Session 602 Exploring the Evolution of Access: Classified, Privacy, and Proprietary Restrictions.

Slides:



Advertisements
Similar presentations
WIPO Asia Sub-Regional on the Use of IP by SME Support Institutions for the Promotion of Competitiveness of SMEs in the Food Processing Sector Lahore,
Advertisements

Indicator 3.02 Use communication skills to foster open, honest communications.
The Balance Sheet Statement
FRC Study: Accounting for Acquisitions, January 2010 Presentation to SSBV Shân Kennedy 1 February 2010.
The Financial Statements
© 2007 Prentice Hall, Inc. All rights reserved.14–1 Chapter 14 The Role of Accountants and Accounting Information.
1 Industry Analysis Business Plan Preparation Frank Moyes Leeds School of Business University of Colorado Boulder, Colorado.
Gregory Rosenthal Project #2 summary From Ideas to Assets Pg
1 Trade Facilitation A narrow sense –A reduction/streamlining of the logistics of moving goods through ports or the documentation requirements at a customs.
1 Industry Analysis Business Plan Preparation Frank Moyes Leeds School of Business University of Colorado Boulder, Colorado.
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.
The Actuary’s Role in Due Diligence The Actuary’s Role in Due Diligence CAS Annual Meeting November 2000.
Chapter 5 the free enterprise system Section 5.1
B284 ENTREPRENEURSHIP Unit 2 Notes. Entrepreneurship Today  Knowledge of economics contributes to an understanding of how entrepreneurs and customers.
Teresa Macklin Information Security Officer 27 May, 2009 Campus-wide Information Security Activities.
Consumer Services. Business Plan A plan that is created to summarize a new business and provide strategies for launching it.
Social Media Jeevan Kaur, Michael Mai, Jing Jiang.
Characteristics of a Market Economy
International Business 9e
Chapter 14 Auditing the Financing/Investing Process: Prepaid Expenses, Intangible Assets, and Property, Plant, and Equipment McGraw-Hill/Irwin Copyright.
INTANGIBLE ASSETS Patent Pending.
John Wiley & Sons, Inc. © 2005 Chapter 10 Plant Assets, Natural Resources, and Intangible Assets Prepared by Naomi Karolinski Monroe Community College.
Chapter 14 Using Financial Information and Accounting n.
International Accounting Standard 1 Presentation of Financial Statements Yousef ElMudallal Part 2.
Elements of the Balance Sheet
The Balance Sheet and the Statement of Changes in Stockholders’ Equity C hapter 4 COPYRIGHT © 2010 South-Western/Cengage Learning Intermediate Accounting.
Business Valuations. Reasons for wanting to know about value:  Market transactions  Scorecards  Estate planning  Family transfers  ESOP  Litigation.
UNIT C ECONOMIC FOUNDATIONS AND FINANCING 6.01 Compare records used in business.
©2001 Kauffman Center for Entrepreneurial Leadership PLANNING AND GROWING A BUSINESS VENTURE™ ™ Business Plan Management and Organization Plan Management.
Lecture 28. Chapter 17 Understanding the Principles of Accounting.
DIS 605 BY DOROBIN AGOTI REG NO: D61/71443/2008 ICT INNOVATION, LEGAL AND PIRACY ISSUES.
1 © 2000 Arthur Andersen All rights reserved. Arthur Andersen Then and Now …. TODAY14 YRS. AGO $7 billion $1 billion ( ) (about 75 yrs to.
McGraw-Hill/Irwin © 2008 The McGraw-Hill Companies, Inc., All Rights Reserved. 1-1 McGraw-Hill/Irwin © 2008 The McGraw-Hill Companies, Inc., All Rights.
11 Chapter 5: Balance Sheet and Supplemental Disclosures (omit SCF)
©2006 Prentice Hall 12-1 Chapter 12 Entrepreneurship: Successfully Launching New Ventures, 1/e Bruce R. Barringer R. Duane Ireland.
INDIANA UNIVERSITY X 420 “POOP” SESSION September 6, 2001.
Protection of Trade Secrets; current issues WIPO-UKRAINE SUMMER SCHOOL ON INTELLECTUAL PROPERTY – JULY 2011.
1 INVESTMENT CLIMATE Corporate Governance Development Equity Associates Inc. February-March, 2004.
IT Security CS5493(74293). IT Security Q: Why do you need security? A: To protect assets.
BizBuilder Step 3: Business Plan Presentation. Entrepreneurship, 11 th Edition Mariotti and Glackin with NFTE © 2010 Pearson Education, Upper Saddle River,
INDICATOR 3.02 USE COMMUNICATION SKILLS TO FOSTER OPEN, HONEST COMMUNICATIONS.
© The McGraw-Hill Companies, Inc., 2002 McGraw-Hill/Irwin The Accounting Equation.
Managing Financial Operations Patterns of Entrepreneurship Chapter 11.
PRE-PARED BY: AZHAR AHMED 1-1 CHAPTER 4 The Financial Statements.
上海金融学院 1-1 Lecture 3 Investment Banking Basics: The Financial Statements.
Financial Accounting II Lecture 08. Intangible Assets Companies Ordinance 1984.
Classification September 2003© Peltier and Associates, all rights reserved Creating an Asset Classification Methodology ISIG & ISSA September, 2003.
Intellectual Property The Underdog of the Business World For More Details Please Visit:
Draft - Enterprise Risk Management Risk Universe
Marketing Jeopardy Free Enterprise Types of Businesses
Explanatory Notes and Other Financial Information
Corporate finance Summer 2017
IB Business Management
Financial Statement Analysis
Financial Accounting II Lecture 09
Chapter 14 Auditing the Financing/Investing Process: Prepaid Expenses, Intangible Assets, and Property, Plant, and Equipment Copyright © 2014 McGraw-Hill.
Financial accounting: Session One
Information Security based on International Standard ISO 27001
Accounting Fundamentals
Principles of Intellectual Property (IP) Valuation
Chapter 2.
IP and legal issues Super-project.eu.
IP and legal issues Super-project.eu.
Identifying Intangible Assets and Intellectual Property
Copyright 2005 Prentice- Hall, Inc.
Indicator 3.02 Use communication skills to foster open, honest communications.
Presentation transcript:

Session 602 Exploring the Evolution of Access: Classified, Privacy, and Proprietary Restrictions

The Proprietary Nature of Private Enterprise Sarah A. Polirer SAA Conference August 27, 2011

3 SAA - August 27, 2011Sarah A. Polirer, CA, CRM Talking points  Define  Information types & examples  Risk management & impact of loss  Information classification  Access matrix

4 SAA - August 27, 2011Sarah A. Polirer, CA, CRM Food for thought ASIS 2007 study  “75% of most organization’s value and sources of revenue creation are intangible assets, intellectual property competitive advantage… and likely to be bought, sold, disseminated, shared, licensed, or traded as part of the transaction.” Ocean Tomo Intellectual Capital Equity 2011 study  “estimates the value of intangibles at around 81% of S&P 500 companies’ value – a significant portion of which is represented by patented technology, trade secrets, proprietary data, business processes and go to market plans”.

5 SAA - August 27, 2011Sarah A. Polirer, CA, CRM Food for thought Foley, Foley & Lander 2006 findings  “In the 1970s, a typical company’s market capitalization was 80% tangible assets and 20% intangible assets. Now the typical market capitalization is 15% tangible assets and 85% intangible assets.”  “Trade secrets are estimated to comprise 80% of the assets of ‘New Economy’ companies.”  “estimated that the value of trade secret information held by US publicly-traded companies alone is more than $5 trillion.” –

6 SAA - August 27, 2011Sarah A. Polirer, CA, CRM Defined  Proprietary – “belonging to ownership; belonging or pertaining to a proprietary (owner) who has legal right or exclusive title to property, business, etc.”  Proprietary Information – “in trade secret law, information in which the owner has protectable interest”  Proprietary Rights – “those rights which an owner of property has by virtue of his ownership… title and possession and is an interest or right of one who exercises dominion over a thing or property”

7 SAA - August 27, 2011Sarah A. Polirer, CA, CRM Legal Definition  Federal Acquisition Regulation (48 CFR Policy) – “A property right or other valid economic interest in data resulting from private investment. Protection of such data from unauthorized use and discloser is necessary to prevent the compromise of such property right or economic interest.”  Economic Espionage Act (18 USC ) – defines trade secrets and gives them protection under federal law along with patents, creative works and copyright  39 U.S. laws – remedy under theft of trade secrets  State laws and Case law

8 SAA - August 27, 2011Sarah A. Polirer, CA, CRM Information Types  Financial information – pre-released information  Marketing & Advertising – market share and planning information  Sales & Product specifications – demographics – customer-related information (also HIPPA related) – strategic business planning  Legal and Compliance – mergers, acquisitions, divestitures – Minute books – patents, trademarks, trade secrets, copyrights  IT information – system information  Research & Development – technical specifications  Human Resources – personnel information

9 SAA - August 27, 2011Sarah A. Polirer, CA, CRM Examples  Financial Information – accounting including assets, expenses, costs, profit, margins – audit – pre-released financial reports – budgets, quotas and targets – tax information – sales and order volumes prior to quarterly/annual releases – specific products sales information, orders or projections  Marketing & Advertising – product-introduction plans and dates – market share and competitive position – short and long term market strategy or customers  Sales & Product information – vendor names/relationships/ demographics – production and inventory levels – future plans and sites – material costs – statistical information – chemical formulas – manufacturing processes – sales demographics & prospects lists – business processes

10 SAA - August 27, 2011Sarah A. Polirer, CA, CRM Examples  Legal – merger, acquisition, divestiture plans and related data – litigation information – pre-released business strategies – pending investments and investment strategies – Board meeting minutes – shareholder information  IT information – systems information – product descriptions & standards – source codes – business plans – security plans  Research & Development – technical and performance specifications – technical reports – product plans – projects in progress – project problems or product code names  Human Resources – benefits – employee identification information – payroll – personnel personal information – philanthropy

11 SAA - August 27, 2011Sarah A. Polirer, CA, CRM Impact of loss  Reputation  Image  Goodwill  Competitive advantage  Core technology  Profitability

12 SAA - August 27, 2011Sarah A. Polirer, CA, CRM Risk Management  Identify the information – Quantify the information’s value – Cost-benefit analysis – Regulatory requirements (e.g. SOX, FASB)  Assess threats vulnerability  Assess impact of loss if disclosed  Identify existing/planned security controls  Determine information rank  Prioritize risk

13 SAA - August 27, 2011Sarah A. Polirer, CA, CRM Classify Information  Based on findings of Risk – Impact of disclosure – Ownership/Access Rights – Security Mechanism – Examples Public Private/Confidential Proprietary – Levels of Proprietary

14 SAA - August 27, 2011Sarah A. Polirer, CA, CRM Information Classification Matrix

15 SAA - August 27, 2011Sarah A. Polirer, CA, CRM Rate Risk Factors

16 SAA - August 27, 2011Sarah A. Polirer, CA, CRM Handling Access

17 SAA - August 27, 2011Sarah A. Polirer, CA, CRM THANK-YOU