Download presentation
Presentation is loading. Please wait.
Published byMoses Bradford Modified over 8 years ago
1
Ben Roach Telephone: (515) 283-8158 | Facsimile: (515) 283-3108 | E-Mail: bpr@nyemaster.com 700 Walnut, Suite 1600 | Des Moines, IA 50309-3899 | (515) 283-3100 Attorneys at Law | Offices in Des Moines, Ames and Cedar Rapids I NSIDE J OB : CYBERSECURITY FOR EMPLOYERS www.nyemaster.comSeptember 1, 2015 ©2012 Nyemaster Goode, P.C.
2
System functions Policies Contracts LAYERS OF PROTECTION www.nyemaster.comSeptember 1, 2015 ©2012 Nyemaster Goode, P.C. 2
3
The Unsophisticated The Selfish The Saboteur The Special Deal WHO ARE YOU WORRIED ABOUT ? www.nyemaster.comSeptember 1, 2015 ©2012 Nyemaster Goode, P.C. 3
4
www.nyemaster.comSeptember 1, 2015 ©2012 Nyemaster Goode, P.C. 4
5
Easy passwords Shares passwords Loses device Exposure to unsecured networks Phishing No ill intent THE UNSOPHISTICATED www.nyemaster.comSeptember 1, 2015 ©2012 Nyemaster Goode, P.C. 5
6
www.nyemaster.comSeptember 1, 2015 ©2012 Nyemaster Goode, P.C. 6
7
It’s mine Download onto media Email Other sharing function Goal is information to benefit himself/herself –- not harm THE SELFISH www.nyemaster.comSeptember 1, 2015 ©2012 Nyemaster Goode, P.C. 7
8
Inside hacker Goal is theft or harm FBI behavioral indicators THE SABOTEUR www.nyemaster.comSeptember 1, 2015 ©2012 Nyemaster Goode, P.C. 8
9
System Policies Contracts Legal action EMPLOYER TOOLS TO COMBAT www.nyemaster.comSeptember 1, 2015 ©2012 Nyemaster Goode, P.C. 9
10
Security Remote security Encryption Layers of access Monitoring TOOLS – SYSTEM FUNCTIONS www.nyemaster.comSeptember 1, 2015 ©2012 Nyemaster Goode, P.C. 10
11
Passwords Access Ownership Protection Enforcement /discipline TOOLS – POLICIES www.nyemaster.comSeptember 1, 2015 ©2012 Nyemaster Goode, P.C. 11
12
Why important Don’t just distribute Stress importance Incentivize good behavior Enforcement TRAINING ON POLICIES www.nyemaster.comSeptember 1, 2015 ©2012 Nyemaster Goode, P.C. 12
13
Confidentiality agreements Broad use, beyond just those employees with employment contracts or non-competes Easier court enforcement Evidence of protection of trade secrets Don’t forget about vendors/contractors/temps CONTRACTS www.nyemaster.comSeptember 1, 2015 ©2012 Nyemaster Goode, P.C. 13
14
Breach of contract Misappropriation of trade secret Computer Fraud and Abuse Act Conversion Trespass Developing area LEGAL ACTIONS www.nyemaster.comSeptember 1, 2015 ©2012 Nyemaster Goode, P.C. 14
15
QUESTIONS? www.nyemaster.comSeptember 1, 2015 ©2012 Nyemaster Goode, P.C. 15
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.