YOUR ‘INTELLECTUAL PROPERTY’ NEEDS MORE THAN LEGAL PROTECTION

YOUR ‘INTELLECTUAL PROPERTY’ NEEDS MORE THAN LEGAL PROTECTION

Here are important ways to protect your data.

Intellectual property, those ideas that we strive to build companies on, are undeniably valuable. But it’s often also vulnerable to threats from inside as well as outside the business, including unhappy employees, ex-employees and competitors. The Office of Australian Information Commissioner reports on notifiable data breaches where the Healthcare sector leads others by numbers of notifications. Interestingly, those breaches have been perpetuated by not only bad third party actors (Script Kiddies, Criminals, Hacktivists, State Actors), but also by simple internal human error. With data breach risks, it’s more important than ever to protect what you’ve often spent years building.

WHAT IS INTELLECTUAL PROPERTY?

A common definition of Intellectual property includes products of the mind, such as literary works, art and creative design, inventions, symbols, scientific discoveries – even ideas or concepts.

Three main types of laws protect it from unauthorised use by others.

  • Trademark: Safeguards commercial identity or brand by discouraging other businesses from adopting a name or logo that is confusingly similar.
  • Patent: Exclusive rights granted by a sovereign state to an inventor or assignee for a limited period of time in exchange for detailed public disclosure of an invention.
  • Copyright: Protects original works of authorship fixed in a tangible medium, including literary, dramatic, musical, artistic and other intellectual works.

However, these are usually only enforced at the end of the development cycle. As you invest millions into research and development, how are you protecting your developing intellectual property? Your data may also contain personally identifiable or financial information that is just as valuable.

KEEP IT SAFE

Take a comprehensive approach to safeguard your company’s intellectual property.

1. IDENTIFY AND CLASSIFY YOUR DATA

The first step to protect any data is to know what your data is and how it is stored. Some of the questions you might ask are:

  • Do we store customer details?
  • Do we store transaction details including payments?
  • Do we store clinical data / lab results?
  • Is stored data subject to compliance requirements?

2. CONDUCT A THOROUGH SECURITY ASSESSMENT

To mitigate risk, take a good look at your current security methods, barriers and procedures. Are they up-to-date with best practice or recommended controls?

3. CREATE A CULTURE OF COMMITMENT

It’s often said that, “In the People-Process-Technology mix, the weakest link is the ‘People’ of an organisation”. User awareness of cybersecurity threats are important to avoid unintended breaches and data theft. A culture of care and practice for data security would need to be demonstrated and applied at all levels.

4. GET TECHNICAL

Be sure appropriate computer and data systems are in place to minimise risk. A host of measures may be taken from encryption of critical data to disaster recovery systems, to monitored systems. What you can’t monitor you can’t protect! Data is everywhere and the perimeter is not what it once was. A firewall on its own will not do the job.

5. CONTROL ACCESS

Restrict the use of flash drives, USBs and other devices that allow transfer of data. Limit access to personal email accounts or websites, as well as file-sharing websites like Dropbox and Google Drive.

Don’t allow employees to remove company information from the workplace. It’s a good idea to limit level and type of access to proprietary information based on role within the company.

6. HR PRACTICES

Implement sound and consistent HR practices, including policies and procedures on the use of technology and communication systems. Ensure employment agreements, policies and hand-books addresses protection of proprietary information, intellectual property and explains clearly the consequences for non-compliance.

7. MANAGE THE EXIT

Companies are particularly vulnerable to intellectual property issues when an employee departs. Adopt suitable process that ensures data access privileges are shut down across previously available touch points and data exfiltration or tampering is prevented.

8. KNOW THE LAW

Even though your intentions are to safeguard your company’s intellectual property, care must be taken to not compromise employee rights without knowing it.

9. PLAN FOR THE WORST

Although you hope you’ll never have to use it, it’s a good idea to develop a detailed plan to deal with a possible data breach. Be sure you have back-up systems in place and a communication strategy.

Review and update your plans annually. Consider conducting periodic tests of those back-ups and recovery processes.

COMMUNICATION PLAN

If data is stolen or misused, first assess the impact to your business and employees, as well as your effected parties. You may have an obligation to issue a public announcement and relevant notifications. Regardless, it’s best to have a communication plan ready to respond to questions.

IT’S NOT AS HARD AS YOU THINK

Protecting your data securely from creation to usage should not be treated as a limiting factor. In fact, we view it as an enabler. Bringing together the best in security technology and expertise lets your organisation flourish, without ever feeling restricted.

要查看或添加评论,请登录

社区洞察

其他会员也浏览了