Ben Roach Telephone: (515) | Facsimile: (515) | Walnut, Suite 1600 | Des Moines, IA | (515) Attorneys at Law | Offices in Des Moines, Ames and Cedar Rapids I NSIDE J OB : CYBERSECURITY FOR EMPLOYERS 1, 2015 ©2012 Nyemaster Goode, P.C.
System functions Policies Contracts LAYERS OF PROTECTION 1, 2015 ©2012 Nyemaster Goode, P.C. 2
The Unsophisticated The Selfish The Saboteur The Special Deal WHO ARE YOU WORRIED ABOUT ? 1, 2015 ©2012 Nyemaster Goode, P.C. 3
1, 2015 ©2012 Nyemaster Goode, P.C. 4
Easy passwords Shares passwords Loses device Exposure to unsecured networks Phishing No ill intent THE UNSOPHISTICATED 1, 2015 ©2012 Nyemaster Goode, P.C. 5
1, 2015 ©2012 Nyemaster Goode, P.C. 6
It’s mine Download onto media Other sharing function Goal is information to benefit himself/herself –- not harm THE SELFISH 1, 2015 ©2012 Nyemaster Goode, P.C. 7
Inside hacker Goal is theft or harm FBI behavioral indicators THE SABOTEUR 1, 2015 ©2012 Nyemaster Goode, P.C. 8
System Policies Contracts Legal action EMPLOYER TOOLS TO COMBAT 1, 2015 ©2012 Nyemaster Goode, P.C. 9
Security Remote security Encryption Layers of access Monitoring TOOLS – SYSTEM FUNCTIONS 1, 2015 ©2012 Nyemaster Goode, P.C. 10
Passwords Access Ownership Protection Enforcement /discipline TOOLS – POLICIES 1, 2015 ©2012 Nyemaster Goode, P.C. 11
Why important Don’t just distribute Stress importance Incentivize good behavior Enforcement TRAINING ON POLICIES 1, 2015 ©2012 Nyemaster Goode, P.C. 12
Confidentiality agreements Broad use, beyond just those employees with employment contracts or non-competes Easier court enforcement Evidence of protection of trade secrets Don’t forget about vendors/contractors/temps CONTRACTS 1, 2015 ©2012 Nyemaster Goode, P.C. 13
Breach of contract Misappropriation of trade secret Computer Fraud and Abuse Act Conversion Trespass Developing area LEGAL ACTIONS 1, 2015 ©2012 Nyemaster Goode, P.C. 14
QUESTIONS? 1, 2015 ©2012 Nyemaster Goode, P.C. 15