SlideShare a Scribd company logo
1 of 38
Download to read offline
Workplace Strategies for Protecting 
Confidential and Proprietary Property




Presented by: Catherine Coulter
catherine.coulter@fmc‐law.com



                                        1
Tracking and other IT surveillance tools




                                           2
Most of our guidance comes from the 
decisions of labour arbitrators in the 
unionized environment  and various 
Privacy Commissioners across the country



                                           3
Most cases involving 
employee surveillance 
relate to trying to ensure 
employee productivity, 
rather than protecting and 
preserving  company 
confidential information 




                              4
Types of Surveillance:

(i) GPS (global positioning systems); 

(ii) video surveillance; 

(iii) keystroke monitoring; and

(iv) RFIDs (radio frequency identification 
     devices)


                                              5
Video Surveillance

Video surveillance is generally not permitted for the purpose 
of  ensuring  employee  productivity  or  supervising 
employees;  however  it  may  be  permitted  if  the  employer 
can show a bona fide safety or security justification




                                                                  6
GPS

GPS is generally permitted for safety management and asset 
management  (eg.  Tracking  stolen  company  vehicles)  but 
again,  like  video  surveillance,  is  not  permitted  for 
productivity management 




                                                               7
Keystroke Monitoring


Keystroke  monitoring  may  be  permitted  to  manage 
productivity  but  labour  arbitrators  have  stated  that  other 
means  of  monitoring  productivity  should  be  used  if  at  all 
possible 




                                                                      8
Surveillance may be permitted if:

(i)  employees  are  given  advance  written  notice  of  the 
surveillance; 

(ii)  there  is  no  less  intrusive  means  of  protecting  the 
company’s property; and 

(iii) the surveillance is reasonable in scope 



                                                                    9
WHAT TO DO IF YOU DECIDE TO 
IMPLEMENT EMPLOYEE SURVEILLANCE:
•   Employees  should  be  given  notice  on  a  frequent  and 
    recurring basis in terms of how they’re being monitored 

•   Computer  pop‐up  warnings  are  a  great  way  to  implement 
    frequent reminders 

•   If you have a workplace computer use policy, check to make 
    sure  it’s  up‐to‐date  and  thorough;  if  you  don’t  have  a 
    computer use policy, what are you waiting for?

                                                                       10
Telework/remote systems access policies 
and practices




                                           11
WHAT TO DO ?
•   make sure that your employees and contractors ALWAYS sign 
    properly drafted and enforceable Confidentiality Agreements

•   if your employees have a computer at home, help them to 
    ensure that it is password enabled, email encrypted and 
    firewalled

•   insist that your clients do their work through your company’s 
    internal network, or no amount of firewalls in the world will help

•   Also insist on passwords and other security devices that your 
    employees may use

                                                                     12
•   if your employees have hard copies of company confidential 
    information at home, make sure that it’s a requirement that 
    it be kept filed in a locked filing cabinet except when being 
    used

•   ensure that your employees (and their families) understand 
    that the offsite work area is for work purposes only

•   when projects come to an end, employees should be 
    contractually responsible to return documentation to the 
    office for proper storage



                                                                     13
• develop policies relating to the protection of confidential 
  information in a telework setting, and train your employees on 
  related security issues 

• conduct periodic background checks to make sure that your 
  employees are actually following proper procedures




                                                                14
Employee use of YOUR Information 
Technology Resources




                                    15
Employee Use of Company IT Resources
Remind your employees in writing that:
‐ You own the equipment and systems, and they’re just using it
‐ The equipment and systems that they’re using are supplied for business 
  purposes
‐ You have the ability to monitor their computer use and they should expect 
  to have no expectation of privacy when using company‐owned equipment 
  and systems
‐ Freedom of expression is NOT unlimited, even off‐site and off‐hours
‐ They have a duty of good faith which operates 24/7 and post‐employment
‐ They can be terminated with cause for breaches of their duty of good faith, 
  their employment contracts and the company’s policies



                                                                             16
Important Tools For Protecting Your 
Workplace & Technology
‐ Employment Agreements (non‐disparagement provisions; 
  agreement to be bound by company policies)
‐ Confidentiality Agreement (acknowledgement of continuing 
  duties post‐employment)
‐ Intellectual Property Agreement (acknowledgement of 
  assignment of IP to company; waiver of moral rights)
‐ Creation of various policies (Computer Use Policy; Facebook & 
  Blogging Policy; Harassment Policy; Privacy Policy



                                                                   17
Best Practices Computer Use Policy
A best practices company computer use policy will always include the 
  following information:
‐ When the policy applies (to everyone, every time that they use the 
  company’s equipment and systems)
‐ Permitted uses & prohibited uses
‐ Consequences of improper use
‐ No expectation of privacy
‐ Compliance with licenses, laws and policies
‐ Where applicable, expectations regarding Open Source software
‐ Expectations of confidentiality and professional behaviour
‐ Non‐disparagement
‐ Ownership of intellectual property

                                                                        18
Social Media




               19
Why Do You Need A Facebook Policy?
‐ Facebook has an 85% market share of 4‐year universities (your target audience for new 
  employees)
‐ The average amount of time spent by people on Facebook each day is over 23 minutes
‐ The fastest growing demographic of Facebook users is ages 25 and up
‐ Facebook operates in more than 75 languages, has over 550 million members, hosts over 15 
  billion photos on its site and people upload over 100 million more photos to Facebook each 
  day
‐ Every minute of every day, over 1,700,000 actions are performed on Facebook, from 
  comments, to messages, to adding photos, to status updates, to wall posts, etc.
‐ 2 million websites across the internet are integrated with Facebook and 10,000 more websites 
  integrate with it each day
‐ As Time Magazine said in its December 27, 2010 issue “Facebook has a richer, more intimate 
  hoard of information about its citizens than any nation has every had”
‐ However, Social Networking Sites can: (i) waste time at work; (ii) result in the disclosure of 
  company confidential information; (iii) damage an organization’s reputation; (iv) assist 
  employees who want to take part in “virtual harassment”; and (v) lead to breaches of 
  privacy legislation



                                                                                                20
Why Not Ban Facebook At Work?
For all of the potential risks of allowing Facebook use at work, 
  there are also good reasons to permit its use:

‐ Facebook is a fact of life for most younger employees, and 
  your organization may appear out of date and out of touch 
  without it
‐ Facebook can permit your employees and your organization to 
  network for business purposes, marketing and fundraising
‐ Facebook can assist HR with employee background checks
‐ Facebook can assist management with intelligence gathering 
  (ie. online ‘town hall’ meetings)


                                                                    21
What About Blogging?
‐ As with Facebook, blogging can be an effective and 
  inexpensive means of company advertising
‐ Blogging can also provide a unique perspective on what it’s like 
  to work for a particular company, and can assist with recruiting
‐ As with Facebook and other social media sites however, it is 
  often unmonitored and uncensored.  That can lead to a range 
  of blogging from opinion to well‐meaning rambling to 
  intentional harm
‐ As with Facebook and other social media sites, it can also lead 
  to misuse of company confidential information


                                                                  22
What To Do?
Options Include The Following:

‐ Outright ban against social media and blogging in the workplace
‐ Prohibit access to social media and blogging at work, and place restrictions 
  on what employees can say outside of work when it comes to workplace 
  issues and people
‐ Prohibit access to social media and blogging at work but place no 
  restrictions on what employees can say outside of work when it comes to 
  workplace issues and people
‐ Permit social media to those who need it for their jobs (eg. HR; sales) and 
  place restrictions on it to everyone else
‐ No restrictions at all


                                                                              23
What Should Your Social Media Policy 
Look Like?
‐ It should contain a clear statement that employees should not engage in: (i) 
  disclosure of company confidential information; (ii) workplace gossip; (iii) 
  posting offensive or discriminatory language or graphics; (iv) disparaging 
  coworkers, management, the company, vendors, suppliers or customers
‐ It should make clear to employees that their use will be monitored by the 
  company and that it may intervene in certain circumstances (eg. 
  disparagement, discrimination, misuse of confidential information)
‐ It should require workplace bloggers to identify themselves by name and 
  not under a pseudonym
‐ It should require bloggers to make it clear that the views which they 
  express are theirs alone and are not necessarily the views of the company


                                                                              24
What Should Your Social Media Policy 
Look Like, con’t.
‐ It should require bloggers to tell the truth
‐ It should require employees to ensure that their activities will not interfere 
  with their work commitments
‐ It should require employees to confirm that their activities may be 
  suspended for a period of time if required (eg. In the event of a black‐out 
  period during a pending corporate transaction)
‐ It should require employees to confirm their understanding that a breach 
  of the policy may lead to the termination of their employment on a with 
  cause basis
‐ It should require staff who use social media for work purposes to use a 
  stand‐alone work dedicated account


                                                                                25
The Law, or ‘Getting “Dooced”’




                                 26
The Law
• As held by the Honourable Mr. Justice Blair of the Ontario Court of Appeal 
  in the case of Barrick Gold Corporation v. Jorge Lopehandia and Chile 
  MInteral Fields Canada Ltd.:

  “The internet represents a communications revolution.  It makes 
  instantaneous global communication available cheaply to anyone with a 
  computer and an Internet connection.  It enables individuals, institutions, 
  and companies to communicate with a potentially vast global audience.  It 
  is a medium which does not respect geographical boundaries.  
  Concomitant with the utopian possibility of creating virtual communities, 
  enabling aspects of identity to be explored, and heralding a new and global 
  age of free speech and democracy, the internet is also potentially a 
  medium of virtually limitless international defamation.”


                                                                                27
Getting “Dooced”
• www.dooce.com was Heather Armstrong’s blog
‐ She was terminated from her job for writing about her 
  workplace on her blog.  Getting “dooced” has become 
  synonymous with getting terminated due to something that 
  you’ve written on your website




                                                              28
Delta Airlines
• Ellen Simonetti, a flight attendant, posted suggestive photos of 
  herself in her work uniform on a company aircraft on her blog, 
  which was called “Diary of a Flight Attendant”
• Once Delta found out about her blog, she was immediately 
  suspended.  A month later, she was “dooced”.




                                                                  29
Manitoba Health Services
• Jeremy Wright, a Systems Administrator for Manitoba Health 
  Services, alleged that he was terminated from his job for 
  posting the following on his blog:
   –   Getting to surf the web for 3 hours while being paid:  Priceless
   –   Getting to blog for 3 hours while being paid:  Priceless
   –   Sitting around doing nothing for 3 hours while being paid:  Priceless
   –   Installing Windows 2000 Server on a P2 300:  Bloody Freaking Priceless

   The Employer took the position that the employee had been 
     terminated for divulging company secrets.



                                                                                30
West Coast Mazda v. UFCW
 In this case, two employees posted offensive comments about 
 managers on Facebook after hours on their home computers.  
 They were ultimately dismissed.  

 The B.C. Labour Relations Board upheld the terminations as 
 their comments amounted to insubordination and a hostile 
 work environment.  One of the factors which mitigated against 
 them was that they were key union organizers and had a 
 significant degree of influence over other employees.



                                                              31
Other Considerations




                       32
On‐Line Recruiting
Whether you plan to cyber‐recruit or to recruit the good old‐
 fashioned way, the rules and issues remain the same:

‐ Ensure the information is up‐to‐date and accurate (remember 
  that the on‐line world can be inherently unreliable)
‐ Consider human rights and remember that knowing certain 
  things that you shouldn’t otherwise know (eg. the potential 
  employee’s race or religion) can be risky
‐ Consider privacy requirements and remember that you need 
  to have systems in place for the collection, use, disclosure, 
  storing and destroying of personal information


                                                                   33
Best Practices For On‐Line Recruiting
‐ Let the potential employee know that you plan to check them 
  out on‐line; obtaining written consent on the application form 
  can be helpful
‐ Don’t search on‐line until after the interview process
‐ 0nly search publicly available information
‐ Be cautious about what you retain and keep the information 
  secure.  Destroy it 2 years after the hiring decision is made, or 
  sooner if it’s no longer needed for defensive purposes




                                                                       34
Open Source Software
The basic principles of Open Source Software include:
‐ Free redistribution
‐ Must allow modifications
‐ A single license to all users

Potential problems:
‐ Bugs/unreliability
‐ No support
‐ No guarantee of updates
‐ Liability for intellectual property infringement (due to the fact 
  that the potential for infringing code is significant)

                                                                       35
Open Source Software
‐ Considering the needs of your workplace and industry, you 
  also need to weigh the value of using open source software 
  against the risks associated with not using it
  ‐     is open source software an issue for your company?
  ‐     do you need it?
  ‐     do you know if, when and where your employees are 
        using it?
  ‐     how might your IP rights be compromised?




                                                                36
Presented by: Catherine Coulter
catherine.coulter@fmc‐law.com
The preceding presentation contains examples of the kinds of 
issues companies looking to protect confidential information 
could face. If you are faced with one of these issues, please 
retain professional assistance as each situation is unique.

More Related Content

What's hot

Information Technology Policy for Corporates - Need of the Hour
Information Technology Policy for Corporates - Need of the Hour Information Technology Policy for Corporates - Need of the Hour
Information Technology Policy for Corporates - Need of the Hour Vijay Dalmia
 
Good-cyber-hygiene-at-scale-and-speed
Good-cyber-hygiene-at-scale-and-speedGood-cyber-hygiene-at-scale-and-speed
Good-cyber-hygiene-at-scale-and-speedJames '​-- Mckinlay
 
Cybersecurity tips for employees
Cybersecurity tips for employeesCybersecurity tips for employees
Cybersecurity tips for employeesPriscila Bernardes
 
How To Promote Security Awareness In Your Company
How To Promote Security Awareness In Your CompanyHow To Promote Security Awareness In Your Company
How To Promote Security Awareness In Your Companydanielblander
 
Risks and Benefits of Bringing Your Own Device
Risks and Benefits of Bringing Your Own Device Risks and Benefits of Bringing Your Own Device
Risks and Benefits of Bringing Your Own Device CooperTechnologiesInc
 
The 5 ws of Cyber Security
The 5 ws of Cyber SecurityThe 5 ws of Cyber Security
The 5 ws of Cyber SecurityMisha Hanin
 
How To Do BYOD Right
How To Do BYOD RightHow To Do BYOD Right
How To Do BYOD RightRapidScale
 
20190523 Breach Notification Wizard: Lessons in Knowledge Management!
20190523 Breach Notification Wizard: Lessons in Knowledge Management!20190523 Breach Notification Wizard: Lessons in Knowledge Management!
20190523 Breach Notification Wizard: Lessons in Knowledge Management!3Lions Publishing, Inc.
 
What does Information Security have in common with Eastern Air Lines Flight 401
What does Information Security have in common with Eastern Air Lines Flight 401What does Information Security have in common with Eastern Air Lines Flight 401
What does Information Security have in common with Eastern Air Lines Flight 401Chris Ross
 
GRRCON 2013: Imparting security awareness to all levels of users
GRRCON 2013: Imparting security awareness to all levels of usersGRRCON 2013: Imparting security awareness to all levels of users
GRRCON 2013: Imparting security awareness to all levels of usersJoel Cardella
 
BYOD (Bring Your Own Device)
BYOD (Bring Your Own Device)BYOD (Bring Your Own Device)
BYOD (Bring Your Own Device)Michael W. Chitwa
 
Cloud Regulations and Security Standards by Ran Adler
Cloud Regulations and Security Standards by Ran AdlerCloud Regulations and Security Standards by Ran Adler
Cloud Regulations and Security Standards by Ran AdlerIdan Tohami
 
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart GlassesPete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart GlassesAugmentedWorldExpo
 

What's hot (14)

Information Technology Policy for Corporates - Need of the Hour
Information Technology Policy for Corporates - Need of the Hour Information Technology Policy for Corporates - Need of the Hour
Information Technology Policy for Corporates - Need of the Hour
 
Good-cyber-hygiene-at-scale-and-speed
Good-cyber-hygiene-at-scale-and-speedGood-cyber-hygiene-at-scale-and-speed
Good-cyber-hygiene-at-scale-and-speed
 
Cybersecurity tips for employees
Cybersecurity tips for employeesCybersecurity tips for employees
Cybersecurity tips for employees
 
How To Promote Security Awareness In Your Company
How To Promote Security Awareness In Your CompanyHow To Promote Security Awareness In Your Company
How To Promote Security Awareness In Your Company
 
Risks and Benefits of Bringing Your Own Device
Risks and Benefits of Bringing Your Own Device Risks and Benefits of Bringing Your Own Device
Risks and Benefits of Bringing Your Own Device
 
The 5 ws of Cyber Security
The 5 ws of Cyber SecurityThe 5 ws of Cyber Security
The 5 ws of Cyber Security
 
How To Do BYOD Right
How To Do BYOD RightHow To Do BYOD Right
How To Do BYOD Right
 
20190523 Breach Notification Wizard: Lessons in Knowledge Management!
20190523 Breach Notification Wizard: Lessons in Knowledge Management!20190523 Breach Notification Wizard: Lessons in Knowledge Management!
20190523 Breach Notification Wizard: Lessons in Knowledge Management!
 
What does Information Security have in common with Eastern Air Lines Flight 401
What does Information Security have in common with Eastern Air Lines Flight 401What does Information Security have in common with Eastern Air Lines Flight 401
What does Information Security have in common with Eastern Air Lines Flight 401
 
GRRCON 2013: Imparting security awareness to all levels of users
GRRCON 2013: Imparting security awareness to all levels of usersGRRCON 2013: Imparting security awareness to all levels of users
GRRCON 2013: Imparting security awareness to all levels of users
 
BYOD (Bring Your Own Device)
BYOD (Bring Your Own Device)BYOD (Bring Your Own Device)
BYOD (Bring Your Own Device)
 
Cloud Regulations and Security Standards by Ran Adler
Cloud Regulations and Security Standards by Ran AdlerCloud Regulations and Security Standards by Ran Adler
Cloud Regulations and Security Standards by Ran Adler
 
Bring your own device
Bring your own deviceBring your own device
Bring your own device
 
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart GlassesPete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
 

Viewers also liked

Employee confidentiality training
Employee confidentiality trainingEmployee confidentiality training
Employee confidentiality trainingJessi Morris
 
Emp Rights & Responsibility
Emp Rights & ResponsibilityEmp Rights & Responsibility
Emp Rights & Responsibilityeshontee09
 
susanfullerMha690 week1discussion2pp
susanfullerMha690 week1discussion2ppsusanfullerMha690 week1discussion2pp
susanfullerMha690 week1discussion2ppPrayerful
 
Confidentially in the workplace
Confidentially in the workplaceConfidentially in the workplace
Confidentially in the workplaceKnighten
 
Confidentiality
Confidentiality Confidentiality
Confidentiality pcsamuels10
 
Confidentiality
ConfidentialityConfidentiality
ConfidentialityLLSS64
 
Conflict Management Among Staff
Conflict Management Among StaffConflict Management Among Staff
Conflict Management Among StaffDarci Stanford
 
Safety Rules in the Workplace & Office
Safety Rules in the Workplace & OfficeSafety Rules in the Workplace & Office
Safety Rules in the Workplace & OfficeOxbridge Academy
 
The importance of confidentiality
The importance of confidentialityThe importance of confidentiality
The importance of confidentialityswilson0050
 
Confidentiality in the Workplace
Confidentiality in the WorkplaceConfidentiality in the Workplace
Confidentiality in the Workplacesalvarez63
 

Viewers also liked (12)

Employee confidentiality training
Employee confidentiality trainingEmployee confidentiality training
Employee confidentiality training
 
Emp Rights & Responsibility
Emp Rights & ResponsibilityEmp Rights & Responsibility
Emp Rights & Responsibility
 
Conflic resolution
Conflic resolution Conflic resolution
Conflic resolution
 
susanfullerMha690 week1discussion2pp
susanfullerMha690 week1discussion2ppsusanfullerMha690 week1discussion2pp
susanfullerMha690 week1discussion2pp
 
Confidentially in the workplace
Confidentially in the workplaceConfidentially in the workplace
Confidentially in the workplace
 
Confidentiality
Confidentiality Confidentiality
Confidentiality
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 
Conflict Management Among Staff
Conflict Management Among StaffConflict Management Among Staff
Conflict Management Among Staff
 
Safety Rules in the Workplace & Office
Safety Rules in the Workplace & OfficeSafety Rules in the Workplace & Office
Safety Rules in the Workplace & Office
 
The importance of confidentiality
The importance of confidentialityThe importance of confidentiality
The importance of confidentiality
 
Confidentiality in the Workplace
Confidentiality in the WorkplaceConfidentiality in the Workplace
Confidentiality in the Workplace
 
Sexual Harassment in the Philippine Workplace
Sexual Harassment in the Philippine WorkplaceSexual Harassment in the Philippine Workplace
Sexual Harassment in the Philippine Workplace
 

Similar to Strategies for Protecting Confidential Workplace Information

7 Habits of Highly Secure Organizations
7 Habits of Highly Secure Organizations7 Habits of Highly Secure Organizations
7 Habits of Highly Secure OrganizationsHelpSystems
 
Exploring byod approaches for mobile learning
Exploring byod approaches for mobile learningExploring byod approaches for mobile learning
Exploring byod approaches for mobile learningDebbie Richards
 
GDPR Part 2: Quest Relevance
GDPR Part 2: Quest RelevanceGDPR Part 2: Quest Relevance
GDPR Part 2: Quest RelevanceAdrian Dumitrescu
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)Pace IT at Edmonds Community College
 
Securing Mobile Devices in the Workplace - Six Tips For Midsize Businesses
Securing Mobile Devices in the Workplace - Six Tips For Midsize BusinessesSecuring Mobile Devices in the Workplace - Six Tips For Midsize Businesses
Securing Mobile Devices in the Workplace - Six Tips For Midsize BusinessesMidmarketIBM
 
Cyber Rangers S1 E2
Cyber Rangers S1 E2Cyber Rangers S1 E2
Cyber Rangers S1 E2JudyEvans8
 
Data Security for Marketers
Data Security for MarketersData Security for Marketers
Data Security for MarketersHileman Group
 
Securing your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEsSecuring your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEsSonny Hashmi
 
Securing your digital world cybersecurity for sb es
Securing your digital world   cybersecurity for sb esSecuring your digital world   cybersecurity for sb es
Securing your digital world cybersecurity for sb esSonny Hashmi
 
Secure information sharing - the external user dilemma
Secure information sharing - the external user dilemmaSecure information sharing - the external user dilemma
Secure information sharing - the external user dilemmaWatchful Software
 
Ravi i ot-security
Ravi i ot-securityRavi i ot-security
Ravi i ot-securityskumartarget
 
093049ov4.pptx
093049ov4.pptx093049ov4.pptx
093049ov4.pptxNguyenNM
 
Ten Commandments of BYOD
Ten Commandments of BYODTen Commandments of BYOD
Ten Commandments of BYODK Singh
 
11) HND_SEC_W11_Security Policies_111312.pdf
11) HND_SEC_W11_Security Policies_111312.pdf11) HND_SEC_W11_Security Policies_111312.pdf
11) HND_SEC_W11_Security Policies_111312.pdfDulaOmesh
 
Securing Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP LeaksSecuring Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP LeaksHokme
 
Dino Tsibouris & Mehmet Munur - Legal Perspective on Data Security for 2016
Dino Tsibouris & Mehmet Munur - Legal Perspective on Data Security for 2016Dino Tsibouris & Mehmet Munur - Legal Perspective on Data Security for 2016
Dino Tsibouris & Mehmet Munur - Legal Perspective on Data Security for 2016centralohioissa
 

Similar to Strategies for Protecting Confidential Workplace Information (20)

7 Habits of Highly Secure Organizations
7 Habits of Highly Secure Organizations7 Habits of Highly Secure Organizations
7 Habits of Highly Secure Organizations
 
Byod
ByodByod
Byod
 
Exploring byod approaches for mobile learning
Exploring byod approaches for mobile learningExploring byod approaches for mobile learning
Exploring byod approaches for mobile learning
 
GDPR Part 2: Quest Relevance
GDPR Part 2: Quest RelevanceGDPR Part 2: Quest Relevance
GDPR Part 2: Quest Relevance
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
 
Securing Mobile Devices in the Workplace - Six Tips For Midsize Businesses
Securing Mobile Devices in the Workplace - Six Tips For Midsize BusinessesSecuring Mobile Devices in the Workplace - Six Tips For Midsize Businesses
Securing Mobile Devices in the Workplace - Six Tips For Midsize Businesses
 
Portable Biometrics (1)
Portable Biometrics (1)Portable Biometrics (1)
Portable Biometrics (1)
 
Cyber Rangers S1 E2
Cyber Rangers S1 E2Cyber Rangers S1 E2
Cyber Rangers S1 E2
 
Data Security for Marketers
Data Security for MarketersData Security for Marketers
Data Security for Marketers
 
Securing your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEsSecuring your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEs
 
Securing your digital world cybersecurity for sb es
Securing your digital world   cybersecurity for sb esSecuring your digital world   cybersecurity for sb es
Securing your digital world cybersecurity for sb es
 
Secure information sharing - the external user dilemma
Secure information sharing - the external user dilemmaSecure information sharing - the external user dilemma
Secure information sharing - the external user dilemma
 
Ravi i ot-security
Ravi i ot-securityRavi i ot-security
Ravi i ot-security
 
093049ov4.pptx
093049ov4.pptx093049ov4.pptx
093049ov4.pptx
 
Ten Commandments of BYOD
Ten Commandments of BYODTen Commandments of BYOD
Ten Commandments of BYOD
 
2016 11-17-gdpr-integro-webinar
2016 11-17-gdpr-integro-webinar2016 11-17-gdpr-integro-webinar
2016 11-17-gdpr-integro-webinar
 
IT Policy
IT Policy IT Policy
IT Policy
 
11) HND_SEC_W11_Security Policies_111312.pdf
11) HND_SEC_W11_Security Policies_111312.pdf11) HND_SEC_W11_Security Policies_111312.pdf
11) HND_SEC_W11_Security Policies_111312.pdf
 
Securing Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP LeaksSecuring Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP Leaks
 
Dino Tsibouris & Mehmet Munur - Legal Perspective on Data Security for 2016
Dino Tsibouris & Mehmet Munur - Legal Perspective on Data Security for 2016Dino Tsibouris & Mehmet Munur - Legal Perspective on Data Security for 2016
Dino Tsibouris & Mehmet Munur - Legal Perspective on Data Security for 2016
 

More from Now Dentons

FMC is Now Dentons
FMC is Now DentonsFMC is Now Dentons
FMC is Now DentonsNow Dentons
 
Foreign Workers, International Tax and Oil & Gas Market Update
Foreign Workers, International Tax and Oil & Gas Market UpdateForeign Workers, International Tax and Oil & Gas Market Update
Foreign Workers, International Tax and Oil & Gas Market UpdateNow Dentons
 
Protecting Your Start-Up Company's IP
Protecting Your Start-Up Company's IPProtecting Your Start-Up Company's IP
Protecting Your Start-Up Company's IPNow Dentons
 
Privacy and Security in Mobile E-Commerce
Privacy and Security in Mobile E-CommercePrivacy and Security in Mobile E-Commerce
Privacy and Security in Mobile E-CommerceNow Dentons
 
Drafting for the Matrimonial Property Act
Drafting for the Matrimonial Property ActDrafting for the Matrimonial Property Act
Drafting for the Matrimonial Property ActNow Dentons
 
Trends in Energy Regulatory Law
Trends in Energy Regulatory LawTrends in Energy Regulatory Law
Trends in Energy Regulatory LawNow Dentons
 
Public M&A Transactions - Deal Points
Public M&A Transactions - Deal PointsPublic M&A Transactions - Deal Points
Public M&A Transactions - Deal PointsNow Dentons
 
Giving Away the Farm
Giving Away the FarmGiving Away the Farm
Giving Away the FarmNow Dentons
 
Risk Apportionment in the Purchase and Sale Transaction
Risk Apportionment in the Purchase and Sale TransactionRisk Apportionment in the Purchase and Sale Transaction
Risk Apportionment in the Purchase and Sale TransactionNow Dentons
 
Letters of Intent - Tips and Traps for Commercial Lawyers
Letters of Intent - Tips and Traps for Commercial LawyersLetters of Intent - Tips and Traps for Commercial Lawyers
Letters of Intent - Tips and Traps for Commercial LawyersNow Dentons
 
Protect you Rights and Avoid Liability! Current Developments and Major Implic...
Protect you Rights and Avoid Liability! Current Developments and Major Implic...Protect you Rights and Avoid Liability! Current Developments and Major Implic...
Protect you Rights and Avoid Liability! Current Developments and Major Implic...Now Dentons
 
Preliminary Economic Assessments
Preliminary Economic AssessmentsPreliminary Economic Assessments
Preliminary Economic AssessmentsNow Dentons
 
An Introduction to Legal Aspects of Customer Acquisitions for Startups
An Introduction to Legal Aspects of Customer Acquisitions for StartupsAn Introduction to Legal Aspects of Customer Acquisitions for Startups
An Introduction to Legal Aspects of Customer Acquisitions for StartupsNow Dentons
 
An Introduction to Letters of Credit for Banking Lawyers
An Introduction to Letters of Credit for Banking LawyersAn Introduction to Letters of Credit for Banking Lawyers
An Introduction to Letters of Credit for Banking LawyersNow Dentons
 
Preparing the Legal Framework for Mobile and Other Emerging Payments
Preparing the Legal Framework for Mobile and Other Emerging Payments Preparing the Legal Framework for Mobile and Other Emerging Payments
Preparing the Legal Framework for Mobile and Other Emerging Payments Now Dentons
 
Update on Hydraulic Fracturing: Preparing for Gasland 2
Update on Hydraulic Fracturing:Preparing for Gasland 2Update on Hydraulic Fracturing:Preparing for Gasland 2
Update on Hydraulic Fracturing: Preparing for Gasland 2Now Dentons
 
Canada, China and Copyright Law
Canada, China and Copyright LawCanada, China and Copyright Law
Canada, China and Copyright LawNow Dentons
 
Intellectual Property and Business Law
Intellectual Property and Business LawIntellectual Property and Business Law
Intellectual Property and Business LawNow Dentons
 
The Copyright Modernization Act
The Copyright Modernization ActThe Copyright Modernization Act
The Copyright Modernization ActNow Dentons
 

More from Now Dentons (20)

Meet dentons
Meet dentonsMeet dentons
Meet dentons
 
FMC is Now Dentons
FMC is Now DentonsFMC is Now Dentons
FMC is Now Dentons
 
Foreign Workers, International Tax and Oil & Gas Market Update
Foreign Workers, International Tax and Oil & Gas Market UpdateForeign Workers, International Tax and Oil & Gas Market Update
Foreign Workers, International Tax and Oil & Gas Market Update
 
Protecting Your Start-Up Company's IP
Protecting Your Start-Up Company's IPProtecting Your Start-Up Company's IP
Protecting Your Start-Up Company's IP
 
Privacy and Security in Mobile E-Commerce
Privacy and Security in Mobile E-CommercePrivacy and Security in Mobile E-Commerce
Privacy and Security in Mobile E-Commerce
 
Drafting for the Matrimonial Property Act
Drafting for the Matrimonial Property ActDrafting for the Matrimonial Property Act
Drafting for the Matrimonial Property Act
 
Trends in Energy Regulatory Law
Trends in Energy Regulatory LawTrends in Energy Regulatory Law
Trends in Energy Regulatory Law
 
Public M&A Transactions - Deal Points
Public M&A Transactions - Deal PointsPublic M&A Transactions - Deal Points
Public M&A Transactions - Deal Points
 
Giving Away the Farm
Giving Away the FarmGiving Away the Farm
Giving Away the Farm
 
Risk Apportionment in the Purchase and Sale Transaction
Risk Apportionment in the Purchase and Sale TransactionRisk Apportionment in the Purchase and Sale Transaction
Risk Apportionment in the Purchase and Sale Transaction
 
Letters of Intent - Tips and Traps for Commercial Lawyers
Letters of Intent - Tips and Traps for Commercial LawyersLetters of Intent - Tips and Traps for Commercial Lawyers
Letters of Intent - Tips and Traps for Commercial Lawyers
 
Protect you Rights and Avoid Liability! Current Developments and Major Implic...
Protect you Rights and Avoid Liability! Current Developments and Major Implic...Protect you Rights and Avoid Liability! Current Developments and Major Implic...
Protect you Rights and Avoid Liability! Current Developments and Major Implic...
 
Preliminary Economic Assessments
Preliminary Economic AssessmentsPreliminary Economic Assessments
Preliminary Economic Assessments
 
An Introduction to Legal Aspects of Customer Acquisitions for Startups
An Introduction to Legal Aspects of Customer Acquisitions for StartupsAn Introduction to Legal Aspects of Customer Acquisitions for Startups
An Introduction to Legal Aspects of Customer Acquisitions for Startups
 
An Introduction to Letters of Credit for Banking Lawyers
An Introduction to Letters of Credit for Banking LawyersAn Introduction to Letters of Credit for Banking Lawyers
An Introduction to Letters of Credit for Banking Lawyers
 
Preparing the Legal Framework for Mobile and Other Emerging Payments
Preparing the Legal Framework for Mobile and Other Emerging Payments Preparing the Legal Framework for Mobile and Other Emerging Payments
Preparing the Legal Framework for Mobile and Other Emerging Payments
 
Update on Hydraulic Fracturing: Preparing for Gasland 2
Update on Hydraulic Fracturing:Preparing for Gasland 2Update on Hydraulic Fracturing:Preparing for Gasland 2
Update on Hydraulic Fracturing: Preparing for Gasland 2
 
Canada, China and Copyright Law
Canada, China and Copyright LawCanada, China and Copyright Law
Canada, China and Copyright Law
 
Intellectual Property and Business Law
Intellectual Property and Business LawIntellectual Property and Business Law
Intellectual Property and Business Law
 
The Copyright Modernization Act
The Copyright Modernization ActThe Copyright Modernization Act
The Copyright Modernization Act
 

Recently uploaded

8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCRashishs7044
 
Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...Americas Got Grants
 
Cyber Security Training in Office Environment
Cyber Security Training in Office EnvironmentCyber Security Training in Office Environment
Cyber Security Training in Office Environmentelijahj01012
 
Memorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMMemorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMVoces Mineras
 
International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...ssuserf63bd7
 
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607dollysharma2066
 
8447779800, Low rate Call girls in Dwarka mor Delhi NCR
8447779800, Low rate Call girls in Dwarka mor Delhi NCR8447779800, Low rate Call girls in Dwarka mor Delhi NCR
8447779800, Low rate Call girls in Dwarka mor Delhi NCRashishs7044
 
TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024Adnet Communications
 
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCRashishs7044
 
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort ServiceCall US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Servicecallgirls2057
 
Chapter 9 PPT 4th edition.pdf internal audit
Chapter 9 PPT 4th edition.pdf internal auditChapter 9 PPT 4th edition.pdf internal audit
Chapter 9 PPT 4th edition.pdf internal auditNhtLNguyn9
 
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxThe-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxmbikashkanyari
 
Buy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy Verified Accounts
 
Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Seta Wicaksana
 
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCRashishs7044
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfRbc Rbcua
 
PSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationPSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationAnamaria Contreras
 
Kenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith PereraKenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith Pereraictsugar
 

Recently uploaded (20)

8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR
 
Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...
 
Cyber Security Training in Office Environment
Cyber Security Training in Office EnvironmentCyber Security Training in Office Environment
Cyber Security Training in Office Environment
 
Memorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMMemorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQM
 
International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...
 
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCREnjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
 
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
 
8447779800, Low rate Call girls in Dwarka mor Delhi NCR
8447779800, Low rate Call girls in Dwarka mor Delhi NCR8447779800, Low rate Call girls in Dwarka mor Delhi NCR
8447779800, Low rate Call girls in Dwarka mor Delhi NCR
 
TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024
 
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
 
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort ServiceCall US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
 
Chapter 9 PPT 4th edition.pdf internal audit
Chapter 9 PPT 4th edition.pdf internal auditChapter 9 PPT 4th edition.pdf internal audit
Chapter 9 PPT 4th edition.pdf internal audit
 
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxThe-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
 
Corporate Profile 47Billion Information Technology
Corporate Profile 47Billion Information TechnologyCorporate Profile 47Billion Information Technology
Corporate Profile 47Billion Information Technology
 
Buy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail Accounts
 
Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...
 
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdf
 
PSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationPSCC - Capability Statement Presentation
PSCC - Capability Statement Presentation
 
Kenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith PereraKenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith Perera
 

Strategies for Protecting Confidential Workplace Information