Andrew Frowen offers the following royalty-free article for you to publish online or in print. Feel free to use this article in your newsletter, website, ezine, blog, or forum. ----------- PUBLICATION GUIDELINES - You have permission to publish this article for free providing the "About the Author" box is included in its entirety. - Do not post/reprint this article in any site or publication that contains hate, violence, porn, warez, or supports illegal activity. - Do not use this article in violation of the US CAN-SPAM Act. If sent by email, this article must be delivered to opt-in subscribers only. - If you publish this article in a format that supports linking, please ensure that all URLs and email addresses are active links. - Please send a copy of the publication, or an email indicating the URL to [email protected] - Article Marketer (www.ArticleMarketer.com) has distributed this article on behalf of the author. Article Marketer does not own this article, please respect the author's copyright and publication guidelines. If you do not agree to these terms, please do not use this article. ----------- Article Title: Protecting Against Intellectual Property Theft By Ex-Employees Author: Andrew Frowen Category: Word Count: 560 Keywords: computer forensics, computer misuse, intellectual property theft, removable storage, auditing Author's Email Address: [email protected] Article Source: http://www.articlemarketer.com ------------------ ARTICLE START ------------------
According to the Office of National Statistics, the number of unemployed people in Britain increased by 177,000 in the three months to February 2009, driven by a large number of redundancies. As businesses layoff staff in droves in a bid to survive the recession, many are failing to put adequate computer security measures in place to protect against abuse by disgruntled ex-employees. And the threat of intellectual property theft should not be underestimated. According to a recent study of US workers by security research firm Ponemon, 59% of workers took company data with them when leaving their job. It is thought that many ex-employees steal data in the belief that it will help them win work or start their own business, while some are thought to have malicious intent, planning to sell the data to competitors or use it to make sensitive information public. "They are making these judgements based out of fear and anxiety," Ponemon's Mike Spinney told BBC News. "People are worried about their jobs and want to hedge their bets. Our study showed that 59% of people will say 'I'm going to take something of value with me when I go'." For businesses concerned about exposure to intellectual property theft by ex-employees, there are a number of steps that can be taken. Most simply, the type of data taken outside of the company should be monitored closely once notice has been served. This may sound obvious, but in fact the Ponemon study revealed that only 15% of companies involved in the study made any attempt to audit the materials that ex-employees leave with. To prevent the electronic theft of data, it is wise to monitor the email activity of all employees. According to privacy laws, the content of employee's emails should not be viewed unless misuse is suspected, so it is worth installing automated software which monitors email traffic without the need for human intervention, and sends an alert to the administrator in the event of unusual activity, such as the transmission of several large attachments. In addition, it is wise to either prohibit the use of external storage devices such as USB flash drives by all employees in order to prevent large amounts of data moving outside the corporate workspace. However, if such devices are necessary in the course on an employee's work, use should be monitored to ensure data is not stolen in the event of termination. Again, there is software available which can perform this function. If a business suspects that sensitive data has been stolen by a terminated employee, it is important that every effort is made to preserve the evidence so that it can be used to take legal action to recover the information and prevent it from entering the public domain. Even turning a computer on can alter the data contained within it, so it is wise to engage the services of a computer forensic analyst to carry out the investigation. Such an expert will be able to analyse the registry information on the suspected employee's computer to ascertain if data has been transmitted by email or transferred to a removable storage device, even if that device is no longer present. While measures to protect against data theft may seem time-consuming to implement, with Ponemon estimating that a single lost record costs the average business 47 GBP, it may well be an investment worth making. IntaForensics a BS EN ISO 9001:2000 registered firm providing Computer Forensics, Expert Witness, Mobile Phone Forensics, and Forensic Data Recovery to the Legal Sector, Police Forces, Local Authorities and Commercial organisations internationally. Visit http://www.intaforensics.com. ------------------ ARTICLE END ------------------ [Non-text portions of this message have been removed]
