Admin's other articles

4349 The World without Bankruptcy Laws

Bankruptcy is one of the natural states which a company may find itself in. Entrepreneurship is primarily about taking risks. When companies take risks, some of them succeed, whereas others fail. Hence failure is a natural part of the business. However, many critics of bankruptcy laws believe that there isn’t a need for an elaborate […]

4348 The Wirecard and Infosys Scandals are a Lesson on How NOT to Treat Whistleblowers

What is the Wirecard Scandal all about and Why it is a Wakeup Call for Whistleblowers Anyone who has been following financial and business news over the last couple of years would have heard about Wirecard, the embattled German payments firm that had to file for bankruptcy after serious and humungous frauds were uncovered leading […]

4347 Why the Digital Age Demands Decision Makers to be Like Elite Marines and Zen Monks

How Modern Decision Makers Have to Confront Present Shock and Information Overload We live in times when Information Overload is getting the better of cognitive abilities to absorb and process the needed data and information to make informed decisions. In addition, the Digital Age has also engendered the Present Shock of Virality and Instant Gratification […]

4346 Why Indian Firms Must Strive for Strategic Autonomy in Their Geoeconomic Strategies

Geopolitics, Economics, and Geoeconomics In the evolving global trading and economic system, firms and corporates are impacted as much by the economic policies of nations as they are by the geopolitical and foreign policies. In other words, any global firm wishing to do business in the international sphere has to be cognizant of both the […]

4345 Why Government Should Not Invest Public Money in Sports Stadiums Used by Professional Franchises

In the previous article, we have already come across some of the reasons why the government should not encourage funding of stadiums that are to be used by private franchises. We have already seen that the entire mechanism of government funding ends up being a regressive tax on the citizens of a particular city who […]

See More Article from Admin

It is a long established fact that a reader will be distracted by the readable content of a page when looking at its layout.

Visit Us

Our Partners

Search with tags

  • No tags available.

When Knowledge is Power, It Makes Sense to Protect it from Theft

In times when the knowledge based economy thrives and is predominant, it is more than important for organizations to protect their most valuable asset, which is data and information. Indeed, given the fact that contemporary organizations use knowledge as the main leverage over competitors, it becomes necessary and even critical to enforce strict data security and confidential information protection policies.

Note the emphasis on data and information and especially the confidential information since if competitors and rivals get hold of such information, they can easily have an unfair advantage over the firms.

Indeed, the ongoing Trade Wars between the United States and China are as much about protecting the Intellectual Property of US firms from preying and theft by China as they are about tariffs and other aspects.

Talking about China, most experts in the field of IP or Intellectual Property concur in the view that in its quest for technological superiority and dominance, it is increasingly resorting to blatant theft of IP and Confidential Information from the US based firms.

In this context, while at the nation level, governments are seized of this issue, it is incumbent upon organizations and especially the HR Managers to “police” the browsing and other online habits of their employees.

How Data Theft Happens in Organizations and How to prevent it

To explain, most theft of data happens mainly by internal actors who can be in the pay of rivals seeking access to a firm’s IP secrets. Indeed, while hacking and phishing are also common, most of the reputed and large organizations have elaborate firewalls and other safeguards that shield their most valuable data from external hackers.

Of course, we do not mean to say that external sources of theft are not important, just that it is visible and can be detected whereas theft by internal employees often happens “below the radar” and hence, it is difficult to detect.

This is the reason why many organizations instruct their IT (Information Technology) and Systems staff to monitor the internet and online behavior of their employees so as to spot and preempt any possible “leakage” of data from them. In addition, they also do not allow personal devices with internet browsing capabilities including Smartphones without due authorization and due diligence.

Indeed, in recent years with the proliferation of Smartphones, HR Managers have a new headache in the form of regulating the Smartphone usage by their employees and while most organizations do not want to be seen as interfering with such habits, they are also seized of the fact that IP theft can happen if they do not do so.

Thus, this is a key challenge for HR Managers and the IT and Systems Staff as they have to keep tab on this aspect as well.

NDAs and Protecting Confidential Information

Having said that, it is not only data theft that is the challenge for organizations and another critical area of concern is the breaching of confidential information by employees. Indeed, this is the reason why Multinational organizations have elaborate NDAs or Non Disclosure Agreements wherein they clearly specify the terms and conditions of the employment contract that bar and prohibit them from sharing such information with others, including family members.

This is more the case as one goes up the organizational hierarchy as then, one is more exposed to trade secrets and sensitive information that make or mar the chances of firms.

Indeed, given the fact that most middle and higher management personnel routinely deal with confidential information if leaked can lead to advantage in terms of Stock and Equity prices, HR Managers usually prepare a list of select individuals who are privy to such information and they restrict such information to this circle only.

Age Old Problems of Human Nature and Easier Means in the Present Times

Taken together, what these aspects mean is that the Information Age has spawned a set of challenges for the HR Managers that hitherto were less demanding.

Indeed, in earlier decades, it was easy to monitor the phone calls and the written communications since they were done by Typewriters and other machine devices which were much more visible than the present day means of leaking information which, as mentioned earlier, can happen quite stealthily.

Moreover, in earlier times, Senior Executives usually used to meet with their peers in Hotels and other discreet places where privacy and security were afforded. Whereas now, any employee can hack into the internal systems as well as reveal the passwords and the IP Addresses of key personnel.

In addition, it is easier now for any employee to simply login to the Intranet and download the proprietary information and coolly take it with him or her on a Pen Drive or a Smartphone.

Even more, it is also easy in the present times with Fax and Printers having transmitting capabilities and this is the reason why many experts believe that while these issues are age old problems of human behavior, the scope for mischief has increased thanks to the ease with which it can be done.

Concluding Thoughts

Lastly, these challenges happen at every level and in all entities, whether they are Corporates or Governmental Agencies. Thus, a whole profession of Cyber Security personnel has now emerged that advises Senior Management figures and HR Professionals on how to protect data and confidential information.

Added to this are the steadily tightening policies and Zero Tolerance attitudes of HR Managers to these challenges. Thus, to conclude, HR professionals cannot afford not to enforce strict data security and confidential information protection policies.

Article Written by

Admin

Leave a reply

Your email address will not be published. Required fields are marked *

Related Posts

The Age of Oversupply: Why the Future Would be Demanding on the Present Generation

Admin

Reasons for Failure of Participative Management

Admin

The Return on Knowledge

Admin