Ben Roach Telephone: (515) 283-8158 | Facsimile: (515) 283-3108 | 700 Walnut, Suite 1600 | Des Moines, IA 50309-3899 | (515)

Slides:



Advertisements
Similar presentations
4 Information Security.
Advertisements

Springfield Technical Community College Security Awareness Training.
© 2015 Sherman & Howard L.L.C. TO B OR NOT TO B YOD Emily Keimig, Esq
TRADE SECRETS, UNFAIR COMPETITION, EMPLOYEE RAIDS AND EMPLOYEE COVENANTS Alan N. Greenspan Jackson Walker LLP.
Information Systems Services Protecting Data – Keeping Safe Kevin Darley, IT Security Co-ordinator 8 th November 2012.
Privacy (or Data) Breaches - Examples South Carolina Department of Revenue Hackers got into the SCDOR’s computers, and stole information on up to 3.2 Million.
The Zero Hour Phone Call How to Respond to a Data Breach to Minimize your Legal Risk Sheryl Falk April 4, 2013 © 2013 Winston & Strawn LLP.
1 ENFORCING SOCIAL MEDIA AND COMPUTER USAGE POLICIES Haley R. Van Loon BrownWinick 666 Grand Avenue, Suite 2000 Des Moines, IA Telephone:
EXAMINING CYBER/COMPUTER LAW BUSINESS LAW. EXPLAIN CYBER LAW AND THE VARIOUS TYPES OF CYBER CRIMES.
Government Databases and You or How I Learned to Stop Worrying and Love Information Loss. By Patrick Fahey Mis 304.
TRACs Security Awareness FY2009 Office of Information Technology Security 1.
Privacy and Security Risks in Higher Education
October The Insider Financial Crime and Identity Theft Hacktivists Piracy Cyber Espionage and Sabotage.
Why are Small and Mid-Size Companies Easy Targets for Hackers, and What can You do to Protect Yourself? 2/11/2015 Asher Dahan.
CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate.
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
INTELLECTUAL PROPERTY TRADE SECRETS COPYRIGHTS PATENTS.
Cyber crime & Security Prepared by : Rughani Zarana.
ISNE101 Dr. Ken Cosh. Review  Dependability  Reliability  How do we improve it?  Security  Threats & Countering the Threats.
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
Arkansas State Law Which Governs Sensitive Information…… Part 3B
Security considerations for mobile devices in GoRTT
Privacy, Confidentiality, Security, and Integrity of Electronic Data
Hacking and International Investigations Presented By: Nenette Day Harvard University Extension School.
1 Protecting Consumers from Themselves Presented by the State Information Security Office & the California Office of Privacy Protection September 13, 2007.
© 2004 SHRM SHRM Weekly Online Poll: March 9, 2004 Trade Secrets Analyzing 247 responses of s sent, 1622 received (response rate = 15%). Fielded.
How to Protect the Company’s Crown Jewels – Customers & Trade Secrets – Against Unfair Competition William M. Corrigan, Jr. Armstrong Teasdale LLP One.
© MISHCON DE REYA MAY 2014 RECRUITMENT INTERNATIONAL FINANCIAL DIRECTORS’ FORUM Protecting your business from unlawful competition.
Safe Computing Practices. Why would anyone want to hack me? 1 Krebs, Brian - “The Scrap Value of a Hacked PC, Revisited”, 12 Oct 2012,
8/2: Managing IT: Security & Ethics Security: Controls –Information Systems controls Input, processing (hardware, software), output, storage –Facility.
A New Way to Work For the New Century. As a result of several years’ work by you and your co-workers, we have...
Acceptable Use Policy by Andrew Breen. What is an Acceptable Use Policy? According to Wikipedia: a set of rules applied by many transit networks which.
Trade Secrets & Protection of Trade Secrets ISYM540 Topic 5 – Info Assurance and Security Len Smith July 2009.
Use: Policies to Enhance Employee Productivity Elizabeth A. Coonan BrownWinick 666 Grand Avenue, Suite 2000 Des Moines, IA Telephone:
1 Policy Types l Program l Issue Specific l System l Overall l Most Generic User Policies should be publicized l Internal Operations Policies should be.
Data Breach: How to Get Your Campus on the Front Page of the Chronicle?
Desktop Security: Making Sure Your Office Environment is Secure.
Scott Charney Cybercrime and Risk Management PwC.
China IP’s Challenge Since joining the World Trade Organization (2001), China has strengthened its legal framework and amended its IPR laws and regulations.
1 ENFORCING SOCIAL MEDIA AND COMPUTER USAGE POLICIES Haley R. Van Loon BrownWinick 666 Grand Avenue, Suite 2000 Des Moines, IA Telephone:
Safe Computing Practices. Why would anyone want to hack me? 1 Krebs, Brian - “The Scrap Value of a Hacked PC, Revisited”, 12 Oct 2012,
Protection of Trade Secrets; current issues WIPO-UKRAINE SUMMER SCHOOL ON INTELLECTUAL PROPERTY – JULY 2011.
Computer Security By Duncan Hall.
Intellectual Property. Confidential Information Duty not to disclose confidential information about a business that would cause harm to the business or.
Session 13 Cyber-security and cybercrime. Contents  What’s the issue?  Why should we care?  What are the risks?  How do they do it?  How do we protect.
Information Systems Week 7 Securing Information Systems.
Information Security Everyday Best Practices Lock your workstation when you walk away – Hit Ctrl + Alt + Delete Store your passwords securely and don’t.
Computer Forensics. OVERVIEW OF SEMINAR Introduction Introduction Defining Cyber Crime Defining Cyber Crime Cyber Crime Cyber Crime Cyber Crime As Global.
THE OFFICE OF THE LEGAL SERVICES COMMISSIONER The Ethics of Cloud Computing Community Legal Centres 21 May 2013.
FRANK HARTY Direct Number: (515) | Facsimile: (515) | Walnut, Suite 1600 | Des Moines, IA
FRAN HAAS Direct Number: (319) | Facsimile: (319) | First Street SE, Suite 400 | Cedar Rapids, IA
TOP 5 CYBERSECURITY ISSUES CFOS NEED TO KNOW IN A CONNECTED, MOBILE WORLD BRAD FRAZER | PRESENTED ON 06/08/16.
Law Firm Data Security: What In-house Counsel Need to Know
Getting the whole story in internal investigations
Equal Pay Claims: The Governing Laws
Ogletree, Deakins, Nash, Smoak & Stewart PC
Drafting Key Commercial and Consumer Contract Terms
Protection of CONSUMER information
Chapter 3 Legal Issues.
Responding to Intrusions
Data Compromises: A Tax Practitioners “Nightmare”
Topic 6: Issues Press F5 to view!
Forensics Week 11.
Christopher romano & Courtney Sullivan 18 September 2017 Ia445
Data Protection Scenarios
Week 7 Securing Information Systems
Cybersecurity compliance for attorneys
– Communication Technology in a Changing World
How it affects policies and procedures
COSC-100 (Elements of Computer Science) Prof. Juola
Presentation transcript:

Ben Roach Telephone: (515) | Facsimile: (515) | Walnut, Suite 1600 | Des Moines, IA | (515) Attorneys at Law | Offices in Des Moines, Ames and Cedar Rapids I NSIDE J OB : CYBERSECURITY FOR EMPLOYERS 1, 2015 ©2012 Nyemaster Goode, P.C.

System functions Policies Contracts LAYERS OF PROTECTION 1, 2015 ©2012 Nyemaster Goode, P.C. 2

The Unsophisticated The Selfish The Saboteur The Special Deal WHO ARE YOU WORRIED ABOUT ? 1, 2015 ©2012 Nyemaster Goode, P.C. 3

1, 2015 ©2012 Nyemaster Goode, P.C. 4

Easy passwords Shares passwords Loses device Exposure to unsecured networks Phishing No ill intent THE UNSOPHISTICATED 1, 2015 ©2012 Nyemaster Goode, P.C. 5

1, 2015 ©2012 Nyemaster Goode, P.C. 6

It’s mine Download onto media Other sharing function Goal is information to benefit himself/herself –- not harm THE SELFISH 1, 2015 ©2012 Nyemaster Goode, P.C. 7

Inside hacker Goal is theft or harm FBI behavioral indicators THE SABOTEUR 1, 2015 ©2012 Nyemaster Goode, P.C. 8

System Policies Contracts Legal action EMPLOYER TOOLS TO COMBAT 1, 2015 ©2012 Nyemaster Goode, P.C. 9

Security Remote security Encryption Layers of access Monitoring TOOLS – SYSTEM FUNCTIONS 1, 2015 ©2012 Nyemaster Goode, P.C. 10

Passwords Access Ownership Protection Enforcement /discipline TOOLS – POLICIES 1, 2015 ©2012 Nyemaster Goode, P.C. 11

Why important Don’t just distribute Stress importance Incentivize good behavior Enforcement TRAINING ON POLICIES 1, 2015 ©2012 Nyemaster Goode, P.C. 12

Confidentiality agreements Broad use, beyond just those employees with employment contracts or non-competes Easier court enforcement Evidence of protection of trade secrets Don’t forget about vendors/contractors/temps CONTRACTS 1, 2015 ©2012 Nyemaster Goode, P.C. 13

Breach of contract Misappropriation of trade secret Computer Fraud and Abuse Act Conversion Trespass Developing area LEGAL ACTIONS 1, 2015 ©2012 Nyemaster Goode, P.C. 14

QUESTIONS? 1, 2015 ©2012 Nyemaster Goode, P.C. 15