Workplace.pptx
Confidentiality in the Workplace.pptx
 
ORIENTATION PROGRAM ON INTELLECTUAL PROPERTY FOR MANAGEMENT STUDENTS .ppt
ORIENTATION PROGRAM ON INTELLECTUAL PROPERTY FOR MANAGEMENT STUDENTS .pptORIENTATION PROGRAM ON INTELLECTUAL PROPERTY FOR MANAGEMENT STUDENTS .ppt
ORIENTATION PROGRAM ON INTELLECTUAL PROPERTY FOR MANAGEMENT STUDENTS .ppt
 
Reverse Engineer wipo_iipm_ge_07_www_809561.ppt
Reverse Engineer wipo_iipm_ge_07_www_809561.pptReverse Engineer wipo_iipm_ge_07_www_809561.ppt
Reverse Engineer wipo_iipm_ge_07_www_809561.ppt
 
NameIn this assignment, you must answer the Answer Implying .docx
NameIn this assignment, you must answer the Answer Implying .docxNameIn this assignment, you must answer the Answer Implying .docx
NameIn this assignment, you must answer the Answer Implying .docx
 
Free_business_IT_security_policy_template_v5.pdf
Free_business_IT_security_policy_template_v5.pdfFree_business_IT_security_policy_template_v5.pdf
Free_business_IT_security_policy_template_v5.pdf
 
Next Dimension and Siskinds PIPEDA Legislation Updates as of November 1 2018
Next Dimension and Siskinds PIPEDA Legislation Updates as of November 1 2018Next Dimension and Siskinds PIPEDA Legislation Updates as of November 1 2018
Next Dimension and Siskinds PIPEDA Legislation Updates as of November 1 2018
 
Topic 2 Cutbirth and Love
Topic 2 Cutbirth and LoveTopic 2 Cutbirth and Love
Topic 2 Cutbirth and Love
 
IT6701 Information Management Unit - V
IT6701 Information Management Unit - VIT6701 Information Management Unit - V
IT6701 Information Management Unit - V
 
FTC Protecting Info A Guide For Business Powerpoint
FTC  Protecting  Info A  Guide  For  Business  PowerpointFTC  Protecting  Info A  Guide  For  Business  Powerpoint
FTC Protecting Info A Guide For Business Powerpoint
 
DLP: Monitoring Legal Obligations, Managing The Challenges
DLP: Monitoring Legal Obligations, Managing The ChallengesDLP: Monitoring Legal Obligations, Managing The Challenges
DLP: Monitoring Legal Obligations, Managing The Challenges
 
Trade secret litigation
Trade secret litigationTrade secret litigation
Trade secret litigation
 
Return to office post covid 19
Return to office post covid 19Return to office post covid 19
Return to office post covid 19
 
Sample Data Security PoliciesThis document provides three ex.docx
Sample Data Security PoliciesThis document provides three ex.docxSample Data Security PoliciesThis document provides three ex.docx
Sample Data Security PoliciesThis document provides three ex.docx
 
Data protection act
Data protection actData protection act
Data protection act
 
Protecting Your Trade Secrets
Protecting Your Trade SecretsProtecting Your Trade Secrets
Protecting Your Trade Secrets
 
How to keep printing processes GDPR compliant
How to keep printing processes GDPR compliantHow to keep printing processes GDPR compliant
How to keep printing processes GDPR compliant
 
wipo_smes_ge_07_www_81574.ppt
wipo_smes_ge_07_www_81574.pptwipo_smes_ge_07_www_81574.ppt
wipo_smes_ge_07_www_81574.ppt
 

Recently uploaded

ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 

Recently uploaded (20)

ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 

The Confidentiality in the Workplace.pptx

  • 2. Confidentiality in the workplace • Confidentiality means the state of keeping secret or not disclosing information. It comes from confide, meaning to trust someone or tell secrets to them. • Confidential information, therefore, is information that should be kept private or secret. • Confidentiality is simply the act of keeping that information private.
  • 3. Why is Confidentiality Important? • Many states have laws protecting the confidentiality of certain information in the workplace. • The disclosure of sensitive employee and management information can lead to a loss of employee trust, confidence and loyalty.
  • 4. Importance • Failure to properly secure and protect confidential business information can lead to the loss of business/clients. In the wrong hands, confidential information can be misused to commit illegal activity (e.g., fraud or discrimination), which can in turn result in costly lawsuits for the employer. • It prevents misuse of confidential information (illegal or immoral use). It protects reputation. Employment may depend on it (e.g. non-disclosure agreement). It ensures compliance with the law.
  • 5. What Type Of Information Must Or Should Be Protected? • Confidential workplace information can generally be broken down into three categories: 1.Employee information, 2.Management information, and 3.Business information.
  • 6. Employee Information: • Many states have laws which govern the confidentiality and disposal of “personal identifying information” (e.g., an employee’s Social Security number, home address or telephone number, e-mail address, Internet identification name or password, parent’s surname prior to marriage or driver’s license number).
  • 7. Management Information: • Confidential management information includes discussions about employee relations issues, disciplinary actions, impending layoffs/reductions-in-force, terminations, workplace investigations of employee misconduct, etc. • While disclosure of this information isn’t necessarily “illegal,” it is almost always counterproductive and can seriously damage the collective “psyche” of a workplace.
  • 8. Business Information: • We oftentimes refer to confidential business information as “proprietary information” or “trade secrets.” • This refers to information that’s not generally known to the public and would not ordinarily be available to competitors except via illegal or improper means.
  • 9. Business Information: • Common examples of “trade secrets” include manufacturing processes and methods, business plans, financial data, budgets and forecasts, computer programs and data compilation, client/customer lists, ingredient formulas and recipes, membership or employee lists, supplier lists, etc. “Trade secrets” does not include information that a company voluntarily gives to potential customers, posts on its website, or otherwise freely provides to others outside of the company.
  • 10. What Steps Can Be Taken To Better Protect Confidential Information? 1. Separate folders should be kept for both form I-9s and employee medical information. 2. All confidential documents should be stored in locked file cabinets or rooms accessible only to those who have a business “need-to-know.” 3. All electronic confidential information should be protected via firewalls, encryption and passwords. 4. Employees should clear their desks of any confidential information before going home at the end of the day. 5. Employees should refrain from leaving confidential information visible on their computer monitors when they leave their work stations.
  • 11. What Steps Can Be Taken To Better Protect Confidential Information? 6. All confidential information, whether contained on written documents or electronically, should be marked as “confidential.” 7. All confidential information should be disposed of properly (e.g., employees should not print out a confidential document and then throw it away without shredding it first.) 8. Employees should refrain from discussing confidential information in public places. 9. Employees should avoid using e-mail to transmit certain sensitive or controversial information.
  • 12. What Steps Can Be Taken To Better Protect Confidential Information? 10.Limit the acquisition of confidential client data (e.g., social security numbers, bank accounts, or driver’s license numbers) unless it is integral to the business transaction and restrict access on a “need-to-know’ basis. 11.Before disposing of an old computer, use software programs to wipe out the data contained on the computer or have the hard drive destroyed.
  • 13. What Steps Can Be Taken To Better Protect Confidential Information? • A confidentiality policy should also describe the level of privacy employees can expect relating to their own personal property (e.g., “for your own protection, do not leave valuable personal property at work and do not leave personal items — especially your purse, briefcase or wallet — unattended while you are at work”) and personal information (e.g., “your medical records are kept in a separate file and are kept confidential as required by law”). • Finally, all businesses/organizations should have their confidentiality policies reviewed to ensure compliance with state law. For example, the New York Employee Personal Identifying Information Law, which became effective January 3, 2009, requires the creation of policies and procedures to prevent the prohibited use of “personal identifying information” and requires employers notify employees of such policies and procedures.
  • 14. What Steps Can Be Taken To Better Protect Confidential Information? • Train management and employees on confidentiality policy: Oftentimes, simply having a written confidentiality policy is not enough. In order for the confidentiality policy to be effective, managers, supervisors and employees must be educated on confidentiality issues and the company’s policies and procedures. Management and employees should be allowed an opportunity to ask questions about the policies, and everyone should be trained to avoid putting sensitive information in e-mails. Many companies and organizations include this training as part of the new-hire/orientation process. • Before disposing of an old computer, use software programs to wipe out the data contained on the computer or have the hard drive destroyed.